SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
CPC Protects with SafeNet Sentinel HASP
                                                                        Case study




           Duis eget nulla ut nisl rhoncus blandit non fermentum.
          Vivamus ut tempor nisi. Maecenas lacinia leo quis neque.




CPC, Leader in Captioning Technology Continues to Rely on Sentinel HASP to Protect & License their Software for
the Hearing Impaired


Background
Computer Prompting and Captioning Co. (CPC) is the industry leader        Challenge
in captioning, subtitling and teleprompting. CPC was founded in           •	 Ensure license compliance by protecting their high-value
1986 to address a need for visual text in video production, allowing         software from unauthorized use
the hearing impaired to see dialogue. As CPC embraced emerging
technologies such as webcasts, Vchip software and DVDs, they
have come to rely on Sentinel HASP’s timely updates to keep their         solution
captioning software secure.                                               •	 SafeNet Sentinel HASP


the Business Challenge
CPC needed an unobtrusive, secure solution to protect their high          Rewards
value ($2-$9K) captioning software from being pirated, stolen or          •	 Increased sales: Protection against illegal use translates into
reverse engineered whenever the equipment left their facilities.             increased sales through legal usage.
                                                                          •	 Remote updates: Sentinel HASP makes it easy to update software
Dr. Dilip K. Som, CPC’s President and CTO, explained that service
                                                                             license terms on keys in the field.
companies who use CPC’s software frequently grow, requiring more
                                                                          •	 IP Protection: Sentinel HASP prevents reverse-engineering of code
technicians and additional equipment. As is the case with high-value
                                                                             and offers robust anti-debugging and code obfuscation technology.
software, rather than purchase additional licenses, users are tempted
to violate the license agreement by running a single software copy
on multiple machines. “Without powerful, reliable software security,
our customers could run the same software on 20 different machines




CPC Case Study                                                                                                                             1
which violates the license terms and results in thousands of dollars                       “Without powerful, reliable software security, our
in lost revenue for CPC,” said Som. “I cannot even imagine letting our
                                                                                           customers could run the same software on 20
product go unprotected.”
                                                                                           different machines which violates the license
the Journey                                                                                terms and results in thousands of dollars in lost
More than a decade ago, CPC was using a different software protection
                                                                                           revenue for CPC. I cannot even imagine letting our
key, but found the key to be overly large and awkward for technicians
who needed to use CPC’s innovative captioning software. After an                           product go unprotected.”
extensive search for a new solution, Som’s team selected Sentinel                          - dr. dilip K. som, President and CtO
HASP for its ease of use and history of superior reliability. It featured                  Computer Prompting and Captioning Company (CPC)
the strong protection required and did not interfere with software use.
                                                                                           about Computer Prompting and Captioning Co. (CPC)
                                                                                           CPC is the award-winning creator of Windows and Macintosh closed
the solution                                                                               captioning software. Since CPC released the first simultaneous
Sentinel HASP allows CPC to license their software to one machine                          closed captioning/ teleprompting software in 1986, it has been the
at a time connected to the Sentinel HASP key, preventing large                             industry leader. CPC also operates an award-winning captioning
clients from sharing software among equipment for increased                                service, and develops subtitling and teleprompting software. For
productivity without due licensing. Sentinel HASP protects CPC’s                           more information, visit www.cpcweb.com.
revenue and intellectual property. CPC was able to grow in its reach
and development of new technologies because of Sentinel HASP’s                             about safeNet
flexible configurations and constant upgrades. Using Sentinel HASP,                        Founded in 1983, SafeNet is a global leader in information security.
CPC offers video production companies the latest technology outlets                        SafeNet protects its customers’ most valuable assets, including
for its innovative software without the risk of being unprotected.                         identities, transactions, communications, data and software
“Taking that risk is out of the question,” said Som.                                       licensing, throughout the data lifecycle. More than 25,000 customers
                                                                                           across both commercial enterprises and government agencies and in
                                                                                           over 100 countries trust their information security needs to SafeNet.

the Rewards
Using Sentinel HASP, Som gained peace of mind, knowing that his
company’s core software products are protected from unauthorized
use, safeguarding revenue. Som’s approach to security remains firm,
benefiting from SafeNet’s ongoing commitment to updating Sentinel
HASP protection and support to allow for new technologies and
customer needs.

“With every Windows upgrade, we quickly received the updated
Sentinel HASP drivers and were able to take care of our customers
promptly and efficiently,” Som said. “And upgrading the Sentinel
HASP keys to be used for higher versions of software has been very
easy. Simple and accomplished via email, we’ve eliminated the wait
for updates through the mail and saved on shipping. When we needed
information, Sentinel HASP specialists were definitely available
and able to answer our questions.” CPC was able to update their
software to fit new operating systems, including Mac and the new
Windows systems, without worrying about compromising protection
or causing delays for their clients. In a fast-moving industry, time
spent upgrading software protection is a major concern. Holdups due
to protection upgrades can be annoying and even affect the bottom
line. CPC found upgrading Sentinel HASP keys to be quick, easy, user-
friendly and cost-free.




                                         Contact us: For all office locations and contact information, please visit www.safenet-inc.com
                                         Follow us: www.safenet-inc.com/connected
                                         ©2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
                                         All other product names are trademarks of their respective owners. CS (EN)-12.26.10

CPC Case Study                                                                                                                                               2

Weitere ähnliche Inhalte

Was ist angesagt?

Business Service Management Made Easy!
Business Service Management Made Easy!Business Service Management Made Easy!
Business Service Management Made Easy!Michele Hudnall
 
360is Capabilities
360is Capabilities360is Capabilities
360is Capabilitiesnickhutton
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santossantosomar
 
Content Security Brochure
Content Security BrochureContent Security Brochure
Content Security Brochureldyson23
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetIxia
 
Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the MarketJuniper Networks
 
Over 20 years of embedded software development a third way emerges
Over 20 years of embedded software development   a third way emergesOver 20 years of embedded software development   a third way emerges
Over 20 years of embedded software development a third way emergesDesign And Reuse
 
Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview NetversantJayCase
 

Was ist angesagt? (10)

Business Service Management Made Easy!
Business Service Management Made Easy!Business Service Management Made Easy!
Business Service Management Made Easy!
 
360is Capabilities
360is Capabilities360is Capabilities
360is Capabilities
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
 
Content Security Brochure
Content Security BrochureContent Security Brochure
Content Security Brochure
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the Market
 
Over 20 years of embedded software development a third way emerges
Over 20 years of embedded software development   a third way emergesOver 20 years of embedded software development   a third way emerges
Over 20 years of embedded software development a third way emerges
 
Iritech Inc.
Iritech Inc.Iritech Inc.
Iritech Inc.
 
Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview Netversant
 

Andere mochten auch

Pme lecture 2012presentationslidespart1
Pme lecture 2012presentationslidespart1Pme lecture 2012presentationslidespart1
Pme lecture 2012presentationslidespart1University of Miami
 
Medical Error Reduction
Medical Error ReductionMedical Error Reduction
Medical Error ReductionLeela Baby
 
Powers Sentinel Event
Powers   Sentinel EventPowers   Sentinel Event
Powers Sentinel EventLori Powers
 
Sentinel Event
Sentinel EventSentinel Event
Sentinel Eventrn_tamer
 
Occurrence variance report
Occurrence variance reportOccurrence variance report
Occurrence variance reportaparnabidu
 
Root cause analysis common problems and solutions
Root cause analysis common problems and solutions Root cause analysis common problems and solutions
Root cause analysis common problems and solutions ASQ Reliability Division
 
Quality Health Occurence-Variance Report-Part 1.ppt
Quality Health Occurence-Variance Report-Part 1.pptQuality Health Occurence-Variance Report-Part 1.ppt
Quality Health Occurence-Variance Report-Part 1.pptGamal ElDin Soliman
 

Andere mochten auch (11)

Pme lecture 2012presentationslidespart1
Pme lecture 2012presentationslidespart1Pme lecture 2012presentationslidespart1
Pme lecture 2012presentationslidespart1
 
Medical Error Reduction
Medical Error ReductionMedical Error Reduction
Medical Error Reduction
 
Powers Sentinel Event
Powers   Sentinel EventPowers   Sentinel Event
Powers Sentinel Event
 
Sentinel Event
Sentinel EventSentinel Event
Sentinel Event
 
Root cause analysis
Root cause analysisRoot cause analysis
Root cause analysis
 
Occurrence variance report
Occurrence variance reportOccurrence variance report
Occurrence variance report
 
Root cause analysis common problems and solutions
Root cause analysis common problems and solutions Root cause analysis common problems and solutions
Root cause analysis common problems and solutions
 
Sentinel Events & OVR (lecture)
Sentinel Events & OVR (lecture)Sentinel Events & OVR (lecture)
Sentinel Events & OVR (lecture)
 
Sentinel event
Sentinel eventSentinel event
Sentinel event
 
Quality Health Occurence-Variance Report-Part 1.ppt
Quality Health Occurence-Variance Report-Part 1.pptQuality Health Occurence-Variance Report-Part 1.ppt
Quality Health Occurence-Variance Report-Part 1.ppt
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Ähnlich wie CPC

Knorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case StudyKnorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case StudySafeNet
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotesStudying
 
Voicecon094distrfinal 090427125221 Phpapp01
Voicecon094distrfinal 090427125221 Phpapp01Voicecon094distrfinal 090427125221 Phpapp01
Voicecon094distrfinal 090427125221 Phpapp01Paolo Mundo
 
Forging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesForging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesPanoptica
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer Englishcynapspro GmbH
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deckRichard (Dick) Kaufman
 
Wibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionWibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionHimanshu Arora
 

Ähnlich wie CPC (20)

DipTech
DipTechDipTech
DipTech
 
Knorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case StudyKnorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case Study
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
 
VSM Case Study
VSM Case StudyVSM Case Study
VSM Case Study
 
Voicecon094distrfinal 090427125221 Phpapp01
Voicecon094distrfinal 090427125221 Phpapp01Voicecon094distrfinal 090427125221 Phpapp01
Voicecon094distrfinal 090427125221 Phpapp01
 
Forging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesForging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for Enterprises
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
 
Redington Value Journal - August 2016
Redington Value Journal - August 2016Redington Value Journal - August 2016
Redington Value Journal - August 2016
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Redington Value Journal - March 2017
Redington Value Journal - March 2017Redington Value Journal - March 2017
Redington Value Journal - March 2017
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
COMOS Plant Manager
COMOS Plant ManagerCOMOS Plant Manager
COMOS Plant Manager
 
RiserTec
RiserTecRiserTec
RiserTec
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
 
Wibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionWibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotection
 

Mehr von LicensingLive! - SafeNet

Turning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing ViewTurning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing ViewLicensingLive! - SafeNet
 
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...LicensingLive! - SafeNet
 
Integrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud EnvironmentIntegrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud EnvironmentLicensingLive! - SafeNet
 
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingThe Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingLicensingLive! - SafeNet
 
Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing LicensingLive! - SafeNet
 
Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service  Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service LicensingLive! - SafeNet
 
Addressing New Challenges in Software Protection for .NET
Addressing New Challenges in Software Protection for .NETAddressing New Challenges in Software Protection for .NET
Addressing New Challenges in Software Protection for .NETLicensingLive! - SafeNet
 
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)LicensingLive! - SafeNet
 
Sentinel Software Monetization Solutions - Family Brochure
Sentinel Software Monetization Solutions - Family BrochureSentinel Software Monetization Solutions - Family Brochure
Sentinel Software Monetization Solutions - Family BrochureLicensingLive! - SafeNet
 
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...LicensingLive! - SafeNet
 

Mehr von LicensingLive! - SafeNet (20)

Cloud Monetization: A Step by Step Guide
Cloud Monetization: A Step by Step GuideCloud Monetization: A Step by Step Guide
Cloud Monetization: A Step by Step Guide
 
Turning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing ViewTurning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing View
 
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
 
Integrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud EnvironmentIntegrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud Environment
 
Cloud Adoption - A Practical Approach
Cloud Adoption - A Practical ApproachCloud Adoption - A Practical Approach
Cloud Adoption - A Practical Approach
 
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingThe Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based Licensing
 
EMS Case Study
EMS Case StudyEMS Case Study
EMS Case Study
 
Inea cs en__v4_web
Inea cs en__v4_webInea cs en__v4_web
Inea cs en__v4_web
 
Key Traffic Systems
Key Traffic SystemsKey Traffic Systems
Key Traffic Systems
 
Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing
 
Sentinel HASP Envelope
Sentinel HASP EnvelopeSentinel HASP Envelope
Sentinel HASP Envelope
 
Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service  Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service
 
SaaS Pricing and Packaging Strategies
SaaS Pricing and Packaging Strategies SaaS Pricing and Packaging Strategies
SaaS Pricing and Packaging Strategies
 
Cloudy with a Chance of Insight
Cloudy with a Chance of InsightCloudy with a Chance of Insight
Cloudy with a Chance of Insight
 
Addressing New Challenges in Software Protection for .NET
Addressing New Challenges in Software Protection for .NETAddressing New Challenges in Software Protection for .NET
Addressing New Challenges in Software Protection for .NET
 
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
 
Dani Shomron, iSC - On Dinosaurs and Men
Dani Shomron, iSC - On Dinosaurs and MenDani Shomron, iSC - On Dinosaurs and Men
Dani Shomron, iSC - On Dinosaurs and Men
 
Monetizing Cloud Apps - Phil Wainewright
Monetizing Cloud Apps - Phil WainewrightMonetizing Cloud Apps - Phil Wainewright
Monetizing Cloud Apps - Phil Wainewright
 
Sentinel Software Monetization Solutions - Family Brochure
Sentinel Software Monetization Solutions - Family BrochureSentinel Software Monetization Solutions - Family Brochure
Sentinel Software Monetization Solutions - Family Brochure
 
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
 

Kürzlich hochgeladen

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Kürzlich hochgeladen (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

CPC

  • 1. CPC Protects with SafeNet Sentinel HASP Case study Duis eget nulla ut nisl rhoncus blandit non fermentum. Vivamus ut tempor nisi. Maecenas lacinia leo quis neque. CPC, Leader in Captioning Technology Continues to Rely on Sentinel HASP to Protect & License their Software for the Hearing Impaired Background Computer Prompting and Captioning Co. (CPC) is the industry leader Challenge in captioning, subtitling and teleprompting. CPC was founded in • Ensure license compliance by protecting their high-value 1986 to address a need for visual text in video production, allowing software from unauthorized use the hearing impaired to see dialogue. As CPC embraced emerging technologies such as webcasts, Vchip software and DVDs, they have come to rely on Sentinel HASP’s timely updates to keep their solution captioning software secure. • SafeNet Sentinel HASP the Business Challenge CPC needed an unobtrusive, secure solution to protect their high Rewards value ($2-$9K) captioning software from being pirated, stolen or • Increased sales: Protection against illegal use translates into reverse engineered whenever the equipment left their facilities. increased sales through legal usage. • Remote updates: Sentinel HASP makes it easy to update software Dr. Dilip K. Som, CPC’s President and CTO, explained that service license terms on keys in the field. companies who use CPC’s software frequently grow, requiring more • IP Protection: Sentinel HASP prevents reverse-engineering of code technicians and additional equipment. As is the case with high-value and offers robust anti-debugging and code obfuscation technology. software, rather than purchase additional licenses, users are tempted to violate the license agreement by running a single software copy on multiple machines. “Without powerful, reliable software security, our customers could run the same software on 20 different machines CPC Case Study 1
  • 2. which violates the license terms and results in thousands of dollars “Without powerful, reliable software security, our in lost revenue for CPC,” said Som. “I cannot even imagine letting our customers could run the same software on 20 product go unprotected.” different machines which violates the license the Journey terms and results in thousands of dollars in lost More than a decade ago, CPC was using a different software protection revenue for CPC. I cannot even imagine letting our key, but found the key to be overly large and awkward for technicians who needed to use CPC’s innovative captioning software. After an product go unprotected.” extensive search for a new solution, Som’s team selected Sentinel - dr. dilip K. som, President and CtO HASP for its ease of use and history of superior reliability. It featured Computer Prompting and Captioning Company (CPC) the strong protection required and did not interfere with software use. about Computer Prompting and Captioning Co. (CPC) CPC is the award-winning creator of Windows and Macintosh closed the solution captioning software. Since CPC released the first simultaneous Sentinel HASP allows CPC to license their software to one machine closed captioning/ teleprompting software in 1986, it has been the at a time connected to the Sentinel HASP key, preventing large industry leader. CPC also operates an award-winning captioning clients from sharing software among equipment for increased service, and develops subtitling and teleprompting software. For productivity without due licensing. Sentinel HASP protects CPC’s more information, visit www.cpcweb.com. revenue and intellectual property. CPC was able to grow in its reach and development of new technologies because of Sentinel HASP’s about safeNet flexible configurations and constant upgrades. Using Sentinel HASP, Founded in 1983, SafeNet is a global leader in information security. CPC offers video production companies the latest technology outlets SafeNet protects its customers’ most valuable assets, including for its innovative software without the risk of being unprotected. identities, transactions, communications, data and software “Taking that risk is out of the question,” said Som. licensing, throughout the data lifecycle. More than 25,000 customers across both commercial enterprises and government agencies and in over 100 countries trust their information security needs to SafeNet. the Rewards Using Sentinel HASP, Som gained peace of mind, knowing that his company’s core software products are protected from unauthorized use, safeguarding revenue. Som’s approach to security remains firm, benefiting from SafeNet’s ongoing commitment to updating Sentinel HASP protection and support to allow for new technologies and customer needs. “With every Windows upgrade, we quickly received the updated Sentinel HASP drivers and were able to take care of our customers promptly and efficiently,” Som said. “And upgrading the Sentinel HASP keys to be used for higher versions of software has been very easy. Simple and accomplished via email, we’ve eliminated the wait for updates through the mail and saved on shipping. When we needed information, Sentinel HASP specialists were definitely available and able to answer our questions.” CPC was able to update their software to fit new operating systems, including Mac and the new Windows systems, without worrying about compromising protection or causing delays for their clients. In a fast-moving industry, time spent upgrading software protection is a major concern. Holdups due to protection upgrades can be annoying and even affect the bottom line. CPC found upgrading Sentinel HASP keys to be quick, easy, user- friendly and cost-free. Contact us: For all office locations and contact information, please visit www.safenet-inc.com Follow us: www.safenet-inc.com/connected ©2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names are trademarks of their respective owners. CS (EN)-12.26.10 CPC Case Study 2