Whether your company licenses software or other technology, you rely on your vendor for technical support, functional enhancements, and maintenance. This dependency — especially if it involves software for mission-critical business applications or operations — exposes your company to potential risks.
If your vendor went out of business or otherwise stopped supporting your licensed software or technology, your company could suffer considerable losses in revenue and/or productivity.
In the event of an unforeseen circumstance where your vendor is no longer able to provide support or maintenance, establishing an Iron Mountain escrow account gives you the ability to gain access to the source code and other proprietary information needed to maintain that licensed software or technology.
Once you’ve established an escrow account, you want to spend minimal time managing it. Escrow Management Center provides Web-based access to realtime transactions with up-to-date escrow account information, allowing you to:
Verification: A Fundamental Element of Software Escrow
Although putting software in an escrow account ensures that code will be released if and when a release condition occurs, you have no assurance that the software will be complete, usable, or even readable. Don’t forget the importance of Escrow Verification Services to validate the completeness, accuracy, and functionality of the deposit, and to help ensure that you can read, recreate, and maintain the software upon release.
Whether your needs today are to safeguard one specific application or to address a more holistic risk management strategy, Iron Mountain provides flexible, comprehensive escrow services governed by an agreement that gives you the optimal level of protection in each unique situation.
Iron Mountain’s comprehensive escrow services include the key features required by all clients desiring escrow protection, but at the same time are flexible enough to accommodate additional requirements for custom and/or individual needs.
You need not simply sign a vendor’s standard escrow agreement because you are strapped for time to research escrow options and best practices. Iron Mountain’s escrow professionals will work with you to define the right level of protection for your specific requirements.
The result of our consultative approach is the generation of an agreement that fits your needs today, but underlying that specific agreement is a comprehensive service that can accommodate your needs as you add mission-critical applications and build your corporate risk management strategy well into the future.
You can rest easy knowing that your data is completely protected within Iron Mountain’s secure environment for data transfer, data storage, and account management of escrow deposits. Iron Mountain’s comprehensive security framework includes the following attributes:
NCC Group Software Resilience has acquired Iron Mountain’s Intellectual Property Management (IPM) business. For more information on the acquisition, please visit our dedicated information hub, or contact Iron Mountain IPM.