Software Asset Management (SAM)

Why do SAM

Cost savings. Some large consulting firms say that SAM programs can save 25%-30% of total software spend by aligning software spend with actual software needs. Greater use of SaaS applications also presents a wonderful opportunity to optimize software spend based on actual usage of the SaaS applications. Naturally this requires that you know the usage of your SaaS applications such as Adobe CC and others. This is where Belarc's patented technology on usage discovery really helps.

Compliance. Software publishers are auditing their customers more frequently and having an effective SAM tool and program in place will allow you to respond in a timely and accurate manner based on actual data, and not be forced to rely on the auditor's data. This is where Belarc's accurate and up to data discovery data and automated license compliance reporting are invaluable tools.

Cyber security. Belarc's system not only discovers the installed and used software and version details, but also the software vulnerabilities for the major vendors.

Why Belarc

The right information out of the box. Belarc offers an automated and integrated system that shows our customers the information they need for SAM, cyber security and configuration control, right out of the box. No need for lengthy and expensive customization or relying on federating data from other systems.

Many SAM tools do not discover application usage, which is necessary to optimize SaaS and other software. For example usage data for Adobe SaaS software is not available from the vendor, but Belarc discovers this automatically.

Fast deployment. Even our large enterprise customers are up and running within weeks, not months or years as is the case with our competition.

Automation. Belarc's system is based on a cloud architecture using secure web protocols. This allows for a single server and central database for the entire enterprise. This architecture avoids the need to deploy, manage and maintain multiple scanners, servers and databases. Click here for details.

Clear pricing. We publish our prices and everyone gets the best price based on their volumes.

Supporting our customers. We at Belarc place a very high priority on supporting our customers and many have been with us for over ten years. We make certain that all of our customers are successfully using our products through support from highly qualified engineers and regular training sessions.

We help our customers by explaining the software vendors' licensing rules and metrics and how they can optimize their license position. We also assist with responding to software vendor audits.

Easy to try. We encourage everyone to try before you buy. To try our hosted demo or to run an in-house trial please fill out the form or send an email to

* indicates required

Cyber Security

US DoD Cybersecurity Maturity Model Certification (CMMC)

Cybersecurity Maturity Model Certification (CMMC) is a DoD requirement that applies to all organizations in the defense supply chain. The CMMC-AB (CMMC Accreditation Body) is the neutral, accredited, third party that is responsible to certify Assessors and maintain the CMMC standards. The DoD provided the CMMC-AB with version 1.02 of the CMMC model along with other materials.

Belarc's system can be used by Assessors and Organizations Seeking Certification (OSCs) to meet many of the CMMC Model v1.02 controls. For more information.

Create secure Work From Home (WFH) environments

Enabling Work From Home (WFH) is happening in all organizations today. We need to be sure that those WFH computers are not creating security risks when they VPN into our corporate or government networks. ​This is equally true for company or government issued computers and personal ones.

The best way to accomplish this is to follow the Center for Internet Security's (CIS) 5 Basic Controls and the recent NIST Security for Enterprise Telework recommendations.

Belarc's BelManage system allows organizations to accomplish this with an automated and cost effective system that can be deployed on-premises, on our customer's cloud, or via Belarc SaaS.

For more information:

Ransomware - how to stop it.

Many cyber attacks today, such as the WannaCry ransomware, are not stopped by traditional cyber security tools such as anti-virus, firewalls or intrusion detection and prevention systems. The solution to stopping today’s attacks is to go back to the basics of cyber security and implement standard security controls and monitor them on a continuous basis. BelManage and BelSecure support the Center for Internet Security's (CIS) Top 5 Controls, with the following:

  • Hardware - Identify authorized and un-authorized hardware.
  • Software - Identify authorized and un-authorized software.
  • Vulnerabilities - Continuously monitor all systems for operating system and application vulnerabilities.
  • User Privileges - Control and monitor the use of Administrator Privileges for both Local and Domain accounts.
  • Secure Configurations - Implement and monitor the use of secure configurations on all devices.

In addition Belarc's system automatically monitors the following Controls:

  • Drive Encryption - Monitor all drives and determine if encryption has been fully, partially or not enabled.
  • USB Storage Device usage - Identify all used USB storage devices and compare serial numbers to a list of approved devices.
  • Anti-virus Status - Identify virus definition date, whether realtime file scanning is on.
  • OS Update Agent - Identify how the machines are getting their security updates.

To learn more, please request our white papers, “Securing the Enterprise - Cyber Security Myths and Reality”, "Ransomware - how to stop it" and “Mapping the NIST security controls” by sending an email to:

CIS CyberSecurity Quarterly newsletter with Belarc authored article on Ransomware and how to stop it.

Configuration Management

Automatically track detailed software, hardware and security configurations

Reduce your IT operating costs by identifying older versions or unused applications; improve your cyber security resilience; plan and automate an operating system migration. You can accomplish this and more with an automated, enterprise wide repository of detailed software, hardware and security configurations.