Skip to main content

IT Asset Management and Endpoint Management

IT asset management (ITAM) and endpoint management tools track hardware inventory, manage device lifecycles, enforce configurations, and maintain visibility across organisational fleets. ITAM focuses on the administrative record: what devices exist, who owns them, when warranties expire, and how assets depreciate. Endpoint management extends to active control: deploying software, enforcing security policies, and remediating configuration drift on managed devices.

This page covers tools that provide asset tracking, device inventory, and endpoint configuration management. Tools focused exclusively on security monitoring appear in Security and Monitoring. Mobile device management (MDM) capabilities are included where tools provide cross-platform management, but dedicated MDM-only solutions for iOS or Android are not covered here.

Assessment methodology

Tool assessments derive from official vendor documentation, published API references, release notes, and technical specifications as of 2026-01-24. Feature availability varies by product tier, deployment model, or region. Verify current capabilities directly with vendors during procurement. Community-reported information is excluded; only documented features are assessed.

Requirements taxonomy

This taxonomy defines evaluation criteria for asset and endpoint management tools. Requirements are organised by functional area and weighted by typical priority for mission-driven organisations.

Functional requirements

Asset tracking and inventory

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
F1.1Hardware asset registrationCreate and maintain records for physical devices including computers, peripherals, network equipment, and mobile devicesFull: supports all common asset types with extensible categories. Partial: limited to predefined types. None: manual tracking only.Review asset type configuration; test custom type creationEssential
F1.2Unique asset identificationAssign and track unique identifiers (asset tags, serial numbers, UUIDs) for each deviceFull: multiple identifier types, barcode/QR support, automatic UUID capture. Partial: single identifier type. None: manual entry only.Test asset creation workflow; verify identifier validationEssential
F1.3Asset assignment trackingRecord which user, department, or location has custody of each assetFull: assignment history, transfer workflows, custody chain. Partial: current assignment only. None: no assignment tracking.Review assignment features; test transfer workflowEssential
F1.4Component trackingTrack internal components (RAM, storage, network cards) as sub-assets of parent devicesFull: component inventory with parent-child relationships, component history. Partial: notes field only. None: no component tracking.Create asset with components; verify relationship trackingImportant
F1.5Consumable trackingTrack consumable items (cables, adapters, peripherals) with quantity managementFull: quantity tracking, low-stock alerts, checkout workflow. Partial: basic quantity only. None: no consumable support.Test consumable creation and checkoutImportant
F1.6Software licence trackingRecord software licences, seats, and assignments to devices or usersFull: licence compliance reporting, seat counting, expiry alerts. Partial: basic licence records. None: no licence tracking.Create licences; test seat assignment and complianceImportant
F1.7Warranty and contract trackingStore warranty information, support contracts, and renewal dates with alertingFull: multiple contracts per asset, renewal workflows, vendor integration. Partial: single warranty field. None: no warranty tracking.Configure warranty; test expiry alertsImportant
F1.8Depreciation calculationCalculate asset depreciation using configurable methods (straight-line, declining balance)Full: multiple depreciation methods, scheduled calculation, reporting. Partial: single method. None: no depreciation support.Configure depreciation; verify calculationsDesirable

Automated discovery and inventory

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
F2.1Agent-based inventoryDeploy agents to endpoints that report hardware and software inventory automaticallyFull: cross-platform agents, scheduled reporting, delta updates. Partial: single platform. None: no agent support.Deploy agent; verify inventory collectionEssential
F2.2Agentless discoveryDiscover devices via network scanning (SNMP, WMI, SSH) without requiring agent installationFull: multiple protocols, scheduled scans, subnet targeting. Partial: single protocol. None: agent-only.Configure network scan; verify discoveryImportant
F2.3Hardware specification collectionAutomatically capture detailed hardware specifications (CPU, RAM, storage, peripherals)Full: comprehensive specs including component serial numbers. Partial: basic specs only. None: manual entry.Review collected specifications; compare to actual hardwareEssential
F2.4Software inventoryAutomatically enumerate installed software with version informationFull: all installed software, version tracking, change detection. Partial: limited software types. None: no software inventory.Verify software list accuracy; test change detectionEssential
F2.5Operating system detectionIdentify operating system type, version, and patch levelFull: detailed OS info including build numbers, patch status. Partial: OS name only. None: no OS detection.Verify OS information accuracyEssential
F2.6Network interface discoveryCapture network interface details (MAC addresses, IP addresses, connection status)Full: all interfaces, IPv4/IPv6, connection history. Partial: primary interface only. None: no network info.Verify interface enumerationImportant
F2.7Peripheral detectionDiscover connected peripherals (monitors, printers, external storage)Full: enumeration with serial numbers, connection events. Partial: basic peripheral list. None: no peripheral detection.Connect peripheral; verify discoveryDesirable

Endpoint configuration management

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
F3.1Configuration policy deploymentDefine and deploy configuration settings to managed endpointsFull: granular policies, targeting rules, rollback capability. Partial: basic settings only. None: no configuration management.Create policy; deploy to test device; verify applicationEssential
F3.2Software deploymentInstall, update, and remove software applications on managed endpointsFull: silent install, dependency handling, staged rollout. Partial: basic install only. None: manual installation.Deploy application; verify installation successEssential
F3.3Patch managementDetect missing patches and deploy updates to managed endpointsFull: patch detection, approval workflow, compliance reporting. Partial: detection only. None: no patch management.Identify missing patches; deploy update; verify installationEssential
F3.4Script executionExecute custom scripts on managed endpoints for automation and remediationFull: cross-platform scripts, scheduling, output capture. Partial: single platform. None: no script execution.Execute test script; verify output captureImportant
F3.5Compliance monitoringAssess endpoint compliance against defined baselines and report deviationsFull: baseline comparison, drift detection, remediation triggers. Partial: basic compliance checks. None: no compliance monitoring.Configure baseline; detect deviation; verify reportingImportant
F3.6Remote actionsExecute remote commands (restart, lock, wipe) on managed endpointsFull: secure remote actions, audit logging, confirmation workflow. Partial: limited actions. None: no remote control.Execute remote restart; verify audit logImportant
F3.7Self-service portalProvide end users interface to request software, report issues, or manage their devicesFull: configurable catalogue, approval workflow, status tracking. Partial: basic portal. None: no self-service.Test user portal; verify request workflowDesirable

Reporting and analytics

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
F4.1Asset reportsGenerate reports on asset inventory, assignments, and statusFull: customisable reports, scheduling, multiple formats. Partial: fixed reports. None: manual export only.Generate inventory report; verify accuracyEssential
F4.2Compliance reportingReport on endpoint compliance status against defined policiesFull: compliance dashboards, trend analysis, drill-down. Partial: basic status report. None: no compliance reporting.Generate compliance report; verify accuracyImportant
F4.3Audit trailMaintain complete history of changes to assets and configurationsFull: all changes logged with user, timestamp, before/after values. Partial: limited history. None: no audit trail.Make changes; verify audit log entriesEssential
F4.4Dashboard visualisationProvide visual dashboards showing asset and endpoint statusFull: customisable widgets, real-time data, drill-down. Partial: fixed dashboards. None: no visualisation.Review dashboard capabilities; test customisationImportant
F4.5Scheduled reportingAutomatically generate and distribute reports on scheduleFull: flexible scheduling, multiple recipients, multiple formats. Partial: basic scheduling. None: manual generation only.Configure scheduled report; verify deliveryDesirable
F4.6Export capabilitiesExport data in standard formats for external analysisFull: CSV, JSON, XML export, bulk export, API access. Partial: limited formats. None: no export.Export data; verify format and completenessImportant

Technical requirements

Deployment and hosting

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
T1.1Self-hosted deploymentDeploy on organisation-controlled infrastructureFull: complete feature parity, documented deployment. Partial: available with limitations. None: SaaS only.Review deployment documentation; compare feature matrixImportant
T1.2Cloud deploymentVendor-managed cloud deployment with regional optionsFull: multiple regions including EU, documented data residency. Partial: limited regions. None: self-hosted only.Review regional availability; verify data residencyImportant
T1.3Container deploymentSupport for containerised deployment (Docker, Kubernetes)Full: official images, Helm charts, documented orchestration. Partial: community images only. None: no container support.Check container registry; review deployment docsDesirable
T1.4Database requirementsSupported database backends and versionsDocument supported databases, versions, and configuration requirementsReview system requirements documentationImportant
T1.5Scalability architectureSupport for horizontal scaling and high availabilityFull: documented HA architecture, load balancing. Partial: manual failover. None: single instance only.Review architecture documentationContext-dependent

Integration architecture

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
T2.1REST APIProgrammatic access via REST APIFull: comprehensive API, versioned, documented, all features accessible. Partial: limited coverage. None: no API.Review API documentation; test key endpointsEssential
T2.2API authenticationSupported methods for securing API accessDocument supported methods: API keys, OAuth 2.0, tokens, certificatesReview API security documentationImportant
T2.3Webhook supportPush event notifications to external systemsFull: configurable webhooks, retry logic, payload customisation. Partial: limited events. None: no webhooks.Configure webhook; verify event deliveryImportant
T2.4LDAP/Active Directory integrationSynchronise users and groups from directory servicesFull: user sync, group mapping, nested groups. Partial: basic sync. None: no directory integration.Configure directory sync; verify user importEssential
T2.5SAML/OIDC SSOSingle sign-on via federated identityFull: SAML 2.0 and OIDC support. Partial: single protocol. None: local auth only.Configure SSO; test authentication flowImportant
T2.6SIEM integrationExport events to security information and event management systemsFull: syslog, webhook, native integrations. Partial: log file export. None: no SIEM integration.Configure SIEM export; verify event receiptImportant

Security requirements

Authentication and access control

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
S1.1Role-based access controlGranular permissions based on rolesFull: custom roles, granular permissions, inheritance. Partial: fixed roles. None: admin/user only.Create custom role; verify permission enforcementEssential
S1.2Multi-factor authenticationMFA support for administrator and user accountsFull: multiple MFA methods, policy enforcement. Partial: single method. None: password only.Configure MFA; verify enforcementEssential
S1.3API access controlsRestrict API access by scope, IP, or rateFull: scoped tokens, IP allowlist, rate limiting. Partial: basic rate limiting. None: no API controls.Configure API restrictions; test enforcementImportant
S1.4Session managementConfigurable session timeout and concurrent session limitsFull: configurable timeout, session termination, activity tracking. Partial: fixed timeout. None: no session controls.Configure session policy; verify enforcementImportant

Data protection

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
S2.1Encryption at restEncrypt stored dataFull: AES-256, key management, documented implementation. Partial: database encryption only. None: no encryption.Review encryption documentation; verify configurationEssential
S2.2Encryption in transitSecure communications with TLSFull: TLS 1.2+ enforced, certificate management. Partial: optional TLS. None: unencrypted.Verify TLS configuration; check certificate handlingEssential
S2.3Data export controlsControl ability to export sensitive dataFull: permission-based export, audit logging. Partial: admin-only export. None: unrestricted export.Test export permissions; verify audit loggingImportant
S2.4Credential storageSecure storage for service credentials and secretsFull: encrypted vault, no plaintext storage. Partial: encrypted database. None: plaintext storage.Review credential storage mechanismEssential

Operational requirements

Administration

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
O1.1Web-based administrationBrowser-based management interfaceFull: responsive design, full feature access. Partial: limited mobile support. None: desktop client required.Access via browser; test responsivenessEssential
O1.2Bulk operationsPerform actions on multiple assets or endpoints simultaneouslyFull: bulk edit, import, delete, assign. Partial: limited bulk operations. None: individual only.Perform bulk operation; verify resultsImportant
O1.3Import capabilitiesImport existing asset data from external sourcesFull: CSV, Excel, API import with mapping. Partial: fixed format only. None: manual entry.Import test data; verify mapping and validationImportant
O1.4Custom fieldsAdd organisation-specific data fields to recordsFull: custom fields on all objects, field types, validation. Partial: limited objects. None: no custom fields.Create custom field; verify data entry and reportingImportant
O1.5Multi-tenancySupport multiple organisations or entities in single installationFull: entity separation, delegated administration. Partial: basic separation. None: single tenant only.Configure multiple entities; verify separationContext-dependent

Monitoring and maintenance

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
O2.1System health monitoringMonitor server and service healthFull: health endpoints, resource monitoring, alerting. Partial: basic status page. None: no monitoring.Review health monitoring capabilitiesImportant
O2.2Backup and restoreBuilt-in or documented backup proceduresFull: automated backup, point-in-time restore, documented procedures. Partial: manual backup. None: undocumented.Review backup documentation; test restoreEssential
O2.3Upgrade proceduresDocumented upgrade path between versionsFull: automated upgrade, rollback capability, migration guides. Partial: manual upgrade. None: undocumented.Review upgrade documentationImportant
O2.4Log managementCentralised logging with retention controlsFull: structured logs, configurable retention, external export. Partial: local logs. None: minimal logging.Review logging configurationImportant

Comparison matrices

Rating scale

SymbolMeaning
Full support: feature fully implemented as documented
Partial support: feature available with limitations noted
Minimal support: basic capability only
Not supported
$Requires paid tier or add-on
EEnterprise edition only
PPlugin or extension required

Tool overview

ToolTypeLicenceCurrent versionPrimary focus
Snipe-ITFOSSAGPL-3.07.xIT asset inventory and lifecycle tracking
GLPIFOSSGPL-3.011.0Asset management with ITSM service desk
FleetFOSSMIT (core)4.xEndpoint visibility via osquery with MDM
Foreman + KatelloFOSSGPL-2.03.16 / 4.18Server provisioning and content management
Microsoft IntuneCommercialProprietarySaaSUnified endpoint management for Microsoft ecosystem
Jamf ProCommercialProprietary11.22Apple device management and security

Asset tracking capabilities

CapabilitySnipe-ITGLPIFleetForemanIntuneJamf Pro
Hardware asset registration
Unique asset identification
Asset assignment tracking
Component tracking
Consumable tracking
Software licence tracking●$●$
Warranty tracking
Depreciation calculation
Barcode/QR scanning●P
Location tracking

Assessment notes:

  • Snipe-IT and GLPI provide the most comprehensive traditional ITAM features including depreciation, warranties, and consumables
  • Fleet focuses on endpoint visibility rather than administrative asset tracking
  • Foreman focuses on server provisioning; asset tracking is secondary to configuration management
  • Commercial tools (Intune, Jamf Pro) emphasise device management over financial asset tracking

Automated inventory capabilities

CapabilitySnipe-ITGLPIFleetForemanIntuneJamf Pro
Agent-based inventory
Agentless discovery
Hardware specification collection
Software inventory
Operating system detection
Network interface discovery
Real-time inventory
Windows supportN/A
macOS supportN/A
Linux supportN/A
iOS/iPadOS supportN/A
Android supportN/A

Assessment notes:

  • Snipe-IT is a pure ITAM tool without agent or discovery capabilities; inventory is manual or via API integration
  • GLPI provides the GLPI Agent for automated inventory across platforms
  • Fleet uses osquery for deep endpoint visibility with real-time query capability
  • Foreman uses Puppet or Ansible for configuration; inventory is a byproduct
  • Intune provides comprehensive inventory for Windows and mobile; Linux support is limited
  • Jamf Pro focuses exclusively on Apple platforms

Endpoint management capabilities

CapabilitySnipe-ITGLPIFleetForemanIntuneJamf Pro
Configuration policy deployment○P
Software deployment●P
Patch management○P
Script execution○P
Compliance monitoring○P
Remote wipe
Remote lock
Self-service portal●P
Zero-touch deployment
MDM capabilities

Assessment notes:

  • Snipe-IT does not provide endpoint management; it is purely asset tracking
  • GLPI requires plugins for most endpoint management features
  • Fleet provides MDM for Apple and configuration management via osquery for all platforms
  • Foreman excels at server provisioning and configuration management
  • Intune and Jamf Pro provide full MDM and endpoint management capabilities

Integration capabilities

CapabilitySnipe-ITGLPIFleetForemanIntuneJamf Pro
REST API
GraphQL API
Webhooks●$
LDAP/AD sync
SAML SSO
OIDC SSO
SCIM provisioning
SIEM integration
ServiceNow integration●P
Jira integration●P●P●$

Assessment notes:

  • All tools provide REST APIs with varying coverage
  • Microsoft Intune uses Microsoft Graph API with GraphQL capabilities
  • Fleet provides extensive osquery-based integrations with SIEM and security tools
  • GLPI relies heavily on plugins for third-party integrations

Security capabilities

CapabilitySnipe-ITGLPIFleetForemanIntuneJamf Pro
Role-based access control
Multi-factor authentication
SSO enforcement
API token scoping
Audit logging
Encryption at rest
SOC 2 certification●$
ISO 27001 certification●$
GDPR compliance tools

Assessment notes:

  • Commercial tools (Intune, Jamf Pro) have extensive compliance certifications
  • Snipe-IT hosted version provides SOC 2 compliance
  • Self-hosted FOSS tools require organisations to implement their own compliance controls

Individual tool assessments

Snipe-IT

Metadata

AttributeValue
TypeOpen source
LicenceAGPL-3.0
Current version7.x (Laravel 11)
Deployment optionsSelf-hosted, vendor-hosted cloud
Source repositoryhttps://github.com/grokability/snipe-it
Documentationhttps://snipe-it.readme.io/docs

Overview

Snipe-IT is a web-based IT asset management system built on Laravel (PHP framework). The project has been actively developed since 2013 and provides comprehensive asset lifecycle tracking without endpoint agent capabilities. Snipe-IT focuses on the administrative aspects of asset management: tracking ownership, location, warranty status, depreciation, and licence compliance.

The architecture follows a traditional web application model with MySQL or MariaDB backend. Snipe-IT does not include agents for automated inventory collection; instead, it relies on manual data entry, CSV imports, or API integrations with other tools that perform discovery. This design makes it suitable for organisations that need robust asset tracking but already have separate tools for endpoint management.

Snipe-IT is developed by Grokability, Inc., which offers both the open source version and a hosted cloud service with additional support options.

Capability assessment

Snipe-IT excels at traditional IT asset management functions. The asset model supports hardware tracking with component relationships, consumable inventory with quantity management, and software licence tracking with seat counting. Each asset maintains a complete history of assignments, status changes, and modifications.

The depreciation engine supports multiple calculation methods including straight-line and declining balance, with scheduled reports for financial planning. Warranty tracking includes expiry alerting and integration with purchase order information.

For organisations requiring barcode-based workflows, Snipe-IT generates and scans 1D and 2D barcodes including QR codes. Mobile-friendly responsive design supports field-based asset audits.

The REST API provides comprehensive programmatic access to all features, enabling integration with discovery tools, help desk systems, and custom automation. Third-party libraries exist for Python, PowerShell, Go, and other languages.

Key strengths

  1. Comprehensive traditional ITAM: Full asset lifecycle support including depreciation, warranties, consumables, and licence tracking exceeds most endpoint management tools
  2. Active development: Frequent releases with responsive community support
  3. Clean API: Well-documented REST API with OpenAPI specification enables reliable integrations
  4. Flexible deployment: Self-hosted at no cost or managed cloud service with 99.99% SLA
  5. Low resource requirements: Runs on modest hardware; suitable for small organisations

Key limitations

  1. No endpoint agents: Cannot perform automated inventory collection; requires external discovery tools or manual entry
  2. No configuration management: Does not deploy software or enforce endpoint configurations
  3. No MDM capabilities: Cannot manage mobile devices or enforce security policies
  4. Limited real-time visibility: Asset status reflects last manual update or API import, not live device state

Deployment and operations

Self-hosted deployment requires a LAMP stack (Linux, Apache/Nginx, MySQL/MariaDB, PHP 8.1+). Official Docker images are available. The installation process is well-documented with active community support.

System requirements for self-hosted deployment:

  • 2 CPU cores minimum
  • 2 GB RAM minimum (4 GB recommended for larger deployments)
  • 20 GB storage (varies with attachment storage needs)
  • MySQL 8.0+ or MariaDB 10.6+

The hosted cloud service eliminates infrastructure management and provides automatic updates, backups, and uptime guarantees.

Integration capabilities

Integration typeImplementation
REST APIFull CRUD operations on all objects, API token authentication
LDAP/ADUser and group synchronisation
SSOSAML 2.0, OIDC, Google Workspace
WebhooksConfigurable event notifications
Barcode1D, 2D, QR code generation and scanning

Cost analysis

DeploymentCost modelEstimated cost
Self-hostedFree (AGPL-3.0)Infrastructure costs only
Cloud hostedPer-asset/monthFrom $3.33/asset/month, minimum 25 assets
Enterprise supportAnnual subscriptionContact vendor

Organisational fit

Best suited for:

  • Organisations needing comprehensive asset lifecycle management (depreciation, warranties, procurement)
  • Environments with existing discovery or endpoint management tools needing a dedicated ITAM layer
  • Budget-constrained organisations requiring self-hosted deployment
  • Organisations with barcode-based asset audit workflows

Less suitable for:

  • Organisations requiring automated endpoint inventory without additional tools
  • Environments needing unified asset tracking and endpoint management in one platform
  • Organisations primarily managing mobile devices

GLPI

Metadata

AttributeValue
TypeOpen source
LicenceGPL-3.0
Current version11.0
Deployment optionsSelf-hosted, vendor-hosted cloud
Source repositoryhttps://github.com/glpi-project/glpi
Documentationhttps://glpi-user-documentation.readthedocs.io

Overview

GLPI (Gestionnaire Libre de Parc Informatique) is an open source IT service management platform combining asset management, help desk, and ITIL-aligned service management. Developed since 2003, GLPI provides comprehensive asset tracking with native automated inventory through the GLPI Agent.

The platform architecture separates the core GLPI application from the inventory agent. GLPI Agent supports Windows, Linux, macOS, and Android, collecting hardware specifications, installed software, and network configuration. The agent reports to GLPI via HTTP/HTTPS on configurable schedules.

GLPI is developed by Teclib’, which also offers GLPI Network (commercial support) and a cloud-hosted service. The plugin ecosystem extends functionality significantly; essential plugins include FusionInventory (legacy inventory), FormCreator (custom forms), and various integrations.

Capability assessment

GLPI provides integrated asset management and ITSM functionality. The asset management module tracks computers, network equipment, peripherals, software, and consumables with full lifecycle support including financial tracking, contracts, and suppliers.

The GLPI Agent collects detailed inventory automatically:

  • Hardware: CPU, memory, storage, firmware versions, BIOS information
  • Software: Installed applications with versions and publishers
  • Network: Interfaces, IP addresses, connections
  • Operating system: Type, version, patch level

The ITSM component provides ticket management, problem management, change management, and a service catalogue. Assets link directly to tickets, enabling incident tracking and impact analysis.

Entity separation supports multi-tenant deployments where organisations or departments maintain separate asset views with delegated administration.

Key strengths

  1. Integrated ITSM: Combined asset management and service desk reduces tool sprawl
  2. Native inventory agent: Cross-platform automated discovery without third-party dependencies
  3. ITIL alignment: Formal service management processes for mature IT operations
  4. Plugin ecosystem: Extensive customisation through marketplace plugins
  5. Entity separation: Multi-tenant architecture suits federated organisations
  6. Data centre features: Network topology, rack management, power distribution tracking

Key limitations

  1. Complexity: Full ITSM platform is more complex than dedicated ITAM tools
  2. Documentation gaps: Documentation quality varies; some features poorly documented
  3. Plugin dependencies: Essential features require plugins with varying maintenance status
  4. No MDM: Cannot manage mobile devices or enforce endpoint configurations
  5. Limited real-time management: Inventory is periodic; no real-time query capability

Deployment and operations

Self-hosted deployment requires a LAMP/LEMP stack with PHP 8.1+ and MySQL 8.0+ or MariaDB 10.5+. Installation involves web-based setup wizard after extracting files.

System requirements:

  • 2 CPU cores minimum (4+ recommended)
  • 4 GB RAM minimum (8 GB+ recommended)
  • 20 GB storage (more for attachments and inventory data)
  • PHP 8.1+ with required extensions
  • MySQL 8.0+ or MariaDB 10.5+

GLPI Agent deployment:

  • Windows: MSI installer, GPO deployment supported
  • Linux: RPM/DEB packages available
  • macOS: PKG installer
  • Android: APK for mobile inventory

Integration capabilities

Integration typeImplementation
REST APIFull CRUD operations, session-based authentication
LDAP/ADUser synchronisation, group mapping
SSOSAML 2.0, OIDC, CAS
WebhooksEvent notifications via API
MailIMAP/POP3 ticket creation, SMTP notifications
PluginsMarketplace with 200+ extensions

Cost analysis

DeploymentCost modelEstimated cost
Self-hostedFree (GPL-3.0)Infrastructure costs only
GLPI NetworkAnnual subscriptionFrom €4,750/year (includes support)
Cloud hostedPer-user/monthContact vendor

Organisational fit

Best suited for:

  • Organisations wanting integrated asset management and help desk
  • Environments requiring ITIL-aligned service management processes
  • Multi-entity organisations needing delegated administration
  • Organisations with data centre infrastructure requiring topology tracking

Less suitable for:

  • Small organisations needing simple asset tracking without ITSM
  • Environments requiring real-time endpoint management
  • Organisations primarily managing Apple or mobile devices

Fleet

Metadata

AttributeValue
TypeOpen source
LicenceMIT (free), Fleet Premium (commercial)
Current version4.x
Deployment optionsSelf-hosted, vendor-hosted cloud
Source repositoryhttps://github.com/fleetdm/fleet
Documentationhttps://fleetdm.com/docs

Overview

Fleet is an open source device management platform built on osquery, the open source endpoint agent originally developed by Facebook. Fleet provides cross-platform visibility into endpoint state through SQL-based queries, combined with MDM capabilities for macOS, Windows, iOS, and iPadOS.

The architecture centres on osquery’s ability to expose operating system state as queryable tables. Fleet adds a management server for enrolling devices, scheduling queries, aggregating results, and enforcing policies. The fleetd agent wraps osquery with additional capabilities including MDM enrollment, software deployment, and secure certificate management.

Fleet is developed by Fleet Device Management Inc., which offers both the open source core and Fleet Premium with additional enterprise features.

Capability assessment

Fleet’s core strength is endpoint visibility through osquery. Administrators write SQL queries against 300+ osquery tables covering:

  • System information: hardware, OS, users, groups
  • Security: certificates, browser extensions, firewall rules, encryption status
  • Software: installed applications, running processes, startup items
  • Network: interfaces, connections, DNS cache, routing

Queries can run on-demand (live queries) or on schedules (scheduled queries). Results aggregate in Fleet for reporting, export, or integration with SIEM platforms.

Fleet’s MDM capabilities (added in 2023-2024) include:

  • macOS: Configuration profiles, software deployment, FileVault management
  • Windows: Configuration profiles (via Intune-compatible schema), software deployment
  • iOS/iPadOS: Device enrollment, configuration profiles, app deployment

Fleet Premium adds features including vulnerability detection (matching installed software against CVE databases), automations, and premium support.

Key strengths

  1. Deep endpoint visibility: osquery’s SQL-based approach enables granular queries impossible with traditional inventory agents
  2. Cross-platform consistency: Same query language across macOS, Windows, Linux, iOS, iPadOS
  3. GitOps workflow: Configuration as code enables version-controlled fleet management
  4. Real-time queries: Live query capability provides instant answers about fleet state
  5. Vulnerability detection: Premium feature matches software inventory against CVE databases
  6. Transparency: Open source agent; users can verify exactly what data is collected
  7. Security integrations: Native connectors for Snowflake, Splunk, Elastic, Vanta

Key limitations

  1. Complexity: osquery learning curve steeper than traditional management tools
  2. Resource consumption: osquery agent consumes more resources than lightweight inventory agents
  3. Premium features: Vulnerability detection and some automations require paid tier
  4. Limited traditional ITAM: No financial tracking, depreciation, or warranty management
  5. Newer MDM: MDM capabilities less mature than Intune or Jamf Pro

Deployment and operations

Self-hosted deployment requires MySQL 8.0+ and Redis 6.0+. Fleet server is distributed as a Go binary or Docker image. Kubernetes deployment via Helm chart is documented.

System requirements for Fleet server (managing 10,000 hosts):

  • 4 CPU cores
  • 8 GB RAM
  • MySQL with 100 GB storage
  • Redis with 2 GB memory

fleetd agent requirements:

  • macOS 12+, Windows 10+, major Linux distributions
  • 50-100 MB RAM typical usage
  • 100 MB disk space

Integration capabilities

Integration typeImplementation
REST APIComprehensive API, token authentication
SSOSAML 2.0, OIDC, Google Workspace, Okta
SIEMNative Splunk, Elastic, Snowflake connectors
SCIMUser provisioning from identity providers
WebhooksConfigurable event notifications
GitOpsfleetctl CLI, YAML configuration

Cost analysis

DeploymentCost modelEstimated cost
Self-hosted (free tier)Free (MIT)Infrastructure costs only
Self-hosted (Premium)Per-device/month$5/device/month
Cloud hosted (Premium)Per-device/month$7/device/month

Organisational fit

Best suited for:

  • Security-conscious organisations needing deep endpoint visibility
  • Engineering-oriented teams comfortable with SQL and GitOps workflows
  • Cross-platform environments (macOS, Windows, Linux, iOS)
  • Organisations integrating endpoint data with SIEM or data platforms

Less suitable for:

  • Organisations needing traditional ITAM (depreciation, warranties, procurement)
  • Teams preferring GUI-based management over query-based approaches
  • Small organisations without security engineering capacity
  • Apple-only environments (Jamf Pro offers deeper Apple integration)

Foreman + Katello

Metadata

AttributeValue
TypeOpen source
LicenceGPL-2.0
Current versionForeman 3.16, Katello 4.18
Deployment optionsSelf-hosted only
Source repositoryhttps://github.com/theforeman/foreman
Documentationhttps://docs.theforeman.org

Overview

Foreman is an open source lifecycle management platform for server provisioning, configuration, and orchestration. Katello is a Foreman plugin adding content management capabilities including repository mirroring, content views, and subscription management. Together, they provide comprehensive server management for enterprise Linux environments.

The architecture integrates multiple components: Foreman provides the core web interface and host management, Katello manages content (RPM/DEB packages, Puppet modules), and Smart Proxies distribute services (DHCP, DNS, TFTP, Pulp) across geographic locations.

Foreman with Katello is the upstream project for Red Hat Satellite, the commercial offering with support subscriptions.

Capability assessment

Foreman + Katello excels at enterprise Linux server management:

Provisioning:

  • Bare metal: PXE boot with kickstart/preseed automation
  • Virtual: VMware, RHEV, oVirt, Proxmox, cloud providers
  • Container: Kubernetes and OpenShift integration
  • Discovery: Automatic detection of unprovisioned hardware

Configuration management:

  • Puppet: Native Puppet integration with ENC (External Node Classifier)
  • Ansible: Ansible integration for playbook execution
  • Salt: Salt master integration available

Content management (Katello):

  • Repository mirroring for RHEL, CentOS, Ubuntu, custom repos
  • Content views for controlling package versions across environments
  • Lifecycle environments (Dev → QA → Production)
  • Subscription management for Red Hat systems

Key strengths

  1. Comprehensive Linux management: End-to-end lifecycle from provisioning through decommissioning
  2. Content management: Granular control over package versions across environments
  3. Multi-tool orchestration: Integrates Puppet, Ansible, Salt for configuration management
  4. Geographic distribution: Smart Proxy architecture supports distributed deployments
  5. Red Hat alignment: Upstream of Red Hat Satellite; compatible practices
  6. Scale: Designed for thousands of hosts across multiple locations

Key limitations

  1. Complexity: Steep learning curve; requires significant expertise to deploy and operate
  2. Linux-focused: Limited support for Windows; no macOS or mobile device management
  3. Self-hosted only: No cloud-hosted option; requires infrastructure investment
  4. Resource intensive: Server requirements are substantial for the full stack
  5. No traditional ITAM: Financial tracking, depreciation, warranty management not included

Deployment and operations

Foreman with Katello requires Enterprise Linux 8 or 9 (RHEL, AlmaLinux, Rocky Linux). Installation uses the foreman-installer, a Puppet-based deployment tool.

Minimum system requirements:

  • 4 CPU cores
  • 20 GB RAM
  • 150 GB storage (more for content mirroring)
  • Enterprise Linux 8 or 9
  • Dedicated server recommended

Content storage requirements scale with mirrored repositories. A typical deployment mirroring RHEL, EPEL, and common repositories requires 300+ GB for content.

Integration capabilities

Integration typeImplementation
REST APIComprehensive API, basic and OAuth authentication
LDAP/ADUser synchronisation and authentication
SSOSAML 2.0, Kerberos, FreeIPA
Configuration managementPuppet, Ansible, Salt
VirtualisationVMware, oVirt, Proxmox, cloud providers
Compute resourcesAWS, Azure, GCP, OpenStack

Cost analysis

DeploymentCost modelEstimated cost
Self-hostedFree (GPL-2.0)Infrastructure and expertise costs
Red Hat SatelliteSubscriptionContact Red Hat for nonprofit pricing

Organisational fit

Best suited for:

  • Organisations with substantial Linux server estates requiring lifecycle management
  • DevOps teams implementing infrastructure as code practices
  • Environments requiring controlled software distribution across lifecycle stages
  • Organisations comfortable with self-hosted infrastructure and Puppet/Ansible expertise

Less suitable for:

  • Organisations primarily managing workstations or mobile devices
  • Small organisations without dedicated Linux systems administration capacity
  • Environments requiring Windows or macOS management
  • Organisations seeking managed/hosted solutions

Microsoft Intune

Metadata

AttributeValue
TypeCommercial
LicenceProprietary (subscription)
Current versionSaaS (continuously updated)
Deployment optionsCloud only (Microsoft-managed)
Documentationhttps://learn.microsoft.com/en-us/intune

Overview

Microsoft Intune is a cloud-based unified endpoint management (UEM) service integrated into the Microsoft 365 ecosystem. Intune manages Windows, macOS, iOS, iPadOS, Android, and Linux devices through a single console accessible via the Microsoft Intune admin center.

Intune operates as a SaaS service with no on-premises components required. Device enrollment connects endpoints to the Intune service, where administrators configure policies, deploy applications, and monitor compliance. Intune integrates deeply with Microsoft Entra ID (formerly Azure AD) for identity, Defender for Endpoint for security, and Autopilot for zero-touch deployment.

Capability assessment

Intune provides comprehensive endpoint management across platforms:

Device management:

  • Windows: Full MDM with device configuration, BitLocker management, Windows Update for Business
  • macOS: Device enrollment, configuration profiles, FileVault management
  • iOS/iPadOS: Supervised and user enrollment, app deployment, managed settings
  • Android: Work profile, fully managed, dedicated device modes
  • Linux: Basic enrollment and compliance (Ubuntu, RHEL)

Configuration management:

  • Settings catalog: Granular policy configuration with 5,000+ settings
  • Configuration profiles: Templates for common scenarios
  • Endpoint security: Attack surface reduction, firewall, antivirus policies
  • Compliance policies: Define requirements, automated remediation

Application management:

  • Microsoft 365 apps: Native deployment and update management
  • Win32 apps: MSI, MSIX, EXE deployment with detection rules
  • Store apps: Microsoft Store, Apple App Store, Google Play
  • LOB apps: Custom line-of-business application deployment

Key strengths

  1. Microsoft ecosystem integration: Seamless connection with Microsoft 365, Entra ID, Defender
  2. Cross-platform coverage: Single console for Windows, macOS, iOS, Android
  3. Zero-touch deployment: Windows Autopilot and Apple Business Manager integration
  4. Compliance-driven access: Conditional Access policies enforce device compliance
  5. Copilot integration: AI-assisted policy creation and troubleshooting
  6. Scale: Manages millions of devices across Microsoft’s customer base
  7. Nonprofit programme: Discounted pricing available through Microsoft Nonprofits

Key limitations

  1. Cloud-only: No on-premises deployment option; requires internet connectivity
  2. Microsoft dependency: Deep tie to Microsoft ecosystem may limit flexibility
  3. Complexity: Extensive feature set creates learning curve
  4. Cost structure: Per-user licensing can be expensive for large workforces
  5. US jurisdiction: Data processed through Microsoft’s cloud (CLOUD Act applies)
  6. Linux support: Linux management is less mature than Windows or macOS

Deployment and operations

Intune is a SaaS service requiring no infrastructure deployment. Administrators access the Intune admin center via web browser.

Licensing requirements:

  • Microsoft Intune Plan 1: Included in Microsoft 365 E3/E5, Business Premium
  • Microsoft Intune Plan 2: Add-on for advanced features
  • Microsoft Intune Suite: Comprehensive add-on including Endpoint Privilege Management

Device enrollment methods vary by platform:

  • Windows: Autopilot, Azure AD join, hybrid Azure AD join
  • macOS: Apple Business Manager, user enrollment
  • iOS/iPadOS: Apple Business Manager, user enrollment
  • Android: Android Enterprise enrollment

Integration capabilities

Integration typeImplementation
Microsoft Graph APIComprehensive API for automation
Azure AD/Entra IDNative identity integration
Defender for EndpointSecurity integration
Conditional AccessCompliance-based access control
SIEMMicrosoft Sentinel, third-party via API
ITSMServiceNow, third-party integrations

Cost analysis

PlanNonprofit priceCommercial price
Microsoft 365 Business Basic (no Intune)Free (300 users)$6/user/month
Microsoft 365 Business Premium (includes Intune)$5.50/user/month$22/user/month
Microsoft 365 E3 (includes Intune)$9/user/month$36/user/month
Microsoft Intune Plan 1 (standalone)Varies$8/user/month
Microsoft Intune Suite (add-on)Varies$10/user/month

Note: Microsoft changed nonprofit grant offerings in 2025. Verify current eligibility and pricing through Microsoft Nonprofits programme.

Organisational fit

Best suited for:

  • Organisations already invested in Microsoft 365 ecosystem
  • Mixed device environments (Windows, macOS, mobile)
  • Organisations requiring Conditional Access integration with identity
  • Environments prioritising cloud-native management without infrastructure

Less suitable for:

  • Organisations avoiding Microsoft ecosystem lock-in
  • Environments requiring on-premises management
  • Apple-focused organisations (Jamf provides deeper Apple integration)
  • Organisations with data sovereignty concerns regarding US cloud providers

Jamf Pro

Metadata

AttributeValue
TypeCommercial
LicenceProprietary (subscription)
Current version11.22
Deployment optionsCloud-hosted, self-hosted (on-premises or private cloud)
Documentationhttps://learn.jamf.com

Overview

Jamf Pro is an Apple-focused enterprise management platform providing device enrollment, configuration, security, and application management for macOS, iOS, iPadOS, tvOS, visionOS, and watchOS. With over 20 years of Apple management expertise, Jamf provides same-day support for new Apple operating system releases.

Jamf Pro operates as either a cloud-hosted service (Jamf Cloud) or self-hosted deployment on customer infrastructure. The platform integrates with Apple Business Manager (formerly DEP and VPP) for zero-touch device enrollment and app distribution.

Capability assessment

Jamf Pro provides comprehensive Apple device management:

Device enrollment:

  • Zero-touch deployment via Apple Business Manager
  • User-initiated enrollment for BYOD
  • Automated device setup and configuration
  • Pre-stage enrollment customisation

Configuration management:

  • Configuration profiles: Full Apple payload support
  • Scripts: Custom script deployment and execution
  • Policies: Triggered actions based on events or schedules
  • Blueprints: Declarative device management (introduced 2024)

Application management:

  • Mac App Store: VPP app deployment
  • Self Service: User-initiated software catalogue
  • Patch management: Automated software updates
  • Package deployment: PKG, DMG installer distribution

Security:

  • FileVault management: Encryption key escrow
  • Gatekeeper: Application allow/block lists
  • Firmware password: NVRAM protection
  • Jamf Protect integration: Endpoint security

Key strengths

  1. Apple expertise: Deepest integration with Apple management frameworks
  2. Same-day support: New macOS/iOS versions supported on release day
  3. Self Service: Polished end-user portal for software and support
  4. Deployment flexibility: Cloud or self-hosted to meet data residency needs
  5. Jamf ecosystem: Integrates with Jamf Connect (identity), Jamf Protect (security)
  6. Community: Active Jamf Nation community with peer support
  7. Education pricing: Substantial discounts for educational institutions

Key limitations

  1. Apple-only: No support for Windows, Linux, or Android devices
  2. Cost: Higher per-device cost than some alternatives
  3. Complexity: Full feature utilisation requires Apple device management expertise
  4. No traditional ITAM: Financial tracking and depreciation not included
  5. Self-hosted overhead: On-premises deployment requires infrastructure management

Deployment and operations

Jamf Cloud (hosted):

  • No infrastructure required
  • Automatic updates and maintenance
  • Regional data centres available

Self-hosted requirements:

  • macOS Server, Linux, or Windows Server
  • MySQL or MariaDB database
  • 8 GB RAM minimum
  • 150 GB storage minimum

Jamf agent deployment:

  • Jamf Management Framework installed on managed devices
  • Supports Apple Remote Desktop for initial deployment
  • Bootstrap package deployment via Apple Business Manager

Integration capabilities

Integration typeImplementation
REST APIComprehensive Jamf Pro API
Azure AD/Entra IDSCIM provisioning, SSO
OktaIdentity integration
Google WorkspaceIdentity integration
SIEMSyslog, webhook, native integrations
Jamf ecosystemConnect, Protect, Safe Internet

Cost analysis

TierBusiness priceEducation price
iOS/iPadOS/tvOS$3.33/device/month$0.75/device/month
macOS$6.67/device/month$1.50/device/month
Fundamentals bundle$5.75/device/monthContact sales
Business bundle$10/device/monthContact sales

Note: Education pricing requires verification. Nonprofit-specific pricing is not formally published but organisations should contact Jamf directly.

Organisational fit

Best suited for:

  • Organisations with Apple-focused device fleets
  • Environments requiring same-day support for Apple OS releases
  • Schools and higher education institutions
  • Organisations valuing self-hosted deployment for data control
  • Teams needing polished end-user self-service experience

Less suitable for:

  • Mixed-platform environments requiring Windows/Android management
  • Small organisations with limited Apple device management expertise
  • Budget-constrained organisations prioritising cost over Apple-specific features
  • Organisations primarily managing servers rather than workstations

Selection guidance

Decision framework

+----------------------------------+
| What is the primary requirement? |
+----------------+-----------------+
|
+---------------------------+---------------------------+
| | |
v v v
+--------+--------+ +--------+--------+ +--------+--------+
| Asset lifecycle | | Endpoint | | Server |
| management | | management | | provisioning |
| (inventory, | | (config, MDM, | | (Linux |
| depreciation) | | compliance) | | infrastructure) |
+-----------------+ +-----------------+ +-----------------+
| | |
v v v
+--------+--------+ +--------+--------+ +--------+--------+
| Need ITSM/help | | Primary | | Foreman + |
| desk too? | | platform? | | Katello |
+--------+--------+ +--------+--------+ +-----------------+
| | |
v v v
Yes No +---------+----------+
| | | | |
v v v v v
+-------+ +--------+ Apple Microsoft Cross-platform
| GLPI | |Snipe-IT| | | |
+-------+ +--------+ v v v
+------+ +-------+ +------+
| Jamf | |Intune | | Fleet|
| Pro | | | | |
+------+ +-------+ +------+

Recommendations by organisational context

Organisations with minimal IT capacity

Primary recommendation: Snipe-IT (hosted) or Microsoft Intune

For asset tracking only, Snipe-IT’s hosted service provides comprehensive ITAM without infrastructure management. The interface is straightforward, and support is included with hosting plans.

For endpoint management with Microsoft 365 already in use, Intune requires no infrastructure and integrates with existing identity. The nonprofit programme provides substantial discounts.

Implementation approach:

  1. Start with Snipe-IT hosted for asset tracking (manual entry or CSV import)
  2. Add Intune if endpoint configuration management is needed
  3. Connect Snipe-IT to Intune via API for automated inventory updates

Organisations with established IT functions

Primary recommendation: GLPI + Fleet or Intune + dedicated ITAM

GLPI provides integrated asset management and service desk, reducing tool sprawl. GLPI Agent automates inventory collection. For organisations needing deeper endpoint visibility, Fleet’s osquery-based approach complements GLPI’s ITAM strengths.

For Microsoft-centric environments, Intune handles endpoint management while a dedicated ITAM tool (Snipe-IT or GLPI) manages financial tracking and lifecycle data that Intune does not address.

Implementation approach:

  1. Deploy GLPI for integrated ITAM and service desk
  2. Deploy GLPI Agent or Fleet for automated inventory
  3. Integrate with existing directory services (AD/LDAP)
  4. Configure compliance policies and reporting

Apple-focused organisations

Primary recommendation: Jamf Pro

For organisations where Apple devices constitute the majority of the fleet, Jamf Pro provides the deepest integration with Apple management frameworks. Same-day OS support ensures compatibility as Apple releases updates.

Implementation approach:

  1. Enroll devices via Apple Business Manager
  2. Configure Jamf Pro policies and profiles
  3. Deploy Self Service for end-user software access
  4. Consider Jamf Protect add-on for endpoint security

Complement with: Snipe-IT for financial asset tracking (depreciation, warranties) that Jamf Pro does not provide.

Organisations with specific data sovereignty requirements

Primary recommendation: Self-hosted FOSS solutions

For organisations with strict data residency requirements or concerns about US cloud provider jurisdiction, self-hosted open source solutions provide complete control over data location.

Options by function:

  • Asset tracking: Snipe-IT (self-hosted)
  • Asset tracking + ITSM: GLPI (self-hosted)
  • Endpoint visibility: Fleet (self-hosted)
  • Server provisioning: Foreman + Katello (self-hosted)

Note: Self-hosting requires infrastructure and expertise. Organisations should assess whether the data sovereignty benefit justifies the operational overhead.

Large or federated organisations

Primary recommendation: GLPI or commercial tools with multi-tenant support

GLPI’s entity separation architecture supports delegated administration across organisational units. Each entity maintains separate asset views while central IT retains oversight.

For well-funded organisations, Microsoft Intune’s integration with Microsoft 365 and Entra ID provides unified management across geographic and organisational boundaries.

Implementation considerations:

  1. Define entity/tenant structure matching organisational hierarchy
  2. Establish central policies with local administration delegation
  3. Implement reporting that aggregates across entities
  4. Plan synchronisation with federated directory services

Migration paths

FromToComplexityApproach
SpreadsheetsSnipe-ITLowCSV import; manual cleanup
Snipe-ITGLPIMediumExport CSV; import to GLPI; map custom fields
GLPISnipe-ITMediumExport CSV; map fields; lose ITSM history
Any ITAMIntuneMediumEnroll devices; inventory populates automatically
Any ITAMFleetMediumDeploy fleetd; inventory populates via osquery
IntuneJamf ProHighRe-enroll devices; recreate policies; Apple devices only
Jamf ProIntuneHighRe-enroll devices; recreate profiles; feature mapping required

Resources and references

Official documentation

ToolDocumentation URLAPI reference
Snipe-IThttps://snipe-it.readme.io/docshttps://snipe-it.readme.io/reference
GLPIhttps://glpi-user-documentation.readthedocs.ioBuilt-in at /apirest.php
Fleethttps://fleetdm.com/docshttps://fleetdm.com/docs/rest-api
Foremanhttps://docs.theforeman.orghttps://theforeman.org/api
Intunehttps://learn.microsoft.com/en-us/intunehttps://learn.microsoft.com/en-us/graph
Jamf Prohttps://learn.jamf.comhttps://developer.jamf.com
VendorProgramme URL
Microsofthttps://nonprofit.microsoft.com
Snipe-IThttps://snipeitapp.com/pricing (contact for nonprofit pricing)
Jamfhttps://www.jamf.com/pricing/education-pricing (contact for nonprofit)

Relevant standards

StandardDescriptionURL
ISO/IEC 19770-1IT asset management standardhttps://www.iso.org/standard/68531.html
ITIL 4IT service management frameworkhttps://www.axelos.com/best-practice-solutions/itil
CIS BenchmarksSecurity configuration standardshttps://www.cisecurity.org/cis-benchmarks

See also