Risk
4/19/2013
11:11 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SafeNet Envelope Protects Software From Piracy And Reverse Engineering

Sentinel Envelope secures applications through the use of an automatic file wrapper

BALTIMORE – April 9, 2013 – Software monetization leader, SafeNet, Inc. today announced the availability of its third-generation Sentinel Envelope technology, which helps software developers protect code integrity, deliver strong application security, and, at the same time, reduce deployment delays and overhead costs.

As software publishers try to balance how best to prevent misuse of their software without creating unnecessary obstacles for legitimately paying customers, Sentinel Envelope works with Sentinel LDK, the company's out-of-the-box software protection, licensing, and entitlement management system, to help them protect their software and intellectual property (IP) while minimizing disruption and maximizing profitability.

Sentinel Envelope achieves this by providing software developers with superior application protection, including an automatic file packer (i.e., wrapper) that employs SafeNet's advanced file encryption, code obfuscation, and anti-debugging technologies. The Sentinel Envelope also creates a robust shield that wraps executable files and dynamically linked libraries (DLLs) and binds applications to hardware- or software-based protection keys, enabling customers to more effectively enforce copy protection, protect trade secrets, professional know-how, and IP from reverse engineering, tampering, and piracy.

"Protecting hard-earned trade secrets and intellectual capital is critical for ISVs to remain competitive and relevant in the market," said Jake Fox, vice president, product management, Software Monetization, SafeNet. "The third generation of LDK Envelope technology takes software protection to the next level. LDK Envelope makes it extremely difficult for hackers to reverse engineer protected intellectual property. By implementing strong application security, software vendors can confidently maintain their competitive advantage."

The Sentinel Envelope introduces innovative new features for both its 32- and 64-bit engine, including import table gating, OEP (original entry point) obfuscation, constant runtime debugging protection, improved real-time anti-debugging and anti-tracing capabilities, and what is believed to be the industry's first and only file packer utilizing a white-box-based secure channel that protects the secure channel encryption key from dynamic or static extraction from protected binaries. All of the features in Sentinel Envelope combine to provide software vendors with enhanced copy protection and prevention of modification and tampering.

The third-generation enhancements to the Sentinel Envelope include:

· Enhanced security protection for 32- and 64-bit architectures--blocks the reconstruction of protected binaries from attacks based on memory dumping.

· White-box-based secure communication channel--utilizes vendor-specific components to ensure that the secure channel encryption key cannot be dynamically or statically extracted from the protected binaries. This is the first solution of its kind in the industry.

· Import address table obfuscation and gating--removes the import address table (IAT) and scatters its information inside the Envelope code, including the original entry point (OEP). Calls for imported system functions are also redirected via import gates for all known system DLLs.

· Constant runtime-debugging protection--enhances user-mode debugger detection on running processes that hardens the software against tracing techniques and confuses hackers with delayed responses, misleading commands, and false information.

· User-mode software-based licenses--provides "user-mode" licenses that do not require installation of the runtime environment, enabling faster, easier, and lower overhead installations, regardless of administrative rights.

These enhancements make Sentinel LDK's Envelope technology one of the most secure application security solutions on the market today. They will enable software vendors to more easily protect access and use of their applications, ensure product and brand integrity, combat competitive espionage, and safeguard revenue streams.

"Rigorously protecting intellectual property from theft, reverse engineering, and tampering is critical for software vendors in today's ultra-competitive environment," continued Jake Fox. "Strong security is one of the cornerstones of an effective software monetization strategy, and the Sentinel LDK Envelope delivers cutting-edge code encryption and counter-hacking techniques to protect valuable IP from persistent, intelligent threats."

Supporting Resources:

· Learn more about Sentinel Licensing Development Kit (LDK).

· Learn more about Sentinel Envelope.

· Learn more about the four aspects of a comprehensive software monetization strategy.

· Join the LicensingLive! Software Monetization Community.

· Follow SafeNet on Twitter, Facebook, YouTube, and LinkedIn.

About SafeNet Software Monetization Solutions

SafeNet has more than 25 years of experience in delivering innovative and reliable software licensing and entitlement management solutions to software publishers, technology vendors, and cloud service providers worldwide.

Easy to integrate and use, innovative, and feature focused, the company's family of Sentinel Software Monetization Solutions are designed to meet the unique license enablement, enforcement, and management requirements of any organization, regardless of size, technical requirements, or organizational structure. SafeNet clients are able to address each and every aspect of the software monetization lifecycle--from copy and intellectual property protection to product catalog management and ongoing end-user experience improvement. With a proven history of adapting to new requirements and introducing new technologies to address evolving market conditions, SafeNet's more than 25,000 customers around the globe know that by choosing Sentinel, they choose the freedom to evolve how they do business today, tomorrow, and beyond.

About SafeNet, Inc.

Founded in 1983, SafeNet, Inc. is one of the largest information security companies in the world, and is trusted to protect the most sensitive data for market-leading organizations around the globe. SafeNet's data-centric approach focuses on the protection of high-value information throughout its lifecycle, from the data center to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

CVE-2014-8090
Published: 2014-11-21
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nes...

CVE-2014-8469
Published: 2014-11-21
Cross-site scripting (XSS) vulnerability in Guests/Boots in AdminCP in Moxi9 PHPFox before 4 Beta allows remote attackers to inject arbitrary web script or HTML via the User-Agent header.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?