08:10 AM

V.i. Labs Intro Method

V.i. Laboratories announced a new method for quantifying revenue

WALTHAM, Mass. -- V.i. Laboratories, a provider of software protection solutions for securing high value and mission critical applications, announced today a new method for quantifying the amount of revenue that software vendors realize before and after implementing anti-piracy measures. The method, called “Time to Crack™,” provides software vendors with a benchmark for measuring changes in software license revenues in emerging markets with high piracy rates.

Software piracy is a widespread problem for packaged software vendors who sell their products in emerging markets where intellectual property laws are not as strict. According to the Third Annual BSA and IDC Global Software Piracy Study, the worldwide piracy rate for PC software was 35 percent in 2004. In China alone, for example, the BSA estimates that 90 percent of all software is pirated, representing $3.6 billion in lost revenue for software vendors. UBS AG’s Q-Series research report entitled “A Billion Dollar Opportunity” indicates that piracy rates among enterprise organizations and small-medium businesses (SMBs) are as high as 70 and 90 percent, respectively.

To date, software vendors have taken minimal steps to deter piracy in foreign markets, for three major reasons:

  1. It’s difficult for software vendors to quantify piracy in countries where their presence is minimal and existing global industry metrics for piracy are too broad to apply to their products.

  2. There is a common misconception among vendors that current users of pirated software would not purchase legitimate licenses if pirated versions were unavailable.

  3. Many organizations focus solely on deterring license overuse or inadvertent piracy (keeping honest users honest) versus deterring software cracking, which is predominant in emerging markets.

“There are still many software vendors and providers who believe that deterring piracy will not recover significant revenue in emerging markets,” said Victor DeMarines, director of product management, V.i. Labs. “However, recent studies indicate that rampant piracy exists in enterprise organizations and small businesses where it is possible to recover revenue. These companies will follow the path of least resistance to obtain software. If it’s easier to obtain pirated software, enterprises will take this route. But if a software vendor employs techniques to prevent or slow down the rate at which new software is pirated, data suggests that these organizations will purchase legal software copies.”

V.i. Laboratories Inc.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
DNS Threats: What Every Enterprise Should Know
Domain Name System exploits could put your data at risk. Here's some advice on how to avoid them.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.