icon-bg
icon-bg
icon-bg

Blog

First news of the new year!

Today we have a big update of the Software Accounting and Licenses module in Total Network Inventory. Now, TNI automatically collects software license keys from Adobe, Corel and Autodesk on Windows and macOS!

All local keys for Photoshop, Acrobat, CorelDRAW, AutoCAD and other software from these developers, from all PCs on your network are now collected in one place.

But there’s more: automatic binding of the collected keys to the appropriate software and licenses in the database, manual binding of the keys to the specific software, changing the status …

Effectively tracking software and hardware assets across company networks simplifies IT management, improves security, and optimizes expenditures. This overview covers the main benefits of the central device and software inventories for enterprises and the top methods to establish control.

What is a software inventory?

Software inventory tool refers to the process of keeping track of all the programs and applications installed across a company’s network. It involves identifying, cataloging, and managing the software assets within an organization. This process helps system administrators understand which applications are installed on which computers, and whether they are up to date and in compliance …

Keeping the software on computers on the network up-to-date is extremely important for several reasons. By installing the latest updates and patches that software vendors release, you can benefit from improved security, new features, better performance, and ensured compatibility with other tools and devices.

Benefits of timely software updates

Patch security flaws

One of the primary reasons for a software update for a computer is to patch security flaws. Developers regularly discover vulnerabilities that can be exploited by hackers or bad actors. These vulnerabilities can range from minor bugs to critical security holes that could allow unauthorized access to the …

On December 10, a critical vulnerability was discovered in the Log4j component from the Apache Software Foundation, rated at a maximum of 10 on the CVSS scale.

The Log4j component (also known as Log4Shell and LogJam) is a Java-based logging package used by developers to log errors. At the moment, it is already known that the CVE-2021-44228 vulnerability affected a large number of software, including some services of the largest tech companies such as Amazon, Apple, Cisco, Google, Microsoft, Steam and IBM. The Dutch Cybersecurity Center has created a regularly updated doc on GitHub listing the affected applications.

With …

Hi Admins! 🦸🏽‍♂️

Today we have released another update for Total Network Inventory: Change log is now also integrated into the Task Scheduler!

Initially, a new Task Scheduler could handle the following tasks: network scanning, synchronization with AD, building table reports, data import and backup. From now, you can build reports on hardware and software changes of computers and servers in your network on a schedule.

We have also implemented an extended collection of information about USB devices: names are displayed immediately with detailed information, and popular today USB hubs are now identified and included in reports.

This …

Are computers on your network ready for the new Windows 11?

Come, on October 5, 2021, Microsoft is releasing their new operating system, which may not be suitable for for all of your computers.

Workstations must meet these requirements:

  • 1 (GHz) on a compatible 64-bit processor;
  • At least 4 GB of RAM and 64 GB of storage;
  • UEFI and secure boot compatible;
  • Trusted Platform Module (TPM) version 2.0;
  • DirectX 12 compatible graphics card.

In this TNI update, we have prepared a special report named “Windows 11 Ready”, which will quickly get you …