SlideShare a Scribd company logo
1 of 21
You create – We protect
StarForce ProActive
for Business
Licensing and protection system
for enterprise software
You create – We protect
www.star-force.com 2
 More than half of the world’s computer users admit to using
software in a way that breaches the software’s license
agreement
 The majority of software developers incur revenue losses
from the use of unlicensed software that amount to at least
10% of their revenue
 Experts estimate about $63.4 billion of annual revenue is
lost to the software industry
Source: Is Unlicensed Software Hurting Your Bottom Line? (KPMG Survey, 2015)
Are you prepared for violations of
your software license agreement?
You create – We protect
www.star-force.com 3
StarForce ProActive for Business
Advanced solution for reliable software protection
License Agreement Compliance
Protection against illegal
copying, sharing
and installation
Protection against analysis
and reverse engineering,
prevention of unauthorized
software modification
Use control in real time
You create – We protect
www.star-force.com
How it works
4
Protection
When an application is
being protected, its code
gets a number of
modifications that
protect it against
analysis and reverse
engineering and other
illegal actions from users
Activation
To activate the
protected application, a
serial number is
required. This number
also defines the
applicable license
terms. Activation
includes binding of a
serial number to the
hardware parameters
to provide a better
level of protection
Use Control
Via the personal area,
usage statistics can be
accessed at anytime
and changes can be
made in the conditions
of the license (editing
the serial number)
You create – We protect
www.star-force.com
Protection Features
 Protection of code inside the function / protection of the imported function call
 Extra protection of internal variables with hidden classes
 Activation of the application modes depending on serial number parameters
 Data files protection
 Beta version and promotional copy protection
 Patch and add-on protection
 StarForce SDK included
 Selection of binding objects: a computer, a local server and/or a remote server
5
You create – We protect
www.star-force.com 6
Binding Objects
A local server
A computer
(a server or
a workstation)
A remote server
The easiest way of
binding, ideally suits
applications
that are run on
physical computers
(not virtual machines)
Suitable for software
installation
on many computers
within one local network
(one company).
Supports running on
virtual machines
Enables full control
of the protected
application in real time.
You have an opportunity
to prolong, revoke, add
new users at any moment.
It also supports running
on virtual machines
You create – We protect
www.star-force.com
Recommendations for selecting binding
objects
Binding
Objects
Application
configuration
Computer Local Server Remote Server
Stand-alone
application
Ideal for applications
running on physical
machines
Suitable for applications
running on virtual
machines without
Internet connection
Provides full control.
Suitable for applications
running on virtual
machines
“Fat client-server”
application – client
protection
For a few computers
Ideal for many
computers in one
network
For remote workstations
with a replace
“Thin client-server”
application – server
protection
Ideal for applications
running on physical
machines
For corporate use
Provides full control.
Suitable for applications
running on virtual
machines
7
You create – We protect
www.star-force.com
“Fat client-server” application
binds to Local Server
8
Client of the
protected
application
StarForce
License
Service
Company’s Network
Protected
application’s
Server
Client of the
protected
application
Client of the
protected
application
Client of the
protected
application
You create – We protect
www.star-force.com
“Thin client-server” application or a Cloud
Service binds to Remote Server
9
StarForce
License
Service
Protected
Application
Internet
In “thin client server” or Cloud Service configuration only the server part is protected, but the software
developer usually specifies the number of users in license terms. Binding to a remote server allows you to
monitor the license terms and make quick changes
You create – We protect
www.star-force.com
Total control in real time
StarForce ProActive for Business allows you to control access to protected
software, change license settings and collect usage statistics immediately with a
few clicks
10
You create – We protect
www.star-force.com
International use and customization
 More than 16 GUI languages are supported
 Dialog boxes can be customized
 Custom user interface can be developed
11
You create – We protect
www.star-force.com
Licensing Models
12
Trial
Buy Only
Try&Die
Demo
Rent/
Subscription
Free use of the product during a certain period of time specified by the publisher. After the period
expires, the end users can only continue using the application if they purchase a license
Use of the product without restrictions
Use of the product without purchasing a license during a certain period of time specified by the
publisher. The application cannot run after the period expires. Suitable for beta testing
This licensing model allows end users to run the application with limited functionality, but without
any time limitations
Provides access to the product with time limitations. After the expiration date a new period must
be paid to continue work with the protected application
You create – We protect
www.star-force.com
License and Serial Numbers
Management
 License/Serial Number expiration date
 Regional restrictions
 Maximum number of runs
 Total time of operation
 Serial number blacklisting
 Limiting the functionality depending on the serial number
 Transferring custom information specified in the serial number to the
application during activation
13
The parameters of Serial Numbers can be edited after generation
You create – We protect
www.star-force.com
Automatic Activation
StarForce servers are located around the world, including
Germany, China and Russia, which allows to guarantee
automatic activation for end-users via the Internet and
manually on the ProActive website (if a PC with protected
software installed does not have an Internet connection)
14
You create – We protect
www.star-force.com
Success Story: Tradesoft
Tradesoft has selected StarForce ProActive for Business for
the protection of its flagship product - AutoIntellekt. This
solution is developed for wholesale and retail trade
automation.
StarForce performs the following tasks:
 Product Licensing
 Protection against analysis and modification to prevent
the situation when the client could modify and refine the
product without the developer
15
You create – We protect
www.star-force.com
Success Story: C++ Obfuscator
We use StarForce ProActive for Business to protect our own
product. StarForce C ++ Obfuscator is a unique stand-alone
application that is created to obfuscate software source code. Its
work algorithms are very valuable.
Why StarForce ProActive for Business
 Binding to a remote server allows us to control the protected
application and, if necessary, to revoke the access to it
 The client can use the product on multiple computers, including
virtual machines
16
You create – We protect
www.star-force.com
StarForce ProActive for Business Price
Calculation
17
License for
protection
and activation
(per 6 months
or per year)
Binding
Objects
Serial
Numbers
StarForce
ProActive for
Business Cost
You create – We protect
www.star-force.com 18
Those companies have chosen us
You create – We protect
www.star-force.com
StarForce Benefits
Protection provided by an international company with partners all over the world
The company has a R&D Department that is responsible for innovations in hack-
resistance and functionality development. We update our products at least 4 times
a year
Friendly Support Team that can help via email, phone, Skype
Online statistics reports for marketing analysis and sales forecasting
Reasonable prices and a flexible discount system
Fast product protection over Internet (from work and from home)
An option to order protection performed by StarForce specialists
An option to order protection analysis by StarForce experts to get
recommendations about possible improvements
19
You create – We protect
www.star-force.com
Try StarForce
Sign up for a 30 days trial of
StarForce ProActive
for Business
for free
to make sure that it suits you
20
You create – We protect
StarForce Headquarters
+7 495 967-14-51
StarForce USA
+1 925 272-4515
StarForce France
+33 (0) 1 44 18-37-05
Business:
sales@star-force.com
Support:
support@star-force.com
Information:
info@star-force.com
www.star-force.com

More Related Content

Similar to StarForce ProActive for Business

AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewJermund Ottermo
 
Heroku Introduction: Scaling customer facing apps & services
Heroku Introduction: Scaling customer facing apps & servicesHeroku Introduction: Scaling customer facing apps & services
Heroku Introduction: Scaling customer facing apps & servicesJohn Stevenson
 
Virtualization Complexities Impact Your Software Licensing Policy
Virtualization Complexities Impact Your Software Licensing PolicyVirtualization Complexities Impact Your Software Licensing Policy
Virtualization Complexities Impact Your Software Licensing PolicyFlexera
 
Wibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionWibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionHimanshu Arora
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application SecurityDr. Ahmed Al Zaidy
 
Inflectra Agile Alliance Agile2015 Conference
Inflectra Agile Alliance Agile2015 ConferenceInflectra Agile Alliance Agile2015 Conference
Inflectra Agile Alliance Agile2015 ConferenceAdam Sandman
 
Closing Mainframe Integrity Gaps
Closing Mainframe Integrity GapsClosing Mainframe Integrity Gaps
Closing Mainframe Integrity GapsRay Overby
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challengewebhostingguy
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challengewebhostingguy
 
Becoming an Inflectra Partner
Becoming an Inflectra PartnerBecoming an Inflectra Partner
Becoming an Inflectra PartnerInflectra
 
Cisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewCisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewDavid Barry
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challengewebhostingguy
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challengewebhostingguy
 
Practical AD Security: How to Secure Your Active Directory Network Without Br...
Practical AD Security: How to Secure Your Active Directory Network Without Br...Practical AD Security: How to Secure Your Active Directory Network Without Br...
Practical AD Security: How to Secure Your Active Directory Network Without Br...Frank Lesniak
 
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...mfrancis
 
FlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexera
 

Similar to StarForce ProActive for Business (20)

AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software review
 
Heroku Introduction: Scaling customer facing apps & services
Heroku Introduction: Scaling customer facing apps & servicesHeroku Introduction: Scaling customer facing apps & services
Heroku Introduction: Scaling customer facing apps & services
 
Anajli_Synopsis
Anajli_SynopsisAnajli_Synopsis
Anajli_Synopsis
 
Virtualization Complexities Impact Your Software Licensing Policy
Virtualization Complexities Impact Your Software Licensing PolicyVirtualization Complexities Impact Your Software Licensing Policy
Virtualization Complexities Impact Your Software Licensing Policy
 
Wibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionWibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotection
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application Security
 
Inflectra Agile Alliance Agile2015 Conference
Inflectra Agile Alliance Agile2015 ConferenceInflectra Agile Alliance Agile2015 Conference
Inflectra Agile Alliance Agile2015 Conference
 
Closing Mainframe Integrity Gaps
Closing Mainframe Integrity GapsClosing Mainframe Integrity Gaps
Closing Mainframe Integrity Gaps
 
Module 4 Assignment
Module 4 AssignmentModule 4 Assignment
Module 4 Assignment
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challenge
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challenge
 
Becoming an Inflectra Partner
Becoming an Inflectra PartnerBecoming an Inflectra Partner
Becoming an Inflectra Partner
 
Cisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewCisco and The Applied Group Point of View
Cisco and The Applied Group Point of View
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challenge
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challenge
 
Practical AD Security: How to Secure Your Active Directory Network Without Br...
Practical AD Security: How to Secure Your Active Directory Network Without Br...Practical AD Security: How to Secure Your Active Directory Network Without Br...
Practical AD Security: How to Secure Your Active Directory Network Without Br...
 
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
 
Software assurance
Software assuranceSoftware assurance
Software assurance
 
FlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexNet Publisher Licensing Security
FlexNet Publisher Licensing Security
 

More from StarForce Technologies

Защита дисков CD и DVD от копирования
Защита дисков CD и DVD от копированияЗащита дисков CD и DVD от копирования
Защита дисков CD и DVD от копированияStarForce Technologies
 
Компания "Протекшен Технолоджи" (StarForce)
Компания "Протекшен Технолоджи" (StarForce) Компания "Протекшен Технолоджи" (StarForce)
Компания "Протекшен Технолоджи" (StarForce) StarForce Technologies
 
Партнерская программа StarForce
Партнерская программа StarForceПартнерская программа StarForce
Партнерская программа StarForceStarForce Technologies
 

More from StarForce Technologies (8)

StarForce Disc (Рус)
StarForce Disc (Рус)StarForce Disc (Рус)
StarForce Disc (Рус)
 
Защита дисков CD и DVD от копирования
Защита дисков CD и DVD от копированияЗащита дисков CD и DVD от копирования
Защита дисков CD и DVD от копирования
 
StarForce ProActive (Рус)
StarForce ProActive (Рус)StarForce ProActive (Рус)
StarForce ProActive (Рус)
 
Компания "Протекшен Технолоджи" (StarForce)
Компания "Протекшен Технолоджи" (StarForce) Компания "Протекшен Технолоджи" (StarForce)
Компания "Протекшен Технолоджи" (StarForce)
 
About StarForce Technologies
About StarForce TechnologiesAbout StarForce Technologies
About StarForce Technologies
 
Партнерская программа StarForce
Партнерская программа StarForceПартнерская программа StarForce
Партнерская программа StarForce
 
StarForce DVD Video (Eng)
StarForce DVD Video (Eng)StarForce DVD Video (Eng)
StarForce DVD Video (Eng)
 
StarForce Disc
StarForce Disc StarForce Disc
StarForce Disc
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

StarForce ProActive for Business

  • 1. You create – We protect StarForce ProActive for Business Licensing and protection system for enterprise software
  • 2. You create – We protect www.star-force.com 2  More than half of the world’s computer users admit to using software in a way that breaches the software’s license agreement  The majority of software developers incur revenue losses from the use of unlicensed software that amount to at least 10% of their revenue  Experts estimate about $63.4 billion of annual revenue is lost to the software industry Source: Is Unlicensed Software Hurting Your Bottom Line? (KPMG Survey, 2015) Are you prepared for violations of your software license agreement?
  • 3. You create – We protect www.star-force.com 3 StarForce ProActive for Business Advanced solution for reliable software protection License Agreement Compliance Protection against illegal copying, sharing and installation Protection against analysis and reverse engineering, prevention of unauthorized software modification Use control in real time
  • 4. You create – We protect www.star-force.com How it works 4 Protection When an application is being protected, its code gets a number of modifications that protect it against analysis and reverse engineering and other illegal actions from users Activation To activate the protected application, a serial number is required. This number also defines the applicable license terms. Activation includes binding of a serial number to the hardware parameters to provide a better level of protection Use Control Via the personal area, usage statistics can be accessed at anytime and changes can be made in the conditions of the license (editing the serial number)
  • 5. You create – We protect www.star-force.com Protection Features  Protection of code inside the function / protection of the imported function call  Extra protection of internal variables with hidden classes  Activation of the application modes depending on serial number parameters  Data files protection  Beta version and promotional copy protection  Patch and add-on protection  StarForce SDK included  Selection of binding objects: a computer, a local server and/or a remote server 5
  • 6. You create – We protect www.star-force.com 6 Binding Objects A local server A computer (a server or a workstation) A remote server The easiest way of binding, ideally suits applications that are run on physical computers (not virtual machines) Suitable for software installation on many computers within one local network (one company). Supports running on virtual machines Enables full control of the protected application in real time. You have an opportunity to prolong, revoke, add new users at any moment. It also supports running on virtual machines
  • 7. You create – We protect www.star-force.com Recommendations for selecting binding objects Binding Objects Application configuration Computer Local Server Remote Server Stand-alone application Ideal for applications running on physical machines Suitable for applications running on virtual machines without Internet connection Provides full control. Suitable for applications running on virtual machines “Fat client-server” application – client protection For a few computers Ideal for many computers in one network For remote workstations with a replace “Thin client-server” application – server protection Ideal for applications running on physical machines For corporate use Provides full control. Suitable for applications running on virtual machines 7
  • 8. You create – We protect www.star-force.com “Fat client-server” application binds to Local Server 8 Client of the protected application StarForce License Service Company’s Network Protected application’s Server Client of the protected application Client of the protected application Client of the protected application
  • 9. You create – We protect www.star-force.com “Thin client-server” application or a Cloud Service binds to Remote Server 9 StarForce License Service Protected Application Internet In “thin client server” or Cloud Service configuration only the server part is protected, but the software developer usually specifies the number of users in license terms. Binding to a remote server allows you to monitor the license terms and make quick changes
  • 10. You create – We protect www.star-force.com Total control in real time StarForce ProActive for Business allows you to control access to protected software, change license settings and collect usage statistics immediately with a few clicks 10
  • 11. You create – We protect www.star-force.com International use and customization  More than 16 GUI languages are supported  Dialog boxes can be customized  Custom user interface can be developed 11
  • 12. You create – We protect www.star-force.com Licensing Models 12 Trial Buy Only Try&Die Demo Rent/ Subscription Free use of the product during a certain period of time specified by the publisher. After the period expires, the end users can only continue using the application if they purchase a license Use of the product without restrictions Use of the product without purchasing a license during a certain period of time specified by the publisher. The application cannot run after the period expires. Suitable for beta testing This licensing model allows end users to run the application with limited functionality, but without any time limitations Provides access to the product with time limitations. After the expiration date a new period must be paid to continue work with the protected application
  • 13. You create – We protect www.star-force.com License and Serial Numbers Management  License/Serial Number expiration date  Regional restrictions  Maximum number of runs  Total time of operation  Serial number blacklisting  Limiting the functionality depending on the serial number  Transferring custom information specified in the serial number to the application during activation 13 The parameters of Serial Numbers can be edited after generation
  • 14. You create – We protect www.star-force.com Automatic Activation StarForce servers are located around the world, including Germany, China and Russia, which allows to guarantee automatic activation for end-users via the Internet and manually on the ProActive website (if a PC with protected software installed does not have an Internet connection) 14
  • 15. You create – We protect www.star-force.com Success Story: Tradesoft Tradesoft has selected StarForce ProActive for Business for the protection of its flagship product - AutoIntellekt. This solution is developed for wholesale and retail trade automation. StarForce performs the following tasks:  Product Licensing  Protection against analysis and modification to prevent the situation when the client could modify and refine the product without the developer 15
  • 16. You create – We protect www.star-force.com Success Story: C++ Obfuscator We use StarForce ProActive for Business to protect our own product. StarForce C ++ Obfuscator is a unique stand-alone application that is created to obfuscate software source code. Its work algorithms are very valuable. Why StarForce ProActive for Business  Binding to a remote server allows us to control the protected application and, if necessary, to revoke the access to it  The client can use the product on multiple computers, including virtual machines 16
  • 17. You create – We protect www.star-force.com StarForce ProActive for Business Price Calculation 17 License for protection and activation (per 6 months or per year) Binding Objects Serial Numbers StarForce ProActive for Business Cost
  • 18. You create – We protect www.star-force.com 18 Those companies have chosen us
  • 19. You create – We protect www.star-force.com StarForce Benefits Protection provided by an international company with partners all over the world The company has a R&D Department that is responsible for innovations in hack- resistance and functionality development. We update our products at least 4 times a year Friendly Support Team that can help via email, phone, Skype Online statistics reports for marketing analysis and sales forecasting Reasonable prices and a flexible discount system Fast product protection over Internet (from work and from home) An option to order protection performed by StarForce specialists An option to order protection analysis by StarForce experts to get recommendations about possible improvements 19
  • 20. You create – We protect www.star-force.com Try StarForce Sign up for a 30 days trial of StarForce ProActive for Business for free to make sure that it suits you 20
  • 21. You create – We protect StarForce Headquarters +7 495 967-14-51 StarForce USA +1 925 272-4515 StarForce France +33 (0) 1 44 18-37-05 Business: sales@star-force.com Support: support@star-force.com Information: info@star-force.com www.star-force.com