Preparation Simplifies Software Audits - Slide 7

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Roll out a firm software request program-7

Roll out a firm software request program

Next

Create a software request program tied to your entitlement program to ensure that you only deploy software that you legally own -- and aggressively police exceptions to that program. Make sure your software request and usage policies are documented and acknowledged by your users. People tend to resist a request program at first. However, if you aggressively remove unauthorized installs, they will learn to use a front-door request system very quickly. When authorized requests are handled by a consistent, repeatable process that ensures the repository is updated, identifying and policing rogues becomes easy.

Next
ParkinSoftware audits are a fact of life for the modern enterprise. While nothing can stop a vendor from auditing, IT managers should prepare for the possibility of an audit by shifting from a defensive to a negotiating posture.

While some audits are random, the majority are triggered by a credible report of violation. In such instances, auditors often begin the audit process with a bad taste in their mouth, as they are already suspicious of the licensee’s reporting practices.

There are only two reasons businesses fear an audit:

  1. They are in violation and they know it.
  2. They are unsure if they have committed a violation or not. 

If a company is in violation and knows it, there is nothing to be done except to brace for the consequences and prepare to write a potentially sizable check. However, if you are unsure whether you have violated software license agreements, several steps involving research, program setup and simple discipline can help ensure data is fresh and accurate.

Click through to find out how to be fully prepared should a software vendor initiate an audit. And be sure to read this guest opinion from LANDesk’s Scott Parkin, which outlines in detail the steps that must be taken. As Parkin writes, “If you proactively implement and maintain these basic processes, you will be able to drive software purchases and maintenance agreements based on justifiable fact, not supposition--and you will have the key facts at hand needed to demonstrate compliance to an auditor.”

 

Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

 
More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

ArriaNLG-IoTAutomation0x Internet of Things Personified: Integration and Automation

The real value that the Internet of Things brings is at the intersection of gathering data and leveraging it. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.