About RayVentory

Smarter software and hardware inventory.

RayVentory provides a comprehensive inventory of your hardware and software and offers a variety of scanning methods to collect the best quality data from increasingly complex IT landscapes. The integration of different data sources (SaaS, PaaS, IaaS and on-premises) as well as the preparation of clear dashboards and reports serve as a basis for decision-making and enable you to manage data effectively with the highest data quality.

RayVentory Top Benefits:

  • Different scanning methods
    • Agent-based or agentless inventory of desktops and server systems. The portable scanner (e.g. scan via Active Directory GPO, Puppet, USB stick, ...) makes the detection of unmanaged or disconnected devices possible.
  • Enables compliance for license audits
    • Better preparation for license audits through accurate and up-to-date overview of software assets. Customization is possible to meet security requirements.
  • Saves time and administrative effort
    • Scans can be scheduled regularly, available 24/7. Remote discovery is also possible at any time, as well as network device inventory.

All data in one central solution
IT landscapes are subject to constant change, making it increasingly difficult for companies to maintain transparency. The multitude of hardware and software applications as well as geographically distributed branches ensure that a holistic overview of the IT landscape (internal, hosted and cloud) can‘t be guaranteed.

RayVentory solves this challenge with the flexible inventory methods (agent-based or agentless), an integrated ETL technology and combines differently structured data from various sources in a central data management platform.

This not only makes the information completely transparent, but also provides it in a targeted manner and with the required level of detail. This provides various stakeholders with a basis for deriving high-quality information, which is a prerequisite for making well-founded decisions: One central point for all data.

Intelligent software and hardware inventory
With the help of flexible inventory technologies (agent-based, remote, portable, Zero Touch), RayVentory enables both centralized and decentralized hardware discovery and software inventory in your IT infrastructure.

In addition to classic clients and servers, physical host systems and databases up to industrial machines and sensor data are also recorded.


  • In agent-based inventory, an agent is permanently installed on the target systems so that the inventory can be time,- plan- and event-controlled.

Zero Touch

  • With Zero Touch Inventory, the target devices are queried by RayVentory Scan Engine. The target system remains completely untouched, since the scanner is neither stored locally nor executed.


  • Using the remote technology, the inventory is initiated remotely and executed locally. For this purpose, the scanner is stored temporarily on the target system or executed from a share.


  • The scanning technology is portable and can therefore be executed via thirdparty solutions. However, unmanaged devices can also be scanned, for example by using an USB stick. This means that even high security environments can be scanned efficiently and securely.

Unified Data Concept for intelligent data management
RayVentory Data Hub integrates various data sources into a holistic overview, which is then normalized and visualized in dashboards and reports. From this, important key figures and therefore action decisions can be derived.

Example data sources:

  • Customer data: Inhouse software.
  • Inventory data: SCCM, RayVentory.
  • Cloud / SaaS: AWS, Azure, Office.
  • Asset data: CMDB, RayVentory.
  • Commercial: Reseller price list, Vendor price list.
  • Vulnerability data: Common vulnerabilities and exposures.
  • Compliance: VLSC report Reseller report.
  • Readiness: RayQC Advanced, vendor information.

ETL technology
The integrated ETL technology describes the process of three individual steps with which data from different data sources can be integrated into a target database. In this way, large volumes of data can be processed, cleansed, enriched and prepared within a very short time.

  • Extract: In the first step, all data is extracted from its source systems and made available for transformation.
  • Transform: Afterwards, incorrect data is checked, sorted, completed and adapted to the target database.
  • Load: Finally, this data is integrated into the target database and visualized for further processes.