The document discusses best practices in software monetization from a customer perspective. It covers key considerations in choosing a license management system, including that the system needs to be seamless, scalable, and secure. It also profiles Wibu-Systems as a vendor, noting their license management system is seamless in development and deployment, scalable across platforms and licensing models, and maintains a strong focus on functionality and security.
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
Â
Customer Centric View of Best Practices in Software Monetization
1. Page 1WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Oliver Winzenried
CEO
oliver.winzenried@wibu.com
Customer centric view of
best practices in software monetization
Welcome to our Webinar
2. Page 2WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Webinar Agenda
ï§ Introduction of speakers
ï§ Avni Rambhia, Senior Industry Analyst, Frost&Sullivan
ï§ Ruediger Kuegler, Security Expert, Wibu-Systems
ï§ Oliver Winzenried, Founder and CEO, Wibu-Systems
ï§ Intro Wibu-Systems by Oliver Winzenried
ï§ Solution Demonstration by Ruediger Kuegler
ï§ F&S requirements analysis and conclusions
ï§ Some use cases
ï§ Q & A: Questions and Answers
3. Page 3WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
1989... 2012: > 20 years WIBU-SYSTEMS
ï§ Founded 1989 by Oliver Winzenried
and Marcellus Buchheit
ï§ Privately held independent company
ï§ Headquarters at Karlsruhe, Germany
ï§ Subsidiaries in: USA, Netherlands, Belgium,
China, Spain, Portugal, United Kingdom
ï§ Focus on Protection, Licensing and Security
4. Page 5WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Software Monetization: Maximizing revenues
Help customers to sell more.
Due to
ï§ less product piracy
ï§ increased target user groups
ï§ flexible licensing
5. Page 6WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Challenges
Piracy
Reduction
IP
Protection
Production
Data
Features
on Demand
Access
Control
Integrity
Protection
6. Page 7WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
The solution: CodeMeter Technology
CF-Card
CmCard/CF
SD-Card
CmCard/SD
USB
CmStick/C Basic
”SD-Card
CmCard/”SD
USB
CmStick
Link to the data sheets:
http://www.wibu.com/en/hardwarebasierter-kopierschutz.html
Intern
CmCard/I
Express-Card
CmCard/E
Activation
CmActLicense
PC-Card
CmCard
Chip
CmASIC
7. Page 8WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Thousands of Customers, Millions of Dongles
11. Page 4Wibu-Systems 2012
ï§ User gets his ticket
with order confirmation
delivery notice
ï§ User starts software
and activates it
ï§ Software is ready to use
ï§ Activation via customer
portal
ï§ Offline license file transfer
View of the User
22. Page 15Wibu-Systems 2012
Realizing license models
Single User License
Floating Network Licenses
Software Renting
Pay-Per-Use
Modular Licensing
Trial Licenses
Downgrade License
Software Assurance
High Availability Licenses
âŠ
Text
License Quantity
Expiration Time
Usage Period
Unit Counter
Feature Map
Product Code
Maintainance Period
Customer Own License Information
âŠ
LicenseModels
ProductItemOptions
23. Page 16Wibu-Systems 2012
Secure license storage
ï§ CmActLicense
ï§ State-Of-The-Art Binding to
hardware fingerprint of PC
ï§ Dynamic fingerprint
ï§ Tolerance level
ï§ Trial license mode
ï§ Extendable
ï§ CmDongle
ï§ Hardware with secure Smartcard chip
ï§ Mobile usage
CmDongle
Software
CmActLicense
CodeMeter License Server
24. Page 17Wibu-Systems 2012
SmartBindÂź: Generation of Binding
HD ID
Mac
2
CPU
type
CPU ID TPM ID
Mac
1
âŠ
HD ID
CPU
type
CPU ID
Mac
1
âŠ
HD ID
CPU
type
CPU ID
Mac
1
⊠Redudancy Bits
Fingerprint Inventory List Redudancy Bits
Catalogue
Available Properties
Property Vector
25. Page 18Wibu-Systems 2012
Original Property VectorHD ID
CPU
type
CPU ID âŠ
Mac
1
SmartBindÂź: Check of Binding (== OK)
HD ID
Mac
2
CPU
type
CPU ID TPM ID
Mac
1
âŠ
HD ID
CPU
type
CPU ID
Mac
2
âŠ
HD ID
CPU
type
CPU ID âŠ
Fingerprint
Catalogue
Current Available Properties
Reconstructed Property Vector
Inventory List
Redundancy Bits
26. Page 19Wibu-Systems 2012
Original Property VectorHD ID
CPU
type
CPU ID
Mac
1
âŠ
SmartBindÂź: Check of Binding (!= OK)
HD ID
Mac
2
CPU
type
CPU ID TPM ID
Mac
1
âŠ
HD ID
Mac
2
âŠ
HD ID âŠ
Catalogue
Inventory List
Redundancy Bits
Remaining Gap
CPU
type
CPU
type
Different CPU ID
Current Available Properties
28. Page 22Wibu-Systems 2012
Integration into the Software
ï§ Automatic Protection
ï§ AxProtector
ï§ Windows 32-bit / 64-bit, Mac OS X, Linux .NET
Assemblies, Java J2SE and J2EE
ï§ Software Protection API
ï§ IxProtector
ï§ Encryption of code parts
ï§ Automatic implementation of cryptographic challenges
ï§ CodeMeter Core API
ï§ Additional functionality (Online Activation)
46. 1
A Note to the Analyst
This template is designed to allow a new Frost & Sullivan analyst to create a high quality deliverable that
meets or exceeds the standards expected by our clients. At the same time, it is not designed to inhibit
more experienced analysts in creating additional valuable content. The minimum requirements for all ME
studies completed in PowerPoint are contained in this template. Analysts are encouraged to go beyond
these required slides and provide additional information if clearly adding value for clients. In creating new
slides, remember that literally, one picture is worth one thousand wordsâchoose graphics over text
whenever possible and use the PPT TimeSaver 2.0 to ensure consistent, high quality look and feel.
Analysts are not to change the order of or delete slides/sections, unless clearly not relevant to the topic
under studyâsuch deletions or changes must be justified to both the Strategic Review Committee (SRC)
and assigned editor. Text contained should never be less than 14 pitch Arial font except where
otherwise noted, in footnotes, or chart/graph labels. PPT charts should use the âbeveledâ style shown
herein (called âStyle 26â in Office). No text or graphics should extend into the border of a slide. Red font
in this template is used ONLY to provide instructions or indicate where variable text should be inserted;
generally red font should not be used in the text of final deliverables, except for extreme emphasis. Slide
titles must be less than 300 characters to properly upload onto Frost.com. Hyperlinks will work in PPT
when in presentation mode and when put into PDF format. Finally, suggestions for improvement are
encouraged; please provide them to: dan.goldenberg@frost.com and rufus.connell@frost.com.
Best Practices In Software Monetization â A
Customer Perspective
Avni Rambhia, Industry Manager
Digital Media Group
December 2012
47. 2
Lecture Capture & Video Webcasting
Video
Enabled
Consumer
Devices
Broadcast &
Cinematography Cameras
Encoding & Transcoding
Acquisition DeliveryMiddleware and Workflow
Enterprise
Media and
Entertainment
Encoding & Transcoding
Digital Asset Management &
Enterprise Content
Management
MediaAsset
Management
Video &Ad
Insertion Servers
Nonlinear
Editing
IRDs
Online Video & Web
Analytics
Multi-Platform
Delivery &
CDNs
Multi-Platform
Delivery &
CDNs
Content Protection, Entitlement
& Rights Management
STORAGE
STORAGE
MarketingAutomationMarketing Process Optimization
Dynamic Publishing
Animation Software
Animation & CAE
Software
3D
Technologies
Video
Switchers
IP Video Network
Management
Online Video
Platforms &
Analytics
Enterprise Search
Pay TV
Platforms
Online Video Platforms
Digital
Signage
Content Protection, Entitlement
& Rights Management
Broadcast
Scheduling
Systems
Covering The Digital Media Value Chain
Source: Frost & Sullivan analysis.
48. 3
Security
Entitlement Management
Monetization = Entitlement Management + Piracy Prevention
Entitlement Management is Necessary
âą Define software SKUs, define and enforce licensing policies
âą Back-office functions: license generation, tracking, transaction management and more
âą Usability functions: transferring & upgrading licenses, auditing usage and more
âą EM is the basic foundation upon which LM is built
Security is Hard, But Another Side of the Same Coin
âą Rich EM routines are meaningless if they can be trivially bypassed or circumvented
âą Enforcement implicitly assumes security
âą Controlling digital software is hard; technology advancements favor hackers
âą Keeping honest users honest often seems like a more reasonable target
âą This is not a viable long-term monetization strategy; much lower ROI on LM investment
49. 4
Losses from
piracy can
become
significant,
and they hurt
both software
vendors and
their
customers.
Source: Frost & Sullivan
China placed second in the world in the number of connections made to share unauthorized
copies of ESA membersâ game products â accounting for more than 11.5% of the worldâs
total..âŠRussia has not signaled a serious commitment to addressing piracy occurring through
the Internet, which has exploded [because there is] no legal framework for addressing online
piracy, coupled with steadily growing consumer access to broadband. - United States
Congressional International Anti-Piracy Caucus (IAPC)
[Competitors using pirated software undercut legitimate licensees on price, creating a negative feedback
loop.] If EDA industry doesnât secure a level playing field for our customers, our industries will suffer
greatly â EDA Consortium
Losses From Piracy Are Real
In the industrial sector, 2 in 3 members of the VDMA (the German Engineering Federation)
have already experienced product piracy and/or counterfeiting.
All told, intellectual property theft costs U.S. businesses billions of dollars a year and robs
the nation of jobs and lost tax revenues. â U.S. Federal Bureau of Investigation (FBI)
Worldwide, 42 percent of software used in 2011 was unlicensed - Business Software Alliance
50. 5
Key Market Trends in Software Monetization
âą Keeping software monetized and keeping IP secure is a
harder challenge in international markets
âą An issue for your customers, as much as for you
âą License Management needs to keep pace
with evolving business models and product
architectures
âą Analytics is increasingly important
âą Installation complexity, run time cost and
performance impact are increasingly non-negotiable
âą At the same time, security is also increasingly non-
negotiable
âą This nudges LM towards being a first-class feature
rather than an afterthought
âą Homegrown LM highly prevalent in the market today
âą Fragmented platforms, multiple business models, cost control
pressures, need for security and speed of innovation necessitate
a formalized LM strategy
Market
Trends
Geographical
Expansion =
Piracy
Exposure
SaaS and
Hybrid Form
Factors
Complement
On-Premise
User Experience
Around License
Management Is
High Priority
Feature
Homegrown
LM is not
commercially
viable for most
ISVs
Peak activity
between now
and 2014
Peak activity
2014 to 2016
52. 7
Vendor Profile: Wibu-Systems
Seamless
0
1
2 3
4
5
Scalable
0
1
2 3
4
5
Secure
0
1
2 3
4
5
âą Seamless in development and deployment
âą License Central can be quickly personalized, or
custom-built for ISV infrastructure/CRM system with
support from Wibu-Systems
âą CodeMeter dongles move freely from computer to
computer or server to server
âą Dongles are aesthetic branding opportunities
âą Tolerance built into activation verification minimizes
false positives and disruption
âą Scalable in terms of architecture and platforms
âą CodeMeter dongles support number of interfaces
âą Desktop, embedded and server platform support
âą Wide range of licensing model support
âą Protection process works the same way for
CmDongle and CmActLicense, so ISVs can use
either or both equivalently.
âą Standardized encryption algorithms
âą Company maintains an equivalent ongoing focus on
functionality and security
âą Internal innovation driving improved hardware and
software locking and security technology
âą External hacker challenges used regularly to test
and validate company products
53. 8
Critical
License management systems, once deployed, are very hard to replace.
The process is deeply disruptive and extremely expensive. So choose
carefully the first time.
Urgent
Key
Start with a clear view of prioritized functional requirements and
business-appropriate security and cost targets. Then, choose a
license management solution that fits.
Essential
Basic
Crafting a License Management Strategy: Key Takeaways
Key takeaways for an ISV, in descending order
Ensure your chosen solution will scale with your business and evolve
with your product over time, and can also keep pace with expansion
and evolution of your customers.
Proactively craft a strategy and execute it with cross-team
involvement including technical and financial management,
marketing, engineering, testing and operations.
Security and piracy management is as important as entitlement
management in crafting a comprehensive license management
solution for your products and your business.
54. Page 11WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Customer Use Cases: Bosch Aftermarket
Software Monetization:
ï§ Application for Aftermarket business
ï§ Easy deployment is necessary for users
ï§ Subscription based licensing
ï§ CmActLicense at user side
ï§ License Central for sales process integration
55. Page 12WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Customer Use Cases: Sirona
Software Monetization:
ï§ IP protection
ï§ High performance .NET protection
ï§ Integrity protection (MPG)
ï§ Increased market through flexible licensing
ï§ License Central in sales process
56. Page 13WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Customer Use Cases: Wincor Nixdorf
Software Monetization:
ï§ Protection against unauthorized use
ï§ Access control for diagnostic functions
ï§ Document encryption for manuals / service infos
ï§ Fulfillment of PCI DSS requirements
ï§ Automation of standard procedures
to make on site service more efficient
57. Page 14WIBU-SYSTEMS - Frost & Sullivan webinar: a customer centric view about best practices in software monetization
Q&A
Thank You
ï§ Contact us for next steps:
Germany: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
ï§ www.wibu.com, info@wibu.com