SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Xcitex Inc. Deploys
                                                                                 SafeNet Sentinel HASP
                                                                                 Case study




From Lab to Field Sentinel HASP Gives Mobility to Motion Capture & Analysis Technology


Background
A leader in motion capture technology, Xcitex, Inc. needed secure          Challenge
protection for their Emmy Award-winning motion-analysis software.          •	 Ensure license compliance by protecting their high-value software
For the past six years, HASP has been securing Xcitex’s intellectual          from piracy and unauthorized use
property and enabling Xcitex to engage in vigorous try-before-buy          •	 Maintain competitive market position by protecting their valuable
sales and marketing strategies.                                               intellectual property and trade secrets from reverse-engineering
                                                                           •	 Implement new business models and easily update software
the Business Challenge                                                        licenses in the field
Xcitex produces some of the world’s foremost motion capture and
analysis software. Xcitex products are used by research facilities,
sports and biomechanics engineers, military test ranges and                solution
automotive crash facilities worldwide. In 2006, Xcitex engineers won       •	 SafeNet Sentinel HASP
an Emmy Award for Outstanding Innovative Technical Achievement
for their work with CBS Sports to analyze specific aspects of golf
tournaments: ball speed, club speed, ball spin rate, launch angle and      Rewards
other parameters, which were then overlaid onto CBS’s video signal.        •	 Increased sales: Protection against illegal use translates into
More recently, the LEGS charitable organization selected Xcitex’s             increased sales through legal useage.
software for research on sophisticated prosthetic limbs. Sought            •	 IP Protection: Sentinel HASP prevents reverse-engineering of code
by motion research institutions around the globe for its innovative           and offers robust anti-debugging and code obfuscation technology.
approach to motion analysis, Xcitex needed to protect its software         •	 Multiple licensing options: Enables multiple licensing options,
from piracy, theft or improper licensing, while still allowing customers      allowing software vendors to hone their sales models to meet
to move the software from the laboratory to the field.                        market-specific demands.




Xcitex Case Study                                                                                                                            1
the Journey                                                                               “Sentinel HASP hardware keys are an effective
After carefully evaluating the leading software rights management
                                                                                          mode of providing security without locking
products, Xcitex chose Sentinel HASP for its excellent reputation
and exhaustive list of flexible product features. “Sentinel HASP is a
                                                                                          applications to specific computers. Our business
complete solution that was easy to implement,” said Peter Carellas,                       model integrates many of the advantages of the
president of Xcitex. “The Sentinel HASP brand had a good reputation                       HASP key – time verification, string checking
in the industry and we were able to study technical papers that
                                                                                          and runtime counting –into our marketing and
explained the company’s security testing protocols, which assured
us of the quality of product we were buying.”                                             sales plans. And because we can strategically
                                                                                          expire access to our applications, it has even
the solution                                                                              minimized our need for credit verification during
Xcitex integrated Sentinel HASP into their motion analysis software                       the purchase cycle.”
and has secured thousands of software packages with Sentinel HASP
                                                                                          -Peter Carellas, President of Xcitex, Inc.
hardware keys, which secure Xcitex’s valuable software without
locking it to a specific computer. This allows Xcitex’s customers
                                                                                          about Xcitex, Inc.
flexibility of use on multiple computers, in the laboratory and in the
                                                                                          Xcitex is an innovator in the industries of video-based motion capture
field. It has lived up to Carellas’s highest expectations.
                                                                                          and motion analysis. Its engineers introduced the first synchronized
“The key ingredient for any security system is trust that the                             high-speed video/data systems in 1998. Xcitex followed with new
system is tested and bulletproof,” he said. “Certainly, we had initial                    technologies for controlling high-speed cameras in a motion capture
questions about the resistance of the Sentinel HASP key to hacking,                       environment and revolutionary motion analysis software products.
but these concerns dissipated over time as we gained both mass
                                                                                          Today, Xcitex provides its industrial consumers an array of technically
endorsements from our customers and the endorsements of their
                                                                                          superior, affordable and easyto-use products. For more information,
respective IT departments.”
                                                                                          visit: www.Xcitex.com.

                                                                                          about safeNet
                                                                                          Founded in 1983, SafeNet is a global leader in information security.
the Rewards
                                                                                          SafeNet protects its customers’ most valuable assets, including
Sentinel HASP has allowed Xcitex to branch out with their software
                                                                                          identities, transactions, communications, data and software
in ways that would not be possible without the rock-solid protection
                                                                                          licensing, throughout the data lifecycle. More than 25,000 customers
that Sentinel HASP ensures. By far the greatest benefit to Xcitex is
                                                                                          across both commercial enterprises and government agencies and in
the flexibility of software deployment with complete assurance that
                                                                                          over 100 countries trust their information security needs to SafeNet.
their software is secure. “It allows us to execute licensing we just
wouldn’t be able to accomplish without such a robust solution,” said
Carellas. “We wouldn’t be able to totally execute plans for software
distribution. It gives us portable security, which is important to our
customers.”

The Sentinel HASP hardware key’s onboard memory, time verification,
string checking and runtime counting enable Xcitex to create feature-
rich pre-sales packages of their motion-analysis software for highend
consumers to try before purchasing.

“High-end users want to see and touch software before they
purchase it, not just buy it from a spec sheet,” Carellas explained.
“Sentinel HASP allows us to put copies of our software in our dealers’
and potential customers’ hands for demonstrations and trials.

We would not feel comfortable sending out our software without
the key’s time limit feature. And because we can strategically expire
access to our applications, it has even minimized our need for credit
verification during the purchase cycle.”

“The Sentinel HASP security has been reliable and robust, and we’re
very pleased,” Carellas said.


                                         Contact us: For all office locations and contact information, please visit www.safenet-inc.com
                                         Follow us: www.safenet-inc.com/connected
                                         ©2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
                                         All other product names are trademarks of their respective owners. CS (EN)-12.26.10

Xcitex Case Study                                                                                                                                             2

Mais conteúdo relacionado

Destaque

Trabajo
TrabajoTrabajo
Trabajoker0yu
 
Ciber genética blog tríptico
Ciber genética blog trípticoCiber genética blog tríptico
Ciber genética blog trípticoCiberGeneticaUNAM
 
New microsoft word document
New microsoft word documentNew microsoft word document
New microsoft word documentfirst contract
 
Calidad de Agua Municipio de tepic, estado de Nayarit, Julio 2013 INFOPLACITUM
Calidad de Agua Municipio de tepic, estado de Nayarit, Julio 2013   INFOPLACITUMCalidad de Agua Municipio de tepic, estado de Nayarit, Julio 2013   INFOPLACITUM
Calidad de Agua Municipio de tepic, estado de Nayarit, Julio 2013 INFOPLACITUMricguer
 
16 feladatok
16 feladatok16 feladatok
16 feladatokSeri18
 
La Gerencia Industrial
La Gerencia IndustrialLa Gerencia Industrial
La Gerencia Industrialyolethbritor
 
VET 4e-i english
VET 4e-i englishVET 4e-i english
VET 4e-i englishisidreb
 
Calidad de Agua de Cancún, Municipio Benito Juárez, Quintana Roo. Mayo 2014 ...
Calidad de Agua de Cancún, Municipio Benito Juárez, Quintana Roo. Mayo 2014  ...Calidad de Agua de Cancún, Municipio Benito Juárez, Quintana Roo. Mayo 2014  ...
Calidad de Agua de Cancún, Municipio Benito Juárez, Quintana Roo. Mayo 2014 ...ricguer
 

Destaque (16)

Helio rubens
Helio rubensHelio rubens
Helio rubens
 
Presentation2
Presentation2Presentation2
Presentation2
 
Mi autobiografía
Mi autobiografíaMi autobiografía
Mi autobiografía
 
Trabajo
TrabajoTrabajo
Trabajo
 
文書2
文書2文書2
文書2
 
Ciber genética blog tríptico
Ciber genética blog trípticoCiber genética blog tríptico
Ciber genética blog tríptico
 
Presentación1
Presentación1Presentación1
Presentación1
 
New microsoft word document
New microsoft word documentNew microsoft word document
New microsoft word document
 
Calidad de Agua Municipio de tepic, estado de Nayarit, Julio 2013 INFOPLACITUM
Calidad de Agua Municipio de tepic, estado de Nayarit, Julio 2013   INFOPLACITUMCalidad de Agua Municipio de tepic, estado de Nayarit, Julio 2013   INFOPLACITUM
Calidad de Agua Municipio de tepic, estado de Nayarit, Julio 2013 INFOPLACITUM
 
16 feladatok
16 feladatok16 feladatok
16 feladatok
 
Presentation1
Presentation1Presentation1
Presentation1
 
Voltamos ao lugar
Voltamos ao lugarVoltamos ao lugar
Voltamos ao lugar
 
H99 ob3
H99 ob3H99 ob3
H99 ob3
 
La Gerencia Industrial
La Gerencia IndustrialLa Gerencia Industrial
La Gerencia Industrial
 
VET 4e-i english
VET 4e-i englishVET 4e-i english
VET 4e-i english
 
Calidad de Agua de Cancún, Municipio Benito Juárez, Quintana Roo. Mayo 2014 ...
Calidad de Agua de Cancún, Municipio Benito Juárez, Quintana Roo. Mayo 2014  ...Calidad de Agua de Cancún, Municipio Benito Juárez, Quintana Roo. Mayo 2014  ...
Calidad de Agua de Cancún, Municipio Benito Juárez, Quintana Roo. Mayo 2014 ...
 

Mais de LicensingLive! - SafeNet

Turning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing ViewTurning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing ViewLicensingLive! - SafeNet
 
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...LicensingLive! - SafeNet
 
Integrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud EnvironmentIntegrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud EnvironmentLicensingLive! - SafeNet
 
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingThe Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingLicensingLive! - SafeNet
 
Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing LicensingLive! - SafeNet
 
Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service  Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service LicensingLive! - SafeNet
 

Mais de LicensingLive! - SafeNet (20)

VSTEP Case Study
VSTEP Case StudyVSTEP Case Study
VSTEP Case Study
 
Cloud Monetization: A Step by Step Guide
Cloud Monetization: A Step by Step GuideCloud Monetization: A Step by Step Guide
Cloud Monetization: A Step by Step Guide
 
Turning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing ViewTurning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing View
 
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
 
Integrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud EnvironmentIntegrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud Environment
 
Cloud Adoption - A Practical Approach
Cloud Adoption - A Practical ApproachCloud Adoption - A Practical Approach
Cloud Adoption - A Practical Approach
 
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingThe Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based Licensing
 
VSM Case Study
VSM Case StudyVSM Case Study
VSM Case Study
 
Geocap Case Study
Geocap Case StudyGeocap Case Study
Geocap Case Study
 
EMS Case Study
EMS Case StudyEMS Case Study
EMS Case Study
 
Inea cs en__v4_web
Inea cs en__v4_webInea cs en__v4_web
Inea cs en__v4_web
 
Key Traffic Systems
Key Traffic SystemsKey Traffic Systems
Key Traffic Systems
 
DipTech
DipTechDipTech
DipTech
 
Iritech Inc.
Iritech Inc.Iritech Inc.
Iritech Inc.
 
CPC
CPCCPC
CPC
 
RiserTec
RiserTecRiserTec
RiserTec
 
Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing
 
Sentinel HASP Envelope
Sentinel HASP EnvelopeSentinel HASP Envelope
Sentinel HASP Envelope
 
Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service  Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service
 
SaaS Pricing and Packaging Strategies
SaaS Pricing and Packaging Strategies SaaS Pricing and Packaging Strategies
SaaS Pricing and Packaging Strategies
 

Último

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 

Último (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 

Xcitex Inc.

  • 1. Xcitex Inc. Deploys SafeNet Sentinel HASP Case study From Lab to Field Sentinel HASP Gives Mobility to Motion Capture & Analysis Technology Background A leader in motion capture technology, Xcitex, Inc. needed secure Challenge protection for their Emmy Award-winning motion-analysis software. • Ensure license compliance by protecting their high-value software For the past six years, HASP has been securing Xcitex’s intellectual from piracy and unauthorized use property and enabling Xcitex to engage in vigorous try-before-buy • Maintain competitive market position by protecting their valuable sales and marketing strategies. intellectual property and trade secrets from reverse-engineering • Implement new business models and easily update software the Business Challenge licenses in the field Xcitex produces some of the world’s foremost motion capture and analysis software. Xcitex products are used by research facilities, sports and biomechanics engineers, military test ranges and solution automotive crash facilities worldwide. In 2006, Xcitex engineers won • SafeNet Sentinel HASP an Emmy Award for Outstanding Innovative Technical Achievement for their work with CBS Sports to analyze specific aspects of golf tournaments: ball speed, club speed, ball spin rate, launch angle and Rewards other parameters, which were then overlaid onto CBS’s video signal. • Increased sales: Protection against illegal use translates into More recently, the LEGS charitable organization selected Xcitex’s increased sales through legal useage. software for research on sophisticated prosthetic limbs. Sought • IP Protection: Sentinel HASP prevents reverse-engineering of code by motion research institutions around the globe for its innovative and offers robust anti-debugging and code obfuscation technology. approach to motion analysis, Xcitex needed to protect its software • Multiple licensing options: Enables multiple licensing options, from piracy, theft or improper licensing, while still allowing customers allowing software vendors to hone their sales models to meet to move the software from the laboratory to the field. market-specific demands. Xcitex Case Study 1
  • 2. the Journey “Sentinel HASP hardware keys are an effective After carefully evaluating the leading software rights management mode of providing security without locking products, Xcitex chose Sentinel HASP for its excellent reputation and exhaustive list of flexible product features. “Sentinel HASP is a applications to specific computers. Our business complete solution that was easy to implement,” said Peter Carellas, model integrates many of the advantages of the president of Xcitex. “The Sentinel HASP brand had a good reputation HASP key – time verification, string checking in the industry and we were able to study technical papers that and runtime counting –into our marketing and explained the company’s security testing protocols, which assured us of the quality of product we were buying.” sales plans. And because we can strategically expire access to our applications, it has even the solution minimized our need for credit verification during Xcitex integrated Sentinel HASP into their motion analysis software the purchase cycle.” and has secured thousands of software packages with Sentinel HASP -Peter Carellas, President of Xcitex, Inc. hardware keys, which secure Xcitex’s valuable software without locking it to a specific computer. This allows Xcitex’s customers about Xcitex, Inc. flexibility of use on multiple computers, in the laboratory and in the Xcitex is an innovator in the industries of video-based motion capture field. It has lived up to Carellas’s highest expectations. and motion analysis. Its engineers introduced the first synchronized “The key ingredient for any security system is trust that the high-speed video/data systems in 1998. Xcitex followed with new system is tested and bulletproof,” he said. “Certainly, we had initial technologies for controlling high-speed cameras in a motion capture questions about the resistance of the Sentinel HASP key to hacking, environment and revolutionary motion analysis software products. but these concerns dissipated over time as we gained both mass Today, Xcitex provides its industrial consumers an array of technically endorsements from our customers and the endorsements of their superior, affordable and easyto-use products. For more information, respective IT departments.” visit: www.Xcitex.com. about safeNet Founded in 1983, SafeNet is a global leader in information security. the Rewards SafeNet protects its customers’ most valuable assets, including Sentinel HASP has allowed Xcitex to branch out with their software identities, transactions, communications, data and software in ways that would not be possible without the rock-solid protection licensing, throughout the data lifecycle. More than 25,000 customers that Sentinel HASP ensures. By far the greatest benefit to Xcitex is across both commercial enterprises and government agencies and in the flexibility of software deployment with complete assurance that over 100 countries trust their information security needs to SafeNet. their software is secure. “It allows us to execute licensing we just wouldn’t be able to accomplish without such a robust solution,” said Carellas. “We wouldn’t be able to totally execute plans for software distribution. It gives us portable security, which is important to our customers.” The Sentinel HASP hardware key’s onboard memory, time verification, string checking and runtime counting enable Xcitex to create feature- rich pre-sales packages of their motion-analysis software for highend consumers to try before purchasing. “High-end users want to see and touch software before they purchase it, not just buy it from a spec sheet,” Carellas explained. “Sentinel HASP allows us to put copies of our software in our dealers’ and potential customers’ hands for demonstrations and trials. We would not feel comfortable sending out our software without the key’s time limit feature. And because we can strategically expire access to our applications, it has even minimized our need for credit verification during the purchase cycle.” “The Sentinel HASP security has been reliable and robust, and we’re very pleased,” Carellas said. Contact us: For all office locations and contact information, please visit www.safenet-inc.com Follow us: www.safenet-inc.com/connected ©2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names are trademarks of their respective owners. CS (EN)-12.26.10 Xcitex Case Study 2