SlideShare a Scribd company logo
A licensing system
for your own products.
software as an asset
SECuris allows you to easily distribute your applications,
protecting them from unauthorized access and providing a tool
to update the license when required without disturbing
customers.
SECuris can create licenses for a limited number of users,
installations, modes, and lengths of time, among others. It is
fully customizable to limit the use of your applications and also
allows for hardware bundling.
All trademarks and registered trademarks are the property of their respective owners
Features
• Intuitive UI
• Elastic licensing model, customized license
constraints
• Useful for different kinds of applications
(desktop, web, mobile, etc.)
• Pack management
· The Pack is the entity purchased by the customer
· A Pack can contain one or more licenses
· Allow license pre-activation
· License metadata definition by packs
• License manager
· Signed License creation based on product,
organization and metadata
· Automatic License synchronization capabilities
· License validation
· License cancelation
· License renewal
• Organization management
• User management based on roles, including
access for third-party organizations
System
requirements
• 1GB of RAM
• Single-core processor or
higher
• Java™ 8 Virtual Machine
• MySQL™ 5.5+
Technology
• Web application based on JEE5™,
Bootstrap™ and AngularJS™
• REST Services layer with API for
third-party application integration
• Server technology: JAX-RS
(RESTEasy), JPA (Hibernate), CDI
(Weld)
• Multi-platform server
software as an asset

More Related Content

What's hot

What is virtual browser
What is virtual browserWhat is virtual browser
What is virtual browser
Bhaskara Reddy Sannapureddy
 
Vigilix Overview
Vigilix OverviewVigilix Overview
Vigilix Overview
Bradley Smith
 
Devasis Kumar Mahato - Resume
Devasis Kumar Mahato - ResumeDevasis Kumar Mahato - Resume
Devasis Kumar Mahato - Resume
Devasis Kumar
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access Management
Kalyana Sundaram
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
Jerod Brennen
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014
Ronny Stavem
 
Ewug 1808 take conditional access to the next level
Ewug 1808   take conditional access to the next levelEwug 1808   take conditional access to the next level
Ewug 1808 take conditional access to the next level
Per Larsen
 
Web Based Affiliate Network System
Web Based Affiliate Network System Web Based Affiliate Network System
Web Based Affiliate Network System
Mike Taylor
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
Nis
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
Aidy Tificate
 
Viewfinity Product Overview
Viewfinity Product OverviewViewfinity Product Overview
Viewfinity Product Overview
akeophila
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager Introduction
Aidy Tificate
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
Jerod Brennen
 
Identity Access Management
Identity Access ManagementIdentity Access Management
Identity Access Management
son09remotely
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23final
jasonlan
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
Vandana Verma
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
Ryan Gallavin
 
Scug 1809 Take conditional access to the next level
Scug 1809   Take conditional access to the next levelScug 1809   Take conditional access to the next level
Scug 1809 Take conditional access to the next level
Per Larsen
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
Jack Forbes
 
Secure Management of Privileged Passwords
Secure Management of Privileged PasswordsSecure Management of Privileged Passwords
Secure Management of Privileged Passwords
Hitachi ID Systems, Inc.
 

What's hot (20)

What is virtual browser
What is virtual browserWhat is virtual browser
What is virtual browser
 
Vigilix Overview
Vigilix OverviewVigilix Overview
Vigilix Overview
 
Devasis Kumar Mahato - Resume
Devasis Kumar Mahato - ResumeDevasis Kumar Mahato - Resume
Devasis Kumar Mahato - Resume
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access Management
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014
 
Ewug 1808 take conditional access to the next level
Ewug 1808   take conditional access to the next levelEwug 1808   take conditional access to the next level
Ewug 1808 take conditional access to the next level
 
Web Based Affiliate Network System
Web Based Affiliate Network System Web Based Affiliate Network System
Web Based Affiliate Network System
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
 
Viewfinity Product Overview
Viewfinity Product OverviewViewfinity Product Overview
Viewfinity Product Overview
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager Introduction
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
Identity Access Management
Identity Access ManagementIdentity Access Management
Identity Access Management
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23final
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
 
Scug 1809 Take conditional access to the next level
Scug 1809   Take conditional access to the next levelScug 1809   Take conditional access to the next level
Scug 1809 Take conditional access to the next level
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Secure Management of Privileged Passwords
Secure Management of Privileged PasswordsSecure Management of Privileged Passwords
Secure Management of Privileged Passwords
 

Similar to 20150528_ficha SECURIS

License Management Overview
License Management OverviewLicense Management Overview
License Management Overview
Dominic Haigh
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
MarketingArrowECS_CZ
 
License Management
License ManagementLicense Management
License Management
SVPMA
 
FlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexNet Manager Suite Cloud
FlexNet Manager Suite Cloud
Flexera
 
Viewfinity Privilege Management
Viewfinity Privilege ManagementViewfinity Privilege Management
Viewfinity Privilege Management
akeophila
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
FredBrandonAuthorMCP
 
FlexNet Operations
FlexNet OperationsFlexNet Operations
FlexNet Operations
Flexera
 
Current challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsCurrent challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutions
Dominic Haigh
 
Software License Optimization Managed Services
Software License Optimization Managed ServicesSoftware License Optimization Managed Services
Software License Optimization Managed Services
Flexera
 
Ekran system functions v. 5.0
Ekran system functions v. 5.0Ekran system functions v. 5.0
Ekran system functions v. 5.0
Ekran System Polska
 
Introduction to Software Potential
Introduction to Software PotentialIntroduction to Software Potential
Introduction to Software Potential
SoftwarePotential
 
Introduction to Software Potential
Introduction to Software PotentialIntroduction to Software Potential
Introduction to Software Potential
InishTech
 
The Key to IT Efficiency: Active Directory Management Software Explained
The Key to IT Efficiency: Active Directory Management Software ExplainedThe Key to IT Efficiency: Active Directory Management Software Explained
The Key to IT Efficiency: Active Directory Management Software Explained
ronadams067
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License Optimization
Flexera
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
Peter Daalmans
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
Flexera
 
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, NokiaDeployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
mfrancis
 
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CloudIDSummit
 
Automation Cloud Series - Mastering the Automation Cloud Admin experience_Ses...
Automation Cloud Series - Mastering the Automation Cloud Admin experience_Ses...Automation Cloud Series - Mastering the Automation Cloud Admin experience_Ses...
Automation Cloud Series - Mastering the Automation Cloud Admin experience_Ses...
Rohit Radhakrishnan
 
FlexNet Operations On-Demand Setup
FlexNet Operations On-Demand SetupFlexNet Operations On-Demand Setup
FlexNet Operations On-Demand Setup
Flexera
 

Similar to 20150528_ficha SECURIS (20)

License Management Overview
License Management OverviewLicense Management Overview
License Management Overview
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
License Management
License ManagementLicense Management
License Management
 
FlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexNet Manager Suite Cloud
FlexNet Manager Suite Cloud
 
Viewfinity Privilege Management
Viewfinity Privilege ManagementViewfinity Privilege Management
Viewfinity Privilege Management
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
 
FlexNet Operations
FlexNet OperationsFlexNet Operations
FlexNet Operations
 
Current challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutionsCurrent challenges in Software License Management - and solutions
Current challenges in Software License Management - and solutions
 
Software License Optimization Managed Services
Software License Optimization Managed ServicesSoftware License Optimization Managed Services
Software License Optimization Managed Services
 
Ekran system functions v. 5.0
Ekran system functions v. 5.0Ekran system functions v. 5.0
Ekran system functions v. 5.0
 
Introduction to Software Potential
Introduction to Software PotentialIntroduction to Software Potential
Introduction to Software Potential
 
Introduction to Software Potential
Introduction to Software PotentialIntroduction to Software Potential
Introduction to Software Potential
 
The Key to IT Efficiency: Active Directory Management Software Explained
The Key to IT Efficiency: Active Directory Management Software ExplainedThe Key to IT Efficiency: Active Directory Management Software Explained
The Key to IT Efficiency: Active Directory Management Software Explained
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License Optimization
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
 
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, NokiaDeployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
 
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
 
Automation Cloud Series - Mastering the Automation Cloud Admin experience_Ses...
Automation Cloud Series - Mastering the Automation Cloud Admin experience_Ses...Automation Cloud Series - Mastering the Automation Cloud Admin experience_Ses...
Automation Cloud Series - Mastering the Automation Cloud Admin experience_Ses...
 
FlexNet Operations On-Demand Setup
FlexNet Operations On-Demand SetupFlexNet Operations On-Demand Setup
FlexNet Operations On-Demand Setup
 

20150528_ficha SECURIS

  • 1. A licensing system for your own products. software as an asset SECuris allows you to easily distribute your applications, protecting them from unauthorized access and providing a tool to update the license when required without disturbing customers. SECuris can create licenses for a limited number of users, installations, modes, and lengths of time, among others. It is fully customizable to limit the use of your applications and also allows for hardware bundling.
  • 2. All trademarks and registered trademarks are the property of their respective owners Features • Intuitive UI • Elastic licensing model, customized license constraints • Useful for different kinds of applications (desktop, web, mobile, etc.) • Pack management · The Pack is the entity purchased by the customer · A Pack can contain one or more licenses · Allow license pre-activation · License metadata definition by packs • License manager · Signed License creation based on product, organization and metadata · Automatic License synchronization capabilities · License validation · License cancelation · License renewal • Organization management • User management based on roles, including access for third-party organizations System requirements • 1GB of RAM • Single-core processor or higher • Java™ 8 Virtual Machine • MySQL™ 5.5+ Technology • Web application based on JEE5™, Bootstrap™ and AngularJS™ • REST Services layer with API for third-party application integration • Server technology: JAX-RS (RESTEasy), JPA (Hibernate), CDI (Weld) • Multi-platform server software as an asset