• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Software License Audits and Penalties Are Up: True That

    December 11, 2012 Alex Woodie

    If you’ve been asked to “true up” with your software vendor for exceeding your application license allotment following an audit, you’re not alone. According to a recent IDC report commissioned by Flexera Software, software vendors are getting more aggressive and seeking more compensation from customers who use more software than they pay for.

    According to IDC’s report, titled “2012 Key Trends in Software Pricing and Licensing Survey,” more of what organizations spend on applications is coming in the form of “true up” penalties that they must pay to software vendors following an audit. How much more? By one account, there’s been a 12 percent increase (from 26 percent to 38 percent) in the number of organizations reporting that a portion of their application spending (11 percent or more to be exact) is associated with “true up” penalties.

    Here’s another shocker from the survey: bigger companies get audited more often, and end up paying higher penalties. Only 10 percent of all companies in the survey pool (334 companies of all sizes in the US, the EU, and Australia) reported being audited three times in the last two years. But 25 percent of companies with revenue greater than $1 billion reported being audited three times over that period.

    And here’s yet one more shocker: the biggest software companies have the most aggressive audit policies, yielding “true up” penalties that often range from $1 million to more than $10 million. Microsoft, the biggest software company in the world, is the biggest software auditor, too. Of those companies that have been audited, 51 percent have been audited by Microsoft in the last year, followed by Oracle (27 percent), IBM (24 percent), SAP (22 percent), and Adobe (19 percent). Companies cited in the “other” category include Attachmate (5 respondents) and Autodesk (2 respondents). (Infor, once again, gains no attention from the mainstream analysts–but in this case it may be a good thing.)

    So what’s Flexera’s role in all this? A year ago, the Schaumberg, Illinois, maker of InstallShield and InstallAnywhere software installation utilities embarked upon a new effort to promote the use of software identification (SWID) tags within software installed by those two utilities. SWID, proponents say, helps organizations better track their use of software, including reducing instances of using more than paid for, and cutting down on “shelfware,” too. (SWID also has the potential to identify software pirates, but that’s another story.)

    “Never has the need for software license optimization been more pronounced,” Flexera senior vice president of marketing Randy Littleson states in a press release. “Organizations face tremendous challenges tracking and managing software licenses and reconciling that use against their software license agreements. If existing license management strategies aren’t significantly reducing or eliminating painful software true up penalties, [then] optimizing the software license estate often eliminates or significantly reduces that risk exposure.”

    RELATED STORY

    Flexera to Tag Apps on IBM i for Usage Monitoring, License Audits



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    DevSecOps & Peer Review – The Power of Automation

    In today’s fast-paced development environments, security can no longer be an afterthought. This session will explore how DevSecOps brings security into every phase of the DevOps lifecycle—early, consistently, and effectively.

    In this session, you’ll discover:

    • What DevSecOps is and why it matters?
    • Learn how to formalize your security concerns into a repeatable process
    • Discover the power of automation through pull requests, approval workflows, segregation of duties, peer review, and more—ensuring your data and production environments are protected without slowing down delivery.

    Whether you’re just getting started or looking to enhance your practices, this session will provide actionable insights to strengthen your security posture through automation and team alignment to bring consistency to the process.

    Watch Now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Rocket Software:  Set yourself free from fees with Rocket iCluster! Complimentary trial!
    Bytware:  Protect your IBM Power Systems from security threats. Download the IFS security bundle!
    New Generation Software:  Read the new White Paper: BI for IBM i Customers

    IT Jungle Store Top Book Picks

    Bookstore Blowout! Up to 50% off all titles!

    The iSeries Express Web Implementer's Guide: Save 50%, Sale Price $29.50
    The iSeries Pocket Database Guide: Save 50%, Sale Price $29.50
    Easy Steps to Internet Programming for the System i: Save 50%, Sale Price $24.97
    The iSeries Pocket WebFacing Primer: Save 50%, Sale Price $19.50
    Migrating to WebSphere Express for iSeries: Save 50%, Sale Price $24.50
    Getting Started with WebSphere Express for iSeries: Save 50%, Sale Price $24.50
    The All-Everything Operating System: Save 50%, Sale Price $17.50
    The Best Joomla! Tutorial Ever!: Save 50%, Sale Price $9.98

    IT Shops Buy 7.1 Exabytes Of Disk Array Capacity In Q3 End-Of-Year Odds And Ends

    Leave a Reply Cancel reply

Volume 12, Number 35 -- December 11, 2012
THIS ISSUE SPONSORED BY:

Profound Logic Software
looksoftware
Maxava
Computer Keyes
Adsero Optima

Table of Contents

  • ARCAD Goes Unicode with ALM, Looks to Asia for Growth
  • Respect My Authority Swapper, Halcyon Says
  • SystemObjects Lets You Generate iPad Apps from IBM i
  • IBM Flexes Its Power Systems Muscle with Wins at Overseas Banks
  • Software License Audits and Penalties Are Up: True That
  • Lavastorm Rains on Fraudster Parades
  • Magic Teams Up with Samsung in Smartphone Pact
  • NCR to Buy Retalix for $650 Million
  • Midsize Manufacturers Crave Mobile ERP, Survey Says
  • Trinium Keeps on Trucking with Mobile Interface from mrc

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Power Systems Grows Nicely In Q3, Looks To Grow For All 2025, Too
  • Beta Of MCP Server Opens Up IBM i For Agentic AI
  • Sundry IBM i And Power Stack Announcements For Your Consideration
  • Please Take The IBM i Marketplace Survey
  • IBM i PTF Guide, Volume 27, Number 43
  • IBM Pulls The Curtain Back A Smidge On Project Bob
  • IBM Just Killed Merlin. Here’s Why
  • Guru: Playing Sounds From An RPG Program
  • A Bit More Insight Into IBM’s “Spyre” AI Accelerator For Power
  • IBM i PTF Guide, Volume 27, Number 42

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle