Server Inventory should be secured to ensure protection of all components and the database.
The software is designed to work in a secured network, behind a firewall. Make sure all the components are within a secured network or firewall. Clients outside the firewall should connect through VPN or not connect at all.
The database contains valuable information, that is vulnerable to hacking. Make sure the database is protected, and do not store any other data.
Information sent over the wire media is not encrypted.
Because log files contain information about the passwords, enable debug option only when necessary to assist in debugging.