08:10 AM

V.i. Labs Intro Method

V.i. Laboratories announced a new method for quantifying revenue

WALTHAM, Mass. -- V.i. Laboratories, a provider of software protection solutions for securing high value and mission critical applications, announced today a new method for quantifying the amount of revenue that software vendors realize before and after implementing anti-piracy measures. The method, called “Time to Crack™,” provides software vendors with a benchmark for measuring changes in software license revenues in emerging markets with high piracy rates.

Software piracy is a widespread problem for packaged software vendors who sell their products in emerging markets where intellectual property laws are not as strict. According to the Third Annual BSA and IDC Global Software Piracy Study, the worldwide piracy rate for PC software was 35 percent in 2004. In China alone, for example, the BSA estimates that 90 percent of all software is pirated, representing $3.6 billion in lost revenue for software vendors. UBS AG’s Q-Series research report entitled “A Billion Dollar Opportunity” indicates that piracy rates among enterprise organizations and small-medium businesses (SMBs) are as high as 70 and 90 percent, respectively.

To date, software vendors have taken minimal steps to deter piracy in foreign markets, for three major reasons:

  1. It’s difficult for software vendors to quantify piracy in countries where their presence is minimal and existing global industry metrics for piracy are too broad to apply to their products.

  2. There is a common misconception among vendors that current users of pirated software would not purchase legitimate licenses if pirated versions were unavailable.

  3. Many organizations focus solely on deterring license overuse or inadvertent piracy (keeping honest users honest) versus deterring software cracking, which is predominant in emerging markets.

“There are still many software vendors and providers who believe that deterring piracy will not recover significant revenue in emerging markets,” said Victor DeMarines, director of product management, V.i. Labs. “However, recent studies indicate that rampant piracy exists in enterprise organizations and small businesses where it is possible to recover revenue. These companies will follow the path of least resistance to obtain software. If it’s easier to obtain pirated software, enterprises will take this route. But if a software vendor employs techniques to prevent or slow down the rate at which new software is pirated, data suggests that these organizations will purchase legal software copies.”

V.i. Laboratories Inc.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He has no idea what he's doing."
Current Issue
Understanding & Managing the Mobile Security Threat
Mobile devices are increasing IT security risk. Is your enterprise ready?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join us as Dark Reading editors speak with IT security hiring experts about improving IT career prospects.