Location management
With i-doit, you can create a fully traceable map of your locations, buildings, floors and rooms, from network sockets to server cabinets
4.7/5 on Capterra | 2,000+ satisfied customers

The 6 most important functions for location management
Structured recording of locations, buildings, halls, floors and rooms. All information is centrally versioned and auditable.
Floor plans and infrastructure plans are displayed - all objects are visibly linked.
Racks, patch panels, power distributors, UPS and emergency power are precisely modeled.
Relationships are automatically created for all objects so that dependencies can be recognized directly.
IT emergency plans and ISMS measures access the location data directly.
Complete mapping of your physical infrastructure
Why map your physical infrastructure centrally?
Many companies manage information on locations, buildings and rooms in different systems or documents. This makes it difficult to maintain an overview, makes dependencies invisible and increases the risk of changes or disruptions.
i-doit creates a central, logically structured and uniform documentation of your entire physical infrastructure. All locations, buildings, rooms and associated assets are linked in a clearly structured manner and are available at all times in a comprehensible manner. Audits.
Advantages:
- Central information base for all locations and physical assets
- Clear structure instead of distributed lists, plans and files
- Better planning for conversions, expansions and relocations
- High level of transparency for operations, audits and documentation requirements

Floors and room plans (visualized)
How can floors and rooms be clearly visualized?
Without visual representations, spatial relationships are difficult to understand, especially for external service providers or new employees. Errors are often the result of changes or disruptions.
i-doit enables floors and rooms to be visualized using interactive plans. Infrastructure, devices and connections are clearly displayed and directly linked to the associated information.
Advantages:
- Quick orientation thanks to visual floor and room plans
- Clear representation of infrastructure and occupancy
- Fewer errors during changes, maintenance and troubleshooting
- Better collaboration between IT, technology and facility management

Server rooms and server cabinets (visualized)
How do you maintain transparency in server rooms and server racks?
Server rooms are highly complex areas in which missing or outdated documentation can quickly lead to risks. Capacities, power supply or allocations are often not clearly comprehensible.
i-doit visualizes server rooms and server racks in a detailed and structured manner. Installed systems, network and power components are clearly displayed and logically linked.
Advantages:
- Clear visualization of racks and components
- Better planning of capacities, power and space requirements
- Reduced risk during conversions and changes
- Faster analysis in the event of faults and failures
- Support for safe and stable operation

Network connections and cabling
How transparent is your network cabling?
In many organizations, network cabling is only partially documented or distributed across several systems. Troubleshooting is time-consuming and changes carry a high risk.
i-doit documents network connections end-to-end - from the patch panel to switches to the end device. Dependencies and connections are traceable and centrally available at all times.
Advantages:
- End-to-end transparency of all network connections
- Faster and more targeted troubleshooting
- Lower risk in the event of changes and extensions
- Better traceability of dependencies
- Reduced downtimes during operation

Service providers, access and responsibilities
Who is responsible - and who has access?
Unclear responsibilities, missing access overviews or incompletely documented service providers pose a security and compliance risk. Reliable information is often lacking, especially in the event of audits or incidents.
i-doit enables the clear assignment of responsibilities, service providers and access rights to locations, rooms and infrastructure components. All relevant information is centrally documented and traceable.
Advantages:
- Clear assignment of responsibilities per location and room
- Transparent management of access and access rights
- Better control of external service providers
- Support for compliance and audit requirements
- Greater security thanks to clear responsibilities

Book your personal live demo
Our i-doit team will be happy to take the time to advise you personally on your application.
Suitable add-ons
Our add-ons for modular function expansion
Create powerful automations without programming knowledge, simply start them on a schedule or manually at the touch of a button.
Get 4 powerful add-ons for the price of 2! Flows, Documents, Analysis and Forms.
Automatically create documents as PDFs with daily updated data (e.g. hardware handover certificate or disaster recovery plan).
Automate the operation of your data center with the latest data from the CMDB. Events trigger and control further processes.
The maintenance add-on supports the planning, execution and documentation of maintenance and inspections. Maintenance intervals, dates and responsibilities are managed centrally and linked directly to the respective devices, installations or systems.
With the API add-on, data can be automatically read, written and updated in i-doit. Perfect for integrations with ticket systems, inventory tools or your own automations.
Add-on for powerful data analysis. Calculate service costs, check the data quality of the CMDB and carry out failure simulations.
Easily create forms that you can make available to users for simplified data entry. Example: Allow users to document hardware or goods themselves.
Set up an information security management system with risk analysis and management in accordance with ISO 27001.
Integrate the Checkmk2 monitoring system into i-doit. This supports comparisons between TARGET and ACTUAL from CMDB and monitoring.
Store buttons with your own triggers and start IT processes directly from i-doit - e.g. the automatic deployment of a virtual machine.
With this add-on, you can create an information security management system (ISMS) in accordance with the BSI's IT baseline protection methodology.
Related use cases
i-doit offers companies comprehensive functions and interfaces

You connect ticket systems, automation tools and monitoring systems such as Zammad or n8n directly via API.

You document workstations with devices, peripherals and responsible persons and control handovers and returns centrally.

You control audits centrally, plan audits, document results and automatically generate audit reports.

You analyze your IT infrastructure, identify documentation gaps and create location, user or cost centre-related reports and audit PDFs.

You are automatically informed about deadlines, licenses and guarantees and can keep an eye on the status and need for action.

You automatically record clients, servers, printers and peripherals and document hardware, software and QR codes centrally.

You manage users, accounts and rights centrally, document responsibilities and control access per system, including LDAP and group connections.

You document data protection incidents in compliance with the GDPR, assess risks and derive measures centrally.

You can manage documents in an audit-proof manner, version and edit them directly in the tool and use templates and import functions.

You create technical and organizational restart plans with automatic calculation of the restart times.

i-doit supports GAP analyses according to standards such as ISO 27001, ISO 9001 or NIS2, including maturity level assessment, responsibilities and document assignment.

You link tickets to affected devices, analyze causes via dependencies and monitor SLAs centrally.

You record and uniquely identify assets using QR and barcodes, create individual labels and take a mobile inventory of devices using the app and printer tool.

You document emergency concepts, system manuals, backups and disaster recovery centrally and comprehensibly.

They document maintenance and lifecycles, make changes traceable, automate processes and keep track of responsibilities and warranty periods.

You evaluate and manage suppliers centrally, document contracts and maintain contact details and replacement suppliers.

You derive measures, distribute tasks, track deadlines and receive automatic notifications by e-mail.

You integrate monitoring data directly into the IT documentation, see asset failures and link statuses to the change history.

You document active and passive network elements including cabling, port assignment, IP addresses and configurations centrally and comprehensibly.

You control entries and exits, including device handovers, returns and proof of instruction, centrally...

i-doit enables protection requirement analyses with automatic inheritance into the infrastructure, risk assessment and tracking of measures.

You document and evaluate security incidents in accordance with ISO and NIS2, assign affected assets and centrally derive measures.

You record and analyze software and licenses, monitor runtimes, users and authorizations and avoid license violations and unnecessary costs.

You document locations, rooms and infrastructure, link these to contact persons and also visualize server rooms clearly.

You document and manage contracts centrally, link them to objects and responsible parties and are automatically informed about deadlines and terms.

You keep an eye on servers, VMs, dependencies and certificates centrally and automatically synchronized.

