Combinar los modelos de distribución de software local y en la nube

Julio César Domínguez
Únase a nuestros expertos SaaS para aprender de primera mano de qué forma los desarrolladores de software ven las opciones de distribución en la nube y cuáles son las soluciones disponibles para combinar con éxito la distribución de software local y en la nube.
Jul 4 2012
35 mins
Combinar los modelos de distribución de software local y en la nube
Join us for this summit:
More from this community:

Cloud Computing

Webinars and videos

  • Live and recorded (3278)
  • Upcoming (106)
  • Date
  • Rating
  • Views
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Trend Micro sponsored an extensive security survey of businesses in North America and Europe. Conducted by Cyber-Edge Group, LLC, a premier research and marketing firm, the survey examines the current and planned deployment countermeasures for establishing effective cyber defenses. This webinar will reveal the significant findings from the survey and accompanying report and is intended to provide IT security decision makers with a better understanding of how their perceptions, concerns, priorities – and most importantly – current defensive postures stack up against those of other IT security professionals and organizations. Key highlights from the report include:
    • One in four security professionals doubt whether their organization has invested adequately in cyber threat defenses.
    • Over 60% of respondents were affected by a successful cyber-attack in 2013, but less than 40% expect to fall victim again in 2014.
    • Mobile devices (smartphones and tablets) are perceived as IT security’s “weakest link”, followed by laptops and social media applications.
    • One in four organizations lack the tools necessary to properly investigate the root cause and material impact of network security breaches.

    Join Mark Bouchard, Vice President with Cyber-Edge Group and Jon Clay, Director of Global Threat Research with Trend Micro, for this webinar to learn more about the state of cyber threat defenses among today’s businesses and gain a better understanding of what you can do to improve your defenses going forward.
  • Décrouvrez les solutions Networking Dell, Convergence, 10Gb et administration centralisée
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
  • Dell Présente lors du CRIP une approche concrète des PRA/PCA en 90 secondes
  • 397% de ROI , c‘est ce que vous offre l’architecture Fluid Data de Dell. C’est prouvé mais comment est-ce possible ?
  • Channel
  • Channel profile
Up Down
  • Maximaler Softwareschutz: die neue Technologie hinter Sentinel Envelope Recorded: Dec 13 2012 51 mins
    Sentinel Envelope ist ein automatischer Datei-Wrapper, der für den Schutz geistigen Eigentums vor Reverse Engineering von Software durch Dateiverschlüsselung, Code-Verschleierung und Anti-Debugging auf Systemebene sorgt. Auf diese Weise wird sichergestellt, dass Algorithmen, Geschäftsgeheimnisse und Fachwissen vor Hackern geschützt sind.

    In diesem Webinar werden unterschiedliche vom Sentinel Envelope von SafeNet verwendeten Methoden besprochen, die branchenweit den stärksten Mechanismus gegen Reverse Engineering bieten und dabei Ihre wertvollen Algorithmen und Geschäftsgeheimnisse schützen.
  • Máxima protección de software: La nueva tecnología detrás de Sentinel Envelope Recorded: Dec 11 2012 41 mins
    Sentinel Envelope es un sistema que añade capas de protección de forma automática y que proporciona una sólida protección de la propiedad intelectual y contra la ingeniería inversa, a través del cifrado de archivos, la ofuscación de códigos y contra la depuración a nivel de sistema, garantizando la protección de los algoritmos, los secretos empresariales y los conocimientos técnicos profesionales frente a los hackers.

    Este webinar tratará los múltiples métodos utilizados por Sentinel Envelope de SafeNet, proporcionando los instrumentos de anti-ingeniería inversa más sólidos del sector, mientras se protege sus valiosos algoritmos y secretos empresariales.
  • Massima protezione per il tuo software: la nuova tecnologia di Sentinel Envelope Recorded: Dec 10 2012 34 mins
    Sentinel Envelope è un programma di protezione delle applicazioni automatico che utilizza meccanismi di cifratura, offuscamento del codice e applica tecnologia anti-debugging per proteggere i diritti di proprietà intellettuale (IP) da attacchi informatici di reverse engineering finalizzati a carpire importanti algoritmi, segreti commerciali e know-how professionale.

    Questo webinar illustra i diversi metodi impiegati da Sentinel Envelope di SafeNet per bloccare i tentativi di reverse engineering e proteggere importanti algoritmi e segreti commerciali utilizzando i più sicuri meccanismi informatici oggi disponibili sul mercato.
  • La protection des logiciels: l'enveloppe Sentinel - la nouvelle technologie Recorded: Dec 6 2012 60 mins
    Sentinel Envelope est un encapsuleur automatique de fichiers protégeant la propriété intellectuelle contre la rétroingénierie, de l’obfuscation de code et d’un anti-débogage au niveau système.

    Ce webinaire présente les diverses méthodes utilisées par l'enveloppe Sentinel 3ème génération fournissant les mécanismes les plus robustes pour protéger contre l'ingénierie inverse tout en protégeant vos algorithmes précieux et secrets commerciaux.
  • Maximum protection for your software The new technology behind Sentinel Envelope Recorded: Dec 4 2012 40 mins
    The Sentinel Envelope is an automatic file wrapper that provides Intellectual Property (IP) protection against software reverse engineering through file encryption, code obfuscation and system-level anti-debugging ensuring that algorithms, trade secrets, and professional know-how are secured against hackers.


    This Webinar discusses the various methods as used by SafeNet’s Sentinel Envelope providing the industry’s most robust anti-reverse engineering mechanisms while protecting your valuable algorithms and trade secrets.
  • Sentinel Envelope の新技術でソフトウェアに最大限のプロテクションを! Recorded: Dec 4 2012 37 mins
    Sentinel Envelope は、アルゴリズム、企業秘密、専門的ノウハウをハッカーから護るために、ファイル暗号化、コード難読化、システム レベルのアンチデバッギングといった手法によるソフトウェア リバース エンジニアリングに対して、知的財産 (IP) 保護を行う自動ファイル ラッパーです。

    このウェビナーでは、あなたの貴重なアルゴリズムや企業秘密を護りながら、業界で最も堅牢なアンチ リバースエンジニアリング メカニズムを提供するSafeNet の Sentinel Envelope について紹介します。
  • 최고의 소프트웨어 보호 기술: 차세대 센티널 Envelope Recorded: Dec 4 2012 24 mins
    Sentinel Envelope는 자동으로 파일을 감싸서 파일 암호화와 코드 난독화, 시스템 수준의 안티 디버깅을 통해 해커가 알고리즘, 영업 비밀, 전문적인 노하우에 침투하지 못하도록 함으로써소프트웨어 역엔지니어링으로부터 지적 재산권(IP)을보호합니다.

    본 웨비나에서는 사용자의 소중한 알고리즘과 영업 비밀을 보호하기 위해 제공되는 SafeNet의 Sentinel Envelope의 견고한 역엔지니어링 방지 메커니즘에 대해 설명합니다.
  • Customer Usage and Insight. The road to optimized cloud-based business models Recorded: Oct 30 2012 58 mins
    - Are you a software vendor considering adding the cloud to your delivery model?
    - Are you a SaaS provider looking to improve your business efficiency?
    - Join Holger Kisker, principal analyst at Forrester to learn:
    1. Why cloud is where you want to go
    2. Why customers are demanding more licensing flexibility
    3. How gaining customer insight will lead to an optimized cloud-based business model
  • Die Zufriedenheit der Kunden durch Lizenzmanagement steigern Recorded: Sep 27 2012 22 mins
    In dieser Präsentation werden verschiedene Konzepte aufgezeigt, durch die Softwarehersteller ihre Lizenzmanagement-Tools wirksamer nutzen können und sollten, um die Kundenzufriedenheit zu verbessern und somit einen größeren Erfolg zu erzielen.
  • Mejorar la experiencia del cliente a través de la gestión de derechos y la conce Recorded: Sep 27 2012 29 mins
    Esta presentación permitirá a los desarrolladores de software aprovechar al máximo las herramientas en cuanto a concesión de licencias y gestión de derechos que Safenet les ofrece, con la finalidad de mejorar la experiencia del cliente final y por consiguiente tener mayor éxito.
  • Migliorare l'esperienza del cliente con la gestione di licensing e licenze Recorded: Sep 24 2012 31 mins
    Questa presentazione illustrerà vari modi con cui i produttori di software possono e dovrebbero fare leva sugli strumenti per la gestione del licensing e delle licenze per accentuare l'esperienza del cliente e, dunque, anche il loro successo.
  • L'amélioration de l'expérience client grâce à la gestion des droits et la licenc Recorded: Sep 20 2012 56 mins
    Cette présentation aborde les différentes façons que les éditeurs de logiciels peuvent et doivent utiliser pour tirer le meilleur parti de leurs outils de gestion des droits et de licenciation, accroître la satisfaction du client et donc bénéficier d'un plus grand succès.
  • Improving Customer Experience Through Licensing & Entitlement Management Recorded: Sep 19 2012 31 mins
    In this presentation Bastiaan Van Dorsten will cover several ways that software publishers can and should be leveraging their licensing and entitlement management tools to heighten customer experience and therefore realize greater success.
  • Combinar los modelos de distribución de software local y en la nube Recorded: Jul 4 2012 35 mins
    Únase a nuestros expertos SaaS para aprender de primera mano de qué forma los desarrolladores de software ven las opciones de distribución en la nube y cuáles son las soluciones disponibles para combinar con éxito la distribución de software local y en la nube.
  • On-Premise und Cloud-basierte Software-Auslieferungsmodelle kombinieren Recorded: Jun 27 2012 36 mins
    Nehmen Sie an unserem Webcast teil und erfahren Sie von unserem SaaS Experten, wie Softwarehersteller cloud-basierte Software-Auslieferungsmodelle beurteilen und welche Lösungen es zur erfolgreichen Kombination von On-Premise und cloud-basierten Software-Auslieferungsmodellen gibt.
  • Integrare modelli on-premise e in modalità cloud per la fornitura del software Recorded: Jun 20 2012 42 mins
    Si unisca ai nostri esperti di Saas, per scoprire di persona come i produttori di software progettano di offrire i servizi cloud, e per conoscere le soluzioni di licensing disponibili per la consegna dei software tradizionali on-premise e nel cloud.
  • Optimisez les modèles de livraison de vos logiciels sur site et dans le Cloud Recorded: Jun 19 2012 60 mins
    Rejoignez nos experts SaaS et découvrez ce que les éditeurs de logiciels pensent des options de livraison dans le Cloud. Découvrez également quelles solutions sont disponibles pour allier avec succès la livraison de logiciels sur site et dans le Cloud.
  • The Best of Both Worlds - combining on-premise and cloud-based software delivery Recorded: Jun 18 2012 44 mins
    Join our SaaS experts to learn first hand how software publishers are viewing cloud-based delivery options and what are the available solutions for successfully combining on-premise and cloud-based software delivery.
  • Mejores prácticas en protección del software: criptografía White-box Recorded: Mar 29 2012 18 mins
    La criptografía White-box es un componente esencial adicional que permite a los desarrolladores proteger sus aplicaciones contra la ingeniería inversa, la manipulación y los ataques automatizados.
    Únase a este webcast en directo y aprenda más sobre:
    1. Amenazas: relativas a la emulación de mochila
    2. La importancia y las debilidades del "Canal seguro" entre su aplicación y la clave de protección
    3. Criptografía White-box y solución al dilema de cifrar/descifrar contenido sin revelar ningún dato delicado
  • Best practices in Software Protection - White Box Cryptography Recorded: Mar 28 2012 19 mins
    White box cryptography is an additional essential component that enables developers to protect their applications against reverse engineering, tampering, and automated attacks.

    Join this live webcast and learn about:

    1. Threats - as related to dongle emulation
    2. The importance and the weaknesses of the “Secure Channel” between your application and the protection key
    3. White box cryptography and solving the dilemma of encrypting /decrypting content without revealing any of your sensitive data
Software Protection and Licensing On-Premise and in the Cloud
Welcome to LicensingLive EMEA, the EMEA network of online communities dedicated to providing software vendors, industry analysts, licensing consultants, and technology vendors with a variety of forums to connect with peers, voice questions, share information, compare best practices, and brainstorm emerging challenges associated with software licensing, fulfillment, delivery and management.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Combinar los modelos de distribución de software local y en la nube
  • Live at: Jul 4 2012 9:00 am
  • Presented by: Julio César Domínguez
  • From:
Your email has been sent.
or close
You must be logged in to email this