discovery, inventory and application recognition

24
Discovery, Inventory and Application Recognition December 2011

Upload: flexera-software

Post on 13-May-2015

1.055 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Discovery, Inventory and Application Recognition

Discovery, Inventory and Application Recognition

December 2011

Page 2: Discovery, Inventory and Application Recognition

Webinar Series

• 1st webinar (Nov)

How to get started on

a SAM program

• 2nd webinar– (Today)

Discovery, Inventory

& Application

Recognition

Level 1

• 3rd webinar– (Jan)

License & Contract

Management

Levels 2-3

• 4th webinar– (Feb)

Strategies for

License Optimization

Level 4

2 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Level 4 Optimized

Automated entitlement based license

management and optimization;

Level 3 Continuously

Compliant

Automated purchased vs. installed

license reconciliation; SAM processes

to maintain license compliance

Level 2 Managed

Perform purchased versus installed

license reconciliation on an ad hoc

basis; point in time management

Level 1 Installed

Identify software and hardware installed

Enterprise License Optimization Maturity Model

Page 3: Discovery, Inventory and Application Recognition

Speaker & Agenda

• License Management overview

• Device Based inventory

• Network based inventory

• Application Recognition

• Additional inventory requirements

• Virtualization

• License examples

• Recommendations

• Questions and Answers

3 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Vincent Brasseur

Director of Product

Management,

Flexera Software

Page 4: Discovery, Inventory and Application Recognition

License Management Goals

• Calculate your license position

– Reduce non-compliance costs and risks

– Eliminate over-spending on software; identify ‘shelfware’

• Manage Licenses and Contracts

– Know what the organization owns; understand licensing terms and conditions

– Pay for what you need and use

– Be audit ready

• Meet Organization Objectives

– Ensure each installation and use of a software product is licensed

– Provide financial forecasting

• Optimize the license position

– Minimize license consumption

– Deliver trend analysis and licensing forecasting

4 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Optimal $ $ Over-Licensed Out of

Compliance

Page 5: Discovery, Inventory and Application Recognition

HW & SW

Assets

Financial

License Management Data

5 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Inventory Users & Group

History

User

Cost Center

Business Unit

Location

Audit trail

Request

Purchases

Contracts

HW/SW data

Usage data

Software and Hardware Asset Management

Page 6: Discovery, Inventory and Application Recognition

• Completeness & Accuracy

– IT environment is dynamic

– Devices are not always connected

– Inventory is performed every few weeks

• Different OS’s & Environments

– Desktop and datacenter have their own challenges

– Inventorying the datacenter is usually more difficult

– Specific data is needed when virtualization is used

• Security and access rights

– Inventory requires administrator rights

– Difficult to obtain in large organizations

6 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Discovery & Inventory Challenges

Page 7: Discovery, Inventory and Application Recognition

Inventory

• Inventory can be:

– Agent based: an agent is physically installed on the device

– Agentless: an agent is executed remotely on the device

– Remote: no agent is executed on the device; e.g. Oracle db

• Device discovery methodologies:

– Network discovery

– Group Policy / Login script

– Manually

7 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Discovery & Inventory Types

Page 8: Discovery, Inventory and Application Recognition

Inventory

Available Data

8 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Agent & Agentless inventory

Packages Files

Registry ISO Tag

Page 9: Discovery, Inventory and Application Recognition

Device Based Inventory Data Sources

• Found in Programs and Features or Add/Remove

Programs (Windows), RPM packages (UNIX/Linux)…

• Collecting and identifying software products is easy

• Challenges:

– Cannot be used to track usage

– Data can be lost when the software product is repackaged

– Discrepancies between installation and package data store

– Not all publishers use packages

– Product can be running on a machine without installation

9 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Packages

Page 11: Discovery, Inventory and Application Recognition

Device Based Inventory Data Sources

• Can be remotely inventoried

• Very accurate data source for identifying software

• Challenges:

– Need to know what to collect

– Many times registry entries are left behind after software removal

– Applies to Windows platform only

– Products can be running on a machine without installation

11 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Registry

Page 12: Discovery, Inventory and Application Recognition

12 © 2011 Flexera Software, Inc. | Company Confidential

• The ISO 19770-2 provides a standard for software identification tags

that contain authoritative identifying information for installed software.

• The ISO 19770-2 is a XML file with a .swidtag extension …

<swid:product_title id="e8_3_2">Adobe Photoshop CS3</swid:product_title>

<swid:product_version id="e8_3_3">

<swid:name id="e8_3_3sub1">10.2</swid:name>

<swid:name>Adobe Systems Incorporated</swid:name>

<swid:regid>regid.1986-12.com.adobe</swid:regid>

</swid:software_creator>

• Challenges:

– The adoption of the ISO tag is slow; it does not apply to legacy products

– It requires hard disk scan

– Few inventory tools capture this data

– Product can be running on a machine without installation

Device Based Inventory Data Sources ISO 19770-2 Tag

Page 13: Discovery, Inventory and Application Recognition

• Uses port sweep and network protocols (TCP, UDP…)

• No agent required

• Remote API calls can be performed

• Challenges

– Need to target the devices to be interrogated

– Security issue

– Applies to a limited number of software products

• Examples:

– DNS Server port 53

– Oracle TNS Listener ports 1521/1526

– SQL Server port 1434

– VMware ports 902/443

13 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Network Based Inventory Network Discovery and Inventory

Page 14: Discovery, Inventory and Application Recognition

Application Recognition

• Software Identification challenges:

– What software product is used or installed?

– What components are used or installed?

– What products need a license?

14 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Desktop & Datacenter

Inventory List of Applications Recognition Process

File Name = Excel.exe

Version = 12.0.6214.1000

Publisher = Microsoft

Rule If the file name equals Excel.exe and the version

starts by 12.* and the publisher contains *Microsoft*

then the application is Microsoft Excel 2007

Application Name = Excel

Version = 2007

Publisher = Microsoft

•Files

•Add/Remove Programs

•Registry

•ISO tag Application Recognition

Page 15: Discovery, Inventory and Application Recognition

License Management Data Requirements

Most license metrics can be classified in five main

categories:

• Device based

Per Device, per server, per virtual machine…

• User based

Per user, named user, accounts, authorized user, external

users, UVU (User Value Unit), concurrent users,

infrequent users, …

• Hardware property based

Per core, processor, processor or core points, socket,

PVU (Processor Value Unit), RVU (Resource Value

Unit), tiered device, virtual memory, processor speed…

• Usage based

Per amount of time, number of accesses, feature used…

• Miscellaneous

Enterprise, Site, Per purchase order over 100K, per

premium income…

15 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

License Metrics

Page 16: Discovery, Inventory and Application Recognition

License Management & Hardware Asset Management

• Processor type

• Number of Processors

• Processor Speed

• Number of cores

• Memory

• Number of sockets

• Computer Model & Manufacturer

Related Data:

• Unique Identifier for each device: inventory ID, Network Name

• Operating System

• Last Logon User

• Serial number, MAC Address

• Casing

16 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Hardware Inventory Requirements

Page 17: Discovery, Inventory and Application Recognition

Virtualization

• Multiple technologies: Microsoft App-V, Citrix XenApp…

• Device inventory will not capture virtualized applications

• Two inventory possibilities:

– Access rights

– Usage

• Used in VDI environments

• Publishers licensing rules

– Microsoft

– Adobe

– Access rights versus usage

17 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Application Virtualization

Page 18: Discovery, Inventory and Application Recognition

18 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Soft Partitioning

Virtualization Example – MS Server Processor

Page 19: Discovery, Inventory and Application Recognition

19 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

• Hardware:

– 1 physical OSE (no SQL)

• 1 physical proc w/ 2 cores

– 1 virtual OSE (w/ SQL)

• 2 virtual procs

• Correct calculation:

– 2 virtual procs / 2 cores per

physical proc = 1 license

Soft Partitioning

Virtualization Example – MS Server Processor

Page 20: Discovery, Inventory and Application Recognition

20 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Inventory

Tool

SQL Queries

SNMP or Port Scanning

Oracle

Listener

Oracle

Database

Discovery and Inventory Process

Oracle Database License • Databases support options and management packs

• Options/Management Packs can be inventoried only by database queries

• Oracle Processor license is based on the number of processor cores

• Oracle Processor License does not support soft partitioning

Soft & Hard Partitioning

Virtualization Example – Oracle Processor

Page 21: Discovery, Inventory and Application Recognition

Discovery and Inventory Best Practices

• Deploying an inventory solution is challenging

• Use existing tools:

– Configuration management

– Usage monitoring

– Environment specific tools

– Publisher specific tools

• Use all data sources and methodologies

– One data source or methodology will not provide all the

information

• Only use new tools when needed

21 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Page 22: Discovery, Inventory and Application Recognition

Application Recognition Best Practices

• Quantity is nothing

• Quality and accuracy are essential

• The application recognition solution must:

– Be up to date

– Support different type of evidence

– Allow complex rules; or

– Contain the software product name from publishers

– Be modifiable on site

22 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Page 23: Discovery, Inventory and Application Recognition

• Use Inventory & App Recognition tools

that:

– Consolidate data from the multiple sources

– Translate raw software inventory into

meaningful product titles, versions, editions

– Are updated frequently and have broad

coverage

Recommendations

• No tool on the market will provide all the

answers

• Use what you have today; buy additional

tools only when necessary

– Assess what data is already available today

– Locate areas where additional tools are

needed: virtualization, Unix/Linux

environments, Oracle, etc.

23 © 2011 Flexera Software LLC. All rights reserved. | Company Confidential

Page 24: Discovery, Inventory and Application Recognition

Thank you

For more information: www.flexerasoftware.com/ELO

Contacts:

[email protected]

[email protected]

24 © 2011 Flexera Software, Inc. | Company Confidential

Please submit your questions via the Live Meeting Q&A form.