IBM License Metric Tool BUSINESS ADVANTAGES AND BENEFITS May 2017
Sub-capacity reporting and other benefits Explore the advantages and benefits of License Metric Tool License Metric Tool is required by IBM, and necessary to ensure proper PVU sub-capacity reporting. The sub-capacity reporting offers the opportunity for reduction in license costs, compared to the full capacity count. Learn more about the main features of License Metric Tool, and the benefits they bring. 2 IBM Security
Constant audit readiness Monitor your inventory and ensure audit readiness at any time License Metric Tool helps you maintain audit readiness by determining full and sub-capacity PVU license consumption for all your IBM products. Audits are an integral part of any bussiness and need to be cautiously conducted and prepared for. Regular use of License Metric Tool ensures a deep insight into your infrastructure. This kind of analysis educates you and your organization about the license consumption trends and possible license consumption peaks. 3 IBM Security
Sub-capacity and full capacity calculations Compare the pricing methods and reduce costs License Metric Tool allows sub-capacity and full capacity calculations. Thus, you can compare the full capacity and sub-capacity utilization rate, and see which pricing method is more beneficial for your infrastructure. 4 IBM Security
A comprehensive software and hardware inventory management Monitor your inventory and ensure savings in costs License Metric Tool is a centralized software and hardware inventory manager. License Metric Tool is a powerful tool that helps you control the software inventory and manage the licenses you own. Detailed calculations give you the opportunity to compare your current inventory with your actual business needs. That, in turn might result in millions of savings. 5 IBM Security
Hardware detection and reporting Explore your hardware inventory License Metric Tool allows you to view the hardware inventory and estimate the current number of endpoints. It discovers and lists the most important hardware details, such as: processor make, model and type, operating system, and host name. Hardware inventory also lists all the virtualizations and the supported public clouds that are used within your organization. 6 IBM Security
More than a software inventory manager Unify software that is used throughout your company License Metric Tool calculates license utilization, discovers and catalogs IBM software, and reports all hardware in your environment. License Metric Tool provides information about the path, release, and version of each IBM software instance in your environment. As a result, you can oversee what versions of any software are used in your organization, and ensure that they are unified. It is a good practice to always upgrade software to the latest versions for security and better performance. The latest versions are patched, and more secure. Currently, the majority of organizations are obliged to use latest technology. 7 IBM Security
technology Become a part of a family and enjoy the entire infrastructure License Metric Tool uses Platform to collect the required data from endpoints. Thanks to this, you can quickly deploy other applications from the family. Take advantage of flexibility of the server and clients, and deploy other applications without deploying additional enpoint components. Inventory Protection Lifecycle Compliance Patch 8 IBM Security
THANK YOU FOLLOW US ON: ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.