SlideShare uma empresa Scribd logo
1 de 57
Baixar para ler offline
Page 1WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Oliver Winzenried
CEO
oliver.winzenried@wibu.com
Customer centric view of
best practices in software monetization
Welcome to our Webinar
Page 2WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Webinar Agenda
 Introduction of speakers
 Avni Rambhia, Senior Industry Analyst, Frost&Sullivan
 Ruediger Kuegler, Security Expert, Wibu-Systems
 Oliver Winzenried, Founder and CEO, Wibu-Systems
 Intro Wibu-Systems by Oliver Winzenried
 Solution Demonstration by Ruediger Kuegler
 F&S requirements analysis and conclusions
 Some use cases
 Q & A: Questions and Answers
Page 3WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
1989... 2012: > 20 years WIBU-SYSTEMS
 Founded 1989 by Oliver Winzenried
and Marcellus Buchheit
 Privately held independent company
 Headquarters at Karlsruhe, Germany
 Subsidiaries in: USA, Netherlands, Belgium,
China, Spain, Portugal, United Kingdom
 Focus on Protection, Licensing and Security
Page 5WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Software Monetization: Maximizing revenues
Help customers to sell more.
Due to
 less product piracy
 increased target user groups
 flexible licensing
Page 6WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Challenges
Piracy
Reduction
IP
Protection
Production
Data
Features
on Demand
Access
Control
Integrity
Protection
Page 7WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
The solution: CodeMeter Technology
CF-Card
CmCard/CF
SD-Card
CmCard/SD
USB
CmStick/C Basic
”SD-Card
CmCard/”SD
USB
CmStick
Link to the data sheets:
http://www.wibu.com/en/hardwarebasierter-kopierschutz.html
Intern
CmCard/I
Express-Card
CmCard/E
Activation
CmActLicense
PC-Card
CmCard
Chip
CmASIC
Page 8WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Thousands of Customers, Millions of Dongles
Page 1Wibu-Systems 2012
CodeMeter
Product Overview
RĂŒdiger KĂŒgler
VP Sales | Security Expert
rk@wibu.com
Page 2Wibu-Systems 2012
Who takes part?
Vendor
‱ Software protection
‱ Software licensing
‱ Process integration
User
‱ Uses protected and
licensed software
Page 3Wibu-Systems 2012
LICENSE ACTIVATION
View of the User
Page 4Wibu-Systems 2012
 User gets his ticket
with order confirmation
delivery notice
 User starts software
and activates it
 Software is ready to use
 Activation via customer
portal
 Offline license file transfer
View of the User
Page 5Wibu-Systems 2012
1) User gets Order Confirmation
Page 6Wibu-Systems 2012
2) User starts Software
Page 7Wibu-Systems 2012
2) User starts Software II
Page 8Wibu-Systems 2012
2) User starts Software III
Page 9Wibu-Systems 2012
2) User starts Software IV
Page 10Wibu-Systems 2012
3) Software works
Page 11Wibu-Systems 2012
Transparent license management
Page 12Wibu-Systems 2012
OVERVIEW
View of the Vendor
Page 13Wibu-Systems 2012
CodeMeter for the Vendor
Technology
(CmDongle /
CmActLicenses)
Software Integration
Backoffice Integration
AxProtector
IxProtector
CodeMeter
License Central
Dongles:
CmDongle (USB, SD,
CF, ”SD, 
)
Softlicenses:
CodeMeter SmartBindÂź
License Models:
Single User, Trial,
Network, 
.
Page 14Wibu-Systems 2012
CODEMETER TECHNOLOGY
View of the Vendor
Page 15Wibu-Systems 2012
Realizing license models
Single User License
Floating Network Licenses
Software Renting
Pay-Per-Use
Modular Licensing
Trial Licenses
Downgrade License
Software Assurance
High Availability Licenses


Text
License Quantity
Expiration Time
Usage Period
Unit Counter
Feature Map
Product Code
Maintainance Period
Customer Own License Information


LicenseModels
ProductItemOptions
Page 16Wibu-Systems 2012
Secure license storage
 CmActLicense
 State-Of-The-Art Binding to
hardware fingerprint of PC
 Dynamic fingerprint
 Tolerance level
 Trial license mode
 Extendable
 CmDongle
 Hardware with secure Smartcard chip
 Mobile usage
CmDongle
Software
CmActLicense
CodeMeter License Server
Page 17Wibu-Systems 2012
SmartBindÂź: Generation of Binding
HD ID
Mac
2
CPU
type
CPU ID TPM ID
Mac
1


HD ID
CPU
type
CPU ID
Mac
1


HD ID
CPU
type
CPU ID
Mac
1

 Redudancy Bits
Fingerprint Inventory List Redudancy Bits
Catalogue
Available Properties
Property Vector
Page 18Wibu-Systems 2012
Original Property VectorHD ID
CPU
type
CPU ID 

Mac
1
SmartBindÂź: Check of Binding (== OK)
HD ID
Mac
2
CPU
type
CPU ID TPM ID
Mac
1


HD ID
CPU
type
CPU ID
Mac
2


HD ID
CPU
type
CPU ID 

Fingerprint
Catalogue
Current Available Properties
Reconstructed Property Vector
Inventory List
Redundancy Bits
Page 19Wibu-Systems 2012
Original Property VectorHD ID
CPU
type
CPU ID
Mac
1


SmartBindÂź: Check of Binding (!= OK)
HD ID
Mac
2
CPU
type
CPU ID TPM ID
Mac
1


HD ID
Mac
2


HD ID 

Catalogue
Inventory List
Redundancy Bits
Remaining Gap
CPU
type
CPU
type
Different CPU ID
Current Available Properties
Page 21Wibu-Systems 2012
SOFTWARE INTEGRATION
View of the Vendor
Page 22Wibu-Systems 2012
Integration into the Software
 Automatic Protection
 AxProtector
 Windows 32-bit / 64-bit, Mac OS X, Linux .NET
Assemblies, Java J2SE and J2EE
 Software Protection API
 IxProtector
 Encryption of code parts
 Automatic implementation of cryptographic challenges
 CodeMeter Core API
 Additional functionality (Online Activation)
Page 23Wibu-Systems 2012
AxProtector = Wrapper
Why do I need
a wrapper?
Page 24Wibu-Systems 2012
Application with simple API calls
.Net (and Java) code can be
disassembled very easily
Page 25Wibu-Systems 2012
Hacker removes license check
Page 26Wibu-Systems 2012
Cracked application
License check
is removed
Page 27Wibu-Systems 2012
Application with obfuscation
Code still readable
Page 28Wibu-Systems 2012
AxProtector/IxProtector .Net
Compiled application Release version
Header
Code
Header
Stub Code
(without Intellectual
Properties)
AxEngine
(Security Engine)
Encryped Code
(original Code with
Intellectual Properties)
Ax/IxProtector
Definition
of licenses
and modules
Page 29Wibu-Systems 2012
Encrypted Code with AxProtector
Code is no longer
readable
Page 30Wibu-Systems 2012
BACK OFFICE INTEGRATION
View of the Vendor
Page 31Wibu-Systems 2012
Ticket /
Fingerprint
4
User
Online Activation Server
Vendor
Ticket
3
License
5
Ticket
2
SKU
1
Online Activation
Server
Page 32Wibu-Systems 2012
Backoffice Integration
Business
Logic
User Interface
License CentralERP
CRM
Webdepot
Gateway
Connector
eCommerce
(Digital River)
CRM
(Sales Force)
Activation
Wizard
Browser
Connector
Webserver
in DMZ
C
C
Database
Inhouse
Application
G
C
Page 33Wibu-Systems 2012
Activation via Internet (Online)
Vendor UserSOAP (XML), JSON,
HTTP Post
Ticket +
Fingerprint
License file
Receipt
Page 34Wibu-Systems 2012
UserVendor
Activation via File (Offline)

Page 35Wibu-Systems 2012 Page 35
Activation Wizard
Page 36Wibu-Systems 2012
License Portal
Page 37Wibu-Systems 2012
License Portal II
Page 38Wibu-Systems 2012
License Portal III
Page 39Wibu-Systems 2012
License Portal Customization
1
A Note to the Analyst
This template is designed to allow a new Frost & Sullivan analyst to create a high quality deliverable that
meets or exceeds the standards expected by our clients. At the same time, it is not designed to inhibit
more experienced analysts in creating additional valuable content. The minimum requirements for all ME
studies completed in PowerPoint are contained in this template. Analysts are encouraged to go beyond
these required slides and provide additional information if clearly adding value for clients. In creating new
slides, remember that literally, one picture is worth one thousand words—choose graphics over text
whenever possible and use the PPT TimeSaver 2.0 to ensure consistent, high quality look and feel.
Analysts are not to change the order of or delete slides/sections, unless clearly not relevant to the topic
under study—such deletions or changes must be justified to both the Strategic Review Committee (SRC)
and assigned editor. Text contained should never be less than 14 pitch Arial font except where
otherwise noted, in footnotes, or chart/graph labels. PPT charts should use the “beveled” style shown
herein (called “Style 26” in Office). No text or graphics should extend into the border of a slide. Red font
in this template is used ONLY to provide instructions or indicate where variable text should be inserted;
generally red font should not be used in the text of final deliverables, except for extreme emphasis. Slide
titles must be less than 300 characters to properly upload onto Frost.com. Hyperlinks will work in PPT
when in presentation mode and when put into PDF format. Finally, suggestions for improvement are
encouraged; please provide them to: dan.goldenberg@frost.com and rufus.connell@frost.com.
Best Practices In Software Monetization – A
Customer Perspective
Avni Rambhia, Industry Manager
Digital Media Group
December 2012
2
Lecture Capture & Video Webcasting
Video
Enabled
Consumer
Devices
Broadcast &
Cinematography Cameras
Encoding & Transcoding
Acquisition DeliveryMiddleware and Workflow
Enterprise
Media and
Entertainment
Encoding & Transcoding
Digital Asset Management &
Enterprise Content
Management
MediaAsset
Management
Video &Ad
Insertion Servers
Nonlinear
Editing
IRDs
Online Video & Web
Analytics
Multi-Platform
Delivery &
CDNs
Multi-Platform
Delivery &
CDNs
Content Protection, Entitlement
& Rights Management
STORAGE
STORAGE
MarketingAutomationMarketing Process Optimization
Dynamic Publishing
Animation Software
Animation & CAE
Software
3D
Technologies
Video
Switchers
IP Video Network
Management
Online Video
Platforms &
Analytics
Enterprise Search
Pay TV
Platforms
Online Video Platforms
Digital
Signage
Content Protection, Entitlement
& Rights Management
Broadcast
Scheduling
Systems
Covering The Digital Media Value Chain
Source: Frost & Sullivan analysis.
3
Security
Entitlement Management
Monetization = Entitlement Management + Piracy Prevention
Entitlement Management is Necessary
‱ Define software SKUs, define and enforce licensing policies
‱ Back-office functions: license generation, tracking, transaction management and more
‱ Usability functions: transferring & upgrading licenses, auditing usage and more
‱ EM is the basic foundation upon which LM is built
Security is Hard, But Another Side of the Same Coin
‱ Rich EM routines are meaningless if they can be trivially bypassed or circumvented
‱ Enforcement implicitly assumes security
‱ Controlling digital software is hard; technology advancements favor hackers
‱ Keeping honest users honest often seems like a more reasonable target
‱ This is not a viable long-term monetization strategy; much lower ROI on LM investment
4
Losses from
piracy can
become
significant,
and they hurt
both software
vendors and
their
customers.
Source: Frost & Sullivan
China placed second in the world in the number of connections made to share unauthorized
copies of ESA members’ game products – accounting for more than 11.5% of the world’s
total..
Russia has not signaled a serious commitment to addressing piracy occurring through
the Internet, which has exploded [because there is] no legal framework for addressing online
piracy, coupled with steadily growing consumer access to broadband. - United States
Congressional International Anti-Piracy Caucus (IAPC)
[Competitors using pirated software undercut legitimate licensees on price, creating a negative feedback
loop.] If EDA industry doesn’t secure a level playing field for our customers, our industries will suffer
greatly – EDA Consortium
Losses From Piracy Are Real
In the industrial sector, 2 in 3 members of the VDMA (the German Engineering Federation)
have already experienced product piracy and/or counterfeiting.
All told, intellectual property theft costs U.S. businesses billions of dollars a year and robs
the nation of jobs and lost tax revenues. – U.S. Federal Bureau of Investigation (FBI)
Worldwide, 42 percent of software used in 2011 was unlicensed - Business Software Alliance
5
Key Market Trends in Software Monetization
‱ Keeping software monetized and keeping IP secure is a
harder challenge in international markets
‱ An issue for your customers, as much as for you
‱ License Management needs to keep pace
with evolving business models and product
architectures
‱ Analytics is increasingly important
‱ Installation complexity, run time cost and
performance impact are increasingly non-negotiable
‱ At the same time, security is also increasingly non-
negotiable
‱ This nudges LM towards being a first-class feature
rather than an afterthought
‱ Homegrown LM highly prevalent in the market today
‱ Fragmented platforms, multiple business models, cost control
pressures, need for security and speed of innovation necessitate
a formalized LM strategy
Market
Trends
Geographical
Expansion =
Piracy
Exposure
SaaS and
Hybrid Form
Factors
Complement
On-Premise
User Experience
Around License
Management Is
High Priority
Feature
Homegrown
LM is not
commercially
viable for most
ISVs
Peak activity
between now
and 2014
Peak activity
2014 to 2016
6
Considerations in Choosing an LM System
7
Vendor Profile: Wibu-Systems
Seamless
0
1
2 3
4
5
Scalable
0
1
2 3
4
5
Secure
0
1
2 3
4
5
‱ Seamless in development and deployment
‱ License Central can be quickly personalized, or
custom-built for ISV infrastructure/CRM system with
support from Wibu-Systems
‱ CodeMeter dongles move freely from computer to
computer or server to server
‱ Dongles are aesthetic branding opportunities
‱ Tolerance built into activation verification minimizes
false positives and disruption
‱ Scalable in terms of architecture and platforms
‱ CodeMeter dongles support number of interfaces
‱ Desktop, embedded and server platform support
‱ Wide range of licensing model support
‱ Protection process works the same way for
CmDongle and CmActLicense, so ISVs can use
either or both equivalently.
‱ Standardized encryption algorithms
‱ Company maintains an equivalent ongoing focus on
functionality and security
‱ Internal innovation driving improved hardware and
software locking and security technology
‱ External hacker challenges used regularly to test
and validate company products
8
Critical
License management systems, once deployed, are very hard to replace.
The process is deeply disruptive and extremely expensive. So choose
carefully the first time.
Urgent
Key
Start with a clear view of prioritized functional requirements and
business-appropriate security and cost targets. Then, choose a
license management solution that fits.
Essential
Basic
Crafting a License Management Strategy: Key Takeaways
Key takeaways for an ISV, in descending order
Ensure your chosen solution will scale with your business and evolve
with your product over time, and can also keep pace with expansion
and evolution of your customers.
Proactively craft a strategy and execute it with cross-team
involvement including technical and financial management,
marketing, engineering, testing and operations.
Security and piracy management is as important as entitlement
management in crafting a comprehensive license management
solution for your products and your business.
Page 11WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Customer Use Cases: Bosch Aftermarket
Software Monetization:
 Application for Aftermarket business
 Easy deployment is necessary for users
 Subscription based licensing
 CmActLicense at user side
 License Central for sales process integration
Page 12WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Customer Use Cases: Sirona
Software Monetization:
 IP protection
 High performance .NET protection
 Integrity protection (MPG)
 Increased market through flexible licensing
 License Central in sales process
Page 13WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Customer Use Cases: Wincor Nixdorf
Software Monetization:
 Protection against unauthorized use
 Access control for diagnostic functions
 Document encryption for manuals / service infos
 Fulfillment of PCI DSS requirements
 Automation of standard procedures
to make on site service more efficient
Page 14WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Q&A
Thank You
 Contact us for next steps:
Germany: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
 www.wibu.com, info@wibu.com

Mais conteĂșdo relacionado

Mais procurados

Intel Business Builder Initial Meeting V6
Intel Business Builder Initial Meeting V6Intel Business Builder Initial Meeting V6
Intel Business Builder Initial Meeting V6
joecolesphone
 
000 013
000 013000 013
000 013
kemron87
 
KronoDesk - On-Premise Help Desk Solution for Regulated Industries
KronoDesk - On-Premise Help Desk Solution for Regulated IndustriesKronoDesk - On-Premise Help Desk Solution for Regulated Industries
KronoDesk - On-Premise Help Desk Solution for Regulated Industries
Inflectra
 

Mais procurados (15)

Win Connections Technical Overview (Harold W)
Win Connections   Technical Overview (Harold W)Win Connections   Technical Overview (Harold W)
Win Connections Technical Overview (Harold W)
 
Introduction to Wonderware InduSoft Web Studio 8.0+SP2
Introduction to Wonderware InduSoft Web Studio 8.0+SP2Introduction to Wonderware InduSoft Web Studio 8.0+SP2
Introduction to Wonderware InduSoft Web Studio 8.0+SP2
 
Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2
 
Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5
 
Nordics IBM Mobile Foundation Integration in Action
Nordics IBM Mobile Foundation Integration in ActionNordics IBM Mobile Foundation Integration in Action
Nordics IBM Mobile Foundation Integration in Action
 
InduSoft Web Studio 8.0 + SP1 + Patch One Review
InduSoft Web Studio 8.0 + SP1 + Patch One ReviewInduSoft Web Studio 8.0 + SP1 + Patch One Review
InduSoft Web Studio 8.0 + SP1 + Patch One Review
 
Intel Business Builder Initial Meeting V6
Intel Business Builder Initial Meeting V6Intel Business Builder Initial Meeting V6
Intel Business Builder Initial Meeting V6
 
Course summary
Course summaryCourse summary
Course summary
 
HMI Mobility : An InduSoft Whitepaper
HMI Mobility : An InduSoft WhitepaperHMI Mobility : An InduSoft Whitepaper
HMI Mobility : An InduSoft Whitepaper
 
Eurotech M2M Building Blocks and Multi-Service Gateway Approach
Eurotech M2M Building Blocks and Multi-Service Gateway ApproachEurotech M2M Building Blocks and Multi-Service Gateway Approach
Eurotech M2M Building Blocks and Multi-Service Gateway Approach
 
ArcSight Enterprise View Deployment Guide
ArcSight Enterprise View Deployment GuideArcSight Enterprise View Deployment Guide
ArcSight Enterprise View Deployment Guide
 
Ranbijay Kumar - BlackBerry Jam Americas 2013
Ranbijay Kumar - BlackBerry Jam Americas 2013Ranbijay Kumar - BlackBerry Jam Americas 2013
Ranbijay Kumar - BlackBerry Jam Americas 2013
 
000 013
000 013000 013
000 013
 
KronoDesk - On-Premise Help Desk Solution for Regulated Industries
KronoDesk - On-Premise Help Desk Solution for Regulated IndustriesKronoDesk - On-Premise Help Desk Solution for Regulated Industries
KronoDesk - On-Premise Help Desk Solution for Regulated Industries
 
Mobile hig
Mobile higMobile hig
Mobile hig
 

Semelhante a Customer Centric View of Best Practices in Software Monetization

branch_architecture
branch_architecturebranch_architecture
branch_architecture
jimmy mathebula
 
Costandopportunitycostofarchitecturalinitiatives 090311132631-phpapp01
Costandopportunitycostofarchitecturalinitiatives 090311132631-phpapp01Costandopportunitycostofarchitecturalinitiatives 090311132631-phpapp01
Costandopportunitycostofarchitecturalinitiatives 090311132631-phpapp01
Tim Vibbert
 

Semelhante a Customer Centric View of Best Practices in Software Monetization (20)

Managing the Experience + Ad Hoc Reporting
Managing the Experience + Ad Hoc ReportingManaging the Experience + Ad Hoc Reporting
Managing the Experience + Ad Hoc Reporting
 
Learn Why your Technology Toolkit needs a Low Code Platform Upgrade!
Learn Why your Technology Toolkit needs a Low Code Platform Upgrade!Learn Why your Technology Toolkit needs a Low Code Platform Upgrade!
Learn Why your Technology Toolkit needs a Low Code Platform Upgrade!
 
Optimize your CI/CD with GitLab and AWS
Optimize your CI/CD with GitLab and AWSOptimize your CI/CD with GitLab and AWS
Optimize your CI/CD with GitLab and AWS
 
branch_architecture
branch_architecturebranch_architecture
branch_architecture
 
Volkswagen | ECU Software Development with codeBeamer ALM: IT Aspects
Volkswagen | ECU Software Development with codeBeamer ALM: IT AspectsVolkswagen | ECU Software Development with codeBeamer ALM: IT Aspects
Volkswagen | ECU Software Development with codeBeamer ALM: IT Aspects
 
Overview
OverviewOverview
Overview
 
UrbanCode Deploy course and product overview slides
UrbanCode Deploy course and product overview slidesUrbanCode Deploy course and product overview slides
UrbanCode Deploy course and product overview slides
 
Introduction to the Microsoft Azure Cloud.pptx
Introduction to the Microsoft Azure Cloud.pptxIntroduction to the Microsoft Azure Cloud.pptx
Introduction to the Microsoft Azure Cloud.pptx
 
Costandopportunitycostofarchitecturalinitiatives 090311132631-phpapp01
Costandopportunitycostofarchitecturalinitiatives 090311132631-phpapp01Costandopportunitycostofarchitecturalinitiatives 090311132631-phpapp01
Costandopportunitycostofarchitecturalinitiatives 090311132631-phpapp01
 
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conferenceIBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
 
The subtle art of building scalable apps using low code
The subtle art of building scalable apps using low codeThe subtle art of building scalable apps using low code
The subtle art of building scalable apps using low code
 
Workshop 16 october 2015 paris
Workshop 16 october 2015 parisWorkshop 16 october 2015 paris
Workshop 16 october 2015 paris
 
New Capabilities and Product Strategy for .NET on PCF
New Capabilities and Product Strategy for .NET on PCF New Capabilities and Product Strategy for .NET on PCF
New Capabilities and Product Strategy for .NET on PCF
 
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
 
OpenWhisk Introduction
OpenWhisk IntroductionOpenWhisk Introduction
OpenWhisk Introduction
 
HP ArcSight EnterpriseView Deployment Guide
HP ArcSight EnterpriseView Deployment GuideHP ArcSight EnterpriseView Deployment Guide
HP ArcSight EnterpriseView Deployment Guide
 
EnterpriseView 2.0 Deployment Guide
EnterpriseView 2.0 Deployment GuideEnterpriseView 2.0 Deployment Guide
EnterpriseView 2.0 Deployment Guide
 
HP ArcSight EnterpriseView v1.6 Deployment Guide
HP ArcSight EnterpriseView v1.6 Deployment GuideHP ArcSight EnterpriseView v1.6 Deployment Guide
HP ArcSight EnterpriseView v1.6 Deployment Guide
 
HP EnterpriseView v1.5 Deployment Guide
HP EnterpriseView v1.5 Deployment GuideHP EnterpriseView v1.5 Deployment Guide
HP EnterpriseView v1.5 Deployment Guide
 
HP EnterpriseView v1.5 Deployment Guide
HP EnterpriseView v1.5 Deployment GuideHP EnterpriseView v1.5 Deployment Guide
HP EnterpriseView v1.5 Deployment Guide
 

Mais de team-WIBU

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
team-WIBU
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
team-WIBU
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basics
team-WIBU
 
Keine Zeit fĂŒr Leerlauf – LizenzverfĂŒgbarkeit fĂŒr GeschĂ€ftskontinuitĂ€t
Keine Zeit fĂŒr Leerlauf – LizenzverfĂŒgbarkeit fĂŒr GeschĂ€ftskontinuitĂ€tKeine Zeit fĂŒr Leerlauf – LizenzverfĂŒgbarkeit fĂŒr GeschĂ€ftskontinuitĂ€t
Keine Zeit fĂŒr Leerlauf – LizenzverfĂŒgbarkeit fĂŒr GeschĂ€ftskontinuitĂ€t
team-WIBU
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
team-WIBU
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
team-WIBU
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
team-WIBU
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
team-WIBU
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
team-WIBU
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
team-WIBU
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
team-WIBU
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
team-WIBU
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
team-WIBU
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
team-WIBU
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
team-WIBU
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
team-WIBU
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
team-WIBU
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
team-WIBU
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environments
team-WIBU
 

Mais de team-WIBU (20)

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Together
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basics
 
Keine Zeit fĂŒr Leerlauf – LizenzverfĂŒgbarkeit fĂŒr GeschĂ€ftskontinuitĂ€t
Keine Zeit fĂŒr Leerlauf – LizenzverfĂŒgbarkeit fĂŒr GeschĂ€ftskontinuitĂ€tKeine Zeit fĂŒr Leerlauf – LizenzverfĂŒgbarkeit fĂŒr GeschĂ€ftskontinuitĂ€t
Keine Zeit fĂŒr Leerlauf – LizenzverfĂŒgbarkeit fĂŒr GeschĂ€ftskontinuitĂ€t
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environments
 

Último

Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Abortion Pill Prices Boksburg [(+27832195400*)] đŸ„ Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] đŸ„ Women's Abortion Clinic in ...Abortion Pill Prices Boksburg [(+27832195400*)] đŸ„ Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] đŸ„ Women's Abortion Clinic in ...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 

Último (20)

WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Abortion Pill Prices Boksburg [(+27832195400*)] đŸ„ Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] đŸ„ Women's Abortion Clinic in ...Abortion Pill Prices Boksburg [(+27832195400*)] đŸ„ Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] đŸ„ Women's Abortion Clinic in ...
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 

Customer Centric View of Best Practices in Software Monetization

  • 1. Page 1WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization Oliver Winzenried CEO oliver.winzenried@wibu.com Customer centric view of best practices in software monetization Welcome to our Webinar
  • 2. Page 2WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization Webinar Agenda  Introduction of speakers  Avni Rambhia, Senior Industry Analyst, Frost&Sullivan  Ruediger Kuegler, Security Expert, Wibu-Systems  Oliver Winzenried, Founder and CEO, Wibu-Systems  Intro Wibu-Systems by Oliver Winzenried  Solution Demonstration by Ruediger Kuegler  F&S requirements analysis and conclusions  Some use cases  Q & A: Questions and Answers
  • 3. Page 3WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization 1989... 2012: > 20 years WIBU-SYSTEMS  Founded 1989 by Oliver Winzenried and Marcellus Buchheit  Privately held independent company  Headquarters at Karlsruhe, Germany  Subsidiaries in: USA, Netherlands, Belgium, China, Spain, Portugal, United Kingdom  Focus on Protection, Licensing and Security
  • 4. Page 5WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization Software Monetization: Maximizing revenues Help customers to sell more. Due to  less product piracy  increased target user groups  flexible licensing
  • 5. Page 6WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization Challenges Piracy Reduction IP Protection Production Data Features on Demand Access Control Integrity Protection
  • 6. Page 7WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization The solution: CodeMeter Technology CF-Card CmCard/CF SD-Card CmCard/SD USB CmStick/C Basic ”SD-Card CmCard/”SD USB CmStick Link to the data sheets: http://www.wibu.com/en/hardwarebasierter-kopierschutz.html Intern CmCard/I Express-Card CmCard/E Activation CmActLicense PC-Card CmCard Chip CmASIC
  • 7. Page 8WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization Thousands of Customers, Millions of Dongles
  • 8. Page 1Wibu-Systems 2012 CodeMeter Product Overview RĂŒdiger KĂŒgler VP Sales | Security Expert rk@wibu.com
  • 9. Page 2Wibu-Systems 2012 Who takes part? Vendor ‱ Software protection ‱ Software licensing ‱ Process integration User ‱ Uses protected and licensed software
  • 10. Page 3Wibu-Systems 2012 LICENSE ACTIVATION View of the User
  • 11. Page 4Wibu-Systems 2012  User gets his ticket with order confirmation delivery notice  User starts software and activates it  Software is ready to use  Activation via customer portal  Offline license file transfer View of the User
  • 12. Page 5Wibu-Systems 2012 1) User gets Order Confirmation
  • 13. Page 6Wibu-Systems 2012 2) User starts Software
  • 14. Page 7Wibu-Systems 2012 2) User starts Software II
  • 15. Page 8Wibu-Systems 2012 2) User starts Software III
  • 16. Page 9Wibu-Systems 2012 2) User starts Software IV
  • 17. Page 10Wibu-Systems 2012 3) Software works
  • 20. Page 13Wibu-Systems 2012 CodeMeter for the Vendor Technology (CmDongle / CmActLicenses) Software Integration Backoffice Integration AxProtector IxProtector CodeMeter License Central Dongles: CmDongle (USB, SD, CF, ”SD, 
) Softlicenses: CodeMeter SmartBindÂź License Models: Single User, Trial, Network, 
.
  • 21. Page 14Wibu-Systems 2012 CODEMETER TECHNOLOGY View of the Vendor
  • 22. Page 15Wibu-Systems 2012 Realizing license models Single User License Floating Network Licenses Software Renting Pay-Per-Use Modular Licensing Trial Licenses Downgrade License Software Assurance High Availability Licenses 
 Text License Quantity Expiration Time Usage Period Unit Counter Feature Map Product Code Maintainance Period Customer Own License Information 
 LicenseModels ProductItemOptions
  • 23. Page 16Wibu-Systems 2012 Secure license storage  CmActLicense  State-Of-The-Art Binding to hardware fingerprint of PC  Dynamic fingerprint  Tolerance level  Trial license mode  Extendable  CmDongle  Hardware with secure Smartcard chip  Mobile usage CmDongle Software CmActLicense CodeMeter License Server
  • 24. Page 17Wibu-Systems 2012 SmartBindÂź: Generation of Binding HD ID Mac 2 CPU type CPU ID TPM ID Mac 1 
 HD ID CPU type CPU ID Mac 1 
 HD ID CPU type CPU ID Mac 1 
 Redudancy Bits Fingerprint Inventory List Redudancy Bits Catalogue Available Properties Property Vector
  • 25. Page 18Wibu-Systems 2012 Original Property VectorHD ID CPU type CPU ID 
 Mac 1 SmartBindÂź: Check of Binding (== OK) HD ID Mac 2 CPU type CPU ID TPM ID Mac 1 
 HD ID CPU type CPU ID Mac 2 
 HD ID CPU type CPU ID 
 Fingerprint Catalogue Current Available Properties Reconstructed Property Vector Inventory List Redundancy Bits
  • 26. Page 19Wibu-Systems 2012 Original Property VectorHD ID CPU type CPU ID Mac 1 
 SmartBindÂź: Check of Binding (!= OK) HD ID Mac 2 CPU type CPU ID TPM ID Mac 1 
 HD ID Mac 2 
 HD ID 
 Catalogue Inventory List Redundancy Bits Remaining Gap CPU type CPU type Different CPU ID Current Available Properties
  • 27. Page 21Wibu-Systems 2012 SOFTWARE INTEGRATION View of the Vendor
  • 28. Page 22Wibu-Systems 2012 Integration into the Software  Automatic Protection  AxProtector  Windows 32-bit / 64-bit, Mac OS X, Linux .NET Assemblies, Java J2SE and J2EE  Software Protection API  IxProtector  Encryption of code parts  Automatic implementation of cryptographic challenges  CodeMeter Core API  Additional functionality (Online Activation)
  • 29. Page 23Wibu-Systems 2012 AxProtector = Wrapper Why do I need a wrapper?
  • 30. Page 24Wibu-Systems 2012 Application with simple API calls .Net (and Java) code can be disassembled very easily
  • 31. Page 25Wibu-Systems 2012 Hacker removes license check
  • 32. Page 26Wibu-Systems 2012 Cracked application License check is removed
  • 33. Page 27Wibu-Systems 2012 Application with obfuscation Code still readable
  • 34. Page 28Wibu-Systems 2012 AxProtector/IxProtector .Net Compiled application Release version Header Code Header Stub Code (without Intellectual Properties) AxEngine (Security Engine) Encryped Code (original Code with Intellectual Properties) Ax/IxProtector Definition of licenses and modules
  • 35. Page 29Wibu-Systems 2012 Encrypted Code with AxProtector Code is no longer readable
  • 36. Page 30Wibu-Systems 2012 BACK OFFICE INTEGRATION View of the Vendor
  • 37. Page 31Wibu-Systems 2012 Ticket / Fingerprint 4 User Online Activation Server Vendor Ticket 3 License 5 Ticket 2 SKU 1 Online Activation Server
  • 38. Page 32Wibu-Systems 2012 Backoffice Integration Business Logic User Interface License CentralERP CRM Webdepot Gateway Connector eCommerce (Digital River) CRM (Sales Force) Activation Wizard Browser Connector Webserver in DMZ C C Database Inhouse Application G C
  • 39. Page 33Wibu-Systems 2012 Activation via Internet (Online) Vendor UserSOAP (XML), JSON, HTTP Post Ticket + Fingerprint License file Receipt
  • 41. Page 35Wibu-Systems 2012 Page 35 Activation Wizard
  • 45. Page 39Wibu-Systems 2012 License Portal Customization
  • 46. 1 A Note to the Analyst This template is designed to allow a new Frost & Sullivan analyst to create a high quality deliverable that meets or exceeds the standards expected by our clients. At the same time, it is not designed to inhibit more experienced analysts in creating additional valuable content. The minimum requirements for all ME studies completed in PowerPoint are contained in this template. Analysts are encouraged to go beyond these required slides and provide additional information if clearly adding value for clients. In creating new slides, remember that literally, one picture is worth one thousand words—choose graphics over text whenever possible and use the PPT TimeSaver 2.0 to ensure consistent, high quality look and feel. Analysts are not to change the order of or delete slides/sections, unless clearly not relevant to the topic under study—such deletions or changes must be justified to both the Strategic Review Committee (SRC) and assigned editor. Text contained should never be less than 14 pitch Arial font except where otherwise noted, in footnotes, or chart/graph labels. PPT charts should use the “beveled” style shown herein (called “Style 26” in Office). No text or graphics should extend into the border of a slide. Red font in this template is used ONLY to provide instructions or indicate where variable text should be inserted; generally red font should not be used in the text of final deliverables, except for extreme emphasis. Slide titles must be less than 300 characters to properly upload onto Frost.com. Hyperlinks will work in PPT when in presentation mode and when put into PDF format. Finally, suggestions for improvement are encouraged; please provide them to: dan.goldenberg@frost.com and rufus.connell@frost.com. Best Practices In Software Monetization – A Customer Perspective Avni Rambhia, Industry Manager Digital Media Group December 2012
  • 47. 2 Lecture Capture & Video Webcasting Video Enabled Consumer Devices Broadcast & Cinematography Cameras Encoding & Transcoding Acquisition DeliveryMiddleware and Workflow Enterprise Media and Entertainment Encoding & Transcoding Digital Asset Management & Enterprise Content Management MediaAsset Management Video &Ad Insertion Servers Nonlinear Editing IRDs Online Video & Web Analytics Multi-Platform Delivery & CDNs Multi-Platform Delivery & CDNs Content Protection, Entitlement & Rights Management STORAGE STORAGE MarketingAutomationMarketing Process Optimization Dynamic Publishing Animation Software Animation & CAE Software 3D Technologies Video Switchers IP Video Network Management Online Video Platforms & Analytics Enterprise Search Pay TV Platforms Online Video Platforms Digital Signage Content Protection, Entitlement & Rights Management Broadcast Scheduling Systems Covering The Digital Media Value Chain Source: Frost & Sullivan analysis.
  • 48. 3 Security Entitlement Management Monetization = Entitlement Management + Piracy Prevention Entitlement Management is Necessary ‱ Define software SKUs, define and enforce licensing policies ‱ Back-office functions: license generation, tracking, transaction management and more ‱ Usability functions: transferring & upgrading licenses, auditing usage and more ‱ EM is the basic foundation upon which LM is built Security is Hard, But Another Side of the Same Coin ‱ Rich EM routines are meaningless if they can be trivially bypassed or circumvented ‱ Enforcement implicitly assumes security ‱ Controlling digital software is hard; technology advancements favor hackers ‱ Keeping honest users honest often seems like a more reasonable target ‱ This is not a viable long-term monetization strategy; much lower ROI on LM investment
  • 49. 4 Losses from piracy can become significant, and they hurt both software vendors and their customers. Source: Frost & Sullivan China placed second in the world in the number of connections made to share unauthorized copies of ESA members’ game products – accounting for more than 11.5% of the world’s total..
Russia has not signaled a serious commitment to addressing piracy occurring through the Internet, which has exploded [because there is] no legal framework for addressing online piracy, coupled with steadily growing consumer access to broadband. - United States Congressional International Anti-Piracy Caucus (IAPC) [Competitors using pirated software undercut legitimate licensees on price, creating a negative feedback loop.] If EDA industry doesn’t secure a level playing field for our customers, our industries will suffer greatly – EDA Consortium Losses From Piracy Are Real In the industrial sector, 2 in 3 members of the VDMA (the German Engineering Federation) have already experienced product piracy and/or counterfeiting. All told, intellectual property theft costs U.S. businesses billions of dollars a year and robs the nation of jobs and lost tax revenues. – U.S. Federal Bureau of Investigation (FBI) Worldwide, 42 percent of software used in 2011 was unlicensed - Business Software Alliance
  • 50. 5 Key Market Trends in Software Monetization ‱ Keeping software monetized and keeping IP secure is a harder challenge in international markets ‱ An issue for your customers, as much as for you ‱ License Management needs to keep pace with evolving business models and product architectures ‱ Analytics is increasingly important ‱ Installation complexity, run time cost and performance impact are increasingly non-negotiable ‱ At the same time, security is also increasingly non- negotiable ‱ This nudges LM towards being a first-class feature rather than an afterthought ‱ Homegrown LM highly prevalent in the market today ‱ Fragmented platforms, multiple business models, cost control pressures, need for security and speed of innovation necessitate a formalized LM strategy Market Trends Geographical Expansion = Piracy Exposure SaaS and Hybrid Form Factors Complement On-Premise User Experience Around License Management Is High Priority Feature Homegrown LM is not commercially viable for most ISVs Peak activity between now and 2014 Peak activity 2014 to 2016
  • 52. 7 Vendor Profile: Wibu-Systems Seamless 0 1 2 3 4 5 Scalable 0 1 2 3 4 5 Secure 0 1 2 3 4 5 ‱ Seamless in development and deployment ‱ License Central can be quickly personalized, or custom-built for ISV infrastructure/CRM system with support from Wibu-Systems ‱ CodeMeter dongles move freely from computer to computer or server to server ‱ Dongles are aesthetic branding opportunities ‱ Tolerance built into activation verification minimizes false positives and disruption ‱ Scalable in terms of architecture and platforms ‱ CodeMeter dongles support number of interfaces ‱ Desktop, embedded and server platform support ‱ Wide range of licensing model support ‱ Protection process works the same way for CmDongle and CmActLicense, so ISVs can use either or both equivalently. ‱ Standardized encryption algorithms ‱ Company maintains an equivalent ongoing focus on functionality and security ‱ Internal innovation driving improved hardware and software locking and security technology ‱ External hacker challenges used regularly to test and validate company products
  • 53. 8 Critical License management systems, once deployed, are very hard to replace. The process is deeply disruptive and extremely expensive. So choose carefully the first time. Urgent Key Start with a clear view of prioritized functional requirements and business-appropriate security and cost targets. Then, choose a license management solution that fits. Essential Basic Crafting a License Management Strategy: Key Takeaways Key takeaways for an ISV, in descending order Ensure your chosen solution will scale with your business and evolve with your product over time, and can also keep pace with expansion and evolution of your customers. Proactively craft a strategy and execute it with cross-team involvement including technical and financial management, marketing, engineering, testing and operations. Security and piracy management is as important as entitlement management in crafting a comprehensive license management solution for your products and your business.
  • 54. Page 11WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization Customer Use Cases: Bosch Aftermarket Software Monetization:  Application for Aftermarket business  Easy deployment is necessary for users  Subscription based licensing  CmActLicense at user side  License Central for sales process integration
  • 55. Page 12WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization Customer Use Cases: Sirona Software Monetization:  IP protection  High performance .NET protection  Integrity protection (MPG)  Increased market through flexible licensing  License Central in sales process
  • 56. Page 13WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization Customer Use Cases: Wincor Nixdorf Software Monetization:  Protection against unauthorized use  Access control for diagnostic functions  Document encryption for manuals / service infos  Fulfillment of PCI DSS requirements  Automation of standard procedures to make on site service more efficient
  • 57. Page 14WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization Q&A Thank You  Contact us for next steps: Germany: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790  www.wibu.com, info@wibu.com