Why Simultaneous Audits Are Now the Norm

The idea that a software audit is a rare, isolated event has become obsolete for large enterprises. In 2024, 62 percent of companies with over 1,000 employees faced at least one software vendor audit, up from 40 percent in 2023. For organisations with over 5,000 employees, that figure reaches 66 percent. More importantly, the structural conditions of modern enterprise IT — fragmented procurement, hybrid deployments, virtualisation sprawl, and multi-cloud adoption — have created persistent compliance vulnerabilities across every major vendor relationship simultaneously.

Oracle is auditing to enforce Java licensing changes. IBM is auditing to enforce ILMT sub-capacity compliance and accelerate the PVU-to-VPC migration. SAP is auditing indirect access in S/4HANA migrations. Microsoft is auditing Azure hybrid benefit claims and Teams Phone licensing. Broadcom is auditing VMware deployments in the wake of its 2024 subscription enforcement push. Each of these is a live audit program that will reach your organisation whether you are prepared or not.

The critical insight that separates well-prepared enterprises from those that pay inflated settlements is this: vendor auditors know they are not your only audit. They will use time pressure, parallel-track deadlines, and information asymmetry to encourage rushed responses and overly broad data disclosure. A multi-vendor audit response framework is not a luxury — it is the minimum governance structure required to protect your organisation.

The Compounding Cost Problem

Software audits have become a significant revenue stream for major vendors. Oracle, IBM, SAP, Microsoft and Broadcom collectively generate billions of dollars annually from audit settlements. The financial stakes for enterprises are proportionately severe: nearly 32 percent of organisations incurred financial liabilities exceeding $1 million from audits in 2024, more than tripling from just 10 percent two years prior. When three or four of these programs converge simultaneously, the total exposure can reach tens of millions of dollars for a mid-size enterprise — before negotiations reduce the initial claims.

Managing these programs in isolation, without coordination, is the most expensive mistake enterprises make. Legal teams negotiating an Oracle settlement without awareness of a concurrent IBM audit may inadvertently disclose deployment data that strengthens IBM's position. Procurement teams rushing to close one settlement to free up bandwidth may accept terms that set unfavourable precedent for the next negotiation. Multi-vendor audit response requires a unified governance structure from day one.

Facing audits from multiple vendors simultaneously?

We've managed over 500 audit engagements across Oracle, IBM, SAP, Microsoft and Broadcom. Speak to an advisor today.
Get Audit Support →

Understanding Each Vendor's Audit Methodology

Before you can manage parallel audits effectively, you need to understand how each major vendor's audit program works, what data they seek, what contractual rights they have, and where their genuine leverage ends. No two vendor audit programs are identical in structure, timeline, or commercial objective.

Oracle: Contractual Rights and Aggressive Metrics

Oracle's audit rights under the standard Oracle License and Services Agreement (OLSA) give Oracle the right to audit your use of Oracle programs upon reasonable notice. In practice, Oracle executes audits through its License Management Services (LMS) team and uses its own Oracle measurement tools. Oracle will typically request a 60-day response window, provide its own scripts for data collection from Oracle Database instances, and seek to measure processor licences by physical core count multiplied by the relevant Core Factor Table value. The most common Oracle audit triggers are virtualisation configurations (VMware, cloud partitioning), Java deployment proliferation post-Oracle Java licensing change (2023), and database deployments in cloud environments where BYOL rules apply.

Oracle's initial audit claim will almost always overstate the true liability. Oracle's scripts measure potential deployment, not necessarily licensed deployment, and the gap between the gross measurement and the defensible effective licence position is often 40 to 70 percent. Never accept Oracle's initial findings as the starting point for settlement — they are an opening bid.

IBM: ILMT and Sub-Capacity Complexity

IBM's audit program centres on sub-capacity licensing compliance, particularly for products licensed on a Processor Value Unit (PVU) or Virtual Processor Core (VPC) basis. The PVU-to-VPC transition created significant compliance gaps at many enterprises: organisations that deployed IBM middleware under PVU sub-capacity rules and then migrated to virtualised or cloud environments without updating their IBM License Metric Tool (ILMT) deployments are exposed to full-capacity audit claims rather than sub-capacity entitlements.

IBM's audit rights are exercised through its Software Compliance team. IBM will request ILMT reports, deployment data, and licence entitlement records. The critical defence point is ILMT configuration correctness: sub-capacity pricing is only valid if ILMT has been continuously and correctly configured throughout the audit period. Gaps in ILMT coverage — even brief periods — can void sub-capacity eligibility for the entire period and expose the organisation to full-capacity charges on all affected products. IBM Cloud Pak deployments require particular scrutiny because they bundle OpenShift Container Platform licences, and double-licensing of OpenShift is a common audit finding.

SAP: Indirect Access and Digital Access

SAP's audit approach has evolved significantly since the 2018 Diageo judgment, which established that third-party systems accessing SAP data constitute indirect access requiring additional licensing. SAP now uses its Digital Access adoption model for S/4HANA, charging per document type for machine-to-machine or digital interactions rather than per-named-user. SAP audits frequently target integrations between SAP systems and Salesforce, ServiceNow, custom ERP extensions, and robotic process automation tools — all of which may generate chargeable document interactions under the Digital Access model.

SAP's Software Asset Management (SAM) review process is nominally framed as an advisory exercise, but the output directly feeds SAP's commercial team and typically results in licence shortfall claims. Enterprises should treat any SAP LAW (License Audit Workbench) run as the opening move of a commercial negotiation, not an administrative compliance check.

Microsoft: Azure Hybrid Benefit and Cloud Licensing

Microsoft audits enterprise customers through its Software Asset Management (SAM) engagement program, which is typically initiated through Microsoft partners or internal Microsoft account teams. Microsoft's current audit focus areas include Azure Hybrid Benefit claims for Windows Server and SQL Server (where on-premises SA coverage must align with cloud deployment counts), Teams Phone and Operator Connect licensing, Microsoft 365 licence under-deployment relative to EA committed counts, and Power Platform consumption relative to licensed capacity.

Microsoft's SAM engagements are less contractually aggressive than Oracle or IBM audits but carry significant commercial consequences when findings are rolled into EA renewal negotiations. Enterprises in active EA renewal should be particularly cautious about ongoing SAM engagements that provide Microsoft with current deployment data immediately before licence negotiation begins.

Broadcom / VMware: Subscription Enforcement

Following Broadcom's acquisition of VMware and the January 2024 transition of all VMware perpetual licences to subscription, Broadcom has initiated aggressive compliance reviews of VMware deployments. All VMware perpetual licences have moved to subscription-only, with support cost increases of three to five times typical prior levels. Broadcom audits are targeting organisations that have not migrated to VMware Cloud Foundation (VCF) subscriptions, those using perpetual licences that technically expired under the new model, and deployments where Tanzu add-ons were separately licensed prior to the acquisition bundling. Enterprises should evaluate Nutanix and Azure VMware Solution as migration alternatives before entering Broadcom renewal negotiations, as credible alternatives significantly improve negotiating position.

"The single biggest mistake enterprises make in multi-vendor audits is treating each vendor relationship as a separate commercial conversation with no strategic connection. Every vendor auditor is making assumptions about what your other vendor relationships look like — your job is to control that information asymmetry."

Building Your Multi-Vendor Audit Command Centre

Managing simultaneous audits without a coordinated command structure produces fragmented responses, inconsistent data disclosure, and missed negotiating leverage. The multi-vendor audit command centre is the organisational mechanism that ensures every audit is managed with awareness of every other concurrent audit program.

Establishing the Core Team

An effective multi-vendor audit response team requires representation from four functions: Legal (contract rights review and communications sign-off), IT Asset Management (licence entitlement data and deployment evidence), Procurement (commercial strategy and settlement authority), and Finance (exposure quantification and settlement budget approval). Each function has a distinct role and each must be coordinated through a single point of accountability — typically the Senior Director of IT or the Chief Procurement Officer — to prevent fragmented decision-making under pressure.

The command centre model should designate a single external advisory relationship where engaged, to ensure that advisors working across multiple vendor audit streams are sharing intelligence about each vendor's tactics, timelines and commercial positions. Engaging separate external advisors for each vendor audit eliminates this intelligence advantage and significantly increases advisory cost without any corresponding benefit.

Establishing an Audit Registry

The first operational step when a new audit notice arrives is to register it against all current and recent audit activity. Your audit registry should capture: the vendor name, audit notice date, contractual audit basis, data request scope, response deadline, current status, lead internal contact, external advisor lead (if engaged), and current exposure estimate. This single-view registry prevents the command centre from losing track of parallel obligations under time pressure and ensures that settlement discussions with one vendor do not inadvertently create conflicts with another.

Update the audit registry after every vendor communication. Audit programs have a way of accelerating unexpectedly when vendors sense organisational distraction — if a vendor escalates to a contractual notice of dispute, the audit registry flags the escalation against all other concurrent programs and prompts a coordinated response review.

Information Firewall Between Audit Programs

Information shared with one vendor's audit team can have direct implications for another vendor's audit program. Oracle deployment data may reveal IBM middleware co-deployment scenarios that trigger IBM sub-capacity questions. VMware virtualisation data requested by Broadcom auditors may reveal the exact virtualisation configurations that Oracle uses to assess full-capacity versus partitioned licensing eligibility. SAP integration maps may expose Oracle database deployments in adjacent systems.

Establish an explicit information firewall between audit streams from day one. All data provided to auditors should be reviewed not only for accuracy but for cross-vendor implications before release. The legal team should approve all data disclosures and should maintain a log of exactly what was disclosed to each vendor on each date. This log becomes essential evidence if any vendor later claims that undisclosed data constitutes non-disclosure.

Controlling Audit Scope: The Most Valuable Defence Move

The single most impactful action an enterprise can take in any software audit — and especially in a multi-vendor audit environment — is to control the scope of the audit from the outset. Vendors will always seek the broadest possible scope because broader scope increases the probability of finding non-compliance and maximises the settlement claim. Your obligation is to understand what your contract actually entitles the vendor to audit, and to enforce those limits professionally and firmly.

Reading Your Audit Rights Carefully

Most enterprise software licence agreements give vendors the right to audit your use of specifically named products within the scope of the agreement, upon reasonable notice, during normal business hours. They do not typically give vendors the right to audit your entire IT estate, access systems unrelated to the licensed products, or collect data that extends beyond the licensed product scope. When Oracle or IBM's audit team submits a data request that includes discovery across every server in your environment, you have the right — and the obligation — to narrow that scope to what the contract actually permits.

Respond to every audit data request with a written scope statement that references the specific contract clause authorising the audit and the specific products in scope. Require the auditor to confirm in writing that their data request is confined to the contractually agreed scope. Any expansion of scope requires a contractual basis, and you should require the vendor to identify that basis before providing any additional data.

Managing Timelines Across Multiple Audits

Vendors use tight timelines to pressure responses before enterprises have fully assessed their position. When you are managing three or four concurrent audits, compressed timelines across multiple programs create resource crises that lead to errors, incomplete responses and poorly negotiated settlements. You have the right to request reasonable extensions on data submission deadlines, and you should exercise this right strategically. Staggering audit response timelines by 30 to 60 days between programs gives your core team the capacity to respond accurately to each and prevents the compounding of pressure across simultaneous deadlines.

Not all auditors will agree to extensions, and some vendors will use delay as evidence of bad faith. The correct approach is to respond promptly in writing to every audit notice, acknowledge the request, confirm your intent to cooperate, and request a defined extension with a specific justification — typically the need to complete an accurate internal licence position assessment. Most contractual audit provisions require vendors to act reasonably, and a reasonable extension request for an accurate response is difficult to refuse without damaging the vendor's credibility in any subsequent dispute.

Need to assess your licence position before responding to an audit notice?

Our rapid ELP assessment delivers a defensible position in 10 to 15 business days.
Request ELP Assessment →

Using One Audit as Leverage Against Another

One of the most powerful and most underused strategies in multi-vendor audit management is cross-vendor commercial leverage. Enterprise organisations that are simultaneously negotiating with Oracle on a database licence settlement and with IBM on a middleware compliance claim are in a position to use each vendor's competitive interest against the other — but only if both negotiations are being coordinated through a unified commercial strategy.

The Technology Substitution Signal

Every major enterprise software vendor operates in markets where it faces credible alternatives. Oracle competes with PostgreSQL, MySQL (which it also sells), AWS Aurora and Azure SQL. IBM competes with AWS messaging services, open-source middleware, and Red Hat alternatives. SAP competes with Oracle ERP and Workday at the application layer. Microsoft competes with Google Workspace and AWS for cloud workloads. When a vendor knows that your organisation is actively evaluating alternatives, the audit conversation shifts from enforcement to retention, and settlements become significantly more favourable.

During multi-vendor audit negotiations, your commercial team should establish that technology substitution evaluations are underway — for each vendor separately — without disclosing the detail of those evaluations. The signal itself is enough to change the negotiating dynamic. Oracle does not want to lose database deployments to PostgreSQL. IBM does not want to lose middleware estates to open-source or AWS services. A credible substitution signal, delivered at the right point in the settlement discussion, can reduce initial audit claims by 30 to 50 percent beyond what the licence position alone would achieve.

Sequencing Settlements to Maximise Leverage

When multiple audits are heading toward settlement simultaneously, sequencing matters. Close the settlement with the vendor that has the weakest audit claim or the most pressing commercial calendar pressure first. Use that closed settlement to demonstrate good-faith cooperation to remaining vendors and to establish precedent for reasonable settlement structures. Do not allow multiple vendors to reach final settlement simultaneously — the compounding cash outflow creates financial pressure that reduces your negotiating flexibility in the final conversations.

Identify which vendor has the most significant upcoming renewal — typically an EA, ELA, or major contract renewal falling within the next 12 months. That vendor has the most commercial incentive to resolve the audit quickly and favourably, because unresolved audit disputes complicate renewals and damage account team metrics. Leverage the renewal timeline against the audit settlement timeline for that vendor — a structured settlement package that clears the audit and establishes favourable renewal terms simultaneously is often the most efficient outcome.

Parallel Settlement Negotiation Structure

Running multiple audit settlements in parallel requires a structured approach to commercial negotiation across concurrent programs. The objective is not to close each settlement independently at the best available terms — it is to close all settlements in a coordinated sequence that maximises total commercial value across every vendor relationship.

Documenting Your Effective Licence Position

Before entering settlement negotiations with any vendor, you must have a defensible, documented Effective Licence Position (ELP) for each product in scope. The ELP is the difference between your licence entitlements (what you paid for) and your measured deployments (what the audit shows you are using). A well-documented ELP removes the vendor's ability to use inflated gross measurement findings as the settlement baseline. Your ELP calculation should reflect the actual contractual metric for each product, correctly applied — not the vendor's interpretation of the broadest possible metric application.

For IBM products, this means correctly applying ILMT sub-capacity data to reduce the licence requirement from full-capacity pricing. For Oracle, it means applying the correct Core Factor Table values and ensuring that virtualisation partitioning arguments are properly supported with technical evidence. For SAP, it means mapping Digital Access document interactions to their correct licence entitlement. Each ELP calculation requires product-specific expertise, and a multi-vendor audit response programme must have that expertise available for every vendor in scope.

Structuring the Settlement Package

Software audit settlements rarely result in organisations simply paying back-licence fees for undeplicated software. In practice, effective audit settlements include a combination of back-licence payment for confirmed shortfalls, forward licence commitment (often structured as an ELA or subscription uplift that gives the vendor credit for the audit resolution), and enhanced commercial terms on the forward agreement — better discounts, capped annual price increases, or improved service credits. Structuring the settlement as a combined audit resolution and commercial renewal package is almost always more efficient than negotiating the audit and the next renewal separately.

In multi-vendor negotiations, ensure that every settlement package is reviewed by the command centre before signing, to confirm that the terms do not inadvertently commit to deployment metrics, audit cooperation obligations, or technology adoption commitments that conflict with concurrent negotiations. A settlement with Oracle that commits to an expanded Oracle database footprint may complicate parallel negotiations with IBM or SAP that assume a migration scenario. These conflicts are invisible unless someone is reviewing all settlements in parallel.

Building a Post-Audit Governance Framework

The goal of multi-vendor audit response is not merely to close the current audits — it is to build the governance infrastructure that prevents the next round from being equally expensive and disruptive. Organisations that emerge from major audit programs and immediately return to informal licence management will face the same exposure within two to three years, often with a new set of vendors and compounded growth in deployment complexity.

Centralise Licence Entitlement Records

The most common root cause of audit liability is that no single system contains an authoritative record of what the organisation is entitled to deploy under each vendor agreement. Purchase orders sit in finance systems, download keys sit in IT ticket histories, and current entitlements require reconstruction from years of invoices, amendments, and renewal documents. A centralised Software Asset Management (SAM) tool that connects procurement, IT and finance data reduces audit preparation from weeks of forensic reconstruction to days of structured reporting.

Select a SAM platform that supports the specific licence metrics used by your highest-risk vendors. Generic SAM tools that report only on product installation counts without supporting sub-capacity PVU metrics (for IBM), Core Factor Table calculations (for Oracle), or named-user counting methodologies (for SAP) will fail to produce the ELP evidence needed in an audit. The SAM tool is an audit defence investment, not a procurement administration tool.

Running Internal ELP Reviews Twice Per Year

Proactive organisations run internal ELP reviews against every major vendor relationship at least twice per year. The objective is not to achieve perfect compliance at every moment — it is to know where the gaps are before an auditor arrives and to manage those gaps commercially rather than defensively. A deployment that exceeds your current entitlement is a commercial opportunity to negotiate licence expansion at market rates, not a liability waiting to be discovered and charged at full list price with retroactive back-charges.

Internal ELP reviews also feed the annual procurement cycle. If your IBM middleware deployment has grown by 15 percent since your last contract renewal, that growth creates a quantified negotiating objective for the next IBM ELA negotiation: expand the entitlement by the measured shortfall at a discount, rather than paying back-licence fees at list price under an IBM audit claim. Proactive governance converts audit exposure into procurement leverage.

Ten Mistakes Enterprises Make in Multi-Vendor Audits

After more than 500 audit engagements across Oracle, IBM, SAP, Microsoft and Broadcom, the same mistakes appear repeatedly. Avoiding these mistakes is the fastest path to reducing multi-vendor audit exposure.

  • Treating each audit in isolation. Managing four concurrent audits through four separate internal teams with no central coordination is the single most expensive structural error. Information disclosed to one vendor reaches others through indirect channels, and commercial leverage across vendors is lost entirely.
  • Responding to audit notices without reading the contract first. Every audit programme has contractual limits on scope, timing and method. Responding to a data request that exceeds those limits before challenging them validates the vendor's interpretation and sets a bad precedent for the remainder of the audit.
  • Assuming vendor measurements are accurate. Vendor-provided audit scripts and measurement tools are designed to identify the maximum possible licence shortfall, not the accurate one. Every vendor measurement should be independently verified against your internal data before being accepted as the basis for settlement discussion.
  • Disclosing more data than required. Auditors routinely request data from systems and products outside the strict contractual audit scope. Providing this data without challenge expands audit exposure to areas that the vendor had no contractual right to investigate.
  • Rushing settlements due to time pressure. Vendors create artificial urgency by setting tight deadlines and implying that delays indicate bad faith. Well-prepared enterprises manage their own response timelines through written extensions and structured engagement, without compromising their commercial position by rushing to close.
  • Settling for cash without forward commercial value. Cash-only audit settlements are the worst possible commercial outcome. Every settlement should include forward licence commitment at discounted rates, price protections, or improved service terms that deliver ongoing value from the audit resolution.
  • Not involving legal until the settlement stage. Legal review of the audit notice, the data request, and every formal vendor communication should begin on day one. Late legal involvement often means that adverse positions have already been conceded that cannot be recovered.
  • Accepting the first settlement proposal. Vendors' initial audit settlement proposals are not their best commercial positions. They are opening bids calibrated to leave room for negotiation while anchoring the discussion at the highest plausible number. The first proposal should always be countered with a documented ELP and a structured alternative.
  • Ignoring cross-vendor technology implications. SAP migration to S/4HANA affects Oracle database licensing. VMware subscription changes affect IBM middleware hosting costs. Multi-vendor audit response requires awareness of how each vendor's audit findings affect the technology strategy and commercial relationships of every other vendor.
  • Not building post-audit governance. Enterprises that close major audits without investing in SAM tooling, ELP governance, and internal audit readiness will face equivalent or greater exposure within two to three years. The audit should be the catalyst for structural improvement, not merely the crisis to be survived.
"A well-managed multi-vendor audit is not just a defensive exercise — it is a commercial opportunity. The organisation that enters settlement negotiations with a documented ELP, a credible technology substitution signal, and a coordinated cross-vendor commercial strategy will consistently achieve settlements 30 to 50 percent below initial vendor claims."

When to Engage External Multi-Vendor Audit Advisors

The percentage of organisations engaging external advisors for software audit defence has risen significantly, from 34 percent in 2023 to 52 percent in 2025, reflecting the growing recognition that internal teams rarely have the combination of legal expertise, licence metric depth and commercial negotiation capability required to manage major multi-vendor audit programs effectively. The decision to engage external support should be made earlier rather than later — advisors engaged at the audit notice stage have significantly more tactical options than those engaged after data has already been provided and the vendor's position has been established.

When evaluating external audit advisors, the most important selection criteria are multi-vendor capability (can they manage Oracle, IBM, SAP and Microsoft simultaneously through a single team?), track record on settlement reduction (what is their documented history of reducing initial vendor audit claims?), and approach to post-audit governance (do they help build internal capability or create dependency on continued advisory engagement?). The right external partner should reduce your long-term audit exposure, not just close the current crisis.

At Redress Compliance, we operate exclusively on the buyer side. We do not represent vendors, accept referral fees from vendors, or have commercial relationships that could compromise our independence in any audit negotiation. Our multi-vendor audit response practice has supported enterprises across Oracle, IBM, SAP, Microsoft and Broadcom audit programs simultaneously, delivering coordinated commercial outcomes that single-vendor specialists cannot achieve independently.

Redress Compliance Audit Defence Kits

Download our vendor-specific audit defence kits for Oracle, IBM, SAP, Microsoft and Broadcom — covering contractual rights analysis, scope control templates and ELP frameworks.