Software Identification Understanding the Methodologies (And Why it Matters) Kris Barker Co-founder & CEO Express Metrix / Apptria Technologies.

Slides:



Advertisements
Similar presentations
System Administrator Roles in Supporting Site Customizations Lynn Ritger Software Integrations Coordinator, FASTER Asset Solutions.
Advertisements

IATI Technical Advisory Group Technical Proposals Simon Parrish IATI Technical Advisory Group, DIPR March 2010.
SolidWorks Enterprise PDM Data Loading Strategies
SBS Vendor Management™
How to be a less attractive software audit target Helpful intelligence from License Dashboard Presented by: Matt Fisher, Director.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
Software Asset Management (SAM) ITS Offsite Workshop 2002 November 8, 2002.
Windows Forms 2.0 – ClickOnce Stephen Turner Software Design Engineer
Kalpesh Patel Ramprabhu Rathnam
Software Distribution in Microsoft System Center Configuration Manager v.Next: Part 1.
High-Level Assessment Month Year
Configuration Management
The Premier Software Usage Analysis and Reporting Toolset Maximizing Value for Software Users.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
How To Keep Up With Security Patches Eric Schultze Security Strategies Microsoft.
Your CMDB and PowerShell DSC: DevOps Techniques
VMware vCenter Server Module 4.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW Understand the difference between service.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW  Understand the difference between service.
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
© 2006 Jupitermedia Corporation Webcast TitleSuccessful Rollout Planning 1 January 19, :00pm EST, 11:00am PST George Spafford, President Spafford.
OFC 322 Building Office Research Web Services: Exposing Corporate Data Through Office Brian Jones Program Manager Authoring Services Martin Sawicki Lead.
Linux Operations and Administration

Threat & Virus best practices Denver Security & Compliance User Group March 17, 2010 Presenter: Chris Sandalcidi, CISSP - Symantec.
Classroom User Training June 29, 2005 Presented by:
Using Microsoft ACCESS to develop small to medium applications on campus.
IAITAM 2009 Annual Conference & Exhibition Bringing Green Together Utilizing Software Metering to Drive Down IT Costs Kris Barker Co-Founder & CEO, Express.
Using the WDK for Windows Logo and Signature Testing Craig Rowland Program Manager Windows Driver Kits Microsoft Corporation.
Honeypot and Intrusion Detection System
1 Lecture 19 Configuration Management Software Engineering.
 To explain the importance of software configuration management (CM)  To describe key CM activities namely CM planning, change management, version management.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CERN IT Department CH-1211 Genève 23 Switzerland t Windows Desktop Applications Life-cycle Management Sebastien Dellabella, Rafal Otto Internet.
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
Computer Emergency Notification System (CENS)
(Business) Process Centric Exchanges
Chapter 17 Creating a Database.
Systems Management Server 2.0: Backup and Recovery Overview SMS Recovery Web Site location: Updated.
Paul Butterworth Management Technology Architect
HASP ® SRM Enabling Business Growth through Software Rights Management All Rights Reserved © 2007 Aladdin Knowledge Systems. Yariv Drory International.
Master Data Management & Microsoft Master Data Services Presented By: Jeff Prom Data Architect MCTS - Business Intelligence (2008), Admin (2008), Developer.
SONIC-3: Creating Large Scale Installations & Deployments Andrew S. Neumann Principal Engineer Progress Sonic.
Paul Cooke - CISSP Director Microsoft Session Code: CLI322.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Open Solutions for a Changing World™ Copyright 2005, Data Access Worldwide June 6-9, 2005 Key Biscayne, Florida 1 Application Deployment Stephen W. Meeley.
Case Study on Redlining at the ISO Chandi Perera
SIP PUBLISH Method Jonathan Rosenberg dynamicsoft.
Configuring and Deploying Web Applications Lesson 7.
Intro to Power BI Azhagappan Arunachalam.  Senior Database Architect   PowerBICentral.com  (blog on getting started.
Accurate  Consistent  Compliant Contact: i4i the structured content company the structured content company.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Copyright © New Signature Who we are: Focused on consistently delivering great customer experiences. What we do: We help you transform your business.
ILMT/BigFix Inventory Demo
David Hatten Developer, UrbanCode 17 October 2013
Best Practices for Dynamics NAV Administration and Security
Overview – SOE PatchTT November 2015.
Overview – SOE PatchTT December 2013.
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Migrating Oracle Forms Using Oracle Application Express
Acrobat DC November Release
Protocols and Layering
Which is right for your business, Office 365 or Microsoft 365?
Which is right for your business, Office 365 or Microsoft 365?
Microsoft Virtual Academy
TechEd /23/2019 9:23 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Presentation transcript:

Software Identification Understanding the Methodologies (And Why it Matters) Kris Barker Co-founder & CEO Express Metrix / Apptria Technologies

Agenda  Software Identification – Why Do We Care?  The Role of SAM Tools  Identification Challenges  Identification Methodologies  Software Tagging Standard  Technology Selection Criteria  Summary and Q&A

About Express Metrix  Recognized leader in IT asset management solutions  Express Software Manager (flagship product) known for superior software identification  Software catalog under development over 15 years  Launched Apptria Technologies in June, 2011 to help ISVs improve identification within their products

Software Identification: Why Do We Care?  License compliance  Cost control (license “right-sizing”)  Corporate software standards  Migration planning  Version control  Security (malware)  Nuisance applications  Network impact

The Role of SAM Tools  SAM is a process  Tools are a part of the process  Software identification is part of the tool ▫Accuracy should be key evaluation criteria ▫Identification is not foolproof ∴ tools must be flexible!

SAM Tool 3-Step Process 1. Data Collection (discover what’s out there) 2. Identification (recognize & normalize) 3. Reconciliation (compare to entitlements)

Where Identification Takes Place  At the point of data collection ▫Locally (resident agent) ▫Remotely (remote access)  On the back end ▫From collected raw data ▫Based on other identification criteria

Identification Challenges – Inconsistency Rules!  Evals, betas, RCs  Non-standard installation techniques (unzip / copy vs. install, non-MSI installs)  Inconsistently specified data (names, versioning, etc.)  Homegrown applications  Installation based on components vs. licensable entities  Suites and application editions  Application plugins / non-executable applications  Scarcity of ISO software id tagging  Etc.

Identification Methodologies  Registry (Add / Remove) analysis  Installer (MSI) database  File header analysis  Software identification database  Software id tagging

Registry (Add / Remove) Analysis Identification based on values in the registry and/or items shown in Add / Remove Programs  Pros ▫ Easy to collect (including remotely) ▫ Fast  Cons ▫ Limited based on installation mechanism (incomplete) ▫ Does not match 1-to-1 with entitlement requirements ▫ May not sufficiently indicate/include version and/or SP level ▫ May not include installation location information ▫ May be inconsistent across releases

Installer (MSI) Database Information obtained by querying the installed application database  Pros ▫ Easy to collect basic data ▫ Can also collect component relationships, etc.  Cons ▫ Limited based on installation method (MSI) ▫ May not match 1-to-1 with entitlement requirements ▫ May not sufficiently indicate/include version and/or SP level ▫ May be inconsistent across releases

File Header Analysis Information contained within header of application executable files  Pros ▫ Simple process (disk scan) ▫ Finds everything executable  Cons ▫ Requires full disk scan ▫ Requires that each file be opened/read ▫ Can’t tell file/application/entitlement relationship ▫ Can’t completely determine suites ▫ Data often inconsistent/incomplete ▫ Shared component data may not be useful

Software Identification Database (Software Catalog) Collected file and other signatures compared against a database of normalized applications  Pros ▫ Can include file/application/entitlement relationship ▫ Normalized, consistent application data (apples to apples) ▫ Can handle suites, editions, other “more than.exe” apps ▫ Can include other related information (categories, use rights)  Cons ▫ Never 100% complete ▫ Must be regularly updated

Express Software Identification Database (ESID)*  Identification method utilized by Express Software Manager (client collects raw inventory/usage data)  Built on file information derived from combination of:  Registry analysis  Installer database  File header analysis  Start menu  Software id tags  Etc.  Designed to allow software to be organized and viewed based on licensing/entitlement  Ensures normalization / consistency  Updated monthly * OEMed to technology providers as the Apptria Software Catalog

Express Software Identification Database

Software ID Tagging Identification based on client-resident “tags” indicating the presence of applications  Pros ▫ Normalized identification present on client ▫ Doesn’t depend on installation mechanism ▫ Can be present without any local component/executable ▫ ISO standard ▫ Relationship to entitlement standard for reconciliation  Cons ▫ Not (yet) widely adopted ▫ Questionable relevancy for older apps ▫ Mixed environments create tool challenges

Software Tagging Standard  ISO standard in place since November, 2009  TagVault.org created as registration authority and information hub (info, tools, source code, etc.)  End-user interest ▫Large companies starting to request from vendors ▫Push from governmental agencies  Publisher / tool support ▫Adobe & Symantec leading the way ▫Most tool vendors have stated or planned support ▫Microsoft recently announced it will support  Entitlement ( ) standard work in progress

Technology Selection Criteria  Collects everything (or close to it!)  Normalizes identified titles/vendors  Identifies with entitlements in mind  Provides means of handling unidentified commercial apps and homegrown apps  Analyzes and presents data in a way that addresses business issues

Summary  Normalized, thorough identification is critical for effective SAM  Tools utilize different (and sometimes multiple) methods, each with pros and cons  Software tagging provides the promise of standardized identification, but timeframe is uncertain  Tools will always require some manual intervention – no identification method is perfect

Learn More About Express Software Manager 30 day Evaluation ExpressMetrix.com/trial Live Product Demonstration ExpressMetrix.com/products/webinars Self-Guided Flash Demo ExpressMetrix.com/products/demo

Questions? Kris Barker

Learn More About Express Software Manager 30 day Evaluation ExpressMetrix.com/trial Live Product Demonstration ExpressMetrix.com/products/webinars Self-Guided Flash Demo ExpressMetrix.com/products/demo