Notice: quest.com will be retired soon. Please visit our new site at software.dell.com

Discover, identify, manage and track software

Discover, identify, manage and track software

Dell Asset Manager automates tracking and managing all of your software assets. This ensures license compliance, eliminates inefficiencies and wasted software, and streamlines the entire process of software asset management.

Recognize software intelligently

Successfully identify and categorize more than 90 percent of all software found without manual intervention. The software DNA database includes more than 500,000 software packages, including bundles, so that you can differentiate between editions of common software.

Manage licenses effectively

Import software license agreements and link them with the applications that are installed. Never miss renewals or true-ups with alerting on key contract dates. Ensure all product use rights are understood including upgrade and downgrade rights and second-use rights. Dell Asset Manager provides complete visibility into your licensing positions to ensure optimal use of licenses.

Buy only the software you need

Don’t buy more software when you already have an unused copy on your network. Passive metering can track when and how often software is used. Put unused software where it’s needed, and see what parts of a bundle are being used so you can adjust your licensing accordingly.

Enforce your license agreements automatically

If you have software that has concurrent licensing, you can use active metering to ensure you meet that license agreement. If, for instance, you license 100 copies of an application, active metering will prohibit the 101st copy from launching.

Track software in complex virtual environments

Track licenses in virtual environments as well as in physical desktops and servers.

Connectors are avaialble for:

  • VMWare ESX/ESXI and vCenter
  • Microsoft Hyper-V and App-V
  • Citrix XenApp and EdgeSight

Block unapproved applications

Report and alert on new applications that have been added to your network and prevent unwanted software from running. Maintain control over the applications that are installed in your environment to help eliminate the security risks and costs associated with maintaining unapproved applications.