Firms under pressure from software audits

 

Vendors out for every last cent.

Enterprises came under increased pressure from software audits last year, as vendors tried to weather the recession by claiming every last penny to which they were entitled, according to new research from analyst firm Forrester.

The firm's latest report, Surviving a Software Licence Audit, warns sourcing and vendor managers against complacency, given the increasing number of audits by vendors and the "widening list of reasons for alleged non-compliance".

Forrester argued that virtualisation, multiplexing, accidental use and external use of software can all cause problems for companies trying to comply with software asset management best practice, and that "vendor compliance teams can be dangerous if they get out of control".

"Often, compliance teams overzealously pursue their own revenue targets outside of the main account team's control, oblivious to how the audit team's behaviour may be damaging the long-term relationship with that customer," the report warned.

In order to mitigate the risks surrounding a software compliance audit, the report advised firms to respond immediately to any vendor correspondence, demonstrating their software asset management controls at the earliest opportunity and their "unwillingness to be pushed around".

The report also advised enterprises to make sure they know who is responsible for ensuring compliance, and to seek expert advice if in doubt.

Copyright ©v3.co.uk


Firms under pressure from software audits
 
 
 
Top Stories
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 994

Vote