Netzwerk / Floating / konkurrierende Lizenzen sind definitiv die Lösung der Wahl, um ein Maximum an Benutzern mit einem Minimum an Investitionen auszustatten! Für eine optimale und regulatorische Nutzung müssen Ihre Lizenzen jedoch von einem Lizenzmanager verwaltet werden. Mit K2 - KeyServer / KeyAuditor ist die Kontrolle Ihrer Vermögenswerte ein Kinderspiel! KeyServer sorgt für die Einhaltung der gesetzlichen Bestimmungen für Ihre Lizenzen, verhindert Hacking und liefert detaillierte Berichte darüber, was Benutzer auf ihren Workstations tun.
K2 - KeyServer / KeyAuditor is the ideal tool for managing your entire hardware and software assets. K2 allows you to audit your computer assets with purchase history while tracking actual usage and dynamic license management so you can maintain control over these licenses. Purchase information is collected for each software, to obtain an accurate and up-to-date vision in accordance with policy of management, installation and use of these licenses. K2 guarantees legal compliance of your licenses, prevents piracy, and provides detailed reports on the activities performed by users on workstations. No more licenses will be lost. You streamline your license management and control your software budget.
KeyServer is an essential partner for managing your IT.
K2 received the Codie Award for Best License Management Tool. It lets you easily manage your floating licenses so that a maximum number of people can have access to a software, while ensuring that the number of simultaneous users never exceeds that defined in the license agreement. When the limit is reached, the user's request is put on hold. K2 lets you control your IT assets in real time and ensures you the best return on investment for all the software on your site.
The KeyServer License Management feature lets you easily define a policy for managing your network / floating / competitor licenses and issue the usage permissions within the limit set by the license agreement. When the limit is reached, KeyServer puts the user's request on hold.
It lets you know at any time which software is installed on your machine asset, and to produce detailed reports, both of installed products, as well as of the usage that is made of them. The new version 7 of KeyServer integrates a purchase database which allows updated management of associated rights. You record the purchase of your licenses and updates and the end date of the rights. The KeyConfigure tool will create a report showing the amount of purchased rights valid for each product. You can thus reconcile your purchase data in accordance with your license management policy.
KeyServer 7.4 - Windows (439.44 MO)
KeyServer 7.4 - Mac (441.66 MO)
KeyServer 7.5 - Windows (443.01 MO)
KeyServer 7.5 - Mac (445.03 MO)
Page de téléchargement éditeur [EN]
Demande de version d'essai [EN]
Page de téléchargement éditeur [EN]
Demande de version d'essai [EN]
Version 7.0 introduces many new features, including rights management based on purchase and license management, purchase and installed licenses reconciliation, and much more. All this is combined with built-in support for desktop, laptop, virtual computers and a considerable improvement in the reports provided.
K2 is an award-winning IT asset management software suite that integrates hardware and software audit information with purchasing history, usage tracking and active license management to give you an overview and better control of your assets. For each software, purchase data is collected to provide an overview of the status of your current rights which is then automatically reconciled with management policies, usage and installation audits.
K2 ensures license compliance, while allowing optimal allocation of licenses based on the specific needs of computers, designated users and departments within your organization. It not only reports what is installed on physical and virtual computers, but also tracks off-line usage connected to the LAN for detailed analysis and synthesis in many reports. K2 provides you with the data and automated management required to document and maintain compliance while making efficient use of IT resources and software budget.
K2 integrates company-wide software and critical hardware auditing with KeyServer "Policy" feature based on licensing management services. The KeyAuditor service automatically creates an audit information inventory for desktops, laptops and virtual PCs through a progressive and transparent self-discovery protocol.
An extensive customizable report library provides an integrated view of software and hardware compliance, software and licensing usage patterns across your entire software and hardware portfolio. K2 provides seamless management of desktops, laptops, and virtual machines running Windows, Macintosh, Linux, and Solaris operating systems.
The dedicated and integrated reporting server allows you to schedule the execution of periodic management reports. The reports are then searchable via any browser with free or authenticated access.
For each software, K2 lets you define a license policy that will track and control its use. These policies can be configured to automate license compliance for "per system" locked single licenses, site licenses, "floating" licenses and leased licenses.
K2's unique architecture is based on a dedicated server process using its own highly optimized network protocol. By avoiding inefficiencies related to using a general-purpose database, the unique KeyServer K2 process is sized to handle tens of thousands of client computers.
K2 will enforce licensing compliance and usage tracking policies for virtualized environments and physical computers. The Administration and Reporting Console gives you a global view because licensing policies are administered transparently in both physical and virtual computing environments.
The integration of purchasing management into the new version of K2 includes specific details on license fees. These details include license validity period, license linkage, update rights, dependencies, rights allocations in the update chain, support agreements, expiration dates, original purchase proofs, cost center reports, and much more. This new feature in K2 automatically reconciles with software management policies to provide a clear and dynamic view of the current licensing status of your organization against current licensing policies.
We have added the ability to track “usage” (i.e. access) of URLs. This usage can then be reported in the same way as traditional program usage - looking at where URLs are accessed, how often, and for how long. As it becomes more common for software to have purely web-based components, this unified view of usage is important.
KeyServer can now be configured to tell clients to do Self-Updates. The Administrator has full control over this process - selecting which minor version to update to. Individual computers or divisions can be excluded from Self-Updates.
Many customers have some labs where an anonymous account remains logged in all the time -- where students walk in, sit down, and start using that account without entering their own name and password. Historically we would have displayed these computers as never "available," because an account is always logged in (causing the computer to be listed as "unavailable"). In 7.5, however, we have added the ability to specify that availability should be based on whether a computer has been idle for a specified period of time (chosen by an administrator).
KeyServer has included a Purchase database since version 7.0, but it has been focussed almost entirely on Software. It has always been possible to record purchases of hardware, but until this release those purchases could not be tied to lists of computers. In 7.5 we have added a specific categorization of purchase for Hardware. This type of purchase then gets a computer list, as well as some fields that relate specifically to hardware, such as Warranty Date. With this data in place, a Depreciation Report can be run, and dashboards can use a new Residual Value widget.
Operating system: Windows XP, Vista, 7, 8.x, 10, App-V, Server 2003, 2008 and 2012
Disk space: 4 MB (minimum)
"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.
Remote Desktop Server = Can be configured to use a single copy of the KeyAccess client software for all client remote desktop connections.
Operating system: 2003, 2008, 2012, Citrix
Disk space: 4 MB (minimum) + 10 KB per client
"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.
Operating system: OS X 10.6 (Snow Leopard) to 10.11 (El Capitan)
Disk space: 7 MB
"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.
Operating system: 2.2 kernel or more
Disk space: 3 MB
"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.
Operating system: Windows XP, Vista, 7, 8.x, 10, App-V, Server 2003, 2008 and 2012
Disk space: 51 MB
"Scratch space": 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.
Operating system: OS X 10.6 (Snow Leopard) à 10.11 (El Capitan)
Disk space: 151 MB
"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.
No database service is required. KeyServer uses UDB 19283 port for client connections and admin. KeyConfigure, KeyReporter and ksODBC use TCP on the same port. The KeyShadow process uses port 19315 and regularly pings KeyServer.
Operating system: Windows XP, Vista, 7, 8.x, 10, App-V, Server 2003, 2008 and 2012
Disk space: 20 MB + 4 GB (6-month data storage for 1,000 clients) - is an estimate of space required to store data. To avoid an infinite increase in data size, you can delete or archive old records (after a chosen period of 1 or 2 years for example). You can also configure a data export to another data server with "infinite" storage space.
"Scratch space" : 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.
Operating system: OS X 10.6 (Snow Leopard) to 10.11 (El Capitan)
Disk space: 20 MB + 4 GB (6-month data storage for 1,000 clients) - is an estimate of space required to store data. To avoid an infinite increase in data size, you can delete or archive old records (after a chosen period of 1 or 2 years for example). You can also configure a data export to another data server with "infinite" storage space.
"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.
Operating system: 2.2 kernel or more
Disk space: 20 MB + 4 GB (6-month data storage for 1,000 clients) - is an estimate of space required to store data. To avoid an infinite increase in data size, you can delete or archive old records (after a chosen period of 1 or 2 years for example). You can also configure a data export to another data server with "infinite" storage space..
"Scratch space" : 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.
KeyReporter is installed by default with KeyServer. However, it can be installed separately on another machine, but its functionality will be reduced. The default configuration uses TCP port 80, so unless you change it, it can not be installed on a computer hosting a web server.
Operating system: Windows XP, Vista, 7, 8.x, 10, App-V, Server 2003, 2008 and 2012
Disk space: 51 MB
"Scratch space": 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.
Operating system: OS X 10.6 (Snow Leopard) to 10.11 (El Capitan)
Disk space: 101 MB
"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.
Operating system: 2.2 kernel or more
Disk space: 51 MB
"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.