Contact Us
Media Banner Software Monetization

Newsroom

LicensingLive Blog

The software monetization field is constantly evolving. Whether you sell on premise, cloud-delivered or embedded software, staying up to speed on the latest technologies and advancements isn’t easy. How do you make sure only authorized users access your software and how do you help authorized users take full advantage of their licenses? How do you make your licensing model future-proof to industry trends? Visit our blog for info on best practices and tips from our team of software monetization experts.

Visit the LicensingLive blog here: http://www.licensinglive.com

Sentinel Customer Community and Forum

The Sentinel Customer Community and Forum is your first line for Sentinel support needs. From drivers to documentation, discussions to the latest product news, you'll find what you need in the Sentinel Customer Community.

Visit the Sentinel Customer Community here: http://sentinelcustomer.safenet-inc.com

Sentinel Technical Support Blog

Subscribe to have bug fixes, product release news and technical updates delivered to your inbox. Visit here: http://sentineltechsupport.safenet-inc.com


6/9/2015
Embedded Computing Design
5 steps to software monetization

Gray line

6/8/2015
IT Business Edge
Latest Federal Government Breach Shows Lack of Security

Gray line

6/4/2015
The Telegraph
Five top tips for getting your product to market

Gray line

5/28/2015
Dark Reading
IRS Attack Demonstrates How Breaches Beget More Breaches

Gray line

5/28/2015
SC Magazine
Data acquired from non-IRS sources enabled access to 100K taxpayer accounts

Gray line

5/28/2015
IT for Business
Pénurie de compétences : le cinéma s’inscrit-il en sauveur de la cybersécurité?

Gray line

5/26/2015
TMC.net
Getting Executive Buy-In for a Software Monetization Solution

Gray line

5/27/2015
MainStreet.com
Why Hacking Is Taking Place Even Aboard Flights

Gray line

5/22/2015
Help Net Security
The Importance of Encryption and Key Management to Security Practitioners

Gray line

5/21/2015
Engineering News
Data Protection Should Lie at the Heart of a Firm’s Cybersecurity Strategy

Gray line

5/21/2015
Embedded Computing Design
Flexible and dynamic software licensing in the field

Gray line

5/18/2015
Dataquest India
Gemalto Recognizes APAC Partners at Annual Cipher Partner Summit

Gray line

5/12/2015
Help Net Security
Why Saying YES Is Changing Information Security

Gray line

5/1/2015
Computer Business Review
10 lessons learnt from Ryanair’s Chinese bank hank

Gray line

4/30/2015
eSecurity Planet
Three Quarters of U.S. Execs Say a Cyber Attack Could Seriously Disrupt Business

Gray line

4/27/2015
RSA TV
Interview with Gemalto’s David Etue: Whose Cloud Is It Anyway?

Gray line

4/23/2015
Irish Times
Microsoft Irish data case raises critical issues for cloud computing

Gray line

4/22/2015
CNET
House approves controversial cybersecurity bill

Gray line

4/22/2015
Help Net Security
Gemalto’s Solutions Challenge Today’s Security Thinking

Gray line

4/21/2015
Computer News Middle East
Gemalto’s 2015 Data Security Confidence Index released

Gray line

4/20/2015
telecomasia.net
Firms Too Focused on Perimeter Security

Gray line

4/17/2015
The Wall Street Journal
Survey Roundup: Security Disconnect

Gray line

4/16/2015
Computer Business Review
Confidence low, attacks high - is perimeter security still effective?

Gray line

4/16/2015
Help Net Security
Perception and reality of perimeter security effectiveness

Gray line

4/15/2015
TechWeek Europe
Breach Prevention Is Dead, Encryption Is King

Gray line

4/7/2015
Pro Security Zone
Tackling Today’s Authentication Challenges

Gray line

4/1/2015
SC Magazine
Review: Gemalto SafeNet Authentication Service

Gray line

3/27/2015
San Jose Mercury News
E-file fraud: Identity thieves filing taxes to steal refunds

Gray line

3/20/2015
Enterprise Channels MEA
Gemalto Recognises EMEA Channel Partners

Gray line

3/19/2015
Network World
Health Records are the new Credit Cards

Gray line

3/17/2015
Third Certainty
Don’t let your guard down: Identity theft getting worse

Gray line

3/6/2015
Dark Reading
Does Hollywood Have the Answer to the Security Skills Question?

Gray line

2/17/2015
Chain Store Age
Study: Worldwide data breaches up 49% in 2014

Gray line

2/16/2015
Techworld
Global data breaches reached 1500 last year

Gray line

2/13/2015
SC Magazine
Breach index: Mega breaches, rise in identity theft mark 2014

Gray line

2/13/2015
Computerweekly
Data breaches up 49% in 2014

Gray line

2/13/2015
Computerweekly
PCI Security Standards Council welcomes Obama summit

Gray line

2/12/2015
The Wall Street Journal
1 Billion Data Records Stolen in 2014

Gray line

2/12/2015
CNBC
Year of the Hack? A billion records compromised in 2014

Gray line

2/12/2015
Computerworld
More than 1B records breached in 2014

Gray line

2/12/2015
ZDNet
1 billion data records were stolen last year thanks to poor security

Gray line

2/12/2015
CNET
In shift, hackers want your identity, not just your credit card

Gray line

2/12/2015
The Verge
Nearly 1 billion records were compromised by data breaches in 2014

Gray line

2/9/2015
The Hill
Data Breach Prevention Is Dead

Gray line

2/02/2015
IT Daily
DriveLock 7.5: German endpoint security solution with new functionalities

Gray line

1/30/2015
Elektronik Praxis
Software protection offers added value

Gray line

1/30/2015
Tech Week Europe
Russian Dating Website Buys Back 20 million Stolen Email Addresses

Gray line

1/29/2015
IT Pro Portal
InfoSec heavies weigh in on what the 9th Data Privacy Day taught us

Gray line

1/29/2015
Anabi Systems Blog
3 Simple Steps on How to Stay Safe Online

Gray line

1/29/2015
InfoRiskToday
SafeNet CEO on Data Breach Security

Gray line

1/28/2015
Mail Online
'Internet of Things' gets watchdog: Report calls for extra security to prevent hacking of smart gadgets in homes

Gray line

1/28/2015
CBR
8 ways to celebrate Data Privacy Day securely

Gray line

1/28/2015
IT Security Guru
Data Privacy Day musings from the Infosec community

Gray line

1/28/2015
TKG News
'Internet of Things' gets watchdog: Report calls for extra security to prevent hacking of smart gadgets in homes

Gray line

1/28/2015
The Commentator
Data Privacy Day – businesses warned of security risks

Gray line

1/28/2015
TechWeek Europe
How To Stay Safe Online In 3 Simple Steps

Gray line

1/29/2015
MSN News
How To Stay Safe Online In 3 Simple Steps

Gray line

1/27/2015
CNE
Data Privacy Day | Tips By Gemalto To Staying Safe Online

Gray line

1/27/2015
Information Age
Data Privacy Day is a stark reminder that we need more vigilance online

Gray line

1/22/2015
Surveillance Magazine
How can companies prepare for new EU data regulations?

Gray line

1/21/2015
IT Executive
Kun je het IoT beveiligen?

Gray line

1/21/2015
Professional Security Magazine Online
Hack at shoe retailer

Gray line

1/20/2015
Mail Online
Revealed: How criminals can easily 'suck information' out of smartphones using public Wi-Fi networks

Gray line

1/20/2015
Tech Week Europe
How To Explain Ransomware To A Five-Year-Old

Gray line

1/19/2015
Channel 5 News
Security expert on the risks of using public wi-fi

Gray line

1/19/2015
Channel 5
Public wi-fi networks ‘let criminals suck information out of smartphones’

Gray line

1/15/2015
CSO
President calls for more cybersecurity information sharing

Gray line

1/15/2015
CIO
President calls for more cybersecurity information sharing

Gray line

1/15/2015
Rossiyskaya Gazeta
10 000 of "favourite" passwords were compromised in the USA

Gray line

1/15/2015
IT Nation
Les tendances sécurité 2015 #4, une affaire de tous

Gray line

1/15/2015
CIO On-line
The Cloud: security’s challenge

Gray line

1/15/2015
Le Mag IT
Encryption: the problem of keys

Gray line

1/14/2015
IT Nation
Security Trends 2015 #2 : have a strategic asset

Gray line

1/14/2015
IT Nation
Security Trends 2015 #3: review of mobile and IoT

Gray line

1/13/20155
IT Nation
Security Trends 2015

Gray line

1/13/2015
IT Nation
Security Trends 2015 #1 : new guidelines

Gray line

1/13/2015
L’usine Digitale
SaaS Mode: how can we secure news access?

Gray line

1/13/2015
PC Advisor
Obama proposes new 30-day data breach notification law

Gray line

1/8/2015
Global Banking & Finance Review
Why Banks need a different approach to data security

Gray line

1/8/2015
Publi News
CIO will lose the Security Cloud Battle by SafeNet

Gray line

1/7/2015
eSecurity Planet
9 Enterprise Security Trends for 2015

Gray line

1/7/2015
IT Pro Portal
Security trends 2015 predictions round-up

Gray line

1/5/2015
Channel ME
Bright Outlook

Gray line

1/5/15
GCN
In 2015, agency IT security and operations converge

Gray line


IoT Evolution West

  • Conference
  • July 11, 2017
  • Las Vegas, Nevada, United States

Aria Monetize

  • Conference
  • September 25, 2017
  • San Francisco, California, United States

SC Magazine awards 4.75 Star Rating to SafeNet Authentication Service (2014)

SC Magazine Finalist for Best Multifactor Solution, SafeNet Authentication Service (2015)

Laurie Usewicz, Vice President of Channel Sales, named a 2014 Channel Chief by The Channel Company’s CRN

SC Magazine Best Multi- and Second-Factor Solution Finalist: eToken (2010)

SC Magazine Best Multi- and Second-Factor Solution Finalist: eToken (2009)

Frost and Sullivan, Enabling Technology of the Year (2009)

SC Magazine 5-Star Rating: Sentinel Software Protection (2010)

SC Magazine Australia Product of the Year: DataSecure (2010)

Frost & Sullivan, Software Licensing and Management Product Line Innovation award: Sentinel Software Monetization Solutions portfolio (2011)

SIIA CODiE Award, Best DRM Solution: Sentinel Cloud (2012)

For media inquires please contact:

Chad Couser
Global
+1 443 327 1315

Anina Steele
EMEA and APAC
+44 1276 608 055

Michelle Leech
Americas
+1 512 605 2110


Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  
Comments:  
 


By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.