Both parties in the IT buying process desire a fair deal based on value, but too often wind up feeling exposed due to complexity, uncertainty, and risk surrounding software assets over time. Traditionally ISVs have relied heavily (or even exclusively) on a single-threaded approach to remediating the problems posed by the IT buying process. In that vein, the most commonly accepted industry approach is arguably the audit. However, ISVs should explore a portfolio approach to monetizing their software. A portfolio model would yield greater overall flexibility in navigating the spectrum between the sins of the past (revenue recapture) and the forward business relationship (sales
Compliance Analytics and Software Usage Analytics data (and core competencies in leveraging that data) are the backbone for any ISV in building a more diverse portfolio of engagement strategies to monetize its software. Data provides a deeper level of quality within any particular approach as well as for the implementation of a greater diversity of engagement strategies as part of an integrated portfolio. For purposes of this post, we will focus on leveraging compliance analytics data for the broadest impact to any program.
So what is compliance analytics data? It encompasses various specific forensic information documenting how the software is deployed and used within the IT estate. The type of information can include product names, quantities, license keys, the authenticity of the license, the scope of use, locations, and other elements that the vendor wants to track. Compliance Analytics data can be gathered through different means including platforms like Revulytics Compliance Intelligence and on a more limited basis through on-premise SAM tools. Compliance data can be collected through real-time telemetry or in batch processes as part of an engagement, with both configured to address concerns involving privacy and security.
Compliance analytics data can provide a variety of useful insights to the ISV when assessed for legitimacy, analyzed for trends, compared to known entitlement data, or ultimately placed in the context of the broader business relationship. Of note, but for perhaps a different post, would be the enhanced value when compliance analytics data is paired with software usage analytics data. A knowledgeable, skilled partner could assist an ISV in mining this data – and building overall best practices – to support multiple engagement strategies within the framework of a portfolio in monetizing the ISV’s software. Those engagement strategies would include among them anti-piracy, audit, compliance, and sales enablement.
A multi-faceted engagement strategy increases ISVs’ ability to engage and therefore broadens the overall addressable market available to the functional team responsible for monetizing the business. Traditionally, that team is narrowly focused on a single-threaded engagement strategy such as audit. The following graphic illustrates the broad components within an integrated portfolio engagement model spanning the spectrum of revenue recovery activities to selling into the ongoing business relationship.
Figure 1: Engagement Strategies
Prior to discussing how you might leverage compliance analytics data in the context of these four engagement strategies, it would be helpful to first address the basics and background of each category in more detail.
With anti-piracy, the focus is on illegal and/or otherwise counterfeit software. This approach is historically exemplified by the Business Software Alliance (BSA) and the Software Industry & Information Association (SIIA), which promise financial rewards for whistleblowers who provide incriminating information about piracy within their employer or partner organizations. Anti-piracy efforts have traditionally involved the software publisher working alongside law enforcement agencies, or filing lawsuits that typically invoke the U.S. Copyright Act or similar legislation in other countries. Resolution often includes penalties in addition to forcing the customers to purchase any pirated assets.
By contrast, the general focus of audit is on unlicensed software, not counterfeit software, and revolves around validating the deployment and use of the software in the licensee’s IT estate. Therefore, this approach typically does not engage law enforcement agencies and does not typically impose legal penalties. Rather, ISVs involve their own staff or leverage third-party firms – invoking the audit clause in their software license agreements – to audit the customer’s IT estate against their entitlements. In the event of an over-deployment, the customer is typically required to ‘true up’ using list prices, back support, interest, and the cost of the audit – all in accordance with the audit clause in the underlying agreements.
Compliance is similar to the audit approach in that the focus is again on unlicensed software. Hence ISVs will similarly use their own staff or leverage third-party firms to conduct license reviews of their customers. However, this approach is a ‘kinder, gentler’ one. The audit clauses in software license agreements are often not formally invoked though they may be referenced. The review is performed in a more amicable manner than an audit with consideration given to the customer – including potential
Sales enablement is a recent – and not yet widely adopted – engagement strategy. However, it offers the opportunity to reframe the value delivered and to enable improved decision-making between the parties. The focus here is to provide timely, complete, and accurate information in relation to the IT estate, the purchase history, and customer’s business requirements
In discussing compliance data as a complement to each of the four engagement strategies, we can frame categories of data for broader context and discussion. Four that are relevant would be:
One can utilize compliance analytics data – both ‘hard’ and ‘suspect’ – to support all four engagement strategies. Compliance analytics data certainly has a place in the context of the three revenue recapture strategies (i.e., anti-piracy, audit, and compliance) but can lend additional insight as part of the sales enablement strategy as well.
All of the engagement strategies discussed here are legitimate activities. They are complementary
Sales enablement creates a fact-based, objective foundation on which to sell and drive the business. There is a common DNA in the core competencies across all these activities in licensing, pricing, compliance, asset management and sales. But ISVs need not limit themselves to a single-threaded approach to cultivating their business and can increase their overall impact by developing a multi-faceted capability. A sturdy foundation of information, such as that provided by Compliance Intelligence and Usage Intelligence from Revulytics, is a key element supporting the people and process across every one of the approaches discussed here.
Given the unique nature – and infancy – of sales enablement as an engagement strategy, it is worth offering a few additional comments. Sales enablement is a value-added service to provide relevant, complete, and accurate information upon which a meaningful commercial discussion may occur between the ISV and its customers. Therefore, sales enablement operates in an interdisciplinary context to support the composite sales team (e.g., sales, technical consultants, deal teams, sales management, executives).
The access to present a more holistic, fact-based, and credible baseline of information provides a significant advantage to the ISV, particularly in competitive scenarios. In addition, it often leads to the identification of additional sales opportunities that were only partially framed, were not previously known, or were sub-optimally sized. Having good, reliable information can also significantly shorten the sales cycle via more credible, defined proposals. Given the customer-centric focus, sales enablement is not a static activity. There is a premium placed on continued innovation of new deliverables to drive additional value into the sales process. In addition to evolving qualitative elements on the value proposition and scoping, the engagement model is dynamic as well. Asset management may be tailored to support the objectives and scope in question and is not a ‘one-size fits all’
Vice President, Products & Strategy at Revulytics
Victor DeMarines brings extensive security product management and marketing experience to Revulytics, where he is responsible for product strategy and direction. He is a frequent speaker and author on topics including piracy, reverse engineering and the protection of intellectual property.
As long as there has been software, there has been software misuse: both pirated use (companies using pirated versions of ...
What is Software Piracy? Software piracy is the use of unlicensed software where the user has never paid the software vendor a ...