Risk
4/19/2013
11:11 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

SafeNet Envelope Protects Software From Piracy And Reverse Engineering

Sentinel Envelope secures applications through the use of an automatic file wrapper

BALTIMORE – April 9, 2013 – Software monetization leader, SafeNet, Inc. today announced the availability of its third-generation Sentinel Envelope technology, which helps software developers protect code integrity, deliver strong application security, and, at the same time, reduce deployment delays and overhead costs.

As software publishers try to balance how best to prevent misuse of their software without creating unnecessary obstacles for legitimately paying customers, Sentinel Envelope works with Sentinel LDK, the company's out-of-the-box software protection, licensing, and entitlement management system, to help them protect their software and intellectual property (IP) while minimizing disruption and maximizing profitability.

Sentinel Envelope achieves this by providing software developers with superior application protection, including an automatic file packer (i.e., wrapper) that employs SafeNet's advanced file encryption, code obfuscation, and anti-debugging technologies. The Sentinel Envelope also creates a robust shield that wraps executable files and dynamically linked libraries (DLLs) and binds applications to hardware- or software-based protection keys, enabling customers to more effectively enforce copy protection, protect trade secrets, professional know-how, and IP from reverse engineering, tampering, and piracy.

"Protecting hard-earned trade secrets and intellectual capital is critical for ISVs to remain competitive and relevant in the market," said Jake Fox, vice president, product management, Software Monetization, SafeNet. "The third generation of LDK Envelope technology takes software protection to the next level. LDK Envelope makes it extremely difficult for hackers to reverse engineer protected intellectual property. By implementing strong application security, software vendors can confidently maintain their competitive advantage."

The Sentinel Envelope introduces innovative new features for both its 32- and 64-bit engine, including import table gating, OEP (original entry point) obfuscation, constant runtime debugging protection, improved real-time anti-debugging and anti-tracing capabilities, and what is believed to be the industry's first and only file packer utilizing a white-box-based secure channel that protects the secure channel encryption key from dynamic or static extraction from protected binaries. All of the features in Sentinel Envelope combine to provide software vendors with enhanced copy protection and prevention of modification and tampering.

The third-generation enhancements to the Sentinel Envelope include:

· Enhanced security protection for 32- and 64-bit architectures--blocks the reconstruction of protected binaries from attacks based on memory dumping.

· White-box-based secure communication channel--utilizes vendor-specific components to ensure that the secure channel encryption key cannot be dynamically or statically extracted from the protected binaries. This is the first solution of its kind in the industry.

· Import address table obfuscation and gating--removes the import address table (IAT) and scatters its information inside the Envelope code, including the original entry point (OEP). Calls for imported system functions are also redirected via import gates for all known system DLLs.

· Constant runtime-debugging protection--enhances user-mode debugger detection on running processes that hardens the software against tracing techniques and confuses hackers with delayed responses, misleading commands, and false information.

· User-mode software-based licenses--provides "user-mode" licenses that do not require installation of the runtime environment, enabling faster, easier, and lower overhead installations, regardless of administrative rights.

These enhancements make Sentinel LDK's Envelope technology one of the most secure application security solutions on the market today. They will enable software vendors to more easily protect access and use of their applications, ensure product and brand integrity, combat competitive espionage, and safeguard revenue streams.

"Rigorously protecting intellectual property from theft, reverse engineering, and tampering is critical for software vendors in today's ultra-competitive environment," continued Jake Fox. "Strong security is one of the cornerstones of an effective software monetization strategy, and the Sentinel LDK Envelope delivers cutting-edge code encryption and counter-hacking techniques to protect valuable IP from persistent, intelligent threats."

Supporting Resources:

· Learn more about Sentinel Licensing Development Kit (LDK).

· Learn more about Sentinel Envelope.

· Learn more about the four aspects of a comprehensive software monetization strategy.

· Join the LicensingLive! Software Monetization Community.

· Follow SafeNet on Twitter, Facebook, YouTube, and LinkedIn.

About SafeNet Software Monetization Solutions

SafeNet has more than 25 years of experience in delivering innovative and reliable software licensing and entitlement management solutions to software publishers, technology vendors, and cloud service providers worldwide.

Easy to integrate and use, innovative, and feature focused, the company's family of Sentinel Software Monetization Solutions are designed to meet the unique license enablement, enforcement, and management requirements of any organization, regardless of size, technical requirements, or organizational structure. SafeNet clients are able to address each and every aspect of the software monetization lifecycle--from copy and intellectual property protection to product catalog management and ongoing end-user experience improvement. With a proven history of adapting to new requirements and introducing new technologies to address evolving market conditions, SafeNet's more than 25,000 customers around the globe know that by choosing Sentinel, they choose the freedom to evolve how they do business today, tomorrow, and beyond.

About SafeNet, Inc.

Founded in 1983, SafeNet, Inc. is one of the largest information security companies in the world, and is trusted to protect the most sensitive data for market-leading organizations around the globe. SafeNet's data-centric approach focuses on the protection of high-value information throughout its lifecycle, from the data center to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-6651
Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-3488
Published: 2014-07-31
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.

CVE-2014-3554
Published: 2014-07-31
Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.

CVE-2014-5171
Published: 2014-07-31
SAP HANA Extend Application Services (XS) does not encrypt transmissions for applications that enable form based authentication using SSL, which allows remote attackers to obtain credentials and other sensitive information by sniffing the network.

Best of the Web
Dark Reading Radio