Le migliori pratiche nella protezione del software - la crittografia white-box

Paolo Cornolti, Pre-Sales Engineer, SafeNet
La crittografia white-box rappresenta un ulteriore elemento fondamentale con cui gli sviluppatori possono proteggere le applicazioni dal rischio di reverse engineering, manomissione e attacchi automatici.
Partecipi a questa live webcast per scoprire di più su:
1. Le minacce insite nell'emulazione delle chiavi
2. L'importanza e i punti deboli del "Canale Sicuro" fra la Sua applicazione e la chiave di protezione
3. La crittografia white-box e la soluzione del dilemma di crittografare/decifrare i contenuti senza rivelare i Suoi dati sensibili
Mar 20 2012
28 mins
Le migliori pratiche nella protezione del software - la crittografia white-box
More from this community:

Business Intelligence and Analytics

  • Live and recorded (1542)
  • Upcoming (41)
  • Date
  • Rating
  • Views
  • Mater Data Management (MDM) is a key foundation for trusted data and more efficient business processes, touching almost every important activity in a company. Using this data strategically can differentiate you from your competitors.

    To succeed when planning and designing an MDM program, you need to understand where things can go wrong. Join us for this webinar to learn more about the concepts around MDM, including the wider consideration of implementing a data quality framework and pervasive data governance. We will also outline the top worst practices to avoid and discuss how to ensure your MDM initiative is a success.
  • Connecting buyer and supplier in B2B has always been a challenge. The need for speed and information quality as increased over time.

    B2B supply of product catalogs large customers is the core of the sales business of distributors and manufacturers. Feeding the procurement system of large enterprises quicker can bost revenue and build customer relationships.

    On the other side purchasing teams are focussing minimizing manual efforts when sourcing product catalogs from b2b suppliers. The quality of product catalogs from suppliers is still not on the level of quality procurement specialists dream of.

    In this webinar procurement specialists and B2B suppliers will listen and learn:

    Informatica Procurement at a glance

    - Catalog Stream, the B2B Commerce Machine: PIM-2-Procurement B2B integration, for better data quality from suppliers to reduce data management efforts

    - Simple order and approval process in the catalog interface with enhanced ERP integration & eMail

    - Always Auto Content: Auto content synchronization for always valid content and search on classification view with user-based views and new catalog content

    - Catalog Information Everywhere: Integration with surrounding applications based on the Service API (ready for data fueled mobile apps)

    - Demo & more
  • A short video introducing how LityxIQ can be used for Health Care through demonstration of a hospital use case.
  • Hadoop is transforming today's Healthcare industry. In this webinar, Charles Boicey covers the various new use cases made possible as the Hadoop ecosystem matures.​

    In 2010 the Clinical Informatics Team at the University of California in Irvine, led by Charles Boicey, looked outside of the conventional Healthcare data ecosystem for new data management solutions - their existing Electronic Health Record and Enterprise Data Warehouse environments no longer met the organization’s needs. They researched "Big Data" technologies in organizations such as Yahoo, LinkedIn, Twitter, and Facebook and concluded that Hadoop could supplement their current ecosystem to solve existing use cases and act as a platform to develop new applications for future solutions and insights.
  • YARN has fundamentally transformed the Hadoop landscape. It has opened Hadoop from a single workload system to one that can now support a multitude of “fit for purpose” processing. In this workshop we will provide an overview of Apache Slider that enables custom applications to run natively in the cluster as a YARN Ready Application. The workshop will include working examples and provide an overview of work being pursued in the community around YARN Docker integration.
  • Effective data governance requires the effective application of people, process, policy and technology to ensure consistent delivery of trusted, connected, and secure data across an enterprise.

    Organizations across all industries are investing in data governance to gain business value from their data to meet industry regulations, reduce the cost of doing business, and grow revenue and profits.

    In this webinar dedicated to data governance, Michael Wodzinski, Director of Information Architecture team, Lisa Bemis, Director of Master Data, and Fabian Torres, Director, Project Management at Houghton Mifflin Harcourt (HMH), global leader in publishing, will share their experiences in implementing a data governance program within HMH. Our guest speakers from HMH will discuss some of the unique data management challenges within HMH, how the data governance program has helped address those issues and open up new opportunities for the company. While walking you through their data governance journey, our guest speakers will offer their insights on how to establish a viable data governance practice in a complex enterprise environment, share their best practices and lessons learned. David Lyle, VP of Produce Strategy, from Informatica will share his observations in the data governance space, discuss Informatica’s data governance solutions and our thought leadership behind those offerings.
  • Attack Intelligence to Power Tomorrow’s Cyber Response.

    Preparing to combat every threat and vulnerability is a war that no cybersecurity professional can win today. Speed, accuracy and visibility of threats and active attacks is critical to defending against APTs and other sophisticated attacks responsible for today’s headline-grabbing data breaches. The next generation of advanced threat prevention solutions will require a significant shift in how we incorporate threat and attack visibility into everyday security operations, enabling incident responders to identify and stop campaigns as they happen.

    Join us as IDC’s Research Vice President for Security Products Services Charles Kolodgy shares his view of the threat landscape, including how threats are evolving, how cybercriminals are becoming more sophisticated and what new solutions are necessary to combat APTs.
  • Growing installs is the number one mission for any mobile app developer, and any user acquisition strategy generally consists of a mix of organic installs and paid campaigns. But many see these as separate and distinct. Not true. To get the most out of each — especially for smaller developers — it’s critical to understand how paid installs impact organic installs, and vice versa.

    In this webinar, Ian Sefferman of TUNE will share the eye-opening results of a study investigating the correlation between paid campaigns and organic installs (yes, it’s positive), and how this varies depending on the app category and operating system. Christian Calderon of DOTS will dive into the strategies and tactics that increase both paid and organic installs, and how they work together.

    What you’ll learn:
    For every paid install, how many organic installs an app can expect to see
    How the multiplier effect impacts app categories differently
    How organic installs and engaged users affect your paid strategy and spend
    Best-practice examples on what really works to maximize both organic installs and paid campaigns for highest yield

    #paidorganic
    #appmktg

    Speakers:
    Ian Sefferman, GM, App Store Analytics
    Christian Calderon, Head of Marketing, DOTS
  • Based on recent research by analyst Bob Larrivee of AIIM, this webinar will address how organizations can leverage technology to identify, evaluate and optimize business processes to increase operational efficiency.

    Join us as we explore:
    - Drivers for problem-solving, tracking KPIs, process failures and workflow management
    - How technology can reduce errors and exceptions that lead to lost business and non-compliance
    - Increasing visibility to optimize processes, reduce costs and deliver a superior customer experience
  • Scaling multiple databases with a single legacy storage system works well from a cost perspective, but workload conflicts and hardware contention make these solutions an unattractive choice for anything but low-performance applications.

    Attend the webinar to learn about:
    - How SolidFire’s all-flash storage system provides high performance at massive scale for mixed workload processing while simultaneously controlling costs and guaranteeing performance
    - How to deploy four or more database copies using SolidFire’s Oracle Validated Configuration, at a price point at or below the cost of traditional storage systems
    - SolidFire’s Quality of Service (QoS) guarantee; every copy receives dedicated all-flash performance, so IT admins can deliver solutions with confidence and maximize business efficiency
  • Channel
  • Channel profile
  • Maximaler Softwareschutz: die neue Technologie hinter Sentinel Envelope Recorded: Dec 13 2012 51 mins
    Sentinel Envelope ist ein automatischer Datei-Wrapper, der für den Schutz geistigen Eigentums vor Reverse Engineering von Software durch Dateiverschlüsselung, Code-Verschleierung und Anti-Debugging auf Systemebene sorgt. Auf diese Weise wird sichergestellt, dass Algorithmen, Geschäftsgeheimnisse und Fachwissen vor Hackern geschützt sind.

    In diesem Webinar werden unterschiedliche vom Sentinel Envelope von SafeNet verwendeten Methoden besprochen, die branchenweit den stärksten Mechanismus gegen Reverse Engineering bieten und dabei Ihre wertvollen Algorithmen und Geschäftsgeheimnisse schützen.
  • Máxima protección de software: La nueva tecnología detrás de Sentinel Envelope Recorded: Dec 11 2012 41 mins
    Sentinel Envelope es un sistema que añade capas de protección de forma automática y que proporciona una sólida protección de la propiedad intelectual y contra la ingeniería inversa, a través del cifrado de archivos, la ofuscación de códigos y contra la depuración a nivel de sistema, garantizando la protección de los algoritmos, los secretos empresariales y los conocimientos técnicos profesionales frente a los hackers.

    Este webinar tratará los múltiples métodos utilizados por Sentinel Envelope de SafeNet, proporcionando los instrumentos de anti-ingeniería inversa más sólidos del sector, mientras se protege sus valiosos algoritmos y secretos empresariales.
  • Massima protezione per il tuo software: la nuova tecnologia di Sentinel Envelope Recorded: Dec 10 2012 34 mins
    Sentinel Envelope è un programma di protezione delle applicazioni automatico che utilizza meccanismi di cifratura, offuscamento del codice e applica tecnologia anti-debugging per proteggere i diritti di proprietà intellettuale (IP) da attacchi informatici di reverse engineering finalizzati a carpire importanti algoritmi, segreti commerciali e know-how professionale.

    Questo webinar illustra i diversi metodi impiegati da Sentinel Envelope di SafeNet per bloccare i tentativi di reverse engineering e proteggere importanti algoritmi e segreti commerciali utilizzando i più sicuri meccanismi informatici oggi disponibili sul mercato.
  • La protection des logiciels: l'enveloppe Sentinel - la nouvelle technologie Recorded: Dec 6 2012 60 mins
    Sentinel Envelope est un encapsuleur automatique de fichiers protégeant la propriété intellectuelle contre la rétroingénierie, de l’obfuscation de code et d’un anti-débogage au niveau système.

    Ce webinaire présente les diverses méthodes utilisées par l'enveloppe Sentinel 3ème génération fournissant les mécanismes les plus robustes pour protéger contre l'ingénierie inverse tout en protégeant vos algorithmes précieux et secrets commerciaux.
  • Maximum protection for your software The new technology behind Sentinel Envelope Recorded: Dec 4 2012 40 mins
    The Sentinel Envelope is an automatic file wrapper that provides Intellectual Property (IP) protection against software reverse engineering through file encryption, code obfuscation and system-level anti-debugging ensuring that algorithms, trade secrets, and professional know-how are secured against hackers.


    This Webinar discusses the various methods as used by SafeNet’s Sentinel Envelope providing the industry’s most robust anti-reverse engineering mechanisms while protecting your valuable algorithms and trade secrets.
  • Sentinel Envelope の新技術でソフトウェアに最大限のプロテクションを! Recorded: Dec 4 2012 37 mins
    Sentinel Envelope は、アルゴリズム、企業秘密、専門的ノウハウをハッカーから護るために、ファイル暗号化、コード難読化、システム レベルのアンチデバッギングといった手法によるソフトウェア リバース エンジニアリングに対して、知的財産 (IP) 保護を行う自動ファイル ラッパーです。

    このウェビナーでは、あなたの貴重なアルゴリズムや企業秘密を護りながら、業界で最も堅牢なアンチ リバースエンジニアリング メカニズムを提供するSafeNet の Sentinel Envelope について紹介します。
  • 최고의 소프트웨어 보호 기술: 차세대 센티널 Envelope Recorded: Dec 4 2012 24 mins
    Sentinel Envelope는 자동으로 파일을 감싸서 파일 암호화와 코드 난독화, 시스템 수준의 안티 디버깅을 통해 해커가 알고리즘, 영업 비밀, 전문적인 노하우에 침투하지 못하도록 함으로써소프트웨어 역엔지니어링으로부터 지적 재산권(IP)을보호합니다.

    본 웨비나에서는 사용자의 소중한 알고리즘과 영업 비밀을 보호하기 위해 제공되는 SafeNet의 Sentinel Envelope의 견고한 역엔지니어링 방지 메커니즘에 대해 설명합니다.
  • Customer Usage and Insight. The road to optimized cloud-based business models Recorded: Oct 30 2012 58 mins
    - Are you a software vendor considering adding the cloud to your delivery model?
    - Are you a SaaS provider looking to improve your business efficiency?
    - Join Holger Kisker, principal analyst at Forrester to learn:
    1. Why cloud is where you want to go
    2. Why customers are demanding more licensing flexibility
    3. How gaining customer insight will lead to an optimized cloud-based business model
  • Die Zufriedenheit der Kunden durch Lizenzmanagement steigern Recorded: Sep 27 2012 22 mins
    In dieser Präsentation werden verschiedene Konzepte aufgezeigt, durch die Softwarehersteller ihre Lizenzmanagement-Tools wirksamer nutzen können und sollten, um die Kundenzufriedenheit zu verbessern und somit einen größeren Erfolg zu erzielen.
  • Mejorar la experiencia del cliente a través de la gestión de derechos y la conce Recorded: Sep 27 2012 29 mins
    Esta presentación permitirá a los desarrolladores de software aprovechar al máximo las herramientas en cuanto a concesión de licencias y gestión de derechos que Safenet les ofrece, con la finalidad de mejorar la experiencia del cliente final y por consiguiente tener mayor éxito.
  • Migliorare l'esperienza del cliente con la gestione di licensing e licenze Recorded: Sep 24 2012 31 mins
    Questa presentazione illustrerà vari modi con cui i produttori di software possono e dovrebbero fare leva sugli strumenti per la gestione del licensing e delle licenze per accentuare l'esperienza del cliente e, dunque, anche il loro successo.
  • L'amélioration de l'expérience client grâce à la gestion des droits et la licenc Recorded: Sep 20 2012 56 mins
    Cette présentation aborde les différentes façons que les éditeurs de logiciels peuvent et doivent utiliser pour tirer le meilleur parti de leurs outils de gestion des droits et de licenciation, accroître la satisfaction du client et donc bénéficier d'un plus grand succès.
  • Improving Customer Experience Through Licensing & Entitlement Management Recorded: Sep 19 2012 31 mins
    In this presentation Bastiaan Van Dorsten will cover several ways that software publishers can and should be leveraging their licensing and entitlement management tools to heighten customer experience and therefore realize greater success.
  • Combinar los modelos de distribución de software local y en la nube Recorded: Jul 4 2012 35 mins
    Únase a nuestros expertos SaaS para aprender de primera mano de qué forma los desarrolladores de software ven las opciones de distribución en la nube y cuáles son las soluciones disponibles para combinar con éxito la distribución de software local y en la nube.
  • On-Premise und Cloud-basierte Software-Auslieferungsmodelle kombinieren Recorded: Jun 27 2012 36 mins
    Nehmen Sie an unserem Webcast teil und erfahren Sie von unserem SaaS Experten, wie Softwarehersteller cloud-basierte Software-Auslieferungsmodelle beurteilen und welche Lösungen es zur erfolgreichen Kombination von On-Premise und cloud-basierten Software-Auslieferungsmodellen gibt.
  • Integrare modelli on-premise e in modalità cloud per la fornitura del software Recorded: Jun 20 2012 42 mins
    Si unisca ai nostri esperti di Saas, per scoprire di persona come i produttori di software progettano di offrire i servizi cloud, e per conoscere le soluzioni di licensing disponibili per la consegna dei software tradizionali on-premise e nel cloud.
  • Optimisez les modèles de livraison de vos logiciels sur site et dans le Cloud Recorded: Jun 19 2012 60 mins
    Rejoignez nos experts SaaS et découvrez ce que les éditeurs de logiciels pensent des options de livraison dans le Cloud. Découvrez également quelles solutions sont disponibles pour allier avec succès la livraison de logiciels sur site et dans le Cloud.
  • The Best of Both Worlds - combining on-premise and cloud-based software delivery Recorded: Jun 18 2012 44 mins
    Join our SaaS experts to learn first hand how software publishers are viewing cloud-based delivery options and what are the available solutions for successfully combining on-premise and cloud-based software delivery.
  • Mejores prácticas en protección del software: criptografía White-box Recorded: Mar 29 2012 18 mins
    La criptografía White-box es un componente esencial adicional que permite a los desarrolladores proteger sus aplicaciones contra la ingeniería inversa, la manipulación y los ataques automatizados.
    Únase a este webcast en directo y aprenda más sobre:
    1. Amenazas: relativas a la emulación de mochila
    2. La importancia y las debilidades del "Canal seguro" entre su aplicación y la clave de protección
    3. Criptografía White-box y solución al dilema de cifrar/descifrar contenido sin revelar ningún dato delicado
  • Best practices in Software Protection - White Box Cryptography Recorded: Mar 28 2012 19 mins
    White box cryptography is an additional essential component that enables developers to protect their applications against reverse engineering, tampering, and automated attacks.

    Join this live webcast and learn about:

    1. Threats - as related to dongle emulation
    2. The importance and the weaknesses of the “Secure Channel” between your application and the protection key
    3. White box cryptography and solving the dilemma of encrypting /decrypting content without revealing any of your sensitive data
Software Protection and Licensing On-Premise and in the Cloud
Welcome to LicensingLive EMEA, the EMEA network of online communities dedicated to providing software vendors, industry analysts, licensing consultants, and technology vendors with a variety of forums to connect with peers, voice questions, share information, compare best practices, and brainstorm emerging challenges associated with software licensing, fulfillment, delivery and management.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Le migliori pratiche nella protezione del software - la crittografia white-box
  • Live at: Mar 20 2012 9:30 am
  • Presented by: Paolo Cornolti, Pre-Sales Engineer, SafeNet
  • From:
Your email has been sent.
or close
You must be logged in to email this