Software Asset Management – Why Track Employee Application Use?

Application Tracking - Save Money on Unused Software

Did you know that underutilized software cost businesses a staggering $34 billion per year? With a properly executed Software Asset Management (SAM) strategy you can optimize the capital efficiency of your business and avoid paying for software that your employees aren’t using.

Monitor Employee Software Usage With BrowseReporter

BrowseReporter is a versatile computer user activity monitoring software that helps organizations enforce policies, meet compliance requirements, and understand how their users operate – no matter where they’re located.

BrowseReporter’s detailed user activity reports provide insights like…

  • Are our users following organizational policies? Are there any unwanted activities that need to be addressed?
  • How engaged are our users? Do they spend the majority of their time on-task? And…
  • Are our users making use of the software we’ve invested in? Should we reduce the number of licenses we pay for?

The computer activity data is collected by a software agent that is installed on your computers. The agent connects to a database on your organization’s network, allowing you to maintain complete control over the data.

BrowseReporter’s central console allows you to run reports on your user’s computer activities from the convenience of a web browser. 

There are dozens of reports to choose from, including…

  • User productivity reports with an overview of how much time was spent on websites that are productive, unproductive, or neutral. These classifications can be customized to match what is productive for your users.
  • There are also detailed internet activity reports that show you what websites your users have visited, how long they spent browsing each site, and the amount of bandwidth consumed.
  • And finally, the application usage reports show you what software is being used, how long it was used for, and who was using it.

BrowseReporter’s reports can be generated on-demand, on a set schedule, or automatically sent to your inbox to alert you of specific events.

Using the End-User Reports feature you can even provide your users with on-demand access to their own data. This lets them benefit from the insights that you have.

BrowseReporter can even be deployed with optional privacy-enhancing features.

You can…

  • Display a custom message to notify users that they are being monitored
  • Make the client visible in the system tray
  • Stop monitoring outside of standard operating hours, and…
  • Disable certain types of tracking altogether 

These optional features allow you to customize your BrowseReporter deployment to fit the needs of your organization.

BrowseReporter is best used in tandem with our web filtering software BrowseControl. Using both solutions provides you with the visibility and control you need to ensure that your organization’s computers are being used appropriately

Ready to make data-informed decisions? Get actionable insights into the activity of your users with a free trial of BrowseReporter.

Get started today by visiting

If you have any questions during your evaluation our technical support team is available to help you over a phone call, live chat, or email.

Thank you!

Need insights into what software is being used, how often, and who is using it? Start monitoring employee internet and app use today with a free trial of BrowseReporter, CurrentWare’s computer activity monitoring software.

BrowseReporter makes tracking software license usage possible with its easy-to-use reporting utility and dashboards. At a glance you can review the software usage of your employeesincluding timestamps of the applications they use each day, how frequently they use specific applications, and their most used applications.

Table of Contents

What is Software Asset Management and Why is it Important?

Software Asset Management (SAM) is a subset of IT Asset Management (ITAM) that focuses on the optimization of software usage, procurement, deployment, maintenance, and disposal in an organization. SAM includes the management of software assets, product versions, licenses, and the media used to deliver the software. Aside from license cost optimization SAM also manages the lifecycle of a software product and determines the software’s function in the organization.

A subset of SAM is Software License Management (SLM), which focuses on the optimization of software licenses used within an organization. The goal of SLM is to reduce costs by reducing the amount of unused licenses, optimizing the use of existing licenses, and consolidating redundant licenses. SLM also refers to the optimization of related costs associated with customer support and product maintenance.

SLM can be further refined to Software License Compliance (SLC), which is the practice of maintaining compliance with the terms agreed to in End User License Agreements (EULA). Common terms that organizations need to maintain compliance with include ensuring that only permitted end-users are operating the software, required device configurations are maintained, and that the software is only used in permitted geographic locations.

A successful software asset management (SAM) strategy will help you understand:

  • Which applications are we paying for?
  • How many employees within my organization actually use a given software?
  • Do we have enough (or too many) licenses?
  • What will the total costs of this software be throughout its lifecycle?

Throughout this article we will use Software Asset Management (SAM) as an all-encompassing term for both SLM and SLC.

The Goals & Benefits of Software Asset Management

Detect & reduce shadow IT

A man sits at his desk working on a computer. The shadowy figure of a colleague looms behind him.

Shadow IT – also known as Stealth IT, Client IT, or Fake IT – is any system, solution, or software that’s used by the employees of an organization without the knowledge and approval of the corporate IT department. 

An effective software asset management program will include a software audit that detects all of the programs that are currently used by the organization, including those that have not been officially adopted for use in the organization.

Reduce software license costs

A hand counts several $100 US bills

Underutilized software cost businesses in the US and UK an estimated $34 billion per year.  SAM helps organizations manage application sprawl and reduce software costs by tracking the utilization rate of applications. 

By monitoring the application use of their employees an organization can make data-informed decisions regarding the need to purchase new licenses and decommission underutilized software.

Reduce corporate risk

SAM is a critical component of corporate risk management. A failed software compliance audit can cost an organization as much as $150,000 in fines per violation. An audit can be failed due to the presence of pirated software, using more licenses than allotted, or other violations of the software’s End-User License Agreement (EULA).

These audits are more frequent than some may realize; a report from Gartner anticipated that 68 percent of enterprises get at least one audit request each year.

The Risks of Poor Software Asset Management

Compliance violations

A torso of a male professional in a suit. They are signing a contract

Each software vendor has their own End-User License Agreement (software license agreement) that the organization must adhere to. Without adequate oversight an organization runs the risk of violating their agreements to the vendors.

Increased costs

  • Fines & Penalties: Non-compliance fines from a failed software compliance audit (piracy, exceeding license entitlements, etc)
  • Increased SaaS Spend: Software-as-a-Service (SaaS) vendors often license their software by the user. If the organization is being billed for more users than are actively using the service they will have sub-optimal operating expenses. A proper SAM strategy must include SaaS spend management as a component.
  • Productivity Loss: If an insufficient amount of licenses are available for the legitimate need of the organization they will experience an increase in downtime. They may also lose billable hours to time spent procuring software for a need that is adequately met by an existing solution. 
  • Over Licensing: Poor software license management can cause the organization to purchase a greater volume of licenses than they legitimately need. 

Lost productivity

Without meaningful insights into the application usage of their employees an organization risks not having enough active software licenses. If all of the available licenses are already used they will experience significant downtime as their other employees cannot make use of the software. 

Monitoring the application usage of their employees provides organizations with the historical data they need to decide if a greater amount of licenses need to be procured to meet the demands of peak usage periods. 

How To Get Started With Software Asset Management

Audit Your Existing Software

Hey everyone, this is Dale here. I am the Digital Marketing Manager for CurrentWare.

In today’s video, I’d like to show off the new user activity data dashboards that were introduced to BrowseReporter in version 6.0.2. 

With these dashboards, you can review the productivity levels, web browsing, application usage, and bandwidth consumption of your entire workforce from the convenience of a web browser. 

These dashboards work in tandem with BrowseReporter’s computer activity reports to provide valuable insights into how technology is used in your organization.

Today’s video is just a sneak peek of what BrowseReporter is capable of; as time goes on you can expect to see further enhancements and data points added to these dashboards.

How the Dashboards Work

To begin using the new dashboards simply select the groups or users you would like to review, then select the desired time period.

Here at the top of the Overview dashboard, you will see a comparison between the data from this period and the previous time period. This gives you a high-level glance into whether the given metrics have increased or decreased during this timeframe.

Below that, we have graphs showing the Top 5 most used websites and applications. This shows you what computer activities your users spend the most time on.

Next, you’ll see the top 5 most active and idle users or groups. 

BrowseReporter automatically switches from Active Time Tracking to Idle Time Tracking when the user stops using their keyboard or mouse for a set period of time; this threshold can be changed to fit your organization’s needs.

Dashboards for Specific Groups/Users

Let’s drill down even further by clicking on one of our groups.

In this group sub-dashboard, you can see the most productive and unproductive users in the group, along with a dedicated Activity Log. 

Likewise, if we started out looking at a specific user rather than a group we would be taken to a sub-dashboard with that specific user’s online status and computer activity data.

Activity Log For Raw User Activity Data

The activity log lets you review the raw data that is used to populate the dashboards. 

You can use the search function to find specific information, use the column men u to adjust what columns appear, and sort the data that is displayed.

What data points are available in the Activity Log will vary depending on the dashboard you’re viewing.

For example, here in the Overview dashboard, we have access to Group or usernames along with several active and idle time metrics.

In the productivity dashboard, we’d have access to the group or user name, the number of users, and various productivity metrics.

Likewise, the Activity Log of the Websites dashboard shows domain names, active time, web content categories, and the productivity categorization for the domain.

The Activity Log of the Applications dashboard shows the application name, process name, active time, and idle time.

If you’d like to use the Activity Log data in a business intelligence tool you can easily export your user activity data to an Excel spreadsheet. 

If you’d like to provide a visual copy of the Activity Log to someone else, you can use the Export to PDF function. The PDF will display the Activity Log, including hyperlinks to the sub-dashboards of the groups or users shown. 

So long as the viewer has access to an operator account with sufficient permissions they’ll be able to follow these hyperlinks to learn more about the selected user or group.

To finish things off, let’s take a look at the dashboards offered in version 6.0.2

Productivity Dashboard

Switching over to the Productivity dashboard you will see how much time was spent on productive, unproductive, and neutral web browsing. You’ll also see who the most productive and unproductive users or groups are, as well as the top 5 websites and categories. 

What is considered productive can be customized by going to BrowseReporter’s Productivity Grading window; a shortcut to this can be found in the dashboard settings. 

From here you’ll be able to specify whether a given website category or a specific domain should be labeled as productive, unproductive, or neutral.

Internet Browsing Dashboard

Moving on to the Websites dashboard you will find the total active and idle time for the selected groups or users, the top 5 websites and most active users, as well as the web browsing Activity Log.

Application Usage Dashboard

In the applications dashboard, you will find similar graphs showing how much time was spent using applications, the top 5 most used applications, the 5 users that spent the most time using applications, and the application usage Activity Log.

Bandwidth Consumption Dashboard

Finally, we have the bandwidth usage dashboard. Here you’ll be able to see who is using the most bandwidth and how much bandwidth was used each day.  

If you’d like to see what websites are responsible for anomalies in bandwidth usage you can run BrowseReporter’s Bandwidth Usage by URL report. 

This report will show you the exact websites that are consuming bandwidth; from there you can decide whether the bandwidth hogs need to be blocked with BrowseControl or if other corrective measures need to be taken.


Ready to boost operational efficiency, employee productivity, and endpoint security with advanced awareness and control over how your employees use technology in the workplace? 

Get started today with a FREE trial of any of our software solutions. 

Simply visit to try our software for yourself or get in touch with us at

Thank you!

To start, you need to have a thorough understanding of all of the software currently being used by your business. You will need to catalogue the existing licenses your company has, make note of ongoing software expenses, and monitor employee computer activity to determine whether or not the existing solutions are being used.

  1. Audit your organization’s software procurement history for existing licenses
  2. Monitor employee application use to determine current utilization and detect the use of undocumented software
  3. Monitor employee web activity for the use of SaaS platforms
  4. Categorize the existing software and consolidate any redundant solutions
  5. Make note of any upcoming renewal dates for monthly/annual subscriptions or maintenance plans

Establish a Software Procurement Process

To reduce unnecessary software expenditure in your business you will need greater control over your software procurement and decommissioning process. This can be accomplished by establishing policies and procedures surrounding the acquisition, documentation, deployment, usage and retirement of software.

Your organization should have official software procurement procedures in place that defines who is permitted to make purchases, when those purchases can be made, and what channels must be consulted for approval before a solution can be purchased and deployed. This will reduce unexpected shadow IT costs and ensure that each software purchase is evaluated against your existing capabilities before approval.

Track & Control Employee Software Use (Software Metering)

BrowseReporter specific application usage dashboard

The practice of tracking and maintaining software licenses is known as software metering. The goal of software metering is to ensure that license limits are enforced and that licenses are available for each user that needs one. This practice can be further split into two major categories: passive software metering and active software metering

Passive software metering: Application use is monitored but users are not actively denied access to the software. This provides natural user activity insights that can help determine the number of licenses needed. 

Active software metering: Application use is monitored and access can be denied based on a given set of parameters. For example, an organization with a limited amount of licenses could schedule application permissions to limit the number of users that can access the software at a given time.

BrowseReporter makes tracking software utilization possible with its easy-to-use reporting utility and dashboards. At a glance, you can review the software usage of your employees, including timestamps of the applications they use each day, how frequently they use specific applications, and their most used applications.

Organizations can further reduce unauthorized software use with an application blocker. Employees that are not authorized to use a given solution can be proactively blocked from launching the program, reducing the opportunity for licenses to be activated without a legitimate need.

Ready to start monitoring and restricting software use in your company? Get started with a FREE trial.

Frequently Asked Questions

What is an End User License Agreement (EULA)?

An End User License Agreement (EULA) is a legal agreement between a software vendor and the user of the software. Software companies use EULAs to protect themselves by binding the users of the software with the vendor’s terms, rules or guidelines. The purpose of a EULA is to communicate the acceptable use of the software and establish a legal precedent for enforcement should an end-user misuse the software.

Common stipulations of a EULA include:
1) Limits to how many devices can have the software installed on it
2) Forbidding the reverse-engineering of the software
3) Stipulation that protect the vendor from lawsuits related to the use of their product
4) Geolocation restrictions
5) Who is permitted to use the software (third parties, employee vs non-employee, etc)

What is the difference between Software Asset Management (SAM) and Software License Management (SLM)?

Software Asset Management (SAM) is a subset of IT Asset Management (ITAM) that focuses on the optimization of software usage, procurement, deployment, maintenance, and disposal in an organization. SAM includes the management of software assets, product versions, licenses, and the media used to deliver the software. Aside from license cost optimization SAM also manages the lifecycle of a software product and determines the software’s function in the organization.

Common objectives of Software Asset Management include:
• Reducing the complexity of technology in the organization
• Reducing the lifecycle costs of a software product
• Creating a strategic plan for managing new and existing software in the organization

Software License Management (SLM) is a subset of SAM. It focuses on the optimization of software licenses used within an organization. The goal of SLM is to reduce costs by reducing the amount of unused licenses, optimizing the use of existing licenses, and consolidating redundant licenses. SLM also refers to the optimization of related costs associated with customer support and product maintenance.

Common objectives of Software License Management include:
• Reducing costs directly associated with licenses such as over-licensing/under-licensing, maintenance costs, and support costs.
• Ensuring that the correct licenses are available (e.g. product version)
• Reducing software deployment costs by determining the legitimate licensing needs of the organization and consolidating/expanding as needed

What Are the Different Types of Software Licenses?

Many different types of software licenses exist. The types of licenses available are generally categorized by their intended use and volume.

Examples of software license types
Evaluation license: A limited-time or limited-use license that is intended to be used to provide the user with a demonstration of the product before purchasing.

Concurrent license: A license that can be shared by a designated number of multiple users simultaneously. For example, if you have 6 concurrent licenses you can have up to 6 users operating the software simultaneously; the seventh simultaneous user would not be permitted to use the software. This is also known as a floating license.

Perpetual license: This license type grants access to the current version of the software for a one-time purchase. 

Subscription license: This type of license grants access to the software for a monthly or annual fee. This fee is typically based on the amount of users.

Named user license: A license that is intended for use by a specific individual user.

Proprietary: The creator of the software reserves all rights to the product. This type of license often includes stipulations that prohibit its modification or redistribution.

Free and open-source software (FOSS): A software license that gives the user unlimited rights to modify and reuse the software’s code. 


Sub-optimal software licensing is a significant source of capital inefficiency for many organizations. By tracking the internet and application usage of your employees you can ensure that the SaaS solutions and software products you invest in are truly necessary and used to their full potential. You can identify which products require a greater volume of licenses and which products can be decommissioned. 

Monitor & Control Application Use with CurrentWare

Dale Strickland
Dale Strickland
Dale Strickland is the Digital Marketing Manager for CurrentWare, a global provider of user activity monitoring, web filtering, and device control software. Dale’s diverse multimedia background allows him the opportunity to produce a variety of content for CurrentWare including blogs, infographics, videos, eBooks, and social media shareables.