Three ways you can be caught out by a software audit

Forrester Research has warned that IT departments need to take extra care with software audits, as suppliers stamp down on licensing discrepancies.

In...

Forrester Research has warned that IT departments need to take extra care with software audits, as suppliers stamp down on licensing discrepancies.

In its latest report, Surviving A Software License Audit, the analyst highlighted three areas where IT managers could be caught out by suppliers looking to extract extra revenue from licences.

Forrester Research warned, "There is increased audit activity as software publishers try to ensure they get every dollar of revenue to which they are entitled. Even more worrisome is that vendors also deliver an ever widening list of reasons for alleged non-compliance."

In one case, a consultant from the supplier installed a test version of the software, but the software was deployed in a production environment. The analyst firm warned that in this instance, the supplier claimed list price for the full product, even though the customer was only using the product for test purposes.

In another case, an IT manager accidentally copied a specialist application onto a standard desktop image, which meant everyone in the company had the software installed. Even though only a few people could actually use the software, the supplier charged the business for all users.

And a business that kept scrupulous records of user accounts to ensure it had the right number of licences was charged for every user named on its accounts database, because the audit company counted all users in the database, including those that were inactive.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT legislation and regulation

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close