Following on from this – what can be done to plug the gaps? What are the tactical steps a business can take to stop software compliance leaks and start gaining control?
1. Centralise Purchasing
2. Educate End Users About Software Management
3. Manage Software Changes
Build processes or checklists around inputs and outputs to your software estate (Install, Move, Add, Change, new starter, leaver, etc)
Consider preventing unauthorised changes via lock down or white listing applications
Reduce unauthorized changes by monitoring new installs by end users and reprimanding / advising / escalating / educating accordingly
Build a software request process for end users that checks entitlement before purchasing new applications and seeks manager approval
4. Maintain Accurate Licensing Records
Store digital records as well as paper receipts, proof of purchase or license details
Keep a database of installations versus entitlement
Restrict and manage the distribution of software media
Validate that licensing terms and conditions are being adhered to by training someone internally, seeking third party guidance or by seeking written validation from the vendor that you are licensed correctly.
5. Manage Virtual Environments
For virtualised software make sure you know what you are entitled to use, what the worst case scenario might be if usage peaks and how you will monitor ongoing usage.
For virtualised machines make sure you know what you entitled to use, how your license position will change if the environment changes and you plan to ongoing usage.
6. Only purchase software from a reputable business partner.
What other basic steps should be taken to prevent software compliance headaches?
Shadow IT often spreads quietly and quickly becomes a serious risk. Just look at the UK-based supermarket chain Co-op. A little-known remote maintenance tool used by an external IT provider was compromised. The result? Nearly 800 ...
TLDR. ITAM Forum has the opportunity to join the Linux Foundation as a stand-alone, self-funded project. This article covers a) What’s happening b) Why I think it’s a great move for the ITAM Forum and c) ...
From 1st November 2025, Microsoft will remove all tiered pricing for Online Services under the Enterprise Agreement. This means all customers renewing or purchasing new Online Services after this date, will receive standard level A pricing ...
Since the ITAM Forum has been working in strategic partnership with the FinOps Foundation, I’ve come to admire the Crawl, Walk, Run approach to best practices, as it allows improvements and recommendations to meet the organisation ...
Shadow IT often spreads quietly and quickly becomes a serious risk. Just look at the UK-based supermarket chain Co-op. A little-known remote maintenance tool used by an external IT provider was compromised. The result? Nearly 800 ...
Managing AI in the enterprise is a team sport. In this article, I want to explore specifically what ITAM brings to the table as we enter the AI era. As I’ve mentioned in previous articles on ...
Marks & Spencer (M&S), the iconic UK retailer, recently became the latest high-profile victim of a devastating cyberattack. Fellow retailers The Co-Op and Harrods were also attacked. Recent reports suggest the rapid action at the Co-Op ...