Software Auditing

It is commonplace for companies throughout the world to use unlicensed software. This may be because managers are unaware of what software is installed on the company’s computers and they would therefore be oblivious to any potential threats associated with this or the fact that they are in breach of the law. In the event that these computers were audited by enforcement agencies, the company may be liable for a sizeable fine.

In addition, it may be that the company’s computers are infected with malware.

DSS is able to audit the software installed on a client’s computers so as to log all of the software, appraise whether this satisfies the company’s requirements and contemplate ways in which any risks can be mitigated.

Advantages

DSS’s auditing procedures are performed without disturbing the operation of the client’s computer system. Moreover, the service can be conducted at a time suiting the client so as to avoid interfering with the company’s day-to-day operations. In accordance with the nondisclosure agreement, the audit will not compromise the company’s information, thereby ensuring unequivocal client confidentiality.

Performs

  • Making a log of all software installed on the client’s computers
  • Detecting and removing any traces of malware, and providing advice for malware counteraction
  • Identifying technical features of the installed software which can offer an indication that it may be counterfeit
  • Studying license agreements between the client and the software providers with a view to exposing any violations of these agreements
  • Identifying any software on the computers that may be explicitly prohibited by the company’s information security policy


Find out more about what we do


The company is currently developing a system to combat international cyber crime, which will equip the law enforcement authorities in any jurisdiction to effectively tackle the problem of computer-based malfeasance. Crucially, the technology assists at the most problematic stages of the criminal investigation, including the assemblage of evidence, DDoS protection and web auditing.