IBM Audit Defense Case Study

IBM Audit Defense for a US Defense Supplier in the Northeast

A major US defense supplier in the northeastern United States — supporting critical defense manufacturing, supply chain logistics, and classified data management — faced an IBM audit with claims totalling $40 million in alleged non-compliance. Redress Compliance reduced the financial exposure by 97%, resolving the audit at $1.2 million with no penalties or retroactive fees. The engagement corrected fundamental errors in IBM’s sub-capacity calculations, recovered unrecognised entitlements, excluded improperly assessed virtualised environments, and implemented a compliance framework to prevent future audit exposure.

By Redress Compliance IBM Audit Defense 7 min read
IBM Knowledge Hub IBM Licensing Case Studies US Defense Supplier — $40M Audit Reduced 97%
📖 This case study is part of our IBM advisory series. For audit defense, see IBM Audit Defense Service. For licensing assessments, see IBM Licensing Assessment Service. For audit strategies, see The IBM Audit Playbook.
97%Reduction in IBM’s audit claim ($40M to $1.2M)
$38.8MFinancial exposure eliminated through audit defense
$0Penalties or retroactive fees paid
100%Operational continuity maintained throughout audit

Client Background and IBM Audit Challenge

The client is a major defense and aerospace supplier headquartered in the northeastern United States, providing advanced electronics, communications systems, surveillance equipment, and mission-critical software to the US Department of Defense and allied nations. The company employs approximately 12,000 people across manufacturing facilities, engineering laboratories, and secure data centres in Connecticut, Massachusetts, and Virginia. The IT environment supports defense manufacturing execution systems, supply chain logistics for controlled components, secure communications platforms, and classified data management infrastructure subject to ITAR (International Traffic in Arms Regulations), DFARS (Defense Federal Acquisition Regulation Supplement), and NIST 800-171 cybersecurity requirements.

The company’s IBM estate was extensive: Db2, MQ Series, and WebSphere Application Server deployed across both physical servers and VMware virtualised environments, with ILMT (IBM License Metric Tool) deployed for sub-capacity licensing. The annual IBM software spend was approximately $8.5 million, covering PVU-based (Processor Value Unit) licences for middleware and database products, plus several RVU (Resource Value Unit) and authorised user products. The IBM relationship had been in place for over 20 years, with multiple overlapping Passport Advantage agreements accumulated through organic growth and two acquisitions.

IBM initiated a formal compliance audit, and after a 6-month data collection and analysis period, presented findings claiming $40 million in non-compliance. The audit findings fell into four categories: sub-capacity licensing denied on 14 servers where IBM claimed ILMT data was incomplete or unreliable (reverting to full-capacity pricing and creating a $22 million shortfall claim), virtualisation overages where IBM assessed PVU requirements based on the full VMware cluster capacity rather than the virtual machines actually running IBM software ($11 million claim), entitlement mismatches where IBM claimed 2,400 PVUs of deployed products were not covered by existing Passport Advantage agreements ($4.5 million claim), and historical usage where IBM alleged that products had been deployed on additional servers during the preceding 24 months without corresponding licence purchases ($2.5 million claim). The $40 million claim represented nearly five years of the company’s total IBM spend and, given the defense sector’s zero-tolerance approach to supplier compliance issues and the potential impact on government contract eligibility, created existential concern at the board level.

“IBM audit claims for defense and aerospace companies carry a unique secondary risk beyond the financial exposure itself. Defense contractors operating under DFARS, ITAR, and NIST cybersecurity frameworks face the possibility that unresolved software compliance issues could affect government contract eligibility and security clearance status. This makes IBM audit defense in the defense sector fundamentally different from other industries — the client cannot simply accept IBM’s position to make the problem go away, because the compliance implications extend far beyond the IBM relationship. The audit must be resolved correctly, with a defensible compliance position, not just quickly.”

Our Approach — Four-Phase Audit Defense

Redress Compliance deployed a structured four-phase audit defense over 10 weeks, working from our Fort Lauderdale office with the company’s CIO, VP of IT Infrastructure, IBM account team, and outside counsel.

1

Phase 1: Comprehensive Audit Review (Weeks 1–3)

We conducted a forensic review of IBM’s audit findings, examining every line item in the $40 million claim against the company’s actual licensing agreements, deployment records, and ILMT data. The review revealed significant errors and overestimations in IBM’s calculations. On the sub-capacity denial ($22M claim): IBM had flagged 14 servers where ILMT data showed gaps during specific reporting periods. Our analysis determined that 11 of these 14 servers had ILMT properly installed and reporting — the gaps were caused by planned maintenance windows and a documented ILMT agent upgrade that temporarily disrupted reporting for 72 hours. Only 3 servers had legitimate ILMT configuration issues that were correctable. IBM’s position of denying sub-capacity across all 14 servers — reverting them to full-capacity pricing — was unsupportable for 11 of the 14. On the virtualisation overages ($11M claim): IBM had assessed PVU requirements based on the total VMware cluster capacity (the aggregate processing power of all hosts in each cluster) rather than the actual virtual machine allocations. Under IBM’s sub-capacity rules for eligible virtualisation, PVUs should be calculated based on the virtual cores allocated to the VMs running IBM software, not the full cluster. IBM’s methodology inflated the PVU requirement by approximately 4×.

2

Phase 2: Data Validation and Entitlement Recovery (Weeks 4–6)

We worked with the IT infrastructure team to collect and validate deployment data independent of IBM’s audit findings. For the 3 servers with legitimate ILMT gaps, we corrected the ILMT agent configuration and collected vCenter and system-level data to establish the actual PVU consumption during the gap periods — demonstrating that the servers had been running well within their licensed capacity. For the virtualisation claim, we produced detailed vCenter reports showing the actual vCPU allocations for every VM running IBM software, mapped against the core factor table to calculate the correct PVU requirements. The actual PVU shortfall from virtualised environments was 380 PVUs — not the 6,200 PVUs IBM had claimed. On entitlement recovery: we conducted a comprehensive review of all Passport Advantage agreements, including entitlements from two acquisitions completed in 2017 and 2021. The acquisitions had brought IBM licences that were never consolidated into the parent company’s entitlement records. We identified 1,800 PVUs of valid entitlements from the acquired companies’ Passport Advantage agreements that IBM had not included in their audit baseline. On historical usage: we reviewed server decommissioning records and change management logs to demonstrate that the “additional servers” IBM identified had been temporary deployments for a specific defense program that were decommissioned within their licensed terms — IBM had used a point-in-time scan that captured these servers while active but failed to account for their subsequent decommissioning.

3

Phase 3: Strategic IBM Engagement (Weeks 7–9)

We presented IBM with a comprehensive corrected compliance report, addressing each of the four audit claim categories with validated data and contractual analysis. Sub-capacity: We demonstrated that 11 of 14 flagged servers had valid ILMT data with explainable gaps (maintenance windows, agent upgrades) and that sub-capacity should be reinstated. For the 3 servers with correctable issues, we provided vCenter data proving actual consumption was within licensed capacity. IBM’s $22M sub-capacity claim was reduced to $0. Virtualisation: We presented the correct PVU calculation methodology with supporting vCenter data, reducing the claimed 6,200 PVU shortfall to an actual 380 PVUs ($11M reduced to approximately $570K). Entitlements: We provided documentation for 1,800 PVUs of acquisition-related entitlements, eliminating $4.5M of the claim entirely and creating a surplus that partially offset the virtualisation shortfall. Historical usage: We presented decommissioning records and change management logs proving the temporary nature of the deployments, eliminating the $2.5M historical claim. The negotiation was conducted professionally but firmly, with our analysis demonstrating that IBM’s original claim was based on methodological errors (virtualisation calculation), incomplete data (missing acquisition entitlements), and overly aggressive interpretation of ILMT reporting gaps.

4

Phase 4: Resolution and Compliance Framework (Week 10)

The final settlement was $1.2 million — a 97% reduction from IBM’s original $40 million claim. The $1.2 million covered the net PVU shortfall of approximately 380 PVUs (after applying the recovered acquisition entitlements) plus a modest forward-looking licence expansion to accommodate planned growth. Critically, the settlement included no penalties, no retroactive fees, and no admission of non-compliance — it was structured as a forward-looking licence purchase. We then implemented a compliance governance framework tailored to the defense sector’s requirements: automated ILMT monitoring with alerting for any reporting gaps exceeding 24 hours, quarterly internal licence reconciliation reviews, a centralised entitlement register consolidating all Passport Advantage agreements (including acquired entities), change management integration requiring licence impact assessment for any new IBM software deployments, and documentation procedures aligned with DFARS and NIST 800-171 requirements to ensure the compliance framework supported the company’s broader regulatory obligations.

Outcome

The engagement reduced the company’s financial exposure from $40 million to $1.2 million — a 97% reduction that eliminated $38.8 million in claimed non-compliance. The $1.2 million settlement was structured entirely as a forward-looking licence purchase with no penalties, no retroactive fees, and no admission of past non-compliance. This structure was critical for the defense sector client, as an admission of non-compliance could have triggered reporting obligations under government contract compliance frameworks and potentially affected security clearance reviews.

The audit was resolved in 10 weeks, during which the company maintained uninterrupted operations across all defense manufacturing, engineering, and classified data management systems. No IBM products were restricted, removed, or modified during the audit process. The speed of resolution was particularly important given that the audit had been creating uncertainty with the company’s government contracting officers, who had been made aware of the IBM audit through routine compliance reporting.

The compliance framework implemented during Phase 4 has been operating for 12 months since the audit resolution, with zero compliance gaps detected. The automated ILMT monitoring and centralised entitlement register have also identified approximately $420K in annual IBM licence optimisation opportunities — unused entitlements that can be reallocated or allowed to expire at renewal — partially offsetting the $1.2 million settlement cost within the first year.

Audit Claim CategoryIBM’s PositionFinal OutcomeReduction
Sub-capacity denial (14 servers)$22M (full-capacity reversion)$0 (sub-capacity reinstated)100%
Virtualisation overages$11M (6,200 PVU shortfall)~$570K (380 PVU actual shortfall)95%
Entitlement mismatches$4.5M (2,400 PVU gap)$0 (1,800 PVU recovered from acquisitions)100%
Historical usage$2.5M (additional servers)$0 (temporary deployments documented)100%
Total audit claim$40M$1.2M (forward-looking purchase)97%
Penalties / retroactive feesIncluded in claim$0100%
Compliance frameworkNo formal processAutomated ILMT + quarterly reviewsOngoing governance
Facing a $40 million audit claim was one of the most significant compliance challenges we’ve encountered. Redress Compliance’s expertise in IBM licensing — particularly their understanding of sub-capacity rules, virtualisation assessment methodology, and entitlement recovery — was extraordinary. They reduced our exposure by 97% and resolved the audit in a way that protected both our financial position and our government contracting status. Their guidance has strengthened our compliance framework and prepared us for the future.
Chief Information Officer — US Defense Supplier, Northeast

Key Lessons for Defense and Aerospace Companies

This engagement demonstrates the critical importance of expert audit defense for defense and aerospace companies facing IBM compliance audits. The patterns we identified — aggressive sub-capacity denial based on minor ILMT gaps, inflated virtualisation calculations using full cluster capacity rather than VM allocations, and missing acquisition-related entitlements — are common across IBM audits in the defense sector. The 10-week engagement cost was less than 2% of the financial exposure eliminated, delivering a return on investment exceeding 30:1.

Lesson 1

ILMT Gaps Do Not Automatically Justify Full-Capacity Pricing

IBM frequently denies sub-capacity licensing based on any gap in ILMT reporting data, reverting affected servers to full-capacity pricing at 5–10× the cost. However, ILMT gaps caused by documented maintenance windows, agent upgrades, or temporary infrastructure events are defensible. The key is demonstrating that the gaps are explainable and that actual consumption during those periods was within licensed capacity — using vCenter data, system logs, and change management records. In this case, 11 of 14 flagged servers were reinstated to sub-capacity, eliminating $22M in claimed exposure. See The IBM Audit Playbook.

Lesson 2

IBM’s Virtualisation Assessment Methodology Must Be Challenged

IBM auditors frequently calculate PVU requirements based on the total processing capacity of VMware clusters rather than the virtual resources actually allocated to VMs running IBM software. This methodology inflates PVU requirements by 3–5× and is not consistent with IBM’s own sub-capacity licensing rules for eligible virtualisation environments. Always validate virtualisation claims with vCenter data showing actual vCPU allocations mapped against the core factor table. In this case, the actual shortfall was 380 PVUs versus IBM’s claimed 6,200 — a 94% overestimate. See 10 Critical Traps in IBM Term Sheets.

Lesson 3

Acquisition Entitlements Are Frequently Missing from IBM’s Baseline

Companies that have completed acquisitions often have IBM entitlements from acquired entities that were never consolidated into the parent company’s Passport Advantage records. IBM’s audit baseline only includes entitlements they can identify in their own systems — they do not proactively search for entitlements from acquired entities. A thorough review of acquisition-related licensing agreements can recover significant PVU entitlements that reduce or eliminate audit shortfalls. In this case, 1,800 PVUs recovered from two acquisitions eliminated $4.5M of IBM’s claim entirely. See IBM Audit Defense Service.

Facing an IBM Audit? Get Expert Defense from Day One.

Redress Compliance provides independent IBM audit defense for defense contractors, aerospace companies, and regulated industries. We analyse IBM’s audit methodology, validate sub-capacity and virtualisation claims, recover missing entitlements, and negotiate resolutions that protect your financial and regulatory position. Our clients typically achieve 85–97% reductions in IBM audit claims.

Book a Free Consultation → IBM Audit Defense Service

Related Resources

FF

Fredrik Filipsson

Co-Founder, Redress Compliance

Fredrik Filipsson brings over 20 years of enterprise software licensing expertise, having worked directly for IBM, SAP, and Oracle before co-founding Redress Compliance. With deep experience in IBM audit defense for defense contractors, aerospace companies, and regulated industries, Fredrik leads the firm’s IBM advisory practice from offices in Fort Lauderdale, Dublin, and Dubai.

← Back to IBM Knowledge Hub