Tivoli Endpoint Manager for Software Usage Analysis Version 1.3 Implementation Guide
|
|
|
- Dayna Jordan
- 10 years ago
- Views:
Transcription
1 Tivoli Endpoint Manager for Software Usage Analysis Version 1.3 Implementation Guide
2 ii Tivoli Endpoint Manager for Software Usage Analysis Version 1.3 Implementation Guide
3 Contents Software Usage Analysis Version 1.3 Implementation Guide Laying the Foundation Overview Typical Implementation Structure Assess needs and requirements Management support and approval Establish a Comparison Baseline Develop metrics and processes Expectations and schedule Select the best tool Implementation A Best Practices approach Software inventory review Software license review Software catalog preparation Set long term policies and procedures Summary Resources Tips and tricks Frequently asked questions Additional documentation Technical support Notices iii
4 iv Tivoli Endpoint Manager for Software Usage Analysis Version 1.3 Implementation Guide
5 Software Usage Analysis Version 1.3 Implementation Guide Laying the Foundation Overview A well-implemented software asset management initiative can create significant cost savings across your enterprise both on software and on process and infrastructure. It puts you in a stronger negotiating position with software vendors and, most importantly, provides you with powerful peace of mind when it comes to the legalities of license compliance. With a healthy software asset management implementation within your environment, you always know what software you have, where it is, and how it is being used. This information is critical from an operational as well as strategic standpoint. A healthy software asset program allows your organization to directly manifest value from your IT investments. Ultimately, your three objectives in this context are to reduce cost, reduce risk, and bring every IT asset into legal compliance. The benefits of a software asset management tool include: v Reduction in software Total Cost of Ownership v Technology migrations supported with real information v Alignment of software assets with legal licenses v Removal of software liabilities v Improved budgeting and planning processes v Improved user productivity v Reduced support calls v Improved desktop and network security v Reduced overall cost of asset management With Tivoli Endpoint Manager for Software Usage Analysis (SUA), you have selected a powerful application for managing the software within your enterprise. However, this tool is only beneficial when implementation follows the necessary steps to ensure that it operates at full potential and that adequate time is allocated for setup procedures. This guide provides a straightforward approach to using best practices building blocks to configure SUA to meet your financial and contractual compliance needs. Most of your setup process involves your Software Catalog. Why all the preparation? Imagine that you just purchased a new music media device, and that you are preparing your new electronic media library. First, you locate the media you want to load onto the device. Then, because the device is pre-formatted with media categories (music, movies, photos, podcasts), you organize and categorize that media to decide which of each type to load onto the device. What about storage capacity? How much of your library can you fit onto the device? After you answer these initial questions, you are ready to start uploading media. 1
6 Setting aside adequate time for these early considerations will ultimately give you a comprehensive library of music and media available at your fingertips. This process is similar to how you begin thinking about your Software Catalog. To review specific details about the Software Usage Analysis Software Catalog, review the Catalog Editor s Guide that is also provided as part of this release. Ascertaining these types of questions represents exactly the level of preparation you need to optimize SUA s many long-term benefits. A successful, well-planned implementation results in cost savings, streamlined IT productivity, and continuous compliance with software licensing regulations all in a powerful tool that can reduce risk and save money across your enterprise. Typical Implementation Structure The following figure shows how a typical software asset management implementation plan might be structured using a company s available resources. In a typical implementation, designated stakeholders have direct input to the software asset management database and receive reports generated by SUA. The following tables outline the primary components of SUA and the various user roles. SUA Components and Roles SUA Components Description 2 Tivoli Endpoint Manager for Software Usage Analysis Version 1.3 Implementation Guide
7 Tivoli Endpoint Manager SUA Software Catalog Users Contracts This is your installed SUA application containing the primary elements that you need to customize: the Software Catalog, Users, Contracts, and Saved Reports. When the implementation is in place, SUA will generate reports based on your specific requirements. The SUA Software Catalog contains a vast database of software publishers, titles and versions that are recognized by the agents running on your endpoints. You must update the catalog any time a new software title not already in the default list of software is installed. SUA defines specific roles and permissions for different types of SUA users. The application allows you to create users and grant varying levels of access to support your enterprise s asset management needs. Typically, IT personnel are responsible for the initial setup and maintenance of this function to respond to user account changes within the company. Nearly all enterprise-level software applications requiring multiple licenses contain contractual information (licenses, expiration dates) that you enter, monitor, and maintain on a continuous basis. Company Roles Software Asset Management Director Corporate Procurement Description As owner of the overall implementation process, the Director of your software asset management implementation ensures that the primary components of the SUA application are current, accurate, and primed for easy maintenance, and also gets stakeholders involved to ensure a smooth transition to the new SUA system. The Director also keeps senior management apprised of the progress and status of the implementation plan. In many companies, the Corporate Procurement department is responsible for purchasing new software titles or upgrades and tracking the associated software licenses and contracts. This function is also responsible for updating and maintaining the SUA Contract database to ensure accurate and current reporting of assets. Software Usage Analysis Version 1.3 Implementation Guide 3
8 IT Asset Managers Finance Managers Business Unit Asset Managers In some situations, IT personnel install and track new or upgraded software titles and maintain the SAM Contracts database. They also understand how the SUA application is deployed across the company s technology resources. IT Asset Managers typically work closely with the Director to ensure that the flow of information to and from SUA is efficient and reliable. Finance Managers play a pivotal role in utilizing SUA for its intended purpose of fulfilling compliance obligations and managing the costs of software installed on your network. Finance Managers are the primary customer for SUA reports and use this information to document compliance for both internal and external auditors. By coordinating with the Director, they use these reports to send accurate data to management regarding the company s use of software, as well as recommendations for cost savings. Business Unit Asset Managers oversee the software asset tracking for their own business units and are responsible for the day-to-day software asset management (criteria, reporting) within their organization. The Business Unit Asset Manager works closely with the Director to ensure that their business unit s needs do not conflict with SUA requirements, and facilitate smooth implementation to fulfill compliance obligations and cost savings. In most cases, the implementation Director is the nucleus of a successful software asset management implementation. Correct preparation is vital to realizing the most expeditious ROI for your software assets. Pre-implementation is an excellent time to begin thinking about Computer Groups, Computer Properties, and Saved Reports. These functions are integral to the initial setup of SUA in your organization to create an effective deployment with useful views and reports. The following table outlines the primary uses of these features: SUA Features Computer Groups Description This feature is useful in creating units of analysis based on computer properties that you can use to analyze your reports and to which you can assign contracts. It gives you the ability to hone your report views to a specific set of computers. For example, all servers, all Windows computers in North America, all computers below a certain patch level. Computer groups can also be hierarchal, allowing you to set up groups and subgroups. For example, all servers>in North America. 4 Tivoli Endpoint Manager for Software Usage Analysis Version 1.3 Implementation Guide
9 Computer Properties Saved Reports This feature gives you the ability to add attributes about your computers, which can be used for filtering, sorting, and grouping. For example, quantity of RAM, active directory group, hardware vendor, and so on. Use this feature to create and share report settings for commonly-used views of the data. This gives you 1-click access to reports. Assess needs and requirements Why does your organization need a software asset management program? Part of your assessment process involves identifying the drivers to making this change. Are you being pressured by management to validate IT costs? Have you been notified of an upcoming external audit of your software licenses? The costs of managing assets and the risks of having noncompliant licenses are the two primary catalysts for implementing a software asset management program. But more than that, you need to determine what tools a software asset management product will give you that you do not already have. Also, what short and long term benefits do you envision will result from implementing a software asset management tool within your environment? And, most importantly, how much money is your organization likely to commit to realizing these goals? With a software asset management process in place, you can discover what IT assets you have, how they are being used, where they are located, and if they are legally licensed. And when this information is in place, you will be better positioned to relay the concept of ongoing compliance to the stakeholders involved. Assess scope Your company is unique and has its own built-in methodologies that distinguish it from other companies. At the same time, any implementation process requires planning and forethought to ensure its success. Your compliance with regulatory agencies and your relationships with software vendors are critical to your success. Ultimately, your scope assessment must consider exactly what you need from a software asset management process and how your enterprise is expected to change as a result. These changes include legal compliance to software license contracts as well as significant cost savings in asset management. Identify compliance gaps If your organization has already undergone a compliance audit, you were likely given a list of gaps and deficiencies that you will address during the remediation phase. If not, consider conducting an in-depth internal audit of your technology resources to anticipate and eliminate possible compliance issues before they arise. Either way, you need solid data on your regulatory standing and a plan for how to address any gaps. Software asset management will play an important role in helping you meet your compliance expectations and obligations. Test your implementation An extremely effective method for discovering potential problems with your software asset management implementation is to test it with real data in a test bed Software Usage Analysis Version 1.3 Implementation Guide 5
10 network before turning it on in your company s network. Such testing can quickly identify missed steps, weaknesses or pitfalls that might have occurred during the preparation or customization stages. Discovering these issues in a non-volatile environment can save time and valuable resources. Management support and approval Before implementing a software asset management program, you will need not only management buy-in but a financial commitment to sponsor the entire scope of the implementation. How do you make a compelling case to management about the benefits of software asset management technology in your enterprise? The overall question management will consider is if they can afford this change. Ultimately, in light of what we now know about software asset legal compliance standards, they cannot afford not to implement a software asset management program. Start by ascertaining what management will specifically want to know: v What are the upfront costs? v How much IT training will be required? v How much IT productivity will be lost during implementation? v What are the ongoing costs for maintaining SAM long term? v Who are the organizational stakeholders and what will you require from them? Establishing ROI Ultimately, management will be interested in realistic Return on Investment (ROI) figures. You can create these by establishing metrics early on in the process by mapping the cost of your current deployment with your post-implementation costs. This optimization of software asset management-based ROI can be calculated in several specific areas, using the following formulas: 6 Tivoli Endpoint Manager for Software Usage Analysis Version 1.3 Implementation Guide
11 Establish a Comparison Baseline To establish a prospective before and after picture of software asset management in your organization, create a comparative baseline. You can also use this information as a starting point for establishing metrics in the next section. Ask yourself a series of simple, high-level questions, which can later be drilled down for more detail and granularity. Although you can customize baseline questions to your individual organization, you might select three primary categories for assessment management, costs, and compliance. Software Usage Analysis Version 1.3 Implementation Guide 7
12 Management v How do you currently track your software assets and usage? v What do you project is the accuracy percentage of that data at any given time? Costs v How much do you spend annually on IT labor and software assets and licenses? v If you need to decrease spending, what is your target budget? v How much money is wasted annually on unused or under-utilized software, redundant licenses, true-up costs for unlicensed software, or legal penalties for non-compliance? Compliance v By what method and how often do you conduct internal software audits? v What percentage of your current IT assets includes legally licensed software? If you do not know, do you have an effective and accurate way to find out? v Where are the gaps? v Have you undergone external audits and, if so, what were the results? Develop metrics and processes An internal system of metrics allows you to track and monitor how a software asset management implementation impacts your organization. Metrics can be a useful tool both before and after SAM is implemented. Ultimately, you will be tracking how much money your organization currently spends on software asset management processes, and if those expenditures are well used in maintaining the legal compliance of your software licenses. Use the categories in the previous section to enter actual amounts for management costs, labor costs, license expenses, and projected costs. These numbers will allow you to see gaps between where you are now and where you want to be in terms of managing cost and risk. You can then use this valuable information to either update or set forth new enforcement policies for software usage and desktop standards. Expectations and schedule Most commercial SAM applications require an extensive upstart process. Tivoli Endpoint Manager s SUA tool can, in most cases, be installed and implemented within hours or days, rather than months. Set aside adequate time with IT personnel for the initial installation and configuration of your product. This allows staff to become familiar with the new system. Then allocate resources for the ongoing maintenance of your SAM application tool. Select the best tool The most common reasons for failure of a software asset management program include lack of management sponsorship and poor tool selection. Selecting the right tool can be a daunting task. By far, the most successful users of software asset management tools are enterprises that maintain a holistic view of how it can work in the short and long term. That means focusing on a tool that will help you with all aspects of software asset management, not just the legal compliance aspect. 8 Tivoli Endpoint Manager for Software Usage Analysis Version 1.3 Implementation Guide
13 Implementation Successful software asset management programs begin with a vision. And when this vision is clearly defined from the beginning, you can easily translate that vision into a salable concept to management and a workable model for IT. Tips for tool selection 1. Develop a vision for software asset management. Include where you are now and where you want to be, to help you determine what you need from a software asset management tool or product. 2. Assess the needs of stakeholders and affected departments to build a functional requirement specification. 3. Create a short list of software asset management applications and arrange demonstrations with stakeholders. 4. When you have narrowed down the best software asset management tool for the specific needs of your enterprise, arrange for an evaluation of the product to demonstrate how it would behave in your environment. A Best Practices approach In general, about 30% of large enterprises experience one on-site software audit per year. Whether or not you are in this percentage group, you need a rigorous software tracking tool to ensure audit-readiness throughout your enterprise. Employing a Best Practices approach to managing your software assets can elevate audit-readiness up a few levels, improving things like purchasing arrangements and negotiating power with software vendors, risk management posture, and a competitive advantage. This methodology is critical to your compliance with laws and regulations governing the legal use of software on your company s IT resources. This approach can also help lower the total cost of ownership (TCO) by reducing maintenance costs associated with manual tracking and reporting methods, redeploying an existing license by an employee who is replaced or has moved to another position within the company. According to ECP Media, a best practice is defined as a set of tools and processes designed to maximize efficiency and productivity of a given task or outcome. It falls somewhere between a framework, a high-level description of a task or process, and a standard that describes specific and measurable outcomes. Software Usage Analysis Version 1.3 Implementation Guide 9
14 A comprehensive, industry-wide standard for software asset management is available in the International Standard ISO/IEC :2006. This Standard was developed to facilitate enterprises in auditing their software asset management performance to a level sufficient to meet corporate governance obligations and manage costs associated with effectively monitoring use of installed software across your enterprise. For the purpose of this guide, it is assumed that best practices will be used to manage the implementation of software asset management within your enterprise. Service Level Agreements (SLAs) Your software asset management implementation should be directly related to all internal and external service level agreements (SLAs) that contain regulatory, compliance and customer protection requirements. Best practices dictate the need to implement software asset management in a way that reinforces the intent of your SLAs. Conversely, SLAs must be written so that they do not hinder your software asset management implementation. Software inventory review At this stage of your research, you will be taking an inventory of your existing software assets. This can be done manually, but you have already most likely selected a tool to automate this process for you. Consider how often you want to take inventory and set preliminary parameters for the inventory process. What, specifically, are you going to look for? An inventory of software can reveal your level of legal compliance, computers that are running unauthorized software, and computers that are out of date with patches and service packs. It can also allow you a bird s eye view into how particular departments use applications; this allows you to set up computer groups and set software use standardization practices company-wide. 10 Tivoli Endpoint Manager for Software Usage Analysis Version 1.3 Implementation Guide
15 Software license review When you have taken an inventory of the software assets in your system, you can sync up your inventory with your list of current, active software licenses. To do this, first research where in your enterprise these licenses are maintained, how they are they categorized, and who maintains them. Then begin reviewing the specifications of each license. What does it require? Then locate each software asset to match usage against license requirements. Best practices to keep in mind: v Designate specific personnel for software purchasing and contract maintenance. v Contact each publishing vendor to determine their individual criteria for proof of ownership in the event of an audit; ensure that you have and maintain those records and can access them quickly. v Establish a documentation system for the storage, review, and maintenance of software license documentation, whether hardcopy or electronic. Software catalog preparation Note: To install and use your catalog, see the SUA Installation and Configuration Guide and Catalog Editor s Guide, available on the support website. It is vital to your SUA implementation that your Software Catalog contains all the software publishers, titles, and software versions that are integral to your daily business. SUA automates software identification by using its extensive software database to locate evidence of installed applications and compare that evidence with the catalog. SUA version 1.3 provides an Ambiguous Software tool that takes the guesswork out of software redundancies. A redundant or ambiguous software product could be a stand-alone version of Microsoft Word that is also included in a Microsoft Office Professional product. It is common for there to be similar, or even identical, executables relating to the same software application. This duplication can occur for a number of reasons. The primary job of the Ambiguous Software tool is to search for the package data that relates to that executable; this might be found data from a Tivoli Endpoint Manager analysis property (for example, one that returns the contents of the Windows Registry). These package strings are the key to differentiating ambiguous software entries in your catalog. SUA analyzes how various software titles are packaged to generate reports that are relevant to your specific needs. After you understand SUA s capabilities, you can customize your catalog to satisfy your compliance needs and control costs associated with unused or unnecessary software in your network. The Software Catalog Workflow figure shows the process required to prepare, verify, test, and maintain your Software Catalog. Your Software Catalog is a fundamental element of your software asset management solution. It allows you to manage your assets more effectively and control costs by identifying redundant, unused, or under-utilized software. It is your primary data source for generating the relevant reports needed for meeting compliance obligations and satisfying auditors. Software Usage Analysis Version 1.3 Implementation Guide 11
16 There are four primary and distinct steps you must take to maintain an accurate, up-to-date Software Catalog: 1. Make It Relevant 2. Ensure Accuracy 3. Verify data 4. Keep it Current These four steps require some thought and planning at the beginning to tailor the catalog for your company, and are described in more detail in the following section. Make it relevant The majority of the software you need is already in the SUA Software Catalog. However, you might encounter new software titles needed for your enterprise. In this case, your primary job is to make this software relevant and ensure that all of the software assets owned by your enterprise are legally compliant and up to date. Studies have shown that fully half of companies based in the United States are at least 10% noncompliant with software licensing. Auditors are trained to look for these gaps, and remediation can be costly and time consuming. The need for a comprehensive list of your installed software is crucial to being audit ready. To start creating a list of the software you need, consider the following: v What do you want to track? 12 Tivoli Endpoint Manager for Software Usage Analysis Version 1.3 Implementation Guide
17 v How do you want to track it? By installation, by location, or by license? v Do you know exactly what your compliance obligations are? Are you aware of the relevant legal standards? When beginning to monitor specific software applications, consider the following factors: v When, where, and how the software is used v The way different groups use a particular application v If the manner and frequency of use of this application matches the cost v If overall that application is helping or hindering the evolution of your business SUA will help you compare your list against the evidence imported from your network endpoints using the Software Catalog. It does this by identifying unmapped packages or executables, or software that is not integrated in your Software Catalog. Ensure accuracy Your initial inventory reports might not always tell you what you need to see. Certain software titles present in your environment might be included in the Software Catalog but are not yet correctly identified. They are made visible when you have endorsed their relevance to your environment. SUA allows you to view all the raw data from the scan, including any unmapped executables. From this list, you can: v Find the titles and versions you own and compare them with the Catalog contents v Copy any unmapped publisher/title/version strings v Add them to the Catalog if they are not already shown v Verify that they were properly added For detailed procedures about how to customize your Software Catalog, see the SUA Catalog Editor s Guide. Verify data When your Software Catalog is updated and concurrent with the installed software base, it is important to check its content against fresh scans to verify that nothing has been left out. Design your processes to ensure that SUA reports exactly the information you need to fit your business requirements. You might consider testing your data by configuring one or more designated end points in your network. Check the accuracy of your Software Catalog against a known list of software titles and versions installed on those end points. You should also consider verifying your ability to generate reports based on the test data. The above diagram illustrates how a test might be set up to verify that each part of your software asset management implementation, including your Software Catalog, is fully functional. In performing such tests, it is important to think about the various facets of how SUA operates and ensure that each one is operating as expected. Software Usage Analysis Version 1.3 Implementation Guide 13
18 Keep it current Updating is the way you customize the Software Catalog to fit your environment. This is absolutely necessary to use all the SUA compliance and cost saving benefits and get the maximum ROI as early as possible. Things to consider: v Frequency of updates how often will you check the Software Catalog against the installed software base? Weekly? Monthly? Or only when new software is installed? Do your internal compliance policies specify how often you check for software compliance? v Software can be installed by the end user, by the IT department or by automatic updates that download and install newer versions when available. Temporary employees may also be a risk for non-compliant software installations. These need to be monitored to ensure that you remediate these issues prior to an audit. v Your Software Catalog is the heart of your compliance goals, and a healthy heart is essential for the health of your enterprise. Set long term policies and procedures Summary To maximize the usefulness of your SUA application, you must set specific policies throughout your organization for software usage and desktop practices. This is important to maintain SUA as a living system within your enterprise and to use this dynamic tool the way it is designed. Create a strategic program around your SUA tool to continuously evaluate, monitor, and respond to your organization s use of its software assets. Create flexible policies that allow for changes in your organization, such as personnel, technology, and industry changes in usage and applications. Establishing a software asset management program within your organization is a comprehensive process. Start small. Begin with a vision of how you want your software assets to look and how you want them to be maintained. Then take an inventory of your assets and licenses; you mightbe closer to compliance than you originally thought. When it comes to legal compliance, it is ultimately better to know than to wonder. Your software asset management product will serve as the lens through which you display and magnify the software products installed in your organization, allowing you to make decisions about what to do with them. SUA is the tool that helps bring and keep you in compliance. Benefits of Applying Best Practices to your SUA implementation: v Helps you fulfill your company s compliance obligations v Allows you to analyze your software and licensing contracts by providing you with detailed, accurate reports v Affords you the best possible ROI for managing your software assets Correct implementation of SUA allows you to: v Manage your software life cycles v Track IT contracts 14 Tivoli Endpoint Manager for Software Usage Analysis Version 1.3 Implementation Guide
19 v Reconcile your software deployment and usage v Manage costs associated with your software v Get control of your inventory to pass audits quickly with the least amount of remediation Summary of SUA Benefits: v An accurate software inventory v Knowledge of your software usage v Easy identification of unused or under-used software v Greater bargaining power with software vendors v Ability to create software budget requests based on up-to-date information and analysis v Effective future planning with clear understanding of legal license requirements v Upgrades that are more targeted and cost-effective v Greater control over software for reduced cost and enhanced productivity v Reduced chances of viruses and defective software by running only authorized software on systems Resources Tips and tricks v v v v v v Read the System Requirements in the SUA Installation and Configuration Guide. Make sure you have a definitive software library. Whenever you procure new software, check that it is recognized correctly in the SUA Software Catalog. Check the SUA Catalog Editor s Guide for more details. Use the Tivoli Endpoint Manager platform for software deployment when you deploy software. Create a contract in SUA when you allocate software to computers. Computer Groups can be used for asset management and contract management. For contract management, be sure to scope your computer groups so that they correspond to the specific business units you want to analyze, for example, analyzing the software license properties for software grouped to a particular department at a university. Set up user accounts carefully. Ideally you will have one domain user account with the following permissions: Permission to install the application on your SUA server Permission to connect to your database server and create databases Permission to connect to the Tivoli Endpoint Manager database and read data Permission to read data from the Tivoli Endpoint Manager server upload manager directory Frequently asked questions v Is SUA designed to be used in lieu of an audit? No. SUA processes and applications are designed as a tool to protect your enterprise in the event of an audit, and to ensure your ongoing compliance. v In what ways can my company save money by implementing SUA? Software Usage Analysis Version 1.3 Implementation Guide 15
20 Reduce legal risks due to software license non-compliance, take control of unauthorized software usage or unused software applications for reduced waste, reduce software licensing costs by purchasing/renewing only what you need, and reduce IT costs by streamlining SUA practices. v How can I track these savings? Perform an internal audit on how much your organization currently spends on the ongoing maintenance of software asset management and software publisher license compliance. Create before and after metrics to track how much the automation of your SUA application is saving you overall in terms of direct costs, labor costs, and maintenance. v Is SUA only about regulatory compliance? SUA allows you to not only identify but also control and mitigate software risks by keeping your software licenses up to date, but it also gives you the added security of seeing and knowing exactly what assets you have in your environment. v How do software license trade associations and regulatory agencies decide who and when to audit? Are agencies contacted by software publishers? Very often, license regulators initiate software license investigations based on consumer leads. Each association and agency has their own criteria. To learn about these and how to keep your enterprise protected, check their individual websites. v Is my company really at risk of being targeted for illegal use of software? Now, more than ever, corporations are under the microscope of the license compliance regulatory agencies. Your losses relating to a non-compliance audit can range from $35k-$250k... per copyright. v If my company is audited, who are the most likely auditors for software licensing? BSA Business Software Alliance and SIIA Software & Information Industry Association (formerly Software Publishers Association) are the two most likely trade associations to initiate a software license investigation. v If I am audited and pay all required fines, what happens next? Enforcement groups generally require you to set in place and maintain an approved software asset management program. In the event of follow-ups, prepare to proactively protect your assets for the long haul and SUA is an excellent place to start. v What is the difference between ITAM and software asset management? ITAM stands for information technology asset management, which includes an accounting of all IT assets, such as hardware, software, network facilities, telecommunications, and digital assets. SAM, on the other hand, stands for software asset management, a practice that primarily focuses on the software asset area of ITAM. Additional documentation SUA Version 1.3 is provided with a list of additional user documents, including: v Installation and Configuration Guide A detailed guide on the installation and configuration of the SUA application. 16 Tivoli Endpoint Manager for Software Usage Analysis Version 1.3 Implementation Guide
21 v v v User s Guide A detailed guide focused on how to use the primary components, including Tips and FAQs. Jump Start Guide A brief overview to help you quickly get started using SUA Version 1.3. Catalog Editor s Guide Detailed information about how to use and customize your Catalog, and how to make it match the software in your deployment. Technical support The Tivoli technical support site offers a number of specialized support options to help you learn, understand, and optimize your use of this product: v Tivoli Endpoint Manager Info Center v Documentation v Knowledge Base v Forums and Communities Notices IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-ibm product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY U.S.A. For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to: Intellectual Property Licensing Legal and Intellectual Property Law IBM Japan Ltd , Shimotsuruma, Yamato-shi Software Usage Analysis Version 1.3 Implementation Guide 17
22 Kanagawa Japan The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-ibm Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged, should contact: IBM Corporation 2Z4A/ Burnet Road Austin, TX U.S.A. Such information may be available, subject to appropriate terms and conditions, including in some cases payment of a fee. The licensed program described in this document and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement or any equivalent agreement between us. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. 18 Tivoli Endpoint Manager for Software Usage Analysis Version 1.3 Implementation Guide
23 COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are provided "AS IS", without warranty of any kind. IBM shall not be liable for any damages arising out of your use of the sample programs. TRADEMARKS: IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol ( or ), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Other company, product, and service names may be trademarks or service marks of others. Software Usage Analysis Version 1.3 Implementation Guide 19
Software Usage Analysis Version 1.3. Implementation Guide
Software Usage Analysis Version 1.3 Implementation Guide Implementation Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide
Tivoli Endpoint Manager for Security and Compliance Analytics Setup Guide Setup Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
Tivoli Endpoint Manager for Security and Compliance Analytics
Tivoli Endpoint Manager for Security and Compliance Analytics User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM
Tivoli Endpoint Manager for Configuration Management. User s Guide
Tivoli Endpoint Manager for Configuration Management User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
Software Usage Analysis Version 1.3
Software Usage Analysis Version 1.3 Catalog Editor s Guide Catalog Editor s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
Patch Management for Red Hat Enterprise Linux. User s Guide
Patch Management for Red Hat Enterprise Linux User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003,
OS Deployment V2.0. User s Guide
OS Deployment V2.0 User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003, 2011. US Government Users
Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide
Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Note Before using this information and the product it supports,
Linux. Managing security compliance
Linux Managing security compliance Linux Managing security compliance Note Before using this information and the product it supports, read the information in Notices on page 7. First Edition (December
Platform LSF Version 9 Release 1.2. Migrating on Windows SC27-5317-02
Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Note Before using this information and the product it supports,
IBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2
IBM SmartCloud Analytics - Log Analysis Anomaly App Version 1.2 IBM SmartCloud Analytics - Log Analysis Anomaly App Version 1.2 Note Before using this information and the product it supports, read the
IBM Endpoint Manager Version 9.2. Software Use Analysis Upgrading Guide
IBM Endpoint Manager Version 9.2 Software Use Analysis Upgrading Guide IBM Endpoint Manager Version 9.2 Software Use Analysis Upgrading Guide Upgrading Guide This edition applies to IBM Endpoint Manager
IBM TRIRIGA Version 10 Release 4.2. Inventory Management User Guide IBM
IBM TRIRIGA Version 10 Release 4.2 Inventory Management User Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 19. This edition applies to
Release Notes. IBM Tivoli Identity Manager Oracle Database Adapter. Version 5.0.1. First Edition (December 7, 2007)
IBM Tivoli Identity Manager Version 5.0.1 First Edition (December 7, 2007) This edition applies to version 5.0 of Tivoli Identity Manager and to all subsequent releases and modifications until otherwise
IBM Tivoli Web Response Monitor
IBM Tivoli Web Response Monitor Release Notes Version 2.0.0 GI11-4068-00 +---- Note ------------------------------------------------------------+ Before using this information and the product it supports,
Power Management. User s Guide. User s Guide
Power Management User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003, 2011. US Government Users
IBM Endpoint Manager for Software Use Analysis Version 9 Release 0. Customizing the software catalog
IBM Endpoint Manager for Software Use Analysis Version 9 Release 0 Customizing the software catalog IBM Endpoint Manager for Software Use Analysis Version 9 Release 0 Customizing the software catalog
IBM Enterprise Marketing Management. Domain Name Options for Email
IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the product it supports, read the information in Notices on page 3. This document applies to all
IBM Enterprise Marketing Management. Domain Name Options for Email
IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the products that it supports, read the information in Notices on page 3. This document applies
IBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager
IBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager Rational Insight and Rational Asset Manager...4 Prerequisites...5 Configuring the XML data configuration for Rational Asset
Tivoli Endpoint Manager for Software Distribution. User s Guide
Tivoli Endpoint Manager for Software Distribution User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
IBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note
IBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note Note: Before using this information and the product that it supports, read the information in Notices
IBM Security QRadar Version 7.2.0. Installing QRadar with a Bootable USB Flash-drive Technical Note
IBM Security QRadar Version 7.2.0 Installing QRadar with a Bootable USB Flash-drive Technical Note Note: Before using this information and the product that it supports, read the information in Notices
IBM Security SiteProtector System Migration Utility Guide
IBM Security IBM Security SiteProtector System Migration Utility Guide Version 3.0 Note Before using this information and the product it supports, read the information in Notices on page 5. This edition
IBM Cognos Controller Version 10.2.1. New Features Guide
IBM Cognos Controller Version 10.2.1 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 3. Product Information This document applies
Integrating ERP and CRM Applications with IBM WebSphere Cast Iron IBM Redbooks Solution Guide
Integrating ERP and CRM Applications with IBM WebSphere Cast Iron IBM Redbooks Solution Guide Cloud computing has become a business evolution that is impacting all facets of business today, including sales,
Software License Asset Management (SLAM) Part III
LANDesk White Paper Software License Asset Management (SLAM) Part III Structuring SLAM to Solve Business Challenges Contents The Third Step in SLAM: Optimizing Your Operations.... 3 Benefiting from Step
Software License Asset Management (SLAM) Part 1
LANDesk White Paper Software License Asset Management (SLAM) Part 1 Five Steps to Reduce Software License Costs and Ensure Audit Preparedness Contents A Software Audit Looms in Your Future.... 3 Overbuying
Tivoli Security Compliance Manager. Version 5.1 April, 2006. Collector and Message Reference Addendum
Tivoli Security Compliance Manager Version 5.1 April, 2006 Collector and Message Reference Addendum Copyright International Business Machines Corporation 2006. All rights reserved. US Government Users
Software Usage Analysis Version 1.3. User s Guide
Software Usage Analysis Version 1.3 User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003, 2011. US
Gain IT asset visibility, control and automation
IBM Software Tivoli February 2011 Gain IT asset visibility, control and automation Control costs and improve service performance with IBM IT asset management solutions 2 Gain IT asset visibility, control
IBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment
IBM TRIRIGA Anywhere Version 10 Release 4 Installing a development environment Note Before using this information and the product it supports, read the information in Notices on page 9. This edition applies
Software asset management White paper. Improving IT service delivery through an integrated approach to software asset management.
Software asset management White paper Improving IT service delivery through an integrated approach to software asset management. September 2008 2 Contents 2 Introduction 3 The challenges of managing software
IBM Proventia Management SiteProtector. Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1
IBM Proventia Management SiteProtector Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1 Copyright Statement Copyright IBM Corporation 1994, 2010. IBM Global Services Route
Implementing the End User Experience Monitoring Solution
IBM Tivoli Application Performance Management Implementing the End User Experience Monitoring Solution John Griffith Copyright International Business Machines Corporation 2012. US Government Users Restricted
IBM Cloud Orchestrator Content Pack for OpenLDAP and Microsoft Active Directory Version 2.0. Content Pack for OpenLDAP and Microsoft Active Directory
IBM Cloud Orchestrator Content Pack for OpenLDAP and Microsoft Active Directory Version 2.0 Content Pack for OpenLDAP and Microsoft Active Directory IBM Cloud Orchestrator Content Pack for OpenLDAP and
Patch Management for Windows. User s Guide
Patch Management for Windows User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003, 2011. US Government
IBM Security QRadar Version 7.1.0 (MR1) Replacing the SSL Certificate Technical Note
IBM Security QRadar Version 7.1.0 (MR1) Technical Note Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 5 Copyright IBM Corp.
Tivoli IBM Tivoli Monitoring for Transaction Performance
Tivoli IBM Tivoli Monitoring for Transaction Performance Version 5.3.0 Evaluation Guide GC32-9190-00 Tivoli IBM Tivoli Monitoring for Transaction Performance Version 5.3.0 Evaluation Guide GC32-9190-00
IBM PowerSC Technical Overview IBM Redbooks Solution Guide
IBM PowerSC Technical Overview IBM Redbooks Solution Guide Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure
IBM Lotus Protector for Mail Encryption. User's Guide
IBM Lotus Protector for Mail Encryption User's Guide Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.0. Released December 2010. This
IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 1/9. MagicDraw UML - IBM Rational Rhapsody. Integration
IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 1/9 MagicDraw UML - IBM Rational Rhapsody Integration IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 2/9 Notices Copyright IBM Corporation
IBM Maximo Asset Management for IT
Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs and financial impact of IT assets with a single solution that tracks and manages your hardware, software
IBM Cognos Controller Version 10.2.0. New Features Guide
IBM Cognos Controller Version 10.2.0 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 9. Product Information This document applies
IBM FileNet System Monitor 4.0.1.5. FSM Event Integration Whitepaper SC19-3116-00
IBM FileNet System Monitor 4.0.1.5 FSM Event Integration Whitepaper SC19-3116-00 Before using this information and the product it supports, read the information in Notices at the end of this document.
Cúram Business Intelligence and Analytics Guide
IBM Cúram Social Program Management Cúram Business Intelligence and Analytics Guide Version 6.0.4 Note Before using this information and the product it supports, read the information in Notices at the
IBM Enterprise Content Management Software Requirements
IBM Enterprise Content Management Software Requirements This document describes the software prerequisite requirements for the IBM Enterprise Content Management suite of products. Last Updated: May 31,
IBM WebSphere Message Broker - Integrating Tivoli Federated Identity Manager
IBM WebSphere Message Broker - Integrating Tivoli Federated Identity Manager Version 1.1 Property of IBM Page 1 of 18 Version 1.1, March 2008 This version applies to Version 6.0.0.3 of IBM WebSphere Message
IBM SmartCloud Analytics - Log Analysis Version 1.1.0.3. User's Guide
IBM SmartCloud Analytics - Log Analysis Version 1.1.0.3 User's Guide IBM SmartCloud Analytics - Log Analysis Version 1.1.0.3 User's Guide Note Before using this information and the product it supports,
Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide
Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide IBM Cognos Business Intelligence (BI) helps you make better and smarter business decisions faster. Advanced visualization
Getting Started With IBM Cúram Universal Access Entry Edition
IBM Cúram Social Program Management Getting Started With IBM Cúram Universal Access Entry Edition Version 6.0.5 IBM Cúram Social Program Management Getting Started With IBM Cúram Universal Access Entry
Installing on Windows
Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Note Before using this information and the product it supports,
How to Deliver Measurable Business Value with the Enterprise CMDB
How to Deliver Measurable Business Value with the Enterprise CMDB James Moore [email protected] Product Manager, Business Service, Netcool/Impact 2010 IBM Corporation Agenda What is a CMDB? What are CMDB
Best Practices for Implementing Software Asset Management
Best Practices for Implementing Software Asset Management Table of Contents I. The Case for Software Asset Management (SAM)............................ 2 II. Laying the Groundwork for SAM............................................
agility made possible
SOLUTION BRIEF CA IT Asset Manager how can I manage my asset lifecycle, maximize the value of my IT investments, and get a portfolio view of all my assets? agility made possible helps reduce costs, automate
IBM Tivoli Asset Management for IT
Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs of IT assets with a single product installation that tracks and manages hardware, software and related
IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide
IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide Automated Clearing House (ACH) payment volume is on the rise. NACHA, the electronic payments organization, estimates that
IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic
IBM Security IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic Version 3.0 Note Before using this information and the product it supports, read the information in Notices
FileNet Integrated Document Management Technical Bulletin
FileNet Integrated Document Management Technical Bulletin Version 4.0.3 Release May 2011 1 Contents Introduction... 3 Contact customer support... 3 Feedback... 3 Microsoft Windows Terminal Services...
InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers
InfoPrint 4247 Serial Matrix Printers Remote Printer Management Utility For InfoPrint Serial Matrix Printers Note: Before using this information and the product it supports, read the information in Notices
IBM Connections Plug-In for Microsoft Outlook Installation Help
IBM Connections Version 5 IBM Connections Plug-In for Microsoft Outlook Installation Help Edition Notice Note: Before using this information and the product it supports, read the information in "Notices."
IBM Endpoint Manager. Security and Compliance Analytics Setup Guide
IBM Endpoint Manager Security and Compliance Analytics Setup Guide Version 9.2 IBM Endpoint Manager Security and Compliance Analytics Setup Guide Version 9.2 Note Before using this information and the
Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide
Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide This IBM Redbooks Solution Guide provides an overview of how data backup and
Packet Capture Users Guide
IBM Security QRadar Version 7.2.2 Packet Capture Users Guide SC27-6512-00 Note Before using this information and the product that it supports, read the information in Notices on page 9. Copyright IBM Corporation
Active Directory Synchronization with Lotus ADSync
Redbooks Paper Active Directory Synchronization with Lotus ADSync Billy Boykin Tommi Tulisalo The Active Directory Synchronization tool, or ADSync, allows Active Directory administrators to manage (register,
Endpoint Manager for Mobile Devices Setup Guide
Endpoint Manager for Mobile Devices Setup Guide ii Endpoint Manager for Mobile Devices Setup Guide Contents Endpoint Manager for Mobile Devices Setup Guide............. 1 Components.............. 1 Architecture..............
Omnibus 7.3.1 Dashboard Best Practice Guide and Worked Examples V1.1
Omnibus 7.3.1 Dashboard Best Practice Guide and Worked Examples V1.1 Licensed Materials Property of IBM Note: Before using this information and the product it supports, read the information in Notices
IBM Lotus Protector for Mail Encryption
IBM Lotus Protector for Mail Encryption for Windows User's Guide 2.1.1 Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.1. Released
IBM VisualAge for Java,Version3.5. Remote Access to Tool API
IBM VisualAge for Java,Version3.5 Remote Access to Tool API Note! Before using this information and the product it supports, be sure to read the general information under Notices. Edition notice This edition
IBM FlashSystem. SNMP Guide
IBM FlashSystem SNMP Guide IBM FlashSystem SNMP Guide Note Before using this information and the product it supports, read the information in Notices on page 9. This edition applies to IBM FlashSystem
Getting a head start in Software Asset Management
Getting a head start in Software Asset Management Managing software for improved cost control, better security and reduced risk A guide from Centennial Software September 2007 Abstract Software Asset Management
SmartCloud Monitoring - Capacity Planning ROI Case Study
IBM Tivoli Software SmartCloud Monitoring - Capacity Planning ROI Case Study Document version 1.0 Venkata Somisetty, Anindya Neogi (Ph.D.), Chris Nero i Copyright International Business Machines Corporation
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
IBM Security QRadar Version 7.1.0 (MR1) Configuring Custom Email Notifications Technical Note
IBM Security QRadar Version 7.1.0 (MR1) Technical Note Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 7. Copyright IBM Corp.
How To Get A License From A Business To A Computer (For A Business)
Six Steps to Completing a Software Audit and Ensuring Compliance While Saving Money A Guide to Assessing Vulnerabilities and Ensuring Ongoing Software License Compliance 200 West Mercer Street Suite E300
Sterling Supplier Portal. Overview Guide. DocumentationDate:9June2013
Sterling Supplier Portal Overview Guide DocumentationDate:9June2013 Sterling Supplier Portal Overview Guide DocumentationDate:9June2013 Note Before using this information and the product it supports,
IBM XIV Management Tools Version 4.7. Release Notes IBM
IBM XIV Management Tools Version 4.7 Release Notes IBM First Edition (September 2015) This edition applies to IBM XIV Management Tools version 4.7 release, and to all subsequent releases and modifications
IBM TRIRIGA Application Platform Version 3.3.2. Reporting: Creating Cross-Tab Reports in BIRT
IBM TRIRIGA Application Platform Version 3.3.2 Reporting: Creating Cross-Tab Reports in BIRT Cheng Yang Application Developer IBM TRIRIGA Copyright International Business Machines Corporation 2013. US
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
IBM Endpoint Manager Version 9.0. Patch Management for Windows User's Guide
IBM Endpoint Manager Version 9.0 Patch Management for Windows User's Guide IBM Endpoint Manager Version 9.0 Patch Management for Windows User's Guide Note Before using this information and the product
Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide
Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide Based on the open source Cloud Foundry technology, IBM Bluemix is an open-standard, cloud-based
PEOPLESOFT IT ASSET MANAGEMENT
PEOPLESOFT IT ASSET MANAGEMENT K E Y B E N E F I T S Streamline the IT Asset Lifecycle Ensure IT and Corporate Compliance Enterprise-Wide Integration P E O P L E S O F T F I N A N C I A L M A N A G E M
IBM Endpoint Manager for OS Deployment Windows Server OS provisioning using a Server Automation Plan
IBM Endpoint Manager IBM Endpoint Manager for OS Deployment Windows Server OS provisioning using a Server Automation Plan Document version 1.0 Michele Tomassi Copyright International Business Machines
Sametime Version 9. Integration Guide. Integrating Sametime 9 with Domino 9, inotes 9, Connections 4.5, and WebSphere Portal 8.0.0.
Sametime Version 9 Integration Guide Integrating Sametime 9 with Domino 9, inotes 9, Connections 4.5, and WebSphere Portal 8.0.0.1 Edition Notice Note: Before using this information and the product it
Rational Build Forge. AutoExpurge System. Version7.1.2andlater
Rational Build Forge AutoExpurge System Version7.1.2andlater Note Before using this information and the product it supports, read the information in Notices, on page 11. This edition applies to ersion
z/os V1R11 Communications Server system management and monitoring
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North
SOLUTION BRIEF: CA IT ASSET MANAGER. How can I reduce IT asset costs to address my organization s budget pressures?
SOLUTION BRIEF: CA IT ASSET MANAGER How can I reduce IT asset costs to address my organization s budget pressures? CA IT Asset Manager helps you optimize your IT investments and avoid overspending by enabling
IBM Endpoint Manager Version 9.0. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.0 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.0 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
Why you need an Automated Asset Management Solution
solution white paper Why you need an Automated Asset Management Solution By Nicolas Renard, Support and Professional Services Manager, BMC France Table of Contents 1 OVERVIEW Automated Asset Discovery
IBM Endpoint Manager for Software Use Analysis Version 9.2.0.2. Beta Features Guide
IBM Endpoint Manager for Software Use Analysis Version 9.2.0.2 Beta Features Guide Beta Features Guide This edition applies to IBM BigFix Inventory 9.2 (product number 5725-F57) and to all subsequent releases
The Power to Take Control of Software Assets
The Software Asset Management Specialists 781-569-0410 www.aid.com The Power to Take Control of Software Assets The Benefits of SAM: Building the case for Conducting a SAM Assessment and Implementing a
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
License management service
License management service Service definition License Management Service is a service provided by HP Software Licensing & Management Solutions, which allows enterprise customers to effectively monitor
IBM Lotus Protector for Mail Encryption
IBM Lotus Protector for Mail Encryption Server Upgrade Guide 2.1.1 Version Information Lotus Protector for Mail Encryption Server Upgrade Guide. Lotus Protector for Mail Encryption Server Version 2.1.1.
Release 7.1 Installation Guide
IBM Maximo e-commerce Adapter Release 7.1 Installation Guide Note Before using this information and the product it supports, read the information in Notices on page 21. This edition applies to version
How To Manage It Asset Management On Peoplesoft.Com
PEOPLESOFT IT ASSET MANAGEMENT KEY BENEFITS Streamline the IT Asset Lifecycle Ensure IT and Corporate Compliance Enterprise-Wide Integration Oracle s PeopleSoft IT Asset Management streamlines and automates
Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series
Redpaper Alex Osuna Bert Jonker Richard Waal Henk Vonk Peter Beijer Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series Introduction This IBM Redpaper gives a example of procedures
IBM RDX USB 3.0 Disk Backup Solution IBM Redbooks Product Guide
IBM RDX USB 3.0 Disk Backup Solution IBM Redbooks Product Guide The new IBM Removable Disk EXchange (RDX) USB 3.0 removable disk backup solution is designed to address your increasing capacity and backup
Client Manager for Endpoint Protection. User s Guide
Client Manager for Endpoint Protection User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices Copyright IBM Corporation 2003, 2011.
