The Challenge

The client — a Tier-1 defense systems integrator with approximately 11,000 employees across facilities in the northeastern United States — had been running IBM software across a complex, security-hardened IT estate for over a decade. Their environment included IBM Db2, WebSphere Application Server, IBM MQ, Cognos Analytics, and a range of IBM Tivoli products deployed across a mix of on-premises bare-metal servers, VMware virtualised environments, and several air-gapped networks supporting classified programs.

IBM initiated a formal audit under Passport Advantage Agreement terms. Within six weeks, IBM's audit team delivered an initial compliance claim totalling $34 million, structured across two primary categories: $22 million in alleged sub-capacity licensing shortfalls attributed to ILMT non-compliance and under-reported Processor Value Units (PVUs), and $12 million in entitlement gaps where IBM contended that deployed software versions exceeded the client's purchased entitlements.

The client's internal IT asset management team had limited IBM licensing expertise and had not engaged external support during the audit initiation phase. By the time Redress Compliance was engaged, IBM had already submitted its first compliance report and was applying pressure for a rapid settlement. The client faced a credible risk of a nine-figure contractual dispute if IBM pursued its full claim.

"IBM's first compliance report is not a factual determination — it is a negotiation opening position. The question is never whether to challenge it, but how systematically you do so."

Why IBM Audits of Defense Contractors Are Particularly Complex

Defense suppliers present unique IBM audit challenges that differ substantially from commercial enterprise environments. Procurement for IBM software frequently occurs through multiple channels — direct Passport Advantage agreements, GSA Schedule contracts, and defense program-specific vehicles — creating entitlement records that are fragmented across IBM's systems, government contract management platforms, and internal procurement archives. IBM's audit teams typically review only Passport Advantage records, leaving government-procured entitlements invisible in the compliance picture.

Air-gapped and classified networks add a further complication: ILMT cannot be deployed in these environments without significant security architecture changes, and IBM's standard sub-capacity requirements conflict directly with classified network isolation policies. IBM's auditors, working from standard commercial playbooks, routinely generate full-capacity PVU claims for environments they cannot measure — converting a manageable sub-capacity position into the most expensive licensing metric available.

Received an IBM audit notice?

We've defended over 60 IBM audit engagements. Early involvement improves outcomes significantly.
Download the IBM Audit Defence Kit →

The Approach

Redress Compliance deployed a three-track defense strategy running in parallel over a 14-week period, targeting the three largest sources of IBM's overstatement.

Track 1: ILMT Forensic Review and PVU Recalculation

IBM's compliance report had calculated PVU exposure using full-capacity values for all servers where ILMT data was absent or incomplete. Redress conducted a server-by-server reconstruction of the virtualisation topology across the client's VMware clusters, identifying three categories of error in IBM's calculations.

First, IBM had used an outdated PVU table — the version in effect at the time of the last ILMT deployment, not the current table — for a cohort of Intel Xeon processors introduced during a 2022 infrastructure refresh. The newer processors carried lower PVU values. Second, IBM had counted IBM MQ as a separate deployed product on 47 broker nodes where it was bundled within the IBM WebSphere Application Server Network Deployment entitlement already held by the client. Third, IBM had included 14 servers in two geographically separate disaster recovery facilities in its full-capacity claim. Industry-standard practice, supported by IBM's own Passport Advantage documentation, excludes passive DR environments from PVU calculations under specific conditions the client met.

The corrected ILMT and PVU analysis reduced the sub-capacity portion of IBM's claim from $22 million to $6.3 million — a reduction of $15.7 million attributable solely to calculation errors in IBM's own compliance report.

Track 2: GSA Schedule Entitlement Reconstruction

IBM's entitlement gap analysis had been compiled entirely from Passport Advantage purchase records. The client, as a major US defense contractor, had procured substantial volumes of IBM software through GSA Schedule contracts and defense program-specific procurement vehicles over a twelve-year period. These procurements were not reflected anywhere in IBM's records.

Redress worked with the client's government contracts management team to reconstruct procurement records from GSA contract management systems, DD Form 250 delivery records, and archived purchase orders. The reconstruction identified $5.2 million in valid Db2 and WebSphere entitlements that IBM had claimed as gaps — entitlements that had been properly procured and deployed but were invisible to IBM's audit team because they sat outside Passport Advantage.

The remaining entitlement gap, after reconstruction, stood at approximately $6.8 million across IBM Cognos and Tivoli products — a genuine compliance position requiring resolution but substantially smaller than IBM's opening claim.

Track 3: Classified Network Architecture Analysis

IBM had claimed full-capacity PVU fees for all servers on the client's two air-gapped classified networks, on the basis that ILMT was not deployed and sub-capacity rights were therefore forfeited. Redress prepared a formal technical position paper documenting that the client's classified network architecture complied with applicable DoD and NIST frameworks, that ILMT deployment on these networks would require an architectural exception process incompatible with program security requirements, and that IBM's own sub-capacity policy documentation contained no explicit prohibition on sub-capacity claims where ILMT deployment was precluded by government security mandates.

IBM accepted, during the negotiation phase, a modified sub-capacity position for the classified environments supported by a manually-maintained deployment record and periodic internal compliance attestations. This resolution eliminated $9 million of IBM's full-capacity claims against the classified estate.

The Outcome

The three-track analysis produced a corrected compliance position with total verified shortfalls of approximately $13.1 million — against IBM's opening claim of $34 million. Redress then led the settlement negotiation, engaging IBM's commercial team with a comprehensive corrected compliance report, procurement evidence, and the technical position paper on classified environment sub-capacity eligibility.

IBM agreed to a final settlement of $4.1 million, which included $3.2 million in forward-period licensing for Cognos Analytics and Tivoli products where genuine entitlement shortfalls existed, and $0.9 million in audit settlement fees. The settlement also secured a two-year audit standstill and the adoption of a mutually-agreed ILMT deployment roadmap that resolved the classified network compliance position on a going-forward basis.

"The $29.9M reduction wasn't a negotiating discount — it was the correction of factual errors in IBM's own compliance report. Three categories of calculation error, two procurement channels IBM had no visibility into, and a classified network issue IBM's commercial auditors had no framework for handling."

The engagement delivered total value of $29.9 million relative to IBM's opening claim, achieved through documented error correction rather than settlement leverage. The client's annual IBM spend of approximately $3.1 million in ongoing support costs was unaffected by the audit outcome.

Post-Engagement Licensing Hygiene Programme

Following settlement, Redress implemented a structured IBM licensing hygiene programme for the client. This included quarterly ILMT report reviews across all commercial environments, a formal entitlement register consolidating Passport Advantage and GSA Schedule procurement records, annual reconciliation of classified network deployment attestations, and a Passport Advantage Agreement amendment documenting the agreed treatment of air-gapped environments.

The programme reduced the client's estimated IBM audit exposure from a standing risk of $18–25 million (based on the pre-engagement compliance position) to a controlled residual risk of under $2 million. Critically, it also positioned the client to respond quickly to any future IBM audit initiation — rather than entering reactive defense from a standing start, as had occurred in this engagement.

Managing IBM across a complex, multi-channel environment?

Redress provides independent IBM advisory — audit defense, ILMT programme management, ELA structuring, and Passport Advantage optimisation.
View IBM Services →

Key Lessons for Enterprise IBM Customers

This engagement illustrates three issues that recur consistently across IBM audits of large enterprise customers, particularly those operating complex or regulated environments.

IBM's first compliance report contains errors — always. IBM's audit methodology relies on automated scanning tools and internal records that are systematically incomplete. In this engagement, the first compliance report contained $15.7 million in PVU calculation errors alone. Accepting IBM's first report without forensic review is the single most expensive mistake an organisation can make during an IBM audit.

Government procurement channels are invisible to IBM. If your organisation procures IBM software through GSA Schedule, DLA, or defense program vehicles, those entitlements will not appear in IBM's Passport Advantage records. Every IBM audit of a defense contractor should begin with a systematic reconstruction of all procurement channels — not just Passport Advantage.

ILMT gaps in regulated environments have defensible solutions. The assumption that ILMT non-deployment automatically triggers full-capacity pricing is incorrect for environments where ILMT deployment is precluded by government security mandates. A well-documented technical position, presented early in the audit process, can preserve sub-capacity eligibility in these environments.