BUYER S GUIDE: PC INVENTORY AND SOFTWARE USAGE METERING TOOLS



Similar documents
Quantifying ROI: Building the Business Case for IT and Software Asset Management

IT and Software Asset Management: A Key to Reducing Costs

Best Practices for Implementing Software Asset Management

How To Get A License From A Business To A Computer (For A Business)

Why you need an Automated Asset Management Solution

Desktop Management for the Small Enterprise

Automating Software License Management

How To Use An Inventory And License Management Tool In A Microsoft Inventory Program

Windows 7 Upgrade Risk Mitigation Planning: Ensuring Windows 7 Upgrade Success

How To: Choosing the Right Catalog for Software License Management

The Power to Take Control of Software Assets

Configuration Management A Foundation for Grid Computing

How To Manage Software License Management With An Aspera Catalog

Firewalls Overview and Best Practices. White Paper

Unicenter Asset Intelligence r11

The Power to Take Control of Software Assets

Unicenter Desktop Management for Enterprise Infrastructure Management

Controlling Desktop Software Expenditures

Unicenter Desktop DNA r11

Making the Business Case for IT Asset Management

CA IT Client Manager. Asset Intelligence

Microsoft Application License Control in Virtual Environments

License management service

Device Lifecycle Management

Discovery and Usage data for Software License Management

Asset. Unicenter Management r11

Information Technology Solutions

Shavlik NetChk Protect 7.1

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

PC-Duo Web Console Installation Guide

WHITE PAPER. Extending the Reach of the Help Desk With Web-based Asset Management Will Significantly Improve Your Support Operations

Appendix D to DIR Contract No. DIR-SDD SYNNEX Corporation STATEMENT OF WORK / SUPPLEMENTAL AGREEMENT for <DIR CUSTOMER> END USER SERVICES

About The Express Software Identification Database (ESID)

THE COMPLETE VIEWER FOR MS PROJECT. Deployment White Paper

alcatel-lucent vitalqip Appliance manager End-to-end, feature-rich, appliance-based DNS/DHCP and IP address management

How To Manage It Asset Management On Peoplesoft.Com

Effective Use of Individual User Profiles with Software Distribution

Unifying IT How Dell Is Using BMC

Pearl Echo Installation Checklist

IBM Tivoli License Manager. Intelligent software license management to help optimize business value

HP Client Manager 6.1

Eight Ways Better Software Deployment and Management Can Save You Money

Product Data Sheet.

Kaseya IT Automation Framework

Server Consolidation with SQL Server 2008

CA IT Client Manager. Desktop Migration

Virtual Application Management with Microsoft Application Virtualization 4.6 and System Center 2012 Configuration Manager

User Guide. Version 3.2. Copyright Snow Software AB. All rights reserved.

SAM Benefits Overview SAM SOFTWARE ASSET MANAGEMENT

HP Client Automation software Starter and Standard Editions

Proactively Managing Servers with Dell KACE and Open Manage Essentials

The. Essential. Guide. to an NDS-to- Active Directory Migration. By David Chernicoff. sponsored by. March

Rapport Administrative Software for Compaq Thin Clients

Dynamic Service Desk. Unified IT Management. Solution Overview

Creating an Enterprise App Store Addressing the Consumerization of IT without Jeopardizing Control

Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server

Virtual Desktop Infrastructure Planning Overview

Windows Embedded Security and Surveillance Solutions

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

Remote Infrastructure Support Services & Managed IT Services

Power, Patch, and Endpoint Managers Expand McAfee epo Platform Capabilities While Cutting Endpoint Costs

xassets Hosted Services Microsoft SAM Assist Audits with xassets

Driving Down Software Costs with Software Asset Optimization Contents

Agent vs. Agent-less auditing

Welcome to the QuickStart Guide

Windows NCD ThinPATH

The Casper Suite An ROI overview

Unicenter Remote Control r11

RayManageSoft. infinity. The new generation of Application Lifecycle Management

Dell Desktop Virtualization Solutions Enterprise Offering Overview

PC Power Management FAQ

BEST PRACTICES WHITE PAPER. BMC BladeLogic Client Automation and Intel Core vpro Processors

HP Client Manager 6.2

Managed Service Plans

Benefit. Allows you to integrate RES PowerFuse with application virtualization technologies other than SoftGrid (e.g. Citrix XenApp, VMWare Thinapp).

PEOPLESOFT IT ASSET MANAGEMENT

SapphireIMS 4.0 Asset Management Feature Specification

ZENworks Asset Management 11. Product Brochure

AdminToys Suite. Installation & Setup Guide

Hardware and Asset Management Program

Key Considerations for Vulnerability Management: Audit and Compliance

Desktop Authority and Group Policy Preferences

Symantec Asset Management Suite 7.6 powered by Altiris technology

SofTrack versus SMS 2003

Symantec Asset Management Suite 7.5 powered by Altiris technology

See all, manage all is the new mantra at the corporate workplace today.

Introduction. Manageability. What is needed?

WHITE PAPER. PC Deployment

Operating System Migration

Matrix42. License Compliance of Virtual Workplaces

Using HP System Software Manager for the mass deployment of software updates to client PCs

Desktop Virtualization in the Educational Environment

ExtendTime. Introduction. VoIP: The Future of Voice Networks and Applications

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.

White Paper: Managing Security on Mobile Phones

IBM Tivoli Asset Management for IT

Operations Manager Comprehensive, secure remote monitoring and management of your entire digital signage network infrastructure

HP OpenView AssetCenter

Product Brief SysTrack VMP

Windows Server Virtualization An Overview

Transcription:

BUYER S GUIDE: PC INVENTORY AND SOFTWARE USAGE METERING TOOLS A guide for identifying an IT/software asset management product that best meets the needs of your organization 200 West Mercer Street Suite E300 Seattle, WA 98119 Phone +1.206.691.7900 Fax +1.206.691.7901 infoexpress@expressmetrix.com www.expressmetrix.com

Introduction Selecting an IT and software asset management (IT/SAM) tool can be a very complicated process. There are an abundance of tools on the market that address a variety of needs in very different ways, and making sense of all the features and capabilities can be an arduous task. In an effort to simplify the process, we have created this guide to help businesses and IT professionals identify a best-of-breed product that best meets the needs and objectives of their own organizations, as well as describe some of the pitfalls associated with certain categories of products. This guide focuses specifically on two types of functionality: PC inventory and software usage metering, and the minimum requirements you should seek from any tool that provides these capabilities. First and foremost, before evaluating any tool, you must identify your own organization s objectives with respect to IT and software asset management, and remain focused on these goals throughout the selection process. Too often, the principal drivers become secondary to the feature set, with only a moderate understanding as to whether the specific features will in fact empower the organization to achieve its established objectives. Additionally, organizations sometimes overlook the processes required to maintain the tool over the long run, as well as the organizational processes that the tool is required to support. It is vital to take these into consideration when evaluating a tool, as the process and the tool need to be tightly integrated in order to ensure an effective IT/SAM program. Definitions Before discussing the specifics of what to look for in inventory and software usage metering tools, we will define these terms and briefly discuss the IT and business problems they solve. 1. PC A PC inventory tool collects information about the hardware configurations and software installations of networked (and often times nonnetworked) computers in an automated fashion. A hardware inventory typically includes data such as computer name, CPU type and speed, memory, disk space, network card address and manufacturer, serial number, and so on. A software inventory identifies application information such as program name, version, manufacturer, and path. An organization typically purchases a PC inventory tool to achieve the following objectives: Conduct software audits to determine compliance status Reduce overhead associated with manual audits Detect the presence of unauthorized applications Plan for software upgrades and/or migrations by revealing what machines do or do not have the necessary hardware/software requirements Increase help desk efficiencies by providing support staff with instant access to data regarding software installations and hardware configurations for individual PCs 2. Software Usage Metering Software usage metering involves collecting data pertaining to usage patterns of software programs running on employees PCs. The most common application of usage metering is determining what software is being used, and what software is unused or underutilized. Another component of software usage metering may include application control, which involves blocking the use of unauthorized or unlicensed programs. Specifically, usage metering helps organizations: Reduce spending on software that is unused or underutilized Reallocate unused or underutilized software to more appropriate individuals or departments Forecast future organizational software requirements based on usage patterns Monitor and/or restrict the use of unauthorized applications for security, productivity, or compliance reasons Enforce a standard desktop 2

Best-of-breed products vs. basic audit tools There are two common myths when it comes to purchasing an inventory or usage metering tool. The first is that all products perform the same fundamental tasks, and that a basic audit tool will be just as effective as a best-of-breed product at managing IT assets. The most basic audit tool is designed to conduct one-off software inventories on an ad-hoc basis. Although such tools are typically less expensive than best-of-breed inventory products, the low price invariably comes at a cost. Admittedly, it is difficult to generalize a tool s capabilities based on its price, but by and large, the cheaper the tool, the less likely you will be able to easily obtain the information you need to make good decisions about managing your IT assets and achieve the ongoing objectives of your IT/SAM program. Unfortunately, many tools designed for one-off audits appear to be relatively straightforward and easy to use, but they actually cost more in the long run given the additional amount of time required to make sense of the information collected, detect inaccuracies, and find workarounds for incomplete data. The bottom line is that basic audit tools are generally not sophisticated or flexible enough to allow you to strategically manage your IT assets in long run. One of the largest issues relates to how basic audit tools perform application recognition. These tools often doublecount applications, cannot differentiate between programs with the same executable (such as MSDE and SQL), and/or fail to associate support files with their parent applications because they merely provide a raw inventory of files that reside on PCs. Such inventories tend to be inaccurate because the tools do not depend on a database of recognized applications; rather they rely on what can be found using a single methodology, such as Add/Remove programs or file headers. This leaves you to sift through literally thousands upon thousands of file names to determine their origin. Additionally, there are often problems with basic audit tools reporting capabilities. Typically, these tools produce mountains of data, but do not present in a manner that corresponds to specific questions you are trying to answer, such as, What are my vulnerabilities with respect to license compliance? or Where are we overspending on software? If the data cannot be presented and filtered in meaningful ways out of the box, you will spend inordinate amounts of valuable time trying to interpret and organize the information in a manner that enables you to make good decisions. Finally, many basic audit tools do not provide valuable software usage metering functionality. While it is critical to obtain inventory data to determine an organization s status with respect to compliance, this often leads organizations to overpurchase software licenses in an effort to remain compliant. Collecting usage data helps companies avoid spending too much on software by revealing which installed copies are not being used (or used enough) to justify ownership of those licenses. In addition, there are other benefits to usage metering, such as enforcing a standard desktop and detecting or prohibiting the use of unauthorized applications. Point products vs. enterprise suites A second misconception about IT/SAM tools is that buying an enterprise suite product that includes not only inventory or usage metering capabilities, but also deployment, patch management, repository, and/or remote control capabilities, means you can effectively administer your IT/SAM program using a single product. While buying an enterprise suite may offer a one-stop shop and perhaps the breadth of functionality you seek, as with more basic audit tools, the inventory and usage metering capabilities may not provide the depth of data or reporting necessary to accomplish your goals. In addition, enterprise suite products are often extraordinarily complicated from an installation and deployment perspective due to the multiple functions they serve. Finally, while it is important to ensure that any product you buy can easily scale to the size of your organization, if your 3

organization or department has 6000 users and you do not plan to expand by a factor of 10 anytime soon, you may be paying more than you need for a product that has been proven to scale to 60,000. In the end, if a tool is collecting data accurately, it all boils down to the following factors: reporting and ease of use.does the tool give you the information you need with minimal maintenance? Be sure to think back to your objectives. Are you confident the tool you purchase will give you the information you need to make good decisions without need for further manipulation? Don t pay for more features or scalability than your organization needs to accomplish its goals, as it may only make the tool more difficult to deploy, administer and maintain. And even if you do need a wide breadth of functionality to meet other requirements of your organization, you may still consider deploying more than one best-of-breed point product, as the inventory and software usage/metering capabilities of an enterprise suite may not be robust enough to meet your organization s IT/SAM goals. Evaluating tools The best way to answer most of your questions is by installing the product in your own environment. Most best-of-breed tool vendors provide a time-limited evaluation which you can roll out to a subset of your organization s PCs. Be sure to evaluate the product among a representative cross-section of your organization, so you can ensure the data your tool collects is relevant to the applications being used. You should also evaluate whether the installation and deployment of the tool goes smoothly and is relatively hassle-free; the amount of time you spend on the installation and deployment is typically representative of the amount of time you will spend engaged in ongoing maintenance of the product. In conjunction with evaluating the tool, you should also thoroughly access the technical support of the organization, as these are the individuals that you will be interacting with on a long-term basis. Don t forget to ask for references from the vendor for organizations or departments the size of your own, and ideally, for organizations with similar objectives to your own (i.e. achieving license compliance, reducing annual software expenditures, identifying and restricting the use of unauthorized programs). If you are working with a high-quality vendor with a genuine customer base, they should have no difficulty providing you with references that are relevant to you. In addition to exploring the overall positives and negatives, be sure to check the following with your reference(s): Amount of ongoing maintenance Amount of manipulation required for meaningful reports Accuracy of application recognition Stability/reliability of product Quality and responsiveness of sales representatives IT/SAM tool checklist The next two pages provide a checklist of recommended features and capabilities to take into consideration when evaluating PC inventory and software usage metering products. There may be some items that do not pertain to your organization, but in general, you will want to make sure your tool has these minimum capabilities. 4

Feature/Capability Checklist Product Type Functionality Features Discovery/ Recognition Based on more than one methodology (Windows Add/Remove programs, file executables, GUID) to ensure comprehensiveness Database of recognized files/applications updated frequently Automatically associates support files with parent applications Discovers files that are not recognized by application database Differentiates between version numbers, standalone applications vs. applications that are part of a suite, and suite types (i.e. Microsoft Office Standard vs. Professional) Usage Metering Integrated with inventory data Detects both start and stop times Supports a Terminal Server/Citrix environment (if applicable) Includes application control (ability to block or restrict launch of applications by individual or group) Application control supports concurrently licensed programs and ensures usagebased license compliance (if applicable) Does not rely on Windows usage parameters (such as Frequently", Occasionally, Never ) Client Client is invisible to end-users Can collect data when user is not logged in to the OS Can collect data on non-networked computers Supports concurrently licensed applications (if applicable) Does not rely on user to execute inventory or metering Customization Provides ability to enter custom or unrecognized applications Provides ability to input/import and store purchasing data (for example: licenses owned, PO number, purchase date, maintenance expiration) Provides ability to input/import and store custom hardware data (for example: location, asset tag, phone number, lease number) Can be configured to collect information on non-executable file types (for example: music and video files) Reporting Provides pre-configured reports for key data you need, such as: Unused applications Compliance status What has changed over specified timeframes Workstations that meet minimum security and or hardware/software requirements Reconciles inventory and usage data with purchasing data Provides ability to summarize application data regardless of version Can be filtered based on Active Directory or NT domains Can be filtered based on decision-making needs (for example: vendor, legal vs. not legal) Offers both scheduled and ad hoc reporting Uses standard report-writing technology Does not over-count duplicate installations on a single machine 5

Feature/Capability Checklist Product Type Functionality Features Installation/ Deployment Components can be installed on a single server Uses industry standard technology (for example: SQL, WMI,.NET) Client can be deployed using applicable technology (for example Active Directory, NT domains, or IP address) Takes hours to install and deploy, not days Does not require professional services Does not rely on user to install client Does not rely on login scripts for client deployment 200 West Mercer Street Suite E300 Seattle, WA 98119 Phone +1.206.691.7900 Fax +1.206.691.7901 infoexpress@expressmetrix.com www.expressmetrix.com Express Metrix, Express Software Manager Professional, Express Software Standard, Express Software Manager, Express, and Express Meter are registered trademarks of Express Metrix, LLC. All other trademarks, trade names, or company names referenced herein are used for identification only and are the property of their respective owners. 6