From Wikipedia, the free encyclopedia - View original article
Software asset management (SAM) is a business practice that involves managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an organization. According to the Information Technology Infrastructure Library (ITIL), SAM is defined as “…all of the infrastructure and processes necessary for the effective management, control and protection of the software assets…throughout all stages of their lifecycle.” Fundamentally intended to be part of an organization’s information technology business strategy, the goals of SAM are to reduce information technology (IT) costs and limit business and legal risk related to the ownership and use of software, while maximizing IT responsiveness and end-user productivity. SAM is particularly important for large corporations in regards to redistribution of licenses and managing legal risks associated with software ownership and expiration. SAM technologies track license expiration, thus allowing the company to function ethically and within software compliance regulations. This can be important for both eliminating legal costs associated with license agreement violations and as part of a company's reputation management strategy. Both are important forms of risk management and are critical for large corporations' long-term business strategies.
SAM can serve many different functions within organizations, depending on their software portfolios, IT infrastructures, resource availability, and business goals.
For many organizations, the goal of implementing a SAM program is very tactical in nature, focused specifically on balancing the number of software licenses purchased with the number of actual licenses consumed or used. In addition to balancing the number of licenses purchased with the amount of consumption, an effective SAM program must also ensure that the usage of all installed software is in keeping with the terms and conditions of the specific vendor license agreement. In doing so, organizations can minimize liabilities associated with software piracy in the event of an audit by a software vendor or a third party such as the Business Software Alliance (BSA). SAM, according to this interpretation, involves conducting detailed software inventories on a periodic basis to determine the exact number of software consumption, comparing this information with the number of licenses purchased, reviewing how the software is being used in respect to the terms and conditions and establishing controls to ensure that proper licensing practices are maintained on an ongoing basis. This can be accomplished through a combination of IT processes, purchasing policies and procedures, and technology solutions such as software inventory tools.
Counting installations is the most common means of measuring license consumption but some software is licensed by number of users, capital, processors or CPU Cores.
More broadly defined, the strategic goals of SAM often include (but are not limited to) the following:
Fund management plays very vital role in maintaining big aspects in financial management too. It formulates the organized cash flow projections. It maintains expenses, taxes, leverage costs and interest income transactions, analyse them care fully.
Use in financial Aspects
A number of technologies are available to support key SAM processes:
In 2003, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) began working with the SAM industry to develop a standard of best practices for software asset management programs. Standard ISO/IEC 19770-1:2006, Information technology – software asset management – Part 1, was published by the ISO and IEC in May 2006. Part 1 of the standard details SAM processes including control environment, planning and implementation, inventory, verification and compliance, operations management and life cycle. A revision of this standard was published in 2012. This revised standard is designed to allow the implementation of SAM processes to be "accomplished in multiple increments and to that increment most suited to the needs of the organization."
ISO/IEC 19770-2:2009 – Part 2: Software identification tag; establishes specifications for tagging software to optimize its identification and management.
Using software identification tags or SWID tags makes discovery a simpler and more accurate process that can be verified by software vendors if they audit an organisations entire estate.
An example of issues faced when scaling up discovery tools is with Microsoft's System Centre Configuration Manager (SCCM). Using metering rules to monitor software deployment and usage across a small estate is relatively easy and reliable given the total number of unique executables (.exe files) and the number of instances of each executable. Turning on metering rules for every packaged application and every executable in a large estate quickly makes the volume of data generated unmanageable and expensive to maintain.