Cornerstone uses Oracle Audit Equivalent tools to scan your environment in a non-intrusive way to extract data for audit review.
• Analysis of hosts on the network
We begin with a full, comprehensive analysis of all hosts on the network based on IP address and identify all Oracle products your company uses.
• Scans at a database level
Our database-level scans identify each individual Oracle database at a system level, ensuring that we recognize all of the databases used in your business.
• Identification of Products installed
By identifying each individual installed Oracle product, we can provide you with a comprehensive overview of the licenses you need and compare them to your current licenses to ensure compliance.
• Identification of feature sets turned on
Not only can we identify products, but we also scan your individual Oracle feature sets, to ensure that you are compliant with any additional licensing needed for a particular Oracle database and product features.
• Statistical information on product & feature activation/use
Once your audit is complete, we provide you with an Audit Artifact report on the use of individual Oracle products and features. Not only does this give you a detailed view of your install base, but it can help you identify minimally-used or unused Oracle products and services.
• Comparison review of install findings vs. purchase history
A comparison is then performed between the actual install base vs your license purchase history
• Recommendations for license gaps, Isolation/consolidation options
The last step is creation of a comprehensive analysis and recommendations to mediate any license gaps while optimizing the Oracle spend through isolation and consolidation strategies
Cornerstone Data Systems recognizes that audits and any resulting deficiencies or recommendations can be highly sensitive to your organization with real dollars attached to them.
The entire soft audit process, including the results and recommendations, is strictly between you, the customer, and Cornerstone Data Systems.
Even if you are currently under Audit you can be assured that the entire process is kept strictly confidential.