Cornhill scans assets with IT audit software

Insurer Allianz Cornhill has slashed the time it takes to complete an audit of its software and hardware assets by using software...

Insurer Allianz Cornhill has slashed the time it takes to complete an audit of its software and hardware assets by using software to automate the process.

It used to take the general insurer three weeks to compile an inventory of all the hardware and software assets used by 5,500 end-users across 30 sites. Now the process can be done in a weekend, saving staff time and money.

Allianz Cornhill used TS Census from Tally Systems to speed-up its asset management audit. The software scans the network, compiles an inventory of hardware and software and matches the products to licences.

Previously, IT staff at Allianz Cornhill had to visit each site to keep track of hardware and software assets. A record of licences was kept on paper.

"Using TS Census the results are accurate and the reports are easy to generate. It also integrates well with Peregrine Assetcenter, our asset management system," said Steve Boomer, an IT analyst at Allianz Cornhill.

Other benefits include being able to automate assessments for PC memory upgrade requests from users and support for a roll-out of Windows XP.

Allianz Cornhill will also use the TS Census software to track software usage within the company to help with licence negotiations.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close