SafeNet comes to market this month sporting its third-generation Sentinel Envelope technology. Developers can use this software code protection technology to build application security and integrity layers into their projects, plus it also includes an attached licensing capability.
White PapersMore >>
- Catch the Security Breach Before It’s Out of Reach
- Big Data and Customer Interaction Analytics: How To Create An Innovative Customer Experience
Sentinel Envelope works with Sentinel LDK (the company's software protection, licensing, and entitlement management system, to help programmers protect their software and intellectual property).
Programmers using Sentinel Envelope get application protection in the form of an automatic file packer (i.e., a wrapper) that employs file encryption, code obfuscation, and anti-debugging technologies.
The software is also built to wrap and shield executable files and dynamically linked libraries (DLLs) and binds applications to hardware- or software-based protection keys, enabling customers to more effectively enforce copy protection, protect trade secrets, professional know-how, and IP from reverse engineering, tampering, and piracy.
"Protecting hard-earned trade secrets and intellectual capital is critical for ISVs to remain competitive and relevant in the market," said Jake Fox, vice president, product management, Software Monetization, SafeNet. "The third-generation of LDK Envelope technology takes software protection to the next level. LDK Envelope makes it extremely difficult for hackers to reverse engineer protected intellectual property. By implementing strong application security, software vendors can confidently maintain their competitive advantage."
The Sentinel Envelope introduces new features for both its 32- and 64-bit engine, including import table gating, OEP (original entry point) obfuscation, constant runtime debugging protection, improved real-time anti-debugging and anti-tracing capabilities, and what is claimed to be the "industry's first" and only file packer utilizing a white-box-based secure channel that protects the secure channel encryption key from dynamic or static extraction from protected binaries.