SlideShare a Scribd company logo
FEATURE | SOFTWARE MANAGEMENT 
4 STEPS TO SUCCESSFUL 
SOFTWARE MANAGEMENT 
A comprehensive approach is essential to mitigate the risks and optimize the rewards of modern 
software environments. 
Software has become a critical element of 
just about any organization’s operations and one 
of the most important investments a modern 
organization can make. It runs core systems, 
stores and protects sensitive data and ensures 
that hardware operates effectively. But a host 
of factors that includes virtualization, cloud 
computing, and the growing complexity of 
today’s applications have made managing this 
vital resource more challenging than ever. 
4 
To learn how SAM can play a critical role in helping 
to manage and secure your software, check out 
our webinar at CDW.com/SAMwebinar.
43% 
OF THE SOFTWARE 
INSTALLED ON 
PERSONAL COMPUTERS 
GLOBALLY IN 2013 
WAS NOT 
PROPERLY 
LICENSED. 
Source: BSA, The Software Alliance Global Software Survey, 
5 
Examples such as these show why a 
holistic approach to managing software 
resources is becoming a necessity. 
Fortunately, help is available. Outside 
experts can help IT departments 
develop a strategy for comprehensive 
software management. The best options 
devise a strategic software plan to fully 
capitalize on all the benefits of modern 
applications, operating systems and 
middleware, while mitigating risks 
associated with improper licensing 
and unmanaged purchasing. 
For example, CDW’s Total Software 
Management (TSM) service deploys 
teams of technical experts that 
support organizations in a range 
of important areas. TSM teams: 
• Assess how effectively an 
organization’s software resources 
are in supporting the overall 
goals of the organization and 
find ways to enhance value 
• Provide in-depth information to 
help with new product selections 
• Identify and validate licensing 
model choices that help save the 
organization money by right-sizing 
licenses to avoid noncompliance 
fees or overspending for seats 
• Aid in deployments of software 
updates and new products, 
while educating the IT staff 
and users about how to get 
the most out of technology 
• Support long-term software 
management activities with 
regular infrastructure reviews 
and “health checks” 
“In short, we educate, evaluate 
and evolve our customers,” says 
Phillip Pollicove, CDW’s regional 
manager for the Northeast Software 
Practice and part of the TSM team. 
Guiding all of these activities is a 
unique strategic roadmap that TSM 
advisers develop by working closely 
with each organization to produce 
the biggest returns on software 
investments. “Unlike other software 
management advisers that may 
Consider these scenarios: 
1. In June, a Denver-based construction 
firm that specializes in the energy 
industry agreed to pay nearly 
$115,000 to settle legal claims that it 
used unlicensed copies of Microsoft 
software, according to BSA | The 
Software Alliance, an industry trade 
group. As part of the settlement, 
the company also agreed to meet 
foundational principles of proper 
software asset management (SAM). 
2. Industry sources say that soon after 
some IT departments roll out new 
applications to meet organizational 
needs, the solutions become a 
source of frustration rather than 
support for end users. The problem: 
inadequate training during the 
deployment leaves stakeholders 
confused about important features 
that should help users to become 
more productive on the job. 
3. Some applications never reach 
the deployment stage. Experts 
say that when organizations fail to 
develop a comprehensive software 
implementation strategy, specialized 
applications may often be purchased 
to satisfy a new operational 
requirement but ultimately just add 
to a pile of expensive shelfware 
— programs that don’t move into 
production systems and thus never 
deliver a return on the investment. 
4. Prompted by end-of-support 
deadlines and the chance to 
capitalize on a host of new features, 
a number of IT departments are 
upgrading legacy operating systems 
to newer versions. But because 
of poor change management 
processes, the IT staff doesn’t take 
advantage of modern tools, such as 
automated scripting routines, and 
instead follows traditional manual 
practices when pushing out security 
patches and other updates. The 
result: a lost opportunity to relieve 
technicians of routine tasks and free 
them up for more strategic activities. 
CDW.com/sam | 800.800.4239 
reflect a single vendor’s view, the TSM 
approach provides a holistic view of 
each client’s software options,” says 
Jaime Waterfield, senior manager of 
software services at CDW and another 
TSM team member. “TSM offers an 
ongoing relationship with customers to 
June 2014 
help them manage the entire software 
lifecycle, including advice about the 
servers and other hardware that will be 
needed to best support the software.” 
Organizations looking for the right 
comprehensive software management 
solution should analyze a potential 
service provider’s expertise in four 
key stages: assessment, validation, 
deployment and ongoing management.
FEATURE | SOFTWARE MANAGEMENT 
6 
Assessment tools can help the discovery phase. For 
example, CDW’s SAM solution gathers relevant information 
about applications running on every networked device 
within an organization. “With this data in hand, the customer 
is better informed when speaking with a software vendor,” 
Pollicove explains. “It knows exactly what programs are 
running in production systems and require full compliance 
versus those being used by the development staff, which 
just stands up a program, tests it and then brings it down.” 
Remote auditing capabilities within the SAM solution 
help the TSM team identify necessary updates over time. 
With the complexity of today’s software, it’s not enough 
simply to take a headcount of each program. Organizations 
also need advisers who understand the differences in 
licensing models and other nuances in all major platforms. 
For example, Microsoft offers the True-Up option for 
enterprise-class agreements within organizations. With 
True-Up, IT managers don’t have to cut a purchase order 
every time an additional person starts using software 
covered by the agreement. Instead, at the end of the 
contract year, the organization pays a lump sum for the 
number of seats required to bring it into compliance. 
Vendors such as Adobe, Microsoft, Symantec and VMware 
offer other types of licensing options, such as product suites 
that cost significantly less than if purchased as individual 
components. 
STEP 2 
VALIDATION: A REALITY CHECK FOR ROI 
Validation is essential for narrowing the choices of 
software outlined in the strategic plan and then picking 
the specific solutions that will deliver concrete benefits. 
This key step requires strategy briefings to map out the 
organization’s technology requirements. “The reality is 
that most companies rely on multiple software vendors, 
and sometimes, the best solution consists of applications 
from a mix of different vendors,” Waterfield says. “CDW 
works to keep the customer’s best interest in mind at all 
times by taking a vendor-agnostic approach. Customers 
see the full choice of vendors and learn about the pros and 
cons of those various choices in an unbiased way. We can 
compare features, different pricing models and the hardware 
requirements for each choice, all from a solution perspective.” 
In some cases, a proof of concept is called for to ensure 
that solutions outlined in the strategic software plan 
deliver the expected benefits. This test can also identify 
any incompatibilities or integration problems that may 
arise among legacy software and new implementations. “A 
proof of concept is especially important before a customer 
STEP 1 
ASSESS FOR SUCCESS 
Assessments focus on an organization’s existing software 
environment to determine what programs are already 
running, whether they’re being used effectively and how 
accurately prevailing licensing contracts reflect actual usage. 
“Software audits determine how much of what’s running 
is authorized by the IT department and how much is 
unauthorized so you can enforce policies to get compliance 
under control,” says Rob Enderle, principal analyst at the 
Enderle Group, an independent consulting firm. “Until you do a 
sample inventory, you don’t know how bad the problem is.” 
Hiring an outside consulting firm can help organizations 
avoid common stumbling blocks, he adds. “The challenge is to 
institutionalize the knowledge when you have somebody else 
do the assessment,” Enderle notes. “A best practice when you 
bring in a third party is to have your own team work alongside it.” 
To ensure success, advisers should offer extensive 
experience with major software platforms, such as those from 
Adobe, IBM, Microsoft, Oracle, Red Hat, Symantec and VMware. 
Organizations should then schedule in-depth discussions 
with outside advisers, operations managers and IT stakeholders 
to develop an overarching strategic software plan to determine 
what additional resources are needed to support operational 
goals. This strategic plan will become a guide for helping the 
organization use software to achieve its long-term objectives. 
But first, outside specialists should help an organization 
understand the software it’s already running. The gain is 
full visibility. The TSM team brings together inside account 
representatives along with account managers, licensing 
experts and technical product specialists who make onsite 
visits to customers. “This collaborative approach ensures 
that everyone understands where the customer wants 
to be and how they want to get there,” Pollicove says. 
AIM FOR 
FULL VISIBILITY
7 
departments might be able to free up 
one or two employees who normally 
perform all these manual tasks to do 
more strategic activities,” Sommer says. 
“Implementing automation software can 
be like hiring one or two more people, 
except the software is much cheaper 
than paying salaries year after year.” 
The combined impact of virtualization 
and personnel optimizations can 
reduce the time it takes organizations 
to deliver new services and products, 
which further enhance the ROI of 
software investments. “We encourage 
organizations to put a dollar value on 
what it means to launch a new web app 
in a day versus the competition taking 
30 days to deploy something similar,” 
Sommer says. “Once the organization 
quantifies what that speed means, it 
can roll that into an ROI analysis.” 
Finally, an ROI analysis helps to 
identify the right licensing model for 
a particular application. In addition to 
standard enterprise-class licenses, 
some vendors offer other choices. For 
example, VMware offers its Enterprise 
Purchasing Program (EPP), which lets 
organizations purchase VMware tokens 
that can be redeemed for licenses and 
associated support and subscription 
resources. “If you really like a new virtual 
storage area network that VMware 
just released, you can apply tokens to 
this or any other VMware software 
that’s needed,” Sommer explains. 
STEP 3 
DEPLOYMENT WITHOUT 
DRAMA 
To ensure successful deployments 
of new software and maximize the 
value of the technology, CDW’s TSM 
team can work remotely or onsite with 
organizations. “The most important 
step in the deployment stage is the 
first conversation we have with a 
client after the contract has been 
signed and the organization now 
owns the software,” says Pollicove. 
By having this discussion, the TSM 
team helps organizations get the most 
out of their software investments. For 
example, when an organization buys an 
enterprise-class license from Microsoft, 
it receives a number of ancillary benefits, 
such as discounts for other products. 
Additionally, the contract may offer 
vouchers for free web-based training 
to help end users understand how to 
use new features in the software or 
to offset the costs of sending IT staff 
members for training to learn how to 
maintain servers more effectively. 
“The TSM team makes sure the 
customer understands how to activate 
these benefits and fully realize what 
comes with the agreement, beyond just 
the software itself,” Pollicove explains. 
Then, drawing from the goals outlined 
in the software strategy, the TSM team 
works with customers to create a 
complete implementation plan to quickly 
get the solution running in the existing 
IT environment. The plan considers a 
wide range of factors, including the 
customer’s budget for launching software 
and related hardware and the necessary 
timeline. For example, a new application 
at a retailer may need to be spun up 
before the crush of holiday sales. 
“Software on its own isn’t going 
to help an organization. It must be 
configured correctly to an organization’s 
individual needs and integrated into 
actually purchases a solution. They 
want to be sure the technology is going 
to work as expected in a particular 
operational process,” Waterfield says. 
“We will stand up a test environment 
using the customer’s hardware, or 
sometimes cloud services, so they 
can get that hands-on validation.” 
Also important is a return-on-investment 
(ROI) analysis to validate 
investments and choices about 
licensing models. For example, an 
organization might evaluate whether 
Microsoft Office 365 or Google Apps for 
Business will offer the greatest benefit. 
“Customers may be deciding between 
two vendors or between a cloud and an 
on-premises solution,” Waterfield says. 
“An ROI assessment helps our teams 
demonstrate the impact of each choice.” 
ROI assessments also help to validate 
the impact of important trends, such 
as server virtualization. For example, 
many IT departments manage stable 
or even shrinking budgets, while 
demands for services continue to rise. 
With virtualization, organizations can 
consolidate the workloads of 10 physical 
servers into one unit. “IT managers 
avoid hardware and related costs every 
time they deploy a virtual server,” says 
Tim Sommer, senior systems engineer 
for enterprise accounts at VMware. 
Applications that automate routine 
IT management and maintenance 
tasks offer added ROI benefits. “IT 
CDW.com/sam | 800.800.4239 
WE ENCOURAGE ORGANIZATIONS TO PUT 
A DOLLAR VALUE ON WHAT IT MEANS TO 
LAUNCH A NEW WEB APP IN A DAY VERSUS 
THE COMPETITION TAKING 30 DAYS TO DEPLOY 
SOMETHING SIMILAR. 
— Tim Sommer, 
Senior Systems Engineer for Enterprise Accounts, 
VMware
FEATURE | SOFTWARE MANAGEMENT 
the existing environment,” Waterfield 
says. “The chances are high that we’ve 
already completed hundreds, if not 
thousands, of projects involving the 
particular software that a customer 
wants to deploy. That gives the TSM 
team insights into the likely hurdles that 
may be encountered, as well as the pros 
and cons of the different approaches 
that can help ensure success.” 
By closely linking the validation 
process with deployment activities, an 
organization can mitigate the chances of 
creating any new shelfware that wastes 
money and hampers productivity. 
The plan also outlines how best to 
integrate the new resources into existing 
workflows and the training that will be 
required to help end users quickly become 
productive with new technology. For 
example, if the project is an upgrade 
to the server operating system used 
throughout a data center, TSM technicians 
can help the IT staff become familiar 
with the latest features and utilities. 
“Knowledge transfer is an important 
aspect of the deployment process,” 
says Pollicove. “The last thing an IT 
department needs is for a partner to do 
an installation by itself and then have the 
internal staff step in at the last minute. 
If they are not involved throughout the 
entire deployment in a complete team 
approach, bad things can happen.” 
The TSM staff creates a detailed 
record of each configuration step for 
the customer’s IT staff. “This ensures 
that customers aren’t dependent 
on our help every time they want to 
change something,” Waterfield says. 
STEP 4 
MANAGE FOR 
LONG-TERM VALUE 
Total software management doesn’t 
end once an organization deploys 
new technology. CDW’s TSM staff 
maintains close contact with each 
client to help them meet the terms 
8 
of licensing contracts, reduce the 
burden of compliance responsibilities 
and ensure that the software is 
delivering the expected benefits. 
TSM members also perform regular 
health checks — an important service 
that ensures software solutions run 
optimally long after the initial launch. 
To achieve these results, an 
organization’s IT managers team 
up with the TSM staff for quarterly 
reviews. TSM members also update 
IT managers about any revisions to 
the software they own, track any 
applications that were purchased but 
have yet to be deployed and then show 
anything that’s not in compliance with 
prevailing licensing agreements. 
“The management stage is a continuing 
process designed to help customers get 
the most value out of their software 
agreements,” Pollicove says. 
The TSM staff also routinely schedules 
meetings with clients several months 
before an application is up for renewal. 
“We spend some time letting clients 
know what’s coming in any announced 
software releases that are related to 
what they’re already using or their 
latest goals,” says Waterfield. 
Similarly, the TSM team may discuss 
the differences between software 
versions, such as Microsoft Office 
2013 and Office 365. “Once clients 
completely understand what’s in each 
version, they can more easily decide 
why they may want to purchase a 
newer product,” Pollicove explains. “Or 
maybe they decide to just renew what 
they already have because there’s 
no need to switch versions. The TSM 
team focuses on what’s in the best 
interest of the organization. It’s a full, 
solution-oriented approach as opposed 
to looking at just an individual order.” 
In addition to these discussions, TSM 
experts also encourage annual health 
checks for the organization’s software 
operations. “Once software is in place, 
that doesn’t mean the IT environment 
or organizational requirements stop 
evolving,” says Waterfield. “New 
variables are always being introduced 
that impact the performance of the 
software, which means an organization 
may no longer be running the 
applications in a way that gives them 
the full return on their investment.” 
Health checks make sure that all 
of the software resources are still 
achieving the performance goals 
outlined in the deployment plan. “We 
look at health checks as preventive 
care. We identify any potential risks and 
problems before they become costly 
and unmanageable,” says Waterfield. 
TSM members run script files 
throughout the organization’s IT 
environment to uncover latency issues 
and find system configurations that 
aren’t up to standards. The scripts also 
look for software that may be used 
only infrequently or not at all because 
of changes to the organization. 
The checkups typically occur annually, 
unless an upgrade or new technology 
is slated for implementation and will 
alter the existing environment. “Any 
time something new is being introduced 
into a customer’s operations, we would 
recommend the health check,” says 
Waterfield. “It could mean significant 
problems for an organization if it connects 
a new system to an existing resource 
that’s not working the way it should.” 
A Winning Value Proposition 
Managing today’s quickly evolving 
software environments can be 
challenging and risky even when 
organizations have a formal plan in place. 
But with a comprehensive software 
strategy that formalizes every step from 
assessment to on-going management, 
it becomes far easier to avoid the costly 
consequences of noncompliant and poorly 
utilized programs as they optimize the 
value of their technology investments.

More Related Content

What's hot

P g 0 0 0 4 m a y 0 6 , 2 0 1 1
 P g 0   0 0 4                 m a y  0 6 ,  2 0 1 1   P g 0   0 0 4                 m a y  0 6 ,  2 0 1 1
P g 0 0 0 4 m a y 0 6 , 2 0 1 1
jasmin849794
 
Improve success DevOps
Improve success DevOpsImprove success DevOps
Improve success DevOps
Abhishek Sood
 
infox technologies
infox technologiesinfox technologies
infox technologies
fidharash
 
Select collaboration platform
Select collaboration platformSelect collaboration platform
Select collaboration platform
Info-Tech Research Group
 
Enterprise Mobile Strategy
Enterprise Mobile StrategyEnterprise Mobile Strategy
Enterprise Mobile StrategyDMIMarketing
 
Build_Buy_StreamAnalytix_WhitePaper
Build_Buy_StreamAnalytix_WhitePaperBuild_Buy_StreamAnalytix_WhitePaper
Build_Buy_StreamAnalytix_WhitePaperJane Roberts
 
Review the five signs that you need a new Segregation of Duties compliance st...
Review the five signs that you need a new Segregation of Duties compliance st...Review the five signs that you need a new Segregation of Duties compliance st...
Review the five signs that you need a new Segregation of Duties compliance st...
Symmetry™
 
Software modernization
Software modernizationSoftware modernization
Software modernization
Jean-Christophe HUC (Jay C)
 
Deloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtDeloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical Debt
CAST
 
UCMDB _Predictive Change Impact Analysis circa 2009
UCMDB _Predictive Change Impact Analysis circa 2009UCMDB _Predictive Change Impact Analysis circa 2009
UCMDB _Predictive Change Impact Analysis circa 2009djasso7494
 
JAD Workshops
JAD WorkshopsJAD Workshops
JAD Workshops
hapy
 
A Guide to Hybrid ERP Solutions
A Guide to Hybrid ERP SolutionsA Guide to Hybrid ERP Solutions
A Guide to Hybrid ERP Solutions
BurCom Consulting Ltd.
 
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
CAST
 
Mobile tsunami a threath to competitiveness for companies
Mobile tsunami a threath to competitiveness for companiesMobile tsunami a threath to competitiveness for companies
Mobile tsunami a threath to competitiveness for companies
Jan Vermeesch
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear LLC
 
More than Code: Contributions in Scrum Software Engineering Teams
More than Code: Contributions in Scrum Software Engineering TeamsMore than Code: Contributions in Scrum Software Engineering Teams
More than Code: Contributions in Scrum Software Engineering Teams
Christoph Matthies
 
Kick-Starting Digital Transformation: Four IT Strategies
Kick-Starting Digital Transformation: Four IT StrategiesKick-Starting Digital Transformation: Four IT Strategies
Kick-Starting Digital Transformation: Four IT Strategies
Cognizant
 
Cio software testing_survey
Cio software testing_surveyCio software testing_survey
Cio software testing_survey
Transition Consulting Limited, India
 
Enterprise Architecture in the Boardroom with Dragon1
Enterprise Architecture in the Boardroom with Dragon1Enterprise Architecture in the Boardroom with Dragon1
Enterprise Architecture in the Boardroom with Dragon1
Dragon1 Inc.
 

What's hot (20)

P g 0 0 0 4 m a y 0 6 , 2 0 1 1
 P g 0   0 0 4                 m a y  0 6 ,  2 0 1 1   P g 0   0 0 4                 m a y  0 6 ,  2 0 1 1
P g 0 0 0 4 m a y 0 6 , 2 0 1 1
 
Improve success DevOps
Improve success DevOpsImprove success DevOps
Improve success DevOps
 
infox technologies
infox technologiesinfox technologies
infox technologies
 
Select collaboration platform
Select collaboration platformSelect collaboration platform
Select collaboration platform
 
Enterprise Mobile Strategy
Enterprise Mobile StrategyEnterprise Mobile Strategy
Enterprise Mobile Strategy
 
Build_Buy_StreamAnalytix_WhitePaper
Build_Buy_StreamAnalytix_WhitePaperBuild_Buy_StreamAnalytix_WhitePaper
Build_Buy_StreamAnalytix_WhitePaper
 
Review the five signs that you need a new Segregation of Duties compliance st...
Review the five signs that you need a new Segregation of Duties compliance st...Review the five signs that you need a new Segregation of Duties compliance st...
Review the five signs that you need a new Segregation of Duties compliance st...
 
Software modernization
Software modernizationSoftware modernization
Software modernization
 
Deloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtDeloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical Debt
 
UCMDB _Predictive Change Impact Analysis circa 2009
UCMDB _Predictive Change Impact Analysis circa 2009UCMDB _Predictive Change Impact Analysis circa 2009
UCMDB _Predictive Change Impact Analysis circa 2009
 
JAD Workshops
JAD WorkshopsJAD Workshops
JAD Workshops
 
A Guide to Hybrid ERP Solutions
A Guide to Hybrid ERP SolutionsA Guide to Hybrid ERP Solutions
A Guide to Hybrid ERP Solutions
 
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
 
Mobile tsunami a threath to competitiveness for companies
Mobile tsunami a threath to competitiveness for companiesMobile tsunami a threath to competitiveness for companies
Mobile tsunami a threath to competitiveness for companies
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
More than Code: Contributions in Scrum Software Engineering Teams
More than Code: Contributions in Scrum Software Engineering TeamsMore than Code: Contributions in Scrum Software Engineering Teams
More than Code: Contributions in Scrum Software Engineering Teams
 
Build vs buy
Build vs buyBuild vs buy
Build vs buy
 
Kick-Starting Digital Transformation: Four IT Strategies
Kick-Starting Digital Transformation: Four IT StrategiesKick-Starting Digital Transformation: Four IT Strategies
Kick-Starting Digital Transformation: Four IT Strategies
 
Cio software testing_survey
Cio software testing_surveyCio software testing_survey
Cio software testing_survey
 
Enterprise Architecture in the Boardroom with Dragon1
Enterprise Architecture in the Boardroom with Dragon1Enterprise Architecture in the Boardroom with Dragon1
Enterprise Architecture in the Boardroom with Dragon1
 

Similar to Software Management

Moving up the Software License Optimization Maturity Curve to Drive Business ...
Moving up the Software License Optimization Maturity Curve to Drive Business ...Moving up the Software License Optimization Maturity Curve to Drive Business ...
Moving up the Software License Optimization Maturity Curve to Drive Business ...
Flexera
 
An Ultimate Guide To Custom Software Development
An Ultimate Guide To Custom Software DevelopmentAn Ultimate Guide To Custom Software Development
An Ultimate Guide To Custom Software Development
Vrinsoft Technology
 
EY Software Asset Management Advisory
EY Software Asset Management AdvisoryEY Software Asset Management Advisory
EY Software Asset Management Advisory
Mohit Madan
 
Finance :: Insurance Software Solutions - Build or Buy
Finance :: Insurance Software Solutions - Build or BuyFinance :: Insurance Software Solutions - Build or Buy
Finance :: Insurance Software Solutions - Build or Buy
torpidpenitenti59
 
Understanding True CRM Costs before Implementing an Enterprise Solution
Understanding True CRM Costs before Implementing an Enterprise SolutionUnderstanding True CRM Costs before Implementing an Enterprise Solution
Understanding True CRM Costs before Implementing an Enterprise Solutionwilliamsjohnseoexperts
 
How to Choose an Agency Management System
How to Choose an Agency Management SystemHow to Choose an Agency Management System
How to Choose an Agency Management System
Strategic Insurance Software
 
10 things you need to know before buying manufacturing software
10 things you need to know before buying manufacturing software10 things you need to know before buying manufacturing software
10 things you need to know before buying manufacturing software
MRPeasy
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
HCLSoftware
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
HCLSoftware
 
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxWeek 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
helzerpatrina
 
Top Software panies to Outsource.pdfTesting Com
Top Software panies to Outsource.pdfTesting ComTop Software panies to Outsource.pdfTesting Com
Top Software panies to Outsource.pdfTesting Com
Mindfire LLC
 
Enterprise Software Implementation
Enterprise Software ImplementationEnterprise Software Implementation
Enterprise Software Implementation
brh184
 
EHS Software Buyer Checklist
EHS Software Buyer ChecklistEHS Software Buyer Checklist
EHS Software Buyer ChecklistAnita Amelia
 
Major benefits of software outsourcing and best ways to find remote software ...
Major benefits of software outsourcing and best ways to find remote software ...Major benefits of software outsourcing and best ways to find remote software ...
Major benefits of software outsourcing and best ways to find remote software ...
CodeRiders
 
Software Licensing & Compliance: Two Strategies, One Goal
Software Licensing & Compliance: Two Strategies, One GoalSoftware Licensing & Compliance: Two Strategies, One Goal
Software Licensing & Compliance: Two Strategies, One Goal
Jeff Gustafson
 
Improving Speed to Market in E-commerce
Improving Speed to Market in E-commerceImproving Speed to Market in E-commerce
Improving Speed to Market in E-commerce
Cognizant
 
Build Or Subscribe For Spm 3
Build Or Subscribe For Spm  3Build Or Subscribe For Spm  3
Build Or Subscribe For Spm 3
pstakenas
 
Outsourcing Life Cycle: Assessment / Business Case
Outsourcing Life Cycle: Assessment / Business CaseOutsourcing Life Cycle: Assessment / Business Case
Outsourcing Life Cycle: Assessment / Business CaseAltoros
 

Similar to Software Management (20)

Moving up the Software License Optimization Maturity Curve to Drive Business ...
Moving up the Software License Optimization Maturity Curve to Drive Business ...Moving up the Software License Optimization Maturity Curve to Drive Business ...
Moving up the Software License Optimization Maturity Curve to Drive Business ...
 
An Ultimate Guide To Custom Software Development
An Ultimate Guide To Custom Software DevelopmentAn Ultimate Guide To Custom Software Development
An Ultimate Guide To Custom Software Development
 
Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
 
EY Software Asset Management Advisory
EY Software Asset Management AdvisoryEY Software Asset Management Advisory
EY Software Asset Management Advisory
 
Finance :: Insurance Software Solutions - Build or Buy
Finance :: Insurance Software Solutions - Build or BuyFinance :: Insurance Software Solutions - Build or Buy
Finance :: Insurance Software Solutions - Build or Buy
 
Understanding True CRM Costs before Implementing an Enterprise Solution
Understanding True CRM Costs before Implementing an Enterprise SolutionUnderstanding True CRM Costs before Implementing an Enterprise Solution
Understanding True CRM Costs before Implementing an Enterprise Solution
 
How to Choose an Agency Management System
How to Choose an Agency Management SystemHow to Choose an Agency Management System
How to Choose an Agency Management System
 
10 things you need to know before buying manufacturing software
10 things you need to know before buying manufacturing software10 things you need to know before buying manufacturing software
10 things you need to know before buying manufacturing software
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxWeek 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
 
Top Software panies to Outsource.pdfTesting Com
Top Software panies to Outsource.pdfTesting ComTop Software panies to Outsource.pdfTesting Com
Top Software panies to Outsource.pdfTesting Com
 
Enterprise Software Implementation
Enterprise Software ImplementationEnterprise Software Implementation
Enterprise Software Implementation
 
EHS Software Buyer Checklist
EHS Software Buyer ChecklistEHS Software Buyer Checklist
EHS Software Buyer Checklist
 
Building a business case for crm upgrade
Building a business case for crm upgradeBuilding a business case for crm upgrade
Building a business case for crm upgrade
 
Major benefits of software outsourcing and best ways to find remote software ...
Major benefits of software outsourcing and best ways to find remote software ...Major benefits of software outsourcing and best ways to find remote software ...
Major benefits of software outsourcing and best ways to find remote software ...
 
Software Licensing & Compliance: Two Strategies, One Goal
Software Licensing & Compliance: Two Strategies, One GoalSoftware Licensing & Compliance: Two Strategies, One Goal
Software Licensing & Compliance: Two Strategies, One Goal
 
Improving Speed to Market in E-commerce
Improving Speed to Market in E-commerceImproving Speed to Market in E-commerce
Improving Speed to Market in E-commerce
 
Build Or Subscribe For Spm 3
Build Or Subscribe For Spm  3Build Or Subscribe For Spm  3
Build Or Subscribe For Spm 3
 
Outsourcing Life Cycle: Assessment / Business Case
Outsourcing Life Cycle: Assessment / Business CaseOutsourcing Life Cycle: Assessment / Business Case
Outsourcing Life Cycle: Assessment / Business Case
 

More from Ismail Muhammad

Hybrid IT
Hybrid ITHybrid IT
Hybrid IT
Ismail Muhammad
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
Ismail Muhammad
 
Data Management
Data ManagementData Management
Data Management
Ismail Muhammad
 
Twitter guide
Twitter guideTwitter guide
Twitter guide
Ismail Muhammad
 
Sql Azure Database whitepaper r01
Sql Azure Database whitepaper r01Sql Azure Database whitepaper r01
Sql Azure Database whitepaper r01Ismail Muhammad
 
Introducing Windows Azure
Introducing Windows AzureIntroducing Windows Azure
Introducing Windows Azure
Ismail Muhammad
 
Sql Server 2008 Product Overview
Sql Server 2008 Product OverviewSql Server 2008 Product Overview
Sql Server 2008 Product OverviewIsmail Muhammad
 

More from Ismail Muhammad (7)

Hybrid IT
Hybrid ITHybrid IT
Hybrid IT
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
Data Management
Data ManagementData Management
Data Management
 
Twitter guide
Twitter guideTwitter guide
Twitter guide
 
Sql Azure Database whitepaper r01
Sql Azure Database whitepaper r01Sql Azure Database whitepaper r01
Sql Azure Database whitepaper r01
 
Introducing Windows Azure
Introducing Windows AzureIntroducing Windows Azure
Introducing Windows Azure
 
Sql Server 2008 Product Overview
Sql Server 2008 Product OverviewSql Server 2008 Product Overview
Sql Server 2008 Product Overview
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Software Management

  • 1. FEATURE | SOFTWARE MANAGEMENT 4 STEPS TO SUCCESSFUL SOFTWARE MANAGEMENT A comprehensive approach is essential to mitigate the risks and optimize the rewards of modern software environments. Software has become a critical element of just about any organization’s operations and one of the most important investments a modern organization can make. It runs core systems, stores and protects sensitive data and ensures that hardware operates effectively. But a host of factors that includes virtualization, cloud computing, and the growing complexity of today’s applications have made managing this vital resource more challenging than ever. 4 To learn how SAM can play a critical role in helping to manage and secure your software, check out our webinar at CDW.com/SAMwebinar.
  • 2. 43% OF THE SOFTWARE INSTALLED ON PERSONAL COMPUTERS GLOBALLY IN 2013 WAS NOT PROPERLY LICENSED. Source: BSA, The Software Alliance Global Software Survey, 5 Examples such as these show why a holistic approach to managing software resources is becoming a necessity. Fortunately, help is available. Outside experts can help IT departments develop a strategy for comprehensive software management. The best options devise a strategic software plan to fully capitalize on all the benefits of modern applications, operating systems and middleware, while mitigating risks associated with improper licensing and unmanaged purchasing. For example, CDW’s Total Software Management (TSM) service deploys teams of technical experts that support organizations in a range of important areas. TSM teams: • Assess how effectively an organization’s software resources are in supporting the overall goals of the organization and find ways to enhance value • Provide in-depth information to help with new product selections • Identify and validate licensing model choices that help save the organization money by right-sizing licenses to avoid noncompliance fees or overspending for seats • Aid in deployments of software updates and new products, while educating the IT staff and users about how to get the most out of technology • Support long-term software management activities with regular infrastructure reviews and “health checks” “In short, we educate, evaluate and evolve our customers,” says Phillip Pollicove, CDW’s regional manager for the Northeast Software Practice and part of the TSM team. Guiding all of these activities is a unique strategic roadmap that TSM advisers develop by working closely with each organization to produce the biggest returns on software investments. “Unlike other software management advisers that may Consider these scenarios: 1. In June, a Denver-based construction firm that specializes in the energy industry agreed to pay nearly $115,000 to settle legal claims that it used unlicensed copies of Microsoft software, according to BSA | The Software Alliance, an industry trade group. As part of the settlement, the company also agreed to meet foundational principles of proper software asset management (SAM). 2. Industry sources say that soon after some IT departments roll out new applications to meet organizational needs, the solutions become a source of frustration rather than support for end users. The problem: inadequate training during the deployment leaves stakeholders confused about important features that should help users to become more productive on the job. 3. Some applications never reach the deployment stage. Experts say that when organizations fail to develop a comprehensive software implementation strategy, specialized applications may often be purchased to satisfy a new operational requirement but ultimately just add to a pile of expensive shelfware — programs that don’t move into production systems and thus never deliver a return on the investment. 4. Prompted by end-of-support deadlines and the chance to capitalize on a host of new features, a number of IT departments are upgrading legacy operating systems to newer versions. But because of poor change management processes, the IT staff doesn’t take advantage of modern tools, such as automated scripting routines, and instead follows traditional manual practices when pushing out security patches and other updates. The result: a lost opportunity to relieve technicians of routine tasks and free them up for more strategic activities. CDW.com/sam | 800.800.4239 reflect a single vendor’s view, the TSM approach provides a holistic view of each client’s software options,” says Jaime Waterfield, senior manager of software services at CDW and another TSM team member. “TSM offers an ongoing relationship with customers to June 2014 help them manage the entire software lifecycle, including advice about the servers and other hardware that will be needed to best support the software.” Organizations looking for the right comprehensive software management solution should analyze a potential service provider’s expertise in four key stages: assessment, validation, deployment and ongoing management.
  • 3. FEATURE | SOFTWARE MANAGEMENT 6 Assessment tools can help the discovery phase. For example, CDW’s SAM solution gathers relevant information about applications running on every networked device within an organization. “With this data in hand, the customer is better informed when speaking with a software vendor,” Pollicove explains. “It knows exactly what programs are running in production systems and require full compliance versus those being used by the development staff, which just stands up a program, tests it and then brings it down.” Remote auditing capabilities within the SAM solution help the TSM team identify necessary updates over time. With the complexity of today’s software, it’s not enough simply to take a headcount of each program. Organizations also need advisers who understand the differences in licensing models and other nuances in all major platforms. For example, Microsoft offers the True-Up option for enterprise-class agreements within organizations. With True-Up, IT managers don’t have to cut a purchase order every time an additional person starts using software covered by the agreement. Instead, at the end of the contract year, the organization pays a lump sum for the number of seats required to bring it into compliance. Vendors such as Adobe, Microsoft, Symantec and VMware offer other types of licensing options, such as product suites that cost significantly less than if purchased as individual components. STEP 2 VALIDATION: A REALITY CHECK FOR ROI Validation is essential for narrowing the choices of software outlined in the strategic plan and then picking the specific solutions that will deliver concrete benefits. This key step requires strategy briefings to map out the organization’s technology requirements. “The reality is that most companies rely on multiple software vendors, and sometimes, the best solution consists of applications from a mix of different vendors,” Waterfield says. “CDW works to keep the customer’s best interest in mind at all times by taking a vendor-agnostic approach. Customers see the full choice of vendors and learn about the pros and cons of those various choices in an unbiased way. We can compare features, different pricing models and the hardware requirements for each choice, all from a solution perspective.” In some cases, a proof of concept is called for to ensure that solutions outlined in the strategic software plan deliver the expected benefits. This test can also identify any incompatibilities or integration problems that may arise among legacy software and new implementations. “A proof of concept is especially important before a customer STEP 1 ASSESS FOR SUCCESS Assessments focus on an organization’s existing software environment to determine what programs are already running, whether they’re being used effectively and how accurately prevailing licensing contracts reflect actual usage. “Software audits determine how much of what’s running is authorized by the IT department and how much is unauthorized so you can enforce policies to get compliance under control,” says Rob Enderle, principal analyst at the Enderle Group, an independent consulting firm. “Until you do a sample inventory, you don’t know how bad the problem is.” Hiring an outside consulting firm can help organizations avoid common stumbling blocks, he adds. “The challenge is to institutionalize the knowledge when you have somebody else do the assessment,” Enderle notes. “A best practice when you bring in a third party is to have your own team work alongside it.” To ensure success, advisers should offer extensive experience with major software platforms, such as those from Adobe, IBM, Microsoft, Oracle, Red Hat, Symantec and VMware. Organizations should then schedule in-depth discussions with outside advisers, operations managers and IT stakeholders to develop an overarching strategic software plan to determine what additional resources are needed to support operational goals. This strategic plan will become a guide for helping the organization use software to achieve its long-term objectives. But first, outside specialists should help an organization understand the software it’s already running. The gain is full visibility. The TSM team brings together inside account representatives along with account managers, licensing experts and technical product specialists who make onsite visits to customers. “This collaborative approach ensures that everyone understands where the customer wants to be and how they want to get there,” Pollicove says. AIM FOR FULL VISIBILITY
  • 4. 7 departments might be able to free up one or two employees who normally perform all these manual tasks to do more strategic activities,” Sommer says. “Implementing automation software can be like hiring one or two more people, except the software is much cheaper than paying salaries year after year.” The combined impact of virtualization and personnel optimizations can reduce the time it takes organizations to deliver new services and products, which further enhance the ROI of software investments. “We encourage organizations to put a dollar value on what it means to launch a new web app in a day versus the competition taking 30 days to deploy something similar,” Sommer says. “Once the organization quantifies what that speed means, it can roll that into an ROI analysis.” Finally, an ROI analysis helps to identify the right licensing model for a particular application. In addition to standard enterprise-class licenses, some vendors offer other choices. For example, VMware offers its Enterprise Purchasing Program (EPP), which lets organizations purchase VMware tokens that can be redeemed for licenses and associated support and subscription resources. “If you really like a new virtual storage area network that VMware just released, you can apply tokens to this or any other VMware software that’s needed,” Sommer explains. STEP 3 DEPLOYMENT WITHOUT DRAMA To ensure successful deployments of new software and maximize the value of the technology, CDW’s TSM team can work remotely or onsite with organizations. “The most important step in the deployment stage is the first conversation we have with a client after the contract has been signed and the organization now owns the software,” says Pollicove. By having this discussion, the TSM team helps organizations get the most out of their software investments. For example, when an organization buys an enterprise-class license from Microsoft, it receives a number of ancillary benefits, such as discounts for other products. Additionally, the contract may offer vouchers for free web-based training to help end users understand how to use new features in the software or to offset the costs of sending IT staff members for training to learn how to maintain servers more effectively. “The TSM team makes sure the customer understands how to activate these benefits and fully realize what comes with the agreement, beyond just the software itself,” Pollicove explains. Then, drawing from the goals outlined in the software strategy, the TSM team works with customers to create a complete implementation plan to quickly get the solution running in the existing IT environment. The plan considers a wide range of factors, including the customer’s budget for launching software and related hardware and the necessary timeline. For example, a new application at a retailer may need to be spun up before the crush of holiday sales. “Software on its own isn’t going to help an organization. It must be configured correctly to an organization’s individual needs and integrated into actually purchases a solution. They want to be sure the technology is going to work as expected in a particular operational process,” Waterfield says. “We will stand up a test environment using the customer’s hardware, or sometimes cloud services, so they can get that hands-on validation.” Also important is a return-on-investment (ROI) analysis to validate investments and choices about licensing models. For example, an organization might evaluate whether Microsoft Office 365 or Google Apps for Business will offer the greatest benefit. “Customers may be deciding between two vendors or between a cloud and an on-premises solution,” Waterfield says. “An ROI assessment helps our teams demonstrate the impact of each choice.” ROI assessments also help to validate the impact of important trends, such as server virtualization. For example, many IT departments manage stable or even shrinking budgets, while demands for services continue to rise. With virtualization, organizations can consolidate the workloads of 10 physical servers into one unit. “IT managers avoid hardware and related costs every time they deploy a virtual server,” says Tim Sommer, senior systems engineer for enterprise accounts at VMware. Applications that automate routine IT management and maintenance tasks offer added ROI benefits. “IT CDW.com/sam | 800.800.4239 WE ENCOURAGE ORGANIZATIONS TO PUT A DOLLAR VALUE ON WHAT IT MEANS TO LAUNCH A NEW WEB APP IN A DAY VERSUS THE COMPETITION TAKING 30 DAYS TO DEPLOY SOMETHING SIMILAR. — Tim Sommer, Senior Systems Engineer for Enterprise Accounts, VMware
  • 5. FEATURE | SOFTWARE MANAGEMENT the existing environment,” Waterfield says. “The chances are high that we’ve already completed hundreds, if not thousands, of projects involving the particular software that a customer wants to deploy. That gives the TSM team insights into the likely hurdles that may be encountered, as well as the pros and cons of the different approaches that can help ensure success.” By closely linking the validation process with deployment activities, an organization can mitigate the chances of creating any new shelfware that wastes money and hampers productivity. The plan also outlines how best to integrate the new resources into existing workflows and the training that will be required to help end users quickly become productive with new technology. For example, if the project is an upgrade to the server operating system used throughout a data center, TSM technicians can help the IT staff become familiar with the latest features and utilities. “Knowledge transfer is an important aspect of the deployment process,” says Pollicove. “The last thing an IT department needs is for a partner to do an installation by itself and then have the internal staff step in at the last minute. If they are not involved throughout the entire deployment in a complete team approach, bad things can happen.” The TSM staff creates a detailed record of each configuration step for the customer’s IT staff. “This ensures that customers aren’t dependent on our help every time they want to change something,” Waterfield says. STEP 4 MANAGE FOR LONG-TERM VALUE Total software management doesn’t end once an organization deploys new technology. CDW’s TSM staff maintains close contact with each client to help them meet the terms 8 of licensing contracts, reduce the burden of compliance responsibilities and ensure that the software is delivering the expected benefits. TSM members also perform regular health checks — an important service that ensures software solutions run optimally long after the initial launch. To achieve these results, an organization’s IT managers team up with the TSM staff for quarterly reviews. TSM members also update IT managers about any revisions to the software they own, track any applications that were purchased but have yet to be deployed and then show anything that’s not in compliance with prevailing licensing agreements. “The management stage is a continuing process designed to help customers get the most value out of their software agreements,” Pollicove says. The TSM staff also routinely schedules meetings with clients several months before an application is up for renewal. “We spend some time letting clients know what’s coming in any announced software releases that are related to what they’re already using or their latest goals,” says Waterfield. Similarly, the TSM team may discuss the differences between software versions, such as Microsoft Office 2013 and Office 365. “Once clients completely understand what’s in each version, they can more easily decide why they may want to purchase a newer product,” Pollicove explains. “Or maybe they decide to just renew what they already have because there’s no need to switch versions. The TSM team focuses on what’s in the best interest of the organization. It’s a full, solution-oriented approach as opposed to looking at just an individual order.” In addition to these discussions, TSM experts also encourage annual health checks for the organization’s software operations. “Once software is in place, that doesn’t mean the IT environment or organizational requirements stop evolving,” says Waterfield. “New variables are always being introduced that impact the performance of the software, which means an organization may no longer be running the applications in a way that gives them the full return on their investment.” Health checks make sure that all of the software resources are still achieving the performance goals outlined in the deployment plan. “We look at health checks as preventive care. We identify any potential risks and problems before they become costly and unmanageable,” says Waterfield. TSM members run script files throughout the organization’s IT environment to uncover latency issues and find system configurations that aren’t up to standards. The scripts also look for software that may be used only infrequently or not at all because of changes to the organization. The checkups typically occur annually, unless an upgrade or new technology is slated for implementation and will alter the existing environment. “Any time something new is being introduced into a customer’s operations, we would recommend the health check,” says Waterfield. “It could mean significant problems for an organization if it connects a new system to an existing resource that’s not working the way it should.” A Winning Value Proposition Managing today’s quickly evolving software environments can be challenging and risky even when organizations have a formal plan in place. But with a comprehensive software strategy that formalizes every step from assessment to on-going management, it becomes far easier to avoid the costly consequences of noncompliant and poorly utilized programs as they optimize the value of their technology investments.