Führender Anbieter von Software-Lösungen für Wissenschaftler

KeyServer, IT Manager software

Netzwerk / Floating / konkurrierende Lizenzen sind definitiv die Lösung der Wahl, um ein Maximum an Benutzern mit einem Minimum an Investitionen auszustatten! Für eine optimale und regulatorische Nutzung müssen Ihre Lizenzen jedoch von einem Lizenzmanager verwaltet werden. Mit K2 - KeyServer / KeyAuditor ist die Kontrolle Ihrer Vermögenswerte ein Kinderspiel! KeyServer sorgt für die Einhaltung der gesetzlichen Bestimmungen für Ihre Lizenzen, verhindert Hacking und liefert detaillierte Berichte darüber, was Benutzer auf ihren Workstations tun.

  • 5
  • gute Gründe, dieses Produkt zu verwenden

  1. Verwaltet jede Art von Netzwerklizenz
  2. Steuert die Nutzungsrechte der Software
  3. Ermöglicht die detaillierte Überwachung der installierten Anlagen.
  4. Optimiert für Sicherheit und Leistung
  5. Überwachung der Nutzung von Software in Echtzeit (Öffnen / Schließen)

HOW DOES K2 - KEYSERVOR / KEYAUDITOR WORKS?

K2 - KeyServer / KeyAuditor is the ideal tool for managing your entire hardware and software assets. K2 allows you to audit your computer assets with purchase history while tracking actual usage and dynamic license management so you can maintain control over these licenses. Purchase information is collected for each software, to obtain an accurate and up-to-date vision in accordance with policy of management, installation and use of these licenses. K2 guarantees legal compliance of your licenses, prevents piracy, and provides detailed reports on the activities performed by users on workstations. No more licenses will be lost. You streamline your license management and control your software budget.

WHY CHOOSE K2 KEYSERVER & KEYAUDITOR?

KeyServer is an essential partner for managing your IT.

A REFERENCE SOFTWARE

K2 received the Codie Award for Best License Management Tool. It lets you easily manage your floating licenses so that a maximum number of people can have access to a software, while ensuring that the number of simultaneous users never exceeds that defined in the license agreement. When the limit is reached, the user's request is put on hold. K2 lets you control your IT assets in real time and ensures you the best return on investment for all the software on your site.

THE LICENSES MANAGEMENT FEATURE (KEYSERVER)

The KeyServer License Management feature lets you easily define a policy for managing your network / floating / competitor licenses and issue the usage permissions within the limit set by the license agreement. When the limit is reached, KeyServer puts the user's request on hold.

THE AUDIT FEATURE (KEYAUDITOR)

It lets you know at any time which software is installed on your machine asset, and to produce detailed reports, both of installed products, as well as of the usage that is made of them. The new version 7 of KeyServer integrates a purchase database which allows updated management of associated rights. You record the purchase of your licenses and updates and the end date of the rights. The KeyConfigure tool will create a report showing the amount of purchased rights valid for each product. You can thus reconcile your purchase data in accordance with your license management policy.

Did you know that Adobe has been promoting this solution for concurrent license management since 2007?

 

Interface KeyServer

 

 


Testversion

KeyServer 7.5 - Windows (443.01 MO)

KeyServer 7.5 - Mac (445.03 MO)

Page de téléchargement éditeur [EN]

Demande de version d'essai [EN]


Funktionen

Version 7.0 introduces many new features, including rights management based on purchase and license management, purchase and installed licenses reconciliation, and much more. All this is combined with built-in support for desktop, laptop, virtual computers and a considerable improvement in the reports provided.

K2 is an award-winning IT asset management software suite that integrates hardware and software audit information with purchasing history, usage tracking and active license management to give you an overview and better control of your assets. For each software, purchase data is collected to provide an overview of the status of your current rights which is then automatically reconciled with management policies, usage and installation audits.

K2 ensures license compliance, while allowing optimal allocation of licenses based on the specific needs of computers, designated users and departments within your organization. It not only reports what is installed on physical and virtual computers, but also tracks off-line usage connected to the LAN for detailed analysis and synthesis in many reports. K2 provides you with the data and automated management required to document and maintain compliance while making efficient use of IT resources and software budget.

 

Computer details

Audits at Company Level

K2 integrates company-wide software and critical hardware auditing with KeyServer "Policy" feature based on licensing management services. The KeyAuditor service automatically creates an audit information inventory for desktops, laptops and virtual PCs through a progressive and transparent self-discovery protocol.

Deployment and Usage Reports

An extensive customizable report library provides an integrated view of software and hardware compliance, software and licensing usage patterns across your entire software and hardware portfolio. K2 provides seamless management of desktops, laptops, and virtual machines running Windows, Macintosh, Linux, and Solaris operating systems.

The dedicated and integrated reporting server allows you to schedule the execution of periodic management reports. The reports are then searchable via any browser with free or authenticated access.

Flexible management of licensing policies

For each software, K2 lets you define a license policy that will track and control its use. These policies can be configured to automate license compliance for "per system" locked single licenses, site licenses, "floating" licenses and leased licenses.

Enterprise scalability

K2's unique architecture is based on a dedicated server process using its own highly optimized network protocol. By avoiding inefficiencies related to using a general-purpose database, the unique KeyServer K2 process is sized to handle tens of thousands of client computers.

Manage virtual and physical computers

K2 will enforce licensing compliance and usage tracking policies for virtualized environments and physical computers. The Administration and Reporting Console gives you a global view because licensing policies are administered transparently in both physical and virtual computing environments.

Purchase Tracking

The integration of purchasing management into the new version of K2 includes specific details on license fees. These details include license validity period, license linkage, update rights, dependencies, rights allocations in the update chain, support agreements, expiration dates, original purchase proofs, cost center reports, and much more. This new feature in K2 automatically reconciles with software management policies to provide a clear and dynamic view of the current licensing status of your organization against current licensing policies.

 

License details


Die neuen Funktionen

URL tracking

We have added the ability to track “usage” (i.e. access) of URLs. This usage can then be reported in the same way as traditional program usage - looking at where URLs are accessed, how often, and for how long. As it becomes more common for software to have purely web-based components, this unified view of usage is important.

Self-Updating Client

KeyServer can now be configured to tell clients to do Self-Updates. The Administrator has full control over this process - selecting which minor version to update to. Individual computers or divisions can be excluded from Self-Updates.

Map Availability based on Idle Sessions

Many customers have some labs where an anonymous account remains logged in all the time -- where students walk in, sit down, and start using that account without entering their own name and password. Historically we would have displayed these computers as never "available," because an account is always logged in (causing the computer to be listed as "unavailable"). In 7.5, however, we have added the ability to specify that availability should be based on whether a computer has been idle for a specified period of time (chosen by an administrator).

Purchase Records for Hardware

KeyServer has included a Purchase database since version 7.0, but it has been focussed almost entirely on Software. It has always been possible to record purchases of hardware, but until this release those purchases could not be tied to lists of computers. In 7.5 we have added a specific categorization of purchase for Hardware. This type of purchase then gets a computer list, as well as some fields that relate specifically to hardware, such as Warranty Date. With this data in place, a Depreciation Report can be run, and dashboards can use a new Residual Value widget.


Konfiguration

KeyAccess (client)

WindowsMICROSOFT WINDOWS

Operating system: Windows XP, Vista, 7, 8.x, 10, App-V, Server 2003, 2008 and 2012

Disk space: 4 MB (minimum)

"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

WindowsRDS

Remote Desktop Server = Can be configured to use a single copy of the KeyAccess client software for all client remote desktop connections.

Operating system2003, 2008, 2012, Citrix

Disk space: 4 MB (minimum) + 10 KB per client

"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

MacMACINTOSH

Operating systemOS X 10.6 (Snow Leopard) to 10.11 (El Capitan)

Disk space: 7 MB

"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

MacLINUX

Operating system: 2.2 kernel or more

Disk space: 3 MB

"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.


KeyConfigure (admin)

WindowsMICROSOFT WINDOWS

Operating system: Windows XP, Vista, 7, 8.x, 10, App-V, Server 2003, 2008 and 2012

Disk space: 51 MB

"Scratch space"1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

MacMACINTOSH

Operating system: OS X 10.6 (Snow Leopard) à 10.11 (El Capitan)

Disk space: 151 MB

"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.


KeyServer (server)

No database service is required. KeyServer uses UDB 19283 port for client connections and admin. KeyConfigure, KeyReporter and ksODBC use TCP on the same port. The KeyShadow process uses port 19315 and regularly pings KeyServer.

WindowsMICROSOFT WINDOWS

Operating system: Windows XP, Vista, 7, 8.x, 10, App-V, Server 2003, 2008 and 2012

Disk space: 20 MB + 4 GB (6-month data storage for 1,000 clients) - is an estimate of space required to store data. To avoid an infinite increase in data size, you can delete or archive old records (after a chosen period of 1 or 2 years for example). You can also configure a data export to another data server with "infinite" storage space.

"Scratch space" : 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

MacMACINTOSH

Operating system: OS X 10.6 (Snow Leopard) to 10.11 (El Capitan)

Disk space: 20 MB + 4 GB (6-month data storage for 1,000 clients) - is an estimate of space required to store data. To avoid an infinite increase in data size, you can delete or archive old records (after a chosen period of 1 or 2 years for example). You can also configure a data export to another data server with "infinite" storage space.

"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

MacLINUX

Operating system: 2.2 kernel or more

Disk space: 20 MB + 4 GB (6-month data storage for 1,000 clients) - is an estimate of space required to store data. To avoid an infinite increase in data size, you can delete or archive old records (after a chosen period of 1 or 2 years for example). You can also configure a data export to another data server with "infinite" storage space..

"Scratch space"100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.


KeyReporter (reporter)

KeyReporter is installed by default with KeyServer. However, it can be installed separately on another machine, but its functionality will be reduced. The default configuration uses TCP port 80, so unless you change it, it can not be installed on a computer hosting a web server.

WindowsMICROSOFT WINDOWS

Operating system: Windows XP, Vista, 7, 8.x, 10, App-V, Server 2003, 2008 and 2012

Disk space: 51 MB

"Scratch space"1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

MacMACINTOSH

Operating system: OS X 10.6 (Snow Leopard) to 10.11 (El Capitan)

Disk space: 101 MB

"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

MacLINUX

Operating system: 2.2 kernel or more

Disk space: 51 MB

"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

Auf Ihr Konto zugreifen

Bitte geben Sie Ihre Login-E-Mail und Ihr Passwort für die MYRITME-Plattform ein. Wenn dies Ihre erste Verbindung zu MYRITME ist, geben Sie bitte eine bereits bei Ritme verwendete E-Mail ein oder erstellen Sie ein Profil, indem Sie auf den Link klicken, um Ihr Profil zu erstellen.

Ich möchte mein Profil erstellen um von adaptierten Preisen zu profitieren

Passwort vergessen?

Passwort vergessen?

Um Ihr Passwort zu erhalten, geben Sie bitte Ihre Login-ID ein (die E-Mail-Adresse, mit der Sie Ihr Konto erstellt haben).

Ihr konto erstellen

Wenn Sie eine Einzelperson oder ein Student sind, greifen Sie direkt auf Ihren Online-Katalog zu, indem Sie Ihr Konto mit dieser Art von Profil erstellen.

* Land : * Sprache :

Prüfen Sie Ihr Profil









 
 
 
Ich akzeptiere von Ritme Groupe maximal alle 2 Wochen eine Newsletter zu erhalten. Diese Informationen betreffen die Aktualität und Ereignisse von Ritme (User meetings, thematische Termine etc.)
Die Produktinformations E-mail in Zusammenhang mit Software und Services, die Sie erworben haben, werden Ihnen standardmäßig zugeschickt. Sie können jederzeit via der Adresse dataprotection@ritme.com das Abonnement unterbrechen.