Software Asset Management: A view from two perspectives from the audit world



Similar documents
Software Asset Management High Risk, High Reward

Software Asset Management Is your company prepared for a software audit?

Software Asset Management on System z

Cracking the Code on Software License Management

Cost-Effective Alternatives to Software Asset Management. kpmg.com

IIA Super Conference

Gain IT asset visibility, control and automation

8 Tips for Winning the IT Asset Management Challenge START

Software Asset Management (SAM) and ITIL Service Management - together driving efficiency

Asset management guidelines

Software Asset Management: Risk and Reward. March 2015

How To Protect A Publisher From Self Audit

Unlock the code IT Asset Management

Risk Considerations for Internal Audit

Dynamic Service Desk. Unified IT Management. Solution Overview

Next-Generation IT Asset Management: Transform IT with Data-Driven ITAM

Software License Asset Management (SLAM) Part III

AssetCenter 4.4. Total Asset Visibility and Control. Control Costs. Ensure Compliance. Reduce Complexity

Software Licenses Managing the Asset and Related Risks

SOFTWARE LICENCE MANAGEMENT

Software Audits Three Ways to Cut the Cost and Pain of a Software Audit

How Can I Better Manage My Software Assets And Mitigate The Risk Of Compliance Audits?

agility made possible

IBM Tivoli Asset Management for IT

SOLUTION BRIEF: CA IT ASSET MANAGER. How can I reduce IT asset costs to address my organization s budget pressures?

Software License Asset Management (SLAM) Part 1

SoftwareAsset Management (SAM)

Reducing Cost and Risk Through Software Asset Management

NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation

Getting a head start in Software Asset Management

IT ASSET MANAGEMENT.

Best Practices for Implementing Software Asset Management

How To Manage It Asset Management On Peoplesoft.Com

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture

SACM and CMDB Strategy and Roadmap. David Lowe ActionableITSM.com March 20, 2012

IT Asset Management. White Paper

IBM Maximo Asset Management for IT

Software License Optimization and Compliance: 10 Best Practices

The Power to Take Control of Software Assets

How To Manage Software Asset Management

Critical Issues in IT Asset Management

Control Costs with a 4-Speed SACM Transmission

The Value of Vulnerability Management*

BELTUG Paper. Software Licensing Audits Checklist

The Power to Take Control of Software Assets

ITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists

Commercial Software Licensing

PEOPLESOFT IT ASSET MANAGEMENT

IT Governance. What is it and how to audit it. 21 April 2009

GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT. January 7, 2011

Understanding inventory, configuration and IT asset management

Rosemary M. Amato, CISA Deloitte Accountants B.V.

Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.

Service Asset & Configuration Management PinkVERIFY

Configuration Management System:

WHITE PAPER December, 2008

White Paper November BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

BMC Remedyforce Asset Management. Frequently Asked Questions

Managing IT Using the Summit Platform

2012 Key Trends in Software Pricing & Licensing Survey

Asentinel Telecom Expense Management (TEM)

Patch Management Policy

Software Asset Management Toolkit

CMDB Essential to Service Management Strategy. All rights reserved 2007

THE PRESCRIPTION FOR A PAINLESS AUDIT

How To Use An Inventory And License Management Tool In A Microsoft Inventory Program

Fortune 500 Medical Devices Company Addresses Unique Device Identification

IT Asset Inventory and Outsourcing: The Value of Visibility

IT asset management. A best practice guide for IT asset management. Business white paper

ITIL v3 Service Manager Bridge

HITRUST CSF Assurance Program

An ITIL Perspective for Storage Resource Management

Clarity Infrastructure Management helps network operators to plan and document the change to their networks

Project Charter Updated

How To Improve Mainframe Software Asset Management

Service Management Foundation

Peregrine. AssetCenter. Product Documentation. Asset Tracking solution. Part No. DAC-441-EN38

BUILDING THE NEW BUSINESS CASE FOR ITAM

Title: Enterprise Information Technology Service Management (ITSM)

IAITAM s Certified Hardware Asset Management Professional Course Syllabus

Asset Management Software is the last thing you need

Total Protection for Compliance: Unified IT Policy Auditing

BSM for IT Governance, Risk and Compliance: NERC CIP

ZENworks Asset Management 11. Product Brochure

Auditor General s Office. Governance and Management of City Computer Software Needs Improvement

Transcription:

Software Asset Management: A view from two perspectives from the audit world SoftSummit 2008 Hyatt Regency Santa Clara, California October 20-22, 2008 Steve Revesz, Director Deloitte & Touche LLP 255 West Santa Clara San Jose, CA 95113 408 704-2421 srevesz@deloitte.com

Agenda Contract risk and compliance Definition, trends and current state in Software Asset Management (SAM) Vendor audits of software license compliance Internal audits of SAM processes Risk implications A case for multi-method approach to SAM 1

Contract risk and compliance (CRC) Assists clients in understanding, analyzing, and mitigating risks of doing business with others Understand and analyze internal and external risks of doing business with third parties Analyze whether business relationships are in compliance with expectations, contractual obligations, and business protocols (monetary and nonmonetary) Consider clients own internal controls over compliance with contracts, and processes to monitor and analyze performance of their extended business relationships Understand opportunities to strengthen the strategic relationship with extended business relationships CRC engagements include such reviews as: Software license compliance reviews on behalf of vendors Software inspection management reviews to facilitate clients compliance Pre-contract readiness assessments of IT outsource service providers Post-contract compliance assessments of IT outsource service providers Contract manufacturer vendor reviews Royalty analyses Advertising and media vendor reviews, including interactive advertising 2

Software Asset Management: Defined Software Asset Management Related Portfolios ITIL describes Software Asset Management (SAM) as all of the infrastructure and processes necessary for the effective management, control, and protection of the software assets within an organization, throughout all stages of their lifecycle. SAM Goal: A single, integrated view of all software that directly matches on a one-to-one basis with purchasing and licensing records There are several IT management portfolios that SAM affects, including: Contract License Financial Procurement Vendor Human Resources Software Asset Tracking vs. Management Although Asset Tracking and Asset Management are often used synonymously, there is a subtle difference between the two: Asset Tracking: Deals with the physical characteristics of software in support of planning, deployment, operation, support, and service; installation/use data. Asset Management: Deals with the fiscal (financial and/or contract) details of software as required for financial management, risk management, contract management, and vendor management; ownership data. Asset tracking is a prerequisite. Financial Procurement Budget Cost control Chargeback Physical Inventory management Electronic discovery Electronic distribution Version tracking License tracking Contractual License compliance Negotiations Contract maintenance Supplier management Change management 3

Trends in software licensing and issues Pre-1990s Site and multi-cpu licenses, independent of machine number and/or capacity Optional maintenance, at 10%-15% of license fee; all inclusive Additional fees based on actual expanded use Bundled function Minimal enforcement of license restrictions Software Industry Trends 1990s Vendors continue to charge for full capacity Optional maintenance, at 10%-15% of license fee; coverage options and limits Cost penalties for not staying current Platform specific license models License enforcement IT Virtualization Mergers/acquisitions Re-engineering of license agreements Vendors exploiting increasingly restrictive contract terms to increase revenue Compliance audits Convergence of license models - cross platform Electronic licensing and software distribution Chronology 2001-2002 Business metric based pricing models Mandatory maintenance, at 15%- 20% of license Enterprise-wide licensing Multiplatform licensing Concurrent usage models withdrawn Compliance audits 2003-Current Rental/periodic/term licenses dominate Mandatory maintenance, at 15%-30% of license Negotiated usage licensing models (utilitybased) Open source licensing Functionality unbundled New version functionality as separate product IT Virtualization When you know for a fact that if all the software disappeared, all the planes would stop flying, all the streetlights would go off, all the plants would stop producing and you can still say with a straight face that software isn't an asset - then you must acknowledge an enormous gap between reality and practice. Harvard Business Review, January/February 1990 4

Licensing methods Organizations today have a wide variety of options for licensing software, with subscription-based licensing methods gaining momentum, as software customers demand increased flexibility and better alignment with value, and as software vendors look for opportunities to enhance the predictability of revenues. Per Machine Licenses are assigned to a particular machine / workstation / server Licensing Methods Perpetual Licensing Subscription Licensing Per Processor Core Per User Concurrent User Metric Based Fixed Fee Subscription On Demand Subscription License costs are determined based on the number of processor cores contained within the machine that runs the software product Licenses are assigned to specific users License costs are derived based on how many users access the software concurrently Business usage / financial metrics are the determinants of license costs The customer rents the software and pays a recurring fixed fee (usually on an annual basis) to use it The organization uses the software product as required, and then pays licensing fees based on how much it used the product during a particular period 5

Cost continues to be a central driver for SAM Certain factors contributing to the total cost of ownership of a software asset arise throughout its lifecycle. Acquisition Software License Fees Administrative Overhead Fees based on licensing model followed and usage forecasts Overhead for contract negotiation, procurement, and delivery of assets Operational Upgrade/ Maintenance Software Support Administrative Overhead Identifying software that requires maintenance/ upgrades. Costly maintenance of shelfware Support fees for software on a per-user or volume basis. Help desk costs IT training costs. Tracking software usage and licensing compliance 6

The view from two audit perspectives Scope of License Compliance Reviews Internal or external (i.e., vendor) driven process to validate and reconcile deployed software products with entitlement External inspections may result in potential adverse financial impact in the case of overdeployment in excess of licensed entitlement Internal inspection are proactive to minimize impact of an external inspection, and may also result in opportunities to reduce costs due to unused or underused products Part of due diligence in outsourcing arrangements Scope of Internal Audits Internal process driven by control objectives and testing of control activities, including: Software is acquired consistent with established policy and procedure Software is accurately tracked throughout its life cycle from procurement through disposal Processes are established to load and use software in accordance with the applicable licensing agreements A regular review process is in-place and used to periodically verify compliance with license and maintenance requirements 7

Vendor compliance reviews Over deployment Manual error prone spreadsheet approach to SAM Incomplete installation of automated tools Outdated or missing signature files or knowledge modules Not installed on all machines Failure to understand licensing rules Misinterpretation of contract provisions Product co-requirements Failure to recognize and understand new terms and conditions Sometimes found in Announcement Letters Failure to track configuration changes impacting licenses Failure to accurately collect and report usage information Failure to perform periodic self-audits (reconcile entitlement and deployment) 8

Vendor compliance reviews: Outsourcer Over deployment Lack due diligence to reconcile deployed with entitled prior to assuming outsourcer role Failure to properly execute license provisions in the event of outsourcing to transfer licenses where provided Failure of the service provider to properly use software in an outsource environment Support multiple customers with software licensed to support a single customer 9

Financial management issues and risks Issue: Incomplete and/or inaccurate corporate financial reports due to absence of data on: Risk: Deployed and entitled software Financial commitments in software contract terms and conditions Inability to: Meet financial goals Prepare accurate corporate financial reports (i.e., income statements, balance sheets, etc.) Prepare financial management reports (i.e., forecasts, budget to actual expenses, charge-back calculations, etc.) Provide financial management and control over planned and active projects involving software 10

Asset management issues and risks Issue: Inaccurate or incomplete reconciliation of data in the IT asset management system and the financial systems Risk: Inadequate management of software assets due to: Missing, incomplete and/or inadequate audit trails and systems interfaces between the software asset management system and the financial system Inadequate and error-prone manual or automated reconciliation processes 11

Asset and security management issues and risks Issue: Inadequate tracking, monitoring, and control of software downloads from both authorized internal portals and unauthorized external sources. Risk: Lack of control over what software is introduced and used to meet business functions: Download from internal portal: Inability to track and control software for purposes of license compliance, charge-back, change control, maintenance, etc. Download from external sources: Potential introduction of nonstandard/ unsupported software, as well as software with malicious code, and violation of license agreements 12

Software life cycle management Issues and risks Issue: Absence of a linkage between a specific piece of software on a specific server/host or workstation to its associated asset record, purchase order, and vendor contract Risk: Inability to track and manage software throughout its life starting with acquisition Potentially inaccurate and incomplete data regarding the disposition and location of software assets leading to: Inability to create an accurate Configuration Management Database (CMDB) or to rely on the accuracy of the existing CMDB Adverse impact effective management of key IT functions, including software refresh, software reuse, patch management, etc. Inability to maintain accurate inventory of available product and preclude over purchase of products 13

Contract management issues and risks Issue: Inadequate or missing processes to capture software contract terms and conditions in standard manner to facilitate compliance self-assessments. Risk: Manual processes to reconcile contract terms with actual practices may be error prone leading to legal and financial consequences Barrier to standard contract language and business rules to facilitate contract negotiations, as well as subsequent compliance Inability to easily determine the impact of changes to terms and conditions or product pricing 14

Software usage issues and risks Issue: Absence of complete and accurate usage data about deployed software Risk: Potential payment for under utilized or unused software Financial or legal exposure due to compliance with usage metrics Inaccurate chargeback for software usage Potential missed opportunities to identify alternative and cheaper alternatives for software products having limited use 15

Software order and fulfillment issues and risks Issue: Inadequate standards and controls around the process to order, approve, and fulfill requests for software Risk: Inability to acquire and deploy software in an effective and efficient manner to meet business needs Introduction of products that do not meet technical requirements Lack of, or inadequately controlled, authorization process and spending limits for software 16

Business risks Organizations without a comprehensive SAM solution are exposed to significant business risk that detrimentally impacts organizational performance. Underlicensing Unauthorized Software Outdated Software Description More licenses are deployed than purchased License validity cannot be demonstrated because proof of purchase or proof of license is unavailable Compatibility issues can exist between business applications and unauthorized software Unauthorized software is deployed without proper license(s). Outdated applications with serious security flaws act as an attack vector for hackers and viruses Business Impact Financial losses due to license replacement costs and penalties Damaged reputation that leads to fewer customers and fewer sales Unexpected operational disruptions resulting from failure of business applications Financial losses and damaged reputation due to license replacement costs, penalties, and adverse operational impact Operational failures that cause interruptions and reduce productivity Breaches that lead to loss of confidential data or data protected under law (SOX, HIPAA) 17

Software asset life cycle: challenges, opportunities, and risk 1. Procure 2. Deploy 3. Manage & Support 4. Patch & Upgrade 5. Retire Challenges Description Determine business need Identify software required and check installs Procure software Lack of standardized contractual terms and licensing models Integrity issues between inventory levels & purchasing Test the software to avoid conflicts Centralized deployment Identifying software usage and environment Track ongoing support and maintenance Lack of central repository Patch software as required Determine if current version is no longer supported Lack of unified view of software installs to drive upgrades Determine if software is obsolete Re-harvest and reallocate licenses Inability to transfer/ reharvest unused licenses Inability to collect and estimate software usage Opportunities Standardize contractual terms Vendor management Master Catalog of software assets Track software installs and reconcile against procurement Maintain a central repository of software Determine overlicensed position Identify shelf-ware Centralized software upgrades based on unified view of software installs Optimize maintenance spend Re-harvest / transfer unused licenses within and between businesses Risks Inefficient contract negotiation terms Litigation risks for software noncompliance Risk of under-licensing deploying more software than we have licenses for Paying maintenance fees for unused/ overlicensed products Unsupported software Security holes in unpatched software Unused licenses 18

Common implementation challenges Challenge Remediation Data Quality Inconsistent data or data with missing key elements Implement automatic tools to flag inconsistent data and manual cleaning processes to correct data inaccuracies Process Product Identifiers Lack of a company-wide unique identifier, which can identify products across vendors Create new unique identifier which works independently of individual vendors and accounts for all classes of software assets Product Catalog Lack of a centralized list of technology products which both Purchasing and IT can use Build and maintain common catalog of standard technology products which Purchasing can use for new orders and IT can use for asset tracking Technology Software Discovery System Integration Discovery tools cannot automatically detect software running on all existing platforms and under all licensing models Systems for order placement, purchasing, HR, and inventory may not have facilities to allow easy integration with each other Augment existing discovery tools or replace them with off-the-shelf / custom-built solutions that satisfy requirements Upgrade software, build custom interfaces using flat files or other methods People Org Resistance Change Management Organizational barriers and silos centered around specific departments or functions New processes and systems are not understood and/or utilized Create buy-in and implement programs that foster cross-departmental communication Implement change management program and provide comprehensive training in new processes and systems 19

Asset management maturity model 1. Chaotic 2. Reactive 3. Proactive 4. Service 5. Value Creation Minimal process maturity Little or no knowledge of what assets are owned or where they are Processes are mature to a reactive state where the focus is on counting assets and involves annual physical inventory IMAC processes are not consistently followed Processes are implemented to manage assets throughout the entire lifecycle, they are well defined, adhered to, reviewed, and reengineered where necessary Metrics are in place to measure value and service levels have been created to meet business or IT goals Audits conducted to review the efficiency and effectiveness of established business processes across all assets of the enterprise; charge-back for business units Level of Automation No centralized procurement Contract management is inadequate Ad hoc purchasing Lack of adequate tools to track and manage assets No reporting capabilities Little or no data sharing with purchasing and procurement Spreadsheets or databases are created to track assets, and autodiscovery tool to supplement this data Basic and/ or ad-hoc reporting with little detail run on a project-by-project basis Centralized procurement. Asset repository and autodiscovery tools are integrated with the IT service desk Inventory data is linked to financial and contractual data to create a centralized view Automated requisition processes are integrated with purchasing and ERP; faster procurement timeframes; inventory levels are checked to prevent over-buying Software, PC, servers network, and telecom equipment information is stored in a common repository Asset Management system is fully integrated with other backend systems Reports are run frequently, and opportunities for cost savings identified and communicated Centralized procurement with integration to ITAM tools Standardized vendors and contracts Implementation of three key tools repository, autodiscovery, and software usage with integration to strategic systems Sophisticated reporting, identifying current usage levels under licensed and over licensed positions 20

How to move up the maturity curve SAM Risk Assessment: Identify high-risk areas associated with software products and processes for software procurement, discovery, contracts, inventory, deployment, and software disposal Current software management policies, procedures, processes, and resources benchmark against ISO/IEC 19770-1 SAM processes to identify existing gaps in control effectiveness. Produce a SAM Risk Scorecard that identifies risk areas, benchmarking results, a summary and assessment of SAM controls, and recommendations for remediation Software License Baseline: Establishes a software inventory baseline used to analyze and reconcile inventory of specified product or group of products against entitlements and terms and conditions of applicable contracts Provides clear point-in-time look at your company s software license commitments by vendor, location, IT environment, and operating system, indicating potential over- or under-deployment with recommendations for addressing these risks Full SAM Service: A thorough assessment of key processes, including software requests, IT procurement, and cataloging and tracking of purchases, as well as the organization s software deployment procedures, deployment tracking, reconciliation of deployment to purchases, verification procedures, and license agreement management Identification of area of potential improvement and development of a plan for implementing process and organizational enhancements, including the potential use of automated tools to facilitate SAM 21

About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu, a Swiss Verein, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu and its member firms. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries.