SlideShare a Scribd company logo
Protecode Inc. 2015 Proprietary 1
Software Audit Strategies:
How Often is Enough?
February 25, 2015
Protecode Inc. 2015 Proprietary
Agenda
 Manageable challenges of OSS
 Software audits
– What it is
– What it is not
 One-time audit versus continuous audit
– How often?
 Typical software audit process
 Q/A
2
Protecode Inc. 2015 Proprietary
OSS Market Penetration
 Unstoppable growth
– 85% industry adoption (Gartner 2008)
– 98% worldwide adoption (Accenture 2010)
– 99% worldwide adoption (By 2016, Gartner)
 Adoption at various levels
– Organizational level
– Personal level
 Not a niche play
– Automotive, healthcare, financial
– Cloud, mobile, database, security
– Gaming, tools, imaging, aerospace
– Anything that includes any code!
3
Protecode Inc. 2015 Proprietary
Manageable Challenges of OSS
 Open Source software belongs to those who create it
– License = blanket permission to use, generally under certain
conditions
– Licenses and license terms can be confusing to the development
groups
• Copy Left, Weak Copy Left, Permissive
• Attribution, Internal use, distribution, SaaS use, modifications, binary
distribution, static versus dynamic links, DRM measures, derivatives
– Compliance Obligations
 Security Vulnerabilities
– Every software can be vulnerable
– Commercial or OSS
 Export Control Attributes
4
Protecode Inc. 2015 Proprietary
What is a Software Code Audit?
 It is a discovery process
 Identifies third-party components in a software portfolio
– Open source software (OSS)
– Other 3rd party software
 Highlights attributes such as
– Licensing
– Authorship and copyrights
– Security vulnerabilities
– export suitability
– Software pedigree, versions, modifications
 Reduces vulnerabilities
– Intellectual Property (IP) uncertainties, Compliance & Security
5
Protecode Inc. 2015 Proprietary
Value of Software Code Audits
 Reduces IP uncertainties
 Focuses licensing/legal teams on compliance
– Audits accelerate, and improve accuracy of, the discovery stage
 Helps technology organizations
– Adopt open source software profitably
• Lower effort for non-strategic components
• Shorten time-to-market
• Decrease development costs
– Improve business competitiveness
• Ensures adherence to IP policies
• Improved quality
• Eliminates cross-project IP Contamination
 Assists open source community
– Allows publication of code pedigree and communication of licenses
– Frees OSS adopters from uncertainties
6
Protecode Inc. 2015 Proprietary
Understanding Software Composition
 Code complexity is growing
 Good developers do not write code from scratch
– Open source usage is growing
• Benefits (variety of choice, access to source, reduced effort, lower development cost,
faster time to market)
• And challenges (IP ownership and license obligations)
 Access to code is easy
– OSS repositories, WWW, Previous life work
 Outsourcing software is common
 Detailed software BoM not available
– Required during a transaction
– Needed for internal compliance and vulnerability management
(Do We Own Our Code?)
7
Protecode Inc. 2015 Proprietary
Typical Issues Uncovered in an Audit
 OSS content with ambiguous / no licenses
– Software copyrights but no licenses
– Software with authors but no copyrights/ licenses
– Software with no pedigree information
– Public domain software with proprietary licenses
 Licenses   business model mismatch
– i.e. modified restrictive copyleft licensed content in
closed source commercial software
– Cloud deployments and newer license models
– Warranties and support models
– Attribution obligations
 OSS packages with reported vulnerabilities
– Examples: Heartbleed, Shellschock/Bashdoor
8
Protecode Inc. 2015 Proprietary
How Often is Good Enough?
 Companies taking stock of the portfolio
– When triggered by a transaction (M&A, shipping product, Technology
Transfer, investment)
– Regular time Intervals (daily, weekly, monthly, quarterly)
– When code is acquired (from contractors, suppliers)
 Effort increases as time elapses
– Volume of code increases
– Code gets dispersed in the product lines
– Developers move around…
– When information is fresh
• Audits take less effort
• Unknowns are resolved quickly
• Remedies are less costly
9
Protecode Inc. 2015 Proprietary
Waiting for the “Trigger”
 Unchecked, vulnerabilities scale with time and volume of software
 Audits at transaction time take effort and fixing problems can be
costly
10
Protecode Inc. 2015 Proprietary
Regular Time Intervals
11
 Audits at regular intervals, or as new code is acquired, can detect
licensing and security vulnerabilities quickly
 Reduces effort and remedial costs, and avoids propagation of
“bad” code
Protecode Inc. 2015 Proprietary
Anatomy of an Audit
1. Audit Questionnaire and discussion
– Who is the sponsor?
– Purpose of Audit
• M&A? Tech transfer? A collaborative work?
• Product delivery? Ongoing quality process?
– Company information
• What business? R&D practices
• Contracting, outsourcing practices
• Third party including OSS usage practices
• Is there an open source adoption policy?
• Composition and complexity of the code portfolio,
– Structure, Languages, archives, Size- Mbytes or Files
12
Protecode Inc. 2015 Proprietary
Audit Steps: Software Scanning
– Access to software, and scan set-up
• Look for specific copyrights, authors, company names
• Look for specific terms such as “modified” “copied from” “stolen from”
– Scans software files
• Software files (Source code, Binaries, archives)
• Information files (README, COPYING, LICENSE, etc)
– Automated Scan
a. Local scrubbing of software files
b. Similarity with public-domain OSS
– Raw machine results
• OSS projects, packages, versions, licenses, copyrights, vulnerabilities,
encryption content, etc
• Modified/unmodified software
• Proprietary, unknowns, conflicting licenses, etc
– Fast: ~ 4k files (100 – 200 Mbytes)/hour
13
Protecode Inc. 2015 Proprietary
Audit Steps: Resolution and signoff
5. Manual Analysis and approval
– Review every package, every file and all attributes reported by
Automated analyzer
• Resolve unknowns (eg proprietary software with no headers)
• Flag inconsistencies (eg file license  package license)
• Add missing information
• Highlight areas requiring attention (eg copyright, but no license info)
– May need consultation with the R&D team
– Longest part of the process ~ days
– Prepare the final Executive Report
14
Protecode Inc. 2015 Proprietary
Audit Steps: Reports & Q/A
 High level executive report
– High level view of the findings
– Highlight key findings, areas requiring attention
– Reference material on licenses found, best practices
 Machine reports
– Overview
– Detailed file-by-file
– License incompatibilities
– License obligations report
– Security vulnerabilities
– Encryption Package Report (including ECCN)
– Text of all licenses applicable to software packages
 Post-report consultation & Q/A
15
Protecode Inc. 2015 Proprietary
Compliance and Vulnerability Management
as a Quality Development Process
16
License and Vulnerabilities Management is most
effective when applied early in development life
cycle
Protecode Inc. 2015 Proprietary
Crowdsourcing “Compliance”
17
# of issues created
Issues are
created here…
…and resolved here
Developers
Effort
Licensing
Team
Protecode Inc. 2015 Proprietary
Crowdsourcing “Compliance”
18
# of issues created
Issues are
created here…
…and resolved here
Developers
Licensing
Team
Effort
Protecode Inc. 2015 Proprietary
OSSAP
Open Source Software Adoption Process
19
Define a
Policy
Establish a
Baseline
Package
Pre-Approval
Scan in
Real-Time
Scan at
Regular
Intervals
Final Build
Analysis
Protecode Inc. 2015 Proprietary
About Protecode
 Open source compliance and security vulnerability management
solutions
– Reduce IP uncertainties, manage security vulnerabilities and ensure compliance
 Accurate, usable and reliable products and services for organizations
worldwide
20
Protecode Inc. 2015 Proprietary 21
Protecode Inc. 2015 Proprietary
Pitfalls of IP Uncertainties
 Negatively impacts M&A activities
 Lowers company valuations
 Delays product shipments
 Deters downstream users
 Reduces ability to create partnerships
 Introduces delays and threatens closures in financings
 Creates litigation risks to the company and clients
22
Protecode Inc. 2015 Proprietary 23
Partial Matches (modified OSS code)
Protecode Inc. 2015 Proprietary
Analyzer Raw Output
24

More Related Content

PDF
Software audit strategies: how often is enough?
PPTX
Open Source Software: What Are Your Obligations?
PPTX
Streamline Open Source Compliance with Package Pre-Approval
PPTX
IT due diligence and software quality for fintech startups
PDF
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
PPTX
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
PDF
Create code confidence for better application security
PPTX
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
Software audit strategies: how often is enough?
Open Source Software: What Are Your Obligations?
Streamline Open Source Compliance with Package Pre-Approval
IT due diligence and software quality for fintech startups
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Create code confidence for better application security
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...

What's hot (20)

PPTX
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
PPT
FLIGHT Amsterdam Presentation - From Protex to Hub
PDF
TETRA
PPTX
Shifting the conversation from active interception to proactive neutralization
PPTX
Programming languages and techniques for today’s embedded andIoT world
PDF
Don't Let Open Source be the Deal Breaker In Your M&A
PPT
Introducing: Klocwork Insight Pro | November 2009
PDF
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
PDF
Applying formal methods to existing software by B.Monate
PPTX
Application security meetup k8_s security with zero trust_29072021
PDF
UniqueSoft Overview
PPTX
Making the Strategic Shift to Open Source at Fujitsu Network Communication
PPTX
Hi600 u07_inst_slides
PDF
Is your SAP system vulnerable to cyber attacks?
PPTX
Technical Writing for Consultants
PPTX
Cyber security - It starts with the embedded system
PPTX
Litigation and Compliance in the Open Source Ecosystem
PPT
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
PDF
Challenges Scaling DevOps
PDF
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
FLIGHT Amsterdam Presentation - From Protex to Hub
TETRA
Shifting the conversation from active interception to proactive neutralization
Programming languages and techniques for today’s embedded andIoT world
Don't Let Open Source be the Deal Breaker In Your M&A
Introducing: Klocwork Insight Pro | November 2009
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
Applying formal methods to existing software by B.Monate
Application security meetup k8_s security with zero trust_29072021
UniqueSoft Overview
Making the Strategic Shift to Open Source at Fujitsu Network Communication
Hi600 u07_inst_slides
Is your SAP system vulnerable to cyber attacks?
Technical Writing for Consultants
Cyber security - It starts with the embedded system
Litigation and Compliance in the Open Source Ecosystem
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Challenges Scaling DevOps
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
Ad

Viewers also liked (11)

DOCX
Swapnil tripathi. latest cv. 1docx
DOCX
Swapnil tripathi. latest cv. 1docx
DOCX
Swapnil tripathi. latest cv
PDF
SwapnilTripathi CV
PPTX
FinalProjectPresentation
PDF
Swapnil tripathi.cv
DOCX
Swapnil Tripathi. latest CV
PDF
Swapnil tripathi.cv
DOCX
Swapnil tripathi. latest cv. 1docx
DOCX
Swapnil Tripathi. latest CV
PDF
Swapnil tripathi cv
Swapnil tripathi. latest cv. 1docx
Swapnil tripathi. latest cv. 1docx
Swapnil tripathi. latest cv
SwapnilTripathi CV
FinalProjectPresentation
Swapnil tripathi.cv
Swapnil Tripathi. latest CV
Swapnil tripathi.cv
Swapnil tripathi. latest cv. 1docx
Swapnil Tripathi. latest CV
Swapnil tripathi cv
Ad

Similar to Software Audit Strategies - How often is good enough for a software audit? (20)

PPTX
Best practices for simplifying software audits
PPTX
Leveraging Open Source Opportunity in the Public Sector Without the Risk
PDF
Leveraging Open Source Opportunity in the Public Sector Without the Risk
PPTX
Optimizing The Cost Of Open Source Software Management
PPTX
Performing an audit - Open source compliance seminar
PDF
Flight East 2018 Presentation–You've got your open source audit report, now w...
PPTX
Where’s the license?
PPTX
The Role of In-House & External Counsel in Managing Open Source Software
PDF
Webinar–You've Got Your Open Source Audit Report–Now What?
PDF
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
PPT
Safeguarding Against the Risks of Improper Open Source Licensing - Valuable...
ODP
Ubucon 2013, licensing and packaging OSS
PPT
Ten Elements of Open Source Governance
PDF
Webinar–The State of Open Source in M&A Transactions
PPT
Managing Software Inventories & Automating Open Source Software Compliance
PDF
Webinar–Open Source Risk in M&A by the Numbers
PPTX
Licensing in Composite Open Source Projects
PDF
Webinar–2019 Open Source Risk Analysis Report
PDF
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
PDF
Strategies for Commercial Software Developers Using Open Source Code in Propr...
Best practices for simplifying software audits
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Optimizing The Cost Of Open Source Software Management
Performing an audit - Open source compliance seminar
Flight East 2018 Presentation–You've got your open source audit report, now w...
Where’s the license?
The Role of In-House & External Counsel in Managing Open Source Software
Webinar–You've Got Your Open Source Audit Report–Now What?
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Safeguarding Against the Risks of Improper Open Source Licensing - Valuable...
Ubucon 2013, licensing and packaging OSS
Ten Elements of Open Source Governance
Webinar–The State of Open Source in M&A Transactions
Managing Software Inventories & Automating Open Source Software Compliance
Webinar–Open Source Risk in M&A by the Numbers
Licensing in Composite Open Source Projects
Webinar–2019 Open Source Risk Analysis Report
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Strategies for Commercial Software Developers Using Open Source Code in Propr...

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Empathic Computing: Creating Shared Understanding
“AI and Expert System Decision Support & Business Intelligence Systems”
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
20250228 LYD VKU AI Blended-Learning.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Electronic commerce courselecture one. Pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
The AUB Centre for AI in Media Proposal.docx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
sap open course for s4hana steps from ECC to s4
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Software Audit Strategies - How often is good enough for a software audit?

  • 1. Protecode Inc. 2015 Proprietary 1 Software Audit Strategies: How Often is Enough? February 25, 2015
  • 2. Protecode Inc. 2015 Proprietary Agenda  Manageable challenges of OSS  Software audits – What it is – What it is not  One-time audit versus continuous audit – How often?  Typical software audit process  Q/A 2
  • 3. Protecode Inc. 2015 Proprietary OSS Market Penetration  Unstoppable growth – 85% industry adoption (Gartner 2008) – 98% worldwide adoption (Accenture 2010) – 99% worldwide adoption (By 2016, Gartner)  Adoption at various levels – Organizational level – Personal level  Not a niche play – Automotive, healthcare, financial – Cloud, mobile, database, security – Gaming, tools, imaging, aerospace – Anything that includes any code! 3
  • 4. Protecode Inc. 2015 Proprietary Manageable Challenges of OSS  Open Source software belongs to those who create it – License = blanket permission to use, generally under certain conditions – Licenses and license terms can be confusing to the development groups • Copy Left, Weak Copy Left, Permissive • Attribution, Internal use, distribution, SaaS use, modifications, binary distribution, static versus dynamic links, DRM measures, derivatives – Compliance Obligations  Security Vulnerabilities – Every software can be vulnerable – Commercial or OSS  Export Control Attributes 4
  • 5. Protecode Inc. 2015 Proprietary What is a Software Code Audit?  It is a discovery process  Identifies third-party components in a software portfolio – Open source software (OSS) – Other 3rd party software  Highlights attributes such as – Licensing – Authorship and copyrights – Security vulnerabilities – export suitability – Software pedigree, versions, modifications  Reduces vulnerabilities – Intellectual Property (IP) uncertainties, Compliance & Security 5
  • 6. Protecode Inc. 2015 Proprietary Value of Software Code Audits  Reduces IP uncertainties  Focuses licensing/legal teams on compliance – Audits accelerate, and improve accuracy of, the discovery stage  Helps technology organizations – Adopt open source software profitably • Lower effort for non-strategic components • Shorten time-to-market • Decrease development costs – Improve business competitiveness • Ensures adherence to IP policies • Improved quality • Eliminates cross-project IP Contamination  Assists open source community – Allows publication of code pedigree and communication of licenses – Frees OSS adopters from uncertainties 6
  • 7. Protecode Inc. 2015 Proprietary Understanding Software Composition  Code complexity is growing  Good developers do not write code from scratch – Open source usage is growing • Benefits (variety of choice, access to source, reduced effort, lower development cost, faster time to market) • And challenges (IP ownership and license obligations)  Access to code is easy – OSS repositories, WWW, Previous life work  Outsourcing software is common  Detailed software BoM not available – Required during a transaction – Needed for internal compliance and vulnerability management (Do We Own Our Code?) 7
  • 8. Protecode Inc. 2015 Proprietary Typical Issues Uncovered in an Audit  OSS content with ambiguous / no licenses – Software copyrights but no licenses – Software with authors but no copyrights/ licenses – Software with no pedigree information – Public domain software with proprietary licenses  Licenses   business model mismatch – i.e. modified restrictive copyleft licensed content in closed source commercial software – Cloud deployments and newer license models – Warranties and support models – Attribution obligations  OSS packages with reported vulnerabilities – Examples: Heartbleed, Shellschock/Bashdoor 8
  • 9. Protecode Inc. 2015 Proprietary How Often is Good Enough?  Companies taking stock of the portfolio – When triggered by a transaction (M&A, shipping product, Technology Transfer, investment) – Regular time Intervals (daily, weekly, monthly, quarterly) – When code is acquired (from contractors, suppliers)  Effort increases as time elapses – Volume of code increases – Code gets dispersed in the product lines – Developers move around… – When information is fresh • Audits take less effort • Unknowns are resolved quickly • Remedies are less costly 9
  • 10. Protecode Inc. 2015 Proprietary Waiting for the “Trigger”  Unchecked, vulnerabilities scale with time and volume of software  Audits at transaction time take effort and fixing problems can be costly 10
  • 11. Protecode Inc. 2015 Proprietary Regular Time Intervals 11  Audits at regular intervals, or as new code is acquired, can detect licensing and security vulnerabilities quickly  Reduces effort and remedial costs, and avoids propagation of “bad” code
  • 12. Protecode Inc. 2015 Proprietary Anatomy of an Audit 1. Audit Questionnaire and discussion – Who is the sponsor? – Purpose of Audit • M&A? Tech transfer? A collaborative work? • Product delivery? Ongoing quality process? – Company information • What business? R&D practices • Contracting, outsourcing practices • Third party including OSS usage practices • Is there an open source adoption policy? • Composition and complexity of the code portfolio, – Structure, Languages, archives, Size- Mbytes or Files 12
  • 13. Protecode Inc. 2015 Proprietary Audit Steps: Software Scanning – Access to software, and scan set-up • Look for specific copyrights, authors, company names • Look for specific terms such as “modified” “copied from” “stolen from” – Scans software files • Software files (Source code, Binaries, archives) • Information files (README, COPYING, LICENSE, etc) – Automated Scan a. Local scrubbing of software files b. Similarity with public-domain OSS – Raw machine results • OSS projects, packages, versions, licenses, copyrights, vulnerabilities, encryption content, etc • Modified/unmodified software • Proprietary, unknowns, conflicting licenses, etc – Fast: ~ 4k files (100 – 200 Mbytes)/hour 13
  • 14. Protecode Inc. 2015 Proprietary Audit Steps: Resolution and signoff 5. Manual Analysis and approval – Review every package, every file and all attributes reported by Automated analyzer • Resolve unknowns (eg proprietary software with no headers) • Flag inconsistencies (eg file license  package license) • Add missing information • Highlight areas requiring attention (eg copyright, but no license info) – May need consultation with the R&D team – Longest part of the process ~ days – Prepare the final Executive Report 14
  • 15. Protecode Inc. 2015 Proprietary Audit Steps: Reports & Q/A  High level executive report – High level view of the findings – Highlight key findings, areas requiring attention – Reference material on licenses found, best practices  Machine reports – Overview – Detailed file-by-file – License incompatibilities – License obligations report – Security vulnerabilities – Encryption Package Report (including ECCN) – Text of all licenses applicable to software packages  Post-report consultation & Q/A 15
  • 16. Protecode Inc. 2015 Proprietary Compliance and Vulnerability Management as a Quality Development Process 16 License and Vulnerabilities Management is most effective when applied early in development life cycle
  • 17. Protecode Inc. 2015 Proprietary Crowdsourcing “Compliance” 17 # of issues created Issues are created here… …and resolved here Developers Effort Licensing Team
  • 18. Protecode Inc. 2015 Proprietary Crowdsourcing “Compliance” 18 # of issues created Issues are created here… …and resolved here Developers Licensing Team Effort
  • 19. Protecode Inc. 2015 Proprietary OSSAP Open Source Software Adoption Process 19 Define a Policy Establish a Baseline Package Pre-Approval Scan in Real-Time Scan at Regular Intervals Final Build Analysis
  • 20. Protecode Inc. 2015 Proprietary About Protecode  Open source compliance and security vulnerability management solutions – Reduce IP uncertainties, manage security vulnerabilities and ensure compliance  Accurate, usable and reliable products and services for organizations worldwide 20
  • 21. Protecode Inc. 2015 Proprietary 21
  • 22. Protecode Inc. 2015 Proprietary Pitfalls of IP Uncertainties  Negatively impacts M&A activities  Lowers company valuations  Delays product shipments  Deters downstream users  Reduces ability to create partnerships  Introduces delays and threatens closures in financings  Creates litigation risks to the company and clients 22
  • 23. Protecode Inc. 2015 Proprietary 23 Partial Matches (modified OSS code)
  • 24. Protecode Inc. 2015 Proprietary Analyzer Raw Output 24