Enviar búsqueda
Cargar
Discovery, Inventory and Application Recognition
•
1 recomendación
•
2,283 vistas
Flexera
Seguir
Tecnología
Empresariales
Denunciar
Compartir
Denunciar
Compartir
1 de 24
Descargar ahora
Descargar para leer sin conexión
Recomendados
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
Flexera
Open iT License Analyzer Software Usage Metering Tool
Open iT License Analyzer Software Usage Metering Tool
Open iT Inc.
End User Computing & Server Licensing Slides - Nhs Microsoft Licensing Wo...
End User Computing & Server Licensing Slides - Nhs Microsoft Licensing Wo...
Charlie78horse
License Management Overview
License Management Overview
Dominic Haigh
ProVoice Case Study
ProVoice Case Study
Melanie Brammall
Managed Services Seminar Presentation
Managed Services Seminar Presentation
gerrymark
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Bob Rhubart
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Bob Rhubart
Recomendados
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
Flexera
Open iT License Analyzer Software Usage Metering Tool
Open iT License Analyzer Software Usage Metering Tool
Open iT Inc.
End User Computing & Server Licensing Slides - Nhs Microsoft Licensing Wo...
End User Computing & Server Licensing Slides - Nhs Microsoft Licensing Wo...
Charlie78horse
License Management Overview
License Management Overview
Dominic Haigh
ProVoice Case Study
ProVoice Case Study
Melanie Brammall
Managed Services Seminar Presentation
Managed Services Seminar Presentation
gerrymark
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Bob Rhubart
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Bob Rhubart
21st Century SOA
21st Century SOA
Bob Rhubart
Pawaa OCC Presentation
Pawaa OCC Presentation
CloudComputing
FlexNet Delivery Datasheet
FlexNet Delivery Datasheet
Flexera
License Management
License Management
SVPMA
SerbizHub Suite Technical Specifications
SerbizHub Suite Technical Specifications
mood Learning
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption Disasters
Venafi
Power Admin File Sight™
Power Admin File Sight™
Power Admin LLC
Monitoreo y análisis de aplicaciones "Multi-Tier"
Monitoreo y análisis de aplicaciones "Multi-Tier"
GeneXus
Managing application performance for cloud apps bmc
Managing application performance for cloud apps bmc
Khazret Sapenov
Az Managed Exchange Services(1)
Az Managed Exchange Services(1)
alwayson
Core R1 Presentation7
Core R1 Presentation7
malcolm shiel
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Lumension
Windows Hosting Service-Level Description
Windows Hosting Service-Level Description
webhostingguy
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Systems, Inc.
Youcc cexpert short
Youcc cexpert short
Shmuel Mishali
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Venafi
Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)
webhostingguy
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
OracleIDM
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Novell
SACM Workshop Best Practice and Road Map Implementation Process Guide - PL Co...
SACM Workshop Best Practice and Road Map Implementation Process Guide - PL Co...
Phil Tishberg
Where to Begin? Application Portfolio Migration
Where to Begin? Application Portfolio Migration
Amazon Web Services
Cover dan pendahuluan karya tulis
Cover dan pendahuluan karya tulis
Dvi Setiawan
Más contenido relacionado
La actualidad más candente
21st Century SOA
21st Century SOA
Bob Rhubart
Pawaa OCC Presentation
Pawaa OCC Presentation
CloudComputing
FlexNet Delivery Datasheet
FlexNet Delivery Datasheet
Flexera
License Management
License Management
SVPMA
SerbizHub Suite Technical Specifications
SerbizHub Suite Technical Specifications
mood Learning
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption Disasters
Venafi
Power Admin File Sight™
Power Admin File Sight™
Power Admin LLC
Monitoreo y análisis de aplicaciones "Multi-Tier"
Monitoreo y análisis de aplicaciones "Multi-Tier"
GeneXus
Managing application performance for cloud apps bmc
Managing application performance for cloud apps bmc
Khazret Sapenov
Az Managed Exchange Services(1)
Az Managed Exchange Services(1)
alwayson
Core R1 Presentation7
Core R1 Presentation7
malcolm shiel
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Lumension
Windows Hosting Service-Level Description
Windows Hosting Service-Level Description
webhostingguy
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Systems, Inc.
Youcc cexpert short
Youcc cexpert short
Shmuel Mishali
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Venafi
Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)
webhostingguy
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
OracleIDM
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Novell
La actualidad más candente
(19)
21st Century SOA
21st Century SOA
Pawaa OCC Presentation
Pawaa OCC Presentation
FlexNet Delivery Datasheet
FlexNet Delivery Datasheet
License Management
License Management
SerbizHub Suite Technical Specifications
SerbizHub Suite Technical Specifications
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption Disasters
Power Admin File Sight™
Power Admin File Sight™
Monitoreo y análisis de aplicaciones "Multi-Tier"
Monitoreo y análisis de aplicaciones "Multi-Tier"
Managing application performance for cloud apps bmc
Managing application performance for cloud apps bmc
Az Managed Exchange Services(1)
Az Managed Exchange Services(1)
Core R1 Presentation7
Core R1 Presentation7
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Windows Hosting Service-Level Description
Windows Hosting Service-Level Description
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Youcc cexpert short
Youcc cexpert short
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Destacado
SACM Workshop Best Practice and Road Map Implementation Process Guide - PL Co...
SACM Workshop Best Practice and Road Map Implementation Process Guide - PL Co...
Phil Tishberg
Where to Begin? Application Portfolio Migration
Where to Begin? Application Portfolio Migration
Amazon Web Services
Cover dan pendahuluan karya tulis
Cover dan pendahuluan karya tulis
Dvi Setiawan
Interpretación de graficas
Interpretación de graficas
Gerardo González Sánchez
Social Media for Financial Planners
Social Media for Financial Planners
Louisa Chan 陈毅信
Juniper Netscreen模拟实例配置PPT
Juniper Netscreen模拟实例配置PPT
mickchen
Does the Cloud Change Anything? What can be learned from the Changing Enterpr...
Does the Cloud Change Anything? What can be learned from the Changing Enterpr...
Flexera
Gestión de la información
Gestión de la información
David Leon Sicilia
Slides5
Slides5
pikonka101
Fixing Design-Time Validation Errors
Fixing Design-Time Validation Errors
Flexera
Cpd Presentation Learning Walks
Cpd Presentation Learning Walks
guest176a68
Iim 1
Iim 1
guest66da87c
distance learning
distance learning
Matt Strine
90% of all cancers can be eliminated & science agrees.
90% of all cancers can be eliminated & science agrees.
wagweb007
Guia de ordenamiento para la firma del libro de acta 2013-I
Guia de ordenamiento para la firma del libro de acta 2013-I
David Leon Sicilia
Management of (Research) Teams - leadership and decision making
Management of (Research) Teams - leadership and decision making
Francesco Venier
Shell vs. Java: Overcoming the Challenges of Shell Scripting for UNIX Install...
Shell vs. Java: Overcoming the Challenges of Shell Scripting for UNIX Install...
Flexera
Rent vs. Own Slide Show
Rent vs. Own Slide Show
Andy Carswell
Buku proyeksi siswa
Buku proyeksi siswa
zaenal mukodir
촛불세대의 코칭
촛불세대의 코칭
Rohjoonshik
Destacado
(20)
SACM Workshop Best Practice and Road Map Implementation Process Guide - PL Co...
SACM Workshop Best Practice and Road Map Implementation Process Guide - PL Co...
Where to Begin? Application Portfolio Migration
Where to Begin? Application Portfolio Migration
Cover dan pendahuluan karya tulis
Cover dan pendahuluan karya tulis
Interpretación de graficas
Interpretación de graficas
Social Media for Financial Planners
Social Media for Financial Planners
Juniper Netscreen模拟实例配置PPT
Juniper Netscreen模拟实例配置PPT
Does the Cloud Change Anything? What can be learned from the Changing Enterpr...
Does the Cloud Change Anything? What can be learned from the Changing Enterpr...
Gestión de la información
Gestión de la información
Slides5
Slides5
Fixing Design-Time Validation Errors
Fixing Design-Time Validation Errors
Cpd Presentation Learning Walks
Cpd Presentation Learning Walks
Iim 1
Iim 1
distance learning
distance learning
90% of all cancers can be eliminated & science agrees.
90% of all cancers can be eliminated & science agrees.
Guia de ordenamiento para la firma del libro de acta 2013-I
Guia de ordenamiento para la firma del libro de acta 2013-I
Management of (Research) Teams - leadership and decision making
Management of (Research) Teams - leadership and decision making
Shell vs. Java: Overcoming the Challenges of Shell Scripting for UNIX Install...
Shell vs. Java: Overcoming the Challenges of Shell Scripting for UNIX Install...
Rent vs. Own Slide Show
Rent vs. Own Slide Show
Buku proyeksi siswa
Buku proyeksi siswa
촛불세대의 코칭
촛불세대의 코칭
Similar a Discovery, Inventory and Application Recognition
Current challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutions
Dominic Haigh
The Evolution of Customer License Management
The Evolution of Customer License Management
Flexera
Webinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management program
Flexera
Software License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera Software
Flexera
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based Licensing
LicensingLive! - SafeNet
Best Practices for IT Asset Management Using Novell ZENworks
Best Practices for IT Asset Management Using Novell ZENworks
Novell
Software Compliance Management Overview
Software Compliance Management Overview
kevino80
Software Compliance 062409
Software Compliance 062409
mohara7750
Software License Optimization Managed Services
Software License Optimization Managed Services
Flexera
Servicedesk Plus 8
Servicedesk Plus 8
Mirandell Sistemas
FlexNet Manager Suite Cloud
FlexNet Manager Suite Cloud
Flexera
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Novell
The Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS Delivery
OpSource
License Position Snapshot Service
License Position Snapshot Service
Flexera
Protecting the Desktop with Novell ZENworks Application Virtualization
Protecting the Desktop with Novell ZENworks Application Virtualization
Novell
GWAVACon 2013: Gain Control - ZENworks
GWAVACon 2013: Gain Control - ZENworks
GWAVA
Tcg Veriam Slm Intro Deck
Tcg Veriam Slm Intro Deck
Kamila_W
Sys track customer facing-terminal server-updated
Sys track customer facing-terminal server-updated
Syntax Inc.
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
XebiaLabs
Flexera New York Tools Day
Flexera New York Tools Day
Martin Thompson
Similar a Discovery, Inventory and Application Recognition
(20)
Current challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutions
The Evolution of Customer License Management
The Evolution of Customer License Management
Webinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management program
Software License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera Software
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based Licensing
Best Practices for IT Asset Management Using Novell ZENworks
Best Practices for IT Asset Management Using Novell ZENworks
Software Compliance Management Overview
Software Compliance Management Overview
Software Compliance 062409
Software Compliance 062409
Software License Optimization Managed Services
Software License Optimization Managed Services
Servicedesk Plus 8
Servicedesk Plus 8
FlexNet Manager Suite Cloud
FlexNet Manager Suite Cloud
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
The Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS Delivery
License Position Snapshot Service
License Position Snapshot Service
Protecting the Desktop with Novell ZENworks Application Virtualization
Protecting the Desktop with Novell ZENworks Application Virtualization
GWAVACon 2013: Gain Control - ZENworks
GWAVACon 2013: Gain Control - ZENworks
Tcg Veriam Slm Intro Deck
Tcg Veriam Slm Intro Deck
Sys track customer facing-terminal server-updated
Sys track customer facing-terminal server-updated
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
Flexera New York Tools Day
Flexera New York Tools Day
Más de Flexera
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Flexera
Make Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your Journey
Flexera
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
Flexera
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and Compliance
Flexera
The Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS Management
Flexera
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy
Flexera
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source Software
Flexera
Addressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal View
Flexera
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!
Flexera
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Flexera
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
Flexera
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.
Flexera
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Flexera
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Flexera
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Flexera
BDNA joins Flexera
BDNA joins Flexera
Flexera
Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?
Flexera
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Flexera
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Flexera
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
Flexera
Más de Flexera
(20)
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Make Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your Journey
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and Compliance
The Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS Management
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source Software
Addressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal View
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
BDNA joins Flexera
BDNA joins Flexera
Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
Último
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
DianaGray10
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
BkGupta21
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
LoriGlavin3
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Lars Bell
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Precisely
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
NavinnSomaal
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
Último
(20)
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
Discovery, Inventory and Application Recognition
1.
Discovery, Inventory and
Application Recognition December 2011
2.
Webinar Series
Automated entitlement based license • 1st webinar (Nov) Level 4 management and optimization; How to get started on Optimized a SAM program • 2nd webinar– (Today) Automated purchased vs. installed Discovery, Inventory Level 3 license reconciliation; SAM processes Continuously & Application Compliant to maintain license compliance Recognition Level 1 Perform purchased versus installed • 3rd webinar– (Jan) Level 2 license reconciliation on an ad hoc Managed License & Contract basis; point in time management Management Levels 2-3 Level 1 • 4th webinar– (Feb) Identify software and hardware installed Installed Strategies for License Optimization Level 4 Enterprise License Optimization Maturity Model 2 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
3.
Speaker & Agenda
• License Management overview • Device Based inventory • Network based inventory • Application Recognition • Additional inventory requirements Vincent Brasseur • Virtualization Director of Product Management, • License examples Flexera Software • Recommendations • Questions and Answers 3 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
4.
License Management Goals
Out of $ Over-Licensed Optimal Compliance $ • Calculate your license position – Reduce non-compliance costs and risks – Eliminate over-spending on software; identify ‘shelfware’ • Manage Licenses and Contracts – Know what the organization owns; understand licensing terms and conditions – Pay for what you need and use – Be audit ready • Meet Organization Objectives – Ensure each installation and use of a software product is licensed – Provide financial forecasting • Optimize the license position – Minimize license consumption – Deliver trend analysis and licensing forecasting 4 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
5.
License Management Data
Software and Hardware Asset Management Inventory Users & Group User HW/SW data Cost Center Usage data Business Unit Location HW & SW Assets Financial History Request Purchases Audit trail Contracts 5 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
6.
Discovery & Inventory
Challenges • Completeness & Accuracy – IT environment is dynamic – Devices are not always connected – Inventory is performed every few weeks • Different OS’s & Environments – Desktop and datacenter have their own challenges – Inventorying the datacenter is usually more difficult – Specific data is needed when virtualization is used • Security and access rights – Inventory requires administrator rights – Difficult to obtain in large organizations 6 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
7.
Inventory
Discovery & Inventory Types • Inventory can be: – Agent based: an agent is physically installed on the device – Agentless: an agent is executed remotely on the device – Remote: no agent is executed on the device; e.g. Oracle db • Device discovery methodologies: – Network discovery – Group Policy / Login script – Manually 7 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
8.
Inventory
Agent & Agentless inventory Available Data Packages Files Registry ISO Tag 8 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
9.
Device Based Inventory
Data Sources Packages • Found in Programs and Features or Add/Remove Programs (Windows), RPM packages (UNIX/Linux)… • Collecting and identifying software products is easy • Challenges: – Cannot be used to track usage – Data can be lost when the software product is repackaged – Discrepancies between installation and package data store – Not all publishers use packages – Product can be running on a machine without installation 9 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
10.
Device Based Inventory
Data Sources Files • Found on the device hard disk • The most accurate data source for identifying software • Challenges: – Requires full disk scan – The volume of files to be collected is large – The identification rules are complex and sometimes inaccurate – Products can be running on a machine without installation 10 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
11.
Device Based Inventory
Data Sources Registry • Can be remotely inventoried • Very accurate data source for identifying software • Challenges: – Need to know what to collect – Many times registry entries are left behind after software removal – Applies to Windows platform only – Products can be running on a machine without installation 11 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
12.
Device Based Inventory
Data Sources ISO 19770-2 Tag • The ISO 19770-2 provides a standard for software identification tags that contain authoritative identifying information for installed software. • The ISO 19770-2 is a XML file with a .swidtag extension … <swid:product_title id="e8_3_2">Adobe Photoshop CS3</swid:product_title> <swid:product_version id="e8_3_3"> <swid:name id="e8_3_3sub1">10.2</swid:name> … <swid:name>Adobe Systems Incorporated</swid:name> <swid:regid>regid.1986-12.com.adobe</swid:regid> </swid:software_creator> … • Challenges: – The adoption of the ISO tag is slow; it does not apply to legacy products – It requires hard disk scan – Few inventory tools capture this data – Product can be running on a machine without installation 12 © 2011 Flexera Software, Inc. | Company Confidential
13.
Network Based Inventory
Network Discovery and Inventory • Uses port sweep and network protocols (TCP, UDP…) • No agent required • Remote API calls can be performed • Challenges – Need to target the devices to be interrogated – Security issue – Applies to a limited number of software products • Examples: – DNS Server port 53 – Oracle TNS Listener ports 1521/1526 – SQL Server port 1434 – VMware ports 902/443 13 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
14.
Application Recognition
• Software Identification challenges: – What software product is used or installed? – What components are used or installed? – What products need a license? Desktop & Datacenter Recognition Process List of Applications Inventory •Files •Add/Remove Programs •Registry •ISO tag Application Recognition File Rule Application Name = Excel.exe If the file name equals Excel.exe and the version Name = Excel Version = 12.0.6214.1000 starts by 12.* and the publisher contains *Microsoft* Version = 2007 Publisher = Microsoft then the application is Microsoft Excel 2007 Publisher = Microsoft 14 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
15.
License Management Data
Requirements License Metrics Most license metrics can be classified in five main categories: • Device based Per Device, per server, per virtual machine… • User based Per user, named user, accounts, authorized user, external users, UVU (User Value Unit), concurrent users, infrequent users, … • Hardware property based Per core, processor, processor or core points, socket, PVU (Processor Value Unit), RVU (Resource Value Unit), tiered device, virtual memory, processor speed… • Usage based Per amount of time, number of accesses, feature used… • Miscellaneous Enterprise, Site, Per purchase order over 100K, per premium income… 15 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
16.
License Management &
Hardware Asset Management Hardware Inventory Requirements • Processor type • Number of Processors • Processor Speed • Number of cores • Memory • Number of sockets • Computer Model & Manufacturer Related Data: • Unique Identifier for each device: inventory ID, Network Name • Operating System • Last Logon User • Serial number, MAC Address • Casing 16 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
17.
Virtualization
Application Virtualization • Multiple technologies: Microsoft App-V, Citrix XenApp… • Device inventory will not capture virtualized applications • Two inventory possibilities: – Access rights – Usage • Used in VDI environments • Publishers licensing rules – Microsoft – Adobe – Access rights versus usage 17 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
18.
Virtualization Example –
MS Server Processor Soft Partitioning 18 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
19.
Virtualization Example –
MS Server Processor Soft Partitioning • Hardware: – 1 physical OSE (no SQL) • 1 physical proc w/ 2 cores – 1 virtual OSE (w/ SQL) • 2 virtual procs • Correct calculation: – 2 virtual procs / 2 cores per physical proc = 1 license 19 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
20.
Virtualization Example –
Oracle Processor Soft & Hard Partitioning Discovery and Inventory Process Inventory Oracle Oracle Tool Listener Database SNMP or Port Scanning SQL Queries Oracle Database License • Databases support options and management packs • Options/Management Packs can be inventoried only by database queries • Oracle Processor license is based on the number of processor cores • Oracle Processor License does not support soft partitioning 20 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
21.
Discovery and Inventory
Best Practices • Deploying an inventory solution is challenging • Use existing tools: – Configuration management – Usage monitoring – Environment specific tools – Publisher specific tools • Use all data sources and methodologies – One data source or methodology will not provide all the information • Only use new tools when needed 21 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
22.
Application Recognition Best
Practices • Quantity is nothing • Quality and accuracy are essential • The application recognition solution must: – Be up to date – Support different type of evidence – Allow complex rules; or – Contain the software product name from publishers – Be modifiable on site 22 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
23.
Recommendations
• No tool on the market will provide all the answers • Use what you have today; buy additional tools only when necessary – Assess what data is already available today – Locate areas where additional tools are needed: virtualization, Unix/Linux environments, Oracle, etc. • Use Inventory & App Recognition tools that: – Consolidate data from the multiple sources – Translate raw software inventory into meaningful product titles, versions, editions – Are updated frequently and have broad coverage 23 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential
24.
Thank you
Please submit your questions via the Live Meeting Q&A form. For more information: www.flexerasoftware.com/ELO Contacts: jemmitt@flexerasoftware.com vbrasseur@flexerasoftware.com 24 © 2011 Flexera Software, Inc. | Company Confidential
Descargar ahora