Did you know that underutilized software cost businesses a staggering $34 billion per year? With a properly executed Software Asset Management (SAM) strategy you can optimize the capital efficiency of your business and avoid paying for software that your employees aren’t using.
BrowseReporter is a versatile computer user activity monitoring software that helps organizations enforce policies, meet compliance requirements, and understand how their users operate – no matter where they’re located.
BrowseReporter’s detailed user activity reports provide insights like…
The computer activity data is collected by a software agent that is installed on your computers. The agent connects to a database on your organization’s network, allowing you to maintain complete control over the data.
BrowseReporter’s central console allows you to run reports on your user’s computer activities from the convenience of a web browser.
There are dozens of reports to choose from, including…
BrowseReporter’s reports can be generated on-demand, on a set schedule, or automatically sent to your inbox to alert you of specific events.
Using the End-User Reports feature you can even provide your users with on-demand access to their own data. This lets them benefit from the insights that you have.
BrowseReporter can even be deployed with optional privacy-enhancing features.
You can…
These optional features allow you to customize your BrowseReporter deployment to fit the needs of your organization.
BrowseReporter is best used in tandem with our web filtering software BrowseControl. Using both solutions provides you with the visibility and control you need to ensure that your organization’s computers are being used appropriately
Ready to make data-informed decisions? Get actionable insights into the activity of your users with a free trial of BrowseReporter.
Get started today by visiting CurrentWare.com/Download
If you have any questions during your evaluation our technical support team is available to help you over a phone call, live chat, or email.
Thank you!
Need insights into what software is being used, how often, and who is using it? Start monitoring employee internet and app use today with a free trial of BrowseReporter, CurrentWare’s computer activity monitoring software.
BrowseReporter makes tracking software license usage possible with its easy-to-use reporting utility and dashboards. At a glance you can review the software usage of your employees, including timestamps of the applications they use each day, how frequently they use specific applications, and their most used applications.
Table of ContentsSoftware Asset Management (SAM) is a subset of IT Asset Management (ITAM) that focuses on the optimization of software usage, procurement, deployment, maintenance, and disposal in an organization. SAM includes the management of software assets, product versions, licenses, and the media used to deliver the software. Aside from license cost optimization SAM also manages the lifecycle of a software product and determines the software’s function in the organization.
A subset of SAM is Software License Management (SLM), which focuses on the optimization of software licenses used within an organization. The goal of SLM is to reduce costs by reducing the amount of unused licenses, optimizing the use of existing licenses, and consolidating redundant licenses. SLM also refers to the optimization of related costs associated with customer support and product maintenance.
SLM can be further refined to Software License Compliance (SLC), which is the practice of maintaining compliance with the terms agreed to in End User License Agreements (EULA). Common terms that organizations need to maintain compliance with include ensuring that only permitted end-users are operating the software, required device configurations are maintained, and that the software is only used in permitted geographic locations.
A successful software asset management (SAM) strategy will help you understand:
Throughout this article we will use Software Asset Management (SAM) as an all-encompassing term for both SLM and SLC.
Shadow IT – also known as Stealth IT, Client IT, or Fake IT – is any system, solution, or software that’s used by the employees of an organization without the knowledge and approval of the corporate IT department.
An effective software asset management program will include a software audit that detects all of the programs that are currently used by the organization, including those that have not been officially adopted for use in the organization.
Underutilized software cost businesses in the US and UK an estimated $34 billion per year. SAM helps organizations manage application sprawl and reduce software costs by tracking the utilization rate of applications.
By monitoring the application use of their employees an organization can make data-informed decisions regarding the need to purchase new licenses and decommission underutilized software.
SAM is a critical component of corporate risk management. A failed software compliance audit can cost an organization as much as $150,000 in fines per violation. An audit can be failed due to the presence of pirated software, using more licenses than allotted, or other violations of the software’s End-User License Agreement (EULA).
These audits are more frequent than some may realize; a report from Gartner anticipated that 68 percent of enterprises get at least one audit request each year.
Each software vendor has their own End-User License Agreement (software license agreement) that the organization must adhere to. Without adequate oversight an organization runs the risk of violating their agreements to the vendors.
Without meaningful insights into the application usage of their employees an organization risks not having enough active software licenses. If all of the available licenses are already used they will experience significant downtime as their other employees cannot make use of the software.
Monitoring the application usage of their employees provides organizations with the historical data they need to decide if a greater amount of licenses need to be procured to meet the demands of peak usage periods.
Hey everyone, this is Dale here. I am the Digital Marketing Manager for CurrentWare.
In today’s video, I’d like to show off the new user activity data dashboards that were introduced to BrowseReporter in version 6.0.2.
With these dashboards, you can review the productivity levels, web browsing, application usage, and bandwidth consumption of your entire workforce from the convenience of a web browser.
These dashboards work in tandem with BrowseReporter’s computer activity reports to provide valuable insights into how technology is used in your organization.
Today’s video is just a sneak peek of what BrowseReporter is capable of; as time goes on you can expect to see further enhancements and data points added to these dashboards.
To begin using the new dashboards simply select the groups or users you would like to review, then select the desired time period.
Here at the top of the Overview dashboard, you will see a comparison between the data from this period and the previous time period. This gives you a high-level glance into whether the given metrics have increased or decreased during this timeframe.
Below that, we have graphs showing the Top 5 most used websites and applications. This shows you what computer activities your users spend the most time on.
Next, you’ll see the top 5 most active and idle users or groups.
BrowseReporter automatically switches from Active Time Tracking to Idle Time Tracking when the user stops using their keyboard or mouse for a set period of time; this threshold can be changed to fit your organization’s needs.
Let’s drill down even further by clicking on one of our groups.
In this group sub-dashboard, you can see the most productive and unproductive users in the group, along with a dedicated Activity Log.
Likewise, if we started out looking at a specific user rather than a group we would be taken to a sub-dashboard with that specific user’s online status and computer activity data.
The activity log lets you review the raw data that is used to populate the dashboards.
You can use the search function to find specific information, use the column men u to adjust what columns appear, and sort the data that is displayed.
What data points are available in the Activity Log will vary depending on the dashboard you’re viewing.
For example, here in the Overview dashboard, we have access to Group or usernames along with several active and idle time metrics.
In the productivity dashboard, we’d have access to the group or user name, the number of users, and various productivity metrics.
Likewise, the Activity Log of the Websites dashboard shows domain names, active time, web content categories, and the productivity categorization for the domain.
The Activity Log of the Applications dashboard shows the application name, process name, active time, and idle time.
If you’d like to use the Activity Log data in a business intelligence tool you can easily export your user activity data to an Excel spreadsheet.
If you’d like to provide a visual copy of the Activity Log to someone else, you can use the Export to PDF function. The PDF will display the Activity Log, including hyperlinks to the sub-dashboards of the groups or users shown.
So long as the viewer has access to an operator account with sufficient permissions they’ll be able to follow these hyperlinks to learn more about the selected user or group.
To finish things off, let’s take a look at the dashboards offered in version 6.0.2
Switching over to the Productivity dashboard you will see how much time was spent on productive, unproductive, and neutral web browsing. You’ll also see who the most productive and unproductive users or groups are, as well as the top 5 websites and categories.
What is considered productive can be customized by going to BrowseReporter’s Productivity Grading window; a shortcut to this can be found in the dashboard settings.
From here you’ll be able to specify whether a given website category or a specific domain should be labeled as productive, unproductive, or neutral.
Moving on to the Websites dashboard you will find the total active and idle time for the selected groups or users, the top 5 websites and most active users, as well as the web browsing Activity Log.
In the applications dashboard, you will find similar graphs showing how much time was spent using applications, the top 5 most used applications, the 5 users that spent the most time using applications, and the application usage Activity Log.
Finally, we have the bandwidth usage dashboard. Here you’ll be able to see who is using the most bandwidth and how much bandwidth was used each day.
If you’d like to see what websites are responsible for anomalies in bandwidth usage you can run BrowseReporter’s Bandwidth Usage by URL report.
This report will show you the exact websites that are consuming bandwidth; from there you can decide whether the bandwidth hogs need to be blocked with BrowseControl or if other corrective measures need to be taken.
Ready to boost operational efficiency, employee productivity, and endpoint security with advanced awareness and control over how your employees use technology in the workplace?
Get started today with a FREE trial of any of our software solutions.
Simply visit CurrentWare.com/Download to try our software for yourself or get in touch with us at CurrentWare.com/Contact.
Thank you!
To start, you need to have a thorough understanding of all of the software currently being used by your business. You will need to catalogue the existing licenses your company has, make note of ongoing software expenses, and monitor employee computer activity to determine whether or not the existing solutions are being used.
To reduce unnecessary software expenditure in your business you will need greater control over your software procurement and decommissioning process. This can be accomplished by establishing policies and procedures surrounding the acquisition, documentation, deployment, usage and retirement of software.
Your organization should have official software procurement procedures in place that defines who is permitted to make purchases, when those purchases can be made, and what channels must be consulted for approval before a solution can be purchased and deployed. This will reduce unexpected shadow IT costs and ensure that each software purchase is evaluated against your existing capabilities before approval.
The practice of tracking and maintaining software licenses is known as software metering. The goal of software metering is to ensure that license limits are enforced and that licenses are available for each user that needs one. This practice can be further split into two major categories: passive software metering and active software metering.
Passive software metering: Application use is monitored but users are not actively denied access to the software. This provides natural user activity insights that can help determine the number of licenses needed.
Active software metering: Application use is monitored and access can be denied based on a given set of parameters. For example, an organization with a limited amount of licenses could schedule application permissions to limit the number of users that can access the software at a given time.
BrowseReporter makes tracking software utilization possible with its easy-to-use reporting utility and dashboards. At a glance, you can review the software usage of your employees, including timestamps of the applications they use each day, how frequently they use specific applications, and their most used applications.
Organizations can further reduce unauthorized software use with an application blocker. Employees that are not authorized to use a given solution can be proactively blocked from launching the program, reducing the opportunity for licenses to be activated without a legitimate need.
Ready to start monitoring and restricting software use in your company? Get started with a FREE trial.
An End User License Agreement (EULA) is a legal agreement between a software vendor and the user of the software. Software companies use EULAs to protect themselves by binding the users of the software with the vendor’s terms, rules or guidelines. The purpose of a EULA is to communicate the acceptable use of the software and establish a legal precedent for enforcement should an end-user misuse the software.
Common stipulations of a EULA include:
1) Limits to how many devices can have the software installed on it
2) Forbidding the reverse-engineering of the software
3) Stipulation that protect the vendor from lawsuits related to the use of their product
4) Geolocation restrictions
5) Who is permitted to use the software (third parties, employee vs non-employee, etc)
Software Asset Management (SAM) is a subset of IT Asset Management (ITAM) that focuses on the optimization of software usage, procurement, deployment, maintenance, and disposal in an organization. SAM includes the management of software assets, product versions, licenses, and the media used to deliver the software. Aside from license cost optimization SAM also manages the lifecycle of a software product and determines the software’s function in the organization.
Common objectives of Software Asset Management include:
• Reducing the complexity of technology in the organization
• Reducing the lifecycle costs of a software product
• Creating a strategic plan for managing new and existing software in the organization
Software License Management (SLM) is a subset of SAM. It focuses on the optimization of software licenses used within an organization. The goal of SLM is to reduce costs by reducing the amount of unused licenses, optimizing the use of existing licenses, and consolidating redundant licenses. SLM also refers to the optimization of related costs associated with customer support and product maintenance.
Common objectives of Software License Management include:
• Reducing costs directly associated with licenses such as over-licensing/under-licensing, maintenance costs, and support costs.
• Ensuring that the correct licenses are available (e.g. product version)
• Reducing software deployment costs by determining the legitimate licensing needs of the organization and consolidating/expanding as needed
Many different types of software licenses exist. The types of licenses available are generally categorized by their intended use and volume.
Examples of software license types
Evaluation license: A limited-time or limited-use license that is intended to be used to provide the user with a demonstration of the product before purchasing.
Concurrent license: A license that can be shared by a designated number of multiple users simultaneously. For example, if you have 6 concurrent licenses you can have up to 6 users operating the software simultaneously; the seventh simultaneous user would not be permitted to use the software. This is also known as a floating license.
Perpetual license: This license type grants access to the current version of the software for a one-time purchase.
Subscription license: This type of license grants access to the software for a monthly or annual fee. This fee is typically based on the amount of users.
Named user license: A license that is intended for use by a specific individual user.
Proprietary: The creator of the software reserves all rights to the product. This type of license often includes stipulations that prohibit its modification or redistribution.
Free and open-source software (FOSS): A software license that gives the user unlimited rights to modify and reuse the software’s code.
Sub-optimal software licensing is a significant source of capital inefficiency for many organizations. By tracking the internet and application usage of your employees you can ensure that the SaaS solutions and software products you invest in are truly necessary and used to their full potential. You can identify which products require a greater volume of licenses and which products can be decommissioned.
Cookie | Duration | Description |
---|---|---|
__cfruid | session | Cloudflare sets this cookie to identify trusted web traffic. |
cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
JSESSIONID | session | The JSESSIONID cookie is used by New Relic to store a session identifier so that New Relic can monitor session counts for an application. |
LS_CSRF_TOKEN | session | Cloudflare sets this cookie to track users’ activities across multiple websites. It expires once the browser is closed. |
OptanonConsent | 1 year | OneTrust sets this cookie to store details about the site's cookie category and check whether visitors have given or withdrawn consent from the use of each category. |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Cookie | Duration | Description |
---|---|---|
__cf_bm | 30 minutes | This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. |
_zcsr_tmp | session | Zoho sets this cookie for the login function on the website. |
Cookie | Duration | Description |
---|---|---|
_calendly_session | 21 days | Calendly, a Meeting Schedulers, sets this cookie to allow the meeting scheduler to function within the website and to add events into the visitor’s calendar. |
_gaexp | 2 months 11 days 7 hours 3 minutes | Google Analytics installs this cookie to determine a user's inclusion in an experiment and the expiry of experiments a user has been included in. |
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_ga_GY6RPLBZG0 | 2 years | This cookie is installed by Google Analytics. |
_gcl_au | 3 months | Provided by Google Tag Manager to experiment advertisement efficiency of websites using their services. |
_gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |
CONSENT | 2 years | YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data. |
Cookie | Duration | Description |
---|---|---|
_opt_expid | past | Set by Google Analytics, this cookie is created when running a redirect experiment. It stores the experiment ID, the variant ID and the referrer to the page that is being redirected. |
IDE | 1 year 24 days | Google DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile. |
NID | 6 months | NID cookie, set by Google, is used for advertising purposes; to limit the number of times the user sees an ad, to mute unwanted ads, and to measure the effectiveness of ads. |
test_cookie | 15 minutes | The test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies. |
VISITOR_INFO1_LIVE | 5 months 27 days | A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface. |
YSC | session | YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages. |
yt-remote-connected-devices | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt-remote-device-id | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt.innertube::nextId | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
yt.innertube::requests | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
Cookie | Duration | Description |
---|---|---|
_dc_gtm_UA-6494714-6 | 1 minute | No description |
_gaexp_rc | past | No description available. |
34f6831605 | session | No description |
383aeadb58 | session | No description available. |
663a60c55d | session | No description available. |
6e4b8efee4 | session | No description available. |
c72887300d | session | No description available. |
cookielawinfo-checkbox-tracking | 1 year | No description |
crmcsr | session | No description available. |
currentware-_zldp | 2 years | No description |
currentware-_zldt | 1 day | No description |
et_pb_ab_view_page_26104 | session | No description |
gaclientid | 1 month | No description |
gclid | 1 month | No description |
handl_ip | 1 month | No description available. |
handl_landing_page | 1 month | No description available. |
handl_original_ref | 1 month | No description available. |
handl_ref | 1 month | No description available. |
handl_ref_domain | 1 month | No description |
handl_url | 1 month | No description available. |
handl_url_base | 1 month | No description |
handlID | 1 month | No description |
HandLtestDomainName | session | No description |
HandLtestDomainNameServer | 1 day | No description |
isiframeenabled | 1 day | No description available. |
m | 2 years | No description available. |
nitroCachedPage | session | No description |
organic_source | 1 month | No description |
organic_source_str | 1 month | No description |
traffic_source | 1 month | No description available. |
uesign | 1 month | No description |
user_agent | 1 month | No description available. |
ZCAMPAIGN_CSRF_TOKEN | session | No description available. |
zld685336000000002056state | 5 minutes | No description |