SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
Discovery, Inventory and Application Recognition

                                    December 2011
Webinar Series

                           Automated entitlement based license                    • 1st webinar (Nov)
    Level 4                management and optimization;                             How to get started on
     Optimized
                                                                                    a SAM program
                                                                                  • 2nd webinar– (Today)
                           Automated purchased vs. installed                        Discovery, Inventory
    Level 3                license reconciliation; SAM processes
    Continuously                                                                    & Application
     Compliant             to maintain license compliance                           Recognition
                                                                                    Level 1
                           Perform purchased versus installed                     • 3rd webinar– (Jan)
    Level 2                license reconciliation on an ad hoc
     Managed                                                                        License & Contract
                           basis; point in time management                          Management
                                                                                    Levels 2-3
    Level 1                                                                       • 4th webinar– (Feb)
                           Identify software and hardware installed
      Installed                                                                     Strategies for
                                                                                    License Optimization
                                                                                    Level 4
       Enterprise License Optimization Maturity Model


2      © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Speaker & Agenda

                                             •   License Management overview
                                             •   Device Based inventory
                                             •   Network based inventory
                                             •   Application Recognition
                                             •   Additional inventory requirements
    Vincent Brasseur                         •   Virtualization
    Director of Product
    Management,                              •   License examples
    Flexera Software                         •   Recommendations
                                             •   Questions and Answers




3      © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
License Management Goals

                                                                                 Out of
       $         Over-Licensed                            Optimal
                                                                                 Compliance   $

    • Calculate your license position
         – Reduce non-compliance costs and risks
         – Eliminate over-spending on software; identify ‘shelfware’
    • Manage Licenses and Contracts
         – Know what the organization owns; understand licensing terms and conditions
         – Pay for what you need and use
         – Be audit ready
    • Meet Organization Objectives
         – Ensure each installation and use of a software product is licensed
         – Provide financial forecasting
    • Optimize the license position
         – Minimize license consumption
         – Deliver trend analysis and licensing forecasting
4     © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
License Management Data
      Software and Hardware Asset Management




                      Inventory                                                   Users & Group
                                                                                                  User
HW/SW data                                                                                        Cost Center
Usage data                                                                                        Business Unit
                                                                                                  Location
                                                            HW & SW
                                                             Assets




                      Financial                                                      History
Request
Purchases                                                                                         Audit trail
Contracts




  5    © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Discovery & Inventory
    Challenges

    • Completeness & Accuracy
         – IT environment is dynamic
         – Devices are not always connected
         – Inventory is performed every few weeks
    • Different OS’s & Environments
         – Desktop and datacenter have their own challenges
         – Inventorying the datacenter is usually more difficult
         – Specific data is needed when virtualization is used
    • Security and access rights
         – Inventory requires administrator rights
         – Difficult to obtain in large organizations




6     © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Inventory
    Discovery & Inventory Types

    • Inventory can be:
         – Agent based: an agent is physically installed on the device
         – Agentless: an agent is executed remotely on the device
         – Remote: no agent is executed on the device; e.g. Oracle db


    • Device discovery methodologies:
         – Network discovery
         – Group Policy / Login script
         – Manually




7     © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Inventory
    Agent & Agentless inventory


    Available Data




                                       Packages                                  Files




                                        Registry                                 ISO Tag




8     © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Device Based Inventory Data Sources
    Packages

    • Found in Programs and Features or Add/Remove
      Programs (Windows), RPM packages (UNIX/Linux)…




    • Collecting and identifying software products is easy
    • Challenges:
        –   Cannot be used to track usage
        –   Data can be lost when the software product is repackaged
        –   Discrepancies between installation and package data store
        –   Not all publishers use packages
        –   Product can be running on a machine without installation


9    © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Device Based Inventory Data Sources
     Files




     • Found on the device hard disk
     • The most accurate data source for identifying software
     • Challenges:
          –   Requires full disk scan
          –   The volume of files to be collected is large
          –   The identification rules are complex and sometimes inaccurate
          –   Products can be running on a machine without installation




10     © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Device Based Inventory Data Sources
     Registry

     • Can be remotely inventoried
     • Very accurate data source for identifying software
     • Challenges:
          –   Need to know what to collect
          –   Many times registry entries are left behind after software removal
          –   Applies to Windows platform only
          –   Products can be running on a machine without installation




11     © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Device Based Inventory Data Sources
     ISO 19770-2 Tag


     • The ISO 19770-2 provides a standard for software identification tags
       that contain authoritative identifying information for installed software.
     • The ISO 19770-2 is a XML file with a .swidtag extension
                  …
                  <swid:product_title id="e8_3_2">Adobe Photoshop CS3</swid:product_title>
                    <swid:product_version id="e8_3_3">
                                  <swid:name id="e8_3_3sub1">10.2</swid:name>
                                  …
                                  <swid:name>Adobe Systems Incorporated</swid:name>
                                  <swid:regid>regid.1986-12.com.adobe</swid:regid>
                    </swid:software_creator>
                  …

     • Challenges:
          – The adoption of the ISO tag is slow; it does not apply to legacy products
          – It requires hard disk scan
          – Few inventory tools capture this data
          – Product can be running on a machine without installation



12     © 2011 Flexera Software, Inc. | Company Confidential
Network Based Inventory
     Network Discovery and Inventory

     •   Uses port sweep and network protocols (TCP, UDP…)
     •   No agent required
     •   Remote API calls can be performed
     •   Challenges
            – Need to target the devices to be interrogated
            – Security issue
            – Applies to a limited number of software products


     • Examples:
            –   DNS Server port 53
            –   Oracle TNS Listener ports 1521/1526
            –   SQL Server port 1434
            –   VMware ports 902/443

13       © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Application Recognition

     • Software Identification challenges:
            – What software product is used or installed?
            – What components are used or installed?
            – What products need a license?

         Desktop & Datacenter                          Recognition Process                            List of Applications
               Inventory



      •Files
      •Add/Remove Programs
      •Registry
      •ISO tag
                                                     Application Recognition
     File                                     Rule                                                    Application
     Name = Excel.exe                         If the file name equals Excel.exe and the version       Name = Excel
     Version = 12.0.6214.1000                 starts by 12.* and the publisher contains *Microsoft*   Version = 2007
     Publisher = Microsoft                    then the application is Microsoft Excel 2007            Publisher = Microsoft




14      © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
License Management Data Requirements
     License Metrics

                                   Most license metrics can be classified in five main
                                     categories:
                                   • Device based
                                           Per Device, per server, per virtual machine…
                                   • User based
                                           Per user, named user, accounts, authorized user, external
                                             users, UVU (User Value Unit), concurrent users,
                                             infrequent users, …
                                   • Hardware property based
                                           Per core, processor, processor or core points, socket,
                                             PVU (Processor Value Unit), RVU (Resource Value
                                             Unit), tiered device, virtual memory, processor speed…
                                   • Usage based
                                           Per amount of time, number of accesses, feature used…
                                   • Miscellaneous
                                           Enterprise, Site, Per purchase order over 100K, per
                                             premium income…
15     © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
License Management & Hardware Asset Management
 Hardware Inventory Requirements

•    Processor type
•    Number of Processors
•    Processor Speed
•    Number of cores
•    Memory
•    Number of sockets
•    Computer Model & Manufacturer

Related Data:
• Unique Identifier for each device: inventory ID, Network Name
• Operating System
• Last Logon User
• Serial number, MAC Address
• Casing

16    © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Virtualization
     Application Virtualization



     • Multiple technologies: Microsoft App-V, Citrix XenApp…
     • Device inventory will not capture virtualized applications
     • Two inventory possibilities:
          – Access rights
          – Usage
     • Used in VDI environments
     • Publishers licensing rules
          – Microsoft
          – Adobe
          – Access rights versus usage



17     © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Virtualization Example – MS Server Processor
     Soft Partitioning




18     © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Virtualization Example – MS Server Processor
     Soft Partitioning

• Hardware:
       – 1 physical OSE (no SQL)
              • 1 physical proc w/ 2 cores
       – 1 virtual OSE (w/ SQL)
              • 2 virtual procs

• Correct calculation:
       – 2 virtual procs / 2 cores per
         physical proc = 1 license




19     © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Virtualization Example – Oracle Processor
     Soft & Hard Partitioning


 Discovery and Inventory Process
      Inventory                                                                    Oracle     Oracle
         Tool                                                                     Listener   Database
                                  SNMP or Port Scanning


                                        SQL Queries




 Oracle Database License
        • Databases support options and management packs
        • Options/Management Packs can be inventoried only by database queries
        • Oracle Processor license is based on the number of processor cores
        • Oracle Processor License does not support soft partitioning



20     © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Discovery and Inventory Best Practices
     • Deploying an inventory solution is challenging
     • Use existing tools:
         –   Configuration management
         –   Usage monitoring
         –   Environment specific tools
         –   Publisher specific tools
     • Use all data sources and methodologies
         – One data source or methodology will not provide all the
           information
     • Only use new tools when needed




21    © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Application Recognition Best Practices
     • Quantity is nothing
     • Quality and accuracy are essential
     • The application recognition solution must:
         –   Be up to date
         –   Support different type of evidence
         –   Allow complex rules; or
         –   Contain the software product name from publishers
         –   Be modifiable on site




22    © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Recommendations
                                       • No tool on the market will provide all the
                                         answers
                                       • Use what you have today; buy additional
                                         tools only when necessary
                                               – Assess what data is already available today
                                               – Locate areas where additional tools are
                                                 needed: virtualization, Unix/Linux
                                                 environments, Oracle, etc.

• Use Inventory & App Recognition tools
  that:
      – Consolidate data from the multiple sources
      – Translate raw software inventory into
        meaningful product titles, versions, editions
      – Are updated frequently and have broad
        coverage

23    © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
Thank you


        Please submit your questions via the Live Meeting Q&A form.



     For more information: www.flexerasoftware.com/ELO

     Contacts:
                 jemmitt@flexerasoftware.com
                 vbrasseur@flexerasoftware.com




24    © 2011 Flexera Software, Inc. | Company Confidential

Weitere ähnliche Inhalte

Was ist angesagt?

21st Century SOA
21st Century SOA21st Century SOA
21st Century SOABob Rhubart
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC PresentationCloudComputing
 
FlexNet Delivery Datasheet
FlexNet Delivery DatasheetFlexNet Delivery Datasheet
FlexNet Delivery DatasheetFlexera
 
License Management
License ManagementLicense Management
License ManagementSVPMA
 
SerbizHub Suite Technical Specifications
SerbizHub Suite Technical SpecificationsSerbizHub Suite Technical Specifications
SerbizHub Suite Technical Specificationsmood Learning
 
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersFive Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersVenafi
 
Power Admin File Sight™
Power Admin File Sight™Power Admin File Sight™
Power Admin File Sight™Power Admin LLC
 
Monitoreo y análisis de aplicaciones "Multi-Tier"
Monitoreo y análisis de aplicaciones "Multi-Tier"Monitoreo y análisis de aplicaciones "Multi-Tier"
Monitoreo y análisis de aplicaciones "Multi-Tier"GeneXus
 
Managing application performance for cloud apps bmc
Managing application performance for cloud apps bmcManaging application performance for cloud apps bmc
Managing application performance for cloud apps bmcKhazret Sapenov
 
Az Managed Exchange Services(1)
Az Managed Exchange Services(1)Az Managed Exchange Services(1)
Az Managed Exchange Services(1)alwayson
 
Core R1 Presentation7
Core R1 Presentation7Core R1 Presentation7
Core R1 Presentation7malcolm shiel
 
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...Lumension
 
Windows Hosting Service-Level Description
Windows Hosting Service-Level DescriptionWindows Hosting Service-Level Description
Windows Hosting Service-Level Descriptionwebhostingguy
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Systems, Inc.
 
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...Venafi
 
Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)webhostingguy
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 

Was ist angesagt? (19)

21st Century SOA
21st Century SOA21st Century SOA
21st Century SOA
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
FlexNet Delivery Datasheet
FlexNet Delivery DatasheetFlexNet Delivery Datasheet
FlexNet Delivery Datasheet
 
License Management
License ManagementLicense Management
License Management
 
SerbizHub Suite Technical Specifications
SerbizHub Suite Technical SpecificationsSerbizHub Suite Technical Specifications
SerbizHub Suite Technical Specifications
 
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersFive Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption Disasters
 
Power Admin File Sight™
Power Admin File Sight™Power Admin File Sight™
Power Admin File Sight™
 
Monitoreo y análisis de aplicaciones "Multi-Tier"
Monitoreo y análisis de aplicaciones "Multi-Tier"Monitoreo y análisis de aplicaciones "Multi-Tier"
Monitoreo y análisis de aplicaciones "Multi-Tier"
 
Managing application performance for cloud apps bmc
Managing application performance for cloud apps bmcManaging application performance for cloud apps bmc
Managing application performance for cloud apps bmc
 
Az Managed Exchange Services(1)
Az Managed Exchange Services(1)Az Managed Exchange Services(1)
Az Managed Exchange Services(1)
 
Core R1 Presentation7
Core R1 Presentation7Core R1 Presentation7
Core R1 Presentation7
 
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
 
Windows Hosting Service-Level Description
Windows Hosting Service-Level DescriptionWindows Hosting Service-Level Description
Windows Hosting Service-Level Description
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
 
Youcc cexpert short
Youcc cexpert shortYoucc cexpert short
Youcc cexpert short
 
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
 
Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 

Andere mochten auch

SACM Workshop Best Practice and Road Map Implementation Process Guide - PL Co...
SACM Workshop Best Practice and Road Map Implementation Process Guide - PL Co...SACM Workshop Best Practice and Road Map Implementation Process Guide - PL Co...
SACM Workshop Best Practice and Road Map Implementation Process Guide - PL Co...Phil Tishberg
 
Where to Begin? Application Portfolio Migration
Where to Begin? Application Portfolio MigrationWhere to Begin? Application Portfolio Migration
Where to Begin? Application Portfolio MigrationAmazon Web Services
 
Cover dan pendahuluan karya tulis
Cover dan pendahuluan karya tulisCover dan pendahuluan karya tulis
Cover dan pendahuluan karya tulisDvi Setiawan
 
Juniper Netscreen模拟实例配置PPT
Juniper Netscreen模拟实例配置PPTJuniper Netscreen模拟实例配置PPT
Juniper Netscreen模拟实例配置PPTmickchen
 
Does the Cloud Change Anything? What can be learned from the Changing Enterpr...
Does the Cloud Change Anything? What can be learned from the Changing Enterpr...Does the Cloud Change Anything? What can be learned from the Changing Enterpr...
Does the Cloud Change Anything? What can be learned from the Changing Enterpr...Flexera
 
Fixing Design-Time Validation Errors
Fixing Design-Time Validation ErrorsFixing Design-Time Validation Errors
Fixing Design-Time Validation ErrorsFlexera
 
Cpd Presentation Learning Walks
Cpd Presentation Learning WalksCpd Presentation Learning Walks
Cpd Presentation Learning Walksguest176a68
 
distance learning
distance learningdistance learning
distance learningMatt Strine
 
90% of all cancers can be eliminated & science agrees.
90% of all cancers can be eliminated & science agrees.90% of all cancers can be eliminated & science agrees.
90% of all cancers can be eliminated & science agrees.wagweb007
 
Guia de ordenamiento para la firma del libro de acta 2013-I
Guia de ordenamiento para la firma del libro de acta 2013-I Guia de ordenamiento para la firma del libro de acta 2013-I
Guia de ordenamiento para la firma del libro de acta 2013-I David Leon Sicilia
 
Management of (Research) Teams - leadership and decision making
Management of (Research) Teams - leadership and decision making Management of (Research) Teams - leadership and decision making
Management of (Research) Teams - leadership and decision making Francesco Venier
 
Shell vs. Java: Overcoming the Challenges of Shell Scripting for UNIX Install...
Shell vs. Java: Overcoming the Challenges of Shell Scripting for UNIX Install...Shell vs. Java: Overcoming the Challenges of Shell Scripting for UNIX Install...
Shell vs. Java: Overcoming the Challenges of Shell Scripting for UNIX Install...Flexera
 
Rent vs. Own Slide Show
Rent vs. Own Slide ShowRent vs. Own Slide Show
Rent vs. Own Slide ShowAndy Carswell
 
촛불세대의 코칭
촛불세대의 코칭촛불세대의 코칭
촛불세대의 코칭Rohjoonshik
 

Andere mochten auch (20)

SACM Workshop Best Practice and Road Map Implementation Process Guide - PL Co...
SACM Workshop Best Practice and Road Map Implementation Process Guide - PL Co...SACM Workshop Best Practice and Road Map Implementation Process Guide - PL Co...
SACM Workshop Best Practice and Road Map Implementation Process Guide - PL Co...
 
Where to Begin? Application Portfolio Migration
Where to Begin? Application Portfolio MigrationWhere to Begin? Application Portfolio Migration
Where to Begin? Application Portfolio Migration
 
Cover dan pendahuluan karya tulis
Cover dan pendahuluan karya tulisCover dan pendahuluan karya tulis
Cover dan pendahuluan karya tulis
 
Interpretación de graficas
Interpretación de graficasInterpretación de graficas
Interpretación de graficas
 
Social Media for Financial Planners
Social Media for Financial PlannersSocial Media for Financial Planners
Social Media for Financial Planners
 
Juniper Netscreen模拟实例配置PPT
Juniper Netscreen模拟实例配置PPTJuniper Netscreen模拟实例配置PPT
Juniper Netscreen模拟实例配置PPT
 
Does the Cloud Change Anything? What can be learned from the Changing Enterpr...
Does the Cloud Change Anything? What can be learned from the Changing Enterpr...Does the Cloud Change Anything? What can be learned from the Changing Enterpr...
Does the Cloud Change Anything? What can be learned from the Changing Enterpr...
 
Gestión de la información
Gestión de la informaciónGestión de la información
Gestión de la información
 
Slides5
Slides5Slides5
Slides5
 
Fixing Design-Time Validation Errors
Fixing Design-Time Validation ErrorsFixing Design-Time Validation Errors
Fixing Design-Time Validation Errors
 
Cpd Presentation Learning Walks
Cpd Presentation Learning WalksCpd Presentation Learning Walks
Cpd Presentation Learning Walks
 
Iim 1
Iim 1Iim 1
Iim 1
 
distance learning
distance learningdistance learning
distance learning
 
90% of all cancers can be eliminated & science agrees.
90% of all cancers can be eliminated & science agrees.90% of all cancers can be eliminated & science agrees.
90% of all cancers can be eliminated & science agrees.
 
Guia de ordenamiento para la firma del libro de acta 2013-I
Guia de ordenamiento para la firma del libro de acta 2013-I Guia de ordenamiento para la firma del libro de acta 2013-I
Guia de ordenamiento para la firma del libro de acta 2013-I
 
Management of (Research) Teams - leadership and decision making
Management of (Research) Teams - leadership and decision making Management of (Research) Teams - leadership and decision making
Management of (Research) Teams - leadership and decision making
 
Shell vs. Java: Overcoming the Challenges of Shell Scripting for UNIX Install...
Shell vs. Java: Overcoming the Challenges of Shell Scripting for UNIX Install...Shell vs. Java: Overcoming the Challenges of Shell Scripting for UNIX Install...
Shell vs. Java: Overcoming the Challenges of Shell Scripting for UNIX Install...
 
Rent vs. Own Slide Show
Rent vs. Own Slide ShowRent vs. Own Slide Show
Rent vs. Own Slide Show
 
Buku proyeksi siswa
Buku proyeksi siswaBuku proyeksi siswa
Buku proyeksi siswa
 
촛불세대의 코칭
촛불세대의 코칭촛불세대의 코칭
촛불세대의 코칭
 

Ähnlich wie Discovery, Inventory and Application Recognition

Current challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsCurrent challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsDominic Haigh
 
The Evolution of Customer License Management
The Evolution of Customer License ManagementThe Evolution of Customer License Management
The Evolution of Customer License ManagementFlexera
 
Webinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management programWebinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management programFlexera
 
Software License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera SoftwareSoftware License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera SoftwareFlexera
 
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingThe Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingLicensingLive! - SafeNet
 
Best Practices for IT Asset Management Using Novell ZENworks
Best Practices for IT Asset Management Using Novell ZENworksBest Practices for IT Asset Management Using Novell ZENworks
Best Practices for IT Asset Management Using Novell ZENworksNovell
 
Software Compliance Management Overview
Software Compliance Management OverviewSoftware Compliance Management Overview
Software Compliance Management Overviewkevino80
 
Software Compliance 062409
Software Compliance 062409Software Compliance 062409
Software Compliance 062409mohara7750
 
Software License Optimization Managed Services
Software License Optimization Managed ServicesSoftware License Optimization Managed Services
Software License Optimization Managed ServicesFlexera
 
FlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexera
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsNovell
 
The Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryThe Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryOpSource
 
License Position Snapshot Service
License Position Snapshot ServiceLicense Position Snapshot Service
License Position Snapshot ServiceFlexera
 
Protecting the Desktop with Novell ZENworks Application Virtualization
Protecting the Desktop with Novell ZENworks Application VirtualizationProtecting the Desktop with Novell ZENworks Application Virtualization
Protecting the Desktop with Novell ZENworks Application VirtualizationNovell
 
GWAVACon 2013: Gain Control - ZENworks
GWAVACon 2013: Gain Control - ZENworksGWAVACon 2013: Gain Control - ZENworks
GWAVACon 2013: Gain Control - ZENworksGWAVA
 
Tcg Veriam Slm Intro Deck
Tcg Veriam Slm Intro DeckTcg Veriam Slm Intro Deck
Tcg Veriam Slm Intro DeckKamila_W
 
Sys track customer facing-terminal server-updated
Sys track   customer facing-terminal server-updatedSys track   customer facing-terminal server-updated
Sys track customer facing-terminal server-updatedSyntax Inc.
 
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...XebiaLabs
 
Flexera New York Tools Day
Flexera New York Tools DayFlexera New York Tools Day
Flexera New York Tools DayMartin Thompson
 

Ähnlich wie Discovery, Inventory and Application Recognition (20)

Current challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsCurrent challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutions
 
The Evolution of Customer License Management
The Evolution of Customer License ManagementThe Evolution of Customer License Management
The Evolution of Customer License Management
 
Webinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management programWebinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management program
 
Software License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera SoftwareSoftware License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera Software
 
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingThe Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based Licensing
 
Best Practices for IT Asset Management Using Novell ZENworks
Best Practices for IT Asset Management Using Novell ZENworksBest Practices for IT Asset Management Using Novell ZENworks
Best Practices for IT Asset Management Using Novell ZENworks
 
Software Compliance Management Overview
Software Compliance Management OverviewSoftware Compliance Management Overview
Software Compliance Management Overview
 
Software Compliance 062409
Software Compliance 062409Software Compliance 062409
Software Compliance 062409
 
Software License Optimization Managed Services
Software License Optimization Managed ServicesSoftware License Optimization Managed Services
Software License Optimization Managed Services
 
Servicedesk Plus 8
Servicedesk Plus 8Servicedesk Plus 8
Servicedesk Plus 8
 
FlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexNet Manager Suite Cloud
FlexNet Manager Suite Cloud
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
 
The Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryThe Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS Delivery
 
License Position Snapshot Service
License Position Snapshot ServiceLicense Position Snapshot Service
License Position Snapshot Service
 
Protecting the Desktop with Novell ZENworks Application Virtualization
Protecting the Desktop with Novell ZENworks Application VirtualizationProtecting the Desktop with Novell ZENworks Application Virtualization
Protecting the Desktop with Novell ZENworks Application Virtualization
 
GWAVACon 2013: Gain Control - ZENworks
GWAVACon 2013: Gain Control - ZENworksGWAVACon 2013: Gain Control - ZENworks
GWAVACon 2013: Gain Control - ZENworks
 
Tcg Veriam Slm Intro Deck
Tcg Veriam Slm Intro DeckTcg Veriam Slm Intro Deck
Tcg Veriam Slm Intro Deck
 
Sys track customer facing-terminal server-updated
Sys track   customer facing-terminal server-updatedSys track   customer facing-terminal server-updated
Sys track customer facing-terminal server-updated
 
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
 
Flexera New York Tools Day
Flexera New York Tools DayFlexera New York Tools Day
Flexera New York Tools Day
 

Mehr von Flexera

Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Flexera
 
Make Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyMake Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyFlexera
 
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT EnvironmentFlexera
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceFlexera
 
The Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementThe Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementFlexera
 
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First StrategyFlexera
 
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareThe Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareFlexera
 
Addressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewAddressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewFlexera
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Flexera
 
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityWebinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityFlexera
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Flexera
 
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Flexera
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Flexera
 
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Flexera
 
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2Flexera
 
BDNA joins Flexera
BDNA joins FlexeraBDNA joins Flexera
BDNA joins FlexeraFlexera
 
Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?Flexera
 
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...Flexera
 
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS ApplicationsKeeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS ApplicationsFlexera
 
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity DefenseDo You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity DefenseFlexera
 

Mehr von Flexera (20)

Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
 
Make Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyMake Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your Journey
 
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and Compliance
 
The Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementThe Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS Management
 
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy
 
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareThe Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source Software
 
Addressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewAddressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal View
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!
 
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityWebinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
 
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Open Source Security - It can be done easily.
Open Source Security - It can be done easily.
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
 
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
 
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
 
BDNA joins Flexera
BDNA joins FlexeraBDNA joins Flexera
BDNA joins Flexera
 
Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?
 
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
 
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS ApplicationsKeeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
 
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity DefenseDo You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
 

Kürzlich hochgeladen

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Kürzlich hochgeladen (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Discovery, Inventory and Application Recognition

  • 1. Discovery, Inventory and Application Recognition December 2011
  • 2. Webinar Series Automated entitlement based license • 1st webinar (Nov) Level 4 management and optimization; How to get started on Optimized a SAM program • 2nd webinar– (Today) Automated purchased vs. installed Discovery, Inventory Level 3 license reconciliation; SAM processes Continuously & Application Compliant to maintain license compliance Recognition Level 1 Perform purchased versus installed • 3rd webinar– (Jan) Level 2 license reconciliation on an ad hoc Managed License & Contract basis; point in time management Management Levels 2-3 Level 1 • 4th webinar– (Feb) Identify software and hardware installed Installed Strategies for License Optimization Level 4 Enterprise License Optimization Maturity Model 2 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 3. Speaker & Agenda • License Management overview • Device Based inventory • Network based inventory • Application Recognition • Additional inventory requirements Vincent Brasseur • Virtualization Director of Product Management, • License examples Flexera Software • Recommendations • Questions and Answers 3 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 4. License Management Goals Out of $ Over-Licensed Optimal Compliance $ • Calculate your license position – Reduce non-compliance costs and risks – Eliminate over-spending on software; identify ‘shelfware’ • Manage Licenses and Contracts – Know what the organization owns; understand licensing terms and conditions – Pay for what you need and use – Be audit ready • Meet Organization Objectives – Ensure each installation and use of a software product is licensed – Provide financial forecasting • Optimize the license position – Minimize license consumption – Deliver trend analysis and licensing forecasting 4 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 5. License Management Data Software and Hardware Asset Management Inventory Users & Group User HW/SW data Cost Center Usage data Business Unit Location HW & SW Assets Financial History Request Purchases Audit trail Contracts 5 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 6. Discovery & Inventory Challenges • Completeness & Accuracy – IT environment is dynamic – Devices are not always connected – Inventory is performed every few weeks • Different OS’s & Environments – Desktop and datacenter have their own challenges – Inventorying the datacenter is usually more difficult – Specific data is needed when virtualization is used • Security and access rights – Inventory requires administrator rights – Difficult to obtain in large organizations 6 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 7. Inventory Discovery & Inventory Types • Inventory can be: – Agent based: an agent is physically installed on the device – Agentless: an agent is executed remotely on the device – Remote: no agent is executed on the device; e.g. Oracle db • Device discovery methodologies: – Network discovery – Group Policy / Login script – Manually 7 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 8. Inventory Agent & Agentless inventory Available Data Packages Files Registry ISO Tag 8 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 9. Device Based Inventory Data Sources Packages • Found in Programs and Features or Add/Remove Programs (Windows), RPM packages (UNIX/Linux)… • Collecting and identifying software products is easy • Challenges: – Cannot be used to track usage – Data can be lost when the software product is repackaged – Discrepancies between installation and package data store – Not all publishers use packages – Product can be running on a machine without installation 9 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 10. Device Based Inventory Data Sources Files • Found on the device hard disk • The most accurate data source for identifying software • Challenges: – Requires full disk scan – The volume of files to be collected is large – The identification rules are complex and sometimes inaccurate – Products can be running on a machine without installation 10 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 11. Device Based Inventory Data Sources Registry • Can be remotely inventoried • Very accurate data source for identifying software • Challenges: – Need to know what to collect – Many times registry entries are left behind after software removal – Applies to Windows platform only – Products can be running on a machine without installation 11 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 12. Device Based Inventory Data Sources ISO 19770-2 Tag • The ISO 19770-2 provides a standard for software identification tags that contain authoritative identifying information for installed software. • The ISO 19770-2 is a XML file with a .swidtag extension … <swid:product_title id="e8_3_2">Adobe Photoshop CS3</swid:product_title> <swid:product_version id="e8_3_3"> <swid:name id="e8_3_3sub1">10.2</swid:name> … <swid:name>Adobe Systems Incorporated</swid:name> <swid:regid>regid.1986-12.com.adobe</swid:regid> </swid:software_creator> … • Challenges: – The adoption of the ISO tag is slow; it does not apply to legacy products – It requires hard disk scan – Few inventory tools capture this data – Product can be running on a machine without installation 12 © 2011 Flexera Software, Inc. | Company Confidential
  • 13. Network Based Inventory Network Discovery and Inventory • Uses port sweep and network protocols (TCP, UDP…) • No agent required • Remote API calls can be performed • Challenges – Need to target the devices to be interrogated – Security issue – Applies to a limited number of software products • Examples: – DNS Server port 53 – Oracle TNS Listener ports 1521/1526 – SQL Server port 1434 – VMware ports 902/443 13 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 14. Application Recognition • Software Identification challenges: – What software product is used or installed? – What components are used or installed? – What products need a license? Desktop & Datacenter Recognition Process List of Applications Inventory •Files •Add/Remove Programs •Registry •ISO tag Application Recognition File Rule Application Name = Excel.exe If the file name equals Excel.exe and the version Name = Excel Version = 12.0.6214.1000 starts by 12.* and the publisher contains *Microsoft* Version = 2007 Publisher = Microsoft then the application is Microsoft Excel 2007 Publisher = Microsoft 14 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 15. License Management Data Requirements License Metrics Most license metrics can be classified in five main categories: • Device based Per Device, per server, per virtual machine… • User based Per user, named user, accounts, authorized user, external users, UVU (User Value Unit), concurrent users, infrequent users, … • Hardware property based Per core, processor, processor or core points, socket, PVU (Processor Value Unit), RVU (Resource Value Unit), tiered device, virtual memory, processor speed… • Usage based Per amount of time, number of accesses, feature used… • Miscellaneous Enterprise, Site, Per purchase order over 100K, per premium income… 15 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 16. License Management & Hardware Asset Management Hardware Inventory Requirements • Processor type • Number of Processors • Processor Speed • Number of cores • Memory • Number of sockets • Computer Model & Manufacturer Related Data: • Unique Identifier for each device: inventory ID, Network Name • Operating System • Last Logon User • Serial number, MAC Address • Casing 16 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 17. Virtualization Application Virtualization • Multiple technologies: Microsoft App-V, Citrix XenApp… • Device inventory will not capture virtualized applications • Two inventory possibilities: – Access rights – Usage • Used in VDI environments • Publishers licensing rules – Microsoft – Adobe – Access rights versus usage 17 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 18. Virtualization Example – MS Server Processor Soft Partitioning 18 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 19. Virtualization Example – MS Server Processor Soft Partitioning • Hardware: – 1 physical OSE (no SQL) • 1 physical proc w/ 2 cores – 1 virtual OSE (w/ SQL) • 2 virtual procs • Correct calculation: – 2 virtual procs / 2 cores per physical proc = 1 license 19 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 20. Virtualization Example – Oracle Processor Soft & Hard Partitioning Discovery and Inventory Process Inventory Oracle Oracle Tool Listener Database SNMP or Port Scanning SQL Queries Oracle Database License • Databases support options and management packs • Options/Management Packs can be inventoried only by database queries • Oracle Processor license is based on the number of processor cores • Oracle Processor License does not support soft partitioning 20 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 21. Discovery and Inventory Best Practices • Deploying an inventory solution is challenging • Use existing tools: – Configuration management – Usage monitoring – Environment specific tools – Publisher specific tools • Use all data sources and methodologies – One data source or methodology will not provide all the information • Only use new tools when needed 21 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 22. Application Recognition Best Practices • Quantity is nothing • Quality and accuracy are essential • The application recognition solution must: – Be up to date – Support different type of evidence – Allow complex rules; or – Contain the software product name from publishers – Be modifiable on site 22 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 23. Recommendations • No tool on the market will provide all the answers • Use what you have today; buy additional tools only when necessary – Assess what data is already available today – Locate areas where additional tools are needed: virtualization, Unix/Linux environments, Oracle, etc. • Use Inventory & App Recognition tools that: – Consolidate data from the multiple sources – Translate raw software inventory into meaningful product titles, versions, editions – Are updated frequently and have broad coverage 23 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
  • 24. Thank you Please submit your questions via the Live Meeting Q&A form. For more information: www.flexerasoftware.com/ELO Contacts: jemmitt@flexerasoftware.com vbrasseur@flexerasoftware.com 24 © 2011 Flexera Software, Inc. | Company Confidential