Best practices in Software Protection - White Box Cryptography

Bastiaan Van Dorsten, Pre-Sales Consultant, SafeNet
White box cryptography is an additional essential component that enables developers to protect their applications against reverse engineering, tampering, and automated attacks.

Join this live webcast and learn about:

1. Threats - as related to dongle emulation
2. The importance and the weaknesses of the “Secure Channel” between your application and the protection key
3. White box cryptography and solving the dilemma of encrypting /decrypting content without revealing any of your sensitive data
Mar 28 2012
19 mins
Best practices in Software Protection - White Box Cryptography
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live 1 and recorded (2836)
  • Upcoming (85)
  • Date
  • Rating
  • Views
  • Are attacks on your network and users still occurring, despite continuing efforts to stay on top of security? What impact would malware have on your business if it was able to gain internal access and steal sensitive information?

    Without solutions that can disrupt the chain of events that occur during an advanced attack, many businesses are still being infiltrated and losing data every day. This webinar will cover the best practices in disrupting attacks with content security solutions - connected to optimize protection.
    Join this webinar as:
    •You will learn the tactics used by attackers today to infiltrate businesses
    •You will hear about the leading technologies available to disrupt advanced attacks
    •You will walk away with the knowledge to assess your own environment, and optimize your security
    Businesses today face more advanced attacks than we’ve ever seen in the past – and defending against them takes a connected approach which can disrupt the multiple points of infiltration and exfiltration used in the process of a breach. With most attacks seen in the wild using phishing emails to reach their target, a web link or malicious file to deliver a payload, and an outbound stream of communication to exfiltrate data – implementing a Secure Email Gateway, Secure Web Gateway, and Data Loss Prevention technology together will provide a barrier difficult for even the most advanced attacks to overcome.

    Don’t miss this webinar if you have a stake in the security of your most valuable information, or are directly responsible for the implementation of security solutions to protect it. Register now for this 30 minute webinar.
  • As most IT Pros are aware, as of April 8th, 2014, Microsoft will stop releasing security patches for Windows XP. Unfortunately, most folks will not be able to migrate all Windows XP machines by that deadline. How will you limit the security risks posed by these now vulnerable assets? Join us for this webinar outlining practical strategies to help you cover your assets.
    In this session we'll cover:
    The primary attack vectors you need to consider
    Immediate actions you can take to limit the exposure of your XP assets
    Warning signs to watch out for that could signal an attack
    How to closely monitor your vulnerable assets with AlienVault USM
  • MDM implementations begin by solving the most pressing business problem in a single hub, mostly on-premise. They then expand to another use case, domain, or region, and might evolve to another MDM hub on cloud or in a different country. Whatever the journey might be, how do you tie the different hubs together in a hybrid or federated hub-of-hubs MDM architecture? Come to this session to learn how certain leading companies are solving this conundrum!

    In this webinar, you will learn:
    -What are the initial use cases that dictate MDM
    -How to determine if you should use the same MDM instance or a different one when expanding your use case
    -When to use on-premise versus cloud MDM

    In addition, we will explore examples of companies using hybrid MDM to manage multiple MDM hubs as well as evolving to the holy-grail of MDM architecture: Hub-of-hubs or federated MDM.
  • Cyberspace is typically the prime mechanism for conducting business. It also plays a key role in the socio-cultural lives of staff, customers and suppliers. By the end of 2013, revelations about how governments had been surrendering commercial and personal privacy in the name of national security left trust very badly shaken. And the timing couldn’t be much worse: many CEOs are ramping up their demands to take even greater advantage of cyberspace. So if this is where things are now, how will all of this look by 2016? How will new threats hurtling over the horizon complicate matters even further? Just what will organisations be able to rely on? And most importantly, are they powerless or can they do something now? This webcast spotlights the threats we'll be dealing with over the coming 24 months along with advice on the best ways of handling them.
  • As more and more companies look to take advantage of all of the benefits afforded with cloud-based infrastructures, the discussion often quickly turns to “How do we get there?” For some companies, this single migration question can create an insurmountable roadblock that either keeps them from moving to the cloud or severely delays their migration. Join Michael McCracken, HOSTING’s Director of Professional Services, as he explores different cloud migration strategies along with the benefits and risks associated with each of those strategies.
  • Anti-virus is not enough. McAfee Complete Endpoint Protection add defense in depth against the full threat spectrum from zero-day exploits to hacker attacks, as well as mobile devices such and tablets.
  • Protiviti has conducted the second-annual Executive Perspectives on Top Risks Survey. We obtained the views of more than 370 board members and C-suite executives about risks that are likely to affect their organisation in 2014.

    Join Managing Director, Mike Purvis and Director, Dirk Verwohlt for a discussion of the report findings.
  • With the release of PCI-DSS version 3.0 many organizations that are already PCI compliant or are working towards becoming PCI compliant are wondering what these changes will mean to their organization. In this webinar we will take a look at what has changed (and what hasn’t) and the impact this will have on how organizations approach PCI compliance.
  • As we continue to explore the ERP implementation process, we’re going to dive deeper into one technology solution you might consider for a successful ERP implementation. Join us as we discuss Oracle eBusiness Suite Release 12. You’ll want to join us if you’re:
    • Thinking about upgrading to release 12
    • On R12.1 and considering moving to R12.2
    • Just looking for a little ‘positive sell’ to add to that budget request so you can fund your upgrade

    Oracle eBusiness Suite Release 12 was defined as “The Global Business Release”. This doesn’t encompass just its geographic reach…the Suite is a comprehensive tool whose breadth and depth across industries and business functions is compelling for customers around the world.

    During this session, participants will learn about:
    • The changes to R12.2 including the foundational architecture improvements and financial enhancements
    • How the strength of Financials Release 12 allows businesses to work globally - across applications, divisions and regions and the tools necessary to achieve that.
    • Integration, data management and reporting

    Oracle eBusiness Suite Release 12 makes it easier and less expensive for customers to implement, manage and scale global applications - ultimately improving the overall ownership experience.
  • Big data has gone beyond a buzzword for businesses and is rapidly becoming embedded in the way organisations operate and make decisions. Highlighted as one of the key areas for attention in the latest ISF Threat Horizon 2016 report, Big data analytics can also mislead when decisions are based on faulty, skewed, incomplete or poorly analysed data sets, resulting in missed opportunities as organisations enter the wrong markets, or enter the right markets with the wrong products. It’s also possible that the same data sets can lead to different conclusions in different parts of the world as a result of cultural bias. Further complicating matters, attackers will target data analytics tools to ensure decisions are skewed.

    This webcast will look at the implied threats to Big Data and offer ways of communicating the challenge of effective Big Data analysis and decision making to senior management.
  • Channel
  • Channel profile
Up Down
  • Maximaler Softwareschutz: die neue Technologie hinter Sentinel Envelope Recorded: Dec 13 2012 51 mins
    Sentinel Envelope ist ein automatischer Datei-Wrapper, der für den Schutz geistigen Eigentums vor Reverse Engineering von Software durch Dateiverschlüsselung, Code-Verschleierung und Anti-Debugging auf Systemebene sorgt. Auf diese Weise wird sichergestellt, dass Algorithmen, Geschäftsgeheimnisse und Fachwissen vor Hackern geschützt sind.

    In diesem Webinar werden unterschiedliche vom Sentinel Envelope von SafeNet verwendeten Methoden besprochen, die branchenweit den stärksten Mechanismus gegen Reverse Engineering bieten und dabei Ihre wertvollen Algorithmen und Geschäftsgeheimnisse schützen.
  • Máxima protección de software: La nueva tecnología detrás de Sentinel Envelope Recorded: Dec 11 2012 41 mins
    Sentinel Envelope es un sistema que añade capas de protección de forma automática y que proporciona una sólida protección de la propiedad intelectual y contra la ingeniería inversa, a través del cifrado de archivos, la ofuscación de códigos y contra la depuración a nivel de sistema, garantizando la protección de los algoritmos, los secretos empresariales y los conocimientos técnicos profesionales frente a los hackers.

    Este webinar tratará los múltiples métodos utilizados por Sentinel Envelope de SafeNet, proporcionando los instrumentos de anti-ingeniería inversa más sólidos del sector, mientras se protege sus valiosos algoritmos y secretos empresariales.
  • Massima protezione per il tuo software: la nuova tecnologia di Sentinel Envelope Recorded: Dec 10 2012 34 mins
    Sentinel Envelope è un programma di protezione delle applicazioni automatico che utilizza meccanismi di cifratura, offuscamento del codice e applica tecnologia anti-debugging per proteggere i diritti di proprietà intellettuale (IP) da attacchi informatici di reverse engineering finalizzati a carpire importanti algoritmi, segreti commerciali e know-how professionale.

    Questo webinar illustra i diversi metodi impiegati da Sentinel Envelope di SafeNet per bloccare i tentativi di reverse engineering e proteggere importanti algoritmi e segreti commerciali utilizzando i più sicuri meccanismi informatici oggi disponibili sul mercato.
  • La protection des logiciels: l'enveloppe Sentinel - la nouvelle technologie Recorded: Dec 6 2012 60 mins
    Sentinel Envelope est un encapsuleur automatique de fichiers protégeant la propriété intellectuelle contre la rétroingénierie, de l’obfuscation de code et d’un anti-débogage au niveau système.

    Ce webinaire présente les diverses méthodes utilisées par l'enveloppe Sentinel 3ème génération fournissant les mécanismes les plus robustes pour protéger contre l'ingénierie inverse tout en protégeant vos algorithmes précieux et secrets commerciaux.
  • Maximum protection for your software The new technology behind Sentinel Envelope Recorded: Dec 4 2012 40 mins
    The Sentinel Envelope is an automatic file wrapper that provides Intellectual Property (IP) protection against software reverse engineering through file encryption, code obfuscation and system-level anti-debugging ensuring that algorithms, trade secrets, and professional know-how are secured against hackers.


    This Webinar discusses the various methods as used by SafeNet’s Sentinel Envelope providing the industry’s most robust anti-reverse engineering mechanisms while protecting your valuable algorithms and trade secrets.
  • Sentinel Envelope の新技術でソフトウェアに最大限のプロテクションを! Recorded: Dec 4 2012 37 mins
    Sentinel Envelope は、アルゴリズム、企業秘密、専門的ノウハウをハッカーから護るために、ファイル暗号化、コード難読化、システム レベルのアンチデバッギングといった手法によるソフトウェア リバース エンジニアリングに対して、知的財産 (IP) 保護を行う自動ファイル ラッパーです。

    このウェビナーでは、あなたの貴重なアルゴリズムや企業秘密を護りながら、業界で最も堅牢なアンチ リバースエンジニアリング メカニズムを提供するSafeNet の Sentinel Envelope について紹介します。
  • 최고의 소프트웨어 보호 기술: 차세대 센티널 Envelope Recorded: Dec 4 2012 24 mins
    Sentinel Envelope는 자동으로 파일을 감싸서 파일 암호화와 코드 난독화, 시스템 수준의 안티 디버깅을 통해 해커가 알고리즘, 영업 비밀, 전문적인 노하우에 침투하지 못하도록 함으로써소프트웨어 역엔지니어링으로부터 지적 재산권(IP)을보호합니다.

    본 웨비나에서는 사용자의 소중한 알고리즘과 영업 비밀을 보호하기 위해 제공되는 SafeNet의 Sentinel Envelope의 견고한 역엔지니어링 방지 메커니즘에 대해 설명합니다.
  • Customer Usage and Insight. The road to optimized cloud-based business models Recorded: Oct 30 2012 58 mins
    - Are you a software vendor considering adding the cloud to your delivery model?
    - Are you a SaaS provider looking to improve your business efficiency?
    - Join Holger Kisker, principal analyst at Forrester to learn:
    1. Why cloud is where you want to go
    2. Why customers are demanding more licensing flexibility
    3. How gaining customer insight will lead to an optimized cloud-based business model
  • Die Zufriedenheit der Kunden durch Lizenzmanagement steigern Recorded: Sep 27 2012 22 mins
    In dieser Präsentation werden verschiedene Konzepte aufgezeigt, durch die Softwarehersteller ihre Lizenzmanagement-Tools wirksamer nutzen können und sollten, um die Kundenzufriedenheit zu verbessern und somit einen größeren Erfolg zu erzielen.
  • Mejorar la experiencia del cliente a través de la gestión de derechos y la conce Recorded: Sep 27 2012 29 mins
    Esta presentación permitirá a los desarrolladores de software aprovechar al máximo las herramientas en cuanto a concesión de licencias y gestión de derechos que Safenet les ofrece, con la finalidad de mejorar la experiencia del cliente final y por consiguiente tener mayor éxito.
  • Migliorare l'esperienza del cliente con la gestione di licensing e licenze Recorded: Sep 24 2012 31 mins
    Questa presentazione illustrerà vari modi con cui i produttori di software possono e dovrebbero fare leva sugli strumenti per la gestione del licensing e delle licenze per accentuare l'esperienza del cliente e, dunque, anche il loro successo.
  • L'amélioration de l'expérience client grâce à la gestion des droits et la licenc Recorded: Sep 20 2012 56 mins
    Cette présentation aborde les différentes façons que les éditeurs de logiciels peuvent et doivent utiliser pour tirer le meilleur parti de leurs outils de gestion des droits et de licenciation, accroître la satisfaction du client et donc bénéficier d'un plus grand succès.
  • Improving Customer Experience Through Licensing & Entitlement Management Recorded: Sep 19 2012 31 mins
    In this presentation Bastiaan Van Dorsten will cover several ways that software publishers can and should be leveraging their licensing and entitlement management tools to heighten customer experience and therefore realize greater success.
  • Combinar los modelos de distribución de software local y en la nube Recorded: Jul 4 2012 35 mins
    Únase a nuestros expertos SaaS para aprender de primera mano de qué forma los desarrolladores de software ven las opciones de distribución en la nube y cuáles son las soluciones disponibles para combinar con éxito la distribución de software local y en la nube.
  • On-Premise und Cloud-basierte Software-Auslieferungsmodelle kombinieren Recorded: Jun 27 2012 36 mins
    Nehmen Sie an unserem Webcast teil und erfahren Sie von unserem SaaS Experten, wie Softwarehersteller cloud-basierte Software-Auslieferungsmodelle beurteilen und welche Lösungen es zur erfolgreichen Kombination von On-Premise und cloud-basierten Software-Auslieferungsmodellen gibt.
  • Integrare modelli on-premise e in modalità cloud per la fornitura del software Recorded: Jun 20 2012 42 mins
    Si unisca ai nostri esperti di Saas, per scoprire di persona come i produttori di software progettano di offrire i servizi cloud, e per conoscere le soluzioni di licensing disponibili per la consegna dei software tradizionali on-premise e nel cloud.
  • Optimisez les modèles de livraison de vos logiciels sur site et dans le Cloud Recorded: Jun 19 2012 60 mins
    Rejoignez nos experts SaaS et découvrez ce que les éditeurs de logiciels pensent des options de livraison dans le Cloud. Découvrez également quelles solutions sont disponibles pour allier avec succès la livraison de logiciels sur site et dans le Cloud.
  • The Best of Both Worlds - combining on-premise and cloud-based software delivery Recorded: Jun 18 2012 44 mins
    Join our SaaS experts to learn first hand how software publishers are viewing cloud-based delivery options and what are the available solutions for successfully combining on-premise and cloud-based software delivery.
  • Mejores prácticas en protección del software: criptografía White-box Recorded: Mar 29 2012 18 mins
    La criptografía White-box es un componente esencial adicional que permite a los desarrolladores proteger sus aplicaciones contra la ingeniería inversa, la manipulación y los ataques automatizados.
    Únase a este webcast en directo y aprenda más sobre:
    1. Amenazas: relativas a la emulación de mochila
    2. La importancia y las debilidades del "Canal seguro" entre su aplicación y la clave de protección
    3. Criptografía White-box y solución al dilema de cifrar/descifrar contenido sin revelar ningún dato delicado
  • Best practices in Software Protection - White Box Cryptography Recorded: Mar 28 2012 19 mins
    White box cryptography is an additional essential component that enables developers to protect their applications against reverse engineering, tampering, and automated attacks.

    Join this live webcast and learn about:

    1. Threats - as related to dongle emulation
    2. The importance and the weaknesses of the “Secure Channel” between your application and the protection key
    3. White box cryptography and solving the dilemma of encrypting /decrypting content without revealing any of your sensitive data
Software Protection and Licensing On-Premise and in the Cloud
Welcome to LicensingLive EMEA, the EMEA network of online communities dedicated to providing software vendors, industry analysts, licensing consultants, and technology vendors with a variety of forums to connect with peers, voice questions, share information, compare best practices, and brainstorm emerging challenges associated with software licensing, fulfillment, delivery and management.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best practices in Software Protection - White Box Cryptography
  • Live at: Mar 28 2012 9:00 am
  • Presented by: Bastiaan Van Dorsten, Pre-Sales Consultant, SafeNet
  • From:
Your email has been sent.
or close
You must be logged in to email this