Preparation Simplifies Software Audits - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Begin an entitlement program-6 Next

Begin an entitlement program

Implement an entitlement program to administratively assign the right to use managed software titles on specific devices. Compare entitlements (right to use) with discovery (fact of use) and police the exceptions. Perform this reconciliation activity on a regular basis and keep records as part of internal audits. Ultimately, this is the most important single project you can implement - and it is also the least commonly implemented program. Most organizations rely on discovery to tell them what they have, but without an administrative entitlement, there is no way to know exactly which installs are rogue, and thus, no way to police the policy exception.

ParkinSoftware audits are a fact of life for the modern enterprise. While nothing can stop a vendor from auditing, IT managers should prepare for the possibility of an audit by shifting from a defensive to a negotiating posture.

While some audits are random, the majority are triggered by a credible report of violation. In such instances, auditors often begin the audit process with a bad taste in their mouth, as they are already suspicious of the licensee’s reporting practices.

There are only two reasons businesses fear an audit:

  1. They are in violation and they know it.
  2. They are unsure if they have committed a violation or not. 

If a company is in violation and knows it, there is nothing to be done except to brace for the consequences and prepare to write a potentially sizable check. However, if you are unsure whether you have violated software license agreements, several steps involving research, program setup and simple discipline can help ensure data is fresh and accurate.

Click through to find out how to be fully prepared should a software vendor initiate an audit. And be sure to read this guest opinion from LANDesk’s Scott Parkin, which outlines in detail the steps that must be taken. As Parkin writes, “If you proactively implement and maintain these basic processes, you will be able to drive software purchases and maintenance agreements based on justifiable fact, not supposition--and you will have the key facts at hand needed to demonstrate compliance to an auditor.”

 

Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

 
More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

ArriaNLG-IoTAutomation0x Internet of Things Personified: Integration and Automation

The real value that the Internet of Things brings is at the intersection of gathering data and leveraging it. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.