SlideShare uma empresa Scribd logo
1 de 21
You create – We protect
StarForce ProActive
for Business
Licensing and protection system
for enterprise software
You create – We protect
www.star-force.com 2
 More than half of the world’s computer users admit to using
software in a way that breaches the software’s license
agreement
 The majority of software developers incur revenue losses
from the use of unlicensed software that amount to at least
10% of their revenue
 Experts estimate about $63.4 billion of annual revenue is
lost to the software industry
Source: Is Unlicensed Software Hurting Your Bottom Line? (KPMG Survey, 2015)
Are you prepared for violations of
your software license agreement?
You create – We protect
www.star-force.com 3
StarForce ProActive for Business
Advanced solution for reliable software protection
License Agreement Compliance
Protection against illegal
copying, sharing
and installation
Protection against analysis
and reverse engineering,
prevention of unauthorized
software modification
Use control in real time
You create – We protect
www.star-force.com
How it works
4
Protection
When an application is
being protected, its code
gets a number of
modifications that
protect it against
analysis and reverse
engineering and other
illegal actions from users
Activation
To activate the
protected application, a
serial number is
required. This number
also defines the
applicable license
terms. Activation
includes binding of a
serial number to the
hardware parameters
to provide a better
level of protection
Use Control
Via the personal area,
usage statistics can be
accessed at anytime
and changes can be
made in the conditions
of the license (editing
the serial number)
You create – We protect
www.star-force.com
Protection Features
 Protection of code inside the function / protection of the imported function call
 Extra protection of internal variables with hidden classes
 Activation of the application modes depending on serial number parameters
 Data files protection
 Beta version and promotional copy protection
 Patch and add-on protection
 StarForce SDK included
 Selection of binding objects: a computer, a local server and/or a remote server
5
You create – We protect
www.star-force.com 6
Binding Objects
A local server
A computer
(a server or
a workstation)
A remote server
The easiest way of
binding, ideally suits
applications
that are run on
physical computers
(not virtual machines)
Suitable for software
installation
on many computers
within one local network
(one company).
Supports running on
virtual machines
Enables full control
of the protected
application in real time.
You have an opportunity
to prolong, revoke, add
new users at any moment.
It also supports running
on virtual machines
You create – We protect
www.star-force.com
Recommendations for selecting binding
objects
Binding
Objects
Application
configuration
Computer Local Server Remote Server
Stand-alone
application
Ideal for applications
running on physical
machines
Suitable for applications
running on virtual
machines without
Internet connection
Provides full control.
Suitable for applications
running on virtual
machines
“Fat client-server”
application – client
protection
For a few computers
Ideal for many
computers in one
network
For remote workstations
with a replace
“Thin client-server”
application – server
protection
Ideal for applications
running on physical
machines
For corporate use
Provides full control.
Suitable for applications
running on virtual
machines
7
You create – We protect
www.star-force.com
“Fat client-server” application
binds to Local Server
8
Client of the
protected
application
StarForce
License
Service
Company’s Network
Protected
application’s
Server
Client of the
protected
application
Client of the
protected
application
Client of the
protected
application
You create – We protect
www.star-force.com
“Thin client-server” application or a Cloud
Service binds to Remote Server
9
StarForce
License
Service
Protected
Application
Internet
In “thin client server” or Cloud Service configuration only the server part is protected, but the software
developer usually specifies the number of users in license terms. Binding to a remote server allows you to
monitor the license terms and make quick changes
You create – We protect
www.star-force.com
Total control in real time
StarForce ProActive for Business allows you to control access to protected
software, change license settings and collect usage statistics immediately with a
few clicks
10
You create – We protect
www.star-force.com
International use and customization
 More than 16 GUI languages are supported
 Dialog boxes can be customized
 Custom user interface can be developed
11
You create – We protect
www.star-force.com
Licensing Models
12
Trial
Buy Only
Try&Die
Demo
Rent/
Subscription
Free use of the product during a certain period of time specified by the publisher. After the period
expires, the end users can only continue using the application if they purchase a license
Use of the product without restrictions
Use of the product without purchasing a license during a certain period of time specified by the
publisher. The application cannot run after the period expires. Suitable for beta testing
This licensing model allows end users to run the application with limited functionality, but without
any time limitations
Provides access to the product with time limitations. After the expiration date a new period must
be paid to continue work with the protected application
You create – We protect
www.star-force.com
License and Serial Numbers
Management
 License/Serial Number expiration date
 Regional restrictions
 Maximum number of runs
 Total time of operation
 Serial number blacklisting
 Limiting the functionality depending on the serial number
 Transferring custom information specified in the serial number to the
application during activation
13
The parameters of Serial Numbers can be edited after generation
You create – We protect
www.star-force.com
Automatic Activation
StarForce servers are located around the world, including
Germany, China and Russia, which allows to guarantee
automatic activation for end-users via the Internet and
manually on the ProActive website (if a PC with protected
software installed does not have an Internet connection)
14
You create – We protect
www.star-force.com
Success Story: Tradesoft
Tradesoft has selected StarForce ProActive for Business for
the protection of its flagship product - AutoIntellekt. This
solution is developed for wholesale and retail trade
automation.
StarForce performs the following tasks:
 Product Licensing
 Protection against analysis and modification to prevent
the situation when the client could modify and refine the
product without the developer
15
You create – We protect
www.star-force.com
Success Story: C++ Obfuscator
We use StarForce ProActive for Business to protect our own
product. StarForce C ++ Obfuscator is a unique stand-alone
application that is created to obfuscate software source code. Its
work algorithms are very valuable.
Why StarForce ProActive for Business
 Binding to a remote server allows us to control the protected
application and, if necessary, to revoke the access to it
 The client can use the product on multiple computers, including
virtual machines
16
You create – We protect
www.star-force.com
StarForce ProActive for Business Price
Calculation
17
License for
protection
and activation
(per 6 months
or per year)
Binding
Objects
Serial
Numbers
StarForce
ProActive for
Business Cost
You create – We protect
www.star-force.com 18
Those companies have chosen us
You create – We protect
www.star-force.com
StarForce Benefits
Protection provided by an international company with partners all over the world
The company has a R&D Department that is responsible for innovations in hack-
resistance and functionality development. We update our products at least 4 times
a year
Friendly Support Team that can help via email, phone, Skype
Online statistics reports for marketing analysis and sales forecasting
Reasonable prices and a flexible discount system
Fast product protection over Internet (from work and from home)
An option to order protection performed by StarForce specialists
An option to order protection analysis by StarForce experts to get
recommendations about possible improvements
19
You create – We protect
www.star-force.com
Try StarForce
Sign up for a 30 days trial of
StarForce ProActive
for Business
for free
to make sure that it suits you
20
You create – We protect
StarForce Headquarters
+7 495 967-14-51
StarForce USA
+1 925 272-4515
StarForce France
+33 (0) 1 44 18-37-05
Business:
sales@star-force.com
Support:
support@star-force.com
Information:
info@star-force.com
www.star-force.com

Mais conteúdo relacionado

Semelhante a StarForce ProActive for Business

AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewJermund Ottermo
 
Heroku Introduction: Scaling customer facing apps & services
Heroku Introduction: Scaling customer facing apps & servicesHeroku Introduction: Scaling customer facing apps & services
Heroku Introduction: Scaling customer facing apps & servicesJohn Stevenson
 
Virtualization Complexities Impact Your Software Licensing Policy
Virtualization Complexities Impact Your Software Licensing PolicyVirtualization Complexities Impact Your Software Licensing Policy
Virtualization Complexities Impact Your Software Licensing PolicyFlexera
 
Wibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionWibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionHimanshu Arora
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application SecurityDr. Ahmed Al Zaidy
 
Inflectra Agile Alliance Agile2015 Conference
Inflectra Agile Alliance Agile2015 ConferenceInflectra Agile Alliance Agile2015 Conference
Inflectra Agile Alliance Agile2015 ConferenceAdam Sandman
 
Closing Mainframe Integrity Gaps
Closing Mainframe Integrity GapsClosing Mainframe Integrity Gaps
Closing Mainframe Integrity GapsRay Overby
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challengewebhostingguy
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challengewebhostingguy
 
Becoming an Inflectra Partner
Becoming an Inflectra PartnerBecoming an Inflectra Partner
Becoming an Inflectra PartnerInflectra
 
Cisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewCisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewDavid Barry
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challengewebhostingguy
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challengewebhostingguy
 
Practical AD Security: How to Secure Your Active Directory Network Without Br...
Practical AD Security: How to Secure Your Active Directory Network Without Br...Practical AD Security: How to Secure Your Active Directory Network Without Br...
Practical AD Security: How to Secure Your Active Directory Network Without Br...Frank Lesniak
 
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...mfrancis
 
FlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexera
 

Semelhante a StarForce ProActive for Business (20)

AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software review
 
Heroku Introduction: Scaling customer facing apps & services
Heroku Introduction: Scaling customer facing apps & servicesHeroku Introduction: Scaling customer facing apps & services
Heroku Introduction: Scaling customer facing apps & services
 
Anajli_Synopsis
Anajli_SynopsisAnajli_Synopsis
Anajli_Synopsis
 
Virtualization Complexities Impact Your Software Licensing Policy
Virtualization Complexities Impact Your Software Licensing PolicyVirtualization Complexities Impact Your Software Licensing Policy
Virtualization Complexities Impact Your Software Licensing Policy
 
Wibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionWibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotection
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application Security
 
Inflectra Agile Alliance Agile2015 Conference
Inflectra Agile Alliance Agile2015 ConferenceInflectra Agile Alliance Agile2015 Conference
Inflectra Agile Alliance Agile2015 Conference
 
Closing Mainframe Integrity Gaps
Closing Mainframe Integrity GapsClosing Mainframe Integrity Gaps
Closing Mainframe Integrity Gaps
 
Module 4 Assignment
Module 4 AssignmentModule 4 Assignment
Module 4 Assignment
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challenge
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challenge
 
Becoming an Inflectra Partner
Becoming an Inflectra PartnerBecoming an Inflectra Partner
Becoming an Inflectra Partner
 
Cisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewCisco and The Applied Group Point of View
Cisco and The Applied Group Point of View
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challenge
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challenge
 
Practical AD Security: How to Secure Your Active Directory Network Without Br...
Practical AD Security: How to Secure Your Active Directory Network Without Br...Practical AD Security: How to Secure Your Active Directory Network Without Br...
Practical AD Security: How to Secure Your Active Directory Network Without Br...
 
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
 
Software assurance
Software assuranceSoftware assurance
Software assurance
 
FlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexNet Publisher Licensing Security
FlexNet Publisher Licensing Security
 

Mais de StarForce Technologies

Защита дисков CD и DVD от копирования
Защита дисков CD и DVD от копированияЗащита дисков CD и DVD от копирования
Защита дисков CD и DVD от копированияStarForce Technologies
 
Компания "Протекшен Технолоджи" (StarForce)
Компания "Протекшен Технолоджи" (StarForce) Компания "Протекшен Технолоджи" (StarForce)
Компания "Протекшен Технолоджи" (StarForce) StarForce Technologies
 
Партнерская программа StarForce
Партнерская программа StarForceПартнерская программа StarForce
Партнерская программа StarForceStarForce Technologies
 

Mais de StarForce Technologies (8)

StarForce Disc (Рус)
StarForce Disc (Рус)StarForce Disc (Рус)
StarForce Disc (Рус)
 
Защита дисков CD и DVD от копирования
Защита дисков CD и DVD от копированияЗащита дисков CD и DVD от копирования
Защита дисков CD и DVD от копирования
 
StarForce ProActive (Рус)
StarForce ProActive (Рус)StarForce ProActive (Рус)
StarForce ProActive (Рус)
 
Компания "Протекшен Технолоджи" (StarForce)
Компания "Протекшен Технолоджи" (StarForce) Компания "Протекшен Технолоджи" (StarForce)
Компания "Протекшен Технолоджи" (StarForce)
 
About StarForce Technologies
About StarForce TechnologiesAbout StarForce Technologies
About StarForce Technologies
 
Партнерская программа StarForce
Партнерская программа StarForceПартнерская программа StarForce
Партнерская программа StarForce
 
StarForce DVD Video (Eng)
StarForce DVD Video (Eng)StarForce DVD Video (Eng)
StarForce DVD Video (Eng)
 
StarForce Disc
StarForce Disc StarForce Disc
StarForce Disc
 

Último

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

StarForce ProActive for Business

  • 1. You create – We protect StarForce ProActive for Business Licensing and protection system for enterprise software
  • 2. You create – We protect www.star-force.com 2  More than half of the world’s computer users admit to using software in a way that breaches the software’s license agreement  The majority of software developers incur revenue losses from the use of unlicensed software that amount to at least 10% of their revenue  Experts estimate about $63.4 billion of annual revenue is lost to the software industry Source: Is Unlicensed Software Hurting Your Bottom Line? (KPMG Survey, 2015) Are you prepared for violations of your software license agreement?
  • 3. You create – We protect www.star-force.com 3 StarForce ProActive for Business Advanced solution for reliable software protection License Agreement Compliance Protection against illegal copying, sharing and installation Protection against analysis and reverse engineering, prevention of unauthorized software modification Use control in real time
  • 4. You create – We protect www.star-force.com How it works 4 Protection When an application is being protected, its code gets a number of modifications that protect it against analysis and reverse engineering and other illegal actions from users Activation To activate the protected application, a serial number is required. This number also defines the applicable license terms. Activation includes binding of a serial number to the hardware parameters to provide a better level of protection Use Control Via the personal area, usage statistics can be accessed at anytime and changes can be made in the conditions of the license (editing the serial number)
  • 5. You create – We protect www.star-force.com Protection Features  Protection of code inside the function / protection of the imported function call  Extra protection of internal variables with hidden classes  Activation of the application modes depending on serial number parameters  Data files protection  Beta version and promotional copy protection  Patch and add-on protection  StarForce SDK included  Selection of binding objects: a computer, a local server and/or a remote server 5
  • 6. You create – We protect www.star-force.com 6 Binding Objects A local server A computer (a server or a workstation) A remote server The easiest way of binding, ideally suits applications that are run on physical computers (not virtual machines) Suitable for software installation on many computers within one local network (one company). Supports running on virtual machines Enables full control of the protected application in real time. You have an opportunity to prolong, revoke, add new users at any moment. It also supports running on virtual machines
  • 7. You create – We protect www.star-force.com Recommendations for selecting binding objects Binding Objects Application configuration Computer Local Server Remote Server Stand-alone application Ideal for applications running on physical machines Suitable for applications running on virtual machines without Internet connection Provides full control. Suitable for applications running on virtual machines “Fat client-server” application – client protection For a few computers Ideal for many computers in one network For remote workstations with a replace “Thin client-server” application – server protection Ideal for applications running on physical machines For corporate use Provides full control. Suitable for applications running on virtual machines 7
  • 8. You create – We protect www.star-force.com “Fat client-server” application binds to Local Server 8 Client of the protected application StarForce License Service Company’s Network Protected application’s Server Client of the protected application Client of the protected application Client of the protected application
  • 9. You create – We protect www.star-force.com “Thin client-server” application or a Cloud Service binds to Remote Server 9 StarForce License Service Protected Application Internet In “thin client server” or Cloud Service configuration only the server part is protected, but the software developer usually specifies the number of users in license terms. Binding to a remote server allows you to monitor the license terms and make quick changes
  • 10. You create – We protect www.star-force.com Total control in real time StarForce ProActive for Business allows you to control access to protected software, change license settings and collect usage statistics immediately with a few clicks 10
  • 11. You create – We protect www.star-force.com International use and customization  More than 16 GUI languages are supported  Dialog boxes can be customized  Custom user interface can be developed 11
  • 12. You create – We protect www.star-force.com Licensing Models 12 Trial Buy Only Try&Die Demo Rent/ Subscription Free use of the product during a certain period of time specified by the publisher. After the period expires, the end users can only continue using the application if they purchase a license Use of the product without restrictions Use of the product without purchasing a license during a certain period of time specified by the publisher. The application cannot run after the period expires. Suitable for beta testing This licensing model allows end users to run the application with limited functionality, but without any time limitations Provides access to the product with time limitations. After the expiration date a new period must be paid to continue work with the protected application
  • 13. You create – We protect www.star-force.com License and Serial Numbers Management  License/Serial Number expiration date  Regional restrictions  Maximum number of runs  Total time of operation  Serial number blacklisting  Limiting the functionality depending on the serial number  Transferring custom information specified in the serial number to the application during activation 13 The parameters of Serial Numbers can be edited after generation
  • 14. You create – We protect www.star-force.com Automatic Activation StarForce servers are located around the world, including Germany, China and Russia, which allows to guarantee automatic activation for end-users via the Internet and manually on the ProActive website (if a PC with protected software installed does not have an Internet connection) 14
  • 15. You create – We protect www.star-force.com Success Story: Tradesoft Tradesoft has selected StarForce ProActive for Business for the protection of its flagship product - AutoIntellekt. This solution is developed for wholesale and retail trade automation. StarForce performs the following tasks:  Product Licensing  Protection against analysis and modification to prevent the situation when the client could modify and refine the product without the developer 15
  • 16. You create – We protect www.star-force.com Success Story: C++ Obfuscator We use StarForce ProActive for Business to protect our own product. StarForce C ++ Obfuscator is a unique stand-alone application that is created to obfuscate software source code. Its work algorithms are very valuable. Why StarForce ProActive for Business  Binding to a remote server allows us to control the protected application and, if necessary, to revoke the access to it  The client can use the product on multiple computers, including virtual machines 16
  • 17. You create – We protect www.star-force.com StarForce ProActive for Business Price Calculation 17 License for protection and activation (per 6 months or per year) Binding Objects Serial Numbers StarForce ProActive for Business Cost
  • 18. You create – We protect www.star-force.com 18 Those companies have chosen us
  • 19. You create – We protect www.star-force.com StarForce Benefits Protection provided by an international company with partners all over the world The company has a R&D Department that is responsible for innovations in hack- resistance and functionality development. We update our products at least 4 times a year Friendly Support Team that can help via email, phone, Skype Online statistics reports for marketing analysis and sales forecasting Reasonable prices and a flexible discount system Fast product protection over Internet (from work and from home) An option to order protection performed by StarForce specialists An option to order protection analysis by StarForce experts to get recommendations about possible improvements 19
  • 20. You create – We protect www.star-force.com Try StarForce Sign up for a 30 days trial of StarForce ProActive for Business for free to make sure that it suits you 20
  • 21. You create – We protect StarForce Headquarters +7 495 967-14-51 StarForce USA +1 925 272-4515 StarForce France +33 (0) 1 44 18-37-05 Business: sales@star-force.com Support: support@star-force.com Information: info@star-force.com www.star-force.com