SHARE
Facebook X Pinterest WhatsApp

How to Ace Vendor Audits

Oct 19, 2016

How to Ace Vendor Audits

How to Ace Vendor AuditsHow to Ace Vendor Audits

Few organizations purposely misuse assets, but many are caught out of compliance due to the increasing complexity of license usage policies.

Highly ScrutinizedHighly Scrutinized

61% of survey respondents said their company has received a vendor audit request in the last 18 months—and 17% said their organization was audited three or more times during that period.

Well Prepared but …Well Prepared but …

85% said their organization has an IT asset management (ITAM) practice.

… Under Equipped… Under Equipped

Only 17% said they have ITAM tools in place to manage compliance in light of the audits.

Bases CoveredBases Covered

Nearly all companies with an ITAM practice use this data for service management, and 74% do so for vendor management.

Above and BeyondAbove and Beyond

58% of organizations with an ITAM practice in place use this data for needs that go beyond standard ITAM functions, addressing functions such as security and architecture.

Outdated ApproachOutdated Approach

57% of survey respondents said their company still “normalizes” its ITAM data manually.

Best Practices for Navigating a Vendor Audit: Embrace TransparencyBest Practices for Navigating a Vendor Audit: Embrace Transparency

The best way to “get back to business as usual” is to be open about processes. Make the improvement of audit management issues part of your continuous improvement plan.

Best Practices for Navigating a Vendor Audit: Ensure Security and Confidentiality of DataBest Practices for Navigating a Vendor Audit: Ensure Security and Confidentiality of Data

While you may primarily focus on controlling audit activity and proving compliance, you shouldn’t overlook the need to control and manage the data being shared.

Best Practices for Navigating a Vendor Audit: Beware of Phony Audit RequestsBest Practices for Navigating a Vendor Audit: Beware of Phony Audit Requests

Not all are legit. There are ill-intended vendors—often from foreign nations where your organization has an office—that will send bogus but authentic-looking requests when they’re actually just trying to sell something.

Recommended for you...

Best Business Travel Items: 11 Business Travel Essentials
Kaiti Norton
Aug 4, 2022
IBM on the Evolving Role of the CIO: Interview with Kathryn Guarini, CIO of IBM
Shelby Hiter
Jul 26, 2022
Can’t Hire a CIO or CISO? Go Virtual
Drew Robb
Jul 11, 2022
An In-Depth Guide to Enterprise Data Privacy
Jenna Phipps
Jun 25, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.