Executive Summary

IBM's security and storage software estate presents a deceptively complex licensing challenge. On the security side, QRadar SIEM, Guardium Data Security, and IBM Verify each use fundamentally different pricing metrics — Events per Second, data source counts, and per-user-per-month respectively. On the storage side, Spectrum Protect, Spectrum Scale, and FlashSystem Storage Virtualize blend capacity-based, processor-based, and appliance-based models into an estate that routinely creates audit exposure.

Layering on top of all of this is IBM's sub-capacity licensing regime, anchored by the IBM License Metric Tool (ILMT). Without correctly deployed and configured ILMT, sub-capacity licensing claims become invalid and IBM can demand full-capacity charges retrospectively — a risk that surfaces most violently during an IBM Software Audit. The transition from Processor Value Unit (PVU) metrics to Virtual Processor Core (VPC) metrics inside IBM Cloud Paks has added a further compliance dimension that many organisations have not fully addressed.

This playbook provides a structured framework for CIOs to gain visibility, reduce costs, and establish an audit-ready position across both portfolios — without waiting for IBM to prompt a review.

IBM Security Portfolio: The Licensing Landscape

IBM's security product line spans threat detection (QRadar), data protection (Guardium), and identity and access management (Verify). Each product family is sold through Passport Advantage and uses distinct licensing constructs. Understanding each is prerequisite to building a coherent cost control strategy.

QRadar SIEM: Events, Flows, and the Enterprise Model

IBM QRadar SIEM is licensed under two primary models. The first, and most common, is the Usage Model, where organisations purchase capacity based on Events per Second (EPS) — the number of log events ingested per second — and Flows per Minute (FPM) — the volume of network communications monitored. EPS capacity is tiered, with organisations selecting a peak rate from a few hundred EPS up to several thousand, and FPM licensed in blocks such as 25,000 or 50,000 per minute.

The second model is the Enterprise Model, priced by the count of Managed Virtual Servers (MVS) — every physical, virtual, and cloud server in the environment. Under this model, log event ingestion is unlimited, which makes it attractive for organisations with high and variable event volumes. The trade-off is that the MVS count can be difficult to predict and control as infrastructure grows.

A critical compliance consideration: if QRadar or any of its components run in a virtualised environment and are subject to PVU or sub-capacity licensing, IBM mandates use of ILMT. Without it, IBM assumes full physical processor capacity for licensing purposes, which can multiply your licence obligation by a factor of five or more depending on host density. This is one of the most common sources of QRadar-related audit findings.

IBM has also introduced the IBM Security QRadar Suite, a bundled offering that combines SIEM, SOAR (Security Orchestration, Automation and Response), and Network Detection and Response under a single procurement. Organisations evaluating QRadar renewal should assess whether the Suite delivers genuine value consolidation or whether it creates a locked-in dependency on capabilities they do not actively need. In our experience, Suite pricing can be materially better than individual component pricing — but only when the full breadth of capabilities is deployed and utilised.

"The most common QRadar over-spend we see is organisations licensing for peak EPS without ever tuning their log sources to eliminate noise. A 30 percent reduction in ingested events through source rationalisation can unlock equivalent licence downgrades at renewal."

Guardium: Data Security with Complex Node Economics

IBM Guardium provides database activity monitoring, data discovery, and compliance reporting across on-premises and cloud data environments. It is used by enterprises to meet PCI-DSS, SOX, GDPR, and CPRA requirements, and its compliance template library and continuous audit workflows make it a technically capable platform.

Guardium licensing is available in both perpetual and subscription models. Pricing is typically structured around the number of monitored data sources and the volume of data under management. Annual costs typically range between $100,000 and $300,000 depending on deployment scale, module selection, and negotiated terms.

One persistent source of cost surprise is passive node licensing. Unlike some competitive platforms, IBM Guardium charges licence fees for passive or standby nodes — not just active monitoring nodes. This is flagged consistently in enterprise reviews and can add 15–25% to expected costs in high-availability deployments. CIOs should ensure their licence inventory explicitly accounts for passive nodes when validating entitlement positions.

IBM Guardium Data Protection 12.2, released in 2025, introduced continuous compliance capabilities — automating deviation detection before they become formal audit findings. While technically advanced, organisations upgrading to 12.2 should validate that their current licence tier includes the continuous compliance module, as IBM has positioned it as an additional entitlement in some deployment scenarios.

IBM Verify: Per-User IAM with Unpredictable Costs at Scale

IBM Security Verify is IBM's identity and access management platform, covering workforce IAM, consumer IAM (CIAM), single sign-on (SSO), multi-factor authentication (MFA), adaptive access, identity governance, and privileged access management (PAM). It is delivered as a SaaS platform and priced on a per-user per-month basis, with pricing varying by capability module:

  • SSO: approximately $1.71 per user per month
  • MFA: approximately $1.71 per user per month
  • Adaptive Access: approximately $1.71 per user per month
  • Lifecycle & Provisioning: approximately $2.01 per user per month
  • Identity Analytics: approximately $2.13 per user per month

For large enterprises with tens of thousands of users, these rates accumulate rapidly — particularly when organisations deploy multiple modules. The key negotiation lever here is active user definition: IBM Verify pricing is based on active users per month, and costs decrease when users are active less frequently. Ensuring that IBM's definition of "active" aligns with your actual usage patterns is a meaningful cost control mechanism.

Organisations evaluating Verify should also benchmark against alternative IAM platforms — including Microsoft Entra ID (included in Microsoft 365 E3/E5 in many configurations), Okta, and Ping Identity — to ensure IBM's pricing reflects genuine market value for the capabilities deployed.

Concerned about your IBM Security licensing position?

Our IBM specialists provide independent licence assessments, audit preparation, and renewal negotiation support.
Speak to an Expert →

IBM Storage Software: Licensing Mechanics

IBM's storage software portfolio — Storage Protect, Spectrum Scale, and the software defined capabilities embedded in FlashSystem — uses a combination of capacity-based, processor-based, and appliance-based metrics. Choosing the wrong metric, or failing to track it accurately, creates the conditions for significant audit exposure.

IBM Storage Protect: The PVU Trap That Catches Most Organisations

IBM Storage Protect (formerly Tivoli Storage Manager / Spectrum Protect) is IBM's flagship data protection platform, providing backup, deduplication, and recovery for on-premises and cloud environments. It is licensed per terabyte of managed front-end capacity, with tiered pricing at scale.

What catches most organisations is the IBM Storage Protect Extended Edition PVU requirement. Many customers assume they only need to count PVUs for the Storage Protect server itself. In reality, PVU licences are required for every system involved in the backup environment — including media servers, storage nodes, and agent hosts in some configurations. In large enterprises, this can mean the actual PVU entitlement need is dramatically understated — by as much as 99% in the most severe cases documented in practice.

This is precisely where ILMT plays its critical role. ILMT continuously scans and records how much capacity each IBM programme is consuming across every server in the environment. Without correctly deployed ILMT agents on every IBM software host — including Storage Protect nodes — IBM defaults to full physical processor capacity in the absence of sub-capacity measurement. The financial consequence of this default is substantial.

Spectrum Scale: Capacity Licensing and the Suite Value Proposition

IBM Spectrum Scale (now increasingly referenced as IBM Storage Scale) provides high-performance parallel file system capabilities for AI, analytics, and unstructured data workloads. It is licensed by managed storage capacity, with IBM offering the Storage Suite as a bundling vehicle that includes Spectrum Scale alongside other IBM storage software products.

The IBM Spectrum Storage Suite calculates licences on the amount of storage capacity being managed — not the number of software products deployed — and delivers up to 40% cost savings compared to licensing all components individually. For organisations running both Storage Protect and Spectrum Scale, the Suite represents a material cost optimisation opportunity. However, Suite entitlements must be carefully reconciled against actual deployments to avoid inadvertent scope creep that creates compliance gaps.

FlashSystem and Storage Virtualize: System vs Capacity Licensing

IBM FlashSystem integrates Storage Virtualize software, which adds virtualisation, tiering, and replication capabilities. Licensing for Storage Virtualize can be either system-based (licensed per physical appliance) or capacity-based (licensed per TB of managed usable capacity). IBM's IBM Storage Insights and IBM Storage Control tools provide monitoring and reporting capabilities that may carry their own licensing requirements depending on deployment scale.

Organisations running FlashSystem in virtualised environments where software-defined capabilities are licensed separately from hardware should confirm which licensing metric applies to each layer — failure to do so is a recurring source of unintended licence shortfall during audit.

IBM Licensing Intelligence — Monthly

Audit trends, sub-capacity compliance updates, and cost optimisation strategies from Redress Compliance specialists.

ILMT: Your Sub-Capacity Compliance Foundation

The IBM License Metric Tool (ILMT) is the cornerstone of IBM's sub-capacity licensing programme and the single most important compliance infrastructure component for any organisation running IBM software in virtualised environments. Sub-capacity licensing — which allows organisations to license IBM software based on the actual virtual processor capacity allocated to an application, rather than the full capacity of the physical host — is only legally valid if ILMT is correctly configured and generating the required reports.

What ILMT Must Do to Qualify for Sub-Capacity

IBM's requirements are explicit: organisations wishing to claim sub-capacity licensing benefits must install ILMT agents on every server — physical or virtual — where IBM software is installed. Incomplete agent coverage means that even one unscanned host can invalidate sub-capacity claims across the entire environment for that software product. IBM's auditors check ILMT coverage exhaustively.

Beyond agent deployment, ILMT must generate and archive a Sub-Capacity Report at least once per quarter. These quarterly reports must be retained for a minimum of two years and made available to IBM on request during an audit. IBM no longer accepts most exceptions to the ILMT mandate — as of May 2023, virtually all customers except those in narrow legacy scenarios are required to use ILMT for sub-capacity licensing.

For containerised IBM deployments — for example, IBM software running on Red Hat OpenShift — ILMT is not the correct tool. Container environments require IBM Licence Service, which tracks VPC consumption within Kubernetes clusters. Organisations running IBM software in containers who rely on ILMT alone for sub-capacity measurement have a compliance gap.

ILMT Deployment: The 90-Day Rule

Any organisation deploying IBM software into a virtualised environment for the first time — or expanding their IBM software estate — must install and configure ILMT within 90 days of deployment. Failure to meet this window eliminates sub-capacity eligibility for that deployment from the date of installation, not from the date of ILMT deployment. IBM auditors apply this rule retrospectively, creating back-dated exposure for organisations that deploy ILMT late.

The practical implication for CIOs is that ILMT governance must be embedded in the software deployment process — not treated as a post-installation compliance activity. Every new IBM software deployment in a virtual environment should trigger an immediate ILMT agent deployment as part of the same change window.

"We have never seen an IBM audit where ILMT was perfectly deployed. Coverage gaps, agent version mismatches, and stale quarterly reports are the three most common findings — and all three are preventable with basic operational discipline."

The PVU-to-VPC Transition: Where Compliance Gaps Hide

One of the most significant structural changes in IBM licensing in recent years has been the transition from Processor Value Unit (PVU) metrics to Virtual Processor Core (VPC) metrics, driven primarily by the rollout of IBM Cloud Paks. Understanding the distinction — and the compliance implications of the transition — is essential for any organisation with IBM Cloud Pak deployments.

PVU: The Legacy Processor Metric

PVU licensing assigns a point value to each processor core based on its type and architecture, then charges IBM software based on the number of PVU points allocated to the hosts running that software. Sub-capacity PVU licensing — which allows organisations to claim only the virtual CPU allocation, not the full physical core count — requires ILMT to be correctly deployed and generating quarterly reports.

PVU remains the metric for many traditional IBM software products including WebSphere, DB2, Tivoli tools, and legacy middleware. Organisations with complex hybrid environments often have both PVU-licensed and VPC-licensed products running simultaneously, creating a dual-tracking requirement that increases operational complexity.

VPC: The Cloud Pak Metric and Its Compliance Implications

IBM Cloud Paks — containerised software bundles built on Red Hat OpenShift — use Virtual Processor Core (VPC) as their licensing metric. A VPC corresponds to a virtual processor core allocated to a container workload, measured by IBM Licence Service rather than ILMT.

The compliance gap that the PVU-to-VPC transition creates is twofold. First, organisations that deployed Cloud Paks without understanding the metric change may still be tracking VPC consumption through ILMT — which does not accurately measure container workloads. Second, and more critically, IBM Cloud Pak bundles include Red Hat OpenShift as a foundational component. Organisations that separately purchased OpenShift licences before adopting Cloud Paks — or that run OpenShift for non-Cloud-Pak workloads on the same infrastructure — face a genuine double-licensing risk. OpenShift entitlements bundled into Cloud Paks do not automatically cancel pre-existing OpenShift purchases, and IBM's licence reconciliation process does not proactively resolve this for customers.

Every organisation with Cloud Pak deployments should conduct an explicit entitlement mapping exercise that distinguishes bundled OpenShift VPCs from any separately purchased OpenShift subscriptions, and validates that IBM Licence Service — not ILMT — is the measurement tool of record for all container workloads.

IBM Audit Risk: What Gets You Caught

IBM conducts audits through its Software Audit team and through KPMG and other authorised third parties. IBM's fiscal year ends on 31 December, and audit activity typically intensifies in Q3 and Q4 as IBM pushes to close revenue gaps. Understanding the most common audit triggers and findings is the first step in building a defensible position.

The Most Common IBM Security and Storage Audit Findings

Based on Redress Compliance's work on IBM audit response engagements, the following patterns appear most frequently in Security and Storage software audits:

  • ILMT coverage gaps: Servers running IBM software with no ILMT agent installed, or with agents that have not reported within the required window. This immediately invalidates sub-capacity claims for affected products.
  • Storage Protect PVU undercounting: Organisations counting only the primary Storage Protect server for PVU purposes rather than all nodes in the backup environment.
  • QRadar EPS exceedance: Production event volumes consistently exceeding the licensed EPS tier, creating a retroactive licence deficit. IBM's EPS measurement uses peak rates, not averages.
  • Guardium passive node exclusions: Failing to count passive and standby Guardium nodes in the licence entitlement calculation.
  • Cloud Pak double-licensing: Holding both standalone OpenShift subscriptions and Cloud Pak entitlements that include OpenShift, without a formal entitlement reconciliation agreed with IBM.
  • Stale or missing quarterly ILMT reports: Reports not generated within the required quarterly cadence, or not retained for the mandatory two-year period.
  • IBM Licence Service not deployed for containers: Using ILMT alone for Cloud Pak environments rather than IBM Licence Service.

Preparing for an IBM audit or facing an active audit request?

Redress Compliance provides specialist IBM audit defence — from initial scoping through to settlement negotiation.
Get Audit Support →

ELA Strategy for IBM Security and Storage

The IBM Enterprise License Agreement (ELA) is the most powerful commercial lever available to large IBM customers. ELAs provide comprehensive coverage across a defined product scope for a fixed annual payment, with discounts typically ranging from 30 to 50 percent off list price. For organisations with significant QRadar, Guardium, or Storage Protect deployments, an ELA can deliver meaningful cost reduction while simplifying licence management.

Structuring the ELA Correctly

The most important principle in IBM ELA negotiations is scope discipline. IBM sales teams will push for broad product inclusion — covering security, storage, middleware, and data products under a single agreement — because a wider scope increases IBM's contracted revenue and creates deeper lock-in. Customers should resist this pressure and structure ELAs around product families where they have genuine deployment density and growth plans.

For Security and Storage specifically, a focused ELA covering QRadar, Guardium, and Storage Protect — with clearly defined growth metrics and substitution provisions — will typically deliver better economics than an omnibus agreement that includes products at the periphery of your IBM estate.

Substitution Pots: The Most Under-Used ELA Provision

IBM ELAs can be negotiated to include substitution pots — a pool of licence value that can be exchanged for alternative IBM products during the term. For Security and Storage customers, substitution provisions are particularly valuable because product roadmaps change: QRadar usage may decline if the organisation evaluates alternative SIEM platforms, or Storage Protect requirements may shift as cloud-native backup solutions mature. Substitution rights ensure that contracted value can be redirected to current priorities rather than left stranded in unused entitlements.

ELA Timing and Negotiation Preparation

IBM ELA negotiations should begin no later than 12 to 18 months before the current agreement expires. Starting earlier gives the organisation time to conduct a thorough entitlement and deployment assessment — understanding actual consumption versus contracted entitlements — before entering commercial discussions. IBM's account team will have the renewal on their pipeline from day one; customers who engage early can control the narrative rather than responding to IBM's opening position.

IBM's fiscal year ends on 31 December. Renewal discussions held in Q4 — particularly October through December — occur when IBM's sales team is under the most pressure to close revenue, which typically translates to increased willingness to negotiate on price and terms. Conversely, organisations that allow agreements to auto-renew without active negotiation leave material savings on the table.

IBM Cloud Pak Bundles: The Double-Licensing Trap in Detail

IBM Cloud Paks are pre-integrated software suites built on Red Hat OpenShift, covering automation, data, integration, security, and AI use cases. From a licensing perspective, they represent a significant departure from IBM's traditional model — and a significant source of compliance complexity.

Every IBM Cloud Pak includes an entitlement to Red Hat OpenShift Container Platform, sized to the number of VPCs purchased. The challenge arises when organisations:

  • Already hold separate Red Hat OpenShift subscriptions purchased before Cloud Pak adoption — these do not automatically convert to Cloud Pak entitlements and may overlap with bundled rights.
  • Run OpenShift infrastructure that serves both Cloud Pak workloads and non-IBM workloads — the bundled OpenShift entitlement only covers the Cloud Pak VPC scope, not the entire cluster.
  • Expand Cloud Pak deployments without proportionally adjusting their OpenShift subscription, or maintain a separate OpenShift subscription for "legacy" workloads while Cloud Pak entitlements cover newer deployments on the same cluster.

Resolving the double-licensing trap requires a formal entitlement mapping exercise that maps every VPC of OpenShift consumption to its licensing source — Cloud Pak bundle, standalone Red Hat subscription, or IBM Passport Advantage licence. This mapping should be reviewed at least annually and whenever Cloud Pak scope changes materially.

CIO Action Framework: 10 Steps to IBM Security and Storage Licensing Control

The following ten steps provide a structured programme for CIOs to establish and maintain a compliant, cost-controlled IBM Security and Storage licensing position:

  1. Deploy ILMT comprehensively. Audit every server running IBM software. Every host must have an ILMT agent installed, running, and reporting. Treat ILMT agent deployment as a mandatory step in any new IBM software deployment process.
  2. Generate and archive quarterly ILMT reports. Establish an operational process to generate Sub-Capacity Reports at least quarterly and retain them for two years. Automate the archiving process so reports are not missed during staff changes or holiday periods.
  3. Deploy IBM Licence Service for all container workloads. If you run any IBM software on OpenShift — including Cloud Paks — IBM Licence Service must be deployed alongside ILMT. These are separate tools serving different measurement environments.
  4. Map Cloud Pak OpenShift entitlements against all OpenShift subscriptions. Conduct a formal reconciliation of bundled OpenShift rights versus separately purchased subscriptions to identify overlap, gap, or double-licensing exposure.
  5. Baseline QRadar EPS and FPM consumption against licensed tiers. Pull peak event rate data and compare against your licensed EPS tier. If you are consistently approaching or exceeding your tier, address this before renewal — not after an audit finding.
  6. Count all Guardium nodes including passive nodes. Verify that your licence entitlement inventory reflects passive and standby Guardium nodes, not only active monitoring nodes.
  7. Audit Storage Protect PVU scope comprehensively. Confirm that PVU licences are counted for all systems involved in the backup environment — media servers, storage nodes, and agent hosts — not just the primary Storage Protect server.
  8. Evaluate IBM Storage Suite consolidation. If you run multiple IBM storage software products, model the cost implications of the IBM Spectrum Storage Suite. Capacity-based bundling can deliver savings of up to 40% versus individual product licensing.
  9. Begin ELA renewal engagement 12 to 18 months early. Do not allow IBM agreements to auto-renew. Engage IBM in structured commercial discussions with full deployment data and a clear negotiating position, targeting Q4 to maximise IBM's willingness to negotiate.
  10. Conduct a full IBM entitlement assessment before any IBM audit response. If IBM initiates an audit, conduct your own internal assessment before responding to IBM's questionnaire. Understanding your actual position — including any shortfalls — before IBM does gives you the ability to manage the process rather than react to it.

How Redress Compliance Supports IBM Security and Storage Licensing

Redress Compliance has spent more than 20 years working exclusively on enterprise software licensing challenges. Our IBM practice combines deep technical knowledge of ILMT, Passport Advantage, and Cloud Pak licensing mechanics with commercial expertise in ELA negotiation and audit settlement.

We work with CIOs and IT leadership teams on three engagement types: independent licence assessments that establish a baseline of entitlements versus deployments; audit defence engagements where we stand between your organisation and IBM's audit team, managing the process and negotiating the outcome; and renewal advisory where we prepare your negotiating position, benchmark it against market, and support you through the ELA or Passport Advantage renewal process.

Our work on IBM Security and Storage licensing has helped clients avoid multi-million-dollar retrospective charges, restructure overpayment situations into genuine cost reductions, and establish the operational discipline to prevent future exposure.

If you are preparing for an IBM audit, approaching an ELA renewal, or simply uncertain about your current compliance position, we encourage you to speak with our IBM team. Initial consultations are without obligation and typically provide immediate clarity on your highest-risk areas. You can learn more about our IBM advisory services at our IBM services page, explore our dedicated IBM Knowledge Hub for in-depth licensing guidance, or contact our IBM audit defence team directly if an audit is already in progress.

Speak with an IBM Licensing Specialist

Independent advice on QRadar, Guardium, Verify, Storage Protect, ILMT compliance, and ELA negotiation.
Book a Consultation →