3 Costly Mistakes

Companies Make in Software Audits
Home / 3 Costly Mistakes
Sending unvetted data to auditors

Auditors love when you send raw or unvetted data. It gives them the opportunity to expand their inquiry, look for outliers, and enhance scope.

Properly vetted data means having the ability to defend your results. Anomalies you cannot explain or defend only lend credence to the inquiry and give auditors confidence to increase their demands.

Vetting tips:

  • Use your own scan tools, not auditor-provided tools and scripts
  • Restrict data to requested fields
  • Filter results to publishers and products in scope
  • Note multiple versions of the same product
  • Identify false positives like trial versions
  • Remove duplicates

Learn More

Using your last renewal as your entitlement report

Your most recent renewal is not an exhaustive list of your entitlements. Vendors are a great resource, but they cannot and often do not show you everything you own. Finding every entitlement is your responsibility and requires forensic analysis of data from multiple sources.

Entitlements commonly overlooked:

  • OEM licenses included in products from other vendors
  • Developer and test environment licenses
  • Licenses acquired through M&A
  • Old perpetual licenses

Learn More
Not optimizing virtualized environments

Virtualization generally increases exposure due to complexity of licensing variables in play. Optimizing your environment requires a deep understanding of product use rights by VMs, Hosts, Processor Units, User Counts, and virtualization rules.

Optimizing virtualized environments to reflect your entitlement portfolio can significantly reduce or eliminate audit penalties.

Examples of optimizations include:

  • Consolidate products onto dedicated hosts
  • Reduce resource allocation to key clusters
  • Redeploy to user-restricted servers

Learn More

Why BLC?

Bottom Line Consortium is a boutique firm of software license experts who specialize in audit defense.

Over the last 10 years, we have successfully defended clients against software audits conducted by various third parties, including Deloitte, KPMG and E&Y.

These third parties routinely represent the largest technology companies, such as Microsoft, Oracle, Adobe, Microfocus, Salesforce, and IBM, just to name a few.

We have developed proprietary tools and data science techniques to give us an unique edge and enviable track record - We have never lost an audit defense.

Our clients are our biggest supporters and range in size from multinational enterprises to regional entities. If you are considering our services we are happy to arrange reference calls.