Contact Us

Software Protection and Licensing

Gemalto's award-winning suite of hardware, software, and cloud-based licensing solutions are designed to prevent unlicensed use and distribution of software products. They also enable the tracking of granular usage data – all this while protecting intellectual property from tampering and reverse engineering. Gemalto's dynamic software license management solutions are available with varying degrees of security and transparency. Flexible technology is designed to easily integrate with your software package, either with the Sentinel API or by wrapping with the Sentinel Shell - or both. Learn more about software piracy on the next tabs below.

In addition, Gemalto Software Monetization Professional Services are available to assist you with your customized anti-piracy software implementation.


Sentinel-Cloud-Logo-2

Sentinel Cloud Services

Bring Gemalto’s industry-proven experience in software licensing and entitlement management to the cloud. Built leveraging the company’s more than 30 years of experience, but architected from the ground up to support all of the unique requirements of cloud service delivery, Sentinel Cloud Services is the industry’s only complete and proven solution for SaaS Management and software monetization in the cloud.

Learn more about Sentinel Cloud

Sentinel-LDK-Box-2

Sentinel LDK

Sentinel License Development Kit (LDK) is a comprehensive software monetization solution that pairs the company’s award-winning software copy and intellectual property (IP) protection features with the web-based, license management capabilities of Sentinel EMS, Gemalto’s entitlement management system. Sentinel LDK also features three best of class protection types i.e. Sentinel HL,Sentinel SL and Sentinel CL. Whether you ship physical boxes, embed your software into high-tech devices, offer electronic delivery, or deliver your product as a service in the cloud, our various protection types have you covered.

Learn more about Sentinel LDK

Sentinel RMS

Sentinel RMS is a robust license enforcement and enablement solution providing software and technology vendors with control and visibility into how their applications are deployed and used. Focused on scalable and flexible license management, RMS is ideal for applications deployed in medium to large scale enterprise environments. Implementation of RMS provides a tie-in to software licensing agreements in order to enforce the terms and conditions by which you manage your products. In addition to reducing the risk of piracy, RMS enables you to easily offer a variety of license models to flexibly price and package your products.When combined with Sentinel EMS, Gemalto’s enterprise-oriented, Web-based management system, Sentinel RMS provides a complete solution for license management and software license enforcement.

Learn more about Sentinel RMS

Sentinel Embedded Solutions

Gemalto offers several software monetization solutions tailored specifically to securely manage software embedded within any piece of hardware – from networking appliances and medical devices to mobile handsets and industrial automation equipment. The Sentinel Embedded Software Monetization offer device and equipment manufacturers with all the tools they need to effectively protect their products from tampering and reverse engineering while also opening up an entirely new world of packaging and opportunities to maximize profitability.

Learn more about Sentinel Embedded Solutions

Sentinel HL Hardware Keys

Sentinel HL keys are offered in a new contemporary design while maintaining full backwards compatibility with your existing Sentinel HASP HL and Sentinel SuperPro implementations, and they allow you to take full advantage of forward compatibility with our next generation software licensing solution – Sentinel LDK.

Learn more about Sentinel HL Hardware Keys

ultrapro 2

Other Products

80 million hardware keys already deployed, and we stand by each one!

Learn more

 

LEAP Newsletter

LEAP is your essential guide to software licensing, entitlement, and protection.

Read the Newsletter


Software piracy occurs when people copy, sell, share, or distribute software illegally. It can vary from a limited case of installation of a single-user license on multiple computers to a more chronic problem of widespread online distribution. Regardless of the rationale or delivery method, it is still software piracy.

Although most computer users today are aware that unauthorized use and duplication of software is illegal, many show a general disregard for the importance of treating software as valuable intellectual property: Over half of the world’s personal computer users — 57 percent — admit to pirating software. Thirty-one percent say they do it “all of the time,” “most of the time,” or “occasionally,” and another 26 percent admit to having stolen software, but only “rarely.” These are among the findings of a survey of nearly 15,000 computer users across 33 countries conducted as part of the ninth annual BSA Global Software Piracy Study.

According to the BSA (Business Software Alliance) and IDC 6th Annual Global Software Piracy Study, the retail value of unlicensed software — representing revenue “losses” to software companies — broke the $50 billion level for the first time in 2008. Worldwide losses grew by 11 percent to $53 billion. Excluding the effect of exchange rates, losses grew by 5 percent to $50.2 billion.

  • Cost and strength — When considering anti piracy protection, cost and overall strength of the solution are important elements to analyze.
  • Total development time — The time required to implement your anti-piracy solutions is also important. Anti-piracy technology is frequently implemented at the end of the development cycle, when time to market is limited.
  • Geographic location — Vendors must also consider the geographic location for software sales. If an application is to be sold into a region with exceptionally high software piracy rates, it may be worthwhile to incorporate maximum anti-piracy software protection. Gemalto software protection solutions enable you to easily alter the levels of security at fulfillment time without requiring any development change.
  • Available resources - Finally, total resources available must be considered to ensure developers are available to add the desired protection.
 
 
  • Softlifting: purchasing a single licensed copy of software and loading it onto several computers contrary to the license terms. For example, sharing software with friends, co-workers and others.
  • Uploading and downloading: making unauthorized copies of copyrighted software available to end users connected by modem to online service providers and/or the Internet.
  • Software counterfeiting: illegally duplicating and selling copyrighted software in a form designed to make it appear legitimate
  • OEM unbundling: selling standalone software that was intended to be bundled with specific accompanying hardware 
  • Hard disk loading: installing unauthorized copies of software onto the hard disks of personal computers, often as an incentive for the end user to buy the hardware from that particular hardware dealer
  • Renting: unauthorized selling of software for temporary use, like you would a video.
 
 

1. Software piracy is a victimless crime.

Nothing could be further from the truth! According to industry statistics, illegal software use costs developers worldwide over $60 billion a year in lost revenues, with more than $10 billion lost in North America alone. In Central and Eastern Europe, an average of 61% of the software in use is illegal. In some Asia Pacific and Eastern European markets, 90% of software is unlicensed.

2. Software copy protection makes software more expensive.

On the contrary: the price of software copy protection is negligible compared to the losses incurred by developers through the pirating of their software. In fact, by protecting their software and thereby increasing their revenues, developers can afford to supply better software at competitive prices. True, not everyone who copies software today would buy it tomorrow if it were protected, and protection may put off a few potential customers. However, there is no doubt that in the vast majority of cases the investment in protection pays off handsomely in increased sales and profit.

3. Software copy protection gets in the way of the legitimate user.

The new, more sophisticated types of software copy protection - of which HASP is the leading example - not only don't get in the way of legitimate end-users, they actually benefit them. Protection safeguards the integrity of the software. The end-user is thus assured that the software cannot be tampered with in any way. Plus, higher revenues for developers mean that down the line, users will benefit from better, high-quality software. Large organizations that are legally liable for the software they purchase, have a clear interest in preventing the unauthorized distribution of their software. Often, the users themselves request that the software be protected, to ensure that it won't be used illegally - thus causing the organization harm.

4. Inexpensive software is not copied.

Some people attack the concept of software protection by arguing: "Make software cheaper, that's all. People don't copy inexpensive software, and you'll sell more copies of your product". But things are not so simple. Developing a software product requires a huge investment of time and money and this work never ends. To succeed in tomorrow's market, developers must invest today. The argument that people don't copy inexpensive software is obviously false. Check a few PCs around you and you'll probably find that most copied programs are actually the cheaper ones.

5. Any protection system can be cracked. Therefore, software copy protection is useless.

Only the first part of this myth is true: any software protection system can be cracked, just as any lock can be picked or any door can be broken. However, the aim of software copy protection is to provide protection for a reasonable period of time. Software cannot be protected forever, but it can definitely be protected long enough - i.e., until a new version of the product is released. This new version should be protected again, with a protection system that was also improved in parallel, thus assuring a long and profitable sales life for the protected application.

 

LEAP Newsletter

LEAP is your essential guide to software licensing, entitlement, and protection.

Read the Newsletter


White Paper - How to Get Software Licensing Right the First Time

This white paper explains why building a cohesive licensing team and aligning it with your business processes should take priority over integrating licensing technology with your software products.

Download the White Paper

IDC-white-paper

White Paper - Licensing for SaaS Applications

IDC Vendor Spotlight on Gemalto (formerly SafeNet), a supplier of data protection and software monetization solutions, including SaaS-based licensing and entitlement management for ISVs

Download the White Paper

snell-case-study

Case Study - Snell Protects Valuable IP and Streamlines Licensing Operations with Sentinel RMS & EMS

Learn how Snell uses Gemalto Sentinel to secure its competitive advantage, to power flexible and scalable licensing, and ultimately, to grow its business.

Download the Case Study

cadac-case-study

Case Study - Cadac Group Standardizes on Sentinel EMS with Cloud Licensing for its SaaS and On-Premises Software Products

Cadac Group cuts operational expenses & gains licensing flexibility with Gemalto Sentinel

Download the Case Study


Sentinel LDK

Award-winning software protection and intuitive entitlement management features all in one out-of-the-box solutions! Leverage hardware or software-based license enforcement techniques to protect your revenue while Sentinel EMS helps you centralize all operational processes associated with licensing!

Download Your FREE Trial

Sentinel Cloud

Software Licensing and entitlement management delivered as a service, for cloud services! It's time to take your software monetization business to the cloud.

Download Your FREE Trial

Sentinel RMS

Sentinel RMS is a robust license enforcement and enablement solution providing software and technology vendors with control and visibility into how their applications are deployed and used.

Download Your FREE Trial

Sentinel Embedded Solutions

Sentinel Embedded Solutions are flexible software licensing toolkits that give you the freedom to design and implement the right licensing experience for embedded devices. Fully integrated with Sentinel EMS, the company’s web-based entitlement management system, Sentinel Embedded Solutions are very comprehensive for solving all of your embedded software protection challenges.

Download Your FREE Trial


Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  
Comments:  
 


By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.