SlideShare a Scribd company logo
1 of 2
Download to read offline
A licensing system
for your own products.
software as an asset
SECuris allows you to easily distribute your applications,
protecting them from unauthorized access and providing a tool
to update the license when required without disturbing
customers.
SECuris can create licenses for a limited number of users,
installations, modes, and lengths of time, among others. It is
fully customizable to limit the use of your applications and also
allows for hardware bundling.
All trademarks and registered trademarks are the property of their respective owners
Features
• Intuitive UI
• Elastic licensing model, customized license
constraints
• Useful for different kinds of applications
(desktop, web, mobile, etc.)
• Pack management
· The Pack is the entity purchased by the customer
· A Pack can contain one or more licenses
· Allow license pre-activation
· License metadata definition by packs
• License manager
· Signed License creation based on product,
organization and metadata
· Automatic License synchronization capabilities
· License validation
· License cancelation
· License renewal
• Organization management
• User management based on roles, including
access for third-party organizations
System
requirements
• 1GB of RAM
• Single-core processor or
higher
• Java™ 8 Virtual Machine
• MySQL™ 5.5+
Technology
• Web application based on JEE5™,
Bootstrap™ and AngularJS™
• REST Services layer with API for
third-party application integration
• Server technology: JAX-RS
(RESTEasy), JPA (Hibernate), CDI
(Weld)
• Multi-platform server
software as an asset

More Related Content

What's hot

Devasis Kumar Mahato - Resume
Devasis Kumar Mahato - ResumeDevasis Kumar Mahato - Resume
Devasis Kumar Mahato - ResumeDevasis Kumar
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access ManagementKalyana Sundaram
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014Ronny Stavem
 
Ewug 1808 take conditional access to the next level
Ewug 1808   take conditional access to the next levelEwug 1808   take conditional access to the next level
Ewug 1808 take conditional access to the next levelPer Larsen
 
Web Based Affiliate Network System
Web Based Affiliate Network System Web Based Affiliate Network System
Web Based Affiliate Network System Mike Taylor
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity managementNis
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsAidy Tificate
 
Viewfinity Product Overview
Viewfinity Product OverviewViewfinity Product Overview
Viewfinity Product Overviewakeophila
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager IntroductionAidy Tificate
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM MaturityJerod Brennen
 
Identity Access Management
Identity Access ManagementIdentity Access Management
Identity Access Managementson09remotely
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finaljasonlan
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementRyan Gallavin
 
Scug 1809 Take conditional access to the next level
Scug 1809   Take conditional access to the next levelScug 1809   Take conditional access to the next level
Scug 1809 Take conditional access to the next levelPer Larsen
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Jack Forbes
 

What's hot (20)

What is virtual browser
What is virtual browserWhat is virtual browser
What is virtual browser
 
Vigilix Overview
Vigilix OverviewVigilix Overview
Vigilix Overview
 
Devasis Kumar Mahato - Resume
Devasis Kumar Mahato - ResumeDevasis Kumar Mahato - Resume
Devasis Kumar Mahato - Resume
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access Management
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014
 
Ewug 1808 take conditional access to the next level
Ewug 1808   take conditional access to the next levelEwug 1808   take conditional access to the next level
Ewug 1808 take conditional access to the next level
 
Web Based Affiliate Network System
Web Based Affiliate Network System Web Based Affiliate Network System
Web Based Affiliate Network System
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
 
Viewfinity Product Overview
Viewfinity Product OverviewViewfinity Product Overview
Viewfinity Product Overview
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager Introduction
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
Identity Access Management
Identity Access ManagementIdentity Access Management
Identity Access Management
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23final
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
 
Scug 1809 Take conditional access to the next level
Scug 1809   Take conditional access to the next levelScug 1809   Take conditional access to the next level
Scug 1809 Take conditional access to the next level
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Secure Management of Privileged Passwords
Secure Management of Privileged PasswordsSecure Management of Privileged Passwords
Secure Management of Privileged Passwords
 

Similar to 20150528_ficha SECURIS

License Management Overview
License Management OverviewLicense Management Overview
License Management OverviewDominic Haigh
 
License Management
License ManagementLicense Management
License ManagementSVPMA
 
FlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexera
 
Viewfinity Privilege Management
Viewfinity Privilege ManagementViewfinity Privilege Management
Viewfinity Privilege Managementakeophila
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsFredBrandonAuthorMCP
 
FlexNet Operations
FlexNet OperationsFlexNet Operations
FlexNet OperationsFlexera
 
Current challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsCurrent challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsDominic Haigh
 
Software License Optimization Managed Services
Software License Optimization Managed ServicesSoftware License Optimization Managed Services
Software License Optimization Managed ServicesFlexera
 
Introduction to Software Potential
Introduction to Software PotentialIntroduction to Software Potential
Introduction to Software PotentialSoftwarePotential
 
Introduction to Software Potential
Introduction to Software PotentialIntroduction to Software Potential
Introduction to Software PotentialInishTech
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationFlexera
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itPeter Daalmans
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionFlexera
 
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, NokiaDeployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokiamfrancis
 
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CloudIDSummit
 
Automation Cloud Series - Mastering the Automation Cloud Admin experience_Ses...
Automation Cloud Series - Mastering the Automation Cloud Admin experience_Ses...Automation Cloud Series - Mastering the Automation Cloud Admin experience_Ses...
Automation Cloud Series - Mastering the Automation Cloud Admin experience_Ses...Rohit Radhakrishnan
 
FlexNet Operations On-Demand Setup
FlexNet Operations On-Demand SetupFlexNet Operations On-Demand Setup
FlexNet Operations On-Demand SetupFlexera
 
License Position Snapshot Service
License Position Snapshot ServiceLicense Position Snapshot Service
License Position Snapshot ServiceFlexera
 

Similar to 20150528_ficha SECURIS (20)

License Management Overview
License Management OverviewLicense Management Overview
License Management Overview
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
License Management
License ManagementLicense Management
License Management
 
FlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexNet Manager Suite Cloud
FlexNet Manager Suite Cloud
 
Viewfinity Privilege Management
Viewfinity Privilege ManagementViewfinity Privilege Management
Viewfinity Privilege Management
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
 
FlexNet Operations
FlexNet OperationsFlexNet Operations
FlexNet Operations
 
Current challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsCurrent challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutions
 
Software License Optimization Managed Services
Software License Optimization Managed ServicesSoftware License Optimization Managed Services
Software License Optimization Managed Services
 
Ekran system functions v. 5.0
Ekran system functions v. 5.0Ekran system functions v. 5.0
Ekran system functions v. 5.0
 
Introduction to Software Potential
Introduction to Software PotentialIntroduction to Software Potential
Introduction to Software Potential
 
Introduction to Software Potential
Introduction to Software PotentialIntroduction to Software Potential
Introduction to Software Potential
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License Optimization
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
 
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, NokiaDeployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
 
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
 
Automation Cloud Series - Mastering the Automation Cloud Admin experience_Ses...
Automation Cloud Series - Mastering the Automation Cloud Admin experience_Ses...Automation Cloud Series - Mastering the Automation Cloud Admin experience_Ses...
Automation Cloud Series - Mastering the Automation Cloud Admin experience_Ses...
 
FlexNet Operations On-Demand Setup
FlexNet Operations On-Demand SetupFlexNet Operations On-Demand Setup
FlexNet Operations On-Demand Setup
 
License Position Snapshot Service
License Position Snapshot ServiceLicense Position Snapshot Service
License Position Snapshot Service
 

20150528_ficha SECURIS

  • 1. A licensing system for your own products. software as an asset SECuris allows you to easily distribute your applications, protecting them from unauthorized access and providing a tool to update the license when required without disturbing customers. SECuris can create licenses for a limited number of users, installations, modes, and lengths of time, among others. It is fully customizable to limit the use of your applications and also allows for hardware bundling.
  • 2. All trademarks and registered trademarks are the property of their respective owners Features • Intuitive UI • Elastic licensing model, customized license constraints • Useful for different kinds of applications (desktop, web, mobile, etc.) • Pack management · The Pack is the entity purchased by the customer · A Pack can contain one or more licenses · Allow license pre-activation · License metadata definition by packs • License manager · Signed License creation based on product, organization and metadata · Automatic License synchronization capabilities · License validation · License cancelation · License renewal • Organization management • User management based on roles, including access for third-party organizations System requirements • 1GB of RAM • Single-core processor or higher • Java™ 8 Virtual Machine • MySQL™ 5.5+ Technology • Web application based on JEE5™, Bootstrap™ and AngularJS™ • REST Services layer with API for third-party application integration • Server technology: JAX-RS (RESTEasy), JPA (Hibernate), CDI (Weld) • Multi-platform server software as an asset