Introducing SafeNet's Latest and most secure Dongle - SHK

Over 40 million licenses worldwide are protected by SafeNet hardware keys. Sentinel has been setting the standard for software protection since 1984 and secures more clients worldwide than any other key.
By: SafeNet
 
April 13, 2009 - PRLog -- Sentinel Hardware Keys are the most secure hardware token available in the world. Both public key cryptography and 128-bit AES encryption are used to secure communications between the key and the protected application. Middle layer attacks, such as record and playback, and driver emulation are effectively stopped. A unique encryption key is used for every communication session between the application and the hardware token, making brute force attacks virtually impossible. In addition, the keys include internal authentication, which effectively prevents cloning of the keys.

- Speed Implementation—Business Layer APIs™
The best implementation of any protection scheme should include complete integration into your application through APIs. By using Sentinel Business Layer APIs, you can obtain the highest level of security and control over sophisticated license designs without spending time on lower level programming.

Business Layer APIs are pre-configured, higher level APIs for popular license models such as subscription, evaluation and pay-per-use. These tools typically reduce the programming time required to secure a new application by up to 60% or more compared to other hardware key solutions. Reducing and simplifying the required programming steps also improves implementation quality and security.

Simplify Updates and Activation Sentinel APIs also include Logical Addressing which  allows developers to add or change implementations without being concerned about specific memory address usage. This not only rastically speeds development time, but also reduces the risk of error from overwriting information in memory cells. With Sentinel Hardware Keys, you can also program multiple keys at once and customize license models at the production stage. License configuration can be altered without requiring further development changes. Sentinel technology allows software vendors to send updates to keys in the field in a secure, controlled manner.
Updates are sent using the same high level of security as communications between the hardware token and the software application.

- Quickly Add Protection—Sentinel Shell
The Sentinel Shell offers a way to quickly add protection and obfuscation to your application without requiring any alteration to the source code. When used in conjunction with API level integrations, the Shell enhances overall security by adding multiple layers to thwart hacking attempts. Additionally, the Shell prevents memory dumping and includes protection against debuggers, making reverse engineering even more difficult. With the Sentinel Shell, you can embed licensing and protect your application in minutes, even if you don’t have access to source code.

- Implement Time-Based Licensing—Sentinel V-Clock™
The Sentinel Hardware Key V-Clock allows you to reliably and securely offer time-based license models such as trial, demo or subscription. The V-Clock checks and stores the system time in the Hardware Key, then checks repeatedly to verify consistency. If the system time ever differs significantly from the last known date and time, the application can be disabled or run in a restricted mode. Sentinel V-Clock comes standard with Sentinel Keys and requires no on-board battery, effectively preventing timetampering
without added costs.

- Secure Your Distribution Channels—Sentinel Distributor Keys™
Sentinel Hardware Keys allow you to carefully control and regulate your distribution channels through the use of Distributor Keys. You can assign and securely embed encryption keys during the manufacturing process in order to control the creation of licenses through your channels. Distributor Keys can enforce limits such as a maximum number of licenses or the creation of trial versions only. Sentinel Hardware Keys allow you to secure each link in your distribution chain.

- Protect Multiple Applications
Sentinel Hardware Keys allow you to protect multiple applications with a single token. With Sentinel multi-tasking technology, unique independent sessions are employed simultaneously for each application all while maintaining the same high level of security and without any degradation in performance. You can even add protection for additional applications at a later date without altering the existing security structure.

- Integrate License Fulfillment
Sentinel Keys include back office APIs that enable you to integrate fulfillment of software licenses into your organization’s process.
With back office APIs, you can create custom applications to program Sentinel Keys using your own internal applications without interruption to your existing business model.
This facilitates automation and provides more flexibility with your internal manufacturing and delivery systems, greatly reducing the time required to fulfill Sentinel Keys.

- Exceptional Reliability
Advanced mirroring technology ensures an exceptionally high level of reliability by selfcorrecting any errors in communication to the key.

Multiple Development Environments and Platforms Sentinel provides you with the ability to protect applications created in numerous development environments. Sample code for the most popular environments is also provided, such as Microsoft Visual C++, Microsoft Visual Basic, Microsoft.NET and Java to get you started on custom applications. With Sentinel you can support your application on multiple operating platforms with a single development effort, further reducing development time and cost.

- License Across Networks
The network version of Sentinel Hardware Keys protects client-server applications and provides server monitoring to track license usage on the network. Sentinel Keys empower network administrators to cancel licenses in order to redistribute among users or revoke idle licenses. This provides administrators with the ability to control optimal license use across the enterprise.

- Obtain Superior Technical Support
The SafeNet Technical Services organization provides worldwide telephone, email and Internet-based support to our customers.
Our SafeNet Service Pledge ensures that you consistently receive the highest level of service. The Sentinel Integration Center provides online resources to assist your development staff through the implementation process.

- Increased Memory Available
Optional increased memory is available for implementation flexibility and scalability.


For more information regarding technical specifications, availability and price, please visit www.zakariaexpo.com

# # #

Zakaria & Partners Co. Is SafeNet Inc. authorized distributor in the Middle East and Africa. who are market leaders in solutions for software protection.

we have more than 7 years of experience selling and supporting SafeNet's products specially dongles. we offer besides selling SafeNet products, technical support through direct contact with SafeNet .
End



Like PRLog?
9K2K1K
Click to Share