Week 5: Licensing and seat management

At least annually.

Who doesn't want to save on IT costs and keep your organization out of court? Often, organizations pay for software licenses on a "per seat" basis, allowing a predetermined

    Requires Free Membership to View

number of users access to the software at any given time if you don't have a site license. In your organization, you want a mechanism that identifies and, ideally, redeploys available seats of a software license agreement. This prevents over-purchasing and loss of seat licenses when laptops, desktops or servers are retired or returned to the leasing agent. It will also help your organization avoid potential penalties for "over-utilization" of software assets. Additionally, some applications stop working when the licenses expire, potentially affecting the "availability" of your system.

For automated tracking, there's a multitude of products; if you want to do it manually, keep a copy of the license purchase and a copy of the End User License Agreement (which should always be kept on file). Set up a tickler file to remind you when to renew and consider a "discovery" tool that will go through your network listing executables on the workstations. This way, you'll know what's on each system, and depending on the amount of purchased software, you can decide whether you need automated tracking for licenses as well.

More information
Using your favorite search engine, enter "software license management" or "seat management" in the search box. Free software audit tools are available from the Business Software Alliance (BSA) to help determine whether a company is using unlicensed software. BSA is a watchdog group "dedicated to fighting software piracy and educating computer users about software copyrights and cybersecurity." Since 1997, BSA has collected more than $37 million from U.S. companies that have been caught with illegally copied software. If there's good reason to suspect that your company is using unlicensed software, the BSA and U.S. Marshals could show up at your door, unannounced, to do an audit. If you can't prove you own the software, your firm could be liable for restitution and fines up to $150,000 for each copy of illegal software found in use.

About the author
Shelley Bard, CISSP, is a senior security network engineer with Verizon Federal Network Systems (FNS). An infosecurity professional for 17 years, Bard has briefed and written infosecurity assessments and technical reports for the White House and Department of Defense, special interest groups, industry and academia. Please e-mail any comments to securityplanner@infosecuritymag.com.

Opinions expressed in this column are those of Shelley Bard and don't necessarily reflect those of Verizon FNS.

Last week: Disaster recovery/business continuity plans, part 2 --- Hardware
Next week: Your infosecurity education, training and awareness program

This was first published in January 2004

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.