Software piracy is still a big issue. Customer overuse is still a big issue. So let’s talk about software compliance analytics and the data that helps you convert pirates into paying customers.
According to research from Microsoft and Adobe, 83% of users of pirated software in mature markets are legally-inclined and will pay for software. License overuse within existing accounts is often the result of complicated licensing technology or terms.
The good news is that vendors can detect installed software and identify unpaid use with software usage analytics, and then act on this intelligence to power their compliance and revenue recovery and generation strategies. The bottom line? The ability to use data to identify infringing users is critical because there’s a high potential to convert them.
Gartner has included software usage analytics in recent Hype Cycles, and defines it as “the detailed tracking and analysis of users’ interactions within a software application,” and cites compliance as one of the valuable insights it delivers.
Software compliance analytics is a fundamental building block to software vendors’ compliance programs. It enables compliance managers to reliably identify and generate actionable leads from unlicensed usage – whether that occurs through overt piracy or license overuse. Armed with this actionable intelligence, software providers are tapping a previously unidentifiable market and adding to their top line revenues with new and expansion license sales.
Are you responsible for fighting piracy and license compliance at a software company? This short video will show you how Revulytics’ proven solution enables you to identify unlicensed use and generate revenue without alienating users.
Vice President, Products & Strategy at Revulytics
Victor DeMarines brings extensive security product management and marketing experience to Revulytics, where he is responsible for product strategy and direction. He is a frequent speaker and author on topics including piracy, reverse engineering and the protection of intellectual property.
The chain of events set in motion by SAP’s actions against so-called “indirect access” (where 5,800 users utilized SAP’s software ...
Google’s top searches of 2018 included the World Cup, unicorn cakes and 1980’s fashion. While that’s all very exciting, the world ...
We thought it would be interesting to update our blog post from 2017 in which we looked at China’s Golden Week and its impact on ...