two laptop keyboards
Use Case

Discover and Inventory What's on Your Network

Effortlessly identify and inventory every device, application, and asset connected to your network for complete visibility and better control.

Consolidated asset intelligence

Discover and inventory assets in real time, including vulnerabilities and software licence status across your network. Instantly access accurate, actionable information for all hardware, software, cloud, edge environments, and overlying applications, with built-in software licence management—no extra tools or modules required.

Asset discovery you can depend on

Gain real-time asset visibility and vulnerability intelligence using active and passive scanning, network exploration, and 3rd party connectors. Feed normalised hardware/software inventory, usage, exposures, and compliance data directly to your CMDB and AMDB for informed business decisions.

Always on, passive and active discovery

Detect managed or unmanaged devices and uncover vulnerabilities the moment they appear. Find all network-connected devices in real time, even those behind a firewall, while simultaneously surfacing risk exposures and compliance gaps.

In-depth inventory service

Perform deep interrogation of IP-connected devices to catalogue network connection details, hardware specs, manufacturer, running software, licence status, and vulnerability posture. Managed devices provide software-usage and licence data automatically, helping you control spend and ensure compliance without manual effort or add-ons.

Discover and inventory anywhere

The Cloud Services Appliance enables secure, remote inventory and vulnerability management for any device connecting via the Internet. Inventory and manage assets and exposures across the cloud without the need for an expensive VPN connection.

Data reconciliation and normalisation

Clean up the data you see and reduce the number of names used to describe the same thing. Automatically convert all your IT assets and inventory data to standardised names, mapping structures, and classifications for clarity and consistency. Vulnerability information is aggregated and presented for clear risk visibility, helping you prioritise action.

Data connectors

Gather data from multiple sources that wouldn't come through a network security scan. Connectors can include B2B data like hardware warranty information, vendor licencing rules, or purchasing information from resellers. Connectors can also interconnect your IT inventory database to other data such as a CMDB for service management.

Data visualisation and dashboards

Visualise all gathered data along with data from other business databases. Create business-value dashboards or simply view trends, anomalies, or live data in visual reports.

Features and capabilities

Know what's on your network at all times

No more tracking spreadsheets and no more ghost assets. Ivanti provides you with a single source of truth in minutes not days, for accurate and actionable insights. Always know when new or unknown devices join your network.

Always on

Discover devices and application linkages quickly in real-time on any network segment.

Find all software assets

Benefit from a comprehensive list of all software with extensive usage information.

Track software licences automatically

Effortlessly monitor software licences, contracts, and compliance. Optimise renewals and stay audit ready. No extra tools are required.

Centralised vulnerability and exposure insights

Aggregate vulnerability findings and risk data from multiple sources. Instantly identify exposures and prioritise remediation for stronger security.

Inventory internet-attached devices

Inventory systems and devices in remote locations as they connect via the Internet. No VPN required.

Visualise asset relationships and generate reports

Explore inventoried data with interactive visualisations that reveal connections between devices, software, applications, and users. Create customised reports to easily identify trends, inform decisions, and gain a holistic view of your asset environment.

Comprehensive asset and network discovery

Continuously scan every segment and automatically detect new devices and rogue wireless access points on each subnet to keep your environment secure.

Make sense of the data

Get data from multiple 3rd party or other sources. Harmonise info through reconciliation and normalisation so it all makes sense.​

Related products

Better manage, support and protect your asset investments

IT Asset Discovery and inventory capabilities are foundational to effective Service Mapping, Asset, Service and Security Management.

Know what's on your network