Browse communities
Browse communities
Presenting a webinar?

Best practices in Software Protection - White Box Cryptography

Bastiaan Van Dorsten, Pre-Sales Consultant, SafeNet
White box cryptography is an additional essential component that enables developers to protect their applications against reverse engineering, tampering, and automated attacks.

Join this live webcast and learn about:

1. Threats - as related to dongle emulation
2. The importance and the weaknesses of the “Secure Channel” between your application and the protection key
3. White box cryptography and solving the dilemma of encrypting /decrypting content without revealing any of your sensitive data
Mar 28 2012
19 mins
Best practices in Software Protection - White Box Cryptography
More from this community:

IT Governance, Risk and Compliance

  • Live and recorded (3389)
  • Upcoming (78)
  • Date
  • Rating
  • Views
  • L’ambiente dei tuoi clienti è sempre più complesso, Backup Exec 15 permette loro di esguire backup e recovery in modo semplice ed efficace, sempre e ovunque.
    Segui questo webinar e scopri come Backup Exec 15 può semplificare e rispondere alle esigenze delle diverse infrastrutture.
  • If your organization is reliant on a rapidly aging version of SQL Server, you need to join SQL Server experts Michael McCracken from HOSTING and Rodney Landrum, a Microsoft SQL Server MVP, from Ntirety for this in-depth discussion of the hows, whys and whats of upgrading from Microsoft SQL Server 200X to SQL Server 2014. The interactive webinar will cover:
    •The benefits of upgrading
    •Considerations to understand
    •How to smooth the transition
    •Q & A
  • Ingesting raw data into Hadoop is easy, but extracting business value leveraging exploration tools is not. Hadoop is a file system without a data model, data quality, or data governance, making it difficult to find, understand and govern data.

    In this webinar, Tony Baer, Principal Analyst of Ovum Research, will address the gaps and offer best practices in the end-to-end process of discovering, wrangling, and governing data in a data lake. Tony Baer will be followed by Oliver Claude who will explain how Waterline Data Inventory automates the discovery of technical, business, and compliance metadata, and provides a solution to find, understand, and govern data.

    Attend this webinar if you are:
    --A big data architect who wants to inventory all data assets at the field level automatically while providing secure self-service to business users
    --A data engineer or data scientist who wants to accelerate data prep by finding and understanding the best suited and most trusted data
    --A Chief Data Officer or data steward who wants to be able to audit data lineage, protect sensitive data, and identify compliance issues
  • Targeted malware, zero-day vulnerabilities and advanced persistent threats are increasingly responsible for data breaches. Why? Because they work. Most security products have a hard time protecting from advanced malware. This problem is compounded because attackers can easily mass produce new malware variants. What’s an IT person to do?

    Join us to learn key techniques to stop modern malware the first time. We will discuss:
    •What tactics work
    •Where to apply them
    •How to optimize cost, staffing and security.
  • Software defined architectures are all the buzz, helping to start conversations about transforming customer data centers from cost centers into competitive advantages. But in today’s economy, no business can afford to stand still. And a business is only as agile as its IT organization allows. An agile data center and IT department can:

    •Protect the infrastructure and easily recover if faults are found or predicted
    •Control access to data while meeting compliance and regulatory requirements
    •Deliver services quickly, resiliently, and cost-effectively

    Join us on at 10am GMT on 16th April 2015 and learn how Symantec’s view of the “Agile Data Center” covers delivering the right resources in the right way to the users. Whilst bringing a broader view on how you can introduce critical solutions and new revenues around disruptive customer events.
  • For years ClearCase was the standard for enterprise SCM. If you had a large number of developers and lots of projects ClearCase was a great choice, while ClearCase MultiSite provided basic support for distributed teams. Now industry trends are converging toward a new generation of development tools and processes. Today, continuous delivery brings agile development and DevOps together, promising much shorter development cycles and higher quality.

    Learn how moving from ClearCase to Subversion can improve your development processes and significantly reduce deployment cost and complexity. You'll also learn practical ClearCase to Subversion migration techniques.

    Topics Covered:
    • Differences and similarities between Subversion and ClearCase
    • How to merge in Subversion
    • Continuous delivery using Subversion: bringing agile and DevOps together for faster delivery and higher quality
    • ClearCase vs. Subversion in a distributed development environment
    • Migrating from ClearCase to Subversion
  • Recently cyber attacks against Industrial Control Systems (ICS) used by
    utilities and other Critical Infrastructure organizations have hit the
    newlines worldwide. Stuxnet is the best known cyber attack against an
    industrial installation, but it's not the only one.

    But what if cyber attacks were not the biggest threat to industrial
    networks and systems? Although malware is still a major point of
    interest, the sword of Damocles for critical industrial networks is
    represented by system misuse performed by disgruntled employees,
    contractors and vendors, as well as unintentional mistakes,
    network and system misconfiguration; all this could lead to the
    divergence or failure of critical processes.

    In this talk we will reshape the concept of ICS cyber security and will present our vision for a comprehensive approach to cyber security for ICS.
  • Adhering to international maritime sanctions requirements can be challenging in today’s regulatory landscape. Join Dow Jones Risk & Compliance and experts from HFW and Pole Star for a discussion on best practice in shipping compliance. Learn about regulatory developments -- including the latest UN Security Council communiques on "Sanctions compliance for the maritime transportation sector" -- and leverage case studies on the use of enhanced sanctions data and monitoring tools to mitigate sanctions risk.
  • As superfast connectivity becomes widely available, it will increase both data volume and velocity as well as new business opportunities. However, this dramatic leap forward will also result in new and potentially destructive activity online, which can affect an organisation’s defences both internally and within their supply chain. It has never been more important for businesses to assess and understand their critical infrastructure in an increasingly connected environment.

    During this webinar Steve Durbin, Managing Director of ISF Ltd, will discuss how businesses can update their resilience along with examining the role in securing the network boundary that investments in technology and third party provider programmes can play. This will necessarily include an assessment of cloud-based systems and the use of robust risk assessment methodologies.
  • An overview of how businesses can gain visibility into B2B transactions to speed decision-making, respond to changing customer and market demands, and optimize business processes.
  • Channel
  • Channel profile
  • Maximaler Softwareschutz: die neue Technologie hinter Sentinel Envelope Recorded: Dec 13 2012 51 mins
    Swen Feuerstein, Pre-Sales Consultant, SafeNet
    Sentinel Envelope ist ein automatischer Datei-Wrapper, der für den Schutz geistigen Eigentums vor Reverse Engineering von Software durch Dateiverschlüsselung, Code-Verschleierung und Anti-Debugging auf Systemebene sorgt. Auf diese Weise wird sichergestellt, dass Algorithmen, Geschäftsgeheimnisse und Fachwissen vor Hackern geschützt sind.

    In diesem Webinar werden unterschiedliche vom Sentinel Envelope von SafeNet verwendeten Methoden besprochen, die branchenweit den stärksten Mechanismus gegen Reverse Engineering bieten und dabei Ihre wertvollen Algorithmen und Geschäftsgeheimnisse schützen.
  • Máxima protección de software: La nueva tecnología detrás de Sentinel Envelope Recorded: Dec 11 2012 41 mins
    Julio César Domínguez, Pre-Sales Consultant, SafeNet
    Sentinel Envelope es un sistema que añade capas de protección de forma automática y que proporciona una sólida protección de la propiedad intelectual y contra la ingeniería inversa, a través del cifrado de archivos, la ofuscación de códigos y contra la depuración a nivel de sistema, garantizando la protección de los algoritmos, los secretos empresariales y los conocimientos técnicos profesionales frente a los hackers.

    Este webinar tratará los múltiples métodos utilizados por Sentinel Envelope de SafeNet, proporcionando los instrumentos de anti-ingeniería inversa más sólidos del sector, mientras se protege sus valiosos algoritmos y secretos empresariales.
  • Massima protezione per il tuo software: la nuova tecnologia di Sentinel Envelope Recorded: Dec 10 2012 34 mins
    Paolo Cornolti, Pre-Sales Engineer, SafeNet
    Sentinel Envelope è un programma di protezione delle applicazioni automatico che utilizza meccanismi di cifratura, offuscamento del codice e applica tecnologia anti-debugging per proteggere i diritti di proprietà intellettuale (IP) da attacchi informatici di reverse engineering finalizzati a carpire importanti algoritmi, segreti commerciali e know-how professionale.

    Questo webinar illustra i diversi metodi impiegati da Sentinel Envelope di SafeNet per bloccare i tentativi di reverse engineering e proteggere importanti algoritmi e segreti commerciali utilizzando i più sicuri meccanismi informatici oggi disponibili sul mercato.
  • La protection des logiciels: l'enveloppe Sentinel - la nouvelle technologie Recorded: Dec 6 2012 60 mins
    Sébastian Dijoux, Ingénieur Avant-Vente, SafeNet
    Sentinel Envelope est un encapsuleur automatique de fichiers protégeant la propriété intellectuelle contre la rétroingénierie, de l’obfuscation de code et d’un anti-débogage au niveau système.

    Ce webinaire présente les diverses méthodes utilisées par l'enveloppe Sentinel 3ème génération fournissant les mécanismes les plus robustes pour protéger contre l'ingénierie inverse tout en protégeant vos algorithmes précieux et secrets commerciaux.
  • Maximum protection for your software The new technology behind Sentinel Envelope Recorded: Dec 4 2012 40 mins
    Adam Denyer-Hampton, Pre-Sales Consultant, SafeNet
    The Sentinel Envelope is an automatic file wrapper that provides Intellectual Property (IP) protection against software reverse engineering through file encryption, code obfuscation and system-level anti-debugging ensuring that algorithms, trade secrets, and professional know-how are secured against hackers.


    This Webinar discusses the various methods as used by SafeNet’s Sentinel Envelope providing the industry’s most robust anti-reverse engineering mechanisms while protecting your valuable algorithms and trade secrets.
  • Sentinel Envelope の新技術でソフトウェアに最大限のプロテクションを! Recorded: Dec 4 2012 37 mins
    日本セーフネット株式会社 リードテクニカルサポートエンジニア 露木 智
    Sentinel Envelope は、アルゴリズム、企業秘密、専門的ノウハウをハッカーから護るために、ファイル暗号化、コード難読化、システム レベルのアンチデバッギングといった手法によるソフトウェア リバース エンジニアリングに対して、知的財産 (IP) 保護を行う自動ファイル ラッパーです。

    このウェビナーでは、あなたの貴重なアルゴリズムや企業秘密を護りながら、業界で最も堅牢なアンチ リバースエンジニアリング メカニズムを提供するSafeNet の Sentinel Envelope について紹介します。
  • 최고의 소프트웨어 보호 기술: 차세대 센티널 Envelope Recorded: Dec 4 2012 24 mins
    최 장욱 팀장, SafeNet 소프트웨어라이센싱팀
    Sentinel Envelope는 자동으로 파일을 감싸서 파일 암호화와 코드 난독화, 시스템 수준의 안티 디버깅을 통해 해커가 알고리즘, 영업 비밀, 전문적인 노하우에 침투하지 못하도록 함으로써소프트웨어 역엔지니어링으로부터 지적 재산권(IP)을보호합니다.

    본 웨비나에서는 사용자의 소중한 알고리즘과 영업 비밀을 보호하기 위해 제공되는 SafeNet의 Sentinel Envelope의 견고한 역엔지니어링 방지 메커니즘에 대해 설명합니다.
  • Customer Usage and Insight. The road to optimized cloud-based business models Recorded: Oct 30 2012 58 mins
    Holger Kisker, Ph.D, Principal Analyst, Forrester Research
    - Are you a software vendor considering adding the cloud to your delivery model?
    - Are you a SaaS provider looking to improve your business efficiency?
    - Join Holger Kisker, principal analyst at Forrester to learn:
    1. Why cloud is where you want to go
    2. Why customers are demanding more licensing flexibility
    3. How gaining customer insight will lead to an optimized cloud-based business model
  • Die Zufriedenheit der Kunden durch Lizenzmanagement steigern Recorded: Sep 27 2012 22 mins
    Baldur Scherabon, Pre-Sales Consultant, SafeNet
    In dieser Präsentation werden verschiedene Konzepte aufgezeigt, durch die Softwarehersteller ihre Lizenzmanagement-Tools wirksamer nutzen können und sollten, um die Kundenzufriedenheit zu verbessern und somit einen größeren Erfolg zu erzielen.
  • Mejorar la experiencia del cliente a través de la gestión de derechos y la conce Recorded: Sep 27 2012 29 mins
    Julio César Domínguez, Pre-Sales Consultant, SafeNet
    Esta presentación permitirá a los desarrolladores de software aprovechar al máximo las herramientas en cuanto a concesión de licencias y gestión de derechos que Safenet les ofrece, con la finalidad de mejorar la experiencia del cliente final y por consiguiente tener mayor éxito.
  • Migliorare l'esperienza del cliente con la gestione di licensing e licenze Recorded: Sep 24 2012 31 mins
    Paolo Cornolti, Pre-Sales Engineer, SafeNet
    Questa presentazione illustrerà vari modi con cui i produttori di software possono e dovrebbero fare leva sugli strumenti per la gestione del licensing e delle licenze per accentuare l'esperienza del cliente e, dunque, anche il loro successo.
  • L'amélioration de l'expérience client grâce à la gestion des droits et la licenc Recorded: Sep 20 2012 56 mins
    Sébastian Dijoux, Ingénieur Avant-Vente, SafeNet
    Cette présentation aborde les différentes façons que les éditeurs de logiciels peuvent et doivent utiliser pour tirer le meilleur parti de leurs outils de gestion des droits et de licenciation, accroître la satisfaction du client et donc bénéficier d'un plus grand succès.
  • Improving Customer Experience Through Licensing & Entitlement Management Recorded: Sep 19 2012 31 mins
    Bastiaan Van Dorsten, Pre-Sales Consultant, SafeNet
    In this presentation Bastiaan Van Dorsten will cover several ways that software publishers can and should be leveraging their licensing and entitlement management tools to heighten customer experience and therefore realize greater success.
  • Combinar los modelos de distribución de software local y en la nube Recorded: Jul 4 2012 35 mins
    Julio César Domínguez
    Únase a nuestros expertos SaaS para aprender de primera mano de qué forma los desarrolladores de software ven las opciones de distribución en la nube y cuáles son las soluciones disponibles para combinar con éxito la distribución de software local y en la nube.
  • On-Premise und Cloud-basierte Software-Auslieferungsmodelle kombinieren Recorded: Jun 27 2012 36 mins
    Baldur Scherabon
    Nehmen Sie an unserem Webcast teil und erfahren Sie von unserem SaaS Experten, wie Softwarehersteller cloud-basierte Software-Auslieferungsmodelle beurteilen und welche Lösungen es zur erfolgreichen Kombination von On-Premise und cloud-basierten Software-Auslieferungsmodellen gibt.
  • Integrare modelli on-premise e in modalità cloud per la fornitura del software Recorded: Jun 20 2012 42 mins
    Paolo Cornolti
    Si unisca ai nostri esperti di Saas, per scoprire di persona come i produttori di software progettano di offrire i servizi cloud, e per conoscere le soluzioni di licensing disponibili per la consegna dei software tradizionali on-premise e nel cloud.
  • Optimisez les modèles de livraison de vos logiciels sur site et dans le Cloud Recorded: Jun 19 2012 60 mins
    Sébastien Dijoux
    Rejoignez nos experts SaaS et découvrez ce que les éditeurs de logiciels pensent des options de livraison dans le Cloud. Découvrez également quelles solutions sont disponibles pour allier avec succès la livraison de logiciels sur site et dans le Cloud.
  • The Best of Both Worlds - combining on-premise and cloud-based software delivery Recorded: Jun 18 2012 44 mins
    Bastiaan Van Dorsten
    Join our SaaS experts to learn first hand how software publishers are viewing cloud-based delivery options and what are the available solutions for successfully combining on-premise and cloud-based software delivery.
  • Mejores prácticas en protección del software: criptografía White-box Recorded: Mar 29 2012 18 mins
    Julio César Domínguez, Pre-Sales Consultant, SafeNet
    La criptografía White-box es un componente esencial adicional que permite a los desarrolladores proteger sus aplicaciones contra la ingeniería inversa, la manipulación y los ataques automatizados.
    Únase a este webcast en directo y aprenda más sobre:
    1. Amenazas: relativas a la emulación de mochila
    2. La importancia y las debilidades del "Canal seguro" entre su aplicación y la clave de protección
    3. Criptografía White-box y solución al dilema de cifrar/descifrar contenido sin revelar ningún dato delicado
  • Best practices in Software Protection - White Box Cryptography Recorded: Mar 28 2012 19 mins
    Bastiaan Van Dorsten, Pre-Sales Consultant, SafeNet
    White box cryptography is an additional essential component that enables developers to protect their applications against reverse engineering, tampering, and automated attacks.

    Join this live webcast and learn about:

    1. Threats - as related to dongle emulation
    2. The importance and the weaknesses of the “Secure Channel” between your application and the protection key
    3. White box cryptography and solving the dilemma of encrypting /decrypting content without revealing any of your sensitive data
Software Protection and Licensing On-Premise and in the Cloud
Welcome to LicensingLive EMEA, the EMEA network of online communities dedicated to providing software vendors, industry analysts, licensing consultants, and technology vendors with a variety of forums to connect with peers, voice questions, share information, compare best practices, and brainstorm emerging challenges associated with software licensing, fulfillment, delivery and management.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best practices in Software Protection - White Box Cryptography
  • Live at: Mar 28 2012 9:00 am
  • Presented by: Bastiaan Van Dorsten, Pre-Sales Consultant, SafeNet
  • From:
Your email has been sent.
or close
You must be logged in to email this