Zenworks extends into IT asset management

Novell has completed the previously announced acquisition of Tally Systems and expanded its Novell Zenworks systems management...

Novell has completed the previously announced acquisition of Tally Systems and expanded its Novell Zenworks systems management software as a result.

Using technology from Tally, Novell is shipping Novell Zenworks Asset Management, a set of integrated tools with discovery and inventory, licence management, and software usage and trend analysis capabilities.

Using the software, organisations can track systems information and assets across the enterprise to control software spending, and ensure compliance with software licence agreements and government regulations, such as Sarbanes-Oxley.

Zenworks Asset Management includes tools to automatically discover, identify and report hardware and software assets in the enterprise. The software compliance component provides a comparison of inventory with purchase and licence records.

Software usage capabilities report trends and details that can prevent the overbuying of software licences and monitor the use of unauthorised applications.

Zenworks Asset Management discovers and reports on a full range of IT devices, including desktops, laptops, servers, routers, switches and hubs, and the software running on them.

Asset information can be securely accessed via web-based tools for better decision making.

"Non-compliance with software usage rights can be extremely costly and can also result in negative publicity for a company," said Gartner analyst Patricia Adams.

"Products that offer inventory, usage and software distribution enable customers to monitor usage trends that can track the use of unauthorised applications, and more accurately use software distribution to set and enforce corporate standards."

Novell Zenworks Asset Management costs £18 per user.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...