Perfection in Software Protection, Licensing and Cybersecurity show

Perfection in Software Protection, Licensing and Cybersecurity

Summary: In its mission to deliver unique, most secure and highly versatile technologies to software publishers and intelligent device manufacturers, Wibu-Systems has developed CodeMeter, a comprehensive and award-winning suite of hardware- and software-based entitlement solutions for the protection of software rights and technical know-how against piracy, reverse engineering, tampering, sabotage, and espionage.

Join Now to Subscribe to this Podcast

Podcasts:

 The Effort Performance Relationship in Software Protection | File Type: video/mp4 | Duration: 1:02:49

“Less is more” is a popular oxymoron. In software protection, most ISVs might express this commonplace statement as "I would like to achieve maximum protection with minimal effort". But is this possible at all? Can you really expect the strongest encryption method with just a minimum investment in your own resources? Wibu-Systems has solved this paradox with CodeMeter Protection Suite. Guided tools that encrypt a compiled application or a library in an automatic and secure way are made available for all common platforms. AxProtector, AxProtector .NET, and AxProtector Java are your reliable companions for this rapid and straightforward process. For the optimal protection of your software application, the code should be split into individual parts and dynamically reassembled at runtime. AxProtector .NET and AxProtector Java take care of this operation in a fully automated fashion for you. But what about native applications and libraries that are protected with AxProtector? In this case, IxProtector, integrated with AxProtector, takes over this procedure for you. You can choose between semi-automatic and fully manual controls. This is where Translocated Execution enters the scene and inserts automatic decryption routines into your application. In addition to the implementation of simple automatisms, Translocated Execution also moves executable code into memory. Functions are temporally superimposed, so that finding a dedicated function in a memory dump becomes a matter of pure luck for a would-be attacker and a systematic memory dump of all functions becomes practically impossible. In short, Translocated Execution offers two main advantages: The automatic decryption and execution of the code reduces your manual efforts to a minimum Moving code into memory increases security standards against memory dumps. Get to know the theory behind Translocated Execution in our next webinar, see the necessary steps live, and learn about the available optimization options. A combination with additional security techniques like traps, which are also an essential part of Blurry Box cryptography, is also possible at any time. In this brand new masterclass, we are going to cover some of the core technology concepts and several innovative features: An overview of CodeMeter Protection Suite Basic principles underpinning AxProtector Basic principles underpinning IxProtector Translocated Execution Live demo Security considerations During this one-hour together, we will prove how extremely secure software protection mechanisms can be implemented with little effort. Translocated Execution will raise the security bar for hackers, as the wizard for AxProtector and IxProtector will automatically disassemble your application into many small parts that are dynamically re-assembled at runtime. A minimalist approach to software protection made possible by CodeMeter Protection Suite.

 Activating Software like a Wizard | File Type: video/mp4 | Duration: 1:26:55

Picture this: You need to change the license of one of your clients, and the user finds his entitlements updated next time he starts the software. Updating software entitlements like magic is possible. With CodeMeter License Central, Gateway, and Software Activation Wizard, you can easily and quickly implement license changes in your software. And the more effortless and straightforward this process becomes, the more likely it is that your customers are fully satisfied and the less support resources you’ll require for your license management. The use cases for the automatic modification of licenses are numerous. These include: Entitlement and disablement of functionalities Disablement of the complete license Automatic renewal of a subscription after payment Automatic update of license checkpoints Automatic renewal of the maintenance contract With automatic updates, the user is not requested to perform any action, i.e. he does not have to activate the changes via a portal himself. This is not only easier, but it also gives you full control over the entitlements of your software. The Software Activation Wizard can be completely tailored to meet your requirements: you can integrate it into your software and optionally adapt it for your own processes or customize it in compliance with your own corporate design. In addition to reducing costs by automation, Software Activation Wizard offers the possibility to track data and pass it on to CodeMeter License Central. One popular application is the registration of users during activation. This is an especially interesting option if the licenses are sold via different channels and you want to understand which users have purchased your software. You can also have free software activated and registered with this powerful tool. In this case, the license is created automatically under the hood during the activation process, and you get to know who is actually using your software. For named user licenses, the user name can also be conveniently recorded and associated with the license. In this live training, we are going to cover a lot of ground: Basic functions of Software Activation Wizard Activating licenses Disabling licenses Restoring licenses Finishing incomplete transfers Advanced functions Activation-defined parameters Collecting registration data Activating licenses in the network Real-life use cases Subscription models User-bound licenses from the cloud Disabling and locking licenses Free software registration Automatic generation of free and demo licenses Interaction with WebDepot Customization of the user interface

 Licensing Craves the Cloud | File Type: video/mp4 | Duration: 1:00:54

The cloud has found its way into our daily lives. This starts in the private sphere with music streaming services and has now reached IoT devices that load your machine handbooks into the cloud in a secure and authenticated fashion. The same also applies to software licensing and digital content: unimaginable without the cloud. With CodeMeter License Central, Wibu-Systems has for many years been offering a solution for distributing licenses simply and securely across the cloud. But CodeMeter License Central has even more to offer: With automatic extensions, time restrictions, and license returns, CodeMeter License Central is the most versatile kit for cloud licensing in the market. In addition to licensing, CodeMeter License Central and its CodeMeter Cloud Lite extension provide a simple and streamlined way to use licenses directly in the cloud. During this session, we will examine three different cloud licensing projects centered around CodeMeter License Central: Project #1: User License on Two Devices The software is a Windows-based application that runs on the local PC of a user. The user installs the software on two separate devices. Both installations are connected to the same vendor‘s user account. The software works offline without any time limitation. Should the user want to use the software on a third device, he should first deactivate the license on one of the existing devices. If the device is offline at the time of license deactivation, the license will be automatically deleted as soon as an internet connection is established. Project #2: Online License Request for Service Technicians A service technician uses a locally installed software. At every start of the application, the software checks for the license in the cloud and extends the license in the local cache by 30 days. If the service technician is offline, the license is still running for 30 days. If the technician stays offline for more than 30 days, the license stops running from day 31. A license administrator can assign new licenses and thus new entitlements to the service technician via a dashboard in the cloud. These will be updated automatically the next time the software is started. Project #3: Mixed On-Premise / Cloud Licenses A vendor offers both on-premise software and SaaS services. Both can be provided with the same licensing technology, since CodeMeter License Central is already integrated with SAP for the creation of on-premise licenses. SAP handles on-premise and cloud licenses in the exact same way; it is CodeMeter License Central that decides how the license is used. Join us for this webinar to learn about the requirements and the implementation techniques that will allow you to create effective and customized cloud licensing projects. During the class, we will cover several interesting aspects of cloud licensing that are currently available: Foundations of CodeMeter License Central CodeMeter licenses in LAN, WAN, and the cloud Simple licensing with CodeMeter Cloud Lite Real-life projects from the field User license on two devices Online license request for service technician Mixed on-premise and cloud licenses Overview of possible additional developments with CodeMeter cloud licensing

 A Shelter to Protect Your Documents | File Type: video/mp4 | Duration: 1:02:53

Protecting the intellectual property associated with digital assets that come in a form other than software applications requires a different approach and dedicated tools. Technical, legal, and commercial know-how is frequently shared in a business environment, and the authors want to make sure their assets do not end up in the hands of unauthorized personnel or competitors, let alone media outlets. Certain reports are also for-sale products, in which case their cloning or distribution with non-eligible parties means an immediate monetary loss. However, a file that needs a standard application to be opened cannot include encryption and decryption methods: While CodeMeter Protection Suite protects software against illicit actions, SmartShelter and CodeMeter Core API are responsible for protecting and licensing digital documents. SmartShelter is available in two flavors: SmartShelter|PDF, a certified plugin for Adobe Acrobat and Adobe Acrobat Reader that provides additional security functions on top of Adobe’s native protection mechanisms; these include the creation of stronger passwords unknown even to the file author, the storage of passwords on a computer-bound license file or a hardware secure element, and monitoring for disallowed applications. Additionally, the integration of CodeMeter License Central enables the generation of all CodeMeter licensing options and offers full control over the entitlement process. SmartShelter|SDL, a secure data layer for any type of document that slips in between the operating system and the document reader. It configures which operations are allowed and which are prohibited based on the license rights: the ability to open, read only, or save documents is totally regulated with a fine-grained management console. Set yourself up for success with our new live worldwide event: In this new masterclass, we will see: How document protection differs from software protection Four basic scenarios for protecting documents The documents take the form of PDF files that are displayed with a PDF viewer The documents are opened and saved with one of your own applications The documents come in a standard format and are opened and saved with a standard application The documents come in a different standard format and can only be viewed with a standard document viewer application DEMO: SmartShelter|PDF for protecting PDF files DEMO: SmartShelter|SDL for protecting and licensing standard documents DEMO: CodeMeter Core API for protecting and licensing files with a proprietary format Whether the prosperity of your business depends on protecting the IP of the documents you sell, the data your software produces, or the data from third parties you process, your top priority is defending your finances and reducing your liability risks.

 Dominating Industrie 4.0 with Secure Software Licensing | File Type: video/mp4 | Duration: 1:08:15

The future of the industry is digital and intelligent, powered by know-how expressed in software that enables collaborative robotics, Big Data and analytics, IIoT and M2M, augmented and virtual reality, and 3D printing. Collaboration between the makers of innovative solution and manufacturing companies promotes the dissemination of the Automation 4.0 culture, the understanding of its implications for competitiveness, and the implementation of successful use cases. At the core of the new infrastructure, we find Cyber Security 4.0 and Digital Business 4.0, both facilitated by CodeMeter Embedded 2.0. The brand new generation of CodeMeter Embedded provides a broad spectrum of new features: An extremely compact footprint: the technology is modular, so it’s your choice how to combine the modules you need and build a fully customized solution for your project. Established compatibility with embedded systems and PLCs to cover the complete gamut of intelligent devices you intend to deploy. Wider compatibility with platforms and operating systems; if you use a mainstream system, including ARM, Intel, and PPC, we deliver the corresponding libraries to you; if you use more exotic platforms, the source code is directly available to you. Compatibility with the complete array of Wibu-Systems’ hardware and software secure elements: CmDongles, CmActLicenses, and CmLAN (License Server in a Network). Compatibility with CodeMeter Runtime: no need to pick different solutions for complex architectures; CodeMeter covers all options at once. Compatibility with CodeMeter Protection Suite, because top notch encryption is the starting point of all communication. Compatibility with CodeMeter License Central: once security is in place, you can get on with creating, distributing, and managing your embedded software licenses and start monetizing your business. Live a fully immersive experience in our next masterclass During this webinar, we will intersperse theory and practice: The common ground between CodeMeter Runtime and CodeMeter Embedded Overview of all the license models CodeMeter Embedded supports Inventory of all the supported CmDongles and third party hardware secure elements (including TPM) for CmActLicenses ExProtector and AxProtector CmE: the dedicated modules of CodeMeter Protection Suite for CodeMeter Embedded CodeMeter Core API: a powerful tool for robust cryptographic operations Demo: How to encrypt with CodeMeter Core API Demo: How to encrypt with CodeMeter Protection Suite Demo: How to run CodeMeter License Central in offline mode with CodeMeter Embedded Demo: How to license your IoT embedded software online

 IIoT Endpoint Security – The Model in Practice | File Type: video/mp4 | Duration: 1:00:09

What is your first line of defense against cyberattacks? Secure endpoints! Endpoints are everywhere in the IIoT landscape. Without proper security, Industrial Internet of Things (IIoT) systems are not trustworthy, putting organizations, their missions and the greater public at increased risk. The viability of the IIoT depends on proper implementation of security to counter the growing and ever changing threats that are emerging. Addressing this challenge is critical to the success of the Industrial IoT, Industrie 4.0 and the Industrial Internet revolution. To that end, Industrial Internet Consortium members have developed a common security framework and an approach to assess cybersecurity in Industrial Internet of Things systems: The Industrial Internet Security Framework (IISF). The editors of the IISF and security experts from the Industrial Internet Consortium will discuss the endpoint protection/security model and policy in its Industrial Internet Security Framework (IISF) document and present a real-world customer use case for an approach taken to secure an industrial system. Watch the recording to learn: Securing the IIoT and why it differs from securing the IoT Important elements to consider in securing IIoT endpoints The significance of endpoint data protection, physical security, root of trust, endpoint identity, access control, monitoring and analysis, secure configuration and management, and integrity protection This webinar is part two in a series of monthly webinars offered by the Industrial Internet Consortium. Be sure to see the previous webinar, now available on-demand.

 OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories | File Type: video/mp4 | Duration: 1:06:37

The Industrial Internet of Things has set the stage for the convergence of Operations Technology (OT) and Information Technology (IT), that is, the plant floor and the higher-level IT infrastructure. One of the many aspects of this transitional journey is represented by M2M communications. OPC UA is a multi-platform, plug & play Information Exchange Standard for industrial smart automation and cloud networking. It standardizes communications within machines, between machines, and from machines to smart systems, securely networked with IoT architectures. As a member of the OPC Foundation, Wibu-Systems has been an early adopter of the OPC UA standard in Industrie 4.0 projects like IUNO, the German national reference project for IT security in Industrie 4.0, S4SmartPro, the key finder prototype production line of SmartFactoryKL, and OpSit, the optimal use of smart items technologies in healthcare. As recently pointed out in the Industrial Internet Security Framework as well, it is endpoints, i.e. the device or cloud-based components that have interfaces for network communication, that are particularly vulnerable in a world of cyber-physical systems connected to open networks. The Unified Automation ANSI C based and High Performance OPC UA SDKs, powered by CodeMeter Embedded, fully support the OPC UA defined Security Profiles and configurations and provide even stronger security for modern M2M communications. Secret information, like RSA private keys, certificates, and trust lists, is stored in a hardware secure element and protected from theft and tampering attacks. In a time when intellectual property is shifting in the value chain from hardware to software, manufacturers now also have new opportunities to capitalize on their software and offer feature-based, time-based, version-based, or pay-per-use models to scale up their offerings, expand their market share, and produce recurrent revenues. Join Thomas J. Burke, President and Executive Director of the OPC Foundation, and Oliver Winzenried, CEO and co-founder of Wibu-Systems, for an insightful conversation on: In this one-hour session, we are going to navigate you through a journey of exploration that will touch upon: The elements of innovation in smart manufacturing The connection requirements for M2M in the IIoT age The building blocks of the OPC Unified Architecture Use cases that are accelerating the rise of Smart Factories The integration of CodeMeter in the OPC UA standard The OPC UA security extension for endpoints Working with Windows, Linux, macOS, or Android? With minimal embedded controllers up to massive cloud infrastructures? OPC UA and CodeMeter are equally suited, scalable, and secure, and most of all integrated in a streamlined fashion to provide the ultimate technology in access control, authentication, and encryption.

 To Bundle or To Nest? - That is the question! | File Type: video/mp4 | Duration: 58:35

CodeMeter License Central 3.0 is just around the corner. One of its newest features is the support for Nested Product Items. With Nested Product Items, modules can be logically grouped together, and the licensing process can be further simplified. You may wonder whether this new feature is actually not already covered by the current bundles. This question will be answered alongside many others during the forthcoming webinar. We will present the differences between bundles in CodeMeter License Central and Nested Product Items in the license, and discuss which variant is the ideal fit for you. You can achieve your goal in both cases: To sell software functions separately with the implementation of modular licenses. Not only does this business approach offer low-cost entry-level versions, but it also tailors your software to the actual and unique needs and budgets of your customers. Experience a sneak peek at CodeMeter License Central 3.0, and see live how Nested Product Items are configured and used in licenses. Learn how the resulting licenses are displayed and how this configuration affects the borrowing and use of the licenses. During this one-hour live session together, we will delve into: Use cases for Nested Product Items Technical implementation Differences between bundles and Nested Product Items Borrowing and using transferred licenses Demo: Creating an item in CodeMeter License Central Creating and activating a license Borrowing a license with Nested Product Items Whatever option you choose, make sure the licensing process of your software is accurately designed to protect your intellectual property, boost your revenues, and meet your customers‘ demands.

 Perfecting the Art of Unmasking the Hackers | File Type: video/mp4 | Duration: 1:04:36

Textbook cryptography can work in many cases, such as email encryption. But for software protection, theory is not enough – why is that? The author of an email is self-motivated (or not) to preserve the secrecy of his message. By contrast, the user of a software application is mostly interested in the application working seamlessly. Having a properly protected application or preserving security measures are far from his top priority. He is not above deception and disguise if it means fiddling with the system in order to reach his purpose: perfect convenience for himself as the user in the best case, piracy in less honorable cases. In this context, the use of traps, especially in connection with an irreversible locking of the cryptographic key, proves extremely effective. You may be familiar with spy movies, where devices self-destruct after delivering a message. In software protection, the destruction sequence starts when a trap is triggered. Typically, an end customer uses the software without realizing that traps are even present. A hacker, instead, will trigger them in his attempt to reverse engineer the software. This masterclass is going to classify the attack methods used by hackers and explore effective ways to safeguard ISVs against them. After outlining the concepts, we will give a live demonstration of  how to integrate traps in your application. With AxProtector .NET, integration is carried out automatically for you. If you prefer pulling the strings yourself or if you are dealing with a native application to protect, AxProtector .NET or AxProtector provide all the necessary freedom. During our time together, we will see both the manual and the automatic options. Here are the main topics we are going to delve into: Typical attack methods of hackers Dynamic code analysis Static code analysis The concept of traps Definition of traps Secret messages to the dongle How traps are triggered Integration in .NET applications Fully automated with AxProtector .NET Manually in the source code Integration in a native Windows application Manually in the source code Simulated triggering of a lock Make the hackers’ mission impossible: Plant perfectly crafted mines in the code, and let them work for you.

 The License Portal – A Golden Pot of Opportunities | File Type: video/mp4 | Duration: 1:01:16

The scope of a license portal goes way beyond license activation. When software administrators access the portal, they expect to easily manage the licenses they have purchased and typically have two main questions in mind: "How many licenses do I have left?" and "On which machine is a certain license?". The license portal should deliver an immediate and clear answer to them. A software publishing startup that is about to commercialize its first application would explore the available license portals in search of a solution that offers not just automatic communication with its customers and saves support costs for the company, but also manages all license entitlement actions. More experienced ISVs that are already using WebDepot may be interested in more advanced features, such as integration with third party systems or even the coupling of proprietary solution with a fully comprehensive technology. CodeMeter License Central WebDepot fulfills the requirements of all parties involved in license lifecycle management. This new masterclass will bring value to all software-powered businesses and present an excursus from basic principles like activation, de-activation, and re-activation to the latest functionalities, like restoring a lost CmContainer on the same computer, resuming a transaction that was interrupted, or distributing enforced updates. Two of the main features of WebDepot are adjustable versatility and seamless integration into third party systems. If you don’t operate a customer portal yet or if you rather want to use the license portal as a separate solution in parallel with your existing portal, WebDepot comes in handy. During the online event, we will show you how you can customize WebDepot to match your corporate design style, even without any particular programming skills, and realize an efficient workflow with a simple configuration. For broader requirements, WebDepot provides a number of programming interfaces that can extend its core scope. Even if you were already using a customer portal, you can still integrate WebDepot to achieve greater customer satisfaction. Depending on your framework and requirements, you can either simply connect WebDepot to your customer portal and use it directly or implement WebDepot functionalities into your own portal. During the live session, we will review a number of examples and best practices of effective integration from real life scenarios. Alternatively or additionally to WebDepot, you can have your licenses activated by integrating the activation wizard in your own software. If you now ask yourself whether you then need to double-map your workflow, the answer is: No. Only the user interface is going to be available twice, in the portal and in your wizard. The business logic on the server, which maps most of the workflow, is identical. ActivationGateway, which your activation wizard uses to communicate with CodeMeter License Central, is derived from WebDepot. Topics: Online activation with WebDepot Online activation with the software wizard and ActivationGateway New functions of WebDepot Customization of WebDepot to reflect corporate designs Overview and examples of WebDepot extended functions Integration in third party systems Customizations of the software activation wizard  

 A cash machine for your software | File Type: video/mp4 | Duration: 1:06:01

Subscription models are enjoying rapidly growing popularity. Software vendors have come to see them as an automatic cash machine, while, for the user, they represent full flexibility in their loyalty to the vendor. Especially when addressing the B2C market, subscription models have become an imperative. Think of antivirus applications, online games, memberships to online communities, or office applications that we all use year after year and renew on a regular basis. The B2B sector is making steady strides in the same direction. Not all license and maintenance subscription models are born equal, though. Some applications can be used only for as long as the license right is valid and stop running after the expiry date. Others can still be executed, but won’t give access to additional upgrades or updates that are released after the expiry date of the maintenance contract. CodeMeter can handle both modalities and lets you decide the best option for your own business. With CodeMeter and CodeMeter License Central, you can set up your subscription model in minutes. And with an e-commerce solution like Cleverbridge or an ERP system like SAP, you can also automatize the back office process and the collection of your revenues. The key factors for a successful subscription implementation are: Ease of use for the subscription workflow and the user's interface Ease of use for the automatic renewal A pricing point that is proportionate to the perpetual license, for all those ISVs who create both license models During this one-hour demonstration, we are going to step into the shoes of all the people involved in the process: Basic foundations of subscription models License subscriptions Software purchase and subscription of a maintenance plan Pricing of software subscriptions The user’s perspective Sign up of a subscription model in an online shop Activation of the subscription Automatic renewal of the subscription The ISV’s perspective The online shop CodeMeter License Central The developer's perspective Configuration of the online shop Configuration of CodeMeter License Central Implementation of automatic renewals Configuration of WebDepot Software updates Subscription models are the cash cow in software sales. A one-off investment produces steady recurring profits. Master the online game, and become the next Scrooge McDuck.

 Unleash the power of CodeMeter | File Type: video/mp4 | Duration: 1:16:45

Over the history of Wibu-Systems, there have been certain recurring reasons that have brought customers to select protection and licensing solutions: usually, these were software getting hacked, revenues lost, the inability to keep up with a homegrown solution in the long run, the wish to supply multiple licensing models, or the plan to integrate licensing into an existing back office system. However, when your primary needs are met, there’s still a ton of features that remain underutilized or not explored at all, just as happens with the configuration of our smart phones or the office applications we use every day.   Overview of CodeMeter Integrate Once and Deliver Many: This has been our motto for more than 25 years. With the new breed of CodeMeter, we have brought this strategy to a new level. Learn how you can protect your software in a way that the next developments from Wibu-Systems can be enjoyed automatically without needing any adjustment to your software. CodeMeter Core Features Licensing is not child’s play; there are several technical, commercial, and marketing aspects to take into account in your overall strategy. CodeMeter offers a wide array of options for you. Our experts will show the best approach for each use case, the options that are applied the most, and the ones that are put into practice the least. Firm Code, Product Code and License Options CodeMeter Runtime – what you actually deliver to your end users Setup of CodeMeter in a Network Environment License Transfer – the art of borrowing licenses Integration in the Software To achieve effective security against piracy and reverse engineering, integrating CodeMeter into your software is one of the most delicate steps in the entire process. The Protection Suite offers a complete set of automated tools for the easy and secure encryption of your application or library. Additional APIs complement the technology and are specifically recommended for special purposes. Automatic Encryption with the Protection Suite WUPI: Software Protection API CodeMeter Core API Integration with Back Office Processes A key success factor in license lifecycle management is a smooth progression from license creation to license delivery. CodeMeter License Central provides a simple and intuitive interface for creating licenses that can be integrated through SOAP interfaces with existing systems, such as SAP, Navision, Salesforce, Digital River, and many more. The usual complex process of transferring licenses is reduced to simple point-and-click with our online activation system. Integration options CodeMeter License Central – Editions and interfaces Online activation over WebDepot and the Software Activation Wizard This class is open to both newbies and pros. Regardless of your current expertise in protection and licensing, you will walk away with some priceless takeaways that will enrich your practices and make your business fly.

 Smart factories redefine security paradigms | File Type: video/mp4 | Duration: 1:07:36

While the world still seems undecided on which terminology to use, the new industrial revolution has started and is already transforming the way we plan our future. Fuelled by the need to optimize the complete production lifecycle, make wiser use of natural resources, respond to fast-paced market changes, and level profitability across the globe, the new concept of Smart Factories was born. We see several research hubs, laboratories, and aggregators in action across the globe, where private, public, and academic entities are collaborating to define the guidelines, best practices, and use cases for the new smart manufacturing world. The topic is still hotly debated, but it has already defined some fundamental building blocks: Telecommunication – for the estimated 500 connected devices for every person that are expected to exist by 2020, we need fast, secure, and widespread distribution of internet access points and datacenters Big Data – for decision management platforms to expand at a foreseen CAGR of 60% through 2019, we need enhanced data processing and security algorithms Security in the most pervasive way – being secure, vigilant, and resilient is the new black in the connected age The Industrial Internet Consortium (IIC) was founded in 2014 to promote the discussion between the leading vendors in IIoT and guide the future generation of intelligent manufacturing.  In their exclusive presentation, Dr. Richard Soley, IIC Executive Director, and Oliver Winzenried, CEO and founder of Wibu-Systems, are sharing: An outlook on today’s and tomorrow’s manufacturing notion The role of IIC in coordinating a vast ecosystem of initiatives The surge of Smart Factories in the IIC agenda The security implications of the rise of AI in an industrial context The reasons behind an endpoint security approach The projects WIBU is engaged in for the development of secure smart factories The turnkey technologies that are already available for safeguarding and monetizing the intellectual property of intelligent device manufacturers The new generation of embedded system developers is essentially in the same predicament that ISVs of traditional PC applications found themselves in years ago. Let’s openly share the state of the union and forge secure and connected supply chains together.

 Get your Licenses in Pole Position | File Type: video/mp4 | Duration: 1:03:24

All international surveys about software monetization agree on one thing: static or perpetual licensing models belong to the past. A strategic and proactive approach to licensing revitalizes software publishers’ sales and offers the convenience that users have come to expect.CodeMeter License Central 2.20 is a powerful answer to the question of high productivity / low time impact, and features three new license management highlights: The configuration of transferable licenses for unrivaled ease of use The bundling of products for a simplified management of modular licenses A beautiful redesign of WebDepot and Gateway for license activation by the user Topics Transferrable licenses offer your users the option to temporarily borrow a license from a license server to their computer. The license can then be used online or offline. For the entire duration of the borrowing, the license becomes unavailable on the license server. We are going to show you the complete license lifecycle of a transferrable license, from its creation as a ticket in CodeMeter License Central to its delivery and use on the license server. With Product Bundles, you can easily set up different product configurations and test them right away in the market. A bundle can be assigned to existing products or can be a product that includes a number of modules in itself. You can specify whether modules belong to a bundle simply by ticking and unticking them. WebDepot and Gateway are both available as the interfaces for an online activation process and play an essential role for user’s convenience. We need to distinguish between two separate types of error messages: those that the users can deal with themselves, and internal errors. We will demonstrate how you can effectively detect and fix internal configuration errors, and how you can enable additional features, like the activation of multiple licenses, with just one request. License transfer Configuration of transferrable licenses Activation on a license server (online / offline) End-to-end transfer by the user Product Bundles The selling of modular products made easy Configuration of Product Bundles Activation of Product Bundles The new version of Gateways / WebDepot Error handling on the user’s or the vendor’s side Activation of several tickets in one single request Download the correct LIF file A license management system should be as flexible as the license models you want to provide to your customers. Consider leveling up your offerings to keep up and outperform your clients’ expectations.

 End-to-End License Transfer | File Type: video/mp4 | Duration: 1:09:28

For many years, customers have been enjoying licensing from their server networks. Users can employ their licenses effectively and manage and analyze their use. Software publishers follow a simple deployment process: licenses are activated on a license server and can then immediately be used on networked computers. However, there are cases where a single license on a local computer or in a local dongle would be a better solution; for example, when the software is used on a construction site and the user has no VPN connection to the license server. A mobile license is also ideal when the user wants to continue editing a current project from his home office. Wouldn‘t it be fantastic if the user could perform this conversion and transfer licenses by himself? Join us for our next masterclass on End-to-End License Transfer to learn how we have streamlined the complete end-to-end process. CodeMeter License Transfer offers more than just license borrowing. It combines a permanent end-to-end license transfer solution with traditional license borrowing from a network server. A permanent license transfer makes activating licenses easier on machines and devices that are still not connected to the Internet. In such cases, licenses can be carried manually by the service technician to the machine by means of a CmDongle. License borrowing from a network server with CodeMeter License Transfer could not be easier. The user selects the license and clicks “Borrow”. The borrowable license is configured straightaway. Even changing licenses on the license server while licenses are borrowed becomes possible with CodeMeter. In the event that the user is outside the network, the administrator can also borrow the license offline for him. The borrowing period can be determined by the user for any duration between one second and a maximum value defined by the software publisher. After expiration, the borrowed license automatically becomes available again on the license server. A premature return or renewal is also possible at any time. During this free 60-minute event, you will be able to learn about: CodeMeter License Transfer End-to-end license transfer License borrowing in the network Returning borrowed licenses Options for license borrowing Permitted target containers (CmDongle or computer-bound CmActLicense) Authorization of end-to-end license transfer Maximum borrowable time Borrowing and moving modular licenses Nested Product Items Online and offline transfer of licenses License updates by the manufacturer Comparing moved licenses with CodeMeter License Central Even though the Internet makes life easier in so many ways, there is no reason why users who are not connected to it should be put at a disadvantage. The new CodeMeter License Transfer facilitates license re-assignment in all possible environments.

Comments

Login or signup comment.