Solved

Good Asset Tag Management?

Posted on 2014-03-05
5
627 Views
Last Modified: 2014-03-10
Hi Team,


I am trying to implement a robust IT Asset Tag Management for my department.

Any Ideas?

(Obviously it needs to be affordable)

I am open to any suggestions.


Thank you.
0
Comment
Question by:Beenardino
5 Comments
 
LVL 51

Expert Comment

by:Joe Winograd, EE MVE
Comment Utility
Hi Beenardino,

CMDBuild is free, open source software available at SourceForge:
http://sourceforge.net/projects/cmdbuild/

I have not personally deployed it, so I can't vouch for it from my own experience. But I've heard good things about it during my time in IT and am passing it along for your consideration/evaluation. I think it's worthwhile to put on your short list. One of its primary uses is IT Asset Management:
http://www.cmdbuild.org/en/diffusione/utilizzi/gestione-asset-it

Regards, Joe
0
 
LVL 38

Expert Comment

by:Aaron Tomosky
Comment Utility
I use spiceworks. Works pretty well and it's free.
0
 
LVL 69

Accepted Solution

by:
Merete earned 500 total points
Comment Utility
Agree with aarontomosky and spiceworks, but you need more than just Spiceworks
Here's a a starter point, you can research your own P-Touch label maker
Inventory Barcoding/Asset Tagging for Dummies!
http://community.spiceworks.com/how_to/show/3000-inventory-barcoding-asset-tagging-for-dummies
0
 
LVL 61

Expert Comment

by:btan
Comment Utility
(not too bad with variety of mobile client 3rd Party Tools )
Zabbix @ http://www.zabbix.com/screenshots.php
(not bad in the past but kinda losing 'color')
ocsinventory @ http://www.ocsinventory-ng.org/en/
(can be overly simplified)
asset-tracker @ http://asset-tracker.sourceforge.net/
0
 
LVL 17

Expert Comment

by:Garry-G
Comment Utility
Check out "yourCMDB", it's an open source management framework that allows you to setup multiple types of entries, link between them, etc. ...
( http://sourceforge.net/projects/yourcmdb/ )
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

It’s a strangely common occurrence that when you send someone their login details for a system, they can’t get in. This article will help you understand why it happens, and what you can do about it.
This article explains in simple steps how to renew expiring Exchange Server Internal Transport Certificate.
Video by: Tony
This video teaches viewers how to export a project from Adobe Premiere Pro and the various file types involved.
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now