•  
Leader in soluzioni software per scienziati

KeyServer, software IT Manager

Le licenze di rete / floating / floating / concorrenti sono sicuramente la soluzione ideale per equipaggiare un massimo di utenti con un investimento minimo! Tuttavia, per un uso ottimale e regolamentare, le licenze devono essere gestite da un gestore di licenze. Con K2 - KeyServer / KeyAuditor, controllare i vostri beni è un gioco da ragazzi! KeyServer mantiene la conformità legale per le vostre licenze, previene l'hacking e fornisce report dettagliati su ciò che gli utenti stanno facendo sulle loro postazioni di lavoro.

  • 5
  • buone motivazioni per utilizzare questo prodotto

  1. Gestisce qualsiasi tipo di licenza di rete
  2. Controlla i diritti d'uso del software
  3. Permette di monitorare in dettaglio gli asset installati
  4. Ottimizzato per la sicurezza e le prestazioni
  5. Monitoraggio dell'utilizzo del software in tempo reale (apertura/chiusura)

HOW DOES K2 - KEYSERVOR / KEYAUDITOR WORKS?

K2 - KeyServer / KeyAuditor is the ideal tool for managing your entire hardware and software assets. K2 allows you to audit your computer assets with purchase history while tracking actual usage and dynamic license management so you can maintain control over these licenses. Purchase information is collected for each software, to obtain an accurate and up-to-date vision in accordance with policy of management, installation and use of these licenses. K2 guarantees legal compliance of your licenses, prevents piracy, and provides detailed reports on the activities performed by users on workstations. No more licenses will be lost. You streamline your license management and control your software budget.

WHY CHOOSE K2 KEYSERVER & KEYAUDITOR?

KeyServer is an essential partner for managing your IT.

A REFERENCE SOFTWARE

K2 received the Codie Award for Best License Management Tool. It lets you easily manage your floating licenses so that a maximum number of people can have access to a software, while ensuring that the number of simultaneous users never exceeds that defined in the license agreement. When the limit is reached, the user's request is put on hold. K2 lets you control your IT assets in real time and ensures you the best return on investment for all the software on your site.

THE LICENSES MANAGEMENT FEATURE (KEYSERVER)

The KeyServer License Management feature lets you easily define a policy for managing your network / floating / competitor licenses and issue the usage permissions within the limit set by the license agreement. When the limit is reached, KeyServer puts the user's request on hold.

THE AUDIT FEATURE (KEYAUDITOR)

It lets you know at any time which software is installed on your machine asset, and to produce detailed reports, both of installed products, as well as of the usage that is made of them. The new version 7 of KeyServer integrates a purchase database which allows updated management of associated rights. You record the purchase of your licenses and updates and the end date of the rights. The KeyConfigure tool will create a report showing the amount of purchased rights valid for each product. You can thus reconcile your purchase data in accordance with your license management policy.

Did you know that Adobe has been promoting this solution for concurrent license management since 2007?

 

Interface KeyServer

 

 


Versione di prova

KeyServer 7.5 - Windows (443.01 MO)

KeyServer 7.5 - Mac (445.03 MO)

Page de téléchargement éditeur [EN]

Demande de version d'essai [EN]


Funzioni

Version 7.0 introduces many new features, including rights management based on purchase and license management, purchase and installed licenses reconciliation, and much more. All this is combined with built-in support for desktop, laptop, virtual computers and a considerable improvement in the reports provided.

K2 is an award-winning IT asset management software suite that integrates hardware and software audit information with purchasing history, usage tracking and active license management to give you an overview and better control of your assets. For each software, purchase data is collected to provide an overview of the status of your current rights which is then automatically reconciled with management policies, usage and installation audits.

K2 ensures license compliance, while allowing optimal allocation of licenses based on the specific needs of computers, designated users and departments within your organization. It not only reports what is installed on physical and virtual computers, but also tracks off-line usage connected to the LAN for detailed analysis and synthesis in many reports. K2 provides you with the data and automated management required to document and maintain compliance while making efficient use of IT resources and software budget.

 

Computer details

Audits at Company Level

K2 integrates company-wide software and critical hardware auditing with KeyServer "Policy" feature based on licensing management services. The KeyAuditor service automatically creates an audit information inventory for desktops, laptops and virtual PCs through a progressive and transparent self-discovery protocol.

Deployment and Usage Reports

An extensive customizable report library provides an integrated view of software and hardware compliance, software and licensing usage patterns across your entire software and hardware portfolio. K2 provides seamless management of desktops, laptops, and virtual machines running Windows, Macintosh, Linux, and Solaris operating systems.

The dedicated and integrated reporting server allows you to schedule the execution of periodic management reports. The reports are then searchable via any browser with free or authenticated access.

Flexible management of licensing policies

For each software, K2 lets you define a license policy that will track and control its use. These policies can be configured to automate license compliance for "per system" locked single licenses, site licenses, "floating" licenses and leased licenses.

Enterprise scalability

K2's unique architecture is based on a dedicated server process using its own highly optimized network protocol. By avoiding inefficiencies related to using a general-purpose database, the unique KeyServer K2 process is sized to handle tens of thousands of client computers.

Manage virtual and physical computers

K2 will enforce licensing compliance and usage tracking policies for virtualized environments and physical computers. The Administration and Reporting Console gives you a global view because licensing policies are administered transparently in both physical and virtual computing environments.

Purchase Tracking

The integration of purchasing management into the new version of K2 includes specific details on license fees. These details include license validity period, license linkage, update rights, dependencies, rights allocations in the update chain, support agreements, expiration dates, original purchase proofs, cost center reports, and much more. This new feature in K2 automatically reconciles with software management policies to provide a clear and dynamic view of the current licensing status of your organization against current licensing policies.

 

License details


Le nuove caratteristiche

URL tracking

We have added the ability to track “usage” (i.e. access) of URLs. This usage can then be reported in the same way as traditional program usage - looking at where URLs are accessed, how often, and for how long. As it becomes more common for software to have purely web-based components, this unified view of usage is important.

Self-Updating Client

KeyServer can now be configured to tell clients to do Self-Updates. The Administrator has full control over this process - selecting which minor version to update to. Individual computers or divisions can be excluded from Self-Updates.

Map Availability based on Idle Sessions

Many customers have some labs where an anonymous account remains logged in all the time -- where students walk in, sit down, and start using that account without entering their own name and password. Historically we would have displayed these computers as never "available," because an account is always logged in (causing the computer to be listed as "unavailable"). In 7.5, however, we have added the ability to specify that availability should be based on whether a computer has been idle for a specified period of time (chosen by an administrator).

Purchase Records for Hardware

KeyServer has included a Purchase database since version 7.0, but it has been focussed almost entirely on Software. It has always been possible to record purchases of hardware, but until this release those purchases could not be tied to lists of computers. In 7.5 we have added a specific categorization of purchase for Hardware. This type of purchase then gets a computer list, as well as some fields that relate specifically to hardware, such as Warranty Date. With this data in place, a Depreciation Report can be run, and dashboards can use a new Residual Value widget.


Configurazione

KeyAccess (client)

WindowsMICROSOFT WINDOWS

Operating system: Windows XP, Vista, 7, 8.x, 10, App-V, Server 2003, 2008 and 2012

Disk space: 4 MB (minimum)

"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

WindowsRDS

Remote Desktop Server = Can be configured to use a single copy of the KeyAccess client software for all client remote desktop connections.

Operating system2003, 2008, 2012, Citrix

Disk space: 4 MB (minimum) + 10 KB per client

"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

MacMACINTOSH

Operating systemOS X 10.6 (Snow Leopard) to 10.11 (El Capitan)

Disk space: 7 MB

"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

MacLINUX

Operating system: 2.2 kernel or more

Disk space: 3 MB

"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.


KeyConfigure (admin)

WindowsMICROSOFT WINDOWS

Operating system: Windows XP, Vista, 7, 8.x, 10, App-V, Server 2003, 2008 and 2012

Disk space: 51 MB

"Scratch space"1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

MacMACINTOSH

Operating system: OS X 10.6 (Snow Leopard) à 10.11 (El Capitan)

Disk space: 151 MB

"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.


KeyServer (server)

No database service is required. KeyServer uses UDB 19283 port for client connections and admin. KeyConfigure, KeyReporter and ksODBC use TCP on the same port. The KeyShadow process uses port 19315 and regularly pings KeyServer.

WindowsMICROSOFT WINDOWS

Operating system: Windows XP, Vista, 7, 8.x, 10, App-V, Server 2003, 2008 and 2012

Disk space: 20 MB + 4 GB (6-month data storage for 1,000 clients) - is an estimate of space required to store data. To avoid an infinite increase in data size, you can delete or archive old records (after a chosen period of 1 or 2 years for example). You can also configure a data export to another data server with "infinite" storage space.

"Scratch space" : 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

MacMACINTOSH

Operating system: OS X 10.6 (Snow Leopard) to 10.11 (El Capitan)

Disk space: 20 MB + 4 GB (6-month data storage for 1,000 clients) - is an estimate of space required to store data. To avoid an infinite increase in data size, you can delete or archive old records (after a chosen period of 1 or 2 years for example). You can also configure a data export to another data server with "infinite" storage space.

"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

MacLINUX

Operating system: 2.2 kernel or more

Disk space: 20 MB + 4 GB (6-month data storage for 1,000 clients) - is an estimate of space required to store data. To avoid an infinite increase in data size, you can delete or archive old records (after a chosen period of 1 or 2 years for example). You can also configure a data export to another data server with "infinite" storage space..

"Scratch space"100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.


KeyReporter (reporter)

KeyReporter is installed by default with KeyServer. However, it can be installed separately on another machine, but its functionality will be reduced. The default configuration uses TCP port 80, so unless you change it, it can not be installed on a computer hosting a web server.

WindowsMICROSOFT WINDOWS

Operating system: Windows XP, Vista, 7, 8.x, 10, App-V, Server 2003, 2008 and 2012

Disk space: 51 MB

"Scratch space"1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

MacMACINTOSH

Operating system: OS X 10.6 (Snow Leopard) to 10.11 (El Capitan)

Disk space: 101 MB

"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

MacLINUX

Operating system: 2.2 kernel or more

Disk space: 51 MB

"Scratch space": 100 MB (minimum) - 1 GB or more may be required if a report containing all data of 10,000 items (for example) is to be edited.

Accedere al mio profilo

La preghiamo di entrare la sua mail e la sua password di connessione per la piattaforma MYRITME. Se è la prima volta, si prega di utilizzare un'indirizzo e-mail già usato con Ritme o di creare il suo account via il link per creare il suo profilo.

Voglio creare il mio profilo per beneficiare delle tariffe adatte

Password dimenticata ?

Password dimenticata ?

Per ricevere la sua password, si prega di inserire il suo username di connessione (l'indirizzo e-mail usato alla creazione del suo account).

Creare il mio profilo

Si può accedere direttamente al catalogo online creando il suo account con il profilo studente o privato.

* Paese : * Lingua :

Indicare il suo profilo









 
 
 
Accetto che il gruppo Ritme mi invii le sue newsletter, al massimo ogni due settimane. Queste comunicazioni riguardano le notizie e gli eventi di Ritme (user meeting, workshop tematici, etc.).
Le mail informative sui prodotti relativi ai software e ai servizi acquistati ti saranno inviate in modo automatico. È possibile richiedere il ritiro da questa database presso il nostro responsabile della protezione dei dati al seguente indirizzo : dataprotection@ritme.com