Firms under pressure from software audits

 

Vendors out for every last cent.

Enterprises came under increased pressure from software audits last year, as vendors tried to weather the recession by claiming every last penny to which they were entitled, according to new research from analyst firm Forrester.

The firm's latest report, Surviving a Software Licence Audit, warns sourcing and vendor managers against complacency, given the increasing number of audits by vendors and the "widening list of reasons for alleged non-compliance".

Forrester argued that virtualisation, multiplexing, accidental use and external use of software can all cause problems for companies trying to comply with software asset management best practice, and that "vendor compliance teams can be dangerous if they get out of control".

"Often, compliance teams overzealously pursue their own revenue targets outside of the main account team's control, oblivious to how the audit team's behaviour may be damaging the long-term relationship with that customer," the report warned.

In order to mitigate the risks surrounding a software compliance audit, the report advised firms to respond immediately to any vendor correspondence, demonstrating their software asset management controls at the earliest opportunity and their "unwillingness to be pushed around".

The report also advised enterprises to make sure they know who is responsible for ensuring compliance, and to seek expert advice if in doubt.

Copyright ©v3.co.uk


Firms under pressure from software audits
 
 
 
Top Stories
Parliament passes law to let ASIO tap entire internet
Greens effort to limit devices fails.
 
Business-focused Windows 10 brings back the Start menu
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Feeling Shellshocked?
Stay up to date with patching for the Bash bug.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  65%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1382

Vote