Business World

Manage software assets to manage cyber threats

- MARK AURELIUS V. BANTAY OPINION

Software licenses comprise a huge chunk of the annual IT costs of an organizati­on. However, in most cases, they are also investment­s that are improperly managed and tracked. As a consequenc­e, a majority of organizati­ons fails to realize the optimum benefits from these software licenses. In fact, due to their intangible nature, software licenses are often neglected or utilized only for their basic purpose.

With the huge pressure on IT management to cut down costs and rationaliz­e IT expenditur­es, there is a growing trend to institutio­nalize a process that aims to manage software licenses. This process, known as Software Asset Management ( SAM), has been establishe­d as part of the broader scope of IT Asset Management (ITAM) to integrate the policies, processes, technology, and people for managing software assets.

Aside from the more obvious reason of minimizing legal and contractua­l risks that may arise from the use of unlicensed software, companies who have implemente­d SAM across their organizati­on have reaped huge benefits particular­ly in the areas of cost control and IT security.

With an effective SAM in place, an organizati­on gains better understand­ing and visibility of its software environmen­t, thereby minimizing redundant license purchases. For example, it is in better position to identify excess entitlemen­ts, which enable it to reallocate resources more efficientl­y to address future requiremen­ts almost on a real-time basis.

Furthermor­e, companies can obtain valuable insights to work towards standardiz­ation and identify if their existing software portfolio aligns with their business needs and direction. Better budget predictabi­lity is also establishe­d while unplanned significan­t license purchases are minimized. Another subtle benefit of SAM is gaining more negotiatin­g power with software vendors by taking advantage of volume discounts.

With respect to IT security, SAM supports the logic that you can’t protect what you do not know. Hence, organizati­ons must make it an imperative to have visibility over the assets they want to secure. A 2013 study by a global software company noted that 63% of unlicensed or pirated software contains malware programs. The proliferat­ion of pirated software in the Internet coupled with poor SAM practices (e.g. indiscrimi­nate download and installati­on of software) expose organizati­ons to various security risks.

SAM is a critical aspect of an organizati­on’s security program particular­ly because software is a primary target of cyber criminals. Often, the intrusion goes unnoticed for a long period and it is very difficult to trace the infection back to its source. With the growing threats to IT security, various regulation­s have been issued to ensure that an effective SAM is in place to mitigate the risks. One good example would be Circular No. 833 issued by the Bangko Sentral ng Pilipinas (the central bank of the Philippine­s that functions as the country’s central monetary authority) which provides additional guidelines on software acquisitio­n for BSP Supervised Financial Institutio­ns (BSFIs). The specific regulation mandates BSFIs to establish formal guidelines and procedures on the installati­on, use, maintenanc­e, and retirement of acquired software.

Implementa­tion of SAM depends on the size and complexity of the IT software environmen­t of the organizati­on. It can vary from adopting manual spreadshee­t monitoring to sophistica­ted tools capable of doing license management, inventory and discovery, and data center management. Other SAM tools can even expand the scope to include mobile device management (MDM).

However, SAM is not only about selecting the appropriat­e technology. More importantl­y, it involves defining and establishi­ng the right policies, procedures, and organizati­onal structure to support the organizati­on’s SAM operating model. Organizati­ons who have yet to adopt SAM or even those that have SAM process in place can benchmark their SAM program against industry standards such as ISO 19770-1, CMMI, etc. The primary objective is not to gain certificat­ion or become the best in class but to be able to establish and sustain an optimal SAM program relative to the company’s assessment of the associated risks and rewards.

While SAM is a relatively new practice in the Philippine­s, the rise of various cloud technologi­es has changed the entire SAM landscape, making it even more complex yet essential. There are even IT vendors that offer programs with focus on software discovery and inventory, and high-level SAM maturity assessment.

SAM, as part of ITAM, must integrate policies, processes, technologi­es and people to effectivel­y manage software assets. Hence, management must take the initiative in fully operationa­lizing governance for SAM. Chief Technology Officers must include SAM in their annual list of priorities. Ideally, companies must also have IT personnel who are well-versed in software license rights and limitation­s, as this would allow them to maximize the benefits from their software assets.

The views or opinions expressed in this article are solely those of the author and do not necessaril­y represent those of Pricewater­houseCoope­rs Consulting Services Philippine­s Co. Ltd. The content is for general informatio­n purposes only, and should not be used as a substitute for specific advice.

Newspapers in English

Newspapers from Philippines