Deskcenter News

What makes a good license manager?

In many IT departments, the licensing of software and the documentation involved aren’t part of the normal order of business. Indeed, numerous companies fall at the first hurdle of nominating someone to be responsible for license management. However, a license manager is indispensable if you want to avoid the high costs associated with relicensing or overlicensing as well as the potential legal ramifications. But what exactly are the duties of a license manager and what are the personal qualities that make a great one?

IT manager checklist

ITAM & NETSEC. A marriage made in heaven?
(3 of 3)

Maybe not a marriage but rather a collaboration, two disciplines that are typically seen as siloed activities. Too often NETSEC is seen as the needed with ITAM relegated to “nice to have”. We see things differently. While ITAM tools are never going to replace security tools (nor should they), ITAM should be the enabler for [...]
IT Security at laptops

Discovery & Inventory Done – What Next?
(2 of 3)

You’ve got your discovery and inventory processes sorted, you are confident that you have complete visibility of your entire IT estate, so what next? Well, for some, this is enough and that’s OK, there is huge value to be had from having this up to date and accurate view of all your assets in a [...]
IT running

Discovery & Inventory – Where to start
(1 of 3)

It’s simple, without an accurate and up to date inventory of IT assets, everything else becomes that little bit more difficult, that little bit more incorrect and potentially that little bit more expensive. Having a clear, accurate and regularly updated register of both network connected devices and non-networked assets will give you an advantage in [...]
network management illustration

Inventory base for your IT

It is not uncommon for IT and management to be unaware of applications and devices until they are uncovered by a manufacturer’s audit or some vulnerability emerges. There are various reasons for this. For example, there are devices that are rarely logged into the network and therefore difficult to inventory, decommissioned systems that are still [...]
Inventory pencils

DeskCenter Solutions AG appointed Benedikt Gasch as CTO

DeskCenter Solutions AG has appointed Benedikt Gasch as its new Chief Technology Officer (CTO). The 39-year-old software asset management (SAM) and IT service management (ITSM) expert is now responsible for the product management and development of Leipzig’s software manufacturer, with the aim of developing a comprehensive DeskCenter Management Suite Unified Endpoint Management solution.

Netsafe and DeskCenter take common paths

A stable partner network is the basis of successful companies. This is why Swiss Netsafe AG and the international DeskCenter Solutions AG, headquartered in Leipzig, are pleased to announce their new partnership. In collaboration with DeskCenter Solutions, Netsafe AG will expand its portfolio with cloud services for both IT management and IT service management.

Holger Maul joins DeskCenter Solutions AG as COO

The Leipzig-based IT management solution provider is driving forward its internationalisation and strengthening its Channel and Professional Services divisions.

DeskCenter accompanies customers towards Unified Endpoint Management with its new IT Asset Management solution

DeskCenter Management Suite (DCMS) V.11, which has been redeveloped from scratch, offers freely definable assets, multi-client capability based on a single SQL database and a very comprehensive role and rights concept that takes the pressure off IT resources, ensures maximum agility and protects complex IT infrastructures.

Managing a hybrid IT infrastructure efficiently – Comprehensive UEM relieves IT

IT security ensures licenses are cost-effective and keeps the software up to date – a Unified Endpoint Management (UEM) solution is offered to manage different devices in your IT infrastructure. One condition: It must closely link all disciplines of IT management. The number and variety of mobile devices in an IT infrastructure is higher than [...]
IT Security Laptop