Wibu-Systems' Video Podcast Channel http://podcast.wibu.com/ In its mission to deliver unique, most secure and highly versatile technologies to software publishers and intelligent device manufacturers, Wibu-Systems has developed CodeMeter, a comprehensive and award-winning suite of hardware- and software-based entitlement solutions for the protection of software rights and technical know-how against piracy, reverse engineering, tampering, sabotage, and espionage. Podcast Generator 2.6 - http://podcastgen.sourceforge.net Tue, 27 Jun 2017 09:04:30 +0200 en Wibu-Systems AG http://podcast.wibu.com/images/itunes_image.jpg Wibu-Systems' Video Podcast Channel http://podcast.wibu.com/ In its mission to deliver unique, most secure and highly versatile technologies to software publishers and intelligent device manufacturers, Wibu-Systems has developed CodeMeter, a comprehensive and award-winning suite of hardware- and software-based entitlement solutions for the protection of software rights and technical know-how against piracy, reverse engineering, tampering, sabotage, and espionage. Perfection in Software Protection, Licensing and Security Wibu-Systems Wibu-Systems team@wibu.com clean Licensing Craves the Cloud CodeMeter License Central and its CodeMeter Cloud Lite extension provide a simple and streamlined way to use licenses directly in the cloud. The cloud has found its way into our daily lives. This starts in the private sphere with music streaming services and has now reached IoT devices that load your machine handbooks into the cloud in a secure and authenticated fashion. The same also applies to software licensing and digital content: unimaginable without the cloud.

With CodeMeter License Central, Wibu-Systems has for many years been offering a solution for distributing licenses simply and securely across the cloud. But CodeMeter License Central has even more to offer: With automatic extensions, time restrictions, and license returns, CodeMeter License Central is the most versatile kit for cloud licensing in the market. In addition to licensing, CodeMeter License Central and its CodeMeter Cloud Lite extension provide a simple and streamlined way to use licenses directly in the cloud.

During this session, we will examine three different cloud licensing projects centered around CodeMeter License Central:

Project #1: User License on Two Devices

The software is a Windows-based application that runs on the local PC of a user. The user installs the software on two separate devices. Both installations are connected to the same vendor‘s user account. The software works offline without any time limitation.

Should the user want to use the software on a third device, he should first deactivate the license on one of the existing devices. If the device is offline at the time of license deactivation, the license will be automatically deleted as soon as an internet connection is established.

Project #2: Online License Request for Service Technicians

A service technician uses a locally installed software. At every start of the application, the software checks for the license in the cloud and extends the license in the local cache by 30 days. If the service technician is offline, the license is still running for 30 days. If the technician stays offline for more than 30 days, the license stops running from day 31.

A license administrator can assign new licenses and thus new entitlements to the service technician via a dashboard in the cloud. These will be updated automatically the next time the software is started.

Project #3: Mixed On-Premise / Cloud Licenses

A vendor offers both on-premise software and SaaS services. Both can be provided with the same licensing technology, since CodeMeter License Central is already integrated with SAP for the creation of on-premise licenses. SAP handles on-premise and cloud licenses in the exact same way; it is CodeMeter License Central that decides how the license is used.

Join us for this webinar to learn about the requirements and the implementation techniques that will allow you to create effective and customized cloud licensing projects.

During the class, we will cover several interesting aspects of cloud licensing that are currently available:

  • Foundations of CodeMeter License Central
  • CodeMeter licenses in LAN, WAN, and the cloud
  • Simple licensing with CodeMeter Cloud Lite
  • Real-life projects from the field
    • User license on two devices
    • Online license request for service technician
    • Mixed on-premise and cloud licenses
  • Overview of possible additional developments with CodeMeter cloud licensing
]]>
CodeMeter License Central and its CodeMeter Cloud Lite extension provide a simple and streamlined way to use licenses directly in the cloud. http://podcast.wibu.com/?name=2017-05-16_licensing_craves_the_cloud.mp4 http://podcast.wibu.com/?name=2017-05-16_licensing_craves_the_cloud.mp4 1:00:54 team@wibu.com (Wibu-Systems) Wibu-Systems Cloud licensing, Cloud Security, License Management no Mon, 08 May 2017 18:00:00 +0200
IIoT Endpoint Security – The Model in Practice Secure endpoints, namely devices that employ both computation and communications resources and expose functional capabilities, are your first line of defense against cyberattacks. What is your first line of defense against cyberattacks? Secure endpoints! Endpoints are everywhere in the IIoT landscape. Without proper security, Industrial Internet of Things (IIoT) systems are not trustworthy, putting organizations, their missions and the greater public at increased risk. The viability of the IIoT depends on proper implementation of security to counter the growing and ever changing threats that are emerging.

Addressing this challenge is critical to the success of the Industrial IoT, Industrie 4.0 and the Industrial Internet revolution. To that end, Industrial Internet Consortium members have developed a common security framework and an approach to assess cybersecurity in Industrial Internet of Things systems: The Industrial Internet Security Framework (IISF).

The editors of the IISF and security experts from the Industrial Internet Consortium will discuss the endpoint protection/security model and policy in its Industrial Internet Security Framework (IISF) document and present a real-world customer use case for an approach taken to secure an industrial system.

Watch the recording to learn:

  • Securing the IIoT and why it differs from securing the IoT
  • Important elements to consider in securing IIoT endpoints
  • The significance of endpoint data protection, physical security, root of trust, endpoint identity, access control, monitoring and analysis, secure configuration and management, and integrity protection

This webinar is part two in a series of monthly webinars offered by the Industrial Internet Consortium. Be sure to see the previous webinar, now available on-demand.

]]>
Secure endpoints, namely devices that employ both computation and communications resources and expose functional capabilities, are your first line of defense against cyberattacks. http://podcast.wibu.com/?name=2017-03-06_iiot_endpoint_security__the_model_in_practice.mp4 http://podcast.wibu.com/?name=2017-03-06_iiot_endpoint_security__the_model_in_practice.mp4 1:00:09 team@wibu.com (Wibu-Systems) Wibu-Systems Endpoint security, IIoT, Cyberattacks,, secure endpoints no Wed, 22 Feb 2017 17:00:00 +0100
To Bundle or To Nest? - That is the question! A great help for designing your licensing business model to handle software functions separately and deliver scalable packages that grow in features and investment as needed. Meet higher revenue goals and surprise customers with tailored offerings CodeMeter License Central 3.0 is just around the corner. One of its newest features is the support for Nested Product Items. With Nested Product Items, modules can be logically grouped together, and the licensing process can be further simplified. You may wonder whether this new feature is actually not already covered by the current bundles. This question will be answered alongside many others during the forthcoming webinar. We will present the differences between bundles in CodeMeter License Central and Nested Product Items in the license, and discuss which variant is the ideal fit for you.

You can achieve your goal in both cases: To sell software functions separately with the implementation of modular licenses. Not only does this business approach offer low-cost entry-level versions, but it also tailors your software to the actual and unique needs and budgets of your customers.

Experience a sneak peek at CodeMeter License Central 3.0, and see live how Nested Product Items are configured and used in licenses. Learn how the resulting licenses are displayed and how this configuration affects the borrowing and use of the licenses.

During this one-hour live session together, we will delve into:

  • Use cases for Nested Product Items
  • Technical implementation
  • Differences between bundles and Nested Product Items
  • Borrowing and using transferred licenses
  • Demo:
    • Creating an item in CodeMeter License Central
    • Creating and activating a license
    • Borrowing a license with Nested Product Items

Whatever option you choose, make sure the licensing process of your software is accurately designed to protect your intellectual property, boost your revenues, and meet your customers‘ demands.

]]>
A great help for designing your licensing business model to handle software functions separately and deliver scalable packages that grow in features and investment as needed. Meet higher revenue goals and surprise customers with tailored offerings http://podcast.wibu.com/?name=2016-11-18_to_bundle_or_to_nest-that_is_the_question.mp4 http://podcast.wibu.com/?name=2016-11-18_to_bundle_or_to_nest-that_is_the_question.mp4 58:35 team@wibu.com (Wibu-Systems) Wibu-Systems License Management, Software Monetization, Licensing no Wed, 16 Nov 2016 18:00:00 +0100
Perfecting the Art of Unmasking the Hackers In order to prevent a hacking attack, you need to think like a hacker and go beyond textbook cryptography. Planting perfectly crafted mines in the code is the ultimate means to vanquish perpetrators. Textbook cryptography can work in many cases, such as email encryption. But for software protection, theory is not enough – why is that? The author of an email is self-motivated (or not) to preserve the secrecy of his message. By contrast, the user of a software application is mostly interested in the application working seamlessly. Having a properly protected application or preserving security measures are far from his top priority. He is not above deception and disguise if it means fiddling with the system in order to reach his purpose: perfect convenience for himself as the user in the best case, piracy in less honorable cases.

In this context, the use of traps, especially in connection with an irreversible locking of the cryptographic key, proves extremely effective. You may be familiar with spy movies, where devices self-destruct after delivering a message. In software protection, the destruction sequence starts when a trap is triggered. Typically, an end customer uses the software without realizing that traps are even present. A hacker, instead, will trigger them in his attempt to reverse engineer the software.

This masterclass is going to classify the attack methods used by hackers and explore effective ways to safeguard ISVs against them. After outlining the concepts, we will give a live demonstration of  how to integrate traps in your application. With AxProtector .NET, integration is carried out automatically for you. If you prefer pulling the strings yourself or if you are dealing with a native application to protect, AxProtector .NET or AxProtector provide all the necessary freedom. During our time together, we will see both the manual and the automatic options.

Here are the main topics we are going to delve into:

  • Typical attack methods of hackers
    • Dynamic code analysis
    • Static code analysis
  • The concept of traps
    • Definition of traps
    • Secret messages to the dongle
    • How traps are triggered
  • Integration in .NET applications
    • Fully automated with AxProtector .NET
    • Manually in the source code
  • Integration in a native Windows application
    • Manually in the source code
    • Simulated triggering of a lock

Make the hackers’ mission impossible: Plant perfectly crafted mines in the code, and let them work for you.

]]>
In order to prevent a hacking attack, you need to think like a hacker and go beyond textbook cryptography. Planting perfectly crafted mines in the code is the ultimate means to vanquish perpetrators. http://podcast.wibu.com/?name=2016-11-04_perfecting_the_art_of_unmasking_the_hackers.mp4 http://podcast.wibu.com/?name=2016-11-04_perfecting_the_art_of_unmasking_the_hackers.mp4 1:04:36 team@wibu.com (Wibu-Systems) Wibu-Systems Hacker, Protection, Software no Wed, 19 Oct 2016 10:00:00 +0200
The License Portal – A Golden Pot of Opportunities The license portal is the turning point of the entire license lifecycle management system, as it couples expectations and requirements of end users and ISVs. The scope of a license portal goes way beyond license activation. When software administrators access the portal, they expect to easily manage the licenses they have purchased and typically have two main questions in mind: "How many licenses do I have left?" and "On which machine is a certain license?". The license portal should deliver an immediate and clear answer to them.

A software publishing startup that is about to commercialize its first application would explore the available license portals in search of a solution that offers not just automatic communication with its customers and saves support costs for the company, but also manages all license entitlement actions. More experienced ISVs that are already using WebDepot may be interested in more advanced features, such as integration with third party systems or even the coupling of proprietary solution with a fully comprehensive technology.

CodeMeter License Central WebDepot fulfills the requirements of all parties involved in license lifecycle management. This new masterclass will bring value to all software-powered businesses and present an excursus from basic principles like activation, de-activation, and re-activation to the latest functionalities, like restoring a lost CmContainer on the same computer, resuming a transaction that was interrupted, or distributing enforced updates.

Two of the main features of WebDepot are adjustable versatility and seamless integration into third party systems. If you don’t operate a customer portal yet or if you rather want to use the license portal as a separate solution in parallel with your existing portal, WebDepot comes in handy. During the online event, we will show you how you can customize WebDepot to match your corporate design style, even without any particular programming skills, and realize an efficient workflow with a simple configuration. For broader requirements, WebDepot provides a number of programming interfaces that can extend its core scope.

Even if you were already using a customer portal, you can still integrate WebDepot to achieve greater customer satisfaction. Depending on your framework and requirements, you can either simply connect WebDepot to your customer portal and use it directly or implement WebDepot functionalities into your own portal. During the live session, we will review a number of examples and best practices of effective integration from real life scenarios.

Alternatively or additionally to WebDepot, you can have your licenses activated by integrating the activation wizard in your own software. If you now ask yourself whether you then need to double-map your workflow, the answer is: No. Only the user interface is going to be available twice, in the portal and in your wizard. The business logic on the server, which maps most of the workflow, is identical. ActivationGateway, which your activation wizard uses to communicate with CodeMeter License Central, is derived from WebDepot.

Topics:

  • Online activation with WebDepot
  • Online activation with the software wizard and ActivationGateway
  • New functions of WebDepot
  • Customization of WebDepot to reflect corporate designs
  • Overview and examples of WebDepot extended functions
  • Integration in third party systems
  • Customizations of the software activation wizard

 

]]>
The license portal is the turning point of the entire license lifecycle management system, as it couples expectations and requirements of end users and ISVs. http://podcast.wibu.com/?name=2016-10-05_the_license_portal__a_golden_pot_of_opportunities.mp4 http://podcast.wibu.com/?name=2016-10-05_the_license_portal__a_golden_pot_of_opportunities.mp4 1:01:16 team@wibu.com (Wibu-Systems) Wibu-Systems License Management, Software Monetization, Licensing no Wed, 28 Sep 2016 18:00:00 +0200
Unleash the power of CodeMeter The new generation of CodeMeter is a goldmine of opportunities for ISVs and their users. Enriched with augmented automation capabilities and new flexibility, the secure distribution of software enters a new phase. Over the history of Wibu-Systems, there have been certain recurring reasons that have brought customers to select protection and licensing solutions: usually, these were software getting hacked, revenues lost, the inability to keep up with a homegrown solution in the long run, the wish to supply multiple licensing models, or the plan to integrate licensing into an existing back office system. However, when your primary needs are met, there’s still a ton of features that remain underutilized or not explored at all, just as happens with the configuration of our smart phones or the office applications we use every day.

 

Overview of CodeMeter

Integrate Once and Deliver Many: This has been our motto for more than 25 years. With the new breed of CodeMeter, we have brought this strategy to a new level. Learn how you can protect your software in a way that the next developments from Wibu-Systems can be enjoyed automatically without needing any adjustment to your software.

CodeMeter Core Features

Licensing is not child’s play; there are several technical, commercial, and marketing aspects to take into account in your overall strategy. CodeMeter offers a wide array of options for you. Our experts will show the best approach for each use case, the options that are applied the most, and the ones that are put into practice the least.

  • Firm Code, Product Code and License Options
  • CodeMeter Runtime – what you actually deliver to your end users
  • Setup of CodeMeter in a Network Environment
  • License Transfer – the art of borrowing licenses

Integration in the Software

To achieve effective security against piracy and reverse engineering, integrating CodeMeter into your software is one of the most delicate steps in the entire process. The Protection Suite offers a complete set of automated tools for the easy and secure encryption of your application or library. Additional APIs complement the technology and are specifically recommended for special purposes.

  • Automatic Encryption with the Protection Suite
  • WUPI: Software Protection API
  • CodeMeter Core API

Integration with Back Office Processes

A key success factor in license lifecycle management is a smooth progression from license creation to license delivery. CodeMeter License Central provides a simple and intuitive interface for creating licenses that can be integrated through SOAP interfaces with existing systems, such as SAP, Navision, Salesforce, Digital River, and many more. The usual complex process of transferring licenses is reduced to simple point-and-click with our online activation system.

  • Integration options
  • CodeMeter License Central – Editions and interfaces
  • Online activation over WebDepot and the Software Activation Wizard

This class is open to both newbies and pros. Regardless of your current expertise in protection and licensing, you will walk away with some priceless takeaways that will enrich your practices and make your business fly.

]]>
The new generation of CodeMeter is a goldmine of opportunities for ISVs and their users. Enriched with augmented automation capabilities and new flexibility, the secure distribution of software enters a new phase. http://podcast.wibu.com/?name=2016-06-23_24_unleash_the_power_of_codemeter.mp4 http://podcast.wibu.com/?name=2016-06-23_24_unleash_the_power_of_codemeter.mp4 1:16:45 team@wibu.com (Wibu-Systems) Wibu-Systems no Wed, 13 Apr 2016 15:00:00 +0200
Smart factories redefine security paradigms The surge of smart factories is reshaping the very essence of industrial manufacturing. The security implications in terms of data, communication, and company assets are enormous. While the world still seems undecided on which terminology to use, the new industrial revolution has started and is already transforming the way we plan our future. Fuelled by the need to optimize the complete production lifecycle, make wiser use of natural resources, respond to fast-paced market changes, and level profitability across the globe, the new concept of Smart Factories was born.

We see several research hubs, laboratories, and aggregators in action across the globe, where private, public, and academic entities are collaborating to define the guidelines, best practices, and use cases for the new smart manufacturing world. The topic is still hotly debated, but it has already defined some fundamental building blocks:

  • Telecommunication – for the estimated 500 connected devices for every person that are expected to exist by 2020, we need fast, secure, and widespread distribution of internet access points and datacenters
  • Big Data – for decision management platforms to expand at a foreseen CAGR of 60% through 2019, we need enhanced data processing and security algorithms
  • Security in the most pervasive way – being secure, vigilant, and resilient is the new black in the connected age

The Industrial Internet Consortium (IIC) was founded in 2014 to promote the discussion between the leading vendors in IIoT and guide the future generation of intelligent manufacturing. 

In their exclusive presentation, Dr. Richard Soley, IIC Executive Director, and Oliver Winzenried, CEO and founder of Wibu-Systems, are sharing:

  • An outlook on today’s and tomorrow’s manufacturing notion
  • The role of IIC in coordinating a vast ecosystem of initiatives
  • The surge of Smart Factories in the IIC agenda
  • The security implications of the rise of AI in an industrial context
  • The reasons behind an endpoint security approach
  • The projects WIBU is engaged in for the development of secure smart factories
  • The turnkey technologies that are already available for safeguarding and monetizing the intellectual property of intelligent device manufacturers

The new generation of embedded system developers is essentially in the same predicament that ISVs of traditional PC applications found themselves in years ago. Let’s openly share the state of the union and forge secure and connected supply chains together.

]]>
The surge of smart factories is reshaping the very essence of industrial manufacturing. The security implications in terms of data, communication, and company assets are enormous. http://podcast.wibu.com/?name=2016-06-23_23_smart-factories-redefine-security-paradigms.mp4 http://podcast.wibu.com/?name=2016-06-23_23_smart-factories-redefine-security-paradigms.mp4 1:07:36 team@wibu.com (Wibu-Systems) Wibu-Systems no Wed, 09 Mar 2016 15:00:00 +0100
End-to-End License Transfer License deployment can take many different forms depending on environmental circumstances. It can be as straightforward as an activation on the license server for the networked users to use and monitor their license immediately. For many years, customers have been enjoying licensing from their server networks. Users can employ their licenses effectively and manage and analyze their use. Software publishers follow a simple deployment process: licenses are activated on a license server and can then immediately be used on networked computers. However, there are cases where a single license on a local computer or in a local dongle would be a better solution; for example, when the software is used on a construction site and the user has no VPN connection to the license server. A mobile license is also ideal when the user wants to continue editing a current project from his home office.

Wouldn‘t it be fantastic if the user could perform this conversion and transfer licenses by himself?

Join us for our next masterclass on End-to-End License Transfer to learn how we have streamlined the complete end-to-end process.

CodeMeter License Transfer offers more than just license borrowing. It combines a permanent end-to-end license transfer solution with traditional license borrowing from a network server. A permanent license transfer makes activating licenses easier on machines and devices that are still not connected to the Internet. In such cases, licenses can be carried manually by the service technician to the machine by means of a CmDongle.

License borrowing from a network server with CodeMeter License Transfer could not be easier. The user selects the license and clicks “Borrow”. The borrowable license is configured straightaway. Even changing licenses on the license server while licenses are borrowed becomes possible with CodeMeter. In the event that the user is outside the network, the administrator can also borrow the license offline for him. The borrowing period can be determined by the user for any duration between one second and a maximum value defined by the software publisher. After expiration, the borrowed license automatically becomes available again on the license server. A premature return or renewal is also possible at any time.

During this free 60-minute event, you will be able to learn about:

  • CodeMeter License Transfer
    • End-to-end license transfer
    • License borrowing in the network
    • Returning borrowed licenses
  • Options for license borrowing
    • Permitted target containers (CmDongle or computer-bound CmActLicense)
    • Authorization of end-to-end license transfer
    • Maximum borrowable time
  • Borrowing and moving modular licenses
    • Nested Product Items
  • Online and offline transfer of licenses
  • License updates by the manufacturer
  • Comparing moved licenses with CodeMeter License Central

Even though the Internet makes life easier in so many ways, there is no reason why users who are not connected to it should be put at a disadvantage. The new CodeMeter License Transfer facilitates license re-assignment in all possible environments.

]]>
License deployment can take many different forms depending on environmental circumstances. It can be as straightforward as an activation on the license server for the networked users to use and monitor their license immediately. http://podcast.wibu.com/?name=2015-11-05_21_end-to-end-transfer.mp4 http://podcast.wibu.com/?name=2015-11-05_21_end-to-end-transfer.mp4 1:09:28 team@wibu.com (Wibu-Systems) Wibu-Systems no Wed, 04 Nov 2015 18:00:00 +0100
Demystifying Industrial Security The Industrial Internet is a massive game changer with its commercial value estimated at $33 trillion. Ruggedized environments are often characterized by substantial swings in temperature, humidity, and vibrations. The Industrial Internet is a massive game changer with its commercial value estimated at $33 trillion. Not only is it expected to give a strong boost in confidence to global GDP, increase performance even in customized production, and introduce a more sustainable manufacturing model, but it is also a remarkable accelerator of technological innovation. To be part of this evolution, OEMs need to implement guidelines that will reshape workflows and help them boost productivity. Security aspects are particularly relevant as they represent the keystone of the new connected infrastructure.

Over the recent years, Wibu-Systems has hardened CodeMeter®, its own protection, licensing, and security technology, to withstand ruggedized environments. Unlike the office world, many sectors of industry have special requirements, often characterized by substantial swings in temperature, humidity, and vibrations. This implies a complete redesign of the hardware secure elements where machine code is encrypted, login credentials stored, and licenses saved.

Among the many components that were carefully picked and subjected to extensive tests, the flash memory is one of the most critical ones. Our trusted solution partner Swissbit will cohost a webinar with us to shed light on the elements that should guide intelligent device manufacturers in their choice of reliable and fail-safe embedded memory.

During this free 60-minute event, you will be able to learn about:

  • Security threats that undermine connected industry
  • Pros and cons of industrial storage solutions
  • Fundamentals of flash memory NAND technology
  • Product highlights of Swissbit memory components
  • Benefits of adding security to a memory component
  • Available solutions for IP and integrity protection
  • Use cases for combining storage and security
  • Examples of an integration process workflow

Safeguard your knowledge with an all-round solution tailored to meet the needs of the most demanding market segments, including industrial, automation, automotive, networking and telecommunications, healthcare and life science, and defense.

]]>
The Industrial Internet is a massive game changer with its commercial value estimated at $33 trillion. Ruggedized environments are often characterized by substantial swings in temperature, humidity, and vibrations. http://podcast.wibu.com/?name=2015-10-12_20_demystifying_ind_sec.mp4 http://podcast.wibu.com/?name=2015-10-12_20_demystifying_ind_sec.mp4 1:07:18 team@wibu.com (Wibu-Systems) Wibu-Systems no Wed, 07 Oct 2015 18:00:00 +0200
Certificates for Authenticity, Authentication or both? A journey from essential elements, to security requirements and applications, in order to master certificate usage, implement software authenticity, enforce user authentication, ensure integrity, and control access rights management. Digital certificates are a landmark in security history. Since their introduction, vendors and users have taken advantage of encrypted communication in secure email exchanges, file and disk cryptography, and secure logon to local and online systems. Law makers have taken decisive steps in promoting their applications and regulating their usage. Despite their effectiveness however, certificates still appear cryptic and cumbersome to many.

With this new masterclass, we would like to offer a comprehensive overview about certificate fundamentals and their potent role in relation to software protection, licensing and security. Through certificates, ISVs and intelligent device manufacturers can implement software authenticity and enforce user authentication, thus ensuring software integrity and access right management.

In this new webinar, we are going to illustrate:

  • What are certificates
    • Overview of asymmetric cryptography
    • How to identify a key as authentic
    • Self-signed certificates
    • Root certificates
    • Certificate chains
    • Revokation lists
  • Main applications for the use of certificates
  • Use case of a server certificate
    • Creation of a server certificate
    • Server requirements
  • Use case of a client certificate
    • Creation of a client certificate
    • Server requirements
    • Storage of client certificate on the PC
    • Demo with CodeMeter License Central
  • Certificate storage
    • Storage on a PC
    • Storage on a PC as a file
    • Storage on a PC with CSSI middleware
  • Certificates in software security
    • Authenticode
    • Certificate-based CodeMeter Universal Firm Code
    • Code integrity in AxProtector with certificates

Whether you are dealing with a computer-based or an embedded system application, certificates have reshaped the whole software security sphere.

Wibu-Systems technology is certificate-ready for straightforward integration. Smart card chips embedded in our devices, as well as security tools encompassed in our software protection tools simplify the use of certificates.

This is your chance to become certificate savvy and embark on a new journey towards a smarter use of certificates.

]]>
A journey from essential elements, to security requirements and applications, in order to master certificate usage, implement software authenticity, enforce user authentication, ensure integrity, and control access rights management. http://podcast.wibu.com/?name=2015-04-30_17_certificates_en.mp4 http://podcast.wibu.com/?name=2015-04-30_17_certificates_en.mp4 1:07:09 team@wibu.com (Wibu-Systems) Wibu-Systems no Wed, 29 Apr 2015 18:00:00 +0200
Embedded security in ARM-based microcontrollers CodeMeter µEmbedded extends the security features to Programmable Logic Controllers and microcontrollers. The integration with the XMC4000 microcontroller from Infineon Technologies offers software developers the ability to protect and license their code CodeMeter µEmbedded from Wibu-Systems enhances the standard tool chain to provide secure firmware updates or functional upgrades in embedded systems built around the XMC4000 microcontrollers made by Infineon Technologies. This ARM Cortex™ family features a huge set of connectivity peripherals and is designed for controls of industrial applications, especially in harsh environments. It predominantly addresses five target markets: factory automation, building automation, transportation, power and energy, and home and professional applications. What these have in common is the many and diverse security challenges they face.

With CodeMeter µEmbedded, software developers of field programmable gate arrays and microcontrollers can protect their application code and intellectual property against reverse engineering and implement a license control system. The technology represents a practical answer to common security needs: How to protect intellectual property that is shared with a contractor from cloning, how to provide secure firmware upgrades in the field, how to make sure that only authorized devices are built in factory machines, or how to enable additional functionality in a microcontroller that is already operational in the field.

The tools for the protection of the application code are fully integrated in the development platform DAVE™. The user-friendly dialogue frontend of CodeMeter µEmbedded created for the DAVE plugin is a great help also to those developers who have little cryptography skills in their arsenal. In one single dialogue, they are able to input all required security settings to guarantee the effective and thorough integrity protection of their machine code.

Note:Product branding was updated since the webcast took place; please note that:

  • µCodeMeter has become CodeMeter µEmbedded
  • μCmE has become CmµE
  • μExEngine has become ExEngine
  • μCmActLicense has become CmActLicense
  • μExProtector has become ExProtector
]]>
CodeMeter µEmbedded extends the security features to Programmable Logic Controllers and microcontrollers. The integration with the XMC4000 microcontroller from Infineon Technologies offers software developers the ability to protect and license their code http://podcast.wibu.com/?name=2015-08-19_infineon.mp4 http://podcast.wibu.com/?name=2015-08-19_infineon.mp4 26:12 team@wibu.com (Wibu-Systems) Wibu-Systems Embedded, microcontroller, Infineon, Secure Boot, no Tue, 24 Feb 2015 16:00:00 +0100
A guided protection system for Java applications AxProtector Java is an essential encryption component of CodeMeter. Unlike the traditional AxProtector, AxProtector Java makes use of special techniques tailored for this language that encrypt the intermediate code. Currently Java is installed on 97% of enterprise desktops: this is an impressive rate that makes Java the number one choice for software developers. This exponential success is due not only to its development simplicity and fast execution, but mainly to the heterogeneous computing platforms supported, which results in its extreme portability. In a server environment, Java has no rival. Java application servers handle connections to the database on one side, and, often, connections to the Web client on the other.

All these factors, however, make Java a preferred target for hacking. In particular, reverse engineering is the primary source of attack. Unlike native applications, Java does not generate machine code, but rather an intermediate code, which is executed in a Java Runtime. This intermediate code is simple enough to be reconverted back to source code. Since existing copy protection and licensing mechanisms are quickly removable, implementation details and trade secrets become an easy prey for unauthorized third parties.

AxProtector Java protects and licenses desktop applications, application servers and Eclipse Plugins. Just like Java, AxProtector Java is available for multiple platforms: Windows, Linux, OS X and Android.

This presentation introduces some of the basic protection technologies for Java, and compares them to the superior qualities of AxProtector Java. Once the application is secure, licensing suffers from no risk either, and CodeMeter seamlessly provides a flexible licensing system as well.

During this hour together, we will specifically go through:

  • An overview of protection technologies for Java applications
  • AProtector Java fundamentals
  • Options for AxProtetcor Java
  • Protection at class and method levels
  • A quick introduction to licensing Java applications

AxProtector Java is your guided protection system that will lead your way to prosperous licensing revenues for your Java application.

]]>
AxProtector Java is an essential encryption component of CodeMeter. Unlike the traditional AxProtector, AxProtector Java makes use of special techniques tailored for this language that encrypt the intermediate code. http://podcast.wibu.com/?name=2015-02-18_13_a-guided-protection-system-for-java-applications.m4v http://podcast.wibu.com/?name=2015-02-18_13_a-guided-protection-system-for-java-applications.m4v 51:57 team@wibu.com (WIBU-SYSTEMS AG) WIBU-SYSTEMS AG no Thu, 25 Sep 2014 16:00:00 +0200
Your driving license to expert cryptography AxProtector is definitely your primary choice: it provides automatic protection tools, it is extremely secure, and the fastest encryption solution. Few successful software applications don't use cryptographic methods as they protect code and data from predatory attacks.By analogy, applying cryptography is like driving a car. Just as you first have to learn what all the controls are for before you can go zipping down the interstate, first you must become familiar with basic cryptographic methods. And just like yesterday's trendy car is no longer in vogue today, obsolescence in security is accelerating.

There isn't much you can do to slow down technological evolution, but as a software developer, you can ensure that a primary responsibility is to use cryptography properly and safely.CodeMeter offers a wide range of cryptographic methods and harnesses Wibu-Systems' vast experience and knowledge. Nevertheless, even great technologies like CodeMeter may fail  if they have been implemented poorly or without the necessary safety precautions.

Ready to enroll for a new driving license in cryptography?

The presentation provides an overview of the available cryptographic methods in CodeMeter API.

An essential key point is the secure storage of private and secret keys; the first question you should ask yourself is where you should be storing your licenses. CmDongle, the hardware-based protection vessel, offers an impenetrable fortress. CmActLicense, the software-based container, is available with a unique and proprietary technology, SmartBind. The private and secret keys are stored in an encrypted license file whose key is the fingerprint of the specific PC to which the license file is bound.

How to operate encryption is your second important decision; that should depend on the kind of application you have developed and the threat scenario you are going to face in your business model.Finally, there are many cool facts: did you know that in Counter Mode (CTR), encryption with AES is really just about XOR? For example, consider a database field with a Boolean value. A simple encryption with AES returns exactly two possible encrypted values. This means that an attacker would actually be able to derive the unencrypted value for all records by knowing just one record

During this presentation, we will discuss:

  • HASH functions
    • SHA 256
  • Symmetric encryption
    • AES 128
    • Direct encryption in CmContainer
    • Indirect encryption
    • Encryption without CmContainer
    • Selection of the most appropriate operating mode
  • Asymmetric encryption
    • ECC 224
    • RSA 2048

This is where our journey begins: we’ll show you practical examples about how to implement CodeMeter in ways that allow it to protect your software today and tomorrow.

]]>
AxProtector is definitely your primary choice: it provides automatic protection tools, it is extremely secure, and the fastest encryption solution. http://podcast.wibu.com/?name=2015-02-18_12_your-driving-license-to-expert-cryptography.m4v http://podcast.wibu.com/?name=2015-02-18_12_your-driving-license-to-expert-cryptography.m4v 1:13:58 team@wibu.com (WIBU-SYSTEMS AG) WIBU-SYSTEMS AG no Thu, 04 Sep 2014 16:00:00 +0200
AxProtector exposed - Integrity protection of a modular application With AxProtector, the Wibu-Systems CodeMeter module for program code encryption, ISVs can protect their modular applications meeting both security and convenience requirements. Convenience is the natural enemy of security. How to calibrate the two factors? Who is involved in the process? What is the optimal ratio for your specific scenario? Let's discover this critical aspect together.Pretty frequently, protection and licensing of a complete software modular application are handled via a central component (“license.dll”). This is especially true for articulated applications, consisting of several modules (.exe and .dll). In this case, the emphasis is usually on ease, convenience and cost containment for the whole process. The downside though is in terms of security: the hacker will also commonly have an easy way in his attempt to bypass protection and licensing: He will just have to replace the central license.dll with his own implementation. On the other side, the security maniacs will care of all the details, oftentimes missing the scope of application performance and cost sustainability.AxProtector, the core engine of Wibu-Systems CodeMeter, shows that convenience and security are not fully incompatible.

  • AxProtector protects all that is required: each module (.exe or .dll) that needs copy protection from IP infringements and individual licensing is encrypted, so that the central license.dll is no longer called for
  • AxProtector is attentive to the economy of your enterprise: it is fully automatized

But AxProtector can do even more. It does ensure the integrity of the complete application. Each .dll can be loaded only from the designated application. The intrusion of a foreign .dll in your application is just as impossible as the misuse of your .dll in a foreign product. And even the individual modules are protected with a self-check against manipulation.During this presentation we will explore the following main topics:

  • Requirements of integrity protection
  • Analysis of the preventive aspects
  • The chicken and egg problem in verification: .exe or .dll
  • Detection and response to tampering
  • Basics of asymmetric cryptography
  • Hardware vs Software based protection
  • Live demonstration of AxProtector: what it performs automatically and what you should be attentive to

No need to sacrifice or compromise: Convenience and security can definitely be best friends. It's just a matter of accurate balance.

]]>
With AxProtector, the Wibu-Systems CodeMeter module for program code encryption, ISVs can protect their modular applications meeting both security and convenience requirements. http://podcast.wibu.com/?name=2015-02-18_10_axprotector_exposed_integrity_protection_of_a_modular_application.m4v http://podcast.wibu.com/?name=2015-02-18_10_axprotector_exposed_integrity_protection_of_a_modular_application.m4v 1:21:19 team@wibu.com (WIBU-SYSTEMS AG) WIBU-SYSTEMS AG no Thu, 24 Apr 2014 16:00:00 +0200
Masterful customization of your license activation process With Wibu-Systems CodeMeter License Central and Web Depot you can be the true architect of your license management system. Defining the strategy for a software licensing management is paramount to enable new business models, accelerate the growth of your company, and keep up with new technologies, trends and customer's expectations. But, after the planning, comes the translation of the blueprint into practice. One of the many steps you'll have to face is software activation, a process which is becoming increasingly connected to online methodologies. From the perspective of an ISV, the key success factors of an online license activation system can be summarized as:

  • Ease of use
  • Smart interface
  • Reliability
  • Low cost of ownership

So why some software publishers hesitate or stumble? The reasons are many and usually related to cumbersome platforms that are crystallized in their nature. Wibu-Systems is listening to its customers and has embraced a product design characterized by lean and flexible operations. This includes crucial phases like license activation and license management integration within the business processes of your company.With CodeMeter License Central and Web Depot from Wibu-Systems, you can be the true architect of your license system and unleash your creativity.

During this presentation you will learn how to:

  • Easily implement an online license activation system, availing yourself of an Activation Wizard integrated in your application
  • Alternatively opt for an online license activation system relying on WebDepot
  • Or conveniently choose an hybrid solution that combines online and offline license activation, and that is still based on Web Depot

In addition you will be explained how to:

  • Setup the customization options that will allow you to bend the solution to your needs
  • Introduce adaptations to the graphic user interface so that it guarantees continuity with the look and feel of your brand Incorporate advanced functionalities, like License Overview and Trial Versions
]]>
With Wibu-Systems CodeMeter License Central and Web Depot you can be the true architect of your license management system. http://podcast.wibu.com/?name=2015-02-18_08_masterful_customization_of_your_license_activation_process.m4v http://podcast.wibu.com/?name=2015-02-18_08_masterful_customization_of_your_license_activation_process.m4v 1:04:11 team@wibu.com (WIBU-SYSTEMS AG) WIBU-SYSTEMS AG no Thu, 20 Feb 2014 16:00:00 +0100
A professional approach to data security in the cloud With Wibu-Systems CodeMeter you can have an heterogeneous framework where licenses are stored on hardware devices, secure files or in the cloud. Data don't lie. Cloud-based computing is ramping up in every day usage and encounters a wide spread acceptance.There are actually several factors that determine the success of SaaS, IaaS and PaaS, all connected to business enablement:

  • Platform independence
  • Price competitiveness, especially in times of cost optimization
  • Technological innovation
  • Greater implementation agility in a complete license lifecycle management

Whether you have already embraced this revolution and are considering moving forward to a private cloud, or you are an early adopter that is going to gradually transition from on-premise to cloud-based solutions, hacking attempts are likely to knock on your door. Do you have the expertise to recognize them in time, and possibly prevent them before they affect the security of your data and that of your customers?

Wibu-Systems is ready to reveal a number of frequent scenarios software publishers might find themselves in. From an analytical perspective but in a simple language we will navigate you from theory to practice through:

  • The most common reasons that drive hacking
  • The architectural weaknesses of a cloud system
  • The security measures you should be sure to put in place

The professional services from Wibu-Systems will assist you in assessing your requirements and specifications, with special attention to the security aspect of your cloud-based solution.

]]>
With Wibu-Systems CodeMeter you can have an heterogeneous framework where licenses are stored on hardware devices, secure files or in the cloud. http://podcast.wibu.com/?name=2015-02-18_07_data-securtiy-in-the-cloud.m4v http://podcast.wibu.com/?name=2015-02-18_07_data-securtiy-in-the-cloud.m4v 1:10:50 team@wibu.com (WIBU-SYSTEMS AG) WIBU-SYSTEMS AG no Thu, 30 Jan 2014 16:00:00 +0100
Hackers Reverse Engineering Uncovered - Latest hacking strategies unveiled for best in class protection systems Given the multiplying hacking attempts, it is essential not just to implement code protection measures but also to execute optimally. We all know that in order to defend ourselves from burglars we need safety doors and alarm systems. But what happens if their installation is left to unskilled craftsmen? The same analogy can be extended to the world of software protection.Wibu-Systems has dedicated 25 years to refine the best practices that can allow Independent Software Vendors and Original Equipment Manufacturers to protect their intellectual and business assets.

Given the multiplying attempts of hacking, it is essential to implement software protection in an optimal way. This process is the key to make sure no duplicated copy of your licenses is ever used without your authorization, no manipulation of your code is ever made possible, no reverse-engineering is ever allowed.

During this presentation you will learn how to uncover reverse engineering attacks; we will specifically navigate you through:

  • Simple software protection API call in .NET
  • Implementation of critical parts as unmanaged code
  • Use of Authenticode signatures
  • Use of obfuscation techniques
  • How to hide function calls with reflection
  • Protection data with encryption API
  • Encryption of executable code

In the second part of the presentation we will focus on AxProtetcor .NET and IxProtector .NET from Wibu-Systems, and more specifically on:

  • Basic principles of code encryption with AxProtector and IxProtector
  • Performance vs. Paranoia: how to fine-tune your application
  • Integration of features-on-demand
  • Source code queries and selection with attributes
  • Examples of traps to lock the license
  • How to handle license error messages with routines of your own

Software protection is a particularly delicate process which requires an extended knowledge of all tools and technologies available, a strategic approach, and the fine tuning of the protective measures you have selected. Take the necessary time to go through the entire process with care and be ready to review it as the market space evolve and hackers becomes more canning.

]]>
Given the multiplying hacking attempts, it is essential not just to implement code protection measures but also to execute optimally. http://podcast.wibu.com/?name=2015-02-18_05_hackers-reverse-engineering.m4v http://podcast.wibu.com/?name=2015-02-18_05_hackers-reverse-engineering.m4v 1:59:44 team@wibu.com (WIBU-SYSTEMS AG) WIBU-SYSTEMS AG no Wed, 09 Oct 2013 16:00:00 +0200
Customer centric view of best practices in software monetization Software monetization is the key strategy to grow your top line revenues while controlling bottom line costs. The 3 S’s of Wibu-Systems unveiled: seamless, secure and scalable technology. Software Monetization is the capability to effectively maximize your software revenue by meeting market demands. As such, it is the combination of entitlement management and piracy prevention. The entitlement management is the foundation upon which license management is built. It includes in fact the definition of software SKUs, the definition and the enforcement of license policies, backoffice functions, like license generation, tracking and transaction management, as well as usability functions, like the transfer or the upgrade of licenses, usage auditing and more.

This webinar is loaded with new perspectives from Frost & Sullivan Industry Analysts for the growth of your business. Software monetization is the key strategy to grow your top line revenues while controlling bottom line costs. The 3 S’s of Wibu-Systems unveiled: seamless, secure and scalable technology. Real business usages you can apply to increase the strength of your application and multiply licensing models.

]]>
Software monetization is the key strategy to grow your top line revenues while controlling bottom line costs. The 3 S’s of Wibu-Systems unveiled: seamless, secure and scalable technology. http://podcast.wibu.com/?name=2015-02-18_01_customer_centric_view_in_software_monetisation.m4v http://podcast.wibu.com/?name=2015-02-18_01_customer_centric_view_in_software_monetisation.m4v 1:16:56 team@wibu.com (Wibu-Systems) Wibu-Systems no Wed, 05 Dec 2012 16:00:00 +0100