201604.12
0

Shadow IT: When Employees Become Bounty Hunters

Michael O’Dwyer, ipswitch, 4/11/16 Human error is responsible for more than half of all security breaches as of last year, making employees the biggest cyber threat of all. Shadow IT, on the other hand, is the deliberate installation of software that is not authorized by IT.

201602.24
0

Customer Access Under Microsoft MSDN Developer Licenses

Microsoft’s MSDN subscription licenses often create license compliance problems.  These problems arise because it is extremely easy to over deploy Microsoft software using MSDN media because it includes a vast array of Microsoft products with limited deployment controls.  In addition, the licensing rules related to MSDN are often misunderstood.  One often overlooked aspect of Microsoft…

201602.23
0

SPLA-Audit Exposure Difficult to Estimate

One of the first steps we typically recommend to businesses facing software audits from any source is to try to estimate the financial exposure related to those audits. Doing so allows a company to allocate its resources more efficiently and to set aside reserves or make other financial preparations in advance of settlement, when auditors…

201602.16
0

How To Survive A Software Licensing Audit

Lisa Morgan, InformationWeek, 1/1/16 Enterprise IT organizations face software audits as a matter of doing business with large technology vendors. What’s the best approach to dealing with them? Here’s a look at what you should and shouldn’t do when you get that software licensing audit notice.