Be Wary of Audit Tools Promoted by Software Auditors

Comments (0)
Most companies with more than a handful of computers in their IT environments rely on the results of network-inventory tools to gather the deployment data needed for accurate software audits. Without the tools, a business...

Be Wary of Requests for Mystery Data

Comments (0)
Software auditors such as KPMG, Deloitte and PriceWaterhouseCoopers like to have things their way. It’s an understandable impulse – with likely hundreds of audits pending at any one time, the natural inclination is to standardize...

How to respond to a VMware Audit

Comments (0)
Managing a complex IT environment very challenging, even before becoming involved in an external software audit from a software publisher or a third-party auditing entity. Businesses facing VMWare audits in particular should be prepared to...

Software Audits: Proving Ownership of Software Licenses

Comments (0)
Often the single most arduous and time-consuming task facing companies who are the subject of software audits is collecting entitlement information to prove ownership of licenses for software installed on its networks. Once a company...