SlideShare ist ein Scribd-Unternehmen logo
1 von 25
LANDesk Client Management Solutions…
Software License Asset Management Demo
Presented By:
Mark Bastin
West Area System Engineer
Welcome to our Webinar
LANDesk Software Confidential
1 WHAT’S NEW?
2
3 QUESTIONS AND ANSWERS
8
Want to save big money?
 20% of enterprise IT budgets are spent on
software licenses and maintenance.
 60% of organizations over-license their software
 30-40% - Effective software asset management
could save your organization in operating
expenses
Agenda
NOTE
5 minutes
30-40 minutes
5 minutes
DEMONSTRATION
What’s New
LANDesk Software Confidential
• Content
• Static Groups
• Dynamic groups
Manufacturer Normalization
LANDesk Software Confidential
• Static Groups
– Add the
products
selectively
• Dynamic
Groups
– Use wildcards
to find all
products
Product Normalization and Groups
LANDesk Software Confidential
• Automatically Discovered Products
– MSI, Shortcuts and Executed software
Product Discovery
LANDesk Software Confidential
• User configurable Runtime files
– Calculate usage based on the exe that matter (distiller.exe
not reader.exe)
Runtime Usage
LANDesk Software Confidential
• Based on a LANDesk Query or Files
• Web Product Monitor SaaS applications (URL)
Custom Products
LANDesk Software Confidential
• Filters that can be used to find the software
– Simplified search
Product Filters
LANDesk Software Confidential
• Know what you have, where you got it from
• Purchase date, expiration, what you paid for it
Licenses
10
LANDesk Software Confidential
• License can have multiple products associated
– Licenses are processed in the order listed
Product to License association
DATA ANALYTICS BENEFITS
FOR SLAM
LANDesk Software Confidential
Data Analytics - data from Inventory scan
Normalized
Data
EULA
Aware
Licensed
Software
Add Remove
Programs
Benefit -
Turns 1000’s of
software titles to less
than 100 in most cases
LANDesk Software Confidential
• Manufacturer Name
• Software Title
Benefits
• Data fixed at scan time
• If wanting to move data
to other DB or use
reporting in 32 console
Data Analytics Normalization
LANDesk Software Confidential
• Uses all raw data , normalized or not
and only worries about “licensable
software”
• Compare it to an accountant that
knows all the tax codes, EULA
Analytics gives credits for multiple
versions , bundles or suites.
• Results in software list per machine
under “licensed software “tab
EULA Analytics
LANDesk Software Confidential
• Analyzes the software's
Downgrade rights
• Standard MSRP cost used and
is adjustable based on your
costs
• Data is sent to SLM as
CONTENT
EULA Analytics – Downgrade rights
LANDesk Software Confidential
Licensed Software Analytics
LANDesk Software Confidential
• Takes all “licensed software data” results and moves into SLM as content
Data Analytics is a SLM content provider
LANDesk Software Confidential
• Connector to Microsoft Volume Licensing and Adobe cloud to dynamic
pull in the effective licenses quantities directly into SLM
Data Analytics software B2B connectors
LANDesk Software Confidential
New – VDI Licensing
LANDesk Software Confidential
New – VDI Licensing
LANDesk Software Confidential
• Normalized
software title list
• Global Groups
• EULA analytics
results
“Installations”
• Total licenses
“Effective license
quantities”
• Software Usage
under “+” and “-”
End Game – The compliance report
LANDesk Software Confidential
Next Step -RECLAMATIONLANDesk Software
License Asset Management
• Data Analytics
• B2B connectors
• EULA management
• Software License Management
• Monitoring
• Automated Reclamation
• Tracks the quantity of licenses purchased
• Tracks the quantity installed
• Tracks the usage of the licenses
• Determines unused licenses
• Policy based license reclaiming
• Threshold based limits
• Automatic vs. Manual
License Monitoring
License Reclamation
LANDesk Software Confidential
Get IN Touch!
Phone:
714-408-4700
www:
www.irontouchms.com
SocialMedia
CONTACT
in
LANDesk Software Confidential25
Thank You!
The information herein is the confidential information and/or proprietary property of LANDesk Software, Inc. and its affiliates (referred to collectively as “LANDesk”), and may not be
disclosed or copied without prior written consent of LANDesk.
To the maximum extent permitted under applicable law, LANDesk assumes no liability whatsoever, and disclaims any express or implied warranty, relating to the sale and/or use of
LANDesk products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property
right, without limiting the rights under copyright.
LANDesk retains the right to make changes to the information herein or related product specifications and descriptions, at any time, without notice. LANDesk makes no warranty for
the use of the information herein and assumes no responsibility for any errors that can appear nor does it make a commitment to update the information contained herein. For the
most current product information, please visit landesk.com or wavelink.com.
Copyright © 2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks of LANDesk Software, Inc. and its
affiliates in the United States and/or other countries. Other brands and names may be claimed as the property of others.

Weitere ähnliche Inhalte

Was ist angesagt?

Dos and Don’ts for Managing External Connectivity to/from Your Network
Dos and Don’ts for Managing External Connectivity to/from Your NetworkDos and Don’ts for Managing External Connectivity to/from Your Network
Dos and Don’ts for Managing External Connectivity to/from Your NetworkAlgoSec
 
Centralized logging in a changing environment at the UK’s DVLA
Centralized logging in a changing environment at the UK’s DVLACentralized logging in a changing environment at the UK’s DVLA
Centralized logging in a changing environment at the UK’s DVLAElasticsearch
 
Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial EnvironmentSplunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial EnvironmentSplunk
 
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentA Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentAlgoSec
 
SplunkLive! Austin Customer Presentation - Xerox
SplunkLive! Austin Customer Presentation - XeroxSplunkLive! Austin Customer Presentation - Xerox
SplunkLive! Austin Customer Presentation - XeroxSplunk
 
End-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic StackEnd-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic StackElasticsearch
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseSplunk
 
SplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthSplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthSplunk
 
Splunk for ITOA Breakout Session
Splunk for ITOA Breakout SessionSplunk for ITOA Breakout Session
Splunk for ITOA Breakout SessionSplunk
 
Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial Environment Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial Environment Splunk
 
Functions and features of drake hosted.
Functions and features of drake hosted.Functions and features of drake hosted.
Functions and features of drake hosted.Smith Roy
 
Endpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
Endpoint Agent Part 2: Monitoring SaaS Apps from AnywhereEndpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
Endpoint Agent Part 2: Monitoring SaaS Apps from AnywhereThousandEyes
 
Splunk Ninjas: New Features and Search Dojo
Splunk Ninjas: New Features and Search DojoSplunk Ninjas: New Features and Search Dojo
Splunk Ninjas: New Features and Search DojoSplunk
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionSplunk
 
Logsign Forest Enterprise Solution Overview
Logsign Forest Enterprise Solution OverviewLogsign Forest Enterprise Solution Overview
Logsign Forest Enterprise Solution OverviewLogsign
 
Troubleshooting Remote Workers and VPNs
Troubleshooting Remote Workers and VPNsTroubleshooting Remote Workers and VPNs
Troubleshooting Remote Workers and VPNsThousandEyes
 
Democratising Security: Update Your Policies or Update Your CV
Democratising Security: Update Your Policies or Update Your CVDemocratising Security: Update Your Policies or Update Your CV
Democratising Security: Update Your Policies or Update Your CVExtraHop Networks
 
Logsign Focus Overview
Logsign Focus OverviewLogsign Focus Overview
Logsign Focus OverviewLogsign
 
ECS: Delivering Better Cyber Intelligence and Compliance
ECS: Delivering Better Cyber Intelligence and ComplianceECS: Delivering Better Cyber Intelligence and Compliance
ECS: Delivering Better Cyber Intelligence and ComplianceElasticsearch
 
Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseSplunk
 

Was ist angesagt? (20)

Dos and Don’ts for Managing External Connectivity to/from Your Network
Dos and Don’ts for Managing External Connectivity to/from Your NetworkDos and Don’ts for Managing External Connectivity to/from Your Network
Dos and Don’ts for Managing External Connectivity to/from Your Network
 
Centralized logging in a changing environment at the UK’s DVLA
Centralized logging in a changing environment at the UK’s DVLACentralized logging in a changing environment at the UK’s DVLA
Centralized logging in a changing environment at the UK’s DVLA
 
Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial EnvironmentSplunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial Environment
 
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentA Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
 
SplunkLive! Austin Customer Presentation - Xerox
SplunkLive! Austin Customer Presentation - XeroxSplunkLive! Austin Customer Presentation - Xerox
SplunkLive! Austin Customer Presentation - Xerox
 
End-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic StackEnd-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic Stack
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
SplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthSplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealth
 
Splunk for ITOA Breakout Session
Splunk for ITOA Breakout SessionSplunk for ITOA Breakout Session
Splunk for ITOA Breakout Session
 
Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial Environment Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial Environment
 
Functions and features of drake hosted.
Functions and features of drake hosted.Functions and features of drake hosted.
Functions and features of drake hosted.
 
Endpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
Endpoint Agent Part 2: Monitoring SaaS Apps from AnywhereEndpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
Endpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
 
Splunk Ninjas: New Features and Search Dojo
Splunk Ninjas: New Features and Search DojoSplunk Ninjas: New Features and Search Dojo
Splunk Ninjas: New Features and Search Dojo
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout Session
 
Logsign Forest Enterprise Solution Overview
Logsign Forest Enterprise Solution OverviewLogsign Forest Enterprise Solution Overview
Logsign Forest Enterprise Solution Overview
 
Troubleshooting Remote Workers and VPNs
Troubleshooting Remote Workers and VPNsTroubleshooting Remote Workers and VPNs
Troubleshooting Remote Workers and VPNs
 
Democratising Security: Update Your Policies or Update Your CV
Democratising Security: Update Your Policies or Update Your CVDemocratising Security: Update Your Policies or Update Your CV
Democratising Security: Update Your Policies or Update Your CV
 
Logsign Focus Overview
Logsign Focus OverviewLogsign Focus Overview
Logsign Focus Overview
 
ECS: Delivering Better Cyber Intelligence and Compliance
ECS: Delivering Better Cyber Intelligence and ComplianceECS: Delivering Better Cyber Intelligence and Compliance
ECS: Delivering Better Cyber Intelligence and Compliance
 
Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk Enterprise
 

Ähnlich wie Reduce the Cost of Your Software Licenses Across Your Business

FlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexera
 
SAM Services powered by AUPIT
SAM Services powered by AUPITSAM Services powered by AUPIT
SAM Services powered by AUPITJames Galera
 
Optimize Software, SaaS, and Cloud with Flexera and RightScale
Optimize Software, SaaS, and Cloud with Flexera and RightScaleOptimize Software, SaaS, and Cloud with Flexera and RightScale
Optimize Software, SaaS, and Cloud with Flexera and RightScaleRightScale
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Software License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera SoftwareSoftware License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera SoftwareFlexera
 
FlexNet Manager for Enterprises Datasheet
FlexNet Manager for Enterprises DatasheetFlexNet Manager for Enterprises Datasheet
FlexNet Manager for Enterprises DatasheetFlexera
 
FlexNet Manager Suite for Enterprises A.P. Møller-Mærsk Success Story
FlexNet Manager Suite for Enterprises A.P. Møller-Mærsk Success StoryFlexNet Manager Suite for Enterprises A.P. Møller-Mærsk Success Story
FlexNet Manager Suite for Enterprises A.P. Møller-Mærsk Success StoryFlexera
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingGeorg Knon
 
Flexera Software Solutions for Enterprises
Flexera Software Solutions for EnterprisesFlexera Software Solutions for Enterprises
Flexera Software Solutions for EnterprisesFlexera
 
Webinar: The Power of Normalized Inventory
Webinar: The Power of Normalized InventoryWebinar: The Power of Normalized Inventory
Webinar: The Power of Normalized InventoryFlexera
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationFlexera
 
Microsoft Product Licensing Basics
Microsoft Product Licensing BasicsMicrosoft Product Licensing Basics
Microsoft Product Licensing BasicsFlorisKlaver1
 
SafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS
 
Adaptor Configuration and Development Service
Adaptor Configuration and Development ServiceAdaptor Configuration and Development Service
Adaptor Configuration and Development ServiceFlexera
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruMarketingArrowECS_CZ
 
Experiences in Mainframe-to-Splunk Big Data Access
Experiences in Mainframe-to-Splunk Big Data AccessExperiences in Mainframe-to-Splunk Big Data Access
Experiences in Mainframe-to-Splunk Big Data AccessPrecisely
 
Flexera New York Tools Day
Flexera New York Tools DayFlexera New York Tools Day
Flexera New York Tools DayMartin Thompson
 

Ähnlich wie Reduce the Cost of Your Software Licenses Across Your Business (20)

LANDesk End to End Service Management
LANDesk End to End Service ManagementLANDesk End to End Service Management
LANDesk End to End Service Management
 
FlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexNet Manager Suite Cloud
FlexNet Manager Suite Cloud
 
SAM Services powered by AUPIT
SAM Services powered by AUPITSAM Services powered by AUPIT
SAM Services powered by AUPIT
 
Optimize Software, SaaS, and Cloud with Flexera and RightScale
Optimize Software, SaaS, and Cloud with Flexera and RightScaleOptimize Software, SaaS, and Cloud with Flexera and RightScale
Optimize Software, SaaS, and Cloud with Flexera and RightScale
 
protect4s-product-sheet
protect4s-product-sheetprotect4s-product-sheet
protect4s-product-sheet
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Software License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera SoftwareSoftware License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera Software
 
FlexNet Manager for Enterprises Datasheet
FlexNet Manager for Enterprises DatasheetFlexNet Manager for Enterprises Datasheet
FlexNet Manager for Enterprises Datasheet
 
FlexNet Manager Suite for Enterprises A.P. Møller-Mærsk Success Story
FlexNet Manager Suite for Enterprises A.P. Møller-Mærsk Success StoryFlexNet Manager Suite for Enterprises A.P. Møller-Mærsk Success Story
FlexNet Manager Suite for Enterprises A.P. Møller-Mærsk Success Story
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
 
Flexera Software Solutions for Enterprises
Flexera Software Solutions for EnterprisesFlexera Software Solutions for Enterprises
Flexera Software Solutions for Enterprises
 
Webinar: The Power of Normalized Inventory
Webinar: The Power of Normalized InventoryWebinar: The Power of Normalized Inventory
Webinar: The Power of Normalized Inventory
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License Optimization
 
Microsoft Product Licensing Basics
Microsoft Product Licensing BasicsMicrosoft Product Licensing Basics
Microsoft Product Licensing Basics
 
SafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software Vendors
 
Adaptor Configuration and Development Service
Adaptor Configuration and Development ServiceAdaptor Configuration and Development Service
Adaptor Configuration and Development Service
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC Miniclusteru
 
Experiences in Mainframe-to-Splunk Big Data Access
Experiences in Mainframe-to-Splunk Big Data AccessExperiences in Mainframe-to-Splunk Big Data Access
Experiences in Mainframe-to-Splunk Big Data Access
 
Splunk
SplunkSplunk
Splunk
 
Flexera New York Tools Day
Flexera New York Tools DayFlexera New York Tools Day
Flexera New York Tools Day
 

Kürzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Reduce the Cost of Your Software Licenses Across Your Business

  • 1. LANDesk Client Management Solutions… Software License Asset Management Demo Presented By: Mark Bastin West Area System Engineer Welcome to our Webinar
  • 2. LANDesk Software Confidential 1 WHAT’S NEW? 2 3 QUESTIONS AND ANSWERS 8 Want to save big money?  20% of enterprise IT budgets are spent on software licenses and maintenance.  60% of organizations over-license their software  30-40% - Effective software asset management could save your organization in operating expenses Agenda NOTE 5 minutes 30-40 minutes 5 minutes DEMONSTRATION
  • 4. LANDesk Software Confidential • Content • Static Groups • Dynamic groups Manufacturer Normalization
  • 5. LANDesk Software Confidential • Static Groups – Add the products selectively • Dynamic Groups – Use wildcards to find all products Product Normalization and Groups
  • 6. LANDesk Software Confidential • Automatically Discovered Products – MSI, Shortcuts and Executed software Product Discovery
  • 7. LANDesk Software Confidential • User configurable Runtime files – Calculate usage based on the exe that matter (distiller.exe not reader.exe) Runtime Usage
  • 8. LANDesk Software Confidential • Based on a LANDesk Query or Files • Web Product Monitor SaaS applications (URL) Custom Products
  • 9. LANDesk Software Confidential • Filters that can be used to find the software – Simplified search Product Filters
  • 10. LANDesk Software Confidential • Know what you have, where you got it from • Purchase date, expiration, what you paid for it Licenses 10
  • 11. LANDesk Software Confidential • License can have multiple products associated – Licenses are processed in the order listed Product to License association
  • 13. LANDesk Software Confidential Data Analytics - data from Inventory scan Normalized Data EULA Aware Licensed Software Add Remove Programs Benefit - Turns 1000’s of software titles to less than 100 in most cases
  • 14. LANDesk Software Confidential • Manufacturer Name • Software Title Benefits • Data fixed at scan time • If wanting to move data to other DB or use reporting in 32 console Data Analytics Normalization
  • 15. LANDesk Software Confidential • Uses all raw data , normalized or not and only worries about “licensable software” • Compare it to an accountant that knows all the tax codes, EULA Analytics gives credits for multiple versions , bundles or suites. • Results in software list per machine under “licensed software “tab EULA Analytics
  • 16. LANDesk Software Confidential • Analyzes the software's Downgrade rights • Standard MSRP cost used and is adjustable based on your costs • Data is sent to SLM as CONTENT EULA Analytics – Downgrade rights
  • 18. LANDesk Software Confidential • Takes all “licensed software data” results and moves into SLM as content Data Analytics is a SLM content provider
  • 19. LANDesk Software Confidential • Connector to Microsoft Volume Licensing and Adobe cloud to dynamic pull in the effective licenses quantities directly into SLM Data Analytics software B2B connectors
  • 22. LANDesk Software Confidential • Normalized software title list • Global Groups • EULA analytics results “Installations” • Total licenses “Effective license quantities” • Software Usage under “+” and “-” End Game – The compliance report
  • 23. LANDesk Software Confidential Next Step -RECLAMATIONLANDesk Software License Asset Management • Data Analytics • B2B connectors • EULA management • Software License Management • Monitoring • Automated Reclamation • Tracks the quantity of licenses purchased • Tracks the quantity installed • Tracks the usage of the licenses • Determines unused licenses • Policy based license reclaiming • Threshold based limits • Automatic vs. Manual License Monitoring License Reclamation
  • 24. LANDesk Software Confidential Get IN Touch! Phone: 714-408-4700 www: www.irontouchms.com SocialMedia CONTACT in
  • 25. LANDesk Software Confidential25 Thank You! The information herein is the confidential information and/or proprietary property of LANDesk Software, Inc. and its affiliates (referred to collectively as “LANDesk”), and may not be disclosed or copied without prior written consent of LANDesk. To the maximum extent permitted under applicable law, LANDesk assumes no liability whatsoever, and disclaims any express or implied warranty, relating to the sale and/or use of LANDesk products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right, without limiting the rights under copyright. LANDesk retains the right to make changes to the information herein or related product specifications and descriptions, at any time, without notice. LANDesk makes no warranty for the use of the information herein and assumes no responsibility for any errors that can appear nor does it make a commitment to update the information contained herein. For the most current product information, please visit landesk.com or wavelink.com. Copyright © 2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks of LANDesk Software, Inc. and its affiliates in the United States and/or other countries. Other brands and names may be claimed as the property of others.

Hinweis der Redaktion

  1. Show in demo
  2. Configure multiple source attributes to single attributes. Even apply validation rules to the data map to only get the data you wantExample: A computer model Number may or may not exist in multiple fields and what data does exist may vary. Apply data validations and map it to a single field for consistency
  3. License monitoring tracks the quantity of licenses owned, compares it with what is installed and takes action when the count of available licenses drops below a defined threshold.License reclamation permits IT to identify assigned but unused licenses and launch email campaigns to reclaim them from the user community