Close Menu
BlogSpotTipsBlogSpotTips
  • Home
  • Education
  • Finance
  • Latest Internet News
    • Social Media
    • Software
  • Game
  • Contact Us !
Facebook X (Twitter) Instagram
BlogSpotTipsBlogSpotTips
  • Home
  • Education
  • Finance
  • Latest Internet News
    • Social Media
    • Software
  • Game
  • Contact Us !
Facebook X (Twitter) Instagram
BlogSpotTipsBlogSpotTips
Home»Software»Carrot Vs. Stick: Making The Case For Data-Driven Software License Compliance
Software

Carrot Vs. Stick: Making The Case For Data-Driven Software License Compliance

Loknath DasBy Loknath DasDecember 31, 2019No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

Photo:

No one likes to be audited.

On its own, the word “audit” implies wrongdoing or, at the least, carelessness. Opening the books particularly stings when the subject of an audit believes that every obligation has been met in good faith. An audit suggests the reviewing party sees only an act of bad faith.

But for software vendors, an audit has often been the traditional path to confirm whether a customer is complying with its software license agreement. In such a scenario, a vendor likely has a legitimate suspicion of misuse — regardless of whether the misuse was intentional or not. Perhaps a customer’s number of employees has ballooned beyond the number of licenses they should need, or maybe signs suggest that the company is using a pirated version. A software vendor is well within its contractual rights to perform an audit if it suspects usage and payment do not align, but that doesn’t mean the customer is going to be happy about it.

While no one likes to be audited, most software vendors can be reluctant to conduct them. They consume time and resources and put the vendor in the position of looking like an adversary in what should instead be a mutually beneficial relationship based on collaboration and trust.

There are better ways to ensure license compliance for vendors and customers alike, including software asset management (SAM) programs, piracy education and software usage analytics.

SAM Programs

SAM programs enable customers to proactively monitor and measure their software licenses, although complexities can arise with software deployed through virtual machines or across multiple geographies. Customers can use SAM software or processes to collect deployment data and compare it to their entitlements, giving them a better sense of where they stand and providing documentation to remediate situations before an audit is necessary.

Piracy Education 

In a Q&A with MarkMonitor, Richard Atkinson, Adobe’s global director of piracy conversion, estimated “that about 70 percent of the people who have nongenuine product actually paid for it. They just didn’t pay us.” It’s usually a case of employees unwittingly downloading an unauthorized version that looked reasonably priced on a seemingly legitimate e-commerce site. Strong piracy education programs and internal policies can help to ensure that software is procured directly from the vendor or authorized channels.

Software Usage Analytics

Nearly 38% of software is “wasted,” amounting to $34 billion for 149 different organizations surveyed by software life cycle automation vendor 1E in its “Software Usage and Waste Report 2016” (via ZDNet). While some vendors viewed exposing underuse or “shelfware” to customers as a risk to recurring revenue, some two-thirds of respondents did not.

Sharing usage data helps customers achieve software license compliance and avoid audit failure by keeping conversations proactive and productive for all parties. Customers know when usage data is being collected and should ask for access to aggregate data and insights if their vendors aren’t sharing it. Long before having to even mention the word “audit,” vendors can reach out to the customer with the confidence that a resolution and an enhanced relationship is within reach.

With a deeper view of the company’s usage patterns across its subsidiaries and advice on how to maximize its total cost of ownership, usage data puts the vendor in a position to strengthen those connections. In the case of pirated use, the vendor can also alert customers to malware risks that BSA estimates “can cost a company $2.4 million on average and can take up to 50 days to resolve.”

Conclusion 

It’s hard to argue with data — especially when it is shared transparently with the goal of mutually beneficial outcomes. In addition to license misuse, the data might also point to underuse (or inefficient workflows), which might otherwise lead a customer not to renew. With data in hand, vendors can be proactive and work with those customers — along with providing training and educational opportunities — to get the most out of their deployments and preempt difficult conversations at renewal time.

I believe “audit” doesn’t have to be used as a threat — implied or explicit. Instead of using audits to increase revenue at the expense of long-term customer value, software vendors can take a data-driven, consultative approach that maximizes both.

[“source=forbes”]

Carrot case Compliance Data-Driven for License making software Stick the vs
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Loknath Das

Related Posts

How to Avoid Managing Open Source Software’s

March 24, 2025

Strategies for Structuring and Scaling High-performance Data Labeling Teams

March 12, 2025

Release Your Business Potential in Patna with Custom Programming Advancement Arrangements

February 1, 2025
Recent Post
  • How to Grow Your Brand with Micro Influencer Marketing
  • What Are the 8 Different Types of Video Game Articles?
  • Strategies for Greater Financial Flexibility: 5 Smart Ways to Repay Your Home Loan Faster
  • PS5 Pro vs the PS5 – What’s the difference, really?
  • 4 Tips to Improve Data Loss Prevention (DLP) in Healthcare
  • A+ methods: Help students get ready for state exams
  • Again, winter greetings
  • Living games are here: How gen AI is leveling up the games industry
Search
  • Home
  • Privacy Policy
  • Contact Us !
© 2025 BlogSpotTips. Designed by BlogSpotTips.

Type above and press Enter to search. Press Esc to cancel.