SlideShare a Scribd company logo
CPC Protects with SafeNet Sentinel HASP
                                                                        Case study




           Duis eget nulla ut nisl rhoncus blandit non fermentum.
          Vivamus ut tempor nisi. Maecenas lacinia leo quis neque.




CPC, Leader in Captioning Technology Continues to Rely on Sentinel HASP to Protect & License their Software for
the Hearing Impaired


Background
Computer Prompting and Captioning Co. (CPC) is the industry leader        Challenge
in captioning, subtitling and teleprompting. CPC was founded in           •	 Ensure license compliance by protecting their high-value
1986 to address a need for visual text in video production, allowing         software from unauthorized use
the hearing impaired to see dialogue. As CPC embraced emerging
technologies such as webcasts, Vchip software and DVDs, they
have come to rely on Sentinel HASP’s timely updates to keep their         solution
captioning software secure.                                               •	 SafeNet Sentinel HASP


the Business Challenge
CPC needed an unobtrusive, secure solution to protect their high          Rewards
value ($2-$9K) captioning software from being pirated, stolen or          •	 Increased sales: Protection against illegal use translates into
reverse engineered whenever the equipment left their facilities.             increased sales through legal usage.
                                                                          •	 Remote updates: Sentinel HASP makes it easy to update software
Dr. Dilip K. Som, CPC’s President and CTO, explained that service
                                                                             license terms on keys in the field.
companies who use CPC’s software frequently grow, requiring more
                                                                          •	 IP Protection: Sentinel HASP prevents reverse-engineering of code
technicians and additional equipment. As is the case with high-value
                                                                             and offers robust anti-debugging and code obfuscation technology.
software, rather than purchase additional licenses, users are tempted
to violate the license agreement by running a single software copy
on multiple machines. “Without powerful, reliable software security,
our customers could run the same software on 20 different machines




CPC Case Study                                                                                                                             1
which violates the license terms and results in thousands of dollars                       “Without powerful, reliable software security, our
in lost revenue for CPC,” said Som. “I cannot even imagine letting our
                                                                                           customers could run the same software on 20
product go unprotected.”
                                                                                           different machines which violates the license
the Journey                                                                                terms and results in thousands of dollars in lost
More than a decade ago, CPC was using a different software protection
                                                                                           revenue for CPC. I cannot even imagine letting our
key, but found the key to be overly large and awkward for technicians
who needed to use CPC’s innovative captioning software. After an                           product go unprotected.”
extensive search for a new solution, Som’s team selected Sentinel                          - dr. dilip K. som, President and CtO
HASP for its ease of use and history of superior reliability. It featured                  Computer Prompting and Captioning Company (CPC)
the strong protection required and did not interfere with software use.
                                                                                           about Computer Prompting and Captioning Co. (CPC)
                                                                                           CPC is the award-winning creator of Windows and Macintosh closed
the solution                                                                               captioning software. Since CPC released the first simultaneous
Sentinel HASP allows CPC to license their software to one machine                          closed captioning/ teleprompting software in 1986, it has been the
at a time connected to the Sentinel HASP key, preventing large                             industry leader. CPC also operates an award-winning captioning
clients from sharing software among equipment for increased                                service, and develops subtitling and teleprompting software. For
productivity without due licensing. Sentinel HASP protects CPC’s                           more information, visit www.cpcweb.com.
revenue and intellectual property. CPC was able to grow in its reach
and development of new technologies because of Sentinel HASP’s                             about safeNet
flexible configurations and constant upgrades. Using Sentinel HASP,                        Founded in 1983, SafeNet is a global leader in information security.
CPC offers video production companies the latest technology outlets                        SafeNet protects its customers’ most valuable assets, including
for its innovative software without the risk of being unprotected.                         identities, transactions, communications, data and software
“Taking that risk is out of the question,” said Som.                                       licensing, throughout the data lifecycle. More than 25,000 customers
                                                                                           across both commercial enterprises and government agencies and in
                                                                                           over 100 countries trust their information security needs to SafeNet.

the Rewards
Using Sentinel HASP, Som gained peace of mind, knowing that his
company’s core software products are protected from unauthorized
use, safeguarding revenue. Som’s approach to security remains firm,
benefiting from SafeNet’s ongoing commitment to updating Sentinel
HASP protection and support to allow for new technologies and
customer needs.

“With every Windows upgrade, we quickly received the updated
Sentinel HASP drivers and were able to take care of our customers
promptly and efficiently,” Som said. “And upgrading the Sentinel
HASP keys to be used for higher versions of software has been very
easy. Simple and accomplished via email, we’ve eliminated the wait
for updates through the mail and saved on shipping. When we needed
information, Sentinel HASP specialists were definitely available
and able to answer our questions.” CPC was able to update their
software to fit new operating systems, including Mac and the new
Windows systems, without worrying about compromising protection
or causing delays for their clients. In a fast-moving industry, time
spent upgrading software protection is a major concern. Holdups due
to protection upgrades can be annoying and even affect the bottom
line. CPC found upgrading Sentinel HASP keys to be quick, easy, user-
friendly and cost-free.




                                         Contact us: For all office locations and contact information, please visit www.safenet-inc.com
                                         Follow us: www.safenet-inc.com/connected
                                         ©2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
                                         All other product names are trademarks of their respective owners. CS (EN)-12.26.10

CPC Case Study                                                                                                                                               2

More Related Content

What's hot

Business Service Management Made Easy!
Business Service Management Made Easy!Business Service Management Made Easy!
Business Service Management Made Easy!
Michele Hudnall
 
360is Capabilities
360is Capabilities360is Capabilities
360is Capabilities
nickhutton
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
santosomar
 
Content Security Brochure
Content Security BrochureContent Security Brochure
Content Security Brochure
ldyson23
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
Motty Ben Atia
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
Ixia
 
Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the Market
Juniper Networks
 
Over 20 years of embedded software development a third way emerges
Over 20 years of embedded software development   a third way emergesOver 20 years of embedded software development   a third way emerges
Over 20 years of embedded software development a third way emerges
Design And Reuse
 
Iritech Inc.
Iritech Inc.Iritech Inc.
Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview Netversant
JayCase
 

What's hot (10)

Business Service Management Made Easy!
Business Service Management Made Easy!Business Service Management Made Easy!
Business Service Management Made Easy!
 
360is Capabilities
360is Capabilities360is Capabilities
360is Capabilities
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
 
Content Security Brochure
Content Security BrochureContent Security Brochure
Content Security Brochure
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the Market
 
Over 20 years of embedded software development a third way emerges
Over 20 years of embedded software development   a third way emergesOver 20 years of embedded software development   a third way emerges
Over 20 years of embedded software development a third way emerges
 
Iritech Inc.
Iritech Inc.Iritech Inc.
Iritech Inc.
 
Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview Netversant
 

Viewers also liked

Pme lecture 2012presentationslidespart1
Pme lecture 2012presentationslidespart1Pme lecture 2012presentationslidespart1
Pme lecture 2012presentationslidespart1
University of Miami
 
Medical Error Reduction
Medical Error ReductionMedical Error Reduction
Medical Error Reduction
Leela Baby
 
Powers Sentinel Event
Powers   Sentinel EventPowers   Sentinel Event
Powers Sentinel Event
Lori Powers
 
Sentinel Event
Sentinel EventSentinel Event
Sentinel Event
rn_tamer
 
Root cause analysis
Root cause analysisRoot cause analysis
Root cause analysis
Mohamed Mosaad Hasan
 
Occurrence variance report
Occurrence variance reportOccurrence variance report
Occurrence variance report
aparnabidu
 
Root cause analysis common problems and solutions
Root cause analysis common problems and solutions Root cause analysis common problems and solutions
Root cause analysis common problems and solutions
ASQ Reliability Division
 
Sentinel Events & OVR (lecture)
Sentinel Events & OVR (lecture)Sentinel Events & OVR (lecture)
Sentinel Events & OVR (lecture)
Dr. Aqeel Ahmed Khan
 
Sentinel event
Sentinel eventSentinel event
Sentinel event
Dr.Kirti Choukikar
 
Quality Health Occurence-Variance Report-Part 1.ppt
Quality Health Occurence-Variance Report-Part 1.pptQuality Health Occurence-Variance Report-Part 1.ppt
Quality Health Occurence-Variance Report-Part 1.ppt
Gamal ElDin Soliman
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
Mandy Suzanne
 

Viewers also liked (11)

Pme lecture 2012presentationslidespart1
Pme lecture 2012presentationslidespart1Pme lecture 2012presentationslidespart1
Pme lecture 2012presentationslidespart1
 
Medical Error Reduction
Medical Error ReductionMedical Error Reduction
Medical Error Reduction
 
Powers Sentinel Event
Powers   Sentinel EventPowers   Sentinel Event
Powers Sentinel Event
 
Sentinel Event
Sentinel EventSentinel Event
Sentinel Event
 
Root cause analysis
Root cause analysisRoot cause analysis
Root cause analysis
 
Occurrence variance report
Occurrence variance reportOccurrence variance report
Occurrence variance report
 
Root cause analysis common problems and solutions
Root cause analysis common problems and solutions Root cause analysis common problems and solutions
Root cause analysis common problems and solutions
 
Sentinel Events & OVR (lecture)
Sentinel Events & OVR (lecture)Sentinel Events & OVR (lecture)
Sentinel Events & OVR (lecture)
 
Sentinel event
Sentinel eventSentinel event
Sentinel event
 
Quality Health Occurence-Variance Report-Part 1.ppt
Quality Health Occurence-Variance Report-Part 1.pptQuality Health Occurence-Variance Report-Part 1.ppt
Quality Health Occurence-Variance Report-Part 1.ppt
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to CPC

DipTech
DipTechDipTech
Knorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case StudyKnorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case Study
SafeNet
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
Studying
 
VSM Case Study
VSM Case StudyVSM Case Study
VSM Case Study
LicensingLive! - SafeNet
 
Voicecon094distrfinal 090427125221 Phpapp01
Voicecon094distrfinal 090427125221 Phpapp01Voicecon094distrfinal 090427125221 Phpapp01
Voicecon094distrfinal 090427125221 Phpapp01
Paolo Mundo
 
Forging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesForging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for Enterprises
Panoptica
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
Jose Luis Garcia Rodriguez
 
Redington Value Journal - August 2016
Redington Value Journal - August 2016Redington Value Journal - August 2016
Redington Value Journal - August 2016
Redington Value Distribution
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
cynapspro GmbH
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
GE코리아
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
Giuseppe Paterno'
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
Ambuj Sharma
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
Forcepoint LLC
 
Redington Value Journal - March 2017
Redington Value Journal - March 2017Redington Value Journal - March 2017
Redington Value Journal - March 2017
Redington Value Distribution
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
Redington Value Distribution
 
COMOS Plant Manager
COMOS Plant ManagerCOMOS Plant Manager
COMOS Plant Manager
Matthew McKinley
 
RiserTec
RiserTecRiserTec
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
GARL
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
Richard (Dick) Kaufman
 
Wibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionWibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotection
Himanshu Arora
 

Similar to CPC (20)

DipTech
DipTechDipTech
DipTech
 
Knorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case StudyKnorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case Study
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
 
VSM Case Study
VSM Case StudyVSM Case Study
VSM Case Study
 
Voicecon094distrfinal 090427125221 Phpapp01
Voicecon094distrfinal 090427125221 Phpapp01Voicecon094distrfinal 090427125221 Phpapp01
Voicecon094distrfinal 090427125221 Phpapp01
 
Forging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesForging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for Enterprises
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
 
Redington Value Journal - August 2016
Redington Value Journal - August 2016Redington Value Journal - August 2016
Redington Value Journal - August 2016
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Redington Value Journal - March 2017
Redington Value Journal - March 2017Redington Value Journal - March 2017
Redington Value Journal - March 2017
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
COMOS Plant Manager
COMOS Plant ManagerCOMOS Plant Manager
COMOS Plant Manager
 
RiserTec
RiserTecRiserTec
RiserTec
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
 
Wibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionWibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotection
 

More from LicensingLive! - SafeNet

Cloud Monetization: A Step by Step Guide
Cloud Monetization: A Step by Step GuideCloud Monetization: A Step by Step Guide
Cloud Monetization: A Step by Step Guide
LicensingLive! - SafeNet
 
Turning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing ViewTurning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing View
LicensingLive! - SafeNet
 
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
LicensingLive! - SafeNet
 
Integrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud EnvironmentIntegrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud Environment
LicensingLive! - SafeNet
 
Cloud Adoption - A Practical Approach
Cloud Adoption - A Practical ApproachCloud Adoption - A Practical Approach
Cloud Adoption - A Practical Approach
LicensingLive! - SafeNet
 
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingThe Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based Licensing
LicensingLive! - SafeNet
 
EMS Case Study
EMS Case StudyEMS Case Study
EMS Case Study
LicensingLive! - SafeNet
 
Inea cs en__v4_web
Inea cs en__v4_webInea cs en__v4_web
Inea cs en__v4_web
LicensingLive! - SafeNet
 
Key Traffic Systems
Key Traffic SystemsKey Traffic Systems
Key Traffic Systems
LicensingLive! - SafeNet
 
Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing
LicensingLive! - SafeNet
 
Sentinel HASP Envelope
Sentinel HASP EnvelopeSentinel HASP Envelope
Sentinel HASP Envelope
LicensingLive! - SafeNet
 
Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service  Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service
LicensingLive! - SafeNet
 
SaaS Pricing and Packaging Strategies
SaaS Pricing and Packaging Strategies SaaS Pricing and Packaging Strategies
SaaS Pricing and Packaging Strategies
LicensingLive! - SafeNet
 
Cloudy with a Chance of Insight
Cloudy with a Chance of InsightCloudy with a Chance of Insight
Cloudy with a Chance of Insight
LicensingLive! - SafeNet
 
Addressing New Challenges in Software Protection for .NET
Addressing New Challenges in Software Protection for .NETAddressing New Challenges in Software Protection for .NET
Addressing New Challenges in Software Protection for .NET
LicensingLive! - SafeNet
 
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
LicensingLive! - SafeNet
 
Dani Shomron, iSC - On Dinosaurs and Men
Dani Shomron, iSC - On Dinosaurs and MenDani Shomron, iSC - On Dinosaurs and Men
Dani Shomron, iSC - On Dinosaurs and Men
LicensingLive! - SafeNet
 
Monetizing Cloud Apps - Phil Wainewright
Monetizing Cloud Apps - Phil WainewrightMonetizing Cloud Apps - Phil Wainewright
Monetizing Cloud Apps - Phil Wainewright
LicensingLive! - SafeNet
 
Sentinel Software Monetization Solutions - Family Brochure
Sentinel Software Monetization Solutions - Family BrochureSentinel Software Monetization Solutions - Family Brochure
Sentinel Software Monetization Solutions - Family Brochure
LicensingLive! - SafeNet
 
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
LicensingLive! - SafeNet
 

More from LicensingLive! - SafeNet (20)

Cloud Monetization: A Step by Step Guide
Cloud Monetization: A Step by Step GuideCloud Monetization: A Step by Step Guide
Cloud Monetization: A Step by Step Guide
 
Turning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing ViewTurning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing View
 
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
 
Integrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud EnvironmentIntegrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud Environment
 
Cloud Adoption - A Practical Approach
Cloud Adoption - A Practical ApproachCloud Adoption - A Practical Approach
Cloud Adoption - A Practical Approach
 
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingThe Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based Licensing
 
EMS Case Study
EMS Case StudyEMS Case Study
EMS Case Study
 
Inea cs en__v4_web
Inea cs en__v4_webInea cs en__v4_web
Inea cs en__v4_web
 
Key Traffic Systems
Key Traffic SystemsKey Traffic Systems
Key Traffic Systems
 
Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing
 
Sentinel HASP Envelope
Sentinel HASP EnvelopeSentinel HASP Envelope
Sentinel HASP Envelope
 
Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service  Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service
 
SaaS Pricing and Packaging Strategies
SaaS Pricing and Packaging Strategies SaaS Pricing and Packaging Strategies
SaaS Pricing and Packaging Strategies
 
Cloudy with a Chance of Insight
Cloudy with a Chance of InsightCloudy with a Chance of Insight
Cloudy with a Chance of Insight
 
Addressing New Challenges in Software Protection for .NET
Addressing New Challenges in Software Protection for .NETAddressing New Challenges in Software Protection for .NET
Addressing New Challenges in Software Protection for .NET
 
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
 
Dani Shomron, iSC - On Dinosaurs and Men
Dani Shomron, iSC - On Dinosaurs and MenDani Shomron, iSC - On Dinosaurs and Men
Dani Shomron, iSC - On Dinosaurs and Men
 
Monetizing Cloud Apps - Phil Wainewright
Monetizing Cloud Apps - Phil WainewrightMonetizing Cloud Apps - Phil Wainewright
Monetizing Cloud Apps - Phil Wainewright
 
Sentinel Software Monetization Solutions - Family Brochure
Sentinel Software Monetization Solutions - Family BrochureSentinel Software Monetization Solutions - Family Brochure
Sentinel Software Monetization Solutions - Family Brochure
 
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
 

Recently uploaded

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

CPC

  • 1. CPC Protects with SafeNet Sentinel HASP Case study Duis eget nulla ut nisl rhoncus blandit non fermentum. Vivamus ut tempor nisi. Maecenas lacinia leo quis neque. CPC, Leader in Captioning Technology Continues to Rely on Sentinel HASP to Protect & License their Software for the Hearing Impaired Background Computer Prompting and Captioning Co. (CPC) is the industry leader Challenge in captioning, subtitling and teleprompting. CPC was founded in • Ensure license compliance by protecting their high-value 1986 to address a need for visual text in video production, allowing software from unauthorized use the hearing impaired to see dialogue. As CPC embraced emerging technologies such as webcasts, Vchip software and DVDs, they have come to rely on Sentinel HASP’s timely updates to keep their solution captioning software secure. • SafeNet Sentinel HASP the Business Challenge CPC needed an unobtrusive, secure solution to protect their high Rewards value ($2-$9K) captioning software from being pirated, stolen or • Increased sales: Protection against illegal use translates into reverse engineered whenever the equipment left their facilities. increased sales through legal usage. • Remote updates: Sentinel HASP makes it easy to update software Dr. Dilip K. Som, CPC’s President and CTO, explained that service license terms on keys in the field. companies who use CPC’s software frequently grow, requiring more • IP Protection: Sentinel HASP prevents reverse-engineering of code technicians and additional equipment. As is the case with high-value and offers robust anti-debugging and code obfuscation technology. software, rather than purchase additional licenses, users are tempted to violate the license agreement by running a single software copy on multiple machines. “Without powerful, reliable software security, our customers could run the same software on 20 different machines CPC Case Study 1
  • 2. which violates the license terms and results in thousands of dollars “Without powerful, reliable software security, our in lost revenue for CPC,” said Som. “I cannot even imagine letting our customers could run the same software on 20 product go unprotected.” different machines which violates the license the Journey terms and results in thousands of dollars in lost More than a decade ago, CPC was using a different software protection revenue for CPC. I cannot even imagine letting our key, but found the key to be overly large and awkward for technicians who needed to use CPC’s innovative captioning software. After an product go unprotected.” extensive search for a new solution, Som’s team selected Sentinel - dr. dilip K. som, President and CtO HASP for its ease of use and history of superior reliability. It featured Computer Prompting and Captioning Company (CPC) the strong protection required and did not interfere with software use. about Computer Prompting and Captioning Co. (CPC) CPC is the award-winning creator of Windows and Macintosh closed the solution captioning software. Since CPC released the first simultaneous Sentinel HASP allows CPC to license their software to one machine closed captioning/ teleprompting software in 1986, it has been the at a time connected to the Sentinel HASP key, preventing large industry leader. CPC also operates an award-winning captioning clients from sharing software among equipment for increased service, and develops subtitling and teleprompting software. For productivity without due licensing. Sentinel HASP protects CPC’s more information, visit www.cpcweb.com. revenue and intellectual property. CPC was able to grow in its reach and development of new technologies because of Sentinel HASP’s about safeNet flexible configurations and constant upgrades. Using Sentinel HASP, Founded in 1983, SafeNet is a global leader in information security. CPC offers video production companies the latest technology outlets SafeNet protects its customers’ most valuable assets, including for its innovative software without the risk of being unprotected. identities, transactions, communications, data and software “Taking that risk is out of the question,” said Som. licensing, throughout the data lifecycle. More than 25,000 customers across both commercial enterprises and government agencies and in over 100 countries trust their information security needs to SafeNet. the Rewards Using Sentinel HASP, Som gained peace of mind, knowing that his company’s core software products are protected from unauthorized use, safeguarding revenue. Som’s approach to security remains firm, benefiting from SafeNet’s ongoing commitment to updating Sentinel HASP protection and support to allow for new technologies and customer needs. “With every Windows upgrade, we quickly received the updated Sentinel HASP drivers and were able to take care of our customers promptly and efficiently,” Som said. “And upgrading the Sentinel HASP keys to be used for higher versions of software has been very easy. Simple and accomplished via email, we’ve eliminated the wait for updates through the mail and saved on shipping. When we needed information, Sentinel HASP specialists were definitely available and able to answer our questions.” CPC was able to update their software to fit new operating systems, including Mac and the new Windows systems, without worrying about compromising protection or causing delays for their clients. In a fast-moving industry, time spent upgrading software protection is a major concern. Holdups due to protection upgrades can be annoying and even affect the bottom line. CPC found upgrading Sentinel HASP keys to be quick, easy, user- friendly and cost-free. Contact us: For all office locations and contact information, please visit www.safenet-inc.com Follow us: www.safenet-inc.com/connected ©2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names are trademarks of their respective owners. CS (EN)-12.26.10 CPC Case Study 2