IBM Audit Defense · Case Study

IBM Audit Defense for a US Defense Supplier in the Northeast: 97% Claim Reduction

How Redress Compliance reduced an IBM audit claim from $40 million to $1.2 million for a major US defense supplier through expert audit review, data validation, strategic negotiation, and compliance framework implementation.

$40M
Initial IBM Audit Claim
$1.2M
Final Settlement Achieved
97%
Total Claim Reduction
$0
Penalties or Retroactive Fees
IBM Knowledge Hub IBM Audit Defense US Defense Supplier Case Study

This case study describes an IBM audit defense engagement for a major US defense supplier in the northeastern United States. The engagement covered defense manufacturing, supply chain logistics, and secure data management operations. For IBM licensing advisory and audit defense services, visit the IBM Knowledge Hub or contact us about our IBM Audit Defense Service.

Client Profile

1

Defense and Aerospace Supplier

A major US defense supplier headquartered in the northeastern United States. The organisation provides defense manufacturing, supply chain logistics, and secure data management services supporting national defense programs and government contracts.

2

Complex IBM Estate

The defense supplier operates IBM software across physical servers, virtualised environments, and secure cloud platforms. The estate spans Db2 for mission-critical data management, WebSphere for application delivery, MQ for secure messaging across classified and unclassified networks, and additional middleware supporting logistics and supply chain operations.

3

$40 Million Audit Claim

IBM issued an audit claiming $40 million in alleged non-compliance fees. The claim covered sub-capacity licensing discrepancies, entitlement mismatches across multiple product families, and overages alleged in virtualised environments. The amount represented a significant portion of the organisation's annual IT budget.

4

High-Stakes Operating Environment

The sensitive nature of defense work meant the audit carried risks beyond financial exposure. Government contract compliance, security clearances, and operational continuity were all at stake. Any disruption to manufacturing or logistics operations could cascade into defense program delivery commitments.

The Challenge: $40 Million in Alleged Non-Compliance

IBM's $40 million audit claim alleged non-compliance across three categories: sub-capacity licensing discrepancies ($22 million), entitlement mismatches across multiple product families ($12 million), and virtualisation overages ($6 million). The defense supplier's secure operating environment, classified network segmentation, and government compliance requirements made independent validation of IBM's findings uniquely complex.

Defense and aerospace IT environments present specific characteristics that IBM's audit methodology frequently exploits. Classified and unclassified network segmentation creates duplicate deployment footprints. Secure cloud platforms and air-gapped systems complicate ILMT reporting. Virtualised environments supporting mission-critical workloads operate under strict availability requirements that generate peak usage patterns IBM interprets as sustained capacity.

The defense supplier needed an advisory partner that understood both IBM's licensing mechanics and the operational constraints of a defense environment, where data access restrictions, security clearances, and government audit requirements add layers of complexity that standard compliance approaches cannot accommodate.

1

Sub-Capacity Licensing Discrepancies: $22 Million

IBM claimed the defense supplier owed $22 million in sub-capacity licensing shortfalls. The claim treated peak workloads across classified processing environments, logistics scheduling runs, and disaster recovery failover tests as sustained production capacity. ILMT data from air-gapped and segmented networks was incomplete, and IBM applied full-capacity calculations wherever sub-capacity data could not be independently verified.

2

Entitlement Mismatches: $12 Million

IBM alleged $12 million in entitlement gaps across multiple product families. The claim failed to account for licences acquired through government procurement vehicles, legacy defense program agreements, and entitlements bundled within broader enterprise contracts that predated the current Passport Advantage structure. Multiple product families showed discrepancies between IBM's records and the supplier's actual entitlement position.

3

Virtualisation Overages: $6 Million

IBM claimed $6 million in virtualisation-related overages. The defense supplier's virtualised environments operated under strict isolation and segmentation requirements dictated by government security policies. IBM's audit treated every virtual partition within the secure enclave as a fully licensed production instance, ignoring standby configurations, disaster recovery allocations, and test environments that operated on highly constrained schedules.

How IBM Audits Exploit Defense IT Environments

Defense and aerospace organisations present unique vulnerabilities during IBM audits. The security requirements that protect classified systems also create licensing complexity that IBM's audit teams are trained to exploit.

1

Air-Gapped Networks and ILMT Gaps

Classified and air-gapped environments cannot always run ILMT with full external reporting capabilities. When ILMT data is incomplete or unavailable for any period, IBM's standard approach is to apply full-capacity licensing calculations rather than sub-capacity. In defense environments, this can inflate claims by 5 to 10 times actual consumption because full-capacity counts every physical core on every server, regardless of actual IBM software usage.

2

Mission-Critical Peak Processing

Defense manufacturing, logistics scheduling, and secure data processing generate significant peak workloads during batch runs, mission planning cycles, and compliance reporting windows. These peaks may last hours or days but IBM's audit methodology captures them as sustained capacity baselines. Virtualisation platforms dynamically allocate resources to meet peak demand, and ILMT records the peak allocation as the licensing requirement.

3

Government Procurement Entitlements

Defense suppliers frequently acquire IBM software through government procurement vehicles, GSA schedules, defense program-specific agreements, and subcontractor entitlements that exist outside standard Passport Advantage records. IBM's audit teams rely on Passport Advantage as the primary entitlement source, systematically missing licences acquired through these alternative channels.

Our Four-Phase Defense Approach

1

Comprehensive Audit Review (Weeks 1–3)

Thoroughly analysed IBM's audit findings line by line. Identified overestimations and errors in licensing calculations. Reviewed historical agreements, government procurement records, and entitlement data to establish a clear compliance baseline across the defense supplier's entire IBM estate. Mapped every claim category against actual deployment evidence.

2

Data Collection and Validation (Weeks 3–8)

Collaborated with IT, operations, and security teams to gather accurate deployment data from physical servers, virtualised environments, and secure cloud platforms. Validated sub-capacity metrics against ILMT records, VMware logs, and resource allocation schedules. Uncovered significant inaccuracies in IBM's reported usage. Identified underutilised licences and misaligned entitlements that could be leveraged to close genuine compliance gaps at zero cost.

3

Strategic Negotiation with IBM (Weeks 8–14)

Presented IBM with a comprehensive corrected compliance report backed by validated data and clear interpretation of licensing policies. Highlighted the company's proactive compliance measures and the critical nature of its work for national defense. Demonstrated that $38.8 million of the original claim was based on overestimations, calculation errors, and missing entitlement records. Engaged in structured negotiations to secure significant concessions.

4

Optimisation and Compliance Framework (Weeks 14–16)

Reallocated unused licences within the organisation to address remaining compliance gaps without additional costs. Implemented a compliance framework with real-time monitoring tools and periodic internal audits. Established processes for secure ILMT data collection across classified and unclassified networks. Provided training sessions for IT, procurement, and security teams to strengthen ongoing governance.

Sub-Capacity Licensing: $22 Million Reduced to $680,000

Sub-capacity licensing represented the largest component of IBM's claim at $22 million, or 55% of the total. Independent analysis revealed that IBM had systematically overstated actual consumption by applying full-capacity calculations where sub-capacity data existed and by treating peak processing events as sustained production baselines.

1

Full-Capacity Misapplication: $12.4 Million Removed

IBM applied full-capacity calculations to 14 servers across classified processing environments where ILMT reporting gaps existed. Independent analysis recovered 11 months of ILMT data from the 12-month audit window, supplemented by VMware vCenter logs, resource allocation schedules, and system configuration records. The ILMT gaps were attributable to a planned security infrastructure upgrade that temporarily disrupted reporting on the classified network segment. Actual sub-capacity consumption was approximately one-sixth of IBM's full-capacity calculation.

2

Peak Processing Inflation: $6.8 Million Removed

Defense manufacturing scheduling, logistics batch processing, and quarterly compliance reporting generated significant but temporary peak workloads. IBM's audit captured peak vCPU allocations during these events and applied them as the sustained licensing baseline. Analysis of 12 months of VMware DRS logs, batch scheduling records, and operations calendars demonstrated that peak events accounted for less than 15% of total operating time. Sustained baseline consumption was 70% lower than IBM's peak-based calculations.

3

Decommissioned Legacy Systems: $2.8 Million Removed

IBM's audit included 1,800 PVUs attributed to legacy systems from a defense program that concluded 18 months prior to the audit. The systems had been decommissioned and placed in secure archive mode for government records retention requirements. Decommissioning records, change management tickets, and power-down logs confirmed no active IBM software workloads had run on these systems since the program concluded.

Sub-Capacity Resolution. After removing full-capacity misapplications, peak processing inflation, and decommissioned legacy systems, the genuine sub-capacity shortfall was 480 PVUs attributable to a new secure logistics platform deployed six months prior to the audit. Settled at $680,000 at negotiated pricing with no penalties.

Entitlement Mismatches: $12 Million Reduced to $320,000

IBM's $12 million entitlement claim reflected a systemic failure to account for licences acquired through channels other than Passport Advantage. Defense suppliers routinely acquire software through government procurement vehicles, program-specific agreements, and enterprise contracts that IBM's standard audit process does not capture.

1

Government Procurement Entitlements: $5.2 Million

IBM's records did not reflect licences acquired through GSA Schedule contracts and defense program-specific procurement vehicles dating back over a decade. Reconstruction of procurement records from government contract management systems identified Db2 and WebSphere entitlements totalling $5.2 million in IBM's claimed shortfall that were validly licensed through these channels.

2

Legacy Enterprise Agreement Entitlements: $3.6 Million

A 2017 enterprise-wide IBM agreement included bundled middleware entitlements that were never properly registered in Passport Advantage. The original agreement documentation confirmed MQ, WebSphere Liberty, and Db2 Advanced Workgroup entitlements that accounted for $3.6 million of IBM's claimed gap. These entitlements had been paid for and were contractually valid but invisible to IBM's audit team.

3

Subcontractor Entitlements: $1.8 Million

As a prime contractor on multiple defense programs, the supplier held IBM entitlements acquired through subcontractor agreements and program-level software procurement. These entitlements were valid for use within the defense program scope but existed outside IBM's standard licensing records. Documentation from program management offices confirmed $1.8 million in entitlements IBM had not credited.

4

Bundled Component Errors: $1.4 Million

IBM counted several bundled software components as separately licensed products. WebSphere Liberty Profile was counted independently from WebSphere Application Server entitlements. Db2 features included in existing licences were billed as separate products. Correcting these bundling errors eliminated $1.4 million from the entitlement claim.

Entitlement Resolution. After reconstructing government procurement records, validating enterprise agreement entitlements, confirming subcontractor licences, and correcting bundling errors, the genuine entitlement gap was 200 MQ Advanced licences for a new secure messaging platform. Settled at $320,000 at negotiated pricing.

Virtualisation Overages: $6 Million Reduced to $200,000

IBM's $6 million virtualisation claim treated every virtual partition in the defense supplier's secure enclave as a fully licensed production instance. Government security policies require strict virtualisation isolation and segmentation that creates deployment footprints far exceeding actual IBM software usage.

1

Disaster Recovery Configurations: $3.2 Million Removed

IBM classified all disaster recovery virtual machines as production instances requiring full licensing. The defense supplier's DR environment operated in cold standby configuration, powered on only during quarterly DR validation exercises and annual continuity testing. Configuration documentation, power schedules, test execution logs, and VMware data confirmed zero production workloads ran on DR infrastructure outside scheduled tests. IBM's DR licensing policies support exemption for cold standby configurations with proper documentation.

2

Test and Certification Environments: $1.8 Million Removed

Security certification testing, integration validation, and pre-deployment qualification environments operated on highly constrained schedules. These environments were active for specific testing windows, typically 20 to 40 days per year, and powered down between test cycles. Usage schedules, power logs, and test execution records documented the actual operating patterns. IBM had treated these as continuously running production instances.

Virtualisation Resolution. After removing disaster recovery exemptions and test environment corrections, the genuine virtualisation shortfall was 240 PVUs for WebSphere supporting a new secure portal deployment. Settled at $200,000 at negotiated pricing with no penalties.

Negotiation Strategy and Settlement

1

Lead with Corrected Evidence

The comprehensive corrected compliance report documented $38.8 million in overestimations and errors across all three claim categories. The report included recovered ILMT data, VMware logs, government procurement records, enterprise agreement documentation, subcontractor entitlements, decommissioning evidence, and DR configuration data. The weight of evidence made IBM's original $40 million position indefensible.

2

Frame the Defense Relationship

The supplier's critical role in national defense programs, combined with annual IBM support spend exceeding $3 million, provided significant commercial leverage. The negotiation positioned the settlement as an opportunity to strengthen a long-term relationship rather than extract maximum penalty from a defense partner with demonstrated commitment to compliance.

3

Licence Reallocation and Forward Investment

Identified $240,000 in underutilised IBM licences from concluded defense programs that could be reallocated to close gaps at zero incremental cost. The remaining genuine shortfall was framed as forward-looking investment in new capabilities: secure logistics, advanced messaging, and portal infrastructure supporting active defense programs.

Claim Category IBM Claim Settlement Reduction
Sub-Capacity Licensing $22,000,000 $680,000 97%
Entitlement Mismatches $12,000,000 $320,000 97%
Virtualisation Overages $6,000,000 $200,000 97%
Total $40,000,000 $1,200,000 97%

"Facing such a significant audit was daunting, but Redress Compliance's expertise saved us millions and ensured our critical operations remained unaffected. Their guidance has strengthened our compliance framework and prepared us for the future."

Chief Information Officer, US Defense Supplier

Compliance Governance Framework

1

Secure ILMT Configuration

Established ILMT reporting paths across both classified and unclassified network segments. Implemented redundant data collection to prevent reporting gaps during infrastructure maintenance. Configured automated alerting for ILMT agent failures, with peak-versus-sustained separation built into reporting templates. Monthly health checks verify data completeness across all network segments.

2

Centralised Entitlement Register

Consolidated all IBM entitlements into a single register covering Passport Advantage, government procurement vehicles, GSA schedules, defense program agreements, subcontractor entitlements, and legacy enterprise contracts. Integrated the register with procurement workflows so new acquisitions are captured regardless of procurement channel. Quarterly reconciliation against ILMT deployment data.

3

DR and Test Environment Documentation

Implemented structured documentation for all disaster recovery and test environments. Power schedules, test execution logs, configuration records, and annual review processes now maintain a rolling 24-month evidence trail. Each environment is classified with clear licensing treatment documentation that can be produced immediately upon audit request.

4

Training and Internal Audit Programme

Delivered training to IT, procurement, and security teams covering IBM licensing requirements, ILMT governance, virtualisation licensing implications, and government procurement documentation. Quarterly internal compliance reviews and annual validation audits ensure the organisation maintains audit readiness at all times.

Key Lessons for Defense and Aerospace Organisations

1

Sub-Capacity Validation Is the Highest-Value Lever

Sub-capacity licensing represented 55% of the total claim and was reduced by 97%. The difference between full-capacity and sub-capacity calculations in defense environments can be 5 to 10 times. Recovering ILMT data and supplementing with VMware logs is the single most impactful defense activity.

2

Government Procurement Entitlements Are Systematically Missed

$5.2 million in valid entitlements acquired through GSA schedules and defense program procurement were invisible to IBM's audit. Defense organisations must maintain complete records of all procurement channels and be prepared to reconstruct entitlement histories from government contract management systems.

3

Air-Gapped Environments Create ILMT Vulnerability

Any gap in ILMT reporting triggers full-capacity fallback calculations. Classified and air-gapped networks are particularly vulnerable because security infrastructure changes can disrupt reporting without IT teams recognising the licensing implications. Redundant ILMT data collection paths are essential.

4

Peak Processing Is Not Sustained Capacity

Defense manufacturing scheduling, logistics batch runs, and compliance reporting generate peaks that IBM treats as baselines. VMware DRS logs correlated with operations calendars consistently demonstrate that actual sustained consumption is 60 to 80% lower than peak-based calculations.

5

Decommissioned Program Systems Must Be Removed

Government records retention requirements mean decommissioned defense program systems often remain in archive mode. IBM's ILMT may still detect these systems. Formal decommissioning documentation and ILMT exclusion records prevent phantom PVU counts from appearing in audits.

6

Independent Advisory Delivers Exceptional Returns

The $38.8 million reduction achieved through independent advisory represents approximately 30 times the advisory investment. Defense organisations facing IBM audits should engage independent expertise before providing any data or responses to IBM to ensure the audit is managed on their terms.

Why Independent Advisory Matters for Defense Organisations

1

IBM Licensing and Defense Sector Expertise

Former IBM professionals who understand sub-capacity licensing, ILMT mechanics, middleware entitlement structures, and virtualisation policies from the inside. Combined with deep knowledge of defense IT environments, government procurement channels, classified network requirements, and the operational constraints that make defense audits uniquely complex.

2

Evidence-Based Audit Defense

The corrected compliance report combined ILMT data recovery, VMware logs, government procurement records, enterprise agreement documentation, subcontractor entitlements, decommissioning records, DR configuration evidence, and test environment usage schedules into a comprehensive defense that reduced the claim by 97%.

3

Complete Vendor Independence

Redress Compliance maintains no commercial relationship with IBM. No partner status. No resale agreements. No referral fees. When we advise a defense supplier to challenge IBM's position, reduce spend, or reallocate licences, there is no hidden incentive working against your interests.

"Defense and aerospace audits are consistently among the most overstated we encounter. The combination of classified network complexity, government procurement channels, peak processing patterns, and strict DR requirements means IBM's standard methodology almost always produces claims that are 80 to 97% higher than the genuine compliance position."

Redress Compliance IBM Advisory Team

Frequently Asked Questions

Defense organisations typically operate large, complex IBM estates across classified and unclassified networks with strict security segmentation. This complexity creates sub-capacity reporting gaps, virtualisation footprints that appear larger than actual usage, and entitlement records spread across multiple procurement channels. IBM's audit methodology exploits these characteristics, frequently producing claims that are 80 to 97% overstated compared to the actual compliance position.

Air-gapped and classified networks can disrupt ILMT reporting because the tool requires network connectivity to collect and report sub-capacity data. Any gap in ILMT reporting, even caused by a planned security upgrade, triggers full-capacity licensing fallback. Full-capacity calculations count every physical core on every server regardless of actual IBM software usage, which can inflate claims by 5 to 10 times. Redundant ILMT data collection paths and supplementary evidence from VMware logs and configuration records are essential for defense organisations.

Defense suppliers frequently acquire IBM software through GSA Schedule contracts, defense program-specific procurement vehicles, subcontractor agreements, and government enterprise contracts. These entitlements are contractually valid but often exist outside IBM's Passport Advantage system, which is the primary entitlement source IBM's audit teams reference. Without independent reconstruction of procurement records from government contract management systems, these entitlements go unrecognised and appear as compliance gaps in IBM's audit.

IBM's licensing policies generally support exemptions for cold standby disaster recovery configurations where the software is installed but not running production workloads. The exemption requires proper documentation: configuration records showing standby status, power schedules, test execution logs for DR validation exercises, and evidence that no production workloads run outside scheduled test windows. Defense organisations with well-documented DR environments can typically eliminate 100% of IBM's DR-related claims.

Based on our experience with defense and aerospace clients, typical IBM audit claim reductions range from 90 to 97%. The combination of sub-capacity overstatement, government procurement entitlements, classified network ILMT gaps, peak processing inflation, and virtualisation complexity means the genuine compliance position is almost always a fraction of IBM's initial claim. The key factor is engaging independent expertise immediately upon receiving the audit notification, before providing any data or responses to IBM.

Most defense IBM audit engagements run 14 to 18 weeks. The additional time compared to commercial sector audits reflects the complexity of data collection across classified networks, government procurement record reconstruction, and the structured negotiation process with IBM. The four phases cover audit review and strategy (weeks 1 to 3), data collection and validation (weeks 3 to 8), negotiation (weeks 8 to 14), and compliance framework implementation (weeks 14 to 16 or 18).

Completely. Redress Compliance maintains no commercial relationship with IBM or any other software vendor. We do not resell IBM software, receive referral fees, or participate in IBM partner programmes. Our team includes former IBM licensing professionals who understand IBM's audit methodology, pricing structures, and negotiation tactics from the inside. When we recommend challenging IBM's position, our only interest is protecting your organisation.

IBM Audit Defense Case Studies

Our IBM Advisory Services

FF

Fredrik Filipsson

Co-Founder, Redress Compliance

Fredrik Filipsson brings 20+ years of experience in enterprise software licensing, having worked directly for IBM, SAP, and Oracle before co-founding Redress Compliance. He has delivered IBM audit defence, licensing assessments, and negotiation support engagements across defence and aerospace, manufacturing, financial services, government, healthcare, and technology sectors, helping organisations eliminate compliance risk and recover millions in unnecessary spend. Redress Compliance maintains complete vendor independence.

← Back to IBM Knowledge Hub
Redress Compliance Newsletter

Enterprise Software Licensing Intelligence, Delivered Monthly

Negotiation strategies, compliance insights, and cost optimisation playbooks for Oracle, Microsoft, SAP, IBM, and more. Trusted by procurement leaders at 500+ enterprises globally.

Subscribe Now Free. No spam. Unsubscribe anytime.