August 03, 2004
$18.60 per node – reducing to $2 per node.
- Ease of Use:
- Value for Money:
- Overall Rating:
Simplicity of concept and execution.
Presentation is a little basic.
A useful addition to the administrator's toolkit.
This product is a straightforward and competent auditing tool whose apparent simplicity and ease of use will appeal to many system administrators.
The concept is familiar in that agents are created and then run on the target machines in order to produce a report accordingly. These agents might be distributed in a number of ways, from manually walking around with portable media such as floppy or zip disks, to emailing direct to users, with the results collected into a shared network folder or, if machines are not on a network, simply collected on portable media.
The agents can also be run remotely over the network from a central location or, once distributed, incorporated into a log-in script in order to be run automatically upon start-up. Scheduled audits might be run by setting up scheduled tasks individually on the target machines.
Data is stored in either Microsoft Access or SQL Server format databases, and the iInventory Console should reside on a Microsoft client. However, the agents can be run on Windows, Mac or Linux-based computers and the data collected for analysis via the iInventory Console.
It is possible to configure a user questionnaire for inclusion with the agents. This gives an opportunity to collect specific information which might not be gathered automatically, such as details of other office equipment.
The console is simply presented, with different panes to show increasing drill-down detail as appropriate. Its minimalist design includes a simple drop-down selection box for popular queries, which ran very quickly in practice.
Simple tools are provided to compact the database and data can be exported in either Microsoft Access or text formats for analysis with other programs.
The seemingly minimalist software manages to quickly retrieve information about your computing environment.
Queries are sensibly chosen, and a simple query builder enables a custom approach to be taken, with the resultant query being run straight from the dialog. There is even an integral SQL builder, which produced competent output.
iInventory is a no-nonsense product with which to tackle the auditing task.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry