[wc_login_form_rk]
[wc_reg_form_rk]
Close

Protecting your software against piracy

Software piracy has expanded during last decade and has become a serious issue for Independent Software Vendors (ISVs). New storage techniques combined with high speed peer-to-peer networks has made illegal copying and distribution easier and more accessible than ever before.

Unauthorized software copying causes significant lost revenue for ISVs and results in higher prices for end users. According to the Business Software Alliance (BSA), “Piracy continues to rise on a global basis: the worldwide piracy rate increased from 41% in 2009 to 43% in 2010; largely a result of exponential growth in the PC and software markets in higher piracy, fast growing markets such as Brazil, India and China.”

X-Formation meets current global threats and helps you to protect your copyrighted software from being illegally duplicated and installed on unauthorized computers. X-Formation provides products that effectively protect you from illegal or unintentional license overuse:

1. LM-X License Manager . LM-X is a full-feature, easy to use license manager that’s easy to integrate with your products. LM-X secures your software, allowing you to employ various licensing methods: from standard licensing scenarios such as node-locked (stand-alone), floating (network), trial, time-limited, and perpetual licenses; to more complex solutions, such as feature-based, token-based, pay-per-use, and more.

2. License Activation Center (LAC) . LAC is an advanced, web-based license creation and distribution system that provides a centralized interface for ISVs and their customers. Software vendors enter their product and license generation details into LAC, and generate activation keys for individual licenses.

Licenses can be activated only by using a valid activation key along with hostid information as required by the vendor. The license activation process ensures the software can be accessed only for the intended user/machine, preventing applications from being installed and run on unauthorized computers. The entire activation process can be fully automated by the ISV or done by the end user online or using email.

While it may seem that software piracy is impossible to eliminate entirely, ISVs shouldn’t be passive about their response. ISVs must be proactive to protect their intellectual property and avoid falling victim to software piracy, an illegal and criminal activity. Contact us to evaluate our solutions, and see how easy and effective it is to use X-Formation products to protect your intellectual property from today’s piracy threats.