How Will Open-AudIT Help You?
Open-AudIT is an application to tell you exactly what is on your network, how it is configured and when it changes. Most organizations cannot give accurate location data of their assets, Open-AudIT gives you this information in seconds.
Open-AudIT intelligently scans an organization’s network and stores the configurations of the discovered devices. This gives you immediate access to software licensing, configuration changes, non-authorized devices, capacity utilization and hardware warranty status reports.
Open-AudIT can collect significant amounts of data from large and varying networks, that is catalogued and can easily be configured into meaningful reports.
“I’m loving the software! We’re seeing so many new devices we never had visibility towards” Jeff (Sysadmin).

Save Time and Money
Using Open-Audit automates your discovery, reporting and analysis in an easy, time and cost-effective way. Learn how we will help your business today!

Greater Control and Less Stress
Increase the control over your networked devices and manage the software that's used on them. Focus more time on your important projects today!

Discover every device
Easily run a discovery upon a network in a single click, without entering the details of that network each and every time.

Scheduled Reporting
Creating a schedule to automate repetitive tasks and have the results emailed directly will save time, frustration and money.

Configuration Baselines
A light-weight compliance system that compares software, users, and netstat data against your required standard.

Automated Configuration Change Detection
Track and report on configuration changes as well as software licensing, non-authorized devices, capacity utilization, server changes, and hardware warranty status.

Dashboard and Chart Visualization
No other IT auditing platform offers as detailed an inventory; grouping, collating, and translating data into easy to consume information.

Controlled Role Based Access
Open-AudIT's user roles have a set of permissions (Create, Read, Update, Delete) for each endpoint. Roles can also be used with LDAP (Active Directory and OpenLDAP) authorisation.