Be Wary of Audit Tools Promoted by Software Auditors

in Blogs

Most companies with more than a handful of computers in their IT environments rely on the results of network-inventory tools to gather the deployment data needed for accurate software audits. Without the tools, a business would be required to assign valuable resources to manually looking at the titles installed on each machine. Therefore, it should…


High-Level Data-Collection Strategies for Software Audits

In our experience, many companies facing software-licensing audits initiated by vendors like Microsoft, Oracle or IBM seem to be under the impression that auditors have a nearly unfettered right to information. This is not the case. However, too many audit targets discover too late that what may have seemed like good-faith cooperation in the interest…