SlideShare une entreprise Scribd logo
1  sur  9
Contract Compliance Services




Software License / Asset Management (SAM)
Getting back in control


ADVISORY
Key issues



  Issue         Examples                                                                                                                                                                      Impacts
                 Software agreements                                                                                                                                                            Overhead
                   Entitlements and restrictions are not always properly understood by those                                                                                                  of responding to
                    operating the software (e.g. system administrators and end users)                                                                                                           inbound audits
                   Ambiguous terms can compound compliance issues; for example, even if the
                    software has not been accessed, it can be deemed as in ‘use’ if available                                                                                                    Liabilities
      Under                                                                                                                                                                                     for unplanned
    licensing
            g    In-bound vendor audits
                                                                                                                                                                                                 expenditure

                   Vendors are increasingly invoking their right to audit; this increased level of
                                                                                                                                                                                                Reputation
                    threat means that end users need to proactively address under-licensing                                                                                                   over legal matters
                   Audits may result in paying back maintenance charges as well as settlement on
                    unpaid licenses
                 Software surplus “shelf ware”
                   Software is being purchased even though ‘spare’ licenses already exist or just                                                                                               Financial
                    too difficult to harvest                                                                                                                                                   losses in buying
                   Unnecessary software renewals are being made for software that is obsolete or                                                                                                 more than
     Over                                                                                                                                                                                          required
                    no longer in use (e.g. p
                          g           ( g post rationalisation / merger)
                                                                    g )
  deployment                                                                                                                                                                                     Efficiency
                 Systemic configuration errors                                                                                                                                               in not using assets
                   Software can be inadvertently made available across an entire IT estate (e.g.                                                                                                  available
                    added to the standard build / image)
                   Development, test and DR plat o s can be introduced into p oduct o
                     evelop e t,      a d     platforms ca       t oduced to production
                    environments without a full understanding the license implications


                     © 2008 KPMG SA, a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved.
                     This document is confidential and its circulation and use are restricted. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative.                         1
Value proposition


    We assist our clients to :


     Better understand the risks and exposures faced relating to software licensing
     Develop a plan that would enable them to implement effective Software Asset Management practices


    In implementing the plan, this will:
         p        g     p ,

                              • Better understand and manage license entitlements, locally and globally
  Improve management
       practices
                              • Reduce software license compliance risks that could impact budgets and reputation
                              • Enhance the existing processes to better manage costs
                              • Identify areas where under utilised software can be reallocated or removed
  Identify opportunities
     to reduce costs          • Provide better levels of awareness amongst the user communities to support the
                                   reallocation and/or retirement of under-utilised software

                              • Better manage and respond to software vendors requests for reports on the utilisation of
     Improve vendor                software
      management
                              • Structure better commercial licensing terms to fit current and future requirements



                        © 2008 KPMG SA, a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved.
                        This document is confidential and its circulation and use are restricted. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative.   2
Our approach to SLAM



     “Top Down”                                  Assessment of Software Asset Management
      Review IT
     management
          g                                           practices: design effectiveness
      practices                                           (people, process, and technology competencies)
                                                          (    l              dt h l            t   i )




                                                        Only a combined approach provides complete
         SLAM                                                    transparency to root issues




      “Bottom Up”                                   Deep dives of licenses and deployment
     ‘deep dives' to                                  positions: operating effectiveness
       obtain key
         license                        (variances between deployment and entitlement provide
        positions                                     evidence of license usage)

                       © 2008 KPMG SA, a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved.
                       This document is confidential and its circulation and use are restricted. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative.   3   3
Methodology – test of design


                                  We meet with key stakeholders and discusses 20 domains for Software Asset
       “Top Down”
        Review IT
                                 Management . These components address Software Asset Management from the
       management                              perspectives of people, process, and technology.
         practices


                                   The Software Asset Management Workshop constitutes a high-level, top-down
                                 approach to understanding the current management practices. Each component is
                                      scored on a scale of 1-4 and the definitions for each domain component:
           SLAM


                                                                                                     1 - Basic (Low Maturity)
                                                                                                     2 - Standardized
                                                                                                     3 - Rationalized
         “Bottom Up”
        ‘deep dives' to                                                                              4 - Dynamic (High Maturity)
          obtain key
      license positions



                                   Basic                                         Standardized                                            Rationalized                                               Dynamic
                                                                                                                                                                                                     y



                                Generally,                                                                                    Entitlement has been                                          SAM system
Software Licenses          entitlement records                       Entitlement records and                                                                                         interfaces with vendor
 and Entitlement                                                      contracts are readily                                  reviewed and validated
                          and contracts are not                                                                              by significant software                                 system t d
                                                                                                                                                                                         t     to dynamically
                                                                                                                                                                                                        i ll
    Inventory               readily available                                available                                                                                                     track licenses
                                                                                                                                     vendors



                                  © 2008 KPMG SA, a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved.
                                  This document is confidential and its circulation and use are restricted. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative.        4
Example output – test of design



                                                                                                                                                                                    This output shows
                                                                                                                                                                                    the various levels
                                                                                                                                                                                    of maturity against
                                                                                                                                                                                    our 20 areas of
                                                                                                                                                                                    assessment.
                                                                                                                                                                                    We can use this to
                                                                                                                                                                                    help highlight the
                                                                                                                                                                                    gaps between
                                                                                                                                                                                    current state (e.g.
                                                                                                                                                                                    basic) and required
                                                                                                                                                                                    state (e g
                                                                                                                                                                                          (e.g.
                                                                                                                                                                                    standardized).
                                                                                                                                                                                    This also serves to
                                                                                                                                                                                    help prioritise
                                                                                                                                                                                    actions for
                                                                                                                                                                                    example, address
                                                                                                                                                                                    ‘basic’ aspects
                                                                                                                                                                                    first.




                 © 2008 KPMG SA, a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved.
                 This document is confidential and its circulation and use are restricted. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative.           5       5
Methodology – deep dives


   The diagram below illustrates the two areas where would seek a license position on key selected products
                                      as part of our overall SLAM approach:




                      Test of Design (IT Management)                                                               Test of Design (Vendor Management)

                                                                                                                                      Procuremen
                                                                                                                                           t
                                           Deployment                                                                                     Vs
                                                Vs                                                                                      Vendor
                                           Entitlement                                                                                   sales
                                                                                                                                        records

          Infrastructure data                                                       Scanned / paper                                                                              Vendor purchase
       from inventories, tools                                                   copies of procurement                                                                           history records &
        and scripts e.g. SMS               ‘Deep Dive’                            and financial records                               ‘Deep Dive’                                     finance

                                            Test of                                                                                     Test of
                                        Effectiveness                                                                               Effectiveness



   The clouds represent the test areas (‘deep dives’) where would seek clarity on current capabilities to match
                    software deployment with entitlements and commercial arrangements.


                         © 2008 KPMG SA, a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved.
                         This document is confidential and its circulation and use are restricted. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative.      6
Example output – test of effectiveness


   The output below illustrates the results of a point in time deployment
     and entitlement analysis which would lead to an Effective License
    Position that can be used to help address any surplus and shortfalls




                      © 2008 KPMG SA, a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved.
                      This document is confidential and its circulation and use are restricted. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative.   7
Why KPMG?


• We have developed a unique methodology for SLAM, combining the principles from ISO 19770-1 framework and
  key aspects from ITIL’s service management model


• Our definitions, ratings and output are used consistently on a global basis across our practices and we have recently
  conducted a survey of 1000 companies using this method. This provides KPMG with the unique ability to
  benchmark Software Asset Management maturity levels across peers and other industry sectors


• In addition to providing independent client side SLAM services, we also work extensively with vendors, providing
  them with global license compliance programmes. This provides KPMG with an unparalleled depth of
  understanding of licensing models, products and platforms


• In support of the tools and methodology that we have developed, we have a well trained and experienced set of
  SLAM practitioners; some of whom have helped develop methodologies and have practical delivery experience of
  ISO 19770-1
                                                                                                                                                                                       Current   Future
                                                                                                                                                                                        State     State




                        © 2008 KPMG SA, a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved.
                        This document is confidential and its circulation and use are restricted. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative.            8

Contenu connexe

Tendances

Managed Services Marketing
Managed Services MarketingManaged Services Marketing
Managed Services Marketing
Shahzad Khan
 
Enterprise architecture for telecom sector
Enterprise architecture for telecom sectorEnterprise architecture for telecom sector
Enterprise architecture for telecom sector
Soham Pablo
 

Tendances (20)

Managed Services Overview
Managed Services OverviewManaged Services Overview
Managed Services Overview
 
Managed Services Model For IT Services
Managed Services Model For IT Services Managed Services Model For IT Services
Managed Services Model For IT Services
 
ITIL implementation and Service Management Best Practices – useful informatio...
ITIL implementation and Service Management Best Practices – useful informatio...ITIL implementation and Service Management Best Practices – useful informatio...
ITIL implementation and Service Management Best Practices – useful informatio...
 
Managed Services Marketing
Managed Services MarketingManaged Services Marketing
Managed Services Marketing
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
 
ITIL 4 service value chain data flows (input and outputs)
ITIL 4 service value chain data flows (input and outputs)ITIL 4 service value chain data flows (input and outputs)
ITIL 4 service value chain data flows (input and outputs)
 
How Atlassian Manages Risk and Compliance with Jira Software and Confluence
How Atlassian Manages Risk and Compliance with Jira Software and ConfluenceHow Atlassian Manages Risk and Compliance with Jira Software and Confluence
How Atlassian Manages Risk and Compliance with Jira Software and Confluence
 
ITSM Toolset Selection
ITSM Toolset SelectionITSM Toolset Selection
ITSM Toolset Selection
 
Incident Management
Incident ManagementIncident Management
Incident Management
 
Implementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to SuccessImplementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to Success
 
A Brief about IT Managed Services
A Brief about IT Managed ServicesA Brief about IT Managed Services
A Brief about IT Managed Services
 
ITIL4 and ServiceNow
ITIL4 and ServiceNowITIL4 and ServiceNow
ITIL4 and ServiceNow
 
Top 3 Help Desk Challenges & What You Can Do About Them
Top 3 Help Desk Challenges & What You Can Do About ThemTop 3 Help Desk Challenges & What You Can Do About Them
Top 3 Help Desk Challenges & What You Can Do About Them
 
ITIL Introduction
ITIL IntroductionITIL Introduction
ITIL Introduction
 
IT Asset Management (ITAM) - Hardware Asset Management (HAM)
IT Asset Management (ITAM) - Hardware Asset Management (HAM)IT Asset Management (ITAM) - Hardware Asset Management (HAM)
IT Asset Management (ITAM) - Hardware Asset Management (HAM)
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services Presentation
 
Change management - ITIL Series
Change management - ITIL SeriesChange management - ITIL Series
Change management - ITIL Series
 
Enterprise architecture for telecom sector
Enterprise architecture for telecom sectorEnterprise architecture for telecom sector
Enterprise architecture for telecom sector
 
ITSM Presentation
ITSM PresentationITSM Presentation
ITSM Presentation
 

Similaire à Software Asset Management

Legal Will Software
Legal Will SoftwareLegal Will Software
Legal Will Software
legal3
 
Legal Will Software
Legal Will SoftwareLegal Will Software
Legal Will Software
legal4
 
Brochure it asset_remote_manager_en
Brochure it asset_remote_manager_enBrochure it asset_remote_manager_en
Brochure it asset_remote_manager_en
Dexon Software
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
Flexera
 
Just-In-Time Licensing
Just-In-Time LicensingJust-In-Time Licensing
Just-In-Time Licensing
Flexera
 

Similaire à Software Asset Management (20)

Tcg Veriam Slm Intro Deck
Tcg Veriam Slm Intro DeckTcg Veriam Slm Intro Deck
Tcg Veriam Slm Intro Deck
 
Workflow Manager for Software License Optimization
Workflow Manager for Software License OptimizationWorkflow Manager for Software License Optimization
Workflow Manager for Software License Optimization
 
FlexNet Manager Suite Leverages Microsoft System Center to Deliver Next Gener...
FlexNet Manager Suite Leverages Microsoft System Center to Deliver Next Gener...FlexNet Manager Suite Leverages Microsoft System Center to Deliver Next Gener...
FlexNet Manager Suite Leverages Microsoft System Center to Deliver Next Gener...
 
Open iT in Dew Journal
Open iT in Dew JournalOpen iT in Dew Journal
Open iT in Dew Journal
 
Fortune 500 Success Story
Fortune 500 Success StoryFortune 500 Success Story
Fortune 500 Success Story
 
Legal Will Software
Legal Will SoftwareLegal Will Software
Legal Will Software
 
Legal Will Software
Legal Will SoftwareLegal Will Software
Legal Will Software
 
SaaS Companies: What Costs Should Be Capitalized?
SaaS Companies: What Costs Should Be Capitalized?SaaS Companies: What Costs Should Be Capitalized?
SaaS Companies: What Costs Should Be Capitalized?
 
Webinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management programWebinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management program
 
Brochure it asset_remote_manager_en
Brochure it asset_remote_manager_enBrochure it asset_remote_manager_en
Brochure it asset_remote_manager_en
 
Reducing Total Cost of Ownership for Database and Developer Software
Reducing Total Cost of Ownership for Database and Developer SoftwareReducing Total Cost of Ownership for Database and Developer Software
Reducing Total Cost of Ownership for Database and Developer Software
 
Reducing Total Cost of Ownership for Database and Developer Software | Govern...
Reducing Total Cost of Ownership for Database and Developer Software | Govern...Reducing Total Cost of Ownership for Database and Developer Software | Govern...
Reducing Total Cost of Ownership for Database and Developer Software | Govern...
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
 
Just-In-Time Licensing
Just-In-Time LicensingJust-In-Time Licensing
Just-In-Time Licensing
 
SCL Aug Sep 2010 Software Development How Agile Are You
SCL Aug Sep 2010 Software Development   How Agile Are YouSCL Aug Sep 2010 Software Development   How Agile Are You
SCL Aug Sep 2010 Software Development How Agile Are You
 
Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: Salmon
 
Numara Presentation - Address the 800lb Gorilla in the Room: Software Licens...
Numara Presentation - Address the 800lb Gorilla in the Room:  Software Licens...Numara Presentation - Address the 800lb Gorilla in the Room:  Software Licens...
Numara Presentation - Address the 800lb Gorilla in the Room: Software Licens...
 
Software Compliance Management Overview
Software Compliance Management OverviewSoftware Compliance Management Overview
Software Compliance Management Overview
 
Software Compliance 062409
Software Compliance 062409Software Compliance 062409
Software Compliance 062409
 
Reducing Total Cost of Ownership for Database and Developer Software
Reducing Total Cost of Ownership for Database and Developer SoftwareReducing Total Cost of Ownership for Database and Developer Software
Reducing Total Cost of Ownership for Database and Developer Software
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Software Asset Management

  • 1. Contract Compliance Services Software License / Asset Management (SAM) Getting back in control ADVISORY
  • 2. Key issues Issue Examples Impacts  Software agreements Overhead  Entitlements and restrictions are not always properly understood by those of responding to operating the software (e.g. system administrators and end users) inbound audits  Ambiguous terms can compound compliance issues; for example, even if the software has not been accessed, it can be deemed as in ‘use’ if available Liabilities Under for unplanned licensing g  In-bound vendor audits expenditure  Vendors are increasingly invoking their right to audit; this increased level of Reputation threat means that end users need to proactively address under-licensing over legal matters  Audits may result in paying back maintenance charges as well as settlement on unpaid licenses  Software surplus “shelf ware”  Software is being purchased even though ‘spare’ licenses already exist or just Financial too difficult to harvest losses in buying  Unnecessary software renewals are being made for software that is obsolete or more than Over required no longer in use (e.g. p g ( g post rationalisation / merger) g ) deployment Efficiency  Systemic configuration errors in not using assets  Software can be inadvertently made available across an entire IT estate (e.g. available added to the standard build / image)  Development, test and DR plat o s can be introduced into p oduct o evelop e t, a d platforms ca t oduced to production environments without a full understanding the license implications © 2008 KPMG SA, a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved. This document is confidential and its circulation and use are restricted. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 1
  • 3. Value proposition We assist our clients to :  Better understand the risks and exposures faced relating to software licensing  Develop a plan that would enable them to implement effective Software Asset Management practices In implementing the plan, this will: p g p , • Better understand and manage license entitlements, locally and globally Improve management practices • Reduce software license compliance risks that could impact budgets and reputation • Enhance the existing processes to better manage costs • Identify areas where under utilised software can be reallocated or removed Identify opportunities to reduce costs • Provide better levels of awareness amongst the user communities to support the reallocation and/or retirement of under-utilised software • Better manage and respond to software vendors requests for reports on the utilisation of Improve vendor software management • Structure better commercial licensing terms to fit current and future requirements © 2008 KPMG SA, a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved. This document is confidential and its circulation and use are restricted. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 2
  • 4. Our approach to SLAM “Top Down” Assessment of Software Asset Management Review IT management g practices: design effectiveness practices (people, process, and technology competencies) ( l dt h l t i ) Only a combined approach provides complete SLAM transparency to root issues “Bottom Up” Deep dives of licenses and deployment ‘deep dives' to positions: operating effectiveness obtain key license (variances between deployment and entitlement provide positions evidence of license usage) © 2008 KPMG SA, a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved. This document is confidential and its circulation and use are restricted. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 3 3
  • 5. Methodology – test of design We meet with key stakeholders and discusses 20 domains for Software Asset “Top Down” Review IT Management . These components address Software Asset Management from the management perspectives of people, process, and technology. practices The Software Asset Management Workshop constitutes a high-level, top-down approach to understanding the current management practices. Each component is scored on a scale of 1-4 and the definitions for each domain component: SLAM  1 - Basic (Low Maturity)  2 - Standardized  3 - Rationalized “Bottom Up” ‘deep dives' to  4 - Dynamic (High Maturity) obtain key license positions Basic Standardized Rationalized Dynamic y Generally, Entitlement has been SAM system Software Licenses entitlement records Entitlement records and interfaces with vendor and Entitlement contracts are readily reviewed and validated and contracts are not by significant software system t d t to dynamically i ll Inventory readily available available track licenses vendors © 2008 KPMG SA, a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved. This document is confidential and its circulation and use are restricted. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 4
  • 6. Example output – test of design This output shows the various levels of maturity against our 20 areas of assessment. We can use this to help highlight the gaps between current state (e.g. basic) and required state (e g (e.g. standardized). This also serves to help prioritise actions for example, address ‘basic’ aspects first. © 2008 KPMG SA, a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved. This document is confidential and its circulation and use are restricted. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 5 5
  • 7. Methodology – deep dives The diagram below illustrates the two areas where would seek a license position on key selected products as part of our overall SLAM approach: Test of Design (IT Management) Test of Design (Vendor Management) Procuremen t Deployment Vs Vs Vendor Entitlement sales records Infrastructure data Scanned / paper Vendor purchase from inventories, tools copies of procurement history records & and scripts e.g. SMS ‘Deep Dive’ and financial records ‘Deep Dive’ finance Test of Test of Effectiveness Effectiveness The clouds represent the test areas (‘deep dives’) where would seek clarity on current capabilities to match software deployment with entitlements and commercial arrangements. © 2008 KPMG SA, a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved. This document is confidential and its circulation and use are restricted. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 6
  • 8. Example output – test of effectiveness The output below illustrates the results of a point in time deployment and entitlement analysis which would lead to an Effective License Position that can be used to help address any surplus and shortfalls © 2008 KPMG SA, a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved. This document is confidential and its circulation and use are restricted. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 7
  • 9. Why KPMG? • We have developed a unique methodology for SLAM, combining the principles from ISO 19770-1 framework and key aspects from ITIL’s service management model • Our definitions, ratings and output are used consistently on a global basis across our practices and we have recently conducted a survey of 1000 companies using this method. This provides KPMG with the unique ability to benchmark Software Asset Management maturity levels across peers and other industry sectors • In addition to providing independent client side SLAM services, we also work extensively with vendors, providing them with global license compliance programmes. This provides KPMG with an unparalleled depth of understanding of licensing models, products and platforms • In support of the tools and methodology that we have developed, we have a well trained and experienced set of SLAM practitioners; some of whom have helped develop methodologies and have practical delivery experience of ISO 19770-1 Current Future State State © 2008 KPMG SA, a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved. This document is confidential and its circulation and use are restricted. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 8