Zero-Trust Architecture · Cloud your way · Matrix42 Native
Push-based communication with no inbound firewall rules required
Collectors initiate all connections to the server. No inbound ports, no server polling.
Multiple authentication layers ensure only authorized collectors can submit data.
Better than all the others — Deploy in minutes, not weeks
LLDP, ARP, DNS — discovers switches, routers, servers automatically
No SNMP strings, no router passwords, no credential management
Reduced attack surface, lower costs, minimal maintenance
Lightweight agents that scale from 10 to 10,000+ endpoints effortlessly
<1% CPU when idle
Scales linearly
Works on slow links
Adjust collection intervals to match your needs — from real-time to daily updates
Scale from 10 to 10,000+ endpoints with predictable resource usage
Run anywhere, connect everything
Whether you're running containers, virtual machines, or bare metal — on-premises or in the cloud — Enterprise Inventory adapts to your infrastructure. Choose the deployment scenario that fits your network architecture.
Run the central server or relay gateway anywhere
Self-contained binaries with embedded database. Deploy in seconds on any platform — Docker, Kubernetes, Windows, Linux, macOS, or dedicated hardware appliances.
Lightweight agents for every endpoint
Small footprint (20-40 MB RAM) agents that run as system services. Deploy via MSI, GPO, Intune, SCCM, or any deployment tool you already use.
Choose the architecture that matches your network topology
Push directly to CMDB — simplest setup
Bridge DMZ & air-gapped networks
Full UI + Matrix42 Core & Pro
GDPR compliant · Read-only operations · No personal data
We can't leak what we don't collect. Your data stays yours—forever.
Technical metadata only
Can't leak what you don't store
Not in memory, config, or storage
No SNMP strings or router passwords
Zero secrets = zero attack surface
Unlike agentless — local agents with read-only access
Privacy guaranteed
100% on-premises · No cloud dependencies · Full compliance
No cloud uploads. No third-party servers. Air-gapped, classified, and highly regulated environments fully supported.
100% on-premises. Air-gapped, DMZ, isolated zones supported.
Deploy on your servers, containers, or VM clusters.
Local storage. You control retention, backups, deletion.
Organizations have legitimate interest in maintaining accurate IT asset inventories.
We collect only technical metadata necessary for asset management—no special categories of personal data, no profiling, no behavioral tracking. Just hardware and software facts.
Audit logs, data minimization, and read-only operations support regulatory requirements
Multi-layer hardware fingerprinting for bulletproof asset lifecycle tracking
Track every device from purchase to decommission—even through OS reinstalls, hostname changes, and hardware swaps
Cryptographic + fallback identifiers ensure 100% device tracking
Cryptographic endorsement key
Serial + UUID
Processor signature
Firmware serials
Fallback cascade: If TPM unavailable, uses motherboard → CPU → BIOS serials for persistent identity
Seamless Matrix42 connectivity with powerful dependency mapping and observability
Not just data collection—automatic relationship mapping, change tracking, and anomaly detection
Real-time asset data flows into Matrix42 Enterprise Platform
Deploy collectors enterprise-wide using your existing infrastructure
Software inventory data ready for license optimization
Automatically discover and link relationships across your entire infrastructure
Auto-link switches, routers, gateways
Device-to-device dependencies
Identify vendors automatically
Visual topology in Matrix42
Start managing your enterprise infrastructure with confidence