Nework device automated inventory?  Such a thing?

Posted on 2004-10-11
Last Modified: 2010-04-26

I'm just wondering, before I create another spreadsheet, is there a program out there that can create a sufficient device inventory on a large network?

I guess I'm looking for something that would do a IP sweep and then return information about PCs and other devices.

Anything like that around that people use?
Question by:Targetuser
  • 4
  • 2

Accepted Solution

zerofield earned 500 total points
ID: 12276535
there's a company out of iceland that makes very cheap software (perhaps the monetary conversion helps the USD?) that has a program that does nearly this..

i cant remember the name, but their website is or .something like that.  im not affiliated with them or anything, im only posting their website here cus its one of the things i reviewed in my search for the same thing.

there's a suite from Intuit that i cant remember the name of..horribly expensive and reasonably painful, but it does the same thing without scanning.  it runs an agent on each local machine.

Author Comment

ID: 12276722

Thanks.  I'll try that.   I was hoping to use a tool with SMS.   SMS seems to already monitor all the PCs.

It would be nice if I could find a SMS tool.

Expert Comment

ID: 12276737
every company ive worked with using SMS had me there to get them off of it ;)  cant help ya there.
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.


Expert Comment

ID: 12289061
Yeah, Intuit's (Formerly BlueOcean's) TrackIt! does the job, but as you said it's resource intenssive.  Still, it's worth a look as an enterprise solution.  The product has been around for over 5 years that I know of.

Expert Comment

ID: 12289119
i think 5 years this year.. its relatively new.  in my opinion, it really sucks :P  they should have split it up into 5 packages instead of doing purchasing/tracking/etc, made each package cheaper, and focused more on developing them.  I swear i dont think they beta test any of their products, as every single version they've ever come out with has been bugged through the roof for the first 3-8 months of the product!

I really cant in good taste recommend using that one.

Expert Comment

ID: 12289172
I reviewed (and then dismissed) it at our site.  It simply wasn't a fit here.  I wouldn't say I recommended it, only a look.  You know oddly enough, IF you are friendly with Gateway support techs, they have a snazzy little product for this with virtually no bugs or resource requirements.

Expert Comment

ID: 12289206
call me crazy, but i swear that little iceland company's products look nice.  ive never had a full licensed version, but (i think they  changed it somewhat now) they used to offer trials, and that stuff was really nice for the piddly little $300'ish they want for most of their stuff.

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Application deployments and asset inventory 1 49
allotting specs for college tablet.. 3 48
Mouse and Trackpad issue 6 42
Microsoft volume license for installation 11 24
Is it worth it to buy an Echo? In a word, yes! For me it was definitely worth it. I use mine on a daily basis. Prologue & Privacy At first, I was very skeptical about the Amazon Echo. In general, I don't like voice assistants. I don't li…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Internet Business Fax to Email Made Easy - With eFax Corporate (, you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

815 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now