These white papers help you to understand the benefits of software identification tags in different organizational process requirements. Additional materials may be available to members in the members-only area of the site.

Analysis of Software Identification Tools

Author: Steve Klos
Title: Analysis of Software Identification Tools, May 2011
Publisher: TagVault.org
Abstract: Identifying which software products are installed on a computing device is similar to an archeological dig (i.e. trying to determine which software titles are installed based on various artifacts discovered on the device) and regularly results in incomplete and incorrect results. Unfortunately, compliance, logistics and security processes and procedures rely on this discovery data to manage an organization’s infrastructure.Incorrect data from software discovery utilities can and does result in:

  • Higher risk of being out of compliance with software entitlements, which can lead to audit costs and further costs from the audit’s outcomes.
  • Higher risk of malicious, out-of-date or non-patched software being installed and used within the organization, with the associated potential for loss of data or intellectual property, or higher IT costs.
  • Higher cost of specialized technical resources required to constantly create, monitor and update discovery procedures.
  • Higher switching costs for discovery tools due to complexities and incompatibilities between tools.

There are many tools on the market that provide discovery capabilities with varying degrees of success depending on the platform, publisher and third party tools used. This paper reviews six mainstream discovery and identification tools and provides criteria to consider when selecting a tool.

Download SWID Analysis


Software Purchasers Can Change the World

Author: Steve Klos
Title: Software Identification Talking Points
Publisher: TagVault.org
Abstract: Tired of the software identification mess? Software purchasers can make a difference today!Anyone who tells you that they know exactly what software they have installed, and that they have it all under control, is deceiving someone – themselves or you – or they are spending far too much money doing what they are doing. Software discovery tools have to make educated guesses and generalizations about much of what they find. The tools are much better than nothing – like a horse and cart are better than walking. But they are imperfect, because the publishers do not make it easy to determine exactly what is installed and needs to be paid for. So what happens when you get audited by the software publishers? They find copies, and versions, and violations of licensing terms and conditions which you did not expect, and you have to pay the price of not being able to control the software you have purchased when the publishers have not given you the necessary means for control.
Download SWID Taking Points


The Future of Software Asset Management

Author: Steve Klos
Title: The Future of Software Identification
Publisher: TagVault.org
Every organization that purchases and uses software has multiple reasons for knowing exactly what software is installed in their infrastructure and how best to manage it. The reasons fall into three major categories:
  • License Management
  • Security Rationalization
  • Organizational Infrastructure

These issues have a direct and immediate impact on software purchasers, but they also have an impact on software publishers and SAM tool and service providers.

This white paper explores some of the reasons that SAM programs are currently so difficult to implement, and what the market is doing to make it cheaper, easier and faster.

Download future of software id

Implementing SWID Tags as Part of an IT Process

Author: Paul ‘Doc’ Burnham
Title: Software Identification (SWID) Tags, A Strategic Solution
Publisher: Agnitio Advisors Inc.
Organizations understand that software is an expensive and valuable asset that needs to be managed effectively. Even if an organization has some level of software asset management (SAM) practice in place, the use of software identification (SWID) tags offers a leap forward for SAM tools and processes, promising accurate, automated identification of installed software.
Many organizations believe that in order to benefit from SWID tags, they must wait for software publishers to provide the tags. In fact, end-user organizations can create and deploy their own SWID tags and reap the benefits now. This white paper explains how.
Download SWID_tags_strategic_soluntion

Using ISO/IEC 19770-2 Software Identification Tags to Enhance Software Asset Management

This white paper shows how end-user organizations benefit from software identification tags.

Author: Paul ‘Doc’ Burnham
Title: Using ISO/IEC 19770-2 Software Identification Tags to Enhance Software Asset Management
Publisher: Agnitio Advisors Inc.
Abstract: Most organizations recognize the need to manage their software assets, and those same organizations also recognize that an effective software asset management (SAM) program is not something that just happens. Identifying all software installed in the organization’s environment is complex and difficult. This white paper provides an overview of how organizations can use and benefit from software identification tags to enhance their SAM programs.
Download Using_SWID_tag_to_enhance_inventory