Comprehensive Guide to DEKSI Network Inventory: Features & Benefits

Comprehensive Guide to DEKSI Network Inventory: Features & BenefitsDEKSI Network Inventory is a powerful tool designed to automate discovery, inventory, and reporting for devices across small to medium-sized networks. This comprehensive guide explains what DEKSI Network Inventory does, how it works, its key features, deployment considerations, licensing and pricing models, real-world use cases, and practical tips to get the most value from the product.


What is DEKSI Network Inventory?

DEKSI Network Inventory is an agentless network asset management solution that scans networks to identify hardware, software, and configuration details of computers and devices. It collects data such as installed software, running processes, hardware components, network interfaces, user accounts, and system settings. The data is stored centrally and presented through reports, dashboards, and exportable formats to support IT asset management, compliance, troubleshooting, and capacity planning.


Key Features

  • Inventory Discovery

    • Agentless scanning using protocols like WMI, SNMP, SSH, and remote registry.
    • Support for Windows, Linux, macOS, printers, network devices, and virtual machines.
    • Scheduled and on-demand scans to keep inventory up to date.
  • Hardware and Software Details

    • Detailed hardware inventory: CPU, RAM, motherboard, disk drives, NICs.
    • Software inventory: installed applications, versions, publishers, and uninstall strings.
    • License tracking by collecting installed product keys where available.
  • Network and Connectivity Information

    • IP addresses, MAC addresses, open ports, and active network services.
    • Discovery of network topology elements via SNMP-enabled devices.
  • Reporting and Export

    • Pre-built reports for hardware, software, compliance, and security.
    • Custom report creation and scheduled report delivery.
    • Export to CSV, Excel, HTML, and PDF formats.
  • Alerts and Monitoring

    • Change detection for software installations, hardware modifications, and configuration changes.
    • Email notifications for specific events or thresholds.
  • User and Security Inventory

    • Local and domain user accounts, group memberships, and login histories.
    • Audit of installed security software and patch status.
  • Integration and Extensibility

    • API or data export capabilities for integration with ITSM, CMDB, or SIEM tools.
    • Command-line utilities and scripts for automation.

Benefits

  • Improved Asset Visibility

    • Centralized, up-to-date inventory helps IT teams quickly locate assets and understand their configurations.
  • License Compliance and Cost Control

    • Track installed software and license keys to avoid over-purchasing and to ensure compliance with licensing agreements.
  • Faster Troubleshooting

    • Access to hardware and software details reduces mean time to repair (MTTR) by enabling quicker root-cause analysis.
  • Enhanced Security Posture

    • Identify unpatched systems, unauthorized software, or missing antivirus protection to mitigate vulnerabilities.
  • Simplified Auditing and Reporting

    • Generate reports needed for internal audits or regulatory compliance with less manual effort.

Deployment and Requirements

  • System Requirements

    • DEKSI typically runs on a Windows server or workstation that acts as the central console.
    • Network access with appropriate credentials for WMI/WinRM, SSH for Unix-like systems, and SNMP community strings for network devices.
  • Network Considerations

    • Ensure scanning credentials have read access but follow least-privilege principles.
    • Consider firewall rules and network segmentation; scanners may need exceptions to reach endpoints.
  • Scalability

    • Suitable for small to medium networks; larger deployments may require distributed scanning or multiple consoles.

Licensing and Pricing

DEKSI Network Inventory commonly offers licensing based on the number of scanned devices or endpoints. There may be options for perpetual licenses with annual maintenance or subscription-based plans. For precise pricing and licensing tiers, contact DEKSI or an authorized reseller, as offerings change over time.


Common Use Cases

  • IT Asset Management: Maintain an authoritative inventory of hardware and software for procurement and lifecycle planning.
  • Software License Audits: Prepare for vendor audits by reconciling purchased licenses with installed copies.
  • Security and Compliance: Identify devices missing patches or running unauthorized applications.
  • Helpdesk Support: Provide helpdesk personnel with immediate access to device details to resolve issues faster.
  • Network Documentation: Automatically create baseline documentation of devices and configurations.

Best Practices

  • Start with a scoped pilot: Scan a subset of the network to validate credentials, firewall rules, and report formats.
  • Schedule regular scans: Keep inventory fresh with daily or weekly scheduled scans depending on environment volatility.
  • Use role-based credentials: Create read-only accounts for inventory scanning to limit security risk.
  • Integrate with CMDB/ITSM: Feed inventory data into your configuration management database to centralize records.
  • Review reports regularly: Set up scheduled reports and alerts for unauthorized software or critical hardware changes.

Limitations and Considerations

  • Agentless Limitations: Some information (deep process-level telemetry, real-time performance metrics) may require agents or supplementary monitoring tools.
  • Credential Management: Storing scanning credentials centrally requires secure handling practices.
  • Network Complexity: Environments with strict segmentation, firewalls, or intermittent connectivity may need additional planning or distributed scanners.

Alternatives and Comparison

A few competitors in network inventory and asset management include Lansweeper, ManageEngine AssetExplorer, SolarWinds Network Configuration Manager, and PDQ Inventory. Each tool differs in depth of discovery methods, reporting capabilities, scalability, and pricing models.

Feature/Aspect DEKSI Network Inventory Common Alternatives
Agentless discovery Yes Varies (some require agents)
Cross-platform support Windows, Linux, macOS, network devices Most competitors support similar ranges
Reporting Pre-built + custom Varies; competitors may have richer dashboards
Licensing model Device-based Device or user-based, subscription/perpetual

Example: Typical Workflow

  1. Install DEKSI Console on a server with network access.
  2. Configure scanning credentials (WMI/WinRM for Windows, SSH for Unix, SNMP for network devices).
  3. Define IP ranges, subnets, or import device lists.
  4. Run initial full scan and review discovered assets.
  5. Create and schedule reports for inventory, compliance, and changes.
  6. Integrate exports into CMDB or ITSM as needed.

Conclusion

DEKSI Network Inventory is a practical, agentless solution for organizations seeking centralized visibility into their hardware and software assets. Its strengths lie in straightforward discovery, compliance reporting, and ease of use for small-to-medium networks. Evaluate it alongside competitors, consider a pilot deployment to validate fit, and follow best practices for credentials and scanning schedules to maximize value.

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *