ProfileTailor LicenseAuditor
Optimize Your SAP Investment By Automating License Management
Automate SAP License Management With ProfileTailor LicenseAuditor
Effective SAP License Optimization
Due to SAP’s complex licensing environment, organizations are compelled to find a way to secure their SAP investments and manage their SAP licenses effectively. ProfileTailor LicenseAuditor supplies ultimate control over SAP licensing by combining user inspection, user behavior-analysis methods and best practices.
Real Time Statistics
Real-time graphical and statistical presentation of current SAP license utilization and situation
Smart Allocation
Automatic user-matching across systems and applications to avoid duplicate license counts
Duplicate Users
Quickly identify duplicate users which can be combined and removed and reallocate their licenses
Inactive Users
Immediately identify inactive users and low activity users for instant savings and reallocating their license
Single Complete Platform
A single platform which will automatically map and combine all SAP systems and users for complete optimization
Hosted Cloud Based Option
A solution for every organization no matter the size, ProfileTailor is available as a cloud or on-premise solution
Quick Implemenatation
Fast, easy, and non-intrusive installation, external to the SAP systems with no changes needed
Usage Based Optimization
Reclassification of licenses based on actual user behavior and not based on hypothetical methods
Licensing Based on Usage
Unlike many other SAP license optimization solutions, Xpandion tracks the ACTUAL behavior of each SAP user. By utilizing ProfileTailor LicenseAuditor, organizations will never be under or over licensed again. Organizations will be able to purchase the licenses needed based on their actual utilization of the SAP system.
Amount of Activity – Counting dialog steps allows organizations to allocate the most suitable license type based on how much the user used SAP as a whole.
Type of Usage – Counting the number of transaction used allows organizations to allocate license types based on the how much of the SAP system the user has utilized.
Activity Groups – The most suitable license type will be assigned to a user based on how or according to which ways a user used SAP.
Customized Definitions – Any combination of allocation type or any unique format requested by the organization.
Immediate Savings
100% on dormant accounts
100% on multiple username accounts
50-90% for each re-classified license
50% on license management resources
15% + on total maintenance fees

Full Transparency
Provides a clear view of current situation and available licenses within minutes
Rapid Reclassification
Immediately identifies dormant, underused, misclassified and duplicate accounts
Automated Analysis
Automatic analysis based on usage compared to licensing agreement to ensure compliance
Audit Ready Reporting
Detailed audit reports for each user with current and optimized license classification
Tackling Indirect Access
ProfileTailor LicenseAuditor identifies suspicious user accounts that might be used for indirect access by defining third party applications, including related user accounts, inspecting third party applications and point out possible risks for indirect access. ProfileTailor LicenseAuditor provides immediate notifications of new potential indirect access providing ongoing optimization.
Digital Access
Companies can now license indirect access by users or by orders. ProfileTailor LicenseAuditor provides a clear view of the amount of orders allowing organizations to compare if licensing by orders or by users is the most cost effective way to license indirect access. This allows organizations to predict and project future licensing costs more effectively and clearly.
Indirect Static Read
Identify and determine if any indirect usages are due to static read. Since static read users, defined by SAP, do not require any additional licenses, companies no longer need to worry about surprise costs during an audit. ProfileTailor LicenseAuditor has the ability to identify and determine which data was accessed, how it was accessed and if it qualifies as static read.