Preparation Simplifies Software Audits - Slide 7

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Roll out a firm software request program-7

Roll out a firm software request program

Next

Create a software request program tied to your entitlement program to ensure that you only deploy software that you legally own -- and aggressively police exceptions to that program. Make sure your software request and usage policies are documented and acknowledged by your users. People tend to resist a request program at first. However, if you aggressively remove unauthorized installs, they will learn to use a front-door request system very quickly. When authorized requests are handled by a consistent, repeatable process that ensures the repository is updated, identifying and policing rogues becomes easy.

Next
ParkinSoftware audits are a fact of life for the modern enterprise. While nothing can stop a vendor from auditing, IT managers should prepare for the possibility of an audit by shifting from a defensive to a negotiating posture.

While some audits are random, the majority are triggered by a credible report of violation. In such instances, auditors often begin the audit process with a bad taste in their mouth, as they are already suspicious of the licensee’s reporting practices.

There are only two reasons businesses fear an audit:

  1. They are in violation and they know it.
  2. They are unsure if they have committed a violation or not. 

If a company is in violation and knows it, there is nothing to be done except to brace for the consequences and prepare to write a potentially sizable check. However, if you are unsure whether you have violated software license agreements, several steps involving research, program setup and simple discipline can help ensure data is fresh and accurate.

Click through to find out how to be fully prepared should a software vendor initiate an audit. And be sure to read this guest opinion from LANDesk’s Scott Parkin, which outlines in detail the steps that must be taken. As Parkin writes, “If you proactively implement and maintain these basic processes, you will be able to drive software purchases and maintenance agreements based on justifiable fact, not supposition--and you will have the key facts at hand needed to demonstrate compliance to an auditor.”

 

Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

 
More Slideshows

Classroom tech Ten New Technologies Transforming the Classroom

Here are 10 ways that college professors are taking advantage of the technology students currently use and adding new technologies to enhance the teaching and learning experiences. ...  More >>

IBM Watson How and Why Companies Are Incorporating the Power of IBM Watson

Watson continuously learns from previous interactions, gaining in value and knowledge over time. Learn how companies are harnessing that AI power to create and improve products and services. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.