96:(BSA). SAM, according to this interpretation, involves conducting detailed software inventories on an ongoing basis to determine the exact number of software licenses consumed, comparing this information with the number of licenses purchased, and reviewing how the software is being used in respect to the terms and conditions and establishing controls to ensure that proper licensing practices are maintained on an ongoing basis. This can be accomplished through IT processes, purchasing policies and procedures, and technology solutions such as software inventory tools.
253:(SCCM). Using SCCM Metering Rules to monitor software usage across a small estate or a small number of applications is relatively easy and reliable given the total number of unique executables (.exe files) and the number of instances of each executable. Turning on Metering Rules for every packaged application and every executable in a large estate quickly makes the volume of data generated unmanageable and expensive to maintain. Most SAM tools which consume SCCM data rely on these Metering Rules to understand usage.
53:. SAM is particularly important for large corporations regarding redistribution of licenses and managing legal risks associated with software ownership and expiration. SAM technologies track license expiration, thus allowing the company to function ethically and within software compliance regulations. This can be important for both eliminating legal costs associated with license agreement violations and as part of a company's
230:
ISO/IEC 19770-2:2015: Software identification tag; establishes specifications for tagging software to optimize its identification and management. The current version was published in 2015 and is a revision to the 2009 original
Software ID Tag standard. Using software identification tags or SWID tags
162:
solutions provide an intelligent repository for license entitlements which can then be reconciled against data provided by
Software inventory tools to provide the organization with an 'Effective License Position' or view of where the organization is under-licensed (at risk of a compliance audit) or
207:
tools capture product-specific information such as name, edition, version and license agreement types as well as other key top-level information for products used within the business. This information normalizes product naming conventions within the organization and allows mapping between other
87:
purchased with the number of actual licenses consumed or used. In addition to balancing the number of licenses purchased with the amount of consumption, an effective SAM program must also ensure that the usage of all installed software is in keeping with the terms and conditions of the specific
226:
ISO/IEC 19770-1:2017: IT Asset
Management Systems Requirements is a process framework to enable an organization to incorporate ITAM (including SAM) processes and policies sufficient to satisfy corporate governance requirements and ensure effective support for IT service management overall. The
227:
implementation of SAM processes to be "accomplished in multiple staged increments or tiers." Part 1 of the standard details SAM processes including control environment, planning and implementation, inventory, verification and compliance, operations management and life cycle.
41:, SAM is defined as “…all of the infrastructure and processes necessary for the effective management, control, and protection of the software assets…throughout all stages of their lifecycle.” Fundamentally intended to be part of an organization's information technology
234:
ISO/IEC 19770-3:2016: Entitlement
Management Schema outlines a technical schema which can be used to encapsulate license details including contract information, entitlements, rights, limitations and details about invoice, PO numbers, etc.
200:
tools allow employees to place requests for software products using a centralized form and process specifically designed to capture and assess specific license requirements as well as to manage and track the procurement and deployment
231:
makes discovery a simpler and more accurate process that can be verified by software vendors if they audit an organisations entire estate. SWID tags are implemented and supported by many vendors including IBM, Microsoft and Adobe.
37:) is a business practice that involves managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an organization. According to
171:
tools monitor the utilization of software applications across a network. They can also provide real-time enforcement of compliance for applications licensed based on usage.
134:
Establish ongoing policies and procedures surrounding the acquisition, documentation, deployment, usage and retirement of software to recognize long-term benefits of SAM
223:
The ISO/IEC 19770 family of standards are designed to help organizations manage IT assets including software assets (SAM). The published standards are outlined below:
123:
The limit overhead associated with managing and supporting software by streamlining and/or automating IT processes (such as inventory tracking, software deployment,
80:
SAM can serve many different functions within organizations, depending on their software portfolios, IT infrastructures, resource availability, and business goals.
99:
Counting installations are the most common means of measuring license consumption but some software is licensed by the number of users, capital, processors, or
517:
241:
ISO/IEC 19770-5:2015: Overview and
Vocabulary provides an overview of the 19770 standards as well as defines vocabulary used throughout the standards.
194:
tools automate the deployment of software patches to ensure that computers are up-to-date and meet applicable security and efficiency standards.
110:
Reduce software and support costs by negotiating volume contract agreements and eliminating or reallocating underutilized software licenses
49:(IT) costs and limit business and legal risk related to the ownership and use of software, while maximizing IT responsiveness and end-user
250:
238:
ISO/IEC 19770-4:2017: Resource
Utilization Measurement provides an ITAM data standard for Resource Utilization Measurement ("RUM").
427:
ISO/IEC 19770-1:2012 Information technology — Software asset management-- Part 1: Processes and tiered assessment of conformance
83:
For many organizations, the goal of implementing a SAM program is very tactical, explicitly focused on balancing the number of
57:
strategy. Both are important forms of risk management and are critical for large corporations' long-term business strategies.
177:
tools restrict what and by whom particular software can be run on a computer as a means of avoiding security and other risks.
382:
430:, International Organization for Standardization; International Electrotechnical Commission, 2012-06-13, p. vi
349:, International Organization for Standardization; International Electrotechnical Commission, 2006-05-01, p. 19
262:
93:
314:, International Organization for Standardization; International Electrotechnical Commission, 2006-05-01, p. 5
522:
272:
100:
347:
Information technology — Software asset management — Part 1: Processes and tiered assessment of conformance
312:
Information technology — Software asset management — Part 1: Processes and tiered assessment of conformance
46:
106:
More broadly defined, the strategic goals of SAM often include (but are not limited to) the following:
54:
68:, which includes overseeing both software and hardware that comprise an organization's computers and
181:
65:
277:
154:, and collect software file information such as title, product ID, size, date, path, and version.
120:
Improve worker productivity by deploying the right kinds of technology more quickly and reliably
189:
167:
128:
114:
88:
vendor license agreement. In doing so, organizations can minimize liabilities associated with
42:
469:
455:
441:
425:
151:
84:
69:
267:
158:
89:
17:
124:
511:
360:
325:
50:
249:
An example of issues faced when scaling up discovery tools is with
Microsoft's
61:
218:
390:
92:
in the event of an audit by a software vendor or a third party such as the
497:
483:
411:
361:"Microsoft Software Asset Management: Step-by-Step Training - Step 4"
143:
Several technologies are available to support key SAM processes:
163:
over-licensed (wasting money on unnecessary software purchases).
38:
150:
tools intelligently “discover” software installed across the
185:
tools automate and regulate the deployment of new software.
208:
technology and tools used in the composite SAM solution.
213:
306:
304:
302:
8:
296:ITIL’s Guide to Software Asset Management
289:
60:SAM is one facet of a broader business
383:"Application control coming your way"
7:
251:System Centre Configuration Manager
117:and desktop/server/mobile standards
113:Enforce compliance with corporate
25:
518:Information technology management
45:, the goals of SAM are to reduce
1:
539:
381:Ogren, Eric (2006-11-03).
263:Certified software manager
216:
94:Business Software Alliance
31:Software asset management
76:Role within organizations
18:Software Asset Management
273:Software licensing audit
245:Issues with scalability
498:"Iso/Iec 19770-5:2015"
484:"Iso/Iec 19770-4:2017"
470:"Iso/Iec 19770-3:2016"
456:"Iso/Iec 19770-2:2009"
442:"Iso/Iec 19770-2:2015"
412:"Iso/Iec 19770-1:2017"
47:information technology
55:reputation management
182:Software deployment
175:Application control
66:IT asset management
27:Software management
278:Financial Software
198:Request management
148:Software inventory
168:Software metering
115:security policies
85:software licenses
43:business strategy
16:(Redirected from
530:
523:Asset management
502:
501:
494:
488:
487:
480:
474:
473:
466:
460:
459:
452:
446:
445:
438:
432:
431:
422:
416:
415:
408:
402:
401:
399:
398:
389:. Archived from
378:
372:
371:
369:
368:
357:
351:
350:
343:
337:
336:
334:
333:
322:
316:
315:
308:
297:
294:
152:computer network
21:
538:
537:
533:
532:
531:
529:
528:
527:
508:
507:
506:
505:
496:
495:
491:
482:
481:
477:
468:
467:
463:
454:
453:
449:
440:
439:
435:
424:
423:
419:
410:
409:
405:
396:
394:
380:
379:
375:
366:
364:
359:
358:
354:
345:
344:
340:
331:
329:
324:
323:
319:
310:
309:
300:
295:
291:
286:
268:License manager
259:
247:
221:
215:
205:Product catalog
159:License manager
141:
90:software piracy
78:
28:
23:
22:
15:
12:
11:
5:
536:
534:
526:
525:
520:
510:
509:
504:
503:
489:
475:
461:
447:
433:
417:
403:
373:
352:
338:
326:"What is SAM?"
317:
298:
288:
287:
285:
282:
281:
280:
275:
270:
265:
258:
255:
246:
243:
217:Main article:
214:
211:
210:
209:
202:
195:
186:
178:
172:
164:
155:
140:
139:SAM Technology
137:
136:
135:
132:
125:issue tracking
121:
118:
111:
77:
74:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
535:
524:
521:
519:
516:
515:
513:
499:
493:
490:
485:
479:
476:
471:
465:
462:
457:
451:
448:
443:
437:
434:
429:
428:
421:
418:
413:
407:
404:
393:on 2008-04-03
392:
388:
387:ComputerWorld
384:
377:
374:
362:
356:
353:
348:
342:
339:
327:
321:
318:
313:
307:
305:
303:
299:
293:
290:
283:
279:
276:
274:
271:
269:
266:
264:
261:
260:
256:
254:
252:
244:
242:
239:
236:
232:
228:
224:
220:
212:
206:
203:
199:
196:
193:
191:
187:
184:
183:
179:
176:
173:
170:
169:
165:
161:
160:
156:
153:
149:
146:
145:
144:
138:
133:
130:
126:
122:
119:
116:
112:
109:
108:
107:
104:
102:
97:
95:
91:
86:
81:
75:
73:
71:
67:
63:
58:
56:
52:
48:
44:
40:
36:
32:
19:
492:
478:
464:
450:
436:
426:
420:
406:
395:. Retrieved
391:the original
386:
376:
365:. Retrieved
355:
346:
341:
330:. Retrieved
320:
311:
292:
248:
240:
237:
233:
229:
225:
222:
204:
197:
188:
180:
174:
166:
157:
147:
142:
105:
98:
82:
79:
59:
51:productivity
34:
30:
29:
363:. Microsoft
328:. Microsoft
131:management)
512:Categories
397:2008-04-03
367:2008-03-19
332:2008-03-19
284:References
192:management
62:discipline
219:ISO 19770
64:known as
257:See also
201:process.
103:Cores.
70:network
127:, and
190:Patch
129:patch
39:ITIL
101:CPU
35:SAM
514::
385:.
301:^
72:.
500:.
486:.
472:.
458:.
444:.
414:.
400:.
370:.
335:.
33:(
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.