Uniloc Addresses $40 Billion Piracy Challenge

Posted on
Like what you see? Share it.Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

<p><strong>Irvine, Calif. &mdash; June 28</strong><br />Uniloc USA Inc., a provider of physical-device recognition for protecting intellectual property, networks and personal data, has announced its next-generation software copy protection solution with the launch of softANCHOR 5.0. </p><p>Loaded with the industry&#39;s most powerful anti-piracy features to prevent license exploitation, provide a global view of piracy-driven loss, allow license throttling to raise or lower device activation parameters and provide full-featured open-source license management, softANCHOR 5.0 is set to redefine leadership in software copy control.<br /><br />According to research by IDC and the Business Software Alliance, 35 percent of the software installed in 2006 on personal computers (PCs) worldwide was obtained illegally, amounting to nearly $40 billion in global losses because of software piracy. </p><p>With software being one of the most valuable technologies of this millenium, powering everything from PCs, servers, appliances and the Internet, it is critical to protect and<br />cultivate its growth. </p><p>As a result of software becoming such an important tool for both personal and business prosperity, the illegal high-volume copying and distribution &mdash; software piracy &mdash; persists globally. </p><p>In the United States alone, one in four software programs is unlicensed.<br /><br />To address this issue, Uniloc has taken everything software publishers, businesses and consumers hate about copy control and thrown it out the window. </p><p>Now, it is possible to implement and maintain highly secure, fully embedded product activation in house &mdash; with the comparable ease and simplicity of a security wrapper. </p><p>Far from an activation &quot;wrapper,&quot; softANCHOR 5.0 enables developers to quickly and easily implement fully embedded seamless security configurations, allowing an unlimited number of tripwires and validation checkpoints. </p><p>softANCHOR&#39;s thousands of code variations and obfuscation practices ensure maximum code protection &mdash;<br />and the highest hack-resistance available. </p><p>Unlike other one-solution-fits-all anti-piracy measures, if any one title is ever somehow cracked, that same crack will not apply to any other products.<br /><br />Included in the softANCHOR 5.0 product suite is the industry&#39;s first global piracy-auditing solution, LicenseAUDIT. </p><p>With LicenseAUDIT, users are now able to quantify how pervasive their software piracy issues are and adjust licensing strategies on the fly to set policies addressing casual sharing, open sharing and piracy. </p><p>LicenseAUDIT provides real-time statistics about actual license usage with 100 percent accurate results, so that license management decisions are made on fact versus assumptions. </p><p>The auditing capability can be deployed independently of softANCHOR 5.0 to provide insight and analysis for any software vendor, using existing software builds and existing software copy control products. </p><p>To act on this information, Uniloc also has introduced &quot;throttling,&quot; giving the ability to increase or decrease<br />software copy parameters to strike a balance between help desk calls and piracy protection, as well as optimize viral marketing models.<br /><br />&quot;This technology can help customers stay compliant with licensing terms without inducing onerous restrictions on IT,&quot; said Eric Ogren, The Ogren Group president.&quot;Giving software vendors the ability to reward organizations with flexible licensing alternatives is an appealing capability in softANCHOR 5.0 for vendors serving small and medium<br />businesses.&quot;</p>

Like what you see? Share it.Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone


Posted in Archive|


Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>