IT Asset Management and Endpoint Management
IT asset management (ITAM) and endpoint management tools track hardware inventory, manage device lifecycles, enforce configurations, and maintain visibility across organisational fleets. ITAM focuses on the administrative record: what devices exist, who owns them, when warranties expire, and how assets depreciate. Endpoint management extends to active control: deploying software, enforcing security policies, and remediating configuration drift on managed devices.
This page covers tools that provide asset tracking, device inventory, and endpoint configuration management. Tools focused exclusively on security monitoring appear in Security and Monitoring. Mobile device management (MDM) capabilities are included where tools provide cross-platform management, but dedicated MDM-only solutions for iOS or Android are not covered here.
Assessment methodology
Tool assessments derive from official vendor documentation, published API references, release notes, and technical specifications as of 2026-01-24. Feature availability varies by product tier, deployment model, or region. Verify current capabilities directly with vendors during procurement. Community-reported information is excluded; only documented features are assessed.
Requirements taxonomy
This taxonomy defines evaluation criteria for asset and endpoint management tools. Requirements are organised by functional area and weighted by typical priority for mission-driven organisations.
Functional requirements
Asset tracking and inventory
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| F1.1 | Hardware asset registration | Create and maintain records for physical devices including computers, peripherals, network equipment, and mobile devices | Full: supports all common asset types with extensible categories. Partial: limited to predefined types. None: manual tracking only. | Review asset type configuration; test custom type creation | Essential |
| F1.2 | Unique asset identification | Assign and track unique identifiers (asset tags, serial numbers, UUIDs) for each device | Full: multiple identifier types, barcode/QR support, automatic UUID capture. Partial: single identifier type. None: manual entry only. | Test asset creation workflow; verify identifier validation | Essential |
| F1.3 | Asset assignment tracking | Record which user, department, or location has custody of each asset | Full: assignment history, transfer workflows, custody chain. Partial: current assignment only. None: no assignment tracking. | Review assignment features; test transfer workflow | Essential |
| F1.4 | Component tracking | Track internal components (RAM, storage, network cards) as sub-assets of parent devices | Full: component inventory with parent-child relationships, component history. Partial: notes field only. None: no component tracking. | Create asset with components; verify relationship tracking | Important |
| F1.5 | Consumable tracking | Track consumable items (cables, adapters, peripherals) with quantity management | Full: quantity tracking, low-stock alerts, checkout workflow. Partial: basic quantity only. None: no consumable support. | Test consumable creation and checkout | Important |
| F1.6 | Software licence tracking | Record software licences, seats, and assignments to devices or users | Full: licence compliance reporting, seat counting, expiry alerts. Partial: basic licence records. None: no licence tracking. | Create licences; test seat assignment and compliance | Important |
| F1.7 | Warranty and contract tracking | Store warranty information, support contracts, and renewal dates with alerting | Full: multiple contracts per asset, renewal workflows, vendor integration. Partial: single warranty field. None: no warranty tracking. | Configure warranty; test expiry alerts | Important |
| F1.8 | Depreciation calculation | Calculate asset depreciation using configurable methods (straight-line, declining balance) | Full: multiple depreciation methods, scheduled calculation, reporting. Partial: single method. None: no depreciation support. | Configure depreciation; verify calculations | Desirable |
Automated discovery and inventory
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| F2.1 | Agent-based inventory | Deploy agents to endpoints that report hardware and software inventory automatically | Full: cross-platform agents, scheduled reporting, delta updates. Partial: single platform. None: no agent support. | Deploy agent; verify inventory collection | Essential |
| F2.2 | Agentless discovery | Discover devices via network scanning (SNMP, WMI, SSH) without requiring agent installation | Full: multiple protocols, scheduled scans, subnet targeting. Partial: single protocol. None: agent-only. | Configure network scan; verify discovery | Important |
| F2.3 | Hardware specification collection | Automatically capture detailed hardware specifications (CPU, RAM, storage, peripherals) | Full: comprehensive specs including component serial numbers. Partial: basic specs only. None: manual entry. | Review collected specifications; compare to actual hardware | Essential |
| F2.4 | Software inventory | Automatically enumerate installed software with version information | Full: all installed software, version tracking, change detection. Partial: limited software types. None: no software inventory. | Verify software list accuracy; test change detection | Essential |
| F2.5 | Operating system detection | Identify operating system type, version, and patch level | Full: detailed OS info including build numbers, patch status. Partial: OS name only. None: no OS detection. | Verify OS information accuracy | Essential |
| F2.6 | Network interface discovery | Capture network interface details (MAC addresses, IP addresses, connection status) | Full: all interfaces, IPv4/IPv6, connection history. Partial: primary interface only. None: no network info. | Verify interface enumeration | Important |
| F2.7 | Peripheral detection | Discover connected peripherals (monitors, printers, external storage) | Full: enumeration with serial numbers, connection events. Partial: basic peripheral list. None: no peripheral detection. | Connect peripheral; verify discovery | Desirable |
Endpoint configuration management
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| F3.1 | Configuration policy deployment | Define and deploy configuration settings to managed endpoints | Full: granular policies, targeting rules, rollback capability. Partial: basic settings only. None: no configuration management. | Create policy; deploy to test device; verify application | Essential |
| F3.2 | Software deployment | Install, update, and remove software applications on managed endpoints | Full: silent install, dependency handling, staged rollout. Partial: basic install only. None: manual installation. | Deploy application; verify installation success | Essential |
| F3.3 | Patch management | Detect missing patches and deploy updates to managed endpoints | Full: patch detection, approval workflow, compliance reporting. Partial: detection only. None: no patch management. | Identify missing patches; deploy update; verify installation | Essential |
| F3.4 | Script execution | Execute custom scripts on managed endpoints for automation and remediation | Full: cross-platform scripts, scheduling, output capture. Partial: single platform. None: no script execution. | Execute test script; verify output capture | Important |
| F3.5 | Compliance monitoring | Assess endpoint compliance against defined baselines and report deviations | Full: baseline comparison, drift detection, remediation triggers. Partial: basic compliance checks. None: no compliance monitoring. | Configure baseline; detect deviation; verify reporting | Important |
| F3.6 | Remote actions | Execute remote commands (restart, lock, wipe) on managed endpoints | Full: secure remote actions, audit logging, confirmation workflow. Partial: limited actions. None: no remote control. | Execute remote restart; verify audit log | Important |
| F3.7 | Self-service portal | Provide end users interface to request software, report issues, or manage their devices | Full: configurable catalogue, approval workflow, status tracking. Partial: basic portal. None: no self-service. | Test user portal; verify request workflow | Desirable |
Reporting and analytics
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| F4.1 | Asset reports | Generate reports on asset inventory, assignments, and status | Full: customisable reports, scheduling, multiple formats. Partial: fixed reports. None: manual export only. | Generate inventory report; verify accuracy | Essential |
| F4.2 | Compliance reporting | Report on endpoint compliance status against defined policies | Full: compliance dashboards, trend analysis, drill-down. Partial: basic status report. None: no compliance reporting. | Generate compliance report; verify accuracy | Important |
| F4.3 | Audit trail | Maintain complete history of changes to assets and configurations | Full: all changes logged with user, timestamp, before/after values. Partial: limited history. None: no audit trail. | Make changes; verify audit log entries | Essential |
| F4.4 | Dashboard visualisation | Provide visual dashboards showing asset and endpoint status | Full: customisable widgets, real-time data, drill-down. Partial: fixed dashboards. None: no visualisation. | Review dashboard capabilities; test customisation | Important |
| F4.5 | Scheduled reporting | Automatically generate and distribute reports on schedule | Full: flexible scheduling, multiple recipients, multiple formats. Partial: basic scheduling. None: manual generation only. | Configure scheduled report; verify delivery | Desirable |
| F4.6 | Export capabilities | Export data in standard formats for external analysis | Full: CSV, JSON, XML export, bulk export, API access. Partial: limited formats. None: no export. | Export data; verify format and completeness | Important |
Technical requirements
Deployment and hosting
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| T1.1 | Self-hosted deployment | Deploy on organisation-controlled infrastructure | Full: complete feature parity, documented deployment. Partial: available with limitations. None: SaaS only. | Review deployment documentation; compare feature matrix | Important |
| T1.2 | Cloud deployment | Vendor-managed cloud deployment with regional options | Full: multiple regions including EU, documented data residency. Partial: limited regions. None: self-hosted only. | Review regional availability; verify data residency | Important |
| T1.3 | Container deployment | Support for containerised deployment (Docker, Kubernetes) | Full: official images, Helm charts, documented orchestration. Partial: community images only. None: no container support. | Check container registry; review deployment docs | Desirable |
| T1.4 | Database requirements | Supported database backends and versions | Document supported databases, versions, and configuration requirements | Review system requirements documentation | Important |
| T1.5 | Scalability architecture | Support for horizontal scaling and high availability | Full: documented HA architecture, load balancing. Partial: manual failover. None: single instance only. | Review architecture documentation | Context-dependent |
Integration architecture
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| T2.1 | REST API | Programmatic access via REST API | Full: comprehensive API, versioned, documented, all features accessible. Partial: limited coverage. None: no API. | Review API documentation; test key endpoints | Essential |
| T2.2 | API authentication | Supported methods for securing API access | Document supported methods: API keys, OAuth 2.0, tokens, certificates | Review API security documentation | Important |
| T2.3 | Webhook support | Push event notifications to external systems | Full: configurable webhooks, retry logic, payload customisation. Partial: limited events. None: no webhooks. | Configure webhook; verify event delivery | Important |
| T2.4 | LDAP/Active Directory integration | Synchronise users and groups from directory services | Full: user sync, group mapping, nested groups. Partial: basic sync. None: no directory integration. | Configure directory sync; verify user import | Essential |
| T2.5 | SAML/OIDC SSO | Single sign-on via federated identity | Full: SAML 2.0 and OIDC support. Partial: single protocol. None: local auth only. | Configure SSO; test authentication flow | Important |
| T2.6 | SIEM integration | Export events to security information and event management systems | Full: syslog, webhook, native integrations. Partial: log file export. None: no SIEM integration. | Configure SIEM export; verify event receipt | Important |
Security requirements
Authentication and access control
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| S1.1 | Role-based access control | Granular permissions based on roles | Full: custom roles, granular permissions, inheritance. Partial: fixed roles. None: admin/user only. | Create custom role; verify permission enforcement | Essential |
| S1.2 | Multi-factor authentication | MFA support for administrator and user accounts | Full: multiple MFA methods, policy enforcement. Partial: single method. None: password only. | Configure MFA; verify enforcement | Essential |
| S1.3 | API access controls | Restrict API access by scope, IP, or rate | Full: scoped tokens, IP allowlist, rate limiting. Partial: basic rate limiting. None: no API controls. | Configure API restrictions; test enforcement | Important |
| S1.4 | Session management | Configurable session timeout and concurrent session limits | Full: configurable timeout, session termination, activity tracking. Partial: fixed timeout. None: no session controls. | Configure session policy; verify enforcement | Important |
Data protection
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| S2.1 | Encryption at rest | Encrypt stored data | Full: AES-256, key management, documented implementation. Partial: database encryption only. None: no encryption. | Review encryption documentation; verify configuration | Essential |
| S2.2 | Encryption in transit | Secure communications with TLS | Full: TLS 1.2+ enforced, certificate management. Partial: optional TLS. None: unencrypted. | Verify TLS configuration; check certificate handling | Essential |
| S2.3 | Data export controls | Control ability to export sensitive data | Full: permission-based export, audit logging. Partial: admin-only export. None: unrestricted export. | Test export permissions; verify audit logging | Important |
| S2.4 | Credential storage | Secure storage for service credentials and secrets | Full: encrypted vault, no plaintext storage. Partial: encrypted database. None: plaintext storage. | Review credential storage mechanism | Essential |
Operational requirements
Administration
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| O1.1 | Web-based administration | Browser-based management interface | Full: responsive design, full feature access. Partial: limited mobile support. None: desktop client required. | Access via browser; test responsiveness | Essential |
| O1.2 | Bulk operations | Perform actions on multiple assets or endpoints simultaneously | Full: bulk edit, import, delete, assign. Partial: limited bulk operations. None: individual only. | Perform bulk operation; verify results | Important |
| O1.3 | Import capabilities | Import existing asset data from external sources | Full: CSV, Excel, API import with mapping. Partial: fixed format only. None: manual entry. | Import test data; verify mapping and validation | Important |
| O1.4 | Custom fields | Add organisation-specific data fields to records | Full: custom fields on all objects, field types, validation. Partial: limited objects. None: no custom fields. | Create custom field; verify data entry and reporting | Important |
| O1.5 | Multi-tenancy | Support multiple organisations or entities in single installation | Full: entity separation, delegated administration. Partial: basic separation. None: single tenant only. | Configure multiple entities; verify separation | Context-dependent |
Monitoring and maintenance
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| O2.1 | System health monitoring | Monitor server and service health | Full: health endpoints, resource monitoring, alerting. Partial: basic status page. None: no monitoring. | Review health monitoring capabilities | Important |
| O2.2 | Backup and restore | Built-in or documented backup procedures | Full: automated backup, point-in-time restore, documented procedures. Partial: manual backup. None: undocumented. | Review backup documentation; test restore | Essential |
| O2.3 | Upgrade procedures | Documented upgrade path between versions | Full: automated upgrade, rollback capability, migration guides. Partial: manual upgrade. None: undocumented. | Review upgrade documentation | Important |
| O2.4 | Log management | Centralised logging with retention controls | Full: structured logs, configurable retention, external export. Partial: local logs. None: minimal logging. | Review logging configuration | Important |
Comparison matrices
Rating scale
| Symbol | Meaning |
|---|---|
| ● | Full support: feature fully implemented as documented |
| ◐ | Partial support: feature available with limitations noted |
| ○ | Minimal support: basic capability only |
| ✗ | Not supported |
| $ | Requires paid tier or add-on |
| E | Enterprise edition only |
| P | Plugin or extension required |
Tool overview
| Tool | Type | Licence | Current version | Primary focus |
|---|---|---|---|---|
| Snipe-IT | FOSS | AGPL-3.0 | 7.x | IT asset inventory and lifecycle tracking |
| GLPI | FOSS | GPL-3.0 | 11.0 | Asset management with ITSM service desk |
| Fleet | FOSS | MIT (core) | 4.x | Endpoint visibility via osquery with MDM |
| Foreman + Katello | FOSS | GPL-2.0 | 3.16 / 4.18 | Server provisioning and content management |
| Microsoft Intune | Commercial | Proprietary | SaaS | Unified endpoint management for Microsoft ecosystem |
| Jamf Pro | Commercial | Proprietary | 11.22 | Apple device management and security |
Asset tracking capabilities
| Capability | Snipe-IT | GLPI | Fleet | Foreman | Intune | Jamf Pro |
|---|---|---|---|---|---|---|
| Hardware asset registration | ● | ● | ● | ● | ● | ● |
| Unique asset identification | ● | ● | ● | ● | ● | ● |
| Asset assignment tracking | ● | ● | ○ | ○ | ● | ● |
| Component tracking | ● | ● | ● | ● | ○ | ○ |
| Consumable tracking | ● | ● | ✗ | ✗ | ✗ | ✗ |
| Software licence tracking | ● | ● | ● | ● | ●$ | ●$ |
| Warranty tracking | ● | ● | ✗ | ○ | ○ | ○ |
| Depreciation calculation | ● | ● | ✗ | ✗ | ✗ | ✗ |
| Barcode/QR scanning | ● | ●P | ✗ | ✗ | ✗ | ● |
| Location tracking | ● | ● | ● | ● | ● | ● |
Assessment notes:
- Snipe-IT and GLPI provide the most comprehensive traditional ITAM features including depreciation, warranties, and consumables
- Fleet focuses on endpoint visibility rather than administrative asset tracking
- Foreman focuses on server provisioning; asset tracking is secondary to configuration management
- Commercial tools (Intune, Jamf Pro) emphasise device management over financial asset tracking
Automated inventory capabilities
| Capability | Snipe-IT | GLPI | Fleet | Foreman | Intune | Jamf Pro |
|---|---|---|---|---|---|---|
| Agent-based inventory | ✗ | ● | ● | ● | ● | ● |
| Agentless discovery | ✗ | ● | ✗ | ● | ○ | ✗ |
| Hardware specification collection | ✗ | ● | ● | ● | ● | ● |
| Software inventory | ✗ | ● | ● | ● | ● | ● |
| Operating system detection | ✗ | ● | ● | ● | ● | ● |
| Network interface discovery | ✗ | ● | ● | ● | ● | ● |
| Real-time inventory | ✗ | ○ | ● | ○ | ● | ● |
| Windows support | N/A | ● | ● | ● | ● | ✗ |
| macOS support | N/A | ● | ● | ● | ● | ● |
| Linux support | N/A | ● | ● | ● | ◐ | ✗ |
| iOS/iPadOS support | N/A | ◐ | ● | ✗ | ● | ● |
| Android support | N/A | ◐ | ● | ✗ | ● | ✗ |
Assessment notes:
- Snipe-IT is a pure ITAM tool without agent or discovery capabilities; inventory is manual or via API integration
- GLPI provides the GLPI Agent for automated inventory across platforms
- Fleet uses osquery for deep endpoint visibility with real-time query capability
- Foreman uses Puppet or Ansible for configuration; inventory is a byproduct
- Intune provides comprehensive inventory for Windows and mobile; Linux support is limited
- Jamf Pro focuses exclusively on Apple platforms
Endpoint management capabilities
| Capability | Snipe-IT | GLPI | Fleet | Foreman | Intune | Jamf Pro |
|---|---|---|---|---|---|---|
| Configuration policy deployment | ✗ | ○P | ● | ● | ● | ● |
| Software deployment | ✗ | ●P | ● | ● | ● | ● |
| Patch management | ✗ | ○P | ● | ● | ● | ● |
| Script execution | ✗ | ○P | ● | ● | ● | ● |
| Compliance monitoring | ✗ | ○P | ● | ● | ● | ● |
| Remote wipe | ✗ | ✗ | ● | ✗ | ● | ● |
| Remote lock | ✗ | ✗ | ● | ✗ | ● | ● |
| Self-service portal | ✗ | ●P | ● | ○ | ● | ● |
| Zero-touch deployment | ✗ | ✗ | ● | ● | ● | ● |
| MDM capabilities | ✗ | ✗ | ● | ✗ | ● | ● |
Assessment notes:
- Snipe-IT does not provide endpoint management; it is purely asset tracking
- GLPI requires plugins for most endpoint management features
- Fleet provides MDM for Apple and configuration management via osquery for all platforms
- Foreman excels at server provisioning and configuration management
- Intune and Jamf Pro provide full MDM and endpoint management capabilities
Integration capabilities
| Capability | Snipe-IT | GLPI | Fleet | Foreman | Intune | Jamf Pro |
|---|---|---|---|---|---|---|
| REST API | ● | ● | ● | ● | ● | ● |
| GraphQL API | ✗ | ✗ | ✗ | ✗ | ● | ✗ |
| Webhooks | ● | ● | ● | ○ | ●$ | ● |
| LDAP/AD sync | ● | ● | ✗ | ● | ● | ● |
| SAML SSO | ● | ● | ● | ● | ● | ● |
| OIDC SSO | ● | ● | ● | ● | ● | ● |
| SCIM provisioning | ✗ | ✗ | ● | ✗ | ● | ● |
| SIEM integration | ○ | ● | ● | ○ | ● | ● |
| ServiceNow integration | ○ | ●P | ○ | ○ | ● | ● |
| Jira integration | ●P | ●P | ○ | ○ | ●$ | ● |
Assessment notes:
- All tools provide REST APIs with varying coverage
- Microsoft Intune uses Microsoft Graph API with GraphQL capabilities
- Fleet provides extensive osquery-based integrations with SIEM and security tools
- GLPI relies heavily on plugins for third-party integrations
Security capabilities
| Capability | Snipe-IT | GLPI | Fleet | Foreman | Intune | Jamf Pro |
|---|---|---|---|---|---|---|
| Role-based access control | ● | ● | ● | ● | ● | ● |
| Multi-factor authentication | ● | ● | ● | ● | ● | ● |
| SSO enforcement | ● | ● | ● | ● | ● | ● |
| API token scoping | ○ | ○ | ● | ○ | ● | ● |
| Audit logging | ● | ● | ● | ● | ● | ● |
| Encryption at rest | ● | ○ | ● | ● | ● | ● |
| SOC 2 certification | ●$ | ✗ | ● | ✗ | ● | ● |
| ISO 27001 certification | ●$ | ✗ | ✗ | ✗ | ● | ● |
| GDPR compliance tools | ○ | ● | ○ | ○ | ● | ● |
Assessment notes:
- Commercial tools (Intune, Jamf Pro) have extensive compliance certifications
- Snipe-IT hosted version provides SOC 2 compliance
- Self-hosted FOSS tools require organisations to implement their own compliance controls
Individual tool assessments
Snipe-IT
Metadata
| Attribute | Value |
|---|---|
| Type | Open source |
| Licence | AGPL-3.0 |
| Current version | 7.x (Laravel 11) |
| Deployment options | Self-hosted, vendor-hosted cloud |
| Source repository | https://github.com/grokability/snipe-it |
| Documentation | https://snipe-it.readme.io/docs |
Overview
Snipe-IT is a web-based IT asset management system built on Laravel (PHP framework). The project has been actively developed since 2013 and provides comprehensive asset lifecycle tracking without endpoint agent capabilities. Snipe-IT focuses on the administrative aspects of asset management: tracking ownership, location, warranty status, depreciation, and licence compliance.
The architecture follows a traditional web application model with MySQL or MariaDB backend. Snipe-IT does not include agents for automated inventory collection; instead, it relies on manual data entry, CSV imports, or API integrations with other tools that perform discovery. This design makes it suitable for organisations that need robust asset tracking but already have separate tools for endpoint management.
Snipe-IT is developed by Grokability, Inc., which offers both the open source version and a hosted cloud service with additional support options.
Capability assessment
Snipe-IT excels at traditional IT asset management functions. The asset model supports hardware tracking with component relationships, consumable inventory with quantity management, and software licence tracking with seat counting. Each asset maintains a complete history of assignments, status changes, and modifications.
The depreciation engine supports multiple calculation methods including straight-line and declining balance, with scheduled reports for financial planning. Warranty tracking includes expiry alerting and integration with purchase order information.
For organisations requiring barcode-based workflows, Snipe-IT generates and scans 1D and 2D barcodes including QR codes. Mobile-friendly responsive design supports field-based asset audits.
The REST API provides comprehensive programmatic access to all features, enabling integration with discovery tools, help desk systems, and custom automation. Third-party libraries exist for Python, PowerShell, Go, and other languages.
Key strengths
- Comprehensive traditional ITAM: Full asset lifecycle support including depreciation, warranties, consumables, and licence tracking exceeds most endpoint management tools
- Active development: Frequent releases with responsive community support
- Clean API: Well-documented REST API with OpenAPI specification enables reliable integrations
- Flexible deployment: Self-hosted at no cost or managed cloud service with 99.99% SLA
- Low resource requirements: Runs on modest hardware; suitable for small organisations
Key limitations
- No endpoint agents: Cannot perform automated inventory collection; requires external discovery tools or manual entry
- No configuration management: Does not deploy software or enforce endpoint configurations
- No MDM capabilities: Cannot manage mobile devices or enforce security policies
- Limited real-time visibility: Asset status reflects last manual update or API import, not live device state
Deployment and operations
Self-hosted deployment requires a LAMP stack (Linux, Apache/Nginx, MySQL/MariaDB, PHP 8.1+). Official Docker images are available. The installation process is well-documented with active community support.
System requirements for self-hosted deployment:
- 2 CPU cores minimum
- 2 GB RAM minimum (4 GB recommended for larger deployments)
- 20 GB storage (varies with attachment storage needs)
- MySQL 8.0+ or MariaDB 10.6+
The hosted cloud service eliminates infrastructure management and provides automatic updates, backups, and uptime guarantees.
Integration capabilities
| Integration type | Implementation |
|---|---|
| REST API | Full CRUD operations on all objects, API token authentication |
| LDAP/AD | User and group synchronisation |
| SSO | SAML 2.0, OIDC, Google Workspace |
| Webhooks | Configurable event notifications |
| Barcode | 1D, 2D, QR code generation and scanning |
Cost analysis
| Deployment | Cost model | Estimated cost |
|---|---|---|
| Self-hosted | Free (AGPL-3.0) | Infrastructure costs only |
| Cloud hosted | Per-asset/month | From $3.33/asset/month, minimum 25 assets |
| Enterprise support | Annual subscription | Contact vendor |
Organisational fit
Best suited for:
- Organisations needing comprehensive asset lifecycle management (depreciation, warranties, procurement)
- Environments with existing discovery or endpoint management tools needing a dedicated ITAM layer
- Budget-constrained organisations requiring self-hosted deployment
- Organisations with barcode-based asset audit workflows
Less suitable for:
- Organisations requiring automated endpoint inventory without additional tools
- Environments needing unified asset tracking and endpoint management in one platform
- Organisations primarily managing mobile devices
GLPI
Metadata
| Attribute | Value |
|---|---|
| Type | Open source |
| Licence | GPL-3.0 |
| Current version | 11.0 |
| Deployment options | Self-hosted, vendor-hosted cloud |
| Source repository | https://github.com/glpi-project/glpi |
| Documentation | https://glpi-user-documentation.readthedocs.io |
Overview
GLPI (Gestionnaire Libre de Parc Informatique) is an open source IT service management platform combining asset management, help desk, and ITIL-aligned service management. Developed since 2003, GLPI provides comprehensive asset tracking with native automated inventory through the GLPI Agent.
The platform architecture separates the core GLPI application from the inventory agent. GLPI Agent supports Windows, Linux, macOS, and Android, collecting hardware specifications, installed software, and network configuration. The agent reports to GLPI via HTTP/HTTPS on configurable schedules.
GLPI is developed by Teclib’, which also offers GLPI Network (commercial support) and a cloud-hosted service. The plugin ecosystem extends functionality significantly; essential plugins include FusionInventory (legacy inventory), FormCreator (custom forms), and various integrations.
Capability assessment
GLPI provides integrated asset management and ITSM functionality. The asset management module tracks computers, network equipment, peripherals, software, and consumables with full lifecycle support including financial tracking, contracts, and suppliers.
The GLPI Agent collects detailed inventory automatically:
- Hardware: CPU, memory, storage, firmware versions, BIOS information
- Software: Installed applications with versions and publishers
- Network: Interfaces, IP addresses, connections
- Operating system: Type, version, patch level
The ITSM component provides ticket management, problem management, change management, and a service catalogue. Assets link directly to tickets, enabling incident tracking and impact analysis.
Entity separation supports multi-tenant deployments where organisations or departments maintain separate asset views with delegated administration.
Key strengths
- Integrated ITSM: Combined asset management and service desk reduces tool sprawl
- Native inventory agent: Cross-platform automated discovery without third-party dependencies
- ITIL alignment: Formal service management processes for mature IT operations
- Plugin ecosystem: Extensive customisation through marketplace plugins
- Entity separation: Multi-tenant architecture suits federated organisations
- Data centre features: Network topology, rack management, power distribution tracking
Key limitations
- Complexity: Full ITSM platform is more complex than dedicated ITAM tools
- Documentation gaps: Documentation quality varies; some features poorly documented
- Plugin dependencies: Essential features require plugins with varying maintenance status
- No MDM: Cannot manage mobile devices or enforce endpoint configurations
- Limited real-time management: Inventory is periodic; no real-time query capability
Deployment and operations
Self-hosted deployment requires a LAMP/LEMP stack with PHP 8.1+ and MySQL 8.0+ or MariaDB 10.5+. Installation involves web-based setup wizard after extracting files.
System requirements:
- 2 CPU cores minimum (4+ recommended)
- 4 GB RAM minimum (8 GB+ recommended)
- 20 GB storage (more for attachments and inventory data)
- PHP 8.1+ with required extensions
- MySQL 8.0+ or MariaDB 10.5+
GLPI Agent deployment:
- Windows: MSI installer, GPO deployment supported
- Linux: RPM/DEB packages available
- macOS: PKG installer
- Android: APK for mobile inventory
Integration capabilities
| Integration type | Implementation |
|---|---|
| REST API | Full CRUD operations, session-based authentication |
| LDAP/AD | User synchronisation, group mapping |
| SSO | SAML 2.0, OIDC, CAS |
| Webhooks | Event notifications via API |
| IMAP/POP3 ticket creation, SMTP notifications | |
| Plugins | Marketplace with 200+ extensions |
Cost analysis
| Deployment | Cost model | Estimated cost |
|---|---|---|
| Self-hosted | Free (GPL-3.0) | Infrastructure costs only |
| GLPI Network | Annual subscription | From €4,750/year (includes support) |
| Cloud hosted | Per-user/month | Contact vendor |
Organisational fit
Best suited for:
- Organisations wanting integrated asset management and help desk
- Environments requiring ITIL-aligned service management processes
- Multi-entity organisations needing delegated administration
- Organisations with data centre infrastructure requiring topology tracking
Less suitable for:
- Small organisations needing simple asset tracking without ITSM
- Environments requiring real-time endpoint management
- Organisations primarily managing Apple or mobile devices
Fleet
Metadata
| Attribute | Value |
|---|---|
| Type | Open source |
| Licence | MIT (free), Fleet Premium (commercial) |
| Current version | 4.x |
| Deployment options | Self-hosted, vendor-hosted cloud |
| Source repository | https://github.com/fleetdm/fleet |
| Documentation | https://fleetdm.com/docs |
Overview
Fleet is an open source device management platform built on osquery, the open source endpoint agent originally developed by Facebook. Fleet provides cross-platform visibility into endpoint state through SQL-based queries, combined with MDM capabilities for macOS, Windows, iOS, and iPadOS.
The architecture centres on osquery’s ability to expose operating system state as queryable tables. Fleet adds a management server for enrolling devices, scheduling queries, aggregating results, and enforcing policies. The fleetd agent wraps osquery with additional capabilities including MDM enrollment, software deployment, and secure certificate management.
Fleet is developed by Fleet Device Management Inc., which offers both the open source core and Fleet Premium with additional enterprise features.
Capability assessment
Fleet’s core strength is endpoint visibility through osquery. Administrators write SQL queries against 300+ osquery tables covering:
- System information: hardware, OS, users, groups
- Security: certificates, browser extensions, firewall rules, encryption status
- Software: installed applications, running processes, startup items
- Network: interfaces, connections, DNS cache, routing
Queries can run on-demand (live queries) or on schedules (scheduled queries). Results aggregate in Fleet for reporting, export, or integration with SIEM platforms.
Fleet’s MDM capabilities (added in 2023-2024) include:
- macOS: Configuration profiles, software deployment, FileVault management
- Windows: Configuration profiles (via Intune-compatible schema), software deployment
- iOS/iPadOS: Device enrollment, configuration profiles, app deployment
Fleet Premium adds features including vulnerability detection (matching installed software against CVE databases), automations, and premium support.
Key strengths
- Deep endpoint visibility: osquery’s SQL-based approach enables granular queries impossible with traditional inventory agents
- Cross-platform consistency: Same query language across macOS, Windows, Linux, iOS, iPadOS
- GitOps workflow: Configuration as code enables version-controlled fleet management
- Real-time queries: Live query capability provides instant answers about fleet state
- Vulnerability detection: Premium feature matches software inventory against CVE databases
- Transparency: Open source agent; users can verify exactly what data is collected
- Security integrations: Native connectors for Snowflake, Splunk, Elastic, Vanta
Key limitations
- Complexity: osquery learning curve steeper than traditional management tools
- Resource consumption: osquery agent consumes more resources than lightweight inventory agents
- Premium features: Vulnerability detection and some automations require paid tier
- Limited traditional ITAM: No financial tracking, depreciation, or warranty management
- Newer MDM: MDM capabilities less mature than Intune or Jamf Pro
Deployment and operations
Self-hosted deployment requires MySQL 8.0+ and Redis 6.0+. Fleet server is distributed as a Go binary or Docker image. Kubernetes deployment via Helm chart is documented.
System requirements for Fleet server (managing 10,000 hosts):
- 4 CPU cores
- 8 GB RAM
- MySQL with 100 GB storage
- Redis with 2 GB memory
fleetd agent requirements:
- macOS 12+, Windows 10+, major Linux distributions
- 50-100 MB RAM typical usage
- 100 MB disk space
Integration capabilities
| Integration type | Implementation |
|---|---|
| REST API | Comprehensive API, token authentication |
| SSO | SAML 2.0, OIDC, Google Workspace, Okta |
| SIEM | Native Splunk, Elastic, Snowflake connectors |
| SCIM | User provisioning from identity providers |
| Webhooks | Configurable event notifications |
| GitOps | fleetctl CLI, YAML configuration |
Cost analysis
| Deployment | Cost model | Estimated cost |
|---|---|---|
| Self-hosted (free tier) | Free (MIT) | Infrastructure costs only |
| Self-hosted (Premium) | Per-device/month | $5/device/month |
| Cloud hosted (Premium) | Per-device/month | $7/device/month |
Organisational fit
Best suited for:
- Security-conscious organisations needing deep endpoint visibility
- Engineering-oriented teams comfortable with SQL and GitOps workflows
- Cross-platform environments (macOS, Windows, Linux, iOS)
- Organisations integrating endpoint data with SIEM or data platforms
Less suitable for:
- Organisations needing traditional ITAM (depreciation, warranties, procurement)
- Teams preferring GUI-based management over query-based approaches
- Small organisations without security engineering capacity
- Apple-only environments (Jamf Pro offers deeper Apple integration)
Foreman + Katello
Metadata
| Attribute | Value |
|---|---|
| Type | Open source |
| Licence | GPL-2.0 |
| Current version | Foreman 3.16, Katello 4.18 |
| Deployment options | Self-hosted only |
| Source repository | https://github.com/theforeman/foreman |
| Documentation | https://docs.theforeman.org |
Overview
Foreman is an open source lifecycle management platform for server provisioning, configuration, and orchestration. Katello is a Foreman plugin adding content management capabilities including repository mirroring, content views, and subscription management. Together, they provide comprehensive server management for enterprise Linux environments.
The architecture integrates multiple components: Foreman provides the core web interface and host management, Katello manages content (RPM/DEB packages, Puppet modules), and Smart Proxies distribute services (DHCP, DNS, TFTP, Pulp) across geographic locations.
Foreman with Katello is the upstream project for Red Hat Satellite, the commercial offering with support subscriptions.
Capability assessment
Foreman + Katello excels at enterprise Linux server management:
Provisioning:
- Bare metal: PXE boot with kickstart/preseed automation
- Virtual: VMware, RHEV, oVirt, Proxmox, cloud providers
- Container: Kubernetes and OpenShift integration
- Discovery: Automatic detection of unprovisioned hardware
Configuration management:
- Puppet: Native Puppet integration with ENC (External Node Classifier)
- Ansible: Ansible integration for playbook execution
- Salt: Salt master integration available
Content management (Katello):
- Repository mirroring for RHEL, CentOS, Ubuntu, custom repos
- Content views for controlling package versions across environments
- Lifecycle environments (Dev → QA → Production)
- Subscription management for Red Hat systems
Key strengths
- Comprehensive Linux management: End-to-end lifecycle from provisioning through decommissioning
- Content management: Granular control over package versions across environments
- Multi-tool orchestration: Integrates Puppet, Ansible, Salt for configuration management
- Geographic distribution: Smart Proxy architecture supports distributed deployments
- Red Hat alignment: Upstream of Red Hat Satellite; compatible practices
- Scale: Designed for thousands of hosts across multiple locations
Key limitations
- Complexity: Steep learning curve; requires significant expertise to deploy and operate
- Linux-focused: Limited support for Windows; no macOS or mobile device management
- Self-hosted only: No cloud-hosted option; requires infrastructure investment
- Resource intensive: Server requirements are substantial for the full stack
- No traditional ITAM: Financial tracking, depreciation, warranty management not included
Deployment and operations
Foreman with Katello requires Enterprise Linux 8 or 9 (RHEL, AlmaLinux, Rocky Linux). Installation uses the foreman-installer, a Puppet-based deployment tool.
Minimum system requirements:
- 4 CPU cores
- 20 GB RAM
- 150 GB storage (more for content mirroring)
- Enterprise Linux 8 or 9
- Dedicated server recommended
Content storage requirements scale with mirrored repositories. A typical deployment mirroring RHEL, EPEL, and common repositories requires 300+ GB for content.
Integration capabilities
| Integration type | Implementation |
|---|---|
| REST API | Comprehensive API, basic and OAuth authentication |
| LDAP/AD | User synchronisation and authentication |
| SSO | SAML 2.0, Kerberos, FreeIPA |
| Configuration management | Puppet, Ansible, Salt |
| Virtualisation | VMware, oVirt, Proxmox, cloud providers |
| Compute resources | AWS, Azure, GCP, OpenStack |
Cost analysis
| Deployment | Cost model | Estimated cost |
|---|---|---|
| Self-hosted | Free (GPL-2.0) | Infrastructure and expertise costs |
| Red Hat Satellite | Subscription | Contact Red Hat for nonprofit pricing |
Organisational fit
Best suited for:
- Organisations with substantial Linux server estates requiring lifecycle management
- DevOps teams implementing infrastructure as code practices
- Environments requiring controlled software distribution across lifecycle stages
- Organisations comfortable with self-hosted infrastructure and Puppet/Ansible expertise
Less suitable for:
- Organisations primarily managing workstations or mobile devices
- Small organisations without dedicated Linux systems administration capacity
- Environments requiring Windows or macOS management
- Organisations seeking managed/hosted solutions
Microsoft Intune
Metadata
| Attribute | Value |
|---|---|
| Type | Commercial |
| Licence | Proprietary (subscription) |
| Current version | SaaS (continuously updated) |
| Deployment options | Cloud only (Microsoft-managed) |
| Documentation | https://learn.microsoft.com/en-us/intune |
Overview
Microsoft Intune is a cloud-based unified endpoint management (UEM) service integrated into the Microsoft 365 ecosystem. Intune manages Windows, macOS, iOS, iPadOS, Android, and Linux devices through a single console accessible via the Microsoft Intune admin center.
Intune operates as a SaaS service with no on-premises components required. Device enrollment connects endpoints to the Intune service, where administrators configure policies, deploy applications, and monitor compliance. Intune integrates deeply with Microsoft Entra ID (formerly Azure AD) for identity, Defender for Endpoint for security, and Autopilot for zero-touch deployment.
Capability assessment
Intune provides comprehensive endpoint management across platforms:
Device management:
- Windows: Full MDM with device configuration, BitLocker management, Windows Update for Business
- macOS: Device enrollment, configuration profiles, FileVault management
- iOS/iPadOS: Supervised and user enrollment, app deployment, managed settings
- Android: Work profile, fully managed, dedicated device modes
- Linux: Basic enrollment and compliance (Ubuntu, RHEL)
Configuration management:
- Settings catalog: Granular policy configuration with 5,000+ settings
- Configuration profiles: Templates for common scenarios
- Endpoint security: Attack surface reduction, firewall, antivirus policies
- Compliance policies: Define requirements, automated remediation
Application management:
- Microsoft 365 apps: Native deployment and update management
- Win32 apps: MSI, MSIX, EXE deployment with detection rules
- Store apps: Microsoft Store, Apple App Store, Google Play
- LOB apps: Custom line-of-business application deployment
Key strengths
- Microsoft ecosystem integration: Seamless connection with Microsoft 365, Entra ID, Defender
- Cross-platform coverage: Single console for Windows, macOS, iOS, Android
- Zero-touch deployment: Windows Autopilot and Apple Business Manager integration
- Compliance-driven access: Conditional Access policies enforce device compliance
- Copilot integration: AI-assisted policy creation and troubleshooting
- Scale: Manages millions of devices across Microsoft’s customer base
- Nonprofit programme: Discounted pricing available through Microsoft Nonprofits
Key limitations
- Cloud-only: No on-premises deployment option; requires internet connectivity
- Microsoft dependency: Deep tie to Microsoft ecosystem may limit flexibility
- Complexity: Extensive feature set creates learning curve
- Cost structure: Per-user licensing can be expensive for large workforces
- US jurisdiction: Data processed through Microsoft’s cloud (CLOUD Act applies)
- Linux support: Linux management is less mature than Windows or macOS
Deployment and operations
Intune is a SaaS service requiring no infrastructure deployment. Administrators access the Intune admin center via web browser.
Licensing requirements:
- Microsoft Intune Plan 1: Included in Microsoft 365 E3/E5, Business Premium
- Microsoft Intune Plan 2: Add-on for advanced features
- Microsoft Intune Suite: Comprehensive add-on including Endpoint Privilege Management
Device enrollment methods vary by platform:
- Windows: Autopilot, Azure AD join, hybrid Azure AD join
- macOS: Apple Business Manager, user enrollment
- iOS/iPadOS: Apple Business Manager, user enrollment
- Android: Android Enterprise enrollment
Integration capabilities
| Integration type | Implementation |
|---|---|
| Microsoft Graph API | Comprehensive API for automation |
| Azure AD/Entra ID | Native identity integration |
| Defender for Endpoint | Security integration |
| Conditional Access | Compliance-based access control |
| SIEM | Microsoft Sentinel, third-party via API |
| ITSM | ServiceNow, third-party integrations |
Cost analysis
| Plan | Nonprofit price | Commercial price |
|---|---|---|
| Microsoft 365 Business Basic (no Intune) | Free (300 users) | $6/user/month |
| Microsoft 365 Business Premium (includes Intune) | $5.50/user/month | $22/user/month |
| Microsoft 365 E3 (includes Intune) | $9/user/month | $36/user/month |
| Microsoft Intune Plan 1 (standalone) | Varies | $8/user/month |
| Microsoft Intune Suite (add-on) | Varies | $10/user/month |
Note: Microsoft changed nonprofit grant offerings in 2025. Verify current eligibility and pricing through Microsoft Nonprofits programme.
Organisational fit
Best suited for:
- Organisations already invested in Microsoft 365 ecosystem
- Mixed device environments (Windows, macOS, mobile)
- Organisations requiring Conditional Access integration with identity
- Environments prioritising cloud-native management without infrastructure
Less suitable for:
- Organisations avoiding Microsoft ecosystem lock-in
- Environments requiring on-premises management
- Apple-focused organisations (Jamf provides deeper Apple integration)
- Organisations with data sovereignty concerns regarding US cloud providers
Jamf Pro
Metadata
| Attribute | Value |
|---|---|
| Type | Commercial |
| Licence | Proprietary (subscription) |
| Current version | 11.22 |
| Deployment options | Cloud-hosted, self-hosted (on-premises or private cloud) |
| Documentation | https://learn.jamf.com |
Overview
Jamf Pro is an Apple-focused enterprise management platform providing device enrollment, configuration, security, and application management for macOS, iOS, iPadOS, tvOS, visionOS, and watchOS. With over 20 years of Apple management expertise, Jamf provides same-day support for new Apple operating system releases.
Jamf Pro operates as either a cloud-hosted service (Jamf Cloud) or self-hosted deployment on customer infrastructure. The platform integrates with Apple Business Manager (formerly DEP and VPP) for zero-touch device enrollment and app distribution.
Capability assessment
Jamf Pro provides comprehensive Apple device management:
Device enrollment:
- Zero-touch deployment via Apple Business Manager
- User-initiated enrollment for BYOD
- Automated device setup and configuration
- Pre-stage enrollment customisation
Configuration management:
- Configuration profiles: Full Apple payload support
- Scripts: Custom script deployment and execution
- Policies: Triggered actions based on events or schedules
- Blueprints: Declarative device management (introduced 2024)
Application management:
- Mac App Store: VPP app deployment
- Self Service: User-initiated software catalogue
- Patch management: Automated software updates
- Package deployment: PKG, DMG installer distribution
Security:
- FileVault management: Encryption key escrow
- Gatekeeper: Application allow/block lists
- Firmware password: NVRAM protection
- Jamf Protect integration: Endpoint security
Key strengths
- Apple expertise: Deepest integration with Apple management frameworks
- Same-day support: New macOS/iOS versions supported on release day
- Self Service: Polished end-user portal for software and support
- Deployment flexibility: Cloud or self-hosted to meet data residency needs
- Jamf ecosystem: Integrates with Jamf Connect (identity), Jamf Protect (security)
- Community: Active Jamf Nation community with peer support
- Education pricing: Substantial discounts for educational institutions
Key limitations
- Apple-only: No support for Windows, Linux, or Android devices
- Cost: Higher per-device cost than some alternatives
- Complexity: Full feature utilisation requires Apple device management expertise
- No traditional ITAM: Financial tracking and depreciation not included
- Self-hosted overhead: On-premises deployment requires infrastructure management
Deployment and operations
Jamf Cloud (hosted):
- No infrastructure required
- Automatic updates and maintenance
- Regional data centres available
Self-hosted requirements:
- macOS Server, Linux, or Windows Server
- MySQL or MariaDB database
- 8 GB RAM minimum
- 150 GB storage minimum
Jamf agent deployment:
- Jamf Management Framework installed on managed devices
- Supports Apple Remote Desktop for initial deployment
- Bootstrap package deployment via Apple Business Manager
Integration capabilities
| Integration type | Implementation |
|---|---|
| REST API | Comprehensive Jamf Pro API |
| Azure AD/Entra ID | SCIM provisioning, SSO |
| Okta | Identity integration |
| Google Workspace | Identity integration |
| SIEM | Syslog, webhook, native integrations |
| Jamf ecosystem | Connect, Protect, Safe Internet |
Cost analysis
| Tier | Business price | Education price |
|---|---|---|
| iOS/iPadOS/tvOS | $3.33/device/month | $0.75/device/month |
| macOS | $6.67/device/month | $1.50/device/month |
| Fundamentals bundle | $5.75/device/month | Contact sales |
| Business bundle | $10/device/month | Contact sales |
Note: Education pricing requires verification. Nonprofit-specific pricing is not formally published but organisations should contact Jamf directly.
Organisational fit
Best suited for:
- Organisations with Apple-focused device fleets
- Environments requiring same-day support for Apple OS releases
- Schools and higher education institutions
- Organisations valuing self-hosted deployment for data control
- Teams needing polished end-user self-service experience
Less suitable for:
- Mixed-platform environments requiring Windows/Android management
- Small organisations with limited Apple device management expertise
- Budget-constrained organisations prioritising cost over Apple-specific features
- Organisations primarily managing servers rather than workstations
Selection guidance
Decision framework
+----------------------------------+ | What is the primary requirement? | +----------------+-----------------+ | +---------------------------+---------------------------+ | | | v v v+--------+--------+ +--------+--------+ +--------+--------+| Asset lifecycle | | Endpoint | | Server || management | | management | | provisioning || (inventory, | | (config, MDM, | | (Linux || depreciation) | | compliance) | | infrastructure) |+-----------------+ +-----------------+ +-----------------+ | | | v v v+--------+--------+ +--------+--------+ +--------+--------+| Need ITSM/help | | Primary | | Foreman + || desk too? | | platform? | | Katello |+--------+--------+ +--------+--------+ +-----------------+ | | | v v v Yes No +---------+----------+ | | | | | v v v v v+-------+ +--------+ Apple Microsoft Cross-platform| GLPI | |Snipe-IT| | | |+-------+ +--------+ v v v +------+ +-------+ +------+ | Jamf | |Intune | | Fleet| | Pro | | | | | +------+ +-------+ +------+Recommendations by organisational context
Organisations with minimal IT capacity
Primary recommendation: Snipe-IT (hosted) or Microsoft Intune
For asset tracking only, Snipe-IT’s hosted service provides comprehensive ITAM without infrastructure management. The interface is straightforward, and support is included with hosting plans.
For endpoint management with Microsoft 365 already in use, Intune requires no infrastructure and integrates with existing identity. The nonprofit programme provides substantial discounts.
Implementation approach:
- Start with Snipe-IT hosted for asset tracking (manual entry or CSV import)
- Add Intune if endpoint configuration management is needed
- Connect Snipe-IT to Intune via API for automated inventory updates
Organisations with established IT functions
Primary recommendation: GLPI + Fleet or Intune + dedicated ITAM
GLPI provides integrated asset management and service desk, reducing tool sprawl. GLPI Agent automates inventory collection. For organisations needing deeper endpoint visibility, Fleet’s osquery-based approach complements GLPI’s ITAM strengths.
For Microsoft-centric environments, Intune handles endpoint management while a dedicated ITAM tool (Snipe-IT or GLPI) manages financial tracking and lifecycle data that Intune does not address.
Implementation approach:
- Deploy GLPI for integrated ITAM and service desk
- Deploy GLPI Agent or Fleet for automated inventory
- Integrate with existing directory services (AD/LDAP)
- Configure compliance policies and reporting
Apple-focused organisations
Primary recommendation: Jamf Pro
For organisations where Apple devices constitute the majority of the fleet, Jamf Pro provides the deepest integration with Apple management frameworks. Same-day OS support ensures compatibility as Apple releases updates.
Implementation approach:
- Enroll devices via Apple Business Manager
- Configure Jamf Pro policies and profiles
- Deploy Self Service for end-user software access
- Consider Jamf Protect add-on for endpoint security
Complement with: Snipe-IT for financial asset tracking (depreciation, warranties) that Jamf Pro does not provide.
Organisations with specific data sovereignty requirements
Primary recommendation: Self-hosted FOSS solutions
For organisations with strict data residency requirements or concerns about US cloud provider jurisdiction, self-hosted open source solutions provide complete control over data location.
Options by function:
- Asset tracking: Snipe-IT (self-hosted)
- Asset tracking + ITSM: GLPI (self-hosted)
- Endpoint visibility: Fleet (self-hosted)
- Server provisioning: Foreman + Katello (self-hosted)
Note: Self-hosting requires infrastructure and expertise. Organisations should assess whether the data sovereignty benefit justifies the operational overhead.
Large or federated organisations
Primary recommendation: GLPI or commercial tools with multi-tenant support
GLPI’s entity separation architecture supports delegated administration across organisational units. Each entity maintains separate asset views while central IT retains oversight.
For well-funded organisations, Microsoft Intune’s integration with Microsoft 365 and Entra ID provides unified management across geographic and organisational boundaries.
Implementation considerations:
- Define entity/tenant structure matching organisational hierarchy
- Establish central policies with local administration delegation
- Implement reporting that aggregates across entities
- Plan synchronisation with federated directory services
Migration paths
| From | To | Complexity | Approach |
|---|---|---|---|
| Spreadsheets | Snipe-IT | Low | CSV import; manual cleanup |
| Snipe-IT | GLPI | Medium | Export CSV; import to GLPI; map custom fields |
| GLPI | Snipe-IT | Medium | Export CSV; map fields; lose ITSM history |
| Any ITAM | Intune | Medium | Enroll devices; inventory populates automatically |
| Any ITAM | Fleet | Medium | Deploy fleetd; inventory populates via osquery |
| Intune | Jamf Pro | High | Re-enroll devices; recreate policies; Apple devices only |
| Jamf Pro | Intune | High | Re-enroll devices; recreate profiles; feature mapping required |
Resources and references
Official documentation
| Tool | Documentation URL | API reference |
|---|---|---|
| Snipe-IT | https://snipe-it.readme.io/docs | https://snipe-it.readme.io/reference |
| GLPI | https://glpi-user-documentation.readthedocs.io | Built-in at /apirest.php |
| Fleet | https://fleetdm.com/docs | https://fleetdm.com/docs/rest-api |
| Foreman | https://docs.theforeman.org | https://theforeman.org/api |
| Intune | https://learn.microsoft.com/en-us/intune | https://learn.microsoft.com/en-us/graph |
| Jamf Pro | https://learn.jamf.com | https://developer.jamf.com |
Nonprofit programme links
| Vendor | Programme URL |
|---|---|
| Microsoft | https://nonprofit.microsoft.com |
| Snipe-IT | https://snipeitapp.com/pricing (contact for nonprofit pricing) |
| Jamf | https://www.jamf.com/pricing/education-pricing (contact for nonprofit) |
Relevant standards
| Standard | Description | URL |
|---|---|---|
| ISO/IEC 19770-1 | IT asset management standard | https://www.iso.org/standard/68531.html |
| ITIL 4 | IT service management framework | https://www.axelos.com/best-practice-solutions/itil |
| CIS Benchmarks | Security configuration standards | https://www.cisecurity.org/cis-benchmarks |
See also
- Asset Management -Concepts and processes for managing IT assets
- Configuration Management -CMDB design and configuration tracking
- Hardware Lifecycle -Device lifecycle from procurement to disposal
- Identity and Access Management -Identity systems that integrate with endpoint management
- ITSM and Help Desk -Service desk tools that complement asset management
- Security and Monitoring -Security tools that integrate with endpoint management