eBook
Using Compliance Analytics
Best Practices of Highly Effective License Compliance Managers
Accelerate Settlements and Conversions with Compliance Analytics
At Revenera, we’ve helped hundreds of software companies monetize piracy and infringement. Along the way, we’ve identified comprehensive best practices for accomplishing this quickly and effectively. This ebook summarizes key lessons we’ve learned about capturing better data, making informed decisions about it, and efficiently managing the process of transforming leads into revenue.
Capture the Right Data and Capture Enough of It
Capture the Richest Mix of Data Possible
Rarely is an IP address sufficient to confidently identify and understand infringers. You need far more data. This can include unique hardware identifiers (e.g., MAC addresses), detailed module usage data, specific known-pirated version data, domain names, egress IP addresses, and more. All this can be captured transparently, without impacting application performance.
Leverage Geolocation Data and Mapping APIs
Capture geolocation on Wi-Fi connected laptops and other client devices. Linked to Google Maps APIs, this data can even deliver aerial views of physical locations. Even when such views aren’t available, geolocation data can add certainty to other location data.
Supplement Compliance Analytics Data with Other Data Sources
Better assess potential leads by enriching them with information from your customer and prospect databases, third-party business databases, and proprietary industry knowledge about other infringements.
Simplify and Automate the Assembly of Data About Any Prospect
The right tools automatically assemble all data associated with each prospect, without requiring developers to write scripts, SQL queries, or web service calls. That way, you can get the job done yourself, without competing for scarce technical resources.
Consider Capturing Personally Identifiable Data Where This Can Be Done in Strict Compliance with the Law
Using location data, advanced software intelligence tools can determine on-the-fly whether data needs to be anonymized, and where it should be sent and stored. That means you can use personalized data in the US without risking violation of EU privacy rules.
Make Sure your Legal Agreements Support Appropriate Data Capture
To capture client data for compliance auditing and user behavior analysis consistent with privacy law, you must claim your right to do so in contracts and EULAs.
Analyze Your Data and Set Priorities
Map Leads to Accounts
Implement systems that automatically aggregate all infringements associated with a specific organization, identify that organization, and link with existing accounts or prospects where they exist in your CRM.
Focus on Significant Usage Over Time, Not Just “Tire Kicking”
Don’t focus resources on a single brief infringement: look for multiple sessions and use of multiple modules that represent meaningful theft of your intellectual property to gain business value. As a practical matter, doing this requires sophisticated automated correlation and analysis tools.
Leverage Out-of-the-Box Compliance Dashboards
Access basic metrics immediately including: total compliance opportunity, damage calculations, count of infringing organizations, number of machines running pirated software, and number of infringements that represent actual use of your application. You should also be able to easily customize your dashboards to generate geographic heat maps, segment and filter based on your business models, and integrate other business intelligence tools to support and analyze higher volumes of infringement data.
Automatically Prioritize Follow Up with Lead Scoring
When generating large numbers of leads, use tools that score them automatically based on rules you define and adjust (e.g., levels of usage over time, number of machines, etc.). Your most qualified opportunities automatically rise to the top.
Be Clear Upfront About Your Goals for Each Client or Prospect
Don’t let emotions such as anger or betrayal interfere with your strategy for an infringer. Focus on understanding the business needs that led to piracy, meeting them with your paid-for technology, and moving forward. If your goal is revenue for previous usage—and paid-up licenses and maintenance contracts—make sure your entire team knows that. You don’t want a salesperson to settle for a vague promise of future business or a minor favor on a current project.
Streamline Case Management
Integrate Your Compliance and CRM Systems
Integrate your compliance and CRM systems, so it’s easy to receive and share relevant information, communicate with team members and partners, and automate your case management workflows.
Provide the Right Information to the Right People, When They Need It
Implement systems that make it easy to provide summary data at any level, or granular detail about only specific clients. For example, you might selectively provide limited compliance dashboards to those who need them, or use tools that make it easier to generate and share PDF reports.
Streamline Workflow and Approval Processes
Manage your compliance pipeline with a portal that lets you assign leads internally and externally approve cases, review program status, and analyze results by market, geography, partners, and more.
Use Templates to Get Instructions and Letters Right
Standardize and simplify the generation of instructions to salespeople and other compliance team members, as well as letters and language you will use with your infringing prospect or customer.
Use Outside Compliance Specialists
If you don’t have the resources to manage compliance in certain markets, or if internal sales organizations can’t comfortably do so, leverage outside compliance specialists with expertise in monetizing piracy efficiently and dispassionately, based on best practices and extensive experience.
Automate Reports and Workflows That Help You Track Your Progress
By linking your compliance tools to your CRM and other tools, you can simplify the management leads to revenue and track the relative performance associated with multiple products, channels, and partners. You can potentially view conversion rates, revenue rollups, and more, without leaving your compliance dashboard.
Generate Revenue from Unlicensed Use
Don’t Share All Your Information Upfront
On first contact, give your infringer just enough information for him to verify that piracy does in fact exist: for example, MAC addresses implicating specific devices, or knownpirated licenses in use. Until your infringer responds, hold back what you know about the piracy’s full extent in space and time. This is information you can often use effectively in negotiations, or if your executive contact lies or shades the truth in future conversations.
When Possible, Build Alliances with the Infringer’s Senior Management
A surprisingly large number of infringers will pay if you can prove infringement. You can often position yourself on the side of the enterprise or its IT management, helping them self-audit to uncover security risks associated with cracked software throughout their own organizations.
Keep Tracking Piracy After Your First Contact
If piracy disappeared immediately after your first executive contact, the executive may be conspiring with lower-level pirates to hide their tracks. If piracy is continuing, the executive may be conducting a legitimate investigation. Knowing this can help you strategize your next steps.
Use In-App Messaging to Monetize B2C Piracy
Using sophisticated software intelligence tools, you can build automated sequences of in-app messages and behaviors that begin by gently informing users that their software is unlicensed, and gradually move toward limiting functionality or reverting to trial versions. This strategy has been repeatedly shown to generate significant new revenue streams with modest investments in time and resources.
Frequently Asked Questions (FAQs)
License compliance management involves monitoring and enforcing software usage to ensure customers adhere to licensing agreements. It helps prevent piracy and unauthorized use, protecting intellectual property and revenue streams. Effective compliance management uses analytics and automation to streamline processes and improve outcomes.
Detailed data, such as hardware identifiers and geolocation, enables companies to accurately identify infringers and assess the scope of piracy. This information supports informed decision-making and strengthens compliance efforts. Comprehensive data capture also helps organizations comply with privacy laws and contractual obligations.
Compliance analytics provide actionable insights into infringement patterns, usage levels, and potential revenue opportunities. By automating lead scoring and prioritizing follow-up, companies can quickly convert leads into settlements. Analytics also help focus resources on the most significant cases, improving efficiency.
Companies must capture and process personally identifiable data in strict compliance with privacy laws. Advanced tools can anonymize data as needed and ensure proper storage and transmission. Legal agreements, such as contracts and EULAs, should explicitly support appropriate data capture for compliance purposes.
By proving infringement and engaging with senior management, companies can negotiate settlements and convert piracy into revenue. In-app messaging strategies can gently inform users and encourage legitimate purchases. These approaches have been shown to generate significant new revenue streams.
Resources
Data Sheet
Compliance Intelligence
DATA SHEET
Compliance Intelligence liefert Softwareherstellern aussagekräftige Informationen zur unbezahlten Nutzung ihrer Anwendungen, die sie in neue Lizenzumsätze umwandeln können.
Industry Report
Forrester Total Economic Impact Study
Learn More About 426% ROI and Operational Efficiencies Enabled by Revenera
Report
Software Piracy and Compliance 2025 Outlook
This report in our Monetization Monitor series for the latest trends in software piracy, overuse, and misuse. Discover how data-driven insights can help prevent future losses.
Webinar
Generating Revenue and Growing Customers from Software Piracy
Join John Hollows, Senior License Compliance Operations Manager at Bentley Systems, and Revenera’s Victor DeMarines and Erin Barrett, as they discuss how to take a data-driven approach to software piracy and more in this Revenera webinar
Online Event
Building Software License Compliance Programs in a Cloud World
Revenera VP, Product Management, Software Monetization, Vic DeMarines' discussion that will dispel myths and assumptions about what it means to run a software compliance program in 2023 and beyond.
Case Study
Ramping Up a Profitable New Compliance Program
Developer of engineering tools driving new revenue throughout North America and Europe with Revenera.
Want to learn more?
See how you can generate new license revenue from software piracy and overuse.