Software License Management (SLM) used to be about avoiding audits and penalties for being under-licensed. But today, many organizations are over-licensed and paying annually for maintenance and applications that are not used and sometimes not even installed. Of course it’s easier to simply count the number of desktops, laptops and servers and purchase a volume licensing agreement from each major vendor that covers everything. But how much money are you wasting annually by doing this?

Many organizations also do not have an automated way to check the vendors’ audit data. Prior to the audit, an organization should know its license position, both installed and used products and license rights purchased. This is particularly important for server software, where the license is usually attached to a physical server, but the software is running on virtual guest operating systems. Many organizations also spend the majority of their software budget on server software, so it is particularly important to have accurate and up-to-date data on your server installations for Microsoft, Oracle, IBM, Adobe, ESRI and others.

Belarc’s unique features for SLM

Belarc’s products offer the following unique features to help manage and optimize your SLM task:

  • Belarc obtained a U.S. patent in 2013 which automatically determines when all installed software was last used. This feature is very useful for software harvesting, where instead of purchasing additional copies of Project, Visio or Office Pro, for example, these packages can be moved from desktops where they are under-utilized to those who need them, thereby avoiding the cost of additional purchases and maintenance. Belarc’s method discovers the last used time of all the installed applications immediately and does not need to be installed for six months to a year before the data can be used.
  • On the server side, BelManage automatically discovers all of the virtual machines (VMs) and the dependency mapping between the VM guests and the physical host machines. This data is essential for licensing server software such as SQL Server, Windows Server and Oracle databases.
    This information is used in the Data Analytics reports which combine the discovered server data with the licensing metrics for these products and the purchase records. BelManage supports Windows, VMware and Linux hypervisors and the Windows, Linux and Solaris (x86) server operating systems.

This is where a licensing tool such as Belarc’s Data Analytics module can be very helpful, because it combines the discovered instances of software, with our customer’s purchase records and the current product licensing metrics from the vendors. This also allows our end-users to run what-if scenarios to see what licensing scheme works best for their organization.

For more information, white papers or a demo, please send an email to

Cyber Security

Many cyber attacks today, such as the WannaCry ransomware, are not stopped by traditional cyber security tools such as anti-virus, firewalls or intrusion detection and prevention systems. The solution to stopping today’s attacks is to go back to the basics of cyber security and implement standard security controls and monitor them on a continuous basis. BelManage and BelSecure support the Center for Internet Security's (CIS) Top 5 Controls, with the following:

  • Complete listing of all hardware including desktops, laptops, servers, virtual machines, tablets and phones. Configuration details include make, model, serial number, BIOS or UEFI, operating system, group policies applied, USB storage device usage, encryption status, and more. (CIS Control #1)
  • Complete listing of all installed software including versions and last time used. Ability to automatically compare installed software with standard images or approved software. Flags unused software as candidates to be removed. (CIS Control #2)
  • Comparison of configurations to the US Government Configuration Baselines (USGCB). (CIS Control #3)
  • Automatic vulnerability assessment based on published vulnerabilities from Microsoft, Adobe, Oracle Java and Apple. (CIS Control #4)
  • Detailed information on both local and domain user logins by host and privileges, and the ability to automatically track user account changes such as elevated privileges. (CIS Control #5)

To learn more, please request our white papers, “Securing the Enterprise - Cyber Security Myths and Reality” and “Mapping the NIST security controls” by sending an email to:

Configuration Management

Automatically track detailed software, hardware and security configurations

Reduce your IT operating costs by identifying older versions or unused applications; improve your cyber security resilience; plan and automate an operating system migration. You can accomplish this and more with an automated, enterprise wide repository of detailed software, hardware and security configurations.