SlideShare a Scribd company logo
1 of 20
Download to read offline
K2: Software Asset Management
What is Sassafras K2?

•   K2 is a point product for advanced software and hardware asset
    management
     o Purchase and entitlement tracking
     o Policy driven license management
     o Software and hardware auditing
     o Software product recognition
     o Software usage metering
     o Usage, audit and compliance reporting


•   Global Enterprise Scalability – 50K+ client computers supported by a single
    server process




                                                                                  3
Sassafras Software Inc.

•   K2 is published by Sassafras Software, based in New Hampshire USA.

•   Sassafras Software is a pioneer in SAM since 21 years

•   K2 is deployed in USA, Europe, Japan and Australia

•   K2 is deployed in over 2+ Million client computers




                                                                         4
Customers

        •   Adobe Systems
        •   Apple Computer
        •   Microsoft Corporation
        •   IBM
        •   British Broadcasting Corporation
        •   General Motors
        •   Toyota Corporation
        •   NASA
        •   Stanford
        •   University of California
        •   MIT
        •   University of Michigan
        •   ….

                                               5
Software Asset Management (SAM). Why?

•   Reduce your software costs. Procurement, support, upgrades, …

•   Increase employee productivity

•   Eliminate business and financial risks

•   Comply with vendor software license agreements




                                                                    6
SAM: A key to reducing costs and improving productivity

“Companies over spend by 15% to 20% on software licenses”
– Gartner Group

“Companies routinely spend 10% to 20% of their software budgets
on updates and support services they may not even need”
– Gartner Group

“Companies can save between 10% to 30% of their annual software
costs by implementing a good software asset and license
management solution”




                                                                  7
K2 Components

Client–Server Architecture

•   KeyServer – Server process

•   KeyAccess – Client agent, which runs on desktops, laptops, and servers

•   KeyConfigure – Management console

•   KeyReporter – Web based reports




                                                                             8
Architecture

Server         Clients



                         KeyAccess



KeyServer
                         KeyAccess




                         KeyConfigure

                                        9
Purchase tracking and reconciliation

•   Software Purchase Records and Histories

•   Contract and Purchase Document Storage

•   External Purchase Data Importing

•   Calculation of Current Entitlement Position

•   Automated Reconciliation of Entitlements against Management Policies

•   Purchase data can be imported in XML format from other procurement
    systems

•   Can be tightly integrated with other procurement systems
                                                                           10
Software product and Hardware discovery

•   K2 agent discovers software products and hardware configuration details

•   Automatic product identification, filtering and classification

•   Online product identification database

•   Program version identification and control

•   Manage physical and virtual instances

•   Extensive audit reports




                                                                              11
Application Usage

•   K2 can measure usage of any discovered software product

•   Provides comprehensive and accurate view of software usage

•   Making incorrect assumptions of usage can be a costly mistake.

•   Extensive usage reports




                                                                     12
License Management

•   Define flexible usage policies to control access to any software product

•   Node locked, floating/concurrent use, site and leased licenses

•   License compliance is an ongoing process, enforce compliance

•   Security. Blackout selected software usage




                                                                               13
Complete Software Asset Life Cycle




          5. Optimize Software       1.   Procurement
             Assets                  2.   Discover Software/Hardware




        4. Enforce License Policy   3. Monitor Usage
           Maintain Compliance         Reconcile Achieve Compliance




                                                                       14
Will K2 affect the network and end users?

•   The presence of the K2 is invisible to the end users regardless of network
    size. Good citizen

•   A typical K2 client will generate less than 30 Kbytes of traffic over the
    course of an eight-hour workday.

•   Largest installation of 50K+ clients

•   The K2 components run silently and require little or no administration




                                                                                 15
K2 Reports

•   Built-in report templates can produce hundreds of detailed and summary
    reports

•   Web based reports and scheduling

•   Direct support for customized external reports




                                                                             16
Integration

•   Flexible IT Data Integration

•   Authenticate with common third party tools Active Directory, LDAP,
    Kerberos, others…

•   Data easily accessible through open standards

•   Help desk, Procurement, Service desk, Service call management etc.




                                                                         17
System Requirements
•   No server grade OS or hardware required.

•   No database or third party back-end tools required

•   One server process supports tens of thousands of clients.

•   Server
     o Windows 7, Vista, NT, 2008, 2000, 2003, XP
     o Mac OS 7.5 to OS X 10.5
     o NetWare 4.2 - 6.5
     o Linux 2.2 and higher

•   Client
     o Windows 95, 98, NT, 2000, 2003, XP, Vista, Win 7
     o WTS (thin-client): NT 4, 2000, 2003, Citrix 1.7
     o Mac OS 7.5 to OS X 10.5
     o Linux 2.2 and higher
     o Solaris 9 and higher
     o Support for virtual clients
                                                                18
Licensing

•   K2 is configured and priced by the number of computers and thin client
    sessions that will be managed.

•   The per-client price varies with the size of the installation.

•   License is perpetual.

•   Technical support is free for life of the product.

•   Upgrades are additional (and optional).




                                                                             19
Thank You




            20

More Related Content

What's hot

Cisco UCS Invicta accelerated storage
Cisco UCS Invicta accelerated storageCisco UCS Invicta accelerated storage
Cisco UCS Invicta accelerated storagesolarisyougood
 
eFolder Partner Chat Webinar — Breaking the Chain: Why One Partner Adopted a ...
eFolder Partner Chat Webinar — Breaking the Chain: Why One Partner Adopted a ...eFolder Partner Chat Webinar — Breaking the Chain: Why One Partner Adopted a ...
eFolder Partner Chat Webinar — Breaking the Chain: Why One Partner Adopted a ...eFolder
 
Why Build Intel-based Whitebox Servers PPT version
Why Build Intel-based Whitebox Servers PPT versionWhy Build Intel-based Whitebox Servers PPT version
Why Build Intel-based Whitebox Servers PPT versionChristian Hym
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsAruj Thirawat
 
Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)johndorian555
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
 
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingDSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingAndris Soroka
 
SolarWinds Federal Partner Perfstack Training
SolarWinds Federal Partner Perfstack TrainingSolarWinds Federal Partner Perfstack Training
SolarWinds Federal Partner Perfstack TrainingSolarWinds
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
SolarWinds Federal Webinar - Using Tools to Improve IT Service Management
SolarWinds Federal Webinar - Using Tools to Improve IT Service ManagementSolarWinds Federal Webinar - Using Tools to Improve IT Service Management
SolarWinds Federal Webinar - Using Tools to Improve IT Service ManagementSolarWinds
 
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?eG Innovations
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5 Networks
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS ScalePeter Silva
 
eFolder Partner Chat webinar — Breaking the Chain: Why One Partner Adopted a ...
eFolder Partner Chat webinar — Breaking the Chain: Why One Partner Adopted a ...eFolder Partner Chat webinar — Breaking the Chain: Why One Partner Adopted a ...
eFolder Partner Chat webinar — Breaking the Chain: Why One Partner Adopted a ...eFolder
 
12 Things You Must Know About VDI
12 Things You Must Know About VDI12 Things You Must Know About VDI
12 Things You Must Know About VDIShivani Sehta
 
Symantec Enterprise Security Manager™ Modules for MySQL ...
Symantec Enterprise Security Manager™ Modules for MySQL ...Symantec Enterprise Security Manager™ Modules for MySQL ...
Symantec Enterprise Security Manager™ Modules for MySQL ...webhostingguy
 
The Virtual Desktop Revolution
The Virtual Desktop RevolutionThe Virtual Desktop Revolution
The Virtual Desktop RevolutionYankee Group
 

What's hot (20)

Cisco UCS Invicta accelerated storage
Cisco UCS Invicta accelerated storageCisco UCS Invicta accelerated storage
Cisco UCS Invicta accelerated storage
 
eFolder Partner Chat Webinar — Breaking the Chain: Why One Partner Adopted a ...
eFolder Partner Chat Webinar — Breaking the Chain: Why One Partner Adopted a ...eFolder Partner Chat Webinar — Breaking the Chain: Why One Partner Adopted a ...
eFolder Partner Chat Webinar — Breaking the Chain: Why One Partner Adopted a ...
 
Why Build Intel-based Whitebox Servers PPT version
Why Build Intel-based Whitebox Servers PPT versionWhy Build Intel-based Whitebox Servers PPT version
Why Build Intel-based Whitebox Servers PPT version
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI Solutions
 
Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingDSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
 
SolarWinds Federal Partner Perfstack Training
SolarWinds Federal Partner Perfstack TrainingSolarWinds Federal Partner Perfstack Training
SolarWinds Federal Partner Perfstack Training
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
Software as a service
Software as a serviceSoftware as a service
Software as a service
 
Managed Hosting
Managed HostingManaged Hosting
Managed Hosting
 
SolarWinds Federal Webinar - Using Tools to Improve IT Service Management
SolarWinds Federal Webinar - Using Tools to Improve IT Service ManagementSolarWinds Federal Webinar - Using Tools to Improve IT Service Management
SolarWinds Federal Webinar - Using Tools to Improve IT Service Management
 
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS Scale
 
VDI Best Practices
VDI Best PracticesVDI Best Practices
VDI Best Practices
 
eFolder Partner Chat webinar — Breaking the Chain: Why One Partner Adopted a ...
eFolder Partner Chat webinar — Breaking the Chain: Why One Partner Adopted a ...eFolder Partner Chat webinar — Breaking the Chain: Why One Partner Adopted a ...
eFolder Partner Chat webinar — Breaking the Chain: Why One Partner Adopted a ...
 
12 Things You Must Know About VDI
12 Things You Must Know About VDI12 Things You Must Know About VDI
12 Things You Must Know About VDI
 
Symantec Enterprise Security Manager™ Modules for MySQL ...
Symantec Enterprise Security Manager™ Modules for MySQL ...Symantec Enterprise Security Manager™ Modules for MySQL ...
Symantec Enterprise Security Manager™ Modules for MySQL ...
 
The Virtual Desktop Revolution
The Virtual Desktop RevolutionThe Virtual Desktop Revolution
The Virtual Desktop Revolution
 

Viewers also liked

Enlister baidu's recommender system for the biggest chinese q&a website
Enlister baidu's recommender system for the biggest chinese q&a websiteEnlister baidu's recommender system for the biggest chinese q&a website
Enlister baidu's recommender system for the biggest chinese q&a websitejasonfuoo
 
Build-a-High-Performance-Customer-Developement-Engine-021516b
Build-a-High-Performance-Customer-Developement-Engine-021516bBuild-a-High-Performance-Customer-Developement-Engine-021516b
Build-a-High-Performance-Customer-Developement-Engine-021516btomflemingh2
 
ASI Annual Power Summit 2013
ASI Annual Power Summit 2013ASI Annual Power Summit 2013
ASI Annual Power Summit 2013Greg Muzzillo
 
Electronic Newsletters Can Increase Sales and Build Customer Base
Electronic Newsletters Can Increase Sales and Build Customer BaseElectronic Newsletters Can Increase Sales and Build Customer Base
Electronic Newsletters Can Increase Sales and Build Customer BaseGreg Muzzillo
 
Introduction to NoSQL
Introduction to NoSQLIntroduction to NoSQL
Introduction to NoSQLjasonfuoo
 
Issues on food & energy
Issues on food & energyIssues on food & energy
Issues on food & energyUdi Pungut
 
How to build data warehouse
How to build data warehouseHow to build data warehouse
How to build data warehousejasonfuoo
 
Peta, atlas, dan globe
Peta, atlas, dan globePeta, atlas, dan globe
Peta, atlas, dan globevhyra_fendy
 
American born chinese (abc)
American born chinese (abc)American born chinese (abc)
American born chinese (abc)samshek
 
Ebitda palm oil
Ebitda palm oilEbitda palm oil
Ebitda palm oilUdi Pungut
 
Top reasons to join the international franchise association by greg muzzillo
Top reasons to join the international franchise association by greg muzzilloTop reasons to join the international franchise association by greg muzzillo
Top reasons to join the international franchise association by greg muzzilloGreg Muzzillo
 
Casting process
Casting processCasting process
Casting processLuis Linde
 
Quelle stratégies le marché de l'information professionnelle doit-il adopter ...
Quelle stratégies le marché de l'information professionnelle doit-il adopter ...Quelle stratégies le marché de l'information professionnelle doit-il adopter ...
Quelle stratégies le marché de l'information professionnelle doit-il adopter ...Caroline LIJKO
 
Communication innovante en bibliothèque - Blogs et pages Facebook
Communication innovante en bibliothèque - Blogs et pages FacebookCommunication innovante en bibliothèque - Blogs et pages Facebook
Communication innovante en bibliothèque - Blogs et pages FacebookMagalie Le Gall
 

Viewers also liked (16)

A eulogy to gill astarita
A eulogy to gill astarita A eulogy to gill astarita
A eulogy to gill astarita
 
Enlister baidu's recommender system for the biggest chinese q&a website
Enlister baidu's recommender system for the biggest chinese q&a websiteEnlister baidu's recommender system for the biggest chinese q&a website
Enlister baidu's recommender system for the biggest chinese q&a website
 
Build-a-High-Performance-Customer-Developement-Engine-021516b
Build-a-High-Performance-Customer-Developement-Engine-021516bBuild-a-High-Performance-Customer-Developement-Engine-021516b
Build-a-High-Performance-Customer-Developement-Engine-021516b
 
ASI Annual Power Summit 2013
ASI Annual Power Summit 2013ASI Annual Power Summit 2013
ASI Annual Power Summit 2013
 
Electronic Newsletters Can Increase Sales and Build Customer Base
Electronic Newsletters Can Increase Sales and Build Customer BaseElectronic Newsletters Can Increase Sales and Build Customer Base
Electronic Newsletters Can Increase Sales and Build Customer Base
 
Introduction to NoSQL
Introduction to NoSQLIntroduction to NoSQL
Introduction to NoSQL
 
Issues on food & energy
Issues on food & energyIssues on food & energy
Issues on food & energy
 
How to build data warehouse
How to build data warehouseHow to build data warehouse
How to build data warehouse
 
Peta, atlas, dan globe
Peta, atlas, dan globePeta, atlas, dan globe
Peta, atlas, dan globe
 
Speech for pifa awards 2013
Speech for pifa awards 2013Speech for pifa awards 2013
Speech for pifa awards 2013
 
American born chinese (abc)
American born chinese (abc)American born chinese (abc)
American born chinese (abc)
 
Ebitda palm oil
Ebitda palm oilEbitda palm oil
Ebitda palm oil
 
Top reasons to join the international franchise association by greg muzzillo
Top reasons to join the international franchise association by greg muzzilloTop reasons to join the international franchise association by greg muzzillo
Top reasons to join the international franchise association by greg muzzillo
 
Casting process
Casting processCasting process
Casting process
 
Quelle stratégies le marché de l'information professionnelle doit-il adopter ...
Quelle stratégies le marché de l'information professionnelle doit-il adopter ...Quelle stratégies le marché de l'information professionnelle doit-il adopter ...
Quelle stratégies le marché de l'information professionnelle doit-il adopter ...
 
Communication innovante en bibliothèque - Blogs et pages Facebook
Communication innovante en bibliothèque - Blogs et pages FacebookCommunication innovante en bibliothèque - Blogs et pages Facebook
Communication innovante en bibliothèque - Blogs et pages Facebook
 

Similar to License Estate

IBM SoftLayer - overview of Cloud Infrastructure
IBM SoftLayer - overview of Cloud Infrastructure IBM SoftLayer - overview of Cloud Infrastructure
IBM SoftLayer - overview of Cloud Infrastructure Avinaba Basu
 
Sys track customer facing-terminal server-updated
Sys track   customer facing-terminal server-updatedSys track   customer facing-terminal server-updated
Sys track customer facing-terminal server-updatedSyntax Inc.
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionFlexera
 
Challenges Scaling DevOps
Challenges Scaling DevOpsChallenges Scaling DevOps
Challenges Scaling DevOpsRachel Maxwell
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementC/D/H Technology Consultants
 
Got Personally-Owned Devices? Manage Them with System Center
Got Personally-Owned Devices? Manage Them with System CenterGot Personally-Owned Devices? Manage Them with System Center
Got Personally-Owned Devices? Manage Them with System CenterC/D/H Technology Consultants
 
The Evolution of Customer License Management
The Evolution of Customer License ManagementThe Evolution of Customer License Management
The Evolution of Customer License ManagementFlexera
 
Zero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is kingZero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is kingplumbee
 
Welcome to SoftSummit 2010
Welcome to SoftSummit 2010Welcome to SoftSummit 2010
Welcome to SoftSummit 2010Flexera
 
SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04Avinaba Basu
 
Government and Education Webinar: Successfully Migrating Applications to the ...
Government and Education Webinar: Successfully Migrating Applications to the ...Government and Education Webinar: Successfully Migrating Applications to the ...
Government and Education Webinar: Successfully Migrating Applications to the ...SolarWinds
 
Oracle Database 19c - poslední z rodiny 12.2 a co přináší nového
Oracle Database 19c - poslední z rodiny 12.2 a co přináší novéhoOracle Database 19c - poslední z rodiny 12.2 a co přináší nového
Oracle Database 19c - poslední z rodiny 12.2 a co přináší novéhoMarketingArrowECS_CZ
 
ARC's Bob Mick Presentation on Using Server Virtualization In Manufacturing O...
ARC's Bob Mick Presentation on Using Server Virtualization In Manufacturing O...ARC's Bob Mick Presentation on Using Server Virtualization In Manufacturing O...
ARC's Bob Mick Presentation on Using Server Virtualization In Manufacturing O...ARC Advisory Group
 
Securing the Cloud Native Stack
Securing the Cloud Native StackSecuring the Cloud Native Stack
Securing the Cloud Native StackApcera
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...SolarWinds
 
Banking Software Simulated proposal
Banking Software Simulated proposalBanking Software Simulated proposal
Banking Software Simulated proposalImran Fayyaz
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component C/D/H Technology Consultants
 
An Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewAn Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewManageEngine
 
Edge 2016 Session 1886 Building your own docker container cloud on ibm power...
Edge 2016 Session 1886  Building your own docker container cloud on ibm power...Edge 2016 Session 1886  Building your own docker container cloud on ibm power...
Edge 2016 Session 1886 Building your own docker container cloud on ibm power...Yong Feng
 

Similar to License Estate (20)

IBM SoftLayer - overview of Cloud Infrastructure
IBM SoftLayer - overview of Cloud Infrastructure IBM SoftLayer - overview of Cloud Infrastructure
IBM SoftLayer - overview of Cloud Infrastructure
 
Sys track customer facing-terminal server-updated
Sys track   customer facing-terminal server-updatedSys track   customer facing-terminal server-updated
Sys track customer facing-terminal server-updated
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
 
Challenges Scaling DevOps
Challenges Scaling DevOpsChallenges Scaling DevOps
Challenges Scaling DevOps
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device Management
 
Got Personally-Owned Devices? Manage Them with System Center
Got Personally-Owned Devices? Manage Them with System CenterGot Personally-Owned Devices? Manage Them with System Center
Got Personally-Owned Devices? Manage Them with System Center
 
The Evolution of Customer License Management
The Evolution of Customer License ManagementThe Evolution of Customer License Management
The Evolution of Customer License Management
 
Zero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is kingZero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is king
 
Welcome to SoftSummit 2010
Welcome to SoftSummit 2010Welcome to SoftSummit 2010
Welcome to SoftSummit 2010
 
Chapter 07
Chapter 07Chapter 07
Chapter 07
 
SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04
 
Government and Education Webinar: Successfully Migrating Applications to the ...
Government and Education Webinar: Successfully Migrating Applications to the ...Government and Education Webinar: Successfully Migrating Applications to the ...
Government and Education Webinar: Successfully Migrating Applications to the ...
 
Oracle Database 19c - poslední z rodiny 12.2 a co přináší nového
Oracle Database 19c - poslední z rodiny 12.2 a co přináší novéhoOracle Database 19c - poslední z rodiny 12.2 a co přináší nového
Oracle Database 19c - poslední z rodiny 12.2 a co přináší nového
 
ARC's Bob Mick Presentation on Using Server Virtualization In Manufacturing O...
ARC's Bob Mick Presentation on Using Server Virtualization In Manufacturing O...ARC's Bob Mick Presentation on Using Server Virtualization In Manufacturing O...
ARC's Bob Mick Presentation on Using Server Virtualization In Manufacturing O...
 
Securing the Cloud Native Stack
Securing the Cloud Native StackSecuring the Cloud Native Stack
Securing the Cloud Native Stack
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 
Banking Software Simulated proposal
Banking Software Simulated proposalBanking Software Simulated proposal
Banking Software Simulated proposal
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
 
An Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewAn Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An Overview
 
Edge 2016 Session 1886 Building your own docker container cloud on ibm power...
Edge 2016 Session 1886  Building your own docker container cloud on ibm power...Edge 2016 Session 1886  Building your own docker container cloud on ibm power...
Edge 2016 Session 1886 Building your own docker container cloud on ibm power...
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

License Estate

  • 1.
  • 2. K2: Software Asset Management
  • 3. What is Sassafras K2? • K2 is a point product for advanced software and hardware asset management o Purchase and entitlement tracking o Policy driven license management o Software and hardware auditing o Software product recognition o Software usage metering o Usage, audit and compliance reporting • Global Enterprise Scalability – 50K+ client computers supported by a single server process 3
  • 4. Sassafras Software Inc. • K2 is published by Sassafras Software, based in New Hampshire USA. • Sassafras Software is a pioneer in SAM since 21 years • K2 is deployed in USA, Europe, Japan and Australia • K2 is deployed in over 2+ Million client computers 4
  • 5. Customers • Adobe Systems • Apple Computer • Microsoft Corporation • IBM • British Broadcasting Corporation • General Motors • Toyota Corporation • NASA • Stanford • University of California • MIT • University of Michigan • …. 5
  • 6. Software Asset Management (SAM). Why? • Reduce your software costs. Procurement, support, upgrades, … • Increase employee productivity • Eliminate business and financial risks • Comply with vendor software license agreements 6
  • 7. SAM: A key to reducing costs and improving productivity “Companies over spend by 15% to 20% on software licenses” – Gartner Group “Companies routinely spend 10% to 20% of their software budgets on updates and support services they may not even need” – Gartner Group “Companies can save between 10% to 30% of their annual software costs by implementing a good software asset and license management solution” 7
  • 8. K2 Components Client–Server Architecture • KeyServer – Server process • KeyAccess – Client agent, which runs on desktops, laptops, and servers • KeyConfigure – Management console • KeyReporter – Web based reports 8
  • 9. Architecture Server Clients KeyAccess KeyServer KeyAccess KeyConfigure 9
  • 10. Purchase tracking and reconciliation • Software Purchase Records and Histories • Contract and Purchase Document Storage • External Purchase Data Importing • Calculation of Current Entitlement Position • Automated Reconciliation of Entitlements against Management Policies • Purchase data can be imported in XML format from other procurement systems • Can be tightly integrated with other procurement systems 10
  • 11. Software product and Hardware discovery • K2 agent discovers software products and hardware configuration details • Automatic product identification, filtering and classification • Online product identification database • Program version identification and control • Manage physical and virtual instances • Extensive audit reports 11
  • 12. Application Usage • K2 can measure usage of any discovered software product • Provides comprehensive and accurate view of software usage • Making incorrect assumptions of usage can be a costly mistake. • Extensive usage reports 12
  • 13. License Management • Define flexible usage policies to control access to any software product • Node locked, floating/concurrent use, site and leased licenses • License compliance is an ongoing process, enforce compliance • Security. Blackout selected software usage 13
  • 14. Complete Software Asset Life Cycle 5. Optimize Software 1. Procurement Assets 2. Discover Software/Hardware 4. Enforce License Policy 3. Monitor Usage Maintain Compliance Reconcile Achieve Compliance 14
  • 15. Will K2 affect the network and end users? • The presence of the K2 is invisible to the end users regardless of network size. Good citizen • A typical K2 client will generate less than 30 Kbytes of traffic over the course of an eight-hour workday. • Largest installation of 50K+ clients • The K2 components run silently and require little or no administration 15
  • 16. K2 Reports • Built-in report templates can produce hundreds of detailed and summary reports • Web based reports and scheduling • Direct support for customized external reports 16
  • 17. Integration • Flexible IT Data Integration • Authenticate with common third party tools Active Directory, LDAP, Kerberos, others… • Data easily accessible through open standards • Help desk, Procurement, Service desk, Service call management etc. 17
  • 18. System Requirements • No server grade OS or hardware required. • No database or third party back-end tools required • One server process supports tens of thousands of clients. • Server o Windows 7, Vista, NT, 2008, 2000, 2003, XP o Mac OS 7.5 to OS X 10.5 o NetWare 4.2 - 6.5 o Linux 2.2 and higher • Client o Windows 95, 98, NT, 2000, 2003, XP, Vista, Win 7 o WTS (thin-client): NT 4, 2000, 2003, Citrix 1.7 o Mac OS 7.5 to OS X 10.5 o Linux 2.2 and higher o Solaris 9 and higher o Support for virtual clients 18
  • 19. Licensing • K2 is configured and priced by the number of computers and thin client sessions that will be managed. • The per-client price varies with the size of the installation. • License is perpetual. • Technical support is free for life of the product. • Upgrades are additional (and optional). 19
  • 20. Thank You 20