Asset Management in NetEye: Management of smartphones, tablets and SIM cards
[box] IT Asset Management (ITAM) entails collecting inventory, financial and contractual data to manage the IT asset throughout its life cycle. ITAM depends on robust processes, with tools to automate manual processes. Capturing and integrating autodiscovery/inventory, financial and contractual data in a central repository for all IT assets enables the functions to effectively manage vendors and a software and hardware asset portfolio from requisition through retirement, thus monitoring the asset’s performance throughout its life cycle.
Nowadays, reducing costs, increasing service levels and improving visibility of financial and operational decisions, has become a MUST for most IT departments.
Therefore, it is strategically important to be equipped with tools to manage the contracts related to hardware in use, software and licenses.
The aim is, being able to efficiently negotiate with suppliers, to define a targeted acquisitions strategy, to perform all updates in time, to monitor the expiration of contracts and software licenses, as well as hardware maintenance.
Asset Management in NetEye
Thanks to the integration of GLPI and OCS Inventory, NetEye provides the Inventory and Asset Management module, with which you are able to achieve the above-mentioned goals and to optimize operating costs.
The Asset Management module allows you to manage all technical resources such as computers, software, printers and peripherals, and to connect them to the related contracts, suppliers and users.
Since it became common to provide smartphones, tablets, internet sticks (and SIM cards) to its employees, most IT departments need to manage these (quickly changing) information.
With the NetEye Asset Management, it is possible to efficiently handle the following information:
Inventory of mobile devices and contracts are natively handled in great detail
Inventory of the SIM cards is available with a plug-in of GLPI version 0.83
Goals
The objectives that can be achieved are:
Comprehensive Management of the mobile devices (with extensive notes and attachment of documents)
Complete inventory management of SIM cards
Connection of mobile devices with the relative SIM card and user
Connection of mobile devices with the relative SIM card and supplier-contract
History of the usage of devices, cards and contracts
Integration with the EriZone CMDB to show the user’s assets to the Service Desk employees and to allow the connection between ticket and asset
In addition, the asset type “SIM card” can be connected to the asset type “computer” and “device”.
By using the plugin “File Injection”, you can upload huge amounts of data regarding SIM cards, mobile devices and contracts.
Screenshots
Inventory mobile devices
Details of a smartphone that is connected to two SIM cards
Inventory SIM cards
SIM card associated to a user (with dual SIM smartphone)
SIM 1
SIM 2
SIM card associated to a computer
SIM card associated to a contract
SIM card History
Elements of a contract
Elements of a user
Integration with the EriZone CMDB: visibility the assets “SIM card” and “Phone” of a user
Hi everybody. I’m Giuseppe and I was born in Milan in 1979. Since the early years of university, I was attracted by the Open Source world and operating system GNU\Linux. After graduation I had the opportunity to participate in a project of a startup for the realization of an Internet Service Provider. Before joining Würth Phoenix (now Würth IT Italy) as SI consultant, I gained great experience as an IT consultant on projects related to business continuity and implementation of open source software compliant to ITIL processes of incident, change and service catalog management. My free time is completely dedicated to my wife and, as soon as possible, run away from Milan and his caotic time and trekking discover our beautiful mountain near Lecco for relax and lookup the (clean) sky.
Author
Giuseppe Di Garbo
Hi everybody. I’m Giuseppe and I was born in Milan in 1979. Since the early years of university, I was attracted by the Open Source world and operating system GNU\Linux. After graduation I had the opportunity to participate in a project of a startup for the realization of an Internet Service Provider. Before joining Würth Phoenix (now Würth IT Italy) as SI consultant, I gained great experience as an IT consultant on projects related to business continuity and implementation of open source software compliant to ITIL processes of incident, change and service catalog management. My free time is completely dedicated to my wife and, as soon as possible, run away from Milan and his caotic time and trekking discover our beautiful mountain near Lecco for relax and lookup the (clean) sky.
Running Ollama locally or on dedicated hardware is straightforward until you need to know whether a model is actually loaded in RAM, how fast it generates tokens under load, or when memory consumption reaches a threshold that affects other workloads. Read More
TL;DR: In GLPI, access permissions for assets have traditionally been tied mainly to entities. That works well in clean structures, but in reality, responsibility, ownership, and organizational hierarchy do not always follow the same lines. With GLPI 11, group-based permissions Read More
Hi everyone! Today I'd like to share with you an investigation we undertook related to ingesting Open Telemetry data in Elasticsearch, while maintaining tenant segregation from start to end. The Scenario Let's imagine we have multiple customers, where in this Read More
SNMP monitoring is the standard method for obtaining information and metrics from network devices. Typically, we focus on extracting data from a single interface to monitor its status, traffic, or errors. But in many cases, we’re only interested in getting Read More
In the ITOA module we fixed a bug that prevented the Performance Graphs to be shown in the Monitoring host and service page. List of updated packages grafana, grafana-autosetup, grafana-configurator and grafana-neteye-config to version 12.4.1_neteye3.29.2-1