SlideShare a Scribd company logo
• Cognizant 20-20 Insights

Optimizing Software Supply Chains
Technology companies must view product development as a software
supply chain, identifying the complexities of multiple business models
and introducing a framework to mitigate risk.
Executive Summary
The software supply chain is best described as
interconnected business processes that enable
software products to be developed, converted to
SKUs, distributed and provisioned (i.e., licensing
and entitlement) to users. Most companies have
a unique software supply chain, depending on
the business model; but at a very high level, the
sequence of steps remains the same. Hardware
and high-technology product manufacturers that
develop software for their devices/components
also manage distinct supply chains for their
software and hardware products to meet specific
customer demands.
Although the sequence of steps might appear
straightforward, much deeper complexities are
involved when exploring each stage of the supply
chain. For instance, many software companies
source components from different vendors during
product development, which can cause product
integrity challenges. The risk increases when
suppliers do not have robust processes in place to
ensure their code conforms with industry-defined
standards.
These complexities might change due to different
factors, such as a particular company’s product
portfolio or business policies. The impact can
be significant if not managed effectively; for
instance, the software company may risk an

cognizant 20-20 insights | december 2013

impending lawsuit if a lack of software integrity
leads to client systems being exposed to vulnerabilities. Hence, it is essential for software
companies to continually identify complexities
and risks, and have a robust framework in place
to mitigate them.
Many software companies do not view their
business in terms of a conventional supply chain,
and they fail to realize that all their business
activities can be mapped to a single continuous
value chain that should be optimized to achieve
their business objectives.
This white paper presents a holistic perspective
on software supply chain execution. It also highlights key areas where most companies have
opportunities to optimize their value chains.

Software Supply Chain Trends
A company’s supply chain is defined by its business
model. The software product industry has seen a
continuous evolution of business models, starting
with embedded systems and traditional software
with perpetual licenses, moving to subscriptionbased software licensing and, finally, evolving
most recently to SaaS models. Each business
model has its own unique set of characteristics.
Specific strategic and operational imperatives of
each of these models are summarized in Figure 1,
next page.
•	 Embedded

or traditional software: This
model is focused on selling one-time perpetual
licenses as a key source of revenue and earning
additional revenue through support contracts,
annual version releases and bug fix releases.
Typically, such products are sold via multiple
channels and have a relatively longer product
release cycle.

•	 Subscription

model: Here, the license
defines the entitlement for specific modules/
components of the software, and the focus
is on renewing subscriptions as a key source
of revenue. Such products are also sold via
multiple channels and have multiple SKUs.
Entitlement, metering and billing are the key
support processes needed for such products.

•	 Software

as a service: SaaS involves
on-demand provisioning of software, with a
focus on billing users only for the portion they
use. The focus is on subscription renewals as a
key source of revenue. Distribution of products
is direct and online, and metering and billing
are the only key support processes needed.

Certain business drivers are shared among these
business models, while other drivers are unique
to a particular model. For instance, both the
subscription and SaaS models have subscription renewals as their main revenue driver, and
pricing is usually subscription- or consumptionbased. With subscription models, the most critical
operational processes are entitlement management, metering and billing, while SaaS requires
no entitlement management because the product
is provisioned directly to the user.

Similarly, subscription models are similar to traditional perpetual license models in that both have
indirect and channel-heavy product distribution
conduits. Traditional licensing models, however,
are based on one-time license fees, whereas subscription models rely heavily on renewals.
As a result of these business drivers, each model
differs in terms of supply chain and business complexity. As depicted in Figure 1, a software subscription model has higher business and supply
chain complexities compared with traditional
software or embedded software models. The
reason: It requires complex systems to manage
subscription entitlement and renewal processes.
The SaaS model, on the other hand, has much
lower supply chain complexity than the subscription model. This is true because it doesn’t require
complex distribution networks, and it has a much
higher business complexity due to the complex
metering and pricing/billing mechanisms needed
to ensure that each customer is charged based
on usage only.
What’s noteworthy is the fact that no technology
company is reliant on a single business model,
and businesses typically blend different models to
address the needs of various customer segments.
For example, while Autodesk has made most of
its leading product suites available on SaaS (e.g.,
Maya, Inventor, etc.), the company serves a large
portion of its customer base (such as educational
institutions, private research labs, etc.) via a conventional subscription model, which provides
limited entitlement software. The company’s
supply chain, therefore, must be robust enough
to accommodate multiple business models.

Business Models Differ in Supply Chain Complexity
Subscription
Software

Supply Chain
Complexity

SaaS

Traditional
Software
Embedded
Software

Business Model
Complexity

Figure 1

cognizant 20-20 insights

2
Anatomy of the Software Supply Chain

Sourcing and Building

A software supply chain can be broadly defined
as a chain of processes that enables products
to be built from components or modules, some
of which may be sourced from different vendors
and then distributed via different channels to
meet customer demand. Figure 2 offers a highlevel representation of the software supply chain,
highlighting the key imperatives of each stage.
The key stages can be defined as:

The sourcing and building stage deals with developing/coding the product from scratch and integrating different code components to develop
an end product. Typically, product development
involves sourcing different components/modules
from different teams or vendors and building
product SKUs. There could be many prospective
sources of code, including developed in-house,
contract sourcing (where some of the modules
are developed by a vendor), open source (leveraging open source code and customizing it) and
commercially available code for specific software/
components.

•	 Sourcing

and building: This entails sourcing
different components/modules of the product
from different teams or vendors and integrating them to build the product. The integrity
and authenticity of the code is maintained by
different control processes.

•	 Enabling product SKUs: This involves several

activities: developing product SKUs by bundling
different product components and setting
pricing appropriately based on target customer
segment; maintaining an exhaustive bill of
materials and listing configurations that define
product SKUs; and developing pricing models.

•	 Provisioning and licensing: This includes the

distribution of product licenses to customers,
managing entitlements, metering and billing,
and providing customer support.

•	 License

end-of-term: This covers the
management of support processes for subscription renewals or terminating entitlement
of a user.

When sourcing the code from various providers,
it is imperative that the entire sourcing chain is
free from any intentional or unintentional vulnerability. This will ensure that the final product not
only performs all the planned functions but also
protects end-users from financial or legal risk
(e.g., using third-party or open source code might
create royalty obligations of which the product
team might be unaware).
Minimizing vulnerabilities necessitates robust
software assurance processes and control
measures to ensure all possible risks are mitigated
(see Figure 3, next page). Among the key control
measures that should be considered:

•	 Policies: Formulating governing policies with

vendors via registration/agreements and then
communicating these policies ensures code
check processes are properly instituted.

Software Supply Chain: An Overview

• Watermark code to identify
third-party sources (commercial,
open source) and determine
royalty obligations.
• Software assurance.
• Software release management
and governance.

Source &
Build

Enable
Product SKUs

• Physical shipment, electronic
download, electronic delivery.
• Push/pull update provisioning.
• Licensing and activation.
• Entitlement.
• Customer support.

Provision
& License

• BOM and configuration management.
• Quote to cash enablement across
all offerings, routes to markets and
geographies.
• Quoting.
• Pricing.
• Orderability.

• Software usage compliance
policies and governance.
• Renewals management.

Figure 2

cognizant 20-20 insights

License End
of Term

3
•	 Training

and certification: Periodic training
and (re)certification programs help employees
stay abreast of strategies for reducing risk.
For example, training employees on standard
software check-in processes reduces or
eliminates the risk of having unauthorized
code in the product’s code base.

factors and if the impact is low, then that business
unit can focus just on monitoring risk. However, a
more stringent risk mitigation framework should
be adopted if both the likelihood of IP infringements and the impact are high.

•	 Control self-assessment: Self-testing can be

This stage deals with the steps required to
transform an end product into a market-ready
product.

used for low-risk activities.

•	 Automated

control: Automation of high-risk
controls ensures greater compliance. For
example, automation of “software watermarking” for third-party code to enable tracking of
its usage minimizes the instances of unauthorized code.

Enabling Product SKUs

•	 Defining software product SKUs: Software is

similar to any product that is categorized by
SKUs. Some software can be purchased with
a license for a specific number of machines,
but the same software could be purchased
at another time with a license for a specific
number of users. Each of these is a unique
instance that needs to be tracked separately as
a SKU.

•	 Internal

audit: Third-party validation of
control processes adds a new perspective to
compliance and risk mitigation strategies.

Different business units or product portfolios
within the same company may vary in their level
of dependency on sources of code; because of
this, they will require different software assurance
strategies and control measures. For example, IP
risk compliance is mainly dependent on three
factors: third-party code content, size of the engineering group and utilization of products. Hence,
a company with multiple business units will have
multiple exposures to these factors and, therefore,
will require different software assurances.

•	 Source

of product complexity: Product
innovation to attain market leadership, support
local requirements and tailor solutions to
customers’ needs leads to increased product
complexity and a proliferation of SKUs. A robust
and flexible bill of materials engine is needed to
accommodate a large number of SKUs.

•	 Measuring the cost of product complexity:
>> Analyze the contribution margin of a SKU:

Plotting the cumulative revenue or margin
contribution of products in descending order
helps identify those that represent the contribution majority.

For instance, if a business unit has a low probability/likelihood of IP infringements due to these

Governance Mitigates Rising Risk, Cost of Compliance
Examples
• Unauthorized code in highvolume products
• Software check-in process

Internal
Audit

• Unauthorized code in
the code base

Automated
Controls
Control
Self-Assessment

• Royalty payments

Training & Certification

• Software check-in
• Vendor registration
• Filing of agreements

Policies

Figure 3

cognizant 20-20 insights

4

Risk/Cost of Compliance

Compliance Strategy
>> Item productivity analysis: Item productiv-

ity analysis helps limit the number of items
and configurations in the supply chain that
add little value to the portfolio.

•	 Addressing

product
complexity/SKU
management. An effective strategy for
addressing product complexity focuses on cultivating value-added complexity while reducing
complexity that leads to inefficiency and lower
profitability. Moreover, software providers
must:

>> Understand the unique requirements of dif-

ferent customers and identify clusters of
demand for customer segmentation, supply
chain segmentation and cost-to-serve integration to profitably align supply chain capabilities with customer needs.

Provisioning and Licensing
Once the product SKUs are defined and pricing
is decided, the next stage deals with facilitating product distribution (i.e., provisioning the
product). The main activities during software provisioning include:

•	 Software

delivery: Making sure customers
get their product. This can be done via the
traditional physical shipment of software CDs
or through electronic delivery, which is the
current norm.

•	 Software

updates: Ensuring customers get
all the software updates as defined by their
software entitlements. The mechanism of
sending updates could be:

>> Pull-based: Users are provided with periodic

electronic communications or alerts that
they can access to update their software.

>> Enable the supply chain to more effectively

deliver total customer solutions that include
hardware, software and services.

>> Push-based:

Software vendors provide a
means of updating software via the Internet.

>> Take

supply chain considerations into account while establishing product design
specifications.

»» Licensing

and activation: Activating
customer licenses so they can use software for the intended purpose.

>> Conduct

reviews following product launch.
Reviewing the success of a product launch
and its impact on the supply chain helps
organizations understand the performance
of that product against the initial targets/
forecasts. It will also lead to improvements
in subsequent product introductions.

•	 Enhancing

governance processes: Establishing centers of excellence and program
governance bodies driven by business units
reduces non-value-added complexity.

•	 Setting

configuration, SKU or unique
component reduction targets: Organizations need to understand the opportunity cost
of producing low-profit, low-velocity SKUs
and configurations, as well as the resulting
improvement in product portfolio profitability
if those products were eliminated.

•	 Defining

business practice rules for SKU
management: Rules might include “one in/one
out;” caps on line variants per year by category;
and revenue, volume and margin contribution
thresholds.

cognizant 20-20 insights

»» Entitlement:

Ensuring customers are
able to get all the features they paid for.

»» Customer support: Resolving customer
issues related to software use.

Software publishers do not license their products
in a standard way, which means no single method
will cover all the possible permutations of license
metrics. License complexity is increasing, particularly as hybrid license models emerge that
encompass usage- and device-based licensing
models. Entitlement is a key aspect of software
provisioning, and with changing software licensing
standards and models, software publishers must
more closely scrutinize typical entitlement gaps.
Even though most software is distributed electronically, the provisioning processes still need to
be managed. Entitlement engines help establish
rules to ensure that software licenses are registered correctly; for example, licenses can have
geographic or market restrictions based on price,
usage, transfer, etc. for product support and
upgrades.

5
Entitlement Complexity
Typical Entitlement Gaps

Embedded
Software

Subscription
Software

SaaS

Association of software with
hardware

n

n

NA

Integration with service
contracts

n

n

n

Geo/site validation

n

n

n

Upgrades and renewals
management

n

n

n

n Low
n Moderate
n High

Figure 4

Figure 4 illustrates how and why the entitlement process for subscription software is more
complex than for other types of business models.
Entitlement gaps exist even for installed software,
which is why new systems geared toward license
optimization have emerged to fill the gap.
To stay ahead of the competition and streamline
the provisioning process, many software vendors
are:

•	 Building

cloud-based automated entitlement
engines for SaaS, which is a vast improvement
over manual entitlement service contracts
used with traditional licensed software.

•	 Building and/or adopting new delivery models,

•	 Renewals/upgrade

management: Companies
benefit from investing in automated solutions
to track license renewal opportunities to
minimize revenue leakage, while also crossor upselling new products and services. SaaS
companies must also ensure that customers
who have chosen not to continue with the subscription are managed well and not billed incorrectly.

•	 Usage

tracking: This is programmatically
managed by including utilities in the software
to track concurrency overage and software
duplication.

•	 Notifications

and response management:
Software vendors need a mechanism to send
automated notifications to customers for endof-term action to renew or deactivate licenses.
The solution must also help companies track
customer responses for renewal, cancellation
or deactivation.

such as e-delivery and hosted delivery.

•	 Introducing

balanced scorecard metrics (e.g.,
customer support response, time to activate
licenses) to better understand distribution
dynamics.

•	 Providing proactive customer support, such as:
>> Push updates/information to customers and
channel partners.

>> Self-help tools around license activation, deactivation and FAQs.

To address these activities, companies must
take a more graduated approach to licensing
and construct policies based on customer size,
product and geography. The bottom line is that
a clear software license policy is essential for
software companies to succeed.

License End-of-Term

Looking Ahead

The end-of-term for a license generally leads to
either renewing the subscription entitlement,
moving to a new product/pricing model or terminating the subscription altogether. For traditional on-premise software that has reached
the end of extended maintenance, it could also
mean upgrading to the latest version. Software
providers generally institute proper software
licensing and compliance to manage the end-ofterm process by effectively performing:

Existing software supply chains remain extremely
complex, particularly as vendors adopt different
business models for individual product lines. It is
becoming increasingly difficult for companies to
strike a balance between managing product development and distribution costs while ensuring a
steady revenue stream from product licenses. We
propose the following recommendations to help
software product companies quickly optimize
their software supply chains and generate additional revenues:

cognizant 20-20 insights

6
1.	 Embrace better code management: Managing
traceability and full visibility of different
sources of code segments can help companies
prevent the risk of impending legal issues or a
negative impact on product branding.
2.	Improve the renewals processes: By focusing
on maximum renewals for existing sets of
product licenses and investing in efficient
entitlement management and provisioning,
companies can minimize revenue leakage and
identify renewal opportunities. This will also
present opportunities for upselling, cross-selling and cycle-selling (e.g., month-end, quarterend, etc.).
3.	Enhance license entitlement management:
Within entitlement management, companies
should have adequate governance processes
that address grace periods for licenses and
support contracts, track entitlement support
and manage license cancellation/termination
to further reduce revenue leakage.

4.	Strive for more efficient SKU management:
The different permutations and combinations of product, price, geography, features,
etc. make it difficult for companies to manage
product SKUs. Therefore, they should ensure
that the SKUs are rationalized on the basis of a
global core with regional flexibility. An efficient
bill of materials management engine can help
achieve this.
5.	Move toward a pure SaaS model: Making software products available on-demand instead
of through physical fulfillment can help simplify supply chain complexities. Although the
company will have to invest significantly in
license entitlements and subscription management systems, many other complexities will be
dramatically reduced, such as fewer product
versions to support, more choices for deployment infrastructure and more direct customer
touchpoints.

About the Authors
Charlie Goldenberg is Vice President of Cognizant Business Consulting (CBC), with responsibility for
management consulting services delivered to the technology industry. He has more than 30 years of
management consulting experience and was previously a partner with KPMG Consulting and Deloitte
Consulting. At Deloitte, Charlie led the U.S. high-technology industry practice. He also was responsible for several of Deloitte’s most important technology client relationships, including Microsoft, Sun
Microsystems, Cisco and Intel. After leaving Deloitte, Charlie was a partner with Mercer Management
Consulting, where he helped establish relationships with several major technology clients, including
Symantec, Intel and HP. He started his consulting career with Booz & Co. Charlie can be reached at
Charles.Goldenberg@cognizant.com.
Vivek Bhardwaj is a Manager within Cognizant’s Business Consulting Practice and has extensive product
management experience with online companies in e-commerce, online products and supply chain
management domains. He can be reached at Vivek.Bhardwaj@cognizant.com.
Chaitanya Pokkunuri is a Senior Consultant with the Cognizant Business Consulting Practice and is focused
on helping technology companies with customer experience and customer support strategies. He can be
reached at NVRKChaitanya.Pokkunuri@cognizant.com.

About Cognizant Business Consulting
With over 3,400 consultants worldwide, Cognizant Business Consulting (CBC) offers high-value
consulting services that improve business performance and operational productivity, lower operational
expenses, and enhance overall performance. Clients draw upon our deep industry expertise, program
and change management capabilities, and analytical objectivity to help improve business productivity, drive technology-enabled business transformation, and increase shareholder value. To learn more,
please visit http://www.cognizant.com/business-consulting or e-mail us at inquiry@cognizant.com.

cognizant 20-20 insights

7
About Cognizant
Cognizant (NASDAQ: CTSH) is a leading provider of information technology, consulting, and business process outsourcing services, dedicated to helping the world’s leading companies build stronger businesses. Headquartered in
Teaneck, New Jersey (U.S.), Cognizant combines a passion for client satisfaction, technology innovation, deep industry
and business process expertise, and a global, collaborative workforce that embodies the future of work. With over 50
delivery centers worldwide and approximately 166,400 employees as of September 30, 2013, Cognizant is a member of
the NASDAQ-100, the S&P 500, the Forbes Global 2000, and the Fortune 500 and is ranked among the top performing
and fastest growing companies in the world. Visit us online at www.cognizant.com or follow us on Twitter: Cognizant.

World Headquarters

European Headquarters

India Operations Headquarters

500 Frank W. Burr Blvd.
Teaneck, NJ 07666 USA
Phone: +1 201 801 0233
Fax: +1 201 801 0243
Toll Free: +1 888 937 3277
Email: inquiry@cognizant.com

1 Kingdom Street
Paddington Central
London W2 6BD
Phone: +44 (0) 20 7297 7600
Fax: +44 (0) 20 7121 0102
Email: infouk@cognizant.com

#5/535, Old Mahabalipuram Road
Okkiyam Pettai, Thoraipakkam
Chennai, 600 096 India
Phone: +91 (0) 44 4209 6000
Fax: +91 (0) 44 4209 6060
Email: inquiryindia@cognizant.com

©
­­ Copyright 2013, Cognizant. All rights reserved. No part of this document may be reproduced, stored in a retrieval system, transmitted in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise, without the express written permission from Cognizant. The information contained herein is
subject to change without notice. All other trademarks mentioned herein are the property of their respective owners.

More Related Content

PDF
Loftware evolution barcode_labeling_1217
PDF
HCLT Whitepaper: Multi Channel Integration
PDF
A METRICS ECOSYSTEM FOR DESIGNING QUALITY E-COMMERCE SYSTEMS
PDF
CNC eConnectivity _Project Case Study
PDF
Smart Grid Operational Services Supply Chain Fact Sheet
PDF
Tiered Application Management: Meeting the Need for Speed and Reliability
PDF
Co-Op/MDF Whitepaper by Computer Market Research
PDF
Enhancing Business Partnerships with the B2B Gateway
Loftware evolution barcode_labeling_1217
HCLT Whitepaper: Multi Channel Integration
A METRICS ECOSYSTEM FOR DESIGNING QUALITY E-COMMERCE SYSTEMS
CNC eConnectivity _Project Case Study
Smart Grid Operational Services Supply Chain Fact Sheet
Tiered Application Management: Meeting the Need for Speed and Reliability
Co-Op/MDF Whitepaper by Computer Market Research
Enhancing Business Partnerships with the B2B Gateway

What's hot (13)

PDF
Class of Solution Dilemma
PDF
Multi project security exception reports - Oracle Primavera P6 Collaborate 14
PDF
Moving up the Software License Optimization Maturity Curve to Drive Business ...
PPTX
Ch19-Software Engineering 9
DOCX
Web Services-Enhanced Agile Modeling and Integrating Business Processes
PDF
How to make a cost saving on your Microsoft licensing - in 50 tweets
PDF
Agility in Insurance - Whitepaper
PPT
Bpo Hfa 09 23 09 V1 2
PDF
Making the Right Logistical Move
DOC
Ramesh's supply chain white paper
PDF
Supply Chain Management
PPTX
Telecom Billing by TimelyBill
PDF
Msfairchildcasestudy
Class of Solution Dilemma
Multi project security exception reports - Oracle Primavera P6 Collaborate 14
Moving up the Software License Optimization Maturity Curve to Drive Business ...
Ch19-Software Engineering 9
Web Services-Enhanced Agile Modeling and Integrating Business Processes
How to make a cost saving on your Microsoft licensing - in 50 tweets
Agility in Insurance - Whitepaper
Bpo Hfa 09 23 09 V1 2
Making the Right Logistical Move
Ramesh's supply chain white paper
Supply Chain Management
Telecom Billing by TimelyBill
Msfairchildcasestudy
Ad

Similar to Optimizing Software Supply Chains (20)

PDF
SWM_WP_MaturityModel_July15
PPTX
Vendor Compliance Management software
PDF
Software Pricing
PDF
Rethink Your Software Licensing Monetization Strategy
PDF
IT Software Category
PDF
Wholesale distribution White Paper
PDF
State of the Cloud Computing Marketplace
PDF
What Does it Take to Achieve Software License Optimization?
PPTX
Clarity It Sourcing Diagnostic Presentation
PDF
Interactive selling solutions for complex manufacturing
DOCX
Businesses involved in mergers and acquisitions must exercise due di.docx
PDF
Business rules-extraction
PDF
end-to-end custom software development.pdf
PDF
On demand or on premise
PDF
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
PPTX
No code the next big thing in supply chain technology
PDF
Why Choose the Nalpeiron Licensing Service vs. Building Your Own
PDF
Finance :: Insurance Software Solutions - Build or Buy
PDF
What Are The Challenges of Banking Software Development?
PDF
Overcoming SaaS Development Challenges in 2025
SWM_WP_MaturityModel_July15
Vendor Compliance Management software
Software Pricing
Rethink Your Software Licensing Monetization Strategy
IT Software Category
Wholesale distribution White Paper
State of the Cloud Computing Marketplace
What Does it Take to Achieve Software License Optimization?
Clarity It Sourcing Diagnostic Presentation
Interactive selling solutions for complex manufacturing
Businesses involved in mergers and acquisitions must exercise due di.docx
Business rules-extraction
end-to-end custom software development.pdf
On demand or on premise
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
No code the next big thing in supply chain technology
Why Choose the Nalpeiron Licensing Service vs. Building Your Own
Finance :: Insurance Software Solutions - Build or Buy
What Are The Challenges of Banking Software Development?
Overcoming SaaS Development Challenges in 2025
Ad

More from Cognizant (20)

PDF
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
PDF
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
PDF
It Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
PDF
Intuition Engineered
PDF
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
PDF
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
PDF
The Work Ahead in Manufacturing: Fulfilling the Agility Mandate
PDF
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
PDF
Engineering the Next-Gen Digital Claims Organisation for Australian General I...
PDF
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
PDF
Green Rush: The Economic Imperative for Sustainability
PDF
Policy Administration Modernization: Four Paths for Insurers
PDF
The Work Ahead in Utilities: Powering a Sustainable Future with Digital
PDF
AI in Media & Entertainment: Starting the Journey to Value
PDF
Operations Workforce Management: A Data-Informed, Digital-First Approach
PDF
Five Priorities for Quality Engineering When Taking Banking to the Cloud
PDF
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
PDF
Crafting the Utility of the Future
PDF
Utilities Can Ramp Up CX with a Customer Data Platform
PDF
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
It Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
Intuition Engineered
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
The Work Ahead in Manufacturing: Fulfilling the Agility Mandate
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
Engineering the Next-Gen Digital Claims Organisation for Australian General I...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Green Rush: The Economic Imperative for Sustainability
Policy Administration Modernization: Four Paths for Insurers
The Work Ahead in Utilities: Powering a Sustainable Future with Digital
AI in Media & Entertainment: Starting the Journey to Value
Operations Workforce Management: A Data-Informed, Digital-First Approach
Five Priorities for Quality Engineering When Taking Banking to the Cloud
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
Crafting the Utility of the Future
Utilities Can Ramp Up CX with a Customer Data Platform
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Machine learning based COVID-19 study performance prediction
PDF
Getting Started with Data Integration: FME Form 101
PPT
Teaching material agriculture food technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Empathic Computing: Creating Shared Understanding
“AI and Expert System Decision Support & Business Intelligence Systems”
Unlocking AI with Model Context Protocol (MCP)
20250228 LYD VKU AI Blended-Learning.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
MYSQL Presentation for SQL database connectivity
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
A comparative analysis of optical character recognition models for extracting...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Programs and apps: productivity, graphics, security and other tools
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine learning based COVID-19 study performance prediction
Getting Started with Data Integration: FME Form 101
Teaching material agriculture food technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Building Integrated photovoltaic BIPV_UPV.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Optimizing Software Supply Chains

  • 1. • Cognizant 20-20 Insights Optimizing Software Supply Chains Technology companies must view product development as a software supply chain, identifying the complexities of multiple business models and introducing a framework to mitigate risk. Executive Summary The software supply chain is best described as interconnected business processes that enable software products to be developed, converted to SKUs, distributed and provisioned (i.e., licensing and entitlement) to users. Most companies have a unique software supply chain, depending on the business model; but at a very high level, the sequence of steps remains the same. Hardware and high-technology product manufacturers that develop software for their devices/components also manage distinct supply chains for their software and hardware products to meet specific customer demands. Although the sequence of steps might appear straightforward, much deeper complexities are involved when exploring each stage of the supply chain. For instance, many software companies source components from different vendors during product development, which can cause product integrity challenges. The risk increases when suppliers do not have robust processes in place to ensure their code conforms with industry-defined standards. These complexities might change due to different factors, such as a particular company’s product portfolio or business policies. The impact can be significant if not managed effectively; for instance, the software company may risk an cognizant 20-20 insights | december 2013 impending lawsuit if a lack of software integrity leads to client systems being exposed to vulnerabilities. Hence, it is essential for software companies to continually identify complexities and risks, and have a robust framework in place to mitigate them. Many software companies do not view their business in terms of a conventional supply chain, and they fail to realize that all their business activities can be mapped to a single continuous value chain that should be optimized to achieve their business objectives. This white paper presents a holistic perspective on software supply chain execution. It also highlights key areas where most companies have opportunities to optimize their value chains. Software Supply Chain Trends A company’s supply chain is defined by its business model. The software product industry has seen a continuous evolution of business models, starting with embedded systems and traditional software with perpetual licenses, moving to subscriptionbased software licensing and, finally, evolving most recently to SaaS models. Each business model has its own unique set of characteristics. Specific strategic and operational imperatives of each of these models are summarized in Figure 1, next page.
  • 2. • Embedded or traditional software: This model is focused on selling one-time perpetual licenses as a key source of revenue and earning additional revenue through support contracts, annual version releases and bug fix releases. Typically, such products are sold via multiple channels and have a relatively longer product release cycle. • Subscription model: Here, the license defines the entitlement for specific modules/ components of the software, and the focus is on renewing subscriptions as a key source of revenue. Such products are also sold via multiple channels and have multiple SKUs. Entitlement, metering and billing are the key support processes needed for such products. • Software as a service: SaaS involves on-demand provisioning of software, with a focus on billing users only for the portion they use. The focus is on subscription renewals as a key source of revenue. Distribution of products is direct and online, and metering and billing are the only key support processes needed. Certain business drivers are shared among these business models, while other drivers are unique to a particular model. For instance, both the subscription and SaaS models have subscription renewals as their main revenue driver, and pricing is usually subscription- or consumptionbased. With subscription models, the most critical operational processes are entitlement management, metering and billing, while SaaS requires no entitlement management because the product is provisioned directly to the user. Similarly, subscription models are similar to traditional perpetual license models in that both have indirect and channel-heavy product distribution conduits. Traditional licensing models, however, are based on one-time license fees, whereas subscription models rely heavily on renewals. As a result of these business drivers, each model differs in terms of supply chain and business complexity. As depicted in Figure 1, a software subscription model has higher business and supply chain complexities compared with traditional software or embedded software models. The reason: It requires complex systems to manage subscription entitlement and renewal processes. The SaaS model, on the other hand, has much lower supply chain complexity than the subscription model. This is true because it doesn’t require complex distribution networks, and it has a much higher business complexity due to the complex metering and pricing/billing mechanisms needed to ensure that each customer is charged based on usage only. What’s noteworthy is the fact that no technology company is reliant on a single business model, and businesses typically blend different models to address the needs of various customer segments. For example, while Autodesk has made most of its leading product suites available on SaaS (e.g., Maya, Inventor, etc.), the company serves a large portion of its customer base (such as educational institutions, private research labs, etc.) via a conventional subscription model, which provides limited entitlement software. The company’s supply chain, therefore, must be robust enough to accommodate multiple business models. Business Models Differ in Supply Chain Complexity Subscription Software Supply Chain Complexity SaaS Traditional Software Embedded Software Business Model Complexity Figure 1 cognizant 20-20 insights 2
  • 3. Anatomy of the Software Supply Chain Sourcing and Building A software supply chain can be broadly defined as a chain of processes that enables products to be built from components or modules, some of which may be sourced from different vendors and then distributed via different channels to meet customer demand. Figure 2 offers a highlevel representation of the software supply chain, highlighting the key imperatives of each stage. The key stages can be defined as: The sourcing and building stage deals with developing/coding the product from scratch and integrating different code components to develop an end product. Typically, product development involves sourcing different components/modules from different teams or vendors and building product SKUs. There could be many prospective sources of code, including developed in-house, contract sourcing (where some of the modules are developed by a vendor), open source (leveraging open source code and customizing it) and commercially available code for specific software/ components. • Sourcing and building: This entails sourcing different components/modules of the product from different teams or vendors and integrating them to build the product. The integrity and authenticity of the code is maintained by different control processes. • Enabling product SKUs: This involves several activities: developing product SKUs by bundling different product components and setting pricing appropriately based on target customer segment; maintaining an exhaustive bill of materials and listing configurations that define product SKUs; and developing pricing models. • Provisioning and licensing: This includes the distribution of product licenses to customers, managing entitlements, metering and billing, and providing customer support. • License end-of-term: This covers the management of support processes for subscription renewals or terminating entitlement of a user. When sourcing the code from various providers, it is imperative that the entire sourcing chain is free from any intentional or unintentional vulnerability. This will ensure that the final product not only performs all the planned functions but also protects end-users from financial or legal risk (e.g., using third-party or open source code might create royalty obligations of which the product team might be unaware). Minimizing vulnerabilities necessitates robust software assurance processes and control measures to ensure all possible risks are mitigated (see Figure 3, next page). Among the key control measures that should be considered: • Policies: Formulating governing policies with vendors via registration/agreements and then communicating these policies ensures code check processes are properly instituted. Software Supply Chain: An Overview • Watermark code to identify third-party sources (commercial, open source) and determine royalty obligations. • Software assurance. • Software release management and governance. Source & Build Enable Product SKUs • Physical shipment, electronic download, electronic delivery. • Push/pull update provisioning. • Licensing and activation. • Entitlement. • Customer support. Provision & License • BOM and configuration management. • Quote to cash enablement across all offerings, routes to markets and geographies. • Quoting. • Pricing. • Orderability. • Software usage compliance policies and governance. • Renewals management. Figure 2 cognizant 20-20 insights License End of Term 3
  • 4. • Training and certification: Periodic training and (re)certification programs help employees stay abreast of strategies for reducing risk. For example, training employees on standard software check-in processes reduces or eliminates the risk of having unauthorized code in the product’s code base. factors and if the impact is low, then that business unit can focus just on monitoring risk. However, a more stringent risk mitigation framework should be adopted if both the likelihood of IP infringements and the impact are high. • Control self-assessment: Self-testing can be This stage deals with the steps required to transform an end product into a market-ready product. used for low-risk activities. • Automated control: Automation of high-risk controls ensures greater compliance. For example, automation of “software watermarking” for third-party code to enable tracking of its usage minimizes the instances of unauthorized code. Enabling Product SKUs • Defining software product SKUs: Software is similar to any product that is categorized by SKUs. Some software can be purchased with a license for a specific number of machines, but the same software could be purchased at another time with a license for a specific number of users. Each of these is a unique instance that needs to be tracked separately as a SKU. • Internal audit: Third-party validation of control processes adds a new perspective to compliance and risk mitigation strategies. Different business units or product portfolios within the same company may vary in their level of dependency on sources of code; because of this, they will require different software assurance strategies and control measures. For example, IP risk compliance is mainly dependent on three factors: third-party code content, size of the engineering group and utilization of products. Hence, a company with multiple business units will have multiple exposures to these factors and, therefore, will require different software assurances. • Source of product complexity: Product innovation to attain market leadership, support local requirements and tailor solutions to customers’ needs leads to increased product complexity and a proliferation of SKUs. A robust and flexible bill of materials engine is needed to accommodate a large number of SKUs. • Measuring the cost of product complexity: >> Analyze the contribution margin of a SKU: Plotting the cumulative revenue or margin contribution of products in descending order helps identify those that represent the contribution majority. For instance, if a business unit has a low probability/likelihood of IP infringements due to these Governance Mitigates Rising Risk, Cost of Compliance Examples • Unauthorized code in highvolume products • Software check-in process Internal Audit • Unauthorized code in the code base Automated Controls Control Self-Assessment • Royalty payments Training & Certification • Software check-in • Vendor registration • Filing of agreements Policies Figure 3 cognizant 20-20 insights 4 Risk/Cost of Compliance Compliance Strategy
  • 5. >> Item productivity analysis: Item productiv- ity analysis helps limit the number of items and configurations in the supply chain that add little value to the portfolio. • Addressing product complexity/SKU management. An effective strategy for addressing product complexity focuses on cultivating value-added complexity while reducing complexity that leads to inefficiency and lower profitability. Moreover, software providers must: >> Understand the unique requirements of dif- ferent customers and identify clusters of demand for customer segmentation, supply chain segmentation and cost-to-serve integration to profitably align supply chain capabilities with customer needs. Provisioning and Licensing Once the product SKUs are defined and pricing is decided, the next stage deals with facilitating product distribution (i.e., provisioning the product). The main activities during software provisioning include: • Software delivery: Making sure customers get their product. This can be done via the traditional physical shipment of software CDs or through electronic delivery, which is the current norm. • Software updates: Ensuring customers get all the software updates as defined by their software entitlements. The mechanism of sending updates could be: >> Pull-based: Users are provided with periodic electronic communications or alerts that they can access to update their software. >> Enable the supply chain to more effectively deliver total customer solutions that include hardware, software and services. >> Push-based: Software vendors provide a means of updating software via the Internet. >> Take supply chain considerations into account while establishing product design specifications. »» Licensing and activation: Activating customer licenses so they can use software for the intended purpose. >> Conduct reviews following product launch. Reviewing the success of a product launch and its impact on the supply chain helps organizations understand the performance of that product against the initial targets/ forecasts. It will also lead to improvements in subsequent product introductions. • Enhancing governance processes: Establishing centers of excellence and program governance bodies driven by business units reduces non-value-added complexity. • Setting configuration, SKU or unique component reduction targets: Organizations need to understand the opportunity cost of producing low-profit, low-velocity SKUs and configurations, as well as the resulting improvement in product portfolio profitability if those products were eliminated. • Defining business practice rules for SKU management: Rules might include “one in/one out;” caps on line variants per year by category; and revenue, volume and margin contribution thresholds. cognizant 20-20 insights »» Entitlement: Ensuring customers are able to get all the features they paid for. »» Customer support: Resolving customer issues related to software use. Software publishers do not license their products in a standard way, which means no single method will cover all the possible permutations of license metrics. License complexity is increasing, particularly as hybrid license models emerge that encompass usage- and device-based licensing models. Entitlement is a key aspect of software provisioning, and with changing software licensing standards and models, software publishers must more closely scrutinize typical entitlement gaps. Even though most software is distributed electronically, the provisioning processes still need to be managed. Entitlement engines help establish rules to ensure that software licenses are registered correctly; for example, licenses can have geographic or market restrictions based on price, usage, transfer, etc. for product support and upgrades. 5
  • 6. Entitlement Complexity Typical Entitlement Gaps Embedded Software Subscription Software SaaS Association of software with hardware n n NA Integration with service contracts n n n Geo/site validation n n n Upgrades and renewals management n n n n Low n Moderate n High Figure 4 Figure 4 illustrates how and why the entitlement process for subscription software is more complex than for other types of business models. Entitlement gaps exist even for installed software, which is why new systems geared toward license optimization have emerged to fill the gap. To stay ahead of the competition and streamline the provisioning process, many software vendors are: • Building cloud-based automated entitlement engines for SaaS, which is a vast improvement over manual entitlement service contracts used with traditional licensed software. • Building and/or adopting new delivery models, • Renewals/upgrade management: Companies benefit from investing in automated solutions to track license renewal opportunities to minimize revenue leakage, while also crossor upselling new products and services. SaaS companies must also ensure that customers who have chosen not to continue with the subscription are managed well and not billed incorrectly. • Usage tracking: This is programmatically managed by including utilities in the software to track concurrency overage and software duplication. • Notifications and response management: Software vendors need a mechanism to send automated notifications to customers for endof-term action to renew or deactivate licenses. The solution must also help companies track customer responses for renewal, cancellation or deactivation. such as e-delivery and hosted delivery. • Introducing balanced scorecard metrics (e.g., customer support response, time to activate licenses) to better understand distribution dynamics. • Providing proactive customer support, such as: >> Push updates/information to customers and channel partners. >> Self-help tools around license activation, deactivation and FAQs. To address these activities, companies must take a more graduated approach to licensing and construct policies based on customer size, product and geography. The bottom line is that a clear software license policy is essential for software companies to succeed. License End-of-Term Looking Ahead The end-of-term for a license generally leads to either renewing the subscription entitlement, moving to a new product/pricing model or terminating the subscription altogether. For traditional on-premise software that has reached the end of extended maintenance, it could also mean upgrading to the latest version. Software providers generally institute proper software licensing and compliance to manage the end-ofterm process by effectively performing: Existing software supply chains remain extremely complex, particularly as vendors adopt different business models for individual product lines. It is becoming increasingly difficult for companies to strike a balance between managing product development and distribution costs while ensuring a steady revenue stream from product licenses. We propose the following recommendations to help software product companies quickly optimize their software supply chains and generate additional revenues: cognizant 20-20 insights 6
  • 7. 1. Embrace better code management: Managing traceability and full visibility of different sources of code segments can help companies prevent the risk of impending legal issues or a negative impact on product branding. 2. Improve the renewals processes: By focusing on maximum renewals for existing sets of product licenses and investing in efficient entitlement management and provisioning, companies can minimize revenue leakage and identify renewal opportunities. This will also present opportunities for upselling, cross-selling and cycle-selling (e.g., month-end, quarterend, etc.). 3. Enhance license entitlement management: Within entitlement management, companies should have adequate governance processes that address grace periods for licenses and support contracts, track entitlement support and manage license cancellation/termination to further reduce revenue leakage. 4. Strive for more efficient SKU management: The different permutations and combinations of product, price, geography, features, etc. make it difficult for companies to manage product SKUs. Therefore, they should ensure that the SKUs are rationalized on the basis of a global core with regional flexibility. An efficient bill of materials management engine can help achieve this. 5. Move toward a pure SaaS model: Making software products available on-demand instead of through physical fulfillment can help simplify supply chain complexities. Although the company will have to invest significantly in license entitlements and subscription management systems, many other complexities will be dramatically reduced, such as fewer product versions to support, more choices for deployment infrastructure and more direct customer touchpoints. About the Authors Charlie Goldenberg is Vice President of Cognizant Business Consulting (CBC), with responsibility for management consulting services delivered to the technology industry. He has more than 30 years of management consulting experience and was previously a partner with KPMG Consulting and Deloitte Consulting. At Deloitte, Charlie led the U.S. high-technology industry practice. He also was responsible for several of Deloitte’s most important technology client relationships, including Microsoft, Sun Microsystems, Cisco and Intel. After leaving Deloitte, Charlie was a partner with Mercer Management Consulting, where he helped establish relationships with several major technology clients, including Symantec, Intel and HP. He started his consulting career with Booz & Co. Charlie can be reached at Charles.Goldenberg@cognizant.com. Vivek Bhardwaj is a Manager within Cognizant’s Business Consulting Practice and has extensive product management experience with online companies in e-commerce, online products and supply chain management domains. He can be reached at Vivek.Bhardwaj@cognizant.com. Chaitanya Pokkunuri is a Senior Consultant with the Cognizant Business Consulting Practice and is focused on helping technology companies with customer experience and customer support strategies. He can be reached at NVRKChaitanya.Pokkunuri@cognizant.com. About Cognizant Business Consulting With over 3,400 consultants worldwide, Cognizant Business Consulting (CBC) offers high-value consulting services that improve business performance and operational productivity, lower operational expenses, and enhance overall performance. Clients draw upon our deep industry expertise, program and change management capabilities, and analytical objectivity to help improve business productivity, drive technology-enabled business transformation, and increase shareholder value. To learn more, please visit http://www.cognizant.com/business-consulting or e-mail us at inquiry@cognizant.com. cognizant 20-20 insights 7
  • 8. About Cognizant Cognizant (NASDAQ: CTSH) is a leading provider of information technology, consulting, and business process outsourcing services, dedicated to helping the world’s leading companies build stronger businesses. Headquartered in Teaneck, New Jersey (U.S.), Cognizant combines a passion for client satisfaction, technology innovation, deep industry and business process expertise, and a global, collaborative workforce that embodies the future of work. With over 50 delivery centers worldwide and approximately 166,400 employees as of September 30, 2013, Cognizant is a member of the NASDAQ-100, the S&P 500, the Forbes Global 2000, and the Fortune 500 and is ranked among the top performing and fastest growing companies in the world. Visit us online at www.cognizant.com or follow us on Twitter: Cognizant. World Headquarters European Headquarters India Operations Headquarters 500 Frank W. Burr Blvd. Teaneck, NJ 07666 USA Phone: +1 201 801 0233 Fax: +1 201 801 0243 Toll Free: +1 888 937 3277 Email: inquiry@cognizant.com 1 Kingdom Street Paddington Central London W2 6BD Phone: +44 (0) 20 7297 7600 Fax: +44 (0) 20 7121 0102 Email: infouk@cognizant.com #5/535, Old Mahabalipuram Road Okkiyam Pettai, Thoraipakkam Chennai, 600 096 India Phone: +91 (0) 44 4209 6000 Fax: +91 (0) 44 4209 6060 Email: inquiryindia@cognizant.com © ­­ Copyright 2013, Cognizant. All rights reserved. No part of this document may be reproduced, stored in a retrieval system, transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the express written permission from Cognizant. The information contained herein is subject to change without notice. All other trademarks mentioned herein are the property of their respective owners.