Hardware Protection. Redefined.

Similar documents
Integrating Sentinel HASP Business Studio Server into Your Existing Back-Office Systems

Integrating Sentinel EMS Server Into Your Existing Back-Office Systems

PRODUCT FAMILY OVERVIEW

How to Achieve a Cloud-Connected Experience Using On-Premise Applications

Software Licensing in Virtual Environments. Managing the Terms of Software Use in Virtualized Systems

Migration Guide. Sentinel HASP to Sentinel LDK

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Platform Virtualization and Software Licensing: Best Practices for Software Vendors

Build vs. Buy: The Hidden Costs of License Management

SERVICES. Software licensing and entitlement management delivered in the cloud for the cloud

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

UniKey Family 0. UniKey Time

SafeNet Licensing Solution Design Workshop

How to Choose a Software Protection Solution

Best Practices for Selecting and Implementing Software License Management

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Design Considerations in Adding USB Communications to Embedded Applications

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

mcard CPK Supported Solutions

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

The Casper Suite An ROI overview

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Securing Virtual Desktop Infrastructures with Strong Authentication

How Software License Management Can Help Intelligent Device Manufacturers Increase Both Profits and Competitive Advantage

OdysseyTM. removable hard disk storage system. secure. fast. expandable.

Device Lifecycle Management

IBM Data Security Services for endpoint data protection endpoint encryption solution

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

The Ultimate Authentication Technology

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

Secure USB Flash Drive. Biometric & Professional Drives

Recording Server RS100 series

IBM Kenexa Lead Manager can help you source top talent, build strong relationships and generate qualified applications

12 Ways to Turn Licensing Challenges Into Business Opportunities. An ebook for software publishers and intelligent device manufacturers

Samsung Portable SSD. Branded Product Marketing Team, Memory Business

Gemalto SafeNet Minidriver 9.0

SafeNet DataSecure vs. Native Oracle Encryption

Many cloud service providers are interested in supporting resellers as tenants within their cloud.

UPGRADE THE WAY YOU WORK

INTEGRATION GUIDE MS OUTLOOK 2003 VERSION 2.0

Sentinel Protection Installer Version (32-bit and 64-bit Windows) ReadMe

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011

PRODUCTS & TECHNOLOGY

Java Embedded Applications

E-Series. Human Machine Interfaces. Evolution By Design MITSUBISHI ELECTRIC AUTOMATION, INC.

USB 3.0 Flash Memory Card Reader Installation Guide

USB 3.0 to 2.5" SATA HDD/SSD Mini Docking Quick Installation Guide

Top 10 Reasons to Virtualize VMware Zimbra Collaboration Server with VMware vsphere. white PAPER

Entrust IdentityGuard

Flexiant Cloud Orchestrator with Parallels Cloud Server

Gemalto to acquire SafeNet, the worldwide leader in data and software protection

Pervasive PSQL Product Activation

Client Monitoring with Microsoft System Center Operations Manager 2007

Secure Data Exchange Solution

SafeNet Cisco AnyConnect Client. Configuration Guide

Complying with PCI Data Security

Decision Guide AUTHENTICATION

BEST PRACTICES RESEARCH

IBM Rational Asset Manager

3.4 Planning for PCI Express

An Oracle White Paper June Oracle Database Firewall 5.0 Sizing Best Practices

Introducing etoken. What is etoken?

award winning devices and solutions for business

Windows Embedded Security and Surveillance Solutions

Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

USB Flash Drives Overview By Mikio Moriyasu

Two factor strong authentication. Complex solution for two factor strong authentication

Software Hardware Binding with Quiddikey

Selecting the Right NAS File Server

Mobile Trust Net. Powering the mobile revolution MOBILE TRUST NET

etoken TMS (Token Management System) Frequently Asked Questions

Two-Factor Authentication

Openbravo Subscription and Recurring Billing Managing a Subscription-based Business and How a Technology Giant Did It

Operating System Installation and Software Distribution for Windows 7

Trust the Connectivity Experts

MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS

TCxWave. Highlights. Attractive design complements the brand experience

udrive-usd-g1 Embedded DOS micro-drive Module Data Sheet

UDC IN A BOX. A complete User Data Management Solution to meet different business needs

How much do you pay for your PKI solution?

Sentinel Protection Installer Version (Windows) ReadMe

Operating System Installation Guide

License Administration Guide. FlexNet Publisher 2014 R1 ( )

License Administration Guide. FlexNet Publisher Licensing Toolkit

Pearl Echo Installation Checklist

256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES

Windows Server Virtualization An Overview

How To Get A License From A Business To A Computer (For A Business)

7 things to ask when upgrading your ERP solution

Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security

VMware View 4 with PCoIP I N F O R M AT I O N G U I D E

SMART. SIMPLE. SAFE. Imation RDX. removable hard disk storage system

ACER ProShield. Table of Contents

An Oracle White Paper May Oracle Database Cloud Service

256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES

SafeNet MobilePASS Version 8.2.0, Revision B

IBM Security Network Protection

RENE BERNIER ACCOUNT MANAGER MICROSOFT CORPORATION

Transcription:

Hardware Protection. Redefined.

We are pleased to announce the addition of the Sentinel HL hardware based protection keys to our robust portfolio of products and services. The Sentinel HL keys are offered in a new contemporary design while maintaining full backwards compatibility with your existing Sentinel HASP HL, Hardlock and Sentinel SuperPro implementations. Additionally, they allow you to take full advantage of forward compatibility with our next generation software licensing solution Sentinel LDK. For over two decades, software publishers are putting their trust in SafeNet s hardware based protection keys in order to protect their valuable software against piracy. SafeNet s state-of-the-art technologies provide full-scale security and licensing solutions for software vendors wishing to address each and every aspect of the software monetization lifecycle from copy and intellectual property (IP) protection to product catalog management and ongoing end-user experience improvement. Supported by a set of development and management tools, the Sentinel portfolio enables software vendors and developers to implement flexible licensing enforcement solutions that best meet their business needs and their customers evolving demands. For more information on SafeNet s Sentinel HL hardware based licensing solutions, visit: http://www.safenet-inc.com/sentinelhl

Features and benefits at a glance: Backwards compatibility 100% compatible with your existing Sentinel HASP HL, Hardlock and Sentinel SuperPro hardware. Increased Security All Sentinel HL hardware-based protection keys employ a highly secure SmartCard chip providing the utmost security against malicious hardware attacks such Differential Power Analysis (DPA) and electron microscopy. Highly Customizable Provides more real estate for the purpose of a personalized logo or text. Future proof add future functionality and enhancements to in-the-field deployed keys using our unique UpdateOnChip mechanism. AppOnChip - Execute code segments onboard the key providing a virtually inseparable binding between the key and your application Driverless - Sentinel HL keys are field upgradeable from Sentinel HASP HL, Hardlock or Sentinel SuperPro configurations to a driverless configuration, using Sentinel LDK, eliminating the need of installing device drivers on end-user machines.

Sentinel HL Basic Sentinel HL Basic is a simple and effective solution for protecting software. The key has no internal memory, requires no preprogramming and is immediately ready for delivery as part of the protected software. Sentinel HL Basic allows protecting highvolume software licenses that do not require ongoing management and maintenance and are offered out-of-the-box. Mini Form Factor: 40.5 x 16 x 8mm Available Configurations: Sentinel HASP HL, Driverless SafeNet s most cost-effective software protection key. Ideal for licensing scenarios that do not require component licensing and where memory is not required.

Sentinel HL Pro Sentinel HL Pro is a comprehensive software protection solution for a variety of purposes including read/write memory and read only memory protection. A single Sentinel HL Pro allows you to protect up to 39 distinct features or applications. Protect over 39 features or applications 224Bytes Protected memory Mini Form Factor: 40.5 x 16 x 8mm Available Configurations: Sentinel HASP HL, Sentinel SuperPro, Driverless The ideal solution for component licensing where only a small number of product features are required.

Sentinel HL Max Sentinel HL Max is the ideal solution for protecting a large number of applications or features. The Sentinel HL Max key contains a unique 32-bit ID that allows protecting each copy of your unique application while fully controlling the secure software update mechanism. Protect over 2000 features or applications 32KB Protected memory Mini Form Factor: 40.5 x 16 x 8mm Available Configurations: Sentinel HASP HL, Hardlock, Sentinel SuperPro, Driverless A step up from the Sentinel HL Pro model, the Sentinel HL Max can be used to license a large number of components or provide a metered licensing model.

Sentinel HL Max - Micro Form Factor Sentinel HL Max offers a robust protection and flexible licensing enforcement in a sleek new design making it virtually invisible and decreasing the possibility of accidental or deliberate damage. Protect over 2000 features or applications 32KB Protected memory Micro Form Factor: 18 x 12.2 x 4.5mm Available Configurations: Sentinel HASP HL, Hardlock, Driverless The ideal solution for cases in which reduced visibility minimizes the likelihood of tampering and accidental or deliberate breakage, including use with notebooks, embedded systems, medical devices, machinery controls and other equipment with stationary licensing keys.

Sentinel HL Max - ExpressCard Form Factor Sentinel HL Max provides a powerful copy protection and licensing with the convenience of an inconspicuous ExpressCard form factor. The Sentinel HL Max combines SafeNet s award-winning Sentinel family of hardware protection keys in a sleek form factor. Protect over 2000 features or applications 32KB Protected memory ExpressCard Form Factor: 75 x 34 x 5mm Available Configurations: Sentinel HASP HL, Driverless The ideal licensing solution for applications requiring a large number of applications or features offered as an ExpressCard solution.

Sentinel HL Max - Chip Form Factor Sentinel HL Max is the ideal solution for protecting and licensing software running on embedded systems. The license protection and implementation becomes an integral part of the product design, completely invisible to the naked eye. Protect over 2000 features or applications 32KB Protected memory Chip Form Factor, as tape-on-reel or as individual demo sample Available Configurations: Driverless A comprehensive single chip licensing solution that seamlessly integrates into your existing hardware.

Sentinel HL Net Sentinel HL Net provides a robust solution for protecting enterprise software designed for operating in a networked environment. By using the Sentinel HL Net key, developers can impose restrictions on the number of concurrent users from a secure program in addition to offer the option of concurrent licensing support. Protect over 2000 features or applications 32KB Protected memory Adjustable concurrent users limitation Mini Form Factor: 40.5 x 16 x 8mm Available Configurations: Sentinel HASP HL, Hardlock, Sentinel SuperPro, Driverless The most robust yet flexible solution for protecting enterprise software designed for operating in a networked infrastructure while offering the option of adjustable concurrent licensing support.

Sentinel HL Time Sentinel HL Time contains a highly accurate Real Time Clock (RTC) which provides time based (expiry date & days from first use) and tamper proof expiration date license management solutions. Sentinel HL Time is the best solution for flexible time-based sales and licensing of protected software. Protect over 2000 features or applications 32KB Protected memory Real Time Clock for secure time based licensing Midi Form Factor: 52 x 16 x 8mm Available Configurations: Sentinel HASP HL, Driverless The Sentinel HL Time is the ideal solution for timebased licensing options (days from first use and expiry date) made possible thanks to its on-board tamperproof Real Time Clock.

Sentinel HL NetTime The Sentinel HL NetTime key allows you to simultaneously limit the number of concurrent users and the application itself when running in a networked environment. Available with flexible options to meet your business needs, the Sentinel HL NetTime allows you to set a maximum of 10, 50 and 250+ licenses that are completely configurable during fulfillment. Protect over 2000 features or applications 32KB Protected memory Real Time Clock for secure time based licensing Midi Form Factor: 52 x 16 x 8mm Available Configurations: Sentinel HASP HL, Driverless Combining the features of the both the Sentinel HL Net and the Time keys, the NetTime is the ideal solution for implementing time-based licensing in networked environments.

Sentinel HL Drive Sentinel HL Drive combines the powerful copy protection and licensing capabilities of the Sentinel HL Max key with the convenience of a mass storage device. All of the software protection features are available on a USB Flash drive so you can protect, license and distribute your software on a single hardware element. Protect over 2000 features or applications 32KB Protected memory, up to 4GB Flash Memory Maxi Form Factor: 68 x 18.6 x 8.2mm Available Configurations: Sentinel HASP HL, Driverless The Sentinel HL Drive combines licensing flexibility and portability with the convenience of a mass storage device. The Sentinel HL Drive allows you to protect, license and distribute your software using a single hardware element. FOR NEW AND EXCITING FEATURES, VISIT: WWW.SAFENET-INC.COM/SENTINELHL/DRIVE

Sentinel LDK Master Sentinel LDK Master is used by your production personnel to create various licenses and lock them to Sentinel HL protection keys. The Master key allows writing specific data to memory and the update of deployed in-the-field keys. The Sentinel LDK Master contains a highly accurate Real Time Clock (RTC) which enables time based (expiry date & days from first use) and tamper proof expiration date license management options. Midi Form Factor: 52 x 16 x 8mm The Sentinel LDK Master Key is an essential part of the licensing and production process containing your individual Vendor ID.

Sentinel LDK Developer Sentinel LDK Developer is used by your software engineers in conjunction with additional Sentinel Toolbox protection tools to protect your software and data files. The Sentinel LDK Developer, similarly to the Sentinel HL Time, contains a highly accurate Real Time Clock (RTC) which enables time based (expiry date & days from first use) and tamper proof expiration date license management solutions. Midi Form Factor: 52 x 16 x 8mm The Sentinel LDK Developer key is used as part of the software protection process defining the exact licensing terms as per a specific product or feature.

BEST DRM SOLUTION For the SafeNet is recognized by the analyst community as the Market Leader of the Global Software License Management Market Join the Conversation: www.licensinglive.com Learn More or Get Started with a FREE Trial Today: www.safenet-inc.com/software-monetization-solutions/ Get the latest updates on Events, Resources, & Support: sentinelcustomer.safenet-inc.com/ www.safenet-inc.com 4690 Millennium Drive, Belcamp, Maryland 21017 USA Telephone: +1 410 931 7500 or 1 800 533 3958 2013 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names are trademarks of their respective owners. 11.20.13