Workplace management
With i-doit, you can document workstations, devices, peripherals, users and responsibilities centrally and traceably.
Handovers and returns are managed centrally, responsibilities are traceable and inventories remain transparent.
4.7/5 on Capterra | 2,000+ satisfied customers

The 6 most important functions for workplace management
All workstations are recorded in a structured manner and can be categorized as required (office, home office, laboratory)
Monitors, docking stations, telephones and printers are assigned directly to the workstation.
For each workstation, it is clear who is using it and who has technical responsibility.
Device issues and returns are recorded as PDF receipts, including date, condition and persons involved.
From issue to use to return - the entire process remains comprehensibly documented.
Complete inventory without search effort
The easy way to find information
In many companies, information on workstations, devices and accessories is spread across different systems, lists or departments. This leads to unnecessary search effort, a lack of transparency and incorrect decisions.
i-doit creates a central, complete inventory of all workstations and associated components. All devices, peripherals and assignments are recorded in a clearly structured manner and can be called up at any time.
Advantages:
- Central inventory of all workstations and associated assets
- No time-consuming searching in lists or tools
- Clear assignment of devices, accessories and users
- Up-to-date and consistent database for operation and planning

Traceable documentation of handovers & returns
How do you keep track of users, devices and accessories?
Workstations are constantly changing: Employees change, devices are replaced or added to. Without proper documentation, correlations are lost.
i-doit logically links users, workstations, devices and accessories. This means that it is always clear who is using which equipment and how a workstation is currently equipped.
Advantages:
- Transparent assignment of users to workstations
- Complete overview of devices and accessories in use
- Quick adjustments in the event of changes or extensions
- Reduced coordination effort between IT and specialist departments

Clear responsibilities
How do structured onboarding and offboarding processes help?
Unstructured onboarding and offboarding processes lead to forgotten devices, missing returns or security risks.
i-doit supports standardized processes for the onboarding and offboarding of employees. Workstations, devices, access and returns are documented in a traceable manner and managed centrally.
Advantages:
- Standardized and traceable onboarding and offboarding processes
- Ensuring the return of devices and accessories
- Reduced security risks during employee changes
- Clear handovers between IT, HR and specialist departments

Inventory with QR codes
Why inventory with QR codes?
Inventory lists are often incomplete, outdated or only partially maintained. It is often unclear which devices are still present, to whom they are assigned and where they are located, especially when moving, returning or taking stock. This leads to incorrect documentation, duplicate purchases and unnecessary work.
i-doit solves this problem by uniquely identifying devices and peripherals using QR codes. Each object is given an individual code that can be scanned with a smartphone, laptop or handheld scanner. The scan immediately reveals the location, workstation, user assignment and current status. This makes inventorying precise, fast and reliable.
Advantages:
- Clear identification of all assets using individual QR codes
- Fast and error-free inventory by scan
- Immediate access to location, user and device status
- Avoidance of incorrect documentation and duplicate purchases
- Significantly reduced effort for inventory, handovers and returns

Audit & verification capability
Why is audit & verification capability crucial?
Information on workstations, devices and responsibilities must be available quickly and in full for audits or internal checks. Missing or incomplete data leads to additional work and risks.
i-doit provides all relevant information in an audit-proof manner. Workstations, device assignments and changes are documented, versioned and can be verified at any time.
Advantages:
- Audit-proof contract overviews of all workstation information
- Quick access to information during audits and inspections
- Clear evidence of responsibilities and equipment
- Reduced effort for compliance and control processes

Book your personal live demo
Our i-doit team will be happy to take the time to advise you personally on your application.
Suitable add-ons
Our add-ons for modular function expansion
Create powerful automations without programming knowledge, simply start them on a schedule or manually at the touch of a button.
Get 4 powerful add-ons for the price of 2! Flows, Documents, Analysis and Forms.
Automatically create documents as PDFs with daily updated data (e.g. hardware handover certificate or disaster recovery plan).
Automate the operation of your data center with the latest data from the CMDB. Events trigger and control further processes.
The maintenance add-on supports the planning, execution and documentation of maintenance and inspections. Maintenance intervals, dates and responsibilities are managed centrally and linked directly to the respective devices, installations or systems.
With the API add-on, data can be automatically read, written and updated in i-doit. Perfect for integrations with ticket systems, inventory tools or your own automations.
Add-on for powerful data analysis. Calculate service costs, check the data quality of the CMDB and carry out failure simulations.
Easily create forms that you can make available to users for simplified data entry. Example: Allow users to document hardware or goods themselves.
Set up an information security management system with risk analysis and management in accordance with ISO 27001.
Integrate the Checkmk2 monitoring system into i-doit. This supports comparisons between TARGET and ACTUAL from CMDB and monitoring.
Store buttons with your own triggers and start IT processes directly from i-doit - e.g. the automatic deployment of a virtual machine.
With this add-on, you can create an information security management system (ISMS) in accordance with the BSI's IT baseline protection methodology.
Related use cases
i-doit offers companies comprehensive functions and interfaces

You connect ticket systems, automation tools and monitoring systems such as Zammad or n8n directly via API.

You document workstations with devices, peripherals and responsible persons and control handovers and returns centrally.

You control audits centrally, plan audits, document results and automatically generate audit reports.

You analyze your IT infrastructure, identify documentation gaps and create location, user or cost centre-related reports and audit PDFs.

You are automatically informed about deadlines, licenses and guarantees and can keep an eye on the status and need for action.

You automatically record clients, servers, printers and peripherals and document hardware, software and QR codes centrally.

You manage users, accounts and rights centrally, document responsibilities and control access per system, including LDAP and group connections.

You document data protection incidents in compliance with the GDPR, assess risks and derive measures centrally.

You can manage documents in an audit-proof manner, version and edit them directly in the tool and use templates and import functions.

You create technical and organizational restart plans with automatic calculation of the restart times.

i-doit supports GAP analyses according to standards such as ISO 27001, ISO 9001 or NIS2, including maturity level assessment, responsibilities and document assignment.

You link tickets to affected devices, analyze causes via dependencies and monitor SLAs centrally.

You record and uniquely identify assets using QR and barcodes, create individual labels and take a mobile inventory of devices using the app and printer tool.

You document emergency concepts, system manuals, backups and disaster recovery centrally and comprehensibly.

They document maintenance and lifecycles, make changes traceable, automate processes and keep track of responsibilities and warranty periods.

You evaluate and manage suppliers centrally, document contracts and maintain contact details and replacement suppliers.

You derive measures, distribute tasks, track deadlines and receive automatic notifications by e-mail.

You integrate monitoring data directly into the IT documentation, see asset failures and link statuses to the change history.

You document active and passive network elements including cabling, port assignment, IP addresses and configurations centrally and comprehensibly.

You control entries and exits, including device handovers, returns and proof of instruction, centrally...

i-doit enables protection requirement analyses with automatic inheritance into the infrastructure, risk assessment and tracking of measures.

You document and evaluate security incidents in accordance with ISO and NIS2, assign affected assets and centrally derive measures.

You record and analyze software and licenses, monitor runtimes, users and authorizations and avoid license violations and unnecessary costs.

You document locations, rooms and infrastructure, link these to contact persons and also visualize server rooms clearly.

You document and manage contracts centrally, link them to objects and responsible parties and are automatically informed about deadlines and terms.

You keep an eye on servers, VMs, dependencies and certificates centrally and automatically synchronized.

