SOLUTIONS

Software License Management (SLM) used to be about avoiding audits and penalties for being under-licensed. But today, many organizations are over-licensed and paying annually for maintenance and applications that are not used and sometimes not even installed. Of course it’s easier to simply count the number of desktops, laptops and servers and purchase a volume licensing agreement from each major vendor that covers everything. But how much money are you wasting annually by doing this?

Many organizations also do not have an automated way to check the vendors’ audit data. Prior to the audit, an organization should know its license position, both installed and used products and license rights purchased. This is particularly important for server software, where the license is usually attached to a physical server, but the software is running on virtual guest operating systems. Many organizations also spend the majority of their software budget on server software, so it is particularly important to have accurate and up-to-date data on your server installations for Microsoft, Oracle, IBM, SAP and others.

Belarc’s unique features for SLM

Belarc’s products offer the following unique features to help manage and optimize your SLM task:

  • Belarc obtained a U.S. patent in 2013 which automatically determines when all installed software was last used. This feature is very useful for software harvesting, where instead of purchasing additional copies of Project, Visio or Office Pro, for example, these packages can be moved from desktops where they are under-utilized to those who need them, thereby avoiding the cost of additional purchases and maintenance. Belarc’s method discovers the last used time of all the installed applications immediately and does not need to be installed for six months to a year before the data can be used.
  • On the server side, BelManage automatically discovers all of the virtual machines (VMs) and the dependency mapping between the VM guests and the physical host machines. This data is essential for licensing server software such as SQL Server, Windows Server and Oracle databases.
    This information is used in the Data Analytics reports which combine the discovered server data with the licensing metrics for these products and the purchase records. BelManage supports Windows, VMware and Linux hypervisors and the Windows, Linux and Solaris (x86) server operating systems.

This is where a licensing tool such as Belarc’s Data Analytics module can be very helpful, because it combines the discovered instances of software, with our customer’s purchase records and the current product licensing metrics from the vendors. This also allows our end-users to run what-if scenarios to see what licensing scheme works best for their organization.

For more information, white papers or a demo, please send an email to info@belarc.com

Configuration based Security

Cyber security best practices have moved from focusing mainly on firewalls, intrusion detection and anti-virus programs to detailed configuration controls on host machines (desktops, laptops, tablets, phones, servers and VMs). This effort has been led in the U.S. by NIST and the Center for Internet Security (CIS). The CIS supports a concise set of twenty security controls which were developed and continuously updated by a very experienced group of government and private industry security practitioners.

In addition to automatically monitoring the NIST technical controls, Belarc's products support all of the CIS Top Five controls.

To learn more, please request our white papers, “Securing the Enterprise - Cyber Security Myths and Reality” and “Mapping the NIST security controls” by sending an email to: whitepapers@belarc.com

Configuration Management

Automatically track detailed software, hardware and security configurations

Reduce your IT operating costs by identifying older versions or unused applications; improve your cyber security resilience; plan and automate an operating system migration. You can accomplish this and more with an automated, enterprise wide repository of detailed software, hardware and security configurations.