Moving From a HardwareKey to a Soft key-based Protection<br />Donald S. Feagan<br />President & COO <br />SA International...
Who is SAi<br />SA International (SAi) is recognized as a global leader in providing complete software solutions for the s...
What we secure<br /><ul><li>Software for small to mid-size businesses running on Win & Mac
Different languages
Specific OEM differentiation requirements
Client and server
Specific output devices such asdifferent printers </li></li></ul><li>What and how we sell<br />Products have different lev...
Why we chose hard key based security<br /><ul><li>High level of security
No other option at the time
Added perceived value of the software
Portable solution
Good fit for our business models – selling features</li></li></ul><li>Hard key limitation we faced<br /><ul><li>Key memory...
Upcoming SlideShare
Loading in …5
×

SafeNet EMS Showcase: Moving From a Hardware Key to a Soft Key-Based Protection

408 views
387 views

Published on

“Moving From a Hardware Key to a Soft Key-Based Protection” by Don Faegan, President and COO, SAi

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
408
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

SafeNet EMS Showcase: Moving From a Hardware Key to a Soft Key-Based Protection

  1. 1. Moving From a HardwareKey to a Soft key-based Protection<br />Donald S. Feagan<br />President & COO <br />SA International - SAi<br />www.saintl.biz<br />
  2. 2. Who is SAi<br />SA International (SAi) is recognized as a global leader in providing complete software solutions for the sign making, digital printing and CNC machining industries<br />SAi has a loyal and well-distributed network of resellers around the world with more than 100,000 customers in more than 50 countries. The Company's products are translated into more than 25 languages. SAi has strong OEM relationships with industry leaders such as Xerox, Cannon and more.<br />70% market share for sign making and franchise operations<br />
  3. 3. What we secure<br /><ul><li>Software for small to mid-size businesses running on Win & Mac
  4. 4. Different languages
  5. 5. Specific OEM differentiation requirements
  6. 6. Client and server
  7. 7. Specific output devices such asdifferent printers </li></li></ul><li>What and how we sell<br />Products have different levels + optional features<br />Network of distributors around the world<br />Distributors actually purchase the licensed software <br />Range of product price is between $800 - $7500<br />Different prices and different product configuration in different regions of the world<br />
  8. 8. Why we chose hard key based security<br /><ul><li>High level of security
  9. 9. No other option at the time
  10. 10. Added perceived value of the software
  11. 11. Portable solution
  12. 12. Good fit for our business models – selling features</li></li></ul><li>Hard key limitation we faced<br /><ul><li>Key memory wasn’t able to hold all needed options
  13. 13. Obtain user information – not only distributor information
  14. 14. Reporting product usage
  15. 15. Dealing with stolen keys and general key support
  16. 16. Cost of a hard key</li></li></ul><li>Reasons for developing our own soft key<br /><ul><li>Reduce cost!
  17. 17. Better security
  18. 18. Improved flexibility
  19. 19. Monthly communication and validation of customers
  20. 20. Reduce time and effort for key issue support
  21. 21. Allow software portability (couldn’t find off-the-shelf solution)</li></li></ul><li>Developing our own soft key – Did it work?<br /><ul><li>Reduce cost!
  22. 22. Better security
  23. 23. Monthly communication and validation of customers
  24. 24. Reduce time and effort for key issue support
  25. 25. Allow software portability (couldn’t find off-the-shelf solution)</li></li></ul><li>Looking at EMS to<br /><ul><li>Reduce cost per copy
  26. 26. Capture end user data – crucial to the success of SAi
  27. 27. Move away from feature based product pricing
  28. 28. Provide 24/7 automated fulfillment
  29. 29. Concentrate on developing products and not security</li></li></ul><li>Current status<br />EMS is fully incorporated to our security system<br />Testing is under way<br />We are starting to see new business model opportunities by utilizing EMS <br />Pay as you go<br />Rent the software<br />Payment plan<br />etc<br />
  30. 30.
  31. 31. Thank You<br />

×