SlideShare a Scribd company logo
1 of 64
Pre-Con Ed: Software Asset
Management: Working in the Trenches
Michel Avenel - Sr. Principal Product Manager - CA Technologies
AMX27E
AGILE MANAGEMENT
3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
© 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2016 presentation is intended for informational purposes only and does not form any type of
warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
INTRODUCTION
LICENSE INVENTORY
Q&A
SOFTWARE INVENTORY
COMPLIANCE
SPECIAL CASES
1
2
3
4
5
6
6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Part 1: Introduction
A Day in the Life of a Software Asset Manager
7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Introduction
SETTING THE STAGE – The CA IT Asset Manager (CA ITAM) - Software Asset Management “A” MODEL
8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Management
 CA ITAM software asset management (SAM) capabilities use an
“Entitlement Centric” approach for Compliance activities.
 Entitlement Centric solutions work differently than Asset
Centric solution to address Software License Management
outcomes:
– Asset Centric Solutions consider desktops or servers to determine
what software is installed and how many licenses required to cover
these installations?
– Entitlement Centric Solutions: consider purchased licenses and
their associated product use rights to determine how to calculate
the number of licenses required cover software usage.
 Auditors focuses on your legal obligations for “documented”
license purchases to ascertain compliance; hence, an
Entitlement Centric approach appropriate.
Asset Centric vs. Entitlement Centric
9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Inventory
 How do I find out what I am licensed for and if there are
restrictions for use of a License?
 How do CA’s SAM capabilities support these activities?
 There are many different ways to procure licenses:
– All procurement methods provide details of your use rights and
restrictions within the documents.
– Extracting this information (data) is addressed through a
combination of review, analysis and reporting of the procurement
documents.
– CA’s SAM capabilities provide the central repository to manage this
information enabling you to identify purchased licenses and their
associated entitlements and restrictions.
License Procurement
10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Inventory
 The next step in identifying License Inventory is to complete Receiving
Inspection activities.
 Receiving inspection is where the procurement data is verified against
the information in the Master Catalog.
– The Master Catalog is the central repository that provides
information required to assist in the correct identification of
licenses purchased.
– The Master Catalog knows what Product Use Rights (PUR’s) are
associated with each License either by referring to the
manufacturer standards or to extended master catalog records that
have been created to reflect specific customer negotiated terms.
– The mapping or reconciliation performed through the receiving
inspection process provides you with an Effective License Inventory
of the Product Use Rights (PUR’s) that are linked to the Licenses.
Receiving Inspection
11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Inventory
 In addition to understanding the provisions of your Licenses, it
is essential to include relevant Contract terms in your analysis.
 These terms are captured through manual Contract review &
analysis to identify relevant information (data elements) and
entry into a central repository.
 CA’s SAM capabilities provide different methods for loading
Contract data:
– Standard import templates for all relevant tables.
– Manual entry can also be performance through the user
interface.
 CA Technologies also provides a Contract Import Template to
facilitate data loads.
Loading Contract Data
12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Inventory
 Once License/Entitlement information has been compiled it should be
loaded into CA ITAM
 CA’s SAM capabilities provide different methods of loading
License/Entitlement data:
– Loading data from reseller or supplier reports can be done for
software titles purchased via these organizations.
– An interface (Connector) can be built into your centralized
procurement system to capture data from within
– Manual entry can also be performance through the user interface.
 CA also provides a Contract Import Template to facilitate data loads.
Loading License Entitlement Data
13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Inventory
 Once the License is recognized from the procurement information, it
is forwarded to the License Clearing function.
 License Clearing captures Product Use Rights, Maintenance Rights,
Language, Version, etc.
 Relevant information is linked to the License purchase and
forwarded to your effective License inventory.
 Once we have our effective License Inventory, we can answer
questions and take action.
Effective License Inventory Actions
14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Software Inventory
 To create a License Balance you must focus not only on your
Licenses but also on software usage.
 Your Software Inventory Manager will load discovery data into CA
ITAM.
 The raw data from your discovery tools must be mapped to
licensable products (using the Master Catalog).
 The result is a Software Inventory showing which products are
installed on which machines or used by which users.
 In an asset centric solution it usually is the last step, you compare
your software installations to your licenses however, this is not the
case for an entitlement centric approach.
 With CA’s SAM solution, Software Inventory is not the last step.
Not Your Last Step
15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Software Inventory
 As previously mentioned, in an Entitlement Centric approach the
Software Inventory is not where License Management ends.
 Entitlement Centric does not need to know what or how many
installations you have, it needs to know how many Licenses you
need to cover the number of installations.
 To enable the Entitlement Centric approach, CA’s SAM capabilities
provide a unique function based on the Master Catalog – Metric
Engines – which facilitates this calculation.
Metric Engines
16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Software Inventory
 A Metric Engine calculates “Effective License Demand” based on the
metric assigned to the license product through data loading and
configuration activities.
 Metric Engines are a set of algorithms and rules built to calculate
Effective Demand by comparing all data entered into the solution to
enable the compliance calculation, including:
– Software Inventory
– Master Data
– Contract Data
– License/Entitlement Data
Effective Demand
17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Software Inventory
 Metric Engines are designed to manage for complex metrics found
in server environments, for example:
– IBM PVU or Oracle CPU metrics that tie to physical attributes of
a device on which the software is installed to calculate
consumption.
– Virtualized Environments
– Citrix Environments
Effective Demand
18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Software Inventory
 Complex algorithms required to calculate these metrics are
contained within the Master Catalog.
 The metrics define the parameters for how to calculate demand:
– IBM WebSphere installations will be detected via the Master
Catalog and the metric in the Master Catalog will control a
calculation for the number of Licenses required to cover the
installation(s).
 This means it is not the installation, but the calculated “demand”
that is compared to the available Licenses during balancing.
 This is identified in the “A” Model.
 Your Software Inventory is used by the metric engine calculation to
create your “Effective Demand.”
Effective Demand
19 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Balancing (Compliance Checks)
 IMPORTANT: Compliance checks are highly dependent on both the
data provided and the quality of the data.
 CA’s SAM capabilities are designed to deliver a “Compliance
Position” even if you are missing data elements.
 It uses a concept of “default data” if key data elements are missing.
 It identifies where “default data” elements are used to enable you
to see and measure the risk associated with your Compliance
Position.
 To mitigate the risk and improve your compliance position
addressing data quality issues is essential.
Data Quality
20 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Balancing (Compliance Checks)
 CA’s SAM solution uses a concept of “Validation Processes” to
improve the quality of the balanced elements.
 If “License Data” is missing at the time you execute a Compliance
Check, you must ensure remaining license records in the License
Clearing / Updating Process have no issues.
 If there is “Usage Data” missing at the time you execute a
Compliance Check, you must ensure Software Recognition function
processes data from source to compliance is transferred and
validated.
Data Quality
21 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Balancing (Compliance Checks)
 License Managers on your Compliance Team are required to review
License Clearing and Software Recognition Processes to identify any
additional data required.
 This is an ongoing (steady-state) activity as data is constantly
updated.
– It is recommended that both processes are reviewed prior to
run each Compliance View.
 Creating and executing an internal remediation process is key to
managing data quality.
 Once data quality issues are resolved, re-running Compliance
Analysis is required.
Data Quality
22 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Balancing (Compliance Checks)
 Senior Management is not necessarily interested in the individual
results of a Compliance Check.
 They are focused on risk and related cost/impact the Compliance
Positions create.
 CA supports the ability to create & understand the financial impact
of a specific Compliance Position.
 BEST PRACTICE:
– It is highly recommended that you include financial data as with
the entitlement information entered into CA’s SAM solution.
– It enables business impact analysis and prioritization.
– Without it you will find it difficult to define the impact of your
position.
Compliance Intelligence
23 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Balancing (Compliance Checks)
 The Compliance Intelligence function uses financial information to
identify impact.
 It is also the function that provides drill down/drill up capabilities
during the analysis of your compliance Position.
 It allows you to drill up and down into:
– Manufacturers and products
– Organizational levels within your organization
 It provides a view into the associated risk and financial impact of
your Compliance Positions.
Compliance Intelligence
24 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Balancing (Compliance Checks)
 Challenges:
– Many people / roles / organizations involved
– Complex, parallel sub-processes (requiring different domain)
– Information exchange / process independent communication
– Labeling / clearing optimization and validation of data
– Marking the work progress of the data
Challenges and Approach
25 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Balancing (Compliance Checks)
 Approach:
– Introduction of status systems
– Data Identification (e.g. validated, in progress, out of scope)
– Display processes step by step:
 Prefix for ordering
 Responsibilities [CA/ASP], [Customer])
– Information Exchange (Review required information provided)
Challenges and Approach
26 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Overview of SAM Roles
License Balance Manager (LBM)
Software Inventory
Administrator (SIA)
License Inventory
Administrator (LIA)
Application Interface Administrator (AIA)
27 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA ITAM’s Software Asset Management Roles
Overview
Coordinator Roles Description
SAM Service Coordinator (SSC) These roles are primarily focused on communication and guidance
to ensure that Role specifications and defined processes are known
and followed. Coordinators support the operative teams in case of
questions or issues and control communication to other teams.
Application Interface Coordinator (AIC)
Software Inventory Coordinator (SIC)
License Inventory Coordinator (LIC)
Operator Roles Description
Corporate License Compliance Manager (CLCM) These are roles that are primarily focused on the actual work on the
data and the compliance checks and analysis within CA SAM.
License Balance Manager (LBM)
Application Interface Administrator (AIA)
Software Inventory Administrator (SIA)
License Inventory Administrator (LIA)
Supporting Roles Description
Hosting Provider (If Applicable) These are roles focused on tasks not usually involved in the actual
asset or license management function, but support these activities
providing related services.
Application Administrator
Data Source Owners (for each data sources)
28 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Overview of SAM Roles
Sign-Off Overview
License Balance
Software Inventory License Inventory
Development of a Compliance View Sign-Off is required in three areas
29 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
How Sign-Off Impact Your Compliance View
Roles Cascade
License Balance Manager: For quality validation, check with corresponding inventory administrator
Inventory Administrator: For qualify validation, check with corresponding coordinator and data provider
Coordinator Roles: Liaison with data source owners to ensure complete & accurate data is received
Data Source Owner: Non-SAM function, but critical content supplier to support SAM outcomes
Inventory Administrator ensures inventory is complete and valid
QUALITY
REPORTS
EXCEPTION
REPORTS /
DELIVERY
REGISTER
The License Balance Manager check data using the balance process
30 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Part 2: License Inventory
A Day in the Life of a Software Asset Manager
31 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Inventory Administrator
 Review License Inventory to ensure it is correctly processed:
– Effective licenses, Update licenses, Inactive licenses (Expired)
– Check Import Pool for failed positions
 Validate:
– Correctness of data:
– Use Rights identified as expected?
– Correct Organization?
– Completeness of data:
– Any item missing?
– All data feeds integrated?
– Check License Transfer and License Pools
Tasks & Responsibilities
If OK:
 Sign-off and set status to validated
If Clarification Required:
 Set status to “In Progress” and
follow-up internally
If Incomplete / Inaccurate Data:
 Provide additional or updated
data, as needed, or
 Contact License Inventory
Coordinator to obtain missing or
updated data (from existing feeds
via connectors)
32 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Inventory Administrator
 If a License Move is required:
– For intra-organizational assignments move according to your use rights.
– For cross-organizational assignments contact the License Inventory Coordinator and License
Ownership Administrator.
 If additional update assignment is required:
– Contact your License Manager or License Inventory Coordinator in order to request assignment.
 All checks should be documented by setting the Statuses for Reporting to the License Balance Manager.
Tasks & Responsibilities
33 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Inventory
 These are the main tasks for a License Inventory Administrator:
 Check if all feeds for the commercial environment are integrated.
 Check receiving inspection.
 Check for update/upgrade licenses.
 Acknowledge Licenses: Set status to “In Progress”.
 Check expired maintenance / subscription licenses.
 Qualification/Sign-Off.
Steps for License Inventory Administrator
34 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Inventory
 Did all license imports run successfully (Management Module)?
 Check receiving inspection for clearing status.
 Check for unassembled update/upgrade licenses.
 Check Effective Licenses for licenses status.
 Check expired maintenance / subscription licenses.
 Check contracts.
 Qualification/Sign-Off.
 If there is an issue, consult with the License Inventory Administrator.
Steps for License Balance Manager
35 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Inventory
 Check the Receiving Inspection for any failed License imports.
 Data stored in the Receiving Inspection is not yet effective.
 Refer to the Commercial Inventory Coordinator for additional information (as needed).
 If additional assistance is required contact the License Inventory Coordinator.
Step 1: License Imports
36 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Inventory
 Existing data feeds and their current processing can be checked within the Data Feed Register:
 For automated License Imports:
– Check for status of the License Imports to ensure they all ran successfully.
– If they did not run successfully, contact your License Inventory Administrator to correct the issue.
– If they all ran successfully, move to the next step.
Step 2: Receiving Inspection
37 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Inventory
 All Licenses not considered “full” Licenses (Updates/Upgrades, Maintenance, Extended Subscription) go to
the Update Pool first and are processed according to the agreed upon rules.
 Data stored in the Update Pool does not impact Effective Balance.
 If additional assistance is required contact the License Inventory Coordinator.
Step 3: Assemble Update/Upgrade Licenses
38 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Inventory
 Check License Status
 Check if related to correct Contract, Addendum or Schedule (which contains actual scope and end dates)
 Search for the expired dates and contact License Inventory Administrator
– For assignment of the current maintenance entitlement
– For versioning of the remaining product
Step 4 & 5: Licenses Statuses & Dates
39 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Inventory
Step 6: Check Contracts
 Check contract status active (validated)
 Check for correct end dates and Maintenance
dates
 Check for correct contract scopes
40 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Inventory
Step 7: Sign-Off
 Go to Licenses > Effective Licenses
 Modify selection according to your needs
(e.g. Data for a certain division or legal entity)
 Use “auto filter” in order to access charts
41 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Part 3: Software Inventory
A Day in the Life of a Software Asset Manager
42 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Software Inventory Administrator
 Review Usage data
– Software Inventory, effective usage
 Validate
– Correctness of data
– Completeness of data
– Demand Calculation
 Check Completeness:
– Source Completeness: check internally
– Import Completeness: check exception reports
– Run Coverage Reports
 All checks must be documented by setting the statuses for
Reporting to the License Balance Manager.
Tasks & Responsibilities
If OK:
 Sign-off and set status to
validated
If Clarification Required:
 Set status to “In Progress”
and follow-up internally
If Incomplete / Inaccurate Data:
 For central data feed contact
the Central Coordinator
 For individual feeds contact
Data Owners
43 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Software Inventory
 These are the main tasks for a Software Inventory Administrator:
 Check if all feeds for the technical environment are integrated.
 Check expected devices versus delivered devices.
 Check orphaned devices.
 Check Signature Coverage Report.
 Acknowledge (new) Software Inventory and set status (In Progress).
 Qualification/Sign-Off.
Steps for Software Inventory Administrator
44 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Software Inventory
 These are the main tasks for a License Balance Manager:
 Did all software imports run successfully (Management Module)?
 Check devices for Device Status.
 Check Signature Coverage and Signature Statuses.
 Check Software Inventory for Inventory status.
 Check Effective Demand calculation.
 Qualification/Sign-Off.
 If there is an issue, consult with the Software Inventory Administrator.
Steps for License Balance Manager
45 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Software Inventory
Step 1: Data Feeds
Existing data feeds and their current processing can be checked within the Data Feed Register.
For automated Software Imports:
 Check for the status of the Software Imports to ensure that they all ran successfully.
– If they did not run successfully, you must contact your Software Inventory Administrator to correct
the issue .
– If they ran successfully then move to the next step.
46 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Software Inventory
Step 2: Check Devices
 Check status if all devices are approved.
– Meaning, device is existing, device attributes (Current CPU Type) and device capacities (MSU and
MIPS) are correct.
 If not, contact the Software Inventory Administrator.
47 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Software Inventory
Step 3: Signature Coverage
Check Signature Coverage Report to ensure all Raw Data is processed and assigned to products correctly:
 Select the appropriate data source and drilldown (summary).
 Check for records with 0 signatures, e.g. data does not lead to Software Inventory >> no risk if nothing in
scope unprocessed.
 Check for “Ineffective“ signatures and their corresponding Status: follow up on data in Status
“[Customer]_review.”
48 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Software Inventory
Step 4: Acknowledge New/Existing Software Inventory
 Check the installations found on the Devices:
 New records have no Status, search for =““.
 New data is to be acknowledged by setting the Status to “In Progress”.
 May be directly approved -Status Validated.
49 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Software Inventory
Step 5: Check Effective Demand and Metrics (1)
 For generic metrics like “Installations“ check if quantity matches.
50 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Software Inventory
Step 5: Check Effective Demand and Metrics (2)
 For calculating, check table metric calculation table to see if missing device attributes or capacities or
default values were taken.
51 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Software Inventory
Step 6: Software Inventory Sign-Off
 Software > Software Inventory > Devices / Accounts.
 Modify selection according to your needs, e.g. Data for
a certain division or legal entity.
 Use “Auto Filter” in order to access charts.
52 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Part 3: Compliance
A Day in the Life of a Software Asset Manager
53 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Balance Manager (LBM)
 Run License Balance / Receive License Balance Report.
 Validate License Inventory and Effective Usage with the responsible Inventory administrators.
 If Product is new in balance: start Validate (Licenses/Usage) and set Status to “In Progress”.
 If data must be improved: consult with responsible Inventory Administrator for appropriate action.
 Follow up with Central Coordinator for central feeds (such as ERP systems).
 If Product has been improved: Review current Status.
 If data is fully correct, sign off and set Status to “Validated”.
Tasks & Responsibilities
54 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
License Balance Manager (LBM)
 For configuration of additional Downgrade Paths contact the License Inventory Coordinator
 For assistance with general balance interpretation contact the License Inventory Coordinator
 License Balance Sign-Off should be managed at the organizational level in focus.
Note: License Balance Manager roles may be delegated per Legal Entity level or groups of Legal Entities (i.e.
Regional License Manager).
Tasks & Responsibilities
55 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Compliance
These are the main tasks for a License Balance Manager:
 Run Balance
 Check effective Sign-Off of License (Commercial) Inventory
 Check effective Sign-Off of Software (Technical) Inventory
 Check Additional Rights:
- Downgrade
- Parallel Usage
- Secondary Copy
- Other
 Qualify/Sign-Off Balance
Steps for License Balance Manager
56 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Compliance
 Run Balance (Compliance View)
 Check the results for unexpected data
Step 1: Run Balance
57 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Compliance
 Analyze the underlying License Inventory data and check Status for validity.
 The Compliance view provides direct access to Licenses (Use rights) and Effective Usage.
Step 2: Sign-Off Effective License Inventory
58 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Compliance
Check Status of Effective
Demand and list
Inventory Data for
validation.
Step 3: Sign-Off Effective Demand
Complete analysis of the underlying Software Inventory.
59 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Compliance
 The License Balance Manager should understand the correct Use Rights.
 The License Balance Manager should ensure that all relevant Use Right information is made available.
 The License Balance Manager should ensure downgrade paths are correctly activated and configured
according to License terms.
 The License Balance Manager is the internal key Role who should be providing all key information for
License Inventory Administration.
Step 4: Validate Additional (& Special) Use Rights
60 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Compliance
Step 4: Effect of Downgrade on Compliance
 Use the table configuration to show “Downgrade Path” and “Downgrade Path Position.”
 Filter for a Downgrade Path you want to check and click “Downgrade Path Position” to sort by this value.
 Within the same Downgrade Path, Position indicates the order in which CA SAM provides un-used licenses to demand not
covered directly.
– In most cases demand is covered by the license at the closest higher position.
 For exceptions check the Downgrade Rights matrix.
61 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Compliance
 Use the table configuration to show “Effective demand (ignored)”.
 Filter for value larger than 0.
 Check the reason by drilling down into the Installations (ignored). There you find the reason why these
installation are ignored calculating the demand.
 In this case, the reason is “Parallel Usage (all members)” meaning all members of this Downgrade Path are
allowed to be installed in parallel resulting in only 1 demand of the highest product within this path.
Step 4: Effect of Parallel Use on Compliance
62 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Compliance
 Set product status to “Validated”
 Can be accomplished in singled or multiple edit mode
Step 5: Balance Sign-Off
63 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
AMX23E CA Software Asset Management - Key Customer Topics 11/15/2016 at 3:30 pm
AMX21S
Case Study: Create Time out of Thin Air - Automate and
Stop Manual Software License Compliance
11/16/2016 at 3:00 pm
AMX122S
Case Study: Taking IT Asset Management to the Next
Level With Process Automation
11/17/2016 at 3:45 pm
64 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must See Demos
Service Desk
and Support
Analyst xFlow
Experience
Software and
Hardware Asset
Management
Request
Management
and Self-service
Management
Insights –
Reporting and
Dashboards
65 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Questions?
66 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Stay connected at communities.ca.com
Thank you.

More Related Content

What's hot

Pre-Con Ed: Upgrading to CA Service Management
Pre-Con Ed: Upgrading to CA Service ManagementPre-Con Ed: Upgrading to CA Service Management
Pre-Con Ed: Upgrading to CA Service ManagementCA Technologies
 
Use Case: Migrating from Terma Jaws to CA Workload Automation iDash
Use Case: Migrating from Terma Jaws to CA Workload Automation iDashUse Case: Migrating from Terma Jaws to CA Workload Automation iDash
Use Case: Migrating from Terma Jaws to CA Workload Automation iDashCA Technologies
 
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...CA Technologies
 
Pre-Con Ed: How to Get the Most out of Your DB2, DB2 Management, and Analytic...
Pre-Con Ed: How to Get the Most out of Your DB2, DB2 Management, and Analytic...Pre-Con Ed: How to Get the Most out of Your DB2, DB2 Management, and Analytic...
Pre-Con Ed: How to Get the Most out of Your DB2, DB2 Management, and Analytic...CA Technologies
 
Introduction to Service Virtualization
Introduction to Service VirtualizationIntroduction to Service Virtualization
Introduction to Service VirtualizationCA Technologies
 
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DBUsing Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DBCA Technologies
 
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2CA Technologies
 
Pre-Con Ed: Building Basic Workflows in CA Service Management
Pre-Con Ed: Building Basic Workflows in CA Service ManagementPre-Con Ed: Building Basic Workflows in CA Service Management
Pre-Con Ed: Building Basic Workflows in CA Service ManagementCA Technologies
 
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...CA Technologies
 
Pre-Con Ed: Building Advanced Workflows in CA Service Management
Pre-Con Ed: Building Advanced Workflows in CA Service ManagementPre-Con Ed: Building Advanced Workflows in CA Service Management
Pre-Con Ed: Building Advanced Workflows in CA Service ManagementCA Technologies
 
Pre-Con Ed: Using SQL to Access Your CA IDMS Databases
Pre-Con Ed: Using SQL to Access Your CA IDMS DatabasesPre-Con Ed: Using SQL to Access Your CA IDMS Databases
Pre-Con Ed: Using SQL to Access Your CA IDMS DatabasesCA Technologies
 
Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...
Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...
Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...CA Technologies
 
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part II
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part IIPre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part II
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part IICA Technologies
 
CA Project & Portfolio Management Resource Management Best Practices
CA Project & Portfolio Management Resource Management Best PracticesCA Project & Portfolio Management Resource Management Best Practices
CA Project & Portfolio Management Resource Management Best PracticesCA Technologies
 
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part IPre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part ICA Technologies
 
Pre-Con Ed: CA Service Management: Building an Awesome Catalog of Services Pe...
Pre-Con Ed: CA Service Management: Building an Awesome Catalog of Services Pe...Pre-Con Ed: CA Service Management: Building an Awesome Catalog of Services Pe...
Pre-Con Ed: CA Service Management: Building an Awesome Catalog of Services Pe...CA Technologies
 
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...CA Technologies
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...CA Technologies
 
Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...
Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...
Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...CA Technologies
 
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4CA Technologies
 

What's hot (20)

Pre-Con Ed: Upgrading to CA Service Management
Pre-Con Ed: Upgrading to CA Service ManagementPre-Con Ed: Upgrading to CA Service Management
Pre-Con Ed: Upgrading to CA Service Management
 
Use Case: Migrating from Terma Jaws to CA Workload Automation iDash
Use Case: Migrating from Terma Jaws to CA Workload Automation iDashUse Case: Migrating from Terma Jaws to CA Workload Automation iDash
Use Case: Migrating from Terma Jaws to CA Workload Automation iDash
 
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
 
Pre-Con Ed: How to Get the Most out of Your DB2, DB2 Management, and Analytic...
Pre-Con Ed: How to Get the Most out of Your DB2, DB2 Management, and Analytic...Pre-Con Ed: How to Get the Most out of Your DB2, DB2 Management, and Analytic...
Pre-Con Ed: How to Get the Most out of Your DB2, DB2 Management, and Analytic...
 
Introduction to Service Virtualization
Introduction to Service VirtualizationIntroduction to Service Virtualization
Introduction to Service Virtualization
 
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DBUsing Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
 
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
 
Pre-Con Ed: Building Basic Workflows in CA Service Management
Pre-Con Ed: Building Basic Workflows in CA Service ManagementPre-Con Ed: Building Basic Workflows in CA Service Management
Pre-Con Ed: Building Basic Workflows in CA Service Management
 
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
Efficiently Manage SLAs using Predictive Analytics with CA Workload Automatio...
 
Pre-Con Ed: Building Advanced Workflows in CA Service Management
Pre-Con Ed: Building Advanced Workflows in CA Service ManagementPre-Con Ed: Building Advanced Workflows in CA Service Management
Pre-Con Ed: Building Advanced Workflows in CA Service Management
 
Pre-Con Ed: Using SQL to Access Your CA IDMS Databases
Pre-Con Ed: Using SQL to Access Your CA IDMS DatabasesPre-Con Ed: Using SQL to Access Your CA IDMS Databases
Pre-Con Ed: Using SQL to Access Your CA IDMS Databases
 
Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...
Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...
Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...
 
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part II
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part IIPre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part II
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part II
 
CA Project & Portfolio Management Resource Management Best Practices
CA Project & Portfolio Management Resource Management Best PracticesCA Project & Portfolio Management Resource Management Best Practices
CA Project & Portfolio Management Resource Management Best Practices
 
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part IPre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
 
Pre-Con Ed: CA Service Management: Building an Awesome Catalog of Services Pe...
Pre-Con Ed: CA Service Management: Building an Awesome Catalog of Services Pe...Pre-Con Ed: CA Service Management: Building an Awesome Catalog of Services Pe...
Pre-Con Ed: CA Service Management: Building an Awesome Catalog of Services Pe...
 
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
 
Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...
Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...
Monitor, Manage and Master! Take Charge of Your SAP and Cross-Enterprise Work...
 
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
 

Viewers also liked

Deloitte SAM-Services - Ein Überblick
Deloitte SAM-Services - Ein ÜberblickDeloitte SAM-Services - Ein Überblick
Deloitte SAM-Services - Ein ÜberblickDeloitte Deutschland
 
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Vision and Roadmap: CA Roadmap for the Continuous Delivery PortfolioVision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Vision and Roadmap: CA Roadmap for the Continuous Delivery PortfolioCA Technologies
 
Software Asset Management (SAM) Best Practice in Action
Software Asset Management (SAM) Best Practice in ActionSoftware Asset Management (SAM) Best Practice in Action
Software Asset Management (SAM) Best Practice in ActionSoftwareONEPresents
 
The NEW Way to Win Friends & Influence People (social media in events)
The NEW Way to Win Friends & Influence People (social media in events)The NEW Way to Win Friends & Influence People (social media in events)
The NEW Way to Win Friends & Influence People (social media in events)Lara McCulloch-Carter
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkVolker Hirsch
 

Viewers also liked (6)

Deloitte SAM-Services - Ein Überblick
Deloitte SAM-Services - Ein ÜberblickDeloitte SAM-Services - Ein Überblick
Deloitte SAM-Services - Ein Überblick
 
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Vision and Roadmap: CA Roadmap for the Continuous Delivery PortfolioVision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
 
Deloitte Brexit Navigator
Deloitte Brexit NavigatorDeloitte Brexit Navigator
Deloitte Brexit Navigator
 
Software Asset Management (SAM) Best Practice in Action
Software Asset Management (SAM) Best Practice in ActionSoftware Asset Management (SAM) Best Practice in Action
Software Asset Management (SAM) Best Practice in Action
 
The NEW Way to Win Friends & Influence People (social media in events)
The NEW Way to Win Friends & Influence People (social media in events)The NEW Way to Win Friends & Influence People (social media in events)
The NEW Way to Win Friends & Influence People (social media in events)
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Similar to Pre-Con Ed: Software Asset Management

Pre-con Education: A Day In The Life Of A Software Asset Manager
Pre-con Education: A Day In The Life Of A Software Asset ManagerPre-con Education: A Day In The Life Of A Software Asset Manager
Pre-con Education: A Day In The Life Of A Software Asset ManagerCA Technologies
 
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070retheauditors
 
Managing Software Entitlements in Software Asset Management Solutions from CA
Managing Software Entitlements in Software Asset Management Solutions from CAManaging Software Entitlements in Software Asset Management Solutions from CA
Managing Software Entitlements in Software Asset Management Solutions from CACA Technologies
 
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...CA Technologies
 
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...CA Technologies
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...CA Technologies
 
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”CA Technologies
 
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancialTim Hinkle
 
Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementCA Technologies
 
The software Visibility Problem
The software Visibility Problem The software Visibility Problem
The software Visibility Problem Jade Global
 
It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?CA Technologies
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management CA Technologies
 
SAM Software Asset Management
SAM Software Asset ManagementSAM Software Asset Management
SAM Software Asset ManagementBearingPoint
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security CA Technologies
 
Strategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset ManagementStrategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset ManagementCA Technologies
 
ServiceNow Utah Release Highlights
ServiceNow Utah Release HighlightsServiceNow Utah Release Highlights
ServiceNow Utah Release HighlightsDa Lin
 
Reinventing Application Performance Testing with Service Virtualization
Reinventing Application Performance Testing with Service VirtualizationReinventing Application Performance Testing with Service Virtualization
Reinventing Application Performance Testing with Service VirtualizationCA Technologies
 

Similar to Pre-Con Ed: Software Asset Management (20)

Pre-con Education: A Day In The Life Of A Software Asset Manager
Pre-con Education: A Day In The Life Of A Software Asset ManagerPre-con Education: A Day In The Life Of A Software Asset Manager
Pre-con Education: A Day In The Life Of A Software Asset Manager
 
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
 
Managing Software Entitlements in Software Asset Management Solutions from CA
Managing Software Entitlements in Software Asset Management Solutions from CAManaging Software Entitlements in Software Asset Management Solutions from CA
Managing Software Entitlements in Software Asset Management Solutions from CA
 
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
 
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
 
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
 
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
 
Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset Management
 
The software Visibility Problem
The software Visibility Problem The software Visibility Problem
The software Visibility Problem
 
samQ_Broschuere_EN
samQ_Broschuere_ENsamQ_Broschuere_EN
samQ_Broschuere_EN
 
It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
 
SAP License Cost
SAP License CostSAP License Cost
SAP License Cost
 
SAM Software Asset Management
SAM Software Asset ManagementSAM Software Asset Management
SAM Software Asset Management
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
Strategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset ManagementStrategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset Management
 
ServiceNow Utah Release Highlights
ServiceNow Utah Release HighlightsServiceNow Utah Release Highlights
ServiceNow Utah Release Highlights
 
Reinventing Application Performance Testing with Service Virtualization
Reinventing Application Performance Testing with Service VirtualizationReinventing Application Performance Testing with Service Virtualization
Reinventing Application Performance Testing with Service Virtualization
 
Web controlfeatures 08 2003
Web controlfeatures 08 2003Web controlfeatures 08 2003
Web controlfeatures 08 2003
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Pre-Con Ed: Software Asset Management

  • 1. Pre-Con Ed: Software Asset Management: Working in the Trenches Michel Avenel - Sr. Principal Product Manager - CA Technologies AMX27E AGILE MANAGEMENT
  • 2. 3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2016 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 3. 5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda INTRODUCTION LICENSE INVENTORY Q&A SOFTWARE INVENTORY COMPLIANCE SPECIAL CASES 1 2 3 4 5 6
  • 4. 6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Part 1: Introduction A Day in the Life of a Software Asset Manager
  • 5. 7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Introduction SETTING THE STAGE – The CA IT Asset Manager (CA ITAM) - Software Asset Management “A” MODEL
  • 6. 8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Management  CA ITAM software asset management (SAM) capabilities use an “Entitlement Centric” approach for Compliance activities.  Entitlement Centric solutions work differently than Asset Centric solution to address Software License Management outcomes: – Asset Centric Solutions consider desktops or servers to determine what software is installed and how many licenses required to cover these installations? – Entitlement Centric Solutions: consider purchased licenses and their associated product use rights to determine how to calculate the number of licenses required cover software usage.  Auditors focuses on your legal obligations for “documented” license purchases to ascertain compliance; hence, an Entitlement Centric approach appropriate. Asset Centric vs. Entitlement Centric
  • 7. 9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Inventory  How do I find out what I am licensed for and if there are restrictions for use of a License?  How do CA’s SAM capabilities support these activities?  There are many different ways to procure licenses: – All procurement methods provide details of your use rights and restrictions within the documents. – Extracting this information (data) is addressed through a combination of review, analysis and reporting of the procurement documents. – CA’s SAM capabilities provide the central repository to manage this information enabling you to identify purchased licenses and their associated entitlements and restrictions. License Procurement
  • 8. 10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Inventory  The next step in identifying License Inventory is to complete Receiving Inspection activities.  Receiving inspection is where the procurement data is verified against the information in the Master Catalog. – The Master Catalog is the central repository that provides information required to assist in the correct identification of licenses purchased. – The Master Catalog knows what Product Use Rights (PUR’s) are associated with each License either by referring to the manufacturer standards or to extended master catalog records that have been created to reflect specific customer negotiated terms. – The mapping or reconciliation performed through the receiving inspection process provides you with an Effective License Inventory of the Product Use Rights (PUR’s) that are linked to the Licenses. Receiving Inspection
  • 9. 11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Inventory  In addition to understanding the provisions of your Licenses, it is essential to include relevant Contract terms in your analysis.  These terms are captured through manual Contract review & analysis to identify relevant information (data elements) and entry into a central repository.  CA’s SAM capabilities provide different methods for loading Contract data: – Standard import templates for all relevant tables. – Manual entry can also be performance through the user interface.  CA Technologies also provides a Contract Import Template to facilitate data loads. Loading Contract Data
  • 10. 12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Inventory  Once License/Entitlement information has been compiled it should be loaded into CA ITAM  CA’s SAM capabilities provide different methods of loading License/Entitlement data: – Loading data from reseller or supplier reports can be done for software titles purchased via these organizations. – An interface (Connector) can be built into your centralized procurement system to capture data from within – Manual entry can also be performance through the user interface.  CA also provides a Contract Import Template to facilitate data loads. Loading License Entitlement Data
  • 11. 13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Inventory  Once the License is recognized from the procurement information, it is forwarded to the License Clearing function.  License Clearing captures Product Use Rights, Maintenance Rights, Language, Version, etc.  Relevant information is linked to the License purchase and forwarded to your effective License inventory.  Once we have our effective License Inventory, we can answer questions and take action. Effective License Inventory Actions
  • 12. 14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Software Inventory  To create a License Balance you must focus not only on your Licenses but also on software usage.  Your Software Inventory Manager will load discovery data into CA ITAM.  The raw data from your discovery tools must be mapped to licensable products (using the Master Catalog).  The result is a Software Inventory showing which products are installed on which machines or used by which users.  In an asset centric solution it usually is the last step, you compare your software installations to your licenses however, this is not the case for an entitlement centric approach.  With CA’s SAM solution, Software Inventory is not the last step. Not Your Last Step
  • 13. 15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Software Inventory  As previously mentioned, in an Entitlement Centric approach the Software Inventory is not where License Management ends.  Entitlement Centric does not need to know what or how many installations you have, it needs to know how many Licenses you need to cover the number of installations.  To enable the Entitlement Centric approach, CA’s SAM capabilities provide a unique function based on the Master Catalog – Metric Engines – which facilitates this calculation. Metric Engines
  • 14. 16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Software Inventory  A Metric Engine calculates “Effective License Demand” based on the metric assigned to the license product through data loading and configuration activities.  Metric Engines are a set of algorithms and rules built to calculate Effective Demand by comparing all data entered into the solution to enable the compliance calculation, including: – Software Inventory – Master Data – Contract Data – License/Entitlement Data Effective Demand
  • 15. 17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Software Inventory  Metric Engines are designed to manage for complex metrics found in server environments, for example: – IBM PVU or Oracle CPU metrics that tie to physical attributes of a device on which the software is installed to calculate consumption. – Virtualized Environments – Citrix Environments Effective Demand
  • 16. 18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Software Inventory  Complex algorithms required to calculate these metrics are contained within the Master Catalog.  The metrics define the parameters for how to calculate demand: – IBM WebSphere installations will be detected via the Master Catalog and the metric in the Master Catalog will control a calculation for the number of Licenses required to cover the installation(s).  This means it is not the installation, but the calculated “demand” that is compared to the available Licenses during balancing.  This is identified in the “A” Model.  Your Software Inventory is used by the metric engine calculation to create your “Effective Demand.” Effective Demand
  • 17. 19 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Balancing (Compliance Checks)  IMPORTANT: Compliance checks are highly dependent on both the data provided and the quality of the data.  CA’s SAM capabilities are designed to deliver a “Compliance Position” even if you are missing data elements.  It uses a concept of “default data” if key data elements are missing.  It identifies where “default data” elements are used to enable you to see and measure the risk associated with your Compliance Position.  To mitigate the risk and improve your compliance position addressing data quality issues is essential. Data Quality
  • 18. 20 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Balancing (Compliance Checks)  CA’s SAM solution uses a concept of “Validation Processes” to improve the quality of the balanced elements.  If “License Data” is missing at the time you execute a Compliance Check, you must ensure remaining license records in the License Clearing / Updating Process have no issues.  If there is “Usage Data” missing at the time you execute a Compliance Check, you must ensure Software Recognition function processes data from source to compliance is transferred and validated. Data Quality
  • 19. 21 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Balancing (Compliance Checks)  License Managers on your Compliance Team are required to review License Clearing and Software Recognition Processes to identify any additional data required.  This is an ongoing (steady-state) activity as data is constantly updated. – It is recommended that both processes are reviewed prior to run each Compliance View.  Creating and executing an internal remediation process is key to managing data quality.  Once data quality issues are resolved, re-running Compliance Analysis is required. Data Quality
  • 20. 22 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Balancing (Compliance Checks)  Senior Management is not necessarily interested in the individual results of a Compliance Check.  They are focused on risk and related cost/impact the Compliance Positions create.  CA supports the ability to create & understand the financial impact of a specific Compliance Position.  BEST PRACTICE: – It is highly recommended that you include financial data as with the entitlement information entered into CA’s SAM solution. – It enables business impact analysis and prioritization. – Without it you will find it difficult to define the impact of your position. Compliance Intelligence
  • 21. 23 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Balancing (Compliance Checks)  The Compliance Intelligence function uses financial information to identify impact.  It is also the function that provides drill down/drill up capabilities during the analysis of your compliance Position.  It allows you to drill up and down into: – Manufacturers and products – Organizational levels within your organization  It provides a view into the associated risk and financial impact of your Compliance Positions. Compliance Intelligence
  • 22. 24 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Balancing (Compliance Checks)  Challenges: – Many people / roles / organizations involved – Complex, parallel sub-processes (requiring different domain) – Information exchange / process independent communication – Labeling / clearing optimization and validation of data – Marking the work progress of the data Challenges and Approach
  • 23. 25 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Balancing (Compliance Checks)  Approach: – Introduction of status systems – Data Identification (e.g. validated, in progress, out of scope) – Display processes step by step:  Prefix for ordering  Responsibilities [CA/ASP], [Customer]) – Information Exchange (Review required information provided) Challenges and Approach
  • 24. 26 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Overview of SAM Roles License Balance Manager (LBM) Software Inventory Administrator (SIA) License Inventory Administrator (LIA) Application Interface Administrator (AIA)
  • 25. 27 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA ITAM’s Software Asset Management Roles Overview Coordinator Roles Description SAM Service Coordinator (SSC) These roles are primarily focused on communication and guidance to ensure that Role specifications and defined processes are known and followed. Coordinators support the operative teams in case of questions or issues and control communication to other teams. Application Interface Coordinator (AIC) Software Inventory Coordinator (SIC) License Inventory Coordinator (LIC) Operator Roles Description Corporate License Compliance Manager (CLCM) These are roles that are primarily focused on the actual work on the data and the compliance checks and analysis within CA SAM. License Balance Manager (LBM) Application Interface Administrator (AIA) Software Inventory Administrator (SIA) License Inventory Administrator (LIA) Supporting Roles Description Hosting Provider (If Applicable) These are roles focused on tasks not usually involved in the actual asset or license management function, but support these activities providing related services. Application Administrator Data Source Owners (for each data sources)
  • 26. 28 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Overview of SAM Roles Sign-Off Overview License Balance Software Inventory License Inventory Development of a Compliance View Sign-Off is required in three areas
  • 27. 29 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How Sign-Off Impact Your Compliance View Roles Cascade License Balance Manager: For quality validation, check with corresponding inventory administrator Inventory Administrator: For qualify validation, check with corresponding coordinator and data provider Coordinator Roles: Liaison with data source owners to ensure complete & accurate data is received Data Source Owner: Non-SAM function, but critical content supplier to support SAM outcomes Inventory Administrator ensures inventory is complete and valid QUALITY REPORTS EXCEPTION REPORTS / DELIVERY REGISTER The License Balance Manager check data using the balance process
  • 28. 30 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Part 2: License Inventory A Day in the Life of a Software Asset Manager
  • 29. 31 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Inventory Administrator  Review License Inventory to ensure it is correctly processed: – Effective licenses, Update licenses, Inactive licenses (Expired) – Check Import Pool for failed positions  Validate: – Correctness of data: – Use Rights identified as expected? – Correct Organization? – Completeness of data: – Any item missing? – All data feeds integrated? – Check License Transfer and License Pools Tasks & Responsibilities If OK:  Sign-off and set status to validated If Clarification Required:  Set status to “In Progress” and follow-up internally If Incomplete / Inaccurate Data:  Provide additional or updated data, as needed, or  Contact License Inventory Coordinator to obtain missing or updated data (from existing feeds via connectors)
  • 30. 32 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Inventory Administrator  If a License Move is required: – For intra-organizational assignments move according to your use rights. – For cross-organizational assignments contact the License Inventory Coordinator and License Ownership Administrator.  If additional update assignment is required: – Contact your License Manager or License Inventory Coordinator in order to request assignment.  All checks should be documented by setting the Statuses for Reporting to the License Balance Manager. Tasks & Responsibilities
  • 31. 33 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Inventory  These are the main tasks for a License Inventory Administrator:  Check if all feeds for the commercial environment are integrated.  Check receiving inspection.  Check for update/upgrade licenses.  Acknowledge Licenses: Set status to “In Progress”.  Check expired maintenance / subscription licenses.  Qualification/Sign-Off. Steps for License Inventory Administrator
  • 32. 34 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Inventory  Did all license imports run successfully (Management Module)?  Check receiving inspection for clearing status.  Check for unassembled update/upgrade licenses.  Check Effective Licenses for licenses status.  Check expired maintenance / subscription licenses.  Check contracts.  Qualification/Sign-Off.  If there is an issue, consult with the License Inventory Administrator. Steps for License Balance Manager
  • 33. 35 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Inventory  Check the Receiving Inspection for any failed License imports.  Data stored in the Receiving Inspection is not yet effective.  Refer to the Commercial Inventory Coordinator for additional information (as needed).  If additional assistance is required contact the License Inventory Coordinator. Step 1: License Imports
  • 34. 36 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Inventory  Existing data feeds and their current processing can be checked within the Data Feed Register:  For automated License Imports: – Check for status of the License Imports to ensure they all ran successfully. – If they did not run successfully, contact your License Inventory Administrator to correct the issue. – If they all ran successfully, move to the next step. Step 2: Receiving Inspection
  • 35. 37 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Inventory  All Licenses not considered “full” Licenses (Updates/Upgrades, Maintenance, Extended Subscription) go to the Update Pool first and are processed according to the agreed upon rules.  Data stored in the Update Pool does not impact Effective Balance.  If additional assistance is required contact the License Inventory Coordinator. Step 3: Assemble Update/Upgrade Licenses
  • 36. 38 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Inventory  Check License Status  Check if related to correct Contract, Addendum or Schedule (which contains actual scope and end dates)  Search for the expired dates and contact License Inventory Administrator – For assignment of the current maintenance entitlement – For versioning of the remaining product Step 4 & 5: Licenses Statuses & Dates
  • 37. 39 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Inventory Step 6: Check Contracts  Check contract status active (validated)  Check for correct end dates and Maintenance dates  Check for correct contract scopes
  • 38. 40 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Inventory Step 7: Sign-Off  Go to Licenses > Effective Licenses  Modify selection according to your needs (e.g. Data for a certain division or legal entity)  Use “auto filter” in order to access charts
  • 39. 41 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Part 3: Software Inventory A Day in the Life of a Software Asset Manager
  • 40. 42 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Software Inventory Administrator  Review Usage data – Software Inventory, effective usage  Validate – Correctness of data – Completeness of data – Demand Calculation  Check Completeness: – Source Completeness: check internally – Import Completeness: check exception reports – Run Coverage Reports  All checks must be documented by setting the statuses for Reporting to the License Balance Manager. Tasks & Responsibilities If OK:  Sign-off and set status to validated If Clarification Required:  Set status to “In Progress” and follow-up internally If Incomplete / Inaccurate Data:  For central data feed contact the Central Coordinator  For individual feeds contact Data Owners
  • 41. 43 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Software Inventory  These are the main tasks for a Software Inventory Administrator:  Check if all feeds for the technical environment are integrated.  Check expected devices versus delivered devices.  Check orphaned devices.  Check Signature Coverage Report.  Acknowledge (new) Software Inventory and set status (In Progress).  Qualification/Sign-Off. Steps for Software Inventory Administrator
  • 42. 44 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Software Inventory  These are the main tasks for a License Balance Manager:  Did all software imports run successfully (Management Module)?  Check devices for Device Status.  Check Signature Coverage and Signature Statuses.  Check Software Inventory for Inventory status.  Check Effective Demand calculation.  Qualification/Sign-Off.  If there is an issue, consult with the Software Inventory Administrator. Steps for License Balance Manager
  • 43. 45 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Software Inventory Step 1: Data Feeds Existing data feeds and their current processing can be checked within the Data Feed Register. For automated Software Imports:  Check for the status of the Software Imports to ensure that they all ran successfully. – If they did not run successfully, you must contact your Software Inventory Administrator to correct the issue . – If they ran successfully then move to the next step.
  • 44. 46 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Software Inventory Step 2: Check Devices  Check status if all devices are approved. – Meaning, device is existing, device attributes (Current CPU Type) and device capacities (MSU and MIPS) are correct.  If not, contact the Software Inventory Administrator.
  • 45. 47 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Software Inventory Step 3: Signature Coverage Check Signature Coverage Report to ensure all Raw Data is processed and assigned to products correctly:  Select the appropriate data source and drilldown (summary).  Check for records with 0 signatures, e.g. data does not lead to Software Inventory >> no risk if nothing in scope unprocessed.  Check for “Ineffective“ signatures and their corresponding Status: follow up on data in Status “[Customer]_review.”
  • 46. 48 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Software Inventory Step 4: Acknowledge New/Existing Software Inventory  Check the installations found on the Devices:  New records have no Status, search for =““.  New data is to be acknowledged by setting the Status to “In Progress”.  May be directly approved -Status Validated.
  • 47. 49 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Software Inventory Step 5: Check Effective Demand and Metrics (1)  For generic metrics like “Installations“ check if quantity matches.
  • 48. 50 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Software Inventory Step 5: Check Effective Demand and Metrics (2)  For calculating, check table metric calculation table to see if missing device attributes or capacities or default values were taken.
  • 49. 51 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Software Inventory Step 6: Software Inventory Sign-Off  Software > Software Inventory > Devices / Accounts.  Modify selection according to your needs, e.g. Data for a certain division or legal entity.  Use “Auto Filter” in order to access charts.
  • 50. 52 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Part 3: Compliance A Day in the Life of a Software Asset Manager
  • 51. 53 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Balance Manager (LBM)  Run License Balance / Receive License Balance Report.  Validate License Inventory and Effective Usage with the responsible Inventory administrators.  If Product is new in balance: start Validate (Licenses/Usage) and set Status to “In Progress”.  If data must be improved: consult with responsible Inventory Administrator for appropriate action.  Follow up with Central Coordinator for central feeds (such as ERP systems).  If Product has been improved: Review current Status.  If data is fully correct, sign off and set Status to “Validated”. Tasks & Responsibilities
  • 52. 54 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD License Balance Manager (LBM)  For configuration of additional Downgrade Paths contact the License Inventory Coordinator  For assistance with general balance interpretation contact the License Inventory Coordinator  License Balance Sign-Off should be managed at the organizational level in focus. Note: License Balance Manager roles may be delegated per Legal Entity level or groups of Legal Entities (i.e. Regional License Manager). Tasks & Responsibilities
  • 53. 55 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Compliance These are the main tasks for a License Balance Manager:  Run Balance  Check effective Sign-Off of License (Commercial) Inventory  Check effective Sign-Off of Software (Technical) Inventory  Check Additional Rights: - Downgrade - Parallel Usage - Secondary Copy - Other  Qualify/Sign-Off Balance Steps for License Balance Manager
  • 54. 56 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Compliance  Run Balance (Compliance View)  Check the results for unexpected data Step 1: Run Balance
  • 55. 57 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Compliance  Analyze the underlying License Inventory data and check Status for validity.  The Compliance view provides direct access to Licenses (Use rights) and Effective Usage. Step 2: Sign-Off Effective License Inventory
  • 56. 58 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Compliance Check Status of Effective Demand and list Inventory Data for validation. Step 3: Sign-Off Effective Demand Complete analysis of the underlying Software Inventory.
  • 57. 59 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Compliance  The License Balance Manager should understand the correct Use Rights.  The License Balance Manager should ensure that all relevant Use Right information is made available.  The License Balance Manager should ensure downgrade paths are correctly activated and configured according to License terms.  The License Balance Manager is the internal key Role who should be providing all key information for License Inventory Administration. Step 4: Validate Additional (& Special) Use Rights
  • 58. 60 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Compliance Step 4: Effect of Downgrade on Compliance  Use the table configuration to show “Downgrade Path” and “Downgrade Path Position.”  Filter for a Downgrade Path you want to check and click “Downgrade Path Position” to sort by this value.  Within the same Downgrade Path, Position indicates the order in which CA SAM provides un-used licenses to demand not covered directly. – In most cases demand is covered by the license at the closest higher position.  For exceptions check the Downgrade Rights matrix.
  • 59. 61 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Compliance  Use the table configuration to show “Effective demand (ignored)”.  Filter for value larger than 0.  Check the reason by drilling down into the Installations (ignored). There you find the reason why these installation are ignored calculating the demand.  In this case, the reason is “Parallel Usage (all members)” meaning all members of this Downgrade Path are allowed to be installed in parallel resulting in only 1 demand of the highest product within this path. Step 4: Effect of Parallel Use on Compliance
  • 60. 62 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Compliance  Set product status to “Validated”  Can be accomplished in singled or multiple edit mode Step 5: Balance Sign-Off
  • 61. 63 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME AMX23E CA Software Asset Management - Key Customer Topics 11/15/2016 at 3:30 pm AMX21S Case Study: Create Time out of Thin Air - Automate and Stop Manual Software License Compliance 11/16/2016 at 3:00 pm AMX122S Case Study: Taking IT Asset Management to the Next Level With Process Automation 11/17/2016 at 3:45 pm
  • 62. 64 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos Service Desk and Support Analyst xFlow Experience Software and Hardware Asset Management Request Management and Self-service Management Insights – Reporting and Dashboards
  • 63. 65 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Questions?
  • 64. 66 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Stay connected at communities.ca.com Thank you.

Editor's Notes

  1. As you build out your presentation, here are a few dos and don’ts.
  2. In that when you have an asset centric solution you look at the computer or you look at your desktop or servers and you ask what software do I have installed on our servers and how many Licenses do I need to cover these installations? Whereas on the entitlement centric side you look at what Licenses you have purchased and what Product Use Rights in my Licenses are attached to them. You ask how we calculate how many Licenses I need to cover my software installation and usage. With an asset centric view you are looking at what software is on your devices to understand if you are compliance, whilst with an entitlement centric view you are looking at what your software licenses say you are entitled to use and do.
  3. The Master Catalog is the central repository that provides the data required to assists in the correct identification of the Licenses purchased. The Master Catalog knows what Product Use Rights (PUR’s) are associated with each License either by referring to the manufacturer standards or to the extended master catalog records that have been created to reflect specific customer negotiated terms. The mapping or reconciliation performed through the receiving inspection process provides you with an Effective License Inventory of the Product Use Rights (PUR’s) that are linked to the Licenses.
  4. SIA, LIA and AIA are the relevant supporting roles for the License manager: The Application Interface Administrator Ensures data import functions are working, including monitoring and issue management when errors occur. The Software Inventory Administrator Ensures all processes related to the technical data are functioning including monitoring, processing and issue resolution of Raw Data import up to the Effective Demand. The License Inventory Administrator Ensures all processes related to the commercial data are functioning including monitoring, processing and issue resolution of License import up to the Effective License Pool. The License Balance Manager Manages Compliance (balancing function) and ensurs all data is validated. Qualifies and analyzes the balances.
  5. SIA, LIA and AIA are the relevant supporting roles for the License manager: The Application Interface Administrator Ensures data import functions are working, including monitoring and issue management when errors occur. The Software Inventory Administrator Ensures all processes related to the technical data are functioning including monitoring, processing and issue resolution of Raw Data import up to the Effective Demand. The License Inventory Administrator Ensures all processes related to the commercial data are functioning including monitoring, processing and issue resolution of License import up to the Effective License Pool. The License Balance Manager Manages Compliance (balancing function) and ensurs all data is validated. Qualifies and analyzes the balances.
  6. As an example: The License Balance Manager checks the data used in the balancing process. Any issues or improvements with Inventory data will be referred to the Inventory Administrators responsible for the specific data. The Inventory Administrators have to ensure that the Inventory is complete and validated. If any information is missing, the Inventory Coordinator can be asked for assistence. The Inventory Coordinators have to ensure that the Inventory Administrators get all information they need. Therefore they can contact Data Providers or other technical staff to fix issues on the Raw Data imports.
  7. As License Balance Manager you need to understand the tasks of your supporting roles, so you can check the validity of the data the balance relies on. The License Inventory Administrator has to ensure the correctness and completeness of your License Inventory and the Effective Licenses. The LIA has to sign-off these data by setting the respective statuses.
  8. The LIA will perform several checks to ensure that the Inventory is correct and document these checks with the respective status.
  9. As LBM you must check the status of each of these data element and process areas. If they are not validated or validated, but not ok, go to License Inventory Administrator.
  10. The Data Feed Register is an external document created during the implementation phase and continuously maintained. It can be published within CA SAM using the News function.
  11. As License Balance Manager you need to understand the tasks of your supporting roles, so you can check the validity of the data the balance relies on. The License Inventory Administrator has to ensure the correctness and completeness of your License Inventory and the Effective Licenses. The LIA has to sign-off these data by setting the respective statuses.
  12. The LIA will perform several checks to ensure that the Inventory is correct and document these checks with the respective status.
  13. The LIA will perform several checks to ensure that the Inventory is correct and document these checks with the respective status.
  14. The Data Feed Register is an external document created during the implementation phase and continuously maintained. It can be published within CA SAM using the News function.
  15. The License Balance Manager runs the Balance Report and checks the Status of the underlying data. Sign-Off the compliance Status of each Product will follow. All checks should be managed by setting the Statuses for Reporting.
  16. The License Balance Manager runs the Balance Report and checks the Status of the underlying data. Sign-Off the compliance Status of each Product will follow. All checks should be managed by setting the Statuses for Reporting.