SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Iritech, Inc. Protects with
                                                                                              SafeNet Sentinel HASP
                                                                                              CASE STUDY




Iritech increases sales, secures its competitive edge, and expands into new markets using Sentinel HASP to protect the valuable
intellectual property in its highly sensitive biometric identity matching software.



Background
IriTech, Inc. is a global manufacturer of biometric authentication       Challenge
equipment and software based on iris recognition. Its biometric          Protect the company’s valuable Intellectual Property investment
equipment and identity matching software are used by corporations,       against theft and fraudulent use, while providing legitimate users with
national security agencies, and other organizations for access           flexible, no-hassle access.
control to buildings, computers – and even cell phones. To protect its
highly sensitive software, IriTech uses Sentinel HASP.
                                                                         Solution
Business Challenge                                                       SafeNet Sentinel HASP
As one of only two manufacturers of both the biometric equipment
and the identity matching software, IriTech knew right away that
preventing reverse engineering of its identity matching software         Rewards
would be an integral part of its business plan to maintain its unique    Increased security and flexibility to deploy their biometrics software
position in the biometrics market.                                       with hardware keys or soft keys. Ability to issue trialware to
“We are one of only two companies who make iris biometric                prospective customers.
equipment from input to identity matching – meaning we make the
cameras and the software to verify the person’s identity – software
rights management is very important,” said Travis Jaeger, director
of business development at IriTech. “We didn’t want someone              “With respect to ROI, we had the confidence to
stealing our algorithm.”                                                 expand into new markets, knowing our products
                                                                         and our trade secrets could not be stolen. We
The Journey
IriTech spent several months researching software rights
                                                                         needed to be extremely confident before we
management solutions in order to find the one that met their needs.      could widely release our software, and HASP
“We wanted to be able to lock, unlock and keep track of the software     gave us that assurance.”
we were sending out,” said Jaeger. “We looked at a lot of software
                                                                         -Travis Jaeger, Director of Business Development,
protection solutions, and it looked like Sentinel Hasp was the clear
                                                                          Iritech, Inc.
leader in the software rights management market.”




Iritech Case Study                                                                                                                           1
Benefits                                                                                 Sentinel Hasp software protection keys we could do everything from
•	 Maintain Competitive Edge: HASP prevents reverse engineering                          our headquarters in Virginia, even if it meant activations in Korea or
   of code and offers robust anti-debugging and code                                     China,” explained Jaeger. “We started with the hardware keys, but
   obfuscation technology.                                                               the software license is nice because if someone needs to purchase
•	 Multiple licensing options: HASP enables multiple licensing                           quickly we can do that instantaneously. We can renew and cancel
   options, allowing software vendors flexibility to meet market-                        licenses, as well as monitor time licenses from one central server.”
   specific demands.                                                                     Instantaneous licensing has helped IriTech maintain a good
•	 Increased Sales: Protection against illegal use translates into                       relationship with its customers by providing one-step electronic
   increased sales through legal use and the confidence to expand into                   activations of the biometric software and the Sentinel Hasp
   high-piracy markets.                                                                  protection key at the same time. “They noticed the hardware
•	 Ease of Implementation: The HASP Envelope’s wrapping technology                       protection keys because they had to actually plug them in,” said
   makes protection implementation quick and easy.                                       Jaeger. “But when we went to software-based keys to license our
•	 Remote Updates: HASP makes it easy to update software                                 software they just needed to call and say ‘Ok, I want this software,’
   license terms on keys in the field.                                                   and we could activate the Sentinel Hasp license along with everything
                                                                                         else. They don’t have to wait on shipping to receive the actual key.”

The Solution                                                                             “We’ve received excellent customer service for Sentinel Hasp. We got
SafeNet Sentinel HASP gives IriTech the security and flexibility it                      all the help we needed and everyone responded very quickly,” said
needs to deploy its biometrics software multiple ways – fitting the                      Jaeger. “I’m glad we didn’t go with another vendor.”
needs and wants of individual customers. Because HASP offers both
hardware and software protection keys, IriTech was able to evaluate
                                                                                         “We are able to increase sales and market
each and choose the one that best integrated with their software as                      penetration because we now have the confidence
well as their sales and marketing plans.                                                 to sell our product on a wider scale. Before, we
After using the hardware keys for a few months, IriTech migrated                         basically had to look over their shoulder as they
to the software-based protection keys and hasn’t looked back. In                         were using the software. Sentinel Hasp really gave
addition to IP protection and prevention of reverse engineering,
                                                                                         us the confidence to expand and grow.”
HASP enabled time-based licenses for trialware. This was easily
integrated into IriTech’s software without affecting the software’s                      -Travis Jaeger, Director of Business Development
performance. “HASP offered the full feature list we were looking for,                     Iritech, Inc.
especially once we started using the software licenses,” Jaeger said.
                                                                                         About Iritech Inc.
                                                                                         Based in Herndon, VA, IriTech Inc. specializes in highly advanced
                                                                                         algorithms and software systems that enable accurate iris
The Rewards
                                                                                         recognition, a key component of biometric identification. IriTech is
Since deploying Sentinel Hasp, IriTech has seen tangible benefits
                                                                                         currently licensing its iris recognition software and offers its ultra-
to using Sentinel Hasp beyond the awardwinning IP protection. “We
                                                                                         small iris camera modules to various customers. IriTech is active
are able to increase sales and market penetration because now we
                                                                                         in developing iris recognition standards in partnership with the
have the confidence to sell our product on a wider scale,” said Jaeger.
                                                                                         American National Standards Institute (ANSI) and the International
“Before, we basically had to look over their shoulder as they were
                                                                                         Organization for Standardization (ISO). IriTech has regional offices in
using the software. Sentinel Hasp really gave us the confidence to
                                                                                         Seoul, Korea and Hayward, California, and has grown to be a world
expand and grow.”
                                                                                         class leader in Iris Identification and related Iris and Pupil Imaging
Expansion and growth allowed IriTech to increase revenues from
                                                                                         Technology. For more information, visit www.iritech.com.
elevated software sales. “With respect to ROI, we had the confidence
to expand into new markets, knowing our products and our trade                           About SafeNet
secrets could not be stolen,” Jaeger explained. “We needed to be                         Founded in 1983, SafeNet is a global leader in information security.
extremely confident before we could widely release our software, and                     SafeNet protects its customers’ most valuable assets, including
Sentinel Hasp gave us that assurance.”                                                   identities, transactions, communications, data and software
                                                                                         licensing, throughout the data lifecycle. More than 25,000 customers
Now, Sentinel Hasp allows IriTech to sell its software globally, even
                                                                                         across both commercial enterprises and government agencies and in
in areas that are known for extremely high software piracy rates.
                                                                                         over 100 countries trust their information security needs to SafeNet.
Sentinel HASP gives IriTech the flexibility to deploy its software in
a multitude of ways, including time-based licenses for trialware. It
also allows Iritech to manage its global customer base remotely
through web-based orders and activations. “Once we updated to the

                                        Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
                                        Follow Us: www.safenet-inc.com/connected
                                        ©2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
                                        All other product names are trademarks of their respective owners. CS (EN)-12.26.10

Iritech Case Study                                                                                                                                            2

Weitere ähnliche Inhalte

Was ist angesagt?

I3 Technologies Corporation Profile
I3 Technologies Corporation ProfileI3 Technologies Corporation Profile
I3 Technologies Corporation Profile
jaymieann
 
Securing Red Hat OpenShift Containerized Applications At Enterprise Scale
Securing Red Hat OpenShift Containerized Applications At Enterprise ScaleSecuring Red Hat OpenShift Containerized Applications At Enterprise Scale
Securing Red Hat OpenShift Containerized Applications At Enterprise Scale
DevOps.com
 

Was ist angesagt? (20)

Secure Channels Presentation
Secure Channels PresentationSecure Channels Presentation
Secure Channels Presentation
 
Corporate overview 1.2
Corporate overview 1.2Corporate overview 1.2
Corporate overview 1.2
 
A Guided Approach to Testing - A Mobile First Strategy for your Enterprise!
A Guided Approach to Testing - A Mobile First Strategy for your Enterprise! A Guided Approach to Testing - A Mobile First Strategy for your Enterprise!
A Guided Approach to Testing - A Mobile First Strategy for your Enterprise!
 
National Cyber Range (Ranka)
National Cyber Range (Ranka)National Cyber Range (Ranka)
National Cyber Range (Ranka)
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
 
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsThe Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
 
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
 
PSI corporate profile
PSI corporate profilePSI corporate profile
PSI corporate profile
 
SplunkLive! Houston IT Service Intelligence Hands On Version
SplunkLive! Houston IT Service Intelligence Hands On VersionSplunkLive! Houston IT Service Intelligence Hands On Version
SplunkLive! Houston IT Service Intelligence Hands On Version
 
I3 Technologies Corporation Profile
I3 Technologies Corporation ProfileI3 Technologies Corporation Profile
I3 Technologies Corporation Profile
 
SplunkLive! Wien 2016 - Splunk Enterprise 6.4
SplunkLive! Wien 2016 - Splunk Enterprise 6.4SplunkLive! Wien 2016 - Splunk Enterprise 6.4
SplunkLive! Wien 2016 - Splunk Enterprise 6.4
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Palamida Open Source Compliance Solution
Palamida Open Source Compliance Solution Palamida Open Source Compliance Solution
Palamida Open Source Compliance Solution
 
Artificial Intelligence Tutorial
Artificial Intelligence TutorialArtificial Intelligence Tutorial
Artificial Intelligence Tutorial
 
Cisco Connect 2018 Malaysia - software-defined access-a transformational appr...
Cisco Connect 2018 Malaysia - software-defined access-a transformational appr...Cisco Connect 2018 Malaysia - software-defined access-a transformational appr...
Cisco Connect 2018 Malaysia - software-defined access-a transformational appr...
 
Securing Red Hat OpenShift Containerized Applications At Enterprise Scale
Securing Red Hat OpenShift Containerized Applications At Enterprise ScaleSecuring Red Hat OpenShift Containerized Applications At Enterprise Scale
Securing Red Hat OpenShift Containerized Applications At Enterprise Scale
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospital
 
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
 

Andere mochten auch (18)

CPC
CPCCPC
CPC
 
Key Traffic Systems
Key Traffic SystemsKey Traffic Systems
Key Traffic Systems
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security Solutions
 
Inea cs en__v4_web
Inea cs en__v4_webInea cs en__v4_web
Inea cs en__v4_web
 
Sporting goods
Sporting goodsSporting goods
Sporting goods
 
Gps Flier
Gps FlierGps Flier
Gps Flier
 
Evaluating Logarithms
Evaluating LogarithmsEvaluating Logarithms
Evaluating Logarithms
 
G1000 Procedure (Français)
G1000 Procedure (Français)G1000 Procedure (Français)
G1000 Procedure (Français)
 
Nu6khghkjy
Nu6khghkjyNu6khghkjy
Nu6khghkjy
 
Triad
TriadTriad
Triad
 
Prottpln
ProttplnProttpln
Prottpln
 
Global Aid against Poverty
Global Aid against PovertyGlobal Aid against Poverty
Global Aid against Poverty
 
Apresentacao ac -_redes
Apresentacao ac -_redesApresentacao ac -_redes
Apresentacao ac -_redes
 
Pan zal bike cat. b -
Pan zal bike   cat. b -Pan zal bike   cat. b -
Pan zal bike cat. b -
 
המשך או שינוי ממשלת רבין
המשך או שינוי ממשלת רביןהמשך או שינוי ממשלת רבין
המשך או שינוי ממשלת רבין
 
FLP Digital - Apresentação
FLP Digital - ApresentaçãoFLP Digital - Apresentação
FLP Digital - Apresentação
 
Mi high 1
Mi high 1Mi high 1
Mi high 1
 
Ficha de trabalho_4-_ferramentas_e_acessorios_de_redes
Ficha de trabalho_4-_ferramentas_e_acessorios_de_redesFicha de trabalho_4-_ferramentas_e_acessorios_de_redes
Ficha de trabalho_4-_ferramentas_e_acessorios_de_redes
 

Ähnlich wie Iritech Inc.

Sentinel Software Monetization Solutions - Family Brochure
Sentinel Software Monetization Solutions - Family BrochureSentinel Software Monetization Solutions - Family Brochure
Sentinel Software Monetization Solutions - Family Brochure
LicensingLive! - SafeNet
 
Imaginea Overview
Imaginea OverviewImaginea Overview
Imaginea Overview
Jimit Shah
 

Ähnlich wie Iritech Inc. (20)

DipTech
DipTechDipTech
DipTech
 
i7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprises
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
 
Software monetization for the software business
Software monetization for the software businessSoftware monetization for the software business
Software monetization for the software business
 
Software Monetization for the Software Business
Software Monetization for the Software Business Software Monetization for the Software Business
Software Monetization for the Software Business
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
 
Sentinel Software Monetization Solutions - Family Brochure
Sentinel Software Monetization Solutions - Family BrochureSentinel Software Monetization Solutions - Family Brochure
Sentinel Software Monetization Solutions - Family Brochure
 
Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptx
 
Personal identity information protection
Personal identity information protectionPersonal identity information protection
Personal identity information protection
 
Geocap Case Study
Geocap Case StudyGeocap Case Study
Geocap Case Study
 
Sentinel HASP Envelope
Sentinel HASP EnvelopeSentinel HASP Envelope
Sentinel HASP Envelope
 
Why ips slide share
Why ips slide shareWhy ips slide share
Why ips slide share
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
Imaginea Overview
Imaginea OverviewImaginea Overview
Imaginea Overview
 
Identiverse 2018 - Using Identity to Restore Freedom
Identiverse 2018 - Using Identity to Restore FreedomIdentiverse 2018 - Using Identity to Restore Freedom
Identiverse 2018 - Using Identity to Restore Freedom
 
Security and Data Breach
Security and Data BreachSecurity and Data Breach
Security and Data Breach
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard Of
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
 
InstallAnywhere Infragistics Success Story
InstallAnywhere Infragistics Success StoryInstallAnywhere Infragistics Success Story
InstallAnywhere Infragistics Success Story
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 

Mehr von LicensingLive! - SafeNet

Turning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing ViewTurning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing View
LicensingLive! - SafeNet
 
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
LicensingLive! - SafeNet
 
Integrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud EnvironmentIntegrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud Environment
LicensingLive! - SafeNet
 
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingThe Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based Licensing
LicensingLive! - SafeNet
 
Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing
LicensingLive! - SafeNet
 
Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service  Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service
LicensingLive! - SafeNet
 

Mehr von LicensingLive! - SafeNet (18)

VSTEP Case Study
VSTEP Case StudyVSTEP Case Study
VSTEP Case Study
 
Cloud Monetization: A Step by Step Guide
Cloud Monetization: A Step by Step GuideCloud Monetization: A Step by Step Guide
Cloud Monetization: A Step by Step Guide
 
Turning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing ViewTurning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing View
 
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
 
Integrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud EnvironmentIntegrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud Environment
 
Cloud Adoption - A Practical Approach
Cloud Adoption - A Practical ApproachCloud Adoption - A Practical Approach
Cloud Adoption - A Practical Approach
 
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingThe Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based Licensing
 
VSM Case Study
VSM Case StudyVSM Case Study
VSM Case Study
 
EMS Case Study
EMS Case StudyEMS Case Study
EMS Case Study
 
Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing
 
Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service  Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service
 
SaaS Pricing and Packaging Strategies
SaaS Pricing and Packaging Strategies SaaS Pricing and Packaging Strategies
SaaS Pricing and Packaging Strategies
 
Cloudy with a Chance of Insight
Cloudy with a Chance of InsightCloudy with a Chance of Insight
Cloudy with a Chance of Insight
 
Addressing New Challenges in Software Protection for .NET
Addressing New Challenges in Software Protection for .NETAddressing New Challenges in Software Protection for .NET
Addressing New Challenges in Software Protection for .NET
 
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
 
Dani Shomron, iSC - On Dinosaurs and Men
Dani Shomron, iSC - On Dinosaurs and MenDani Shomron, iSC - On Dinosaurs and Men
Dani Shomron, iSC - On Dinosaurs and Men
 
Monetizing Cloud Apps - Phil Wainewright
Monetizing Cloud Apps - Phil WainewrightMonetizing Cloud Apps - Phil Wainewright
Monetizing Cloud Apps - Phil Wainewright
 
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Iritech Inc.

  • 1. Iritech, Inc. Protects with SafeNet Sentinel HASP CASE STUDY Iritech increases sales, secures its competitive edge, and expands into new markets using Sentinel HASP to protect the valuable intellectual property in its highly sensitive biometric identity matching software. Background IriTech, Inc. is a global manufacturer of biometric authentication Challenge equipment and software based on iris recognition. Its biometric Protect the company’s valuable Intellectual Property investment equipment and identity matching software are used by corporations, against theft and fraudulent use, while providing legitimate users with national security agencies, and other organizations for access flexible, no-hassle access. control to buildings, computers – and even cell phones. To protect its highly sensitive software, IriTech uses Sentinel HASP. Solution Business Challenge SafeNet Sentinel HASP As one of only two manufacturers of both the biometric equipment and the identity matching software, IriTech knew right away that preventing reverse engineering of its identity matching software Rewards would be an integral part of its business plan to maintain its unique Increased security and flexibility to deploy their biometrics software position in the biometrics market. with hardware keys or soft keys. Ability to issue trialware to “We are one of only two companies who make iris biometric prospective customers. equipment from input to identity matching – meaning we make the cameras and the software to verify the person’s identity – software rights management is very important,” said Travis Jaeger, director of business development at IriTech. “We didn’t want someone “With respect to ROI, we had the confidence to stealing our algorithm.” expand into new markets, knowing our products and our trade secrets could not be stolen. We The Journey IriTech spent several months researching software rights needed to be extremely confident before we management solutions in order to find the one that met their needs. could widely release our software, and HASP “We wanted to be able to lock, unlock and keep track of the software gave us that assurance.” we were sending out,” said Jaeger. “We looked at a lot of software -Travis Jaeger, Director of Business Development, protection solutions, and it looked like Sentinel Hasp was the clear Iritech, Inc. leader in the software rights management market.” Iritech Case Study 1
  • 2. Benefits Sentinel Hasp software protection keys we could do everything from • Maintain Competitive Edge: HASP prevents reverse engineering our headquarters in Virginia, even if it meant activations in Korea or of code and offers robust anti-debugging and code China,” explained Jaeger. “We started with the hardware keys, but obfuscation technology. the software license is nice because if someone needs to purchase • Multiple licensing options: HASP enables multiple licensing quickly we can do that instantaneously. We can renew and cancel options, allowing software vendors flexibility to meet market- licenses, as well as monitor time licenses from one central server.” specific demands. Instantaneous licensing has helped IriTech maintain a good • Increased Sales: Protection against illegal use translates into relationship with its customers by providing one-step electronic increased sales through legal use and the confidence to expand into activations of the biometric software and the Sentinel Hasp high-piracy markets. protection key at the same time. “They noticed the hardware • Ease of Implementation: The HASP Envelope’s wrapping technology protection keys because they had to actually plug them in,” said makes protection implementation quick and easy. Jaeger. “But when we went to software-based keys to license our • Remote Updates: HASP makes it easy to update software software they just needed to call and say ‘Ok, I want this software,’ license terms on keys in the field. and we could activate the Sentinel Hasp license along with everything else. They don’t have to wait on shipping to receive the actual key.” The Solution “We’ve received excellent customer service for Sentinel Hasp. We got SafeNet Sentinel HASP gives IriTech the security and flexibility it all the help we needed and everyone responded very quickly,” said needs to deploy its biometrics software multiple ways – fitting the Jaeger. “I’m glad we didn’t go with another vendor.” needs and wants of individual customers. Because HASP offers both hardware and software protection keys, IriTech was able to evaluate “We are able to increase sales and market each and choose the one that best integrated with their software as penetration because we now have the confidence well as their sales and marketing plans. to sell our product on a wider scale. Before, we After using the hardware keys for a few months, IriTech migrated basically had to look over their shoulder as they to the software-based protection keys and hasn’t looked back. In were using the software. Sentinel Hasp really gave addition to IP protection and prevention of reverse engineering, us the confidence to expand and grow.” HASP enabled time-based licenses for trialware. This was easily integrated into IriTech’s software without affecting the software’s -Travis Jaeger, Director of Business Development performance. “HASP offered the full feature list we were looking for, Iritech, Inc. especially once we started using the software licenses,” Jaeger said. About Iritech Inc. Based in Herndon, VA, IriTech Inc. specializes in highly advanced algorithms and software systems that enable accurate iris The Rewards recognition, a key component of biometric identification. IriTech is Since deploying Sentinel Hasp, IriTech has seen tangible benefits currently licensing its iris recognition software and offers its ultra- to using Sentinel Hasp beyond the awardwinning IP protection. “We small iris camera modules to various customers. IriTech is active are able to increase sales and market penetration because now we in developing iris recognition standards in partnership with the have the confidence to sell our product on a wider scale,” said Jaeger. American National Standards Institute (ANSI) and the International “Before, we basically had to look over their shoulder as they were Organization for Standardization (ISO). IriTech has regional offices in using the software. Sentinel Hasp really gave us the confidence to Seoul, Korea and Hayward, California, and has grown to be a world expand and grow.” class leader in Iris Identification and related Iris and Pupil Imaging Expansion and growth allowed IriTech to increase revenues from Technology. For more information, visit www.iritech.com. elevated software sales. “With respect to ROI, we had the confidence to expand into new markets, knowing our products and our trade About SafeNet secrets could not be stolen,” Jaeger explained. “We needed to be Founded in 1983, SafeNet is a global leader in information security. extremely confident before we could widely release our software, and SafeNet protects its customers’ most valuable assets, including Sentinel Hasp gave us that assurance.” identities, transactions, communications, data and software licensing, throughout the data lifecycle. More than 25,000 customers Now, Sentinel Hasp allows IriTech to sell its software globally, even across both commercial enterprises and government agencies and in in areas that are known for extremely high software piracy rates. over 100 countries trust their information security needs to SafeNet. Sentinel HASP gives IriTech the flexibility to deploy its software in a multitude of ways, including time-based licenses for trialware. It also allows Iritech to manage its global customer base remotely through web-based orders and activations. “Once we updated to the Contact Us: For all office locations and contact information, please visit www.safenet-inc.com Follow Us: www.safenet-inc.com/connected ©2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names are trademarks of their respective owners. CS (EN)-12.26.10 Iritech Case Study 2