K2’s KeyAuditor/Keyserver software allows for cross-platform, unattended software license monitoring including auto-discovery of newly installed applications. Most variants of Windows, Macintosh and thin-client computers are supported. Pricing is dependent on the number of client computers to be managed, regardless of OS.
In addition to seeing what you have running on computers on your network, it also permits license sharing. That means if you have purchased a certain number of software licenses for certain programs, like Adobe Acrobat for instance, the Keyserver software can be configured to permit the legal number of simultaneous users for that software title. This can be a flexible way to legally permit more folks to use purchased software, in contexts where everyone is not using all the software programs simultaneously. If insufficient licenses are available this can lead to some frustration, but at least network administrators can have accurate metrics about the number of users and frequency of use for specific software programs that are not or cannot be site licensed. This can help inform purchasing decisions, training decisions, etc.
While K2 doesn’t appear to support actual client management like other programs like NetOctupus, it might be more cost effective for network administrators mainly interested in software license monitoring and auditing.
If you enjoyed this post and found it useful, subscribe to Wes’ free newsletter. Check out Wes’ video tutorial library, “Playing with Media.” Information about more ways to learn with Dr. Wesley Fryer are available on wesfryer.com/after.
On this day..
- Learn From Mike Wesch How to Create Better Videos for Students – 2020
- Clear Signs of Digitally Connected School Leaders – 2015
- Remove Disqus “Around the Web” Ad Images and Links from Your Blog – 2014
- Register to attend June and July 2011 Storychaser Workshops – 2011
- Web-based, Open Source Project Management Software Options – 2010
- BoxBe Courtesy Messages Discontinued – 2009
- An evening when DNS knowledge came in handy – 2009
- Military bloggers: Operational security risks or information warriors for transparency and truth? – 2009
- links for 2008-05-17 – 2008
- Web-based animation, video and storytelling options grow – 2008