SAM & Licensing

SAM involves the integration of human resources, processes and technologies so that software licenses can be tracked, evaluated and managed and used. The objective is to reduce the costs with IT investments, with human resources (involved in the analysis of needs, procurement, administration and monitoring of these investments) and the inherent risk resulting from owning and managing software assets, without compromising the level of technology and services necessary for the organization for to operate at an optimal level.

Companies that recognize the value of a SAM program and choose to implement it have been able to:

  • reduces TCO (total cost of ownership or total cost of ownership / ownership) relative to IT assets by eliminating manual, time-consuming, otherwise necessary IT audits to determine areas where the organization spends more than necessary on software licenses and areas where can reduce costs with technical support;
  • manage technology changes through the use of procurement software templates (patterns that fit both current and future needs) and by collecting data that helps migrate technology and plan for upgrades;
  • minimize security risks by preventing the use of illegal software and imposing IT standards at the PC level;
  • limit the risk of non-compliance by identifying all PCs that have installed unlicensed applications, prevent situations where employees end up using unlicensed software, and be able to generate and deliver accurate reports to manufacturers if they come for an audit software (when purchasing a software product you receive only the right to use the product in the contract terms and conditions, and the manufacturer has the right, directly or through third parties, to request the audit of your company to verify that by using the purchased applications you comply with the terms and conditions of the contract. license for each type of product / license installed).

Activities included in the SAM stage:

  • evaluation of the existing IT environment (existing platforms, targeted software);
  • defining the necessary human resources (besides IT, SAM also extends to other departments: procurement, legal. In addition, we need to define the team and the tasks for which each is responsible);
  • analysis for establishing the SAM software solution (based on minimum criteria such as: hardware inventory reporting, integrated software inventory, report usage of salad applications and differences between installed and licensed applications, reporting and updating infrastructure changes);
  • setting the parameters and running the inventory;
  • checking the degree of use of the applications;
  • matching the software inventory used with the licenses held;
  • documentation and communication of policies and procedures (regarding software purchases, use of software applications, tracking of licenses, etc.);
  • setting future steps for SAM processes (a SAM program cannot be considered a one-time project, it must be systematically reviewed, evaluated and modified so as to always meet the business requirements of the organization);
  • the document generated after the SAM step contains all the elements resulting from the steps mentioned above.

Portfolio Categories:


Project Management

Main Areas of Speciality

  • Implementation of integrated IT systems
  • Implementation of projects with European funding

Stages

  • initiating the projects
  • selecting and adjusting the project methodology
  • integrated planning and organising for acquiring the task documents
  • planning task management and project changes
  • estimating costs and creating project budgets
  • planning activities, generating completion chart
  • organising project teams
  • organising and planning purchase under the project
  • management of challenges and risks associated to the project

 

 

Portfolio Categories:


Security Audit

Guaranteesthat dangers threatening the company, as well as potential data loss are eliminated successfully, with clear view on the subsequent stages in the process of securing and protecting the company.

  • Penetration Testing – using automated scanning tools and ‘manual’ system operation methods.
    • testing of communication routes
    • IT system testing
  • Audit of Sites and Web Application Vulnerabilities
    • frontend / backend
    • manual testing, no software scanning applications
    • requires list of URLs and possibly a temporary user account

Attacks can be XSS Cross-Site Scripting, CSRF Cross-Site Request Forgery, File Execution, SQL Injection, Improper Error Handling, Remote File Inclusion, Directory Traversal, Brute Force, Password Guessing etc.

123

Portfolio Categories:


Hardware & Software Architecture

Pre-Implementation

  • Analysis/Consulting
    • evaluation of the current and future condition of the systems based on the customers’ needs/expectations
    • speciality consulting on transferring from current to future condition.
  • Design
    • design specifications of the system requested by the customer (architecture; functionality; project deployment planning, etc.)
  • Audit
    • impartial measuring of the compliance of an IT system against certain standards, rules, methodologies, normative documents or target goals
    • 3-stage audit process: gathering information; actual evaluation; reporting

Implementation

  • Installation
    • basic energization of the system requested by the client.
    • Installation of hardware products is generally preceded by site preparation, which is usually the client’s responsibility.
  • Analysis/Consulting
  • Design
  • Configuration/adaptation
  • Audit
  • Technical assistance
    • the customer is assisted in carrying out specific operations on their own IT system.
  • Software development
    • creating/modifying software solutions according to the customer’s specific needs.
  • Specific training
    • training for the customers’ staff with a view to training IT skills in the requested areas of interest.

Post-Implementation

  • Technical assistance
    • proficient speciality support in repairing, developing, assembling or installing, testing, maintaining or any other kind of technical service in the form of training, improvement training, transfer of speciality technical information, skills, consulting services. Technical assistance includes verbal assistance (delivered by phone).
  • Maintenance
    • maintenance service; performed proactively, rather than determined by an event, upon the supplier’s initiative, according to a previously agreed schedule.
  • Dysfunction repair
    • corrective support services upon the customer’s initiative, on occurrence of unforeseen events. On a case-by-case basis, we can guarantee to solve these events according to predetermined rules (SLA – Service Level Agreement).

Portfolio Categories: