SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
CPC Protects with SafeNet Sentinel HASP
                                                                        Case study




           Duis eget nulla ut nisl rhoncus blandit non fermentum.
          Vivamus ut tempor nisi. Maecenas lacinia leo quis neque.




CPC, Leader in Captioning Technology Continues to Rely on Sentinel HASP to Protect & License their Software for
the Hearing Impaired


Background
Computer Prompting and Captioning Co. (CPC) is the industry leader        Challenge
in captioning, subtitling and teleprompting. CPC was founded in           •	 Ensure license compliance by protecting their high-value
1986 to address a need for visual text in video production, allowing         software from unauthorized use
the hearing impaired to see dialogue. As CPC embraced emerging
technologies such as webcasts, Vchip software and DVDs, they
have come to rely on Sentinel HASP’s timely updates to keep their         solution
captioning software secure.                                               •	 SafeNet Sentinel HASP


the Business Challenge
CPC needed an unobtrusive, secure solution to protect their high          Rewards
value ($2-$9K) captioning software from being pirated, stolen or          •	 Increased sales: Protection against illegal use translates into
reverse engineered whenever the equipment left their facilities.             increased sales through legal usage.
                                                                          •	 Remote updates: Sentinel HASP makes it easy to update software
Dr. Dilip K. Som, CPC’s President and CTO, explained that service
                                                                             license terms on keys in the field.
companies who use CPC’s software frequently grow, requiring more
                                                                          •	 IP Protection: Sentinel HASP prevents reverse-engineering of code
technicians and additional equipment. As is the case with high-value
                                                                             and offers robust anti-debugging and code obfuscation technology.
software, rather than purchase additional licenses, users are tempted
to violate the license agreement by running a single software copy
on multiple machines. “Without powerful, reliable software security,
our customers could run the same software on 20 different machines




CPC Case Study                                                                                                                             1
which violates the license terms and results in thousands of dollars                       “Without powerful, reliable software security, our
in lost revenue for CPC,” said Som. “I cannot even imagine letting our
                                                                                           customers could run the same software on 20
product go unprotected.”
                                                                                           different machines which violates the license
the Journey                                                                                terms and results in thousands of dollars in lost
More than a decade ago, CPC was using a different software protection
                                                                                           revenue for CPC. I cannot even imagine letting our
key, but found the key to be overly large and awkward for technicians
who needed to use CPC’s innovative captioning software. After an                           product go unprotected.”
extensive search for a new solution, Som’s team selected Sentinel                          - dr. dilip K. som, President and CtO
HASP for its ease of use and history of superior reliability. It featured                  Computer Prompting and Captioning Company (CPC)
the strong protection required and did not interfere with software use.
                                                                                           about Computer Prompting and Captioning Co. (CPC)
                                                                                           CPC is the award-winning creator of Windows and Macintosh closed
the solution                                                                               captioning software. Since CPC released the first simultaneous
Sentinel HASP allows CPC to license their software to one machine                          closed captioning/ teleprompting software in 1986, it has been the
at a time connected to the Sentinel HASP key, preventing large                             industry leader. CPC also operates an award-winning captioning
clients from sharing software among equipment for increased                                service, and develops subtitling and teleprompting software. For
productivity without due licensing. Sentinel HASP protects CPC’s                           more information, visit www.cpcweb.com.
revenue and intellectual property. CPC was able to grow in its reach
and development of new technologies because of Sentinel HASP’s                             about safeNet
flexible configurations and constant upgrades. Using Sentinel HASP,                        Founded in 1983, SafeNet is a global leader in information security.
CPC offers video production companies the latest technology outlets                        SafeNet protects its customers’ most valuable assets, including
for its innovative software without the risk of being unprotected.                         identities, transactions, communications, data and software
“Taking that risk is out of the question,” said Som.                                       licensing, throughout the data lifecycle. More than 25,000 customers
                                                                                           across both commercial enterprises and government agencies and in
                                                                                           over 100 countries trust their information security needs to SafeNet.

the Rewards
Using Sentinel HASP, Som gained peace of mind, knowing that his
company’s core software products are protected from unauthorized
use, safeguarding revenue. Som’s approach to security remains firm,
benefiting from SafeNet’s ongoing commitment to updating Sentinel
HASP protection and support to allow for new technologies and
customer needs.

“With every Windows upgrade, we quickly received the updated
Sentinel HASP drivers and were able to take care of our customers
promptly and efficiently,” Som said. “And upgrading the Sentinel
HASP keys to be used for higher versions of software has been very
easy. Simple and accomplished via email, we’ve eliminated the wait
for updates through the mail and saved on shipping. When we needed
information, Sentinel HASP specialists were definitely available
and able to answer our questions.” CPC was able to update their
software to fit new operating systems, including Mac and the new
Windows systems, without worrying about compromising protection
or causing delays for their clients. In a fast-moving industry, time
spent upgrading software protection is a major concern. Holdups due
to protection upgrades can be annoying and even affect the bottom
line. CPC found upgrading Sentinel HASP keys to be quick, easy, user-
friendly and cost-free.




                                         Contact us: For all office locations and contact information, please visit www.safenet-inc.com
                                         Follow us: www.safenet-inc.com/connected
                                         ©2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
                                         All other product names are trademarks of their respective owners. CS (EN)-12.26.10

CPC Case Study                                                                                                                                               2

Weitere ähnliche Inhalte

Was ist angesagt?

Business Service Management Made Easy!
Business Service Management Made Easy!Business Service Management Made Easy!
Business Service Management Made Easy!Michele Hudnall
 
360is Capabilities
360is Capabilities360is Capabilities
360is Capabilitiesnickhutton
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santossantosomar
 
Content Security Brochure
Content Security BrochureContent Security Brochure
Content Security Brochureldyson23
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetIxia
 
Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the MarketJuniper Networks
 
Over 20 years of embedded software development a third way emerges
Over 20 years of embedded software development   a third way emergesOver 20 years of embedded software development   a third way emerges
Over 20 years of embedded software development a third way emergesDesign And Reuse
 
Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview NetversantJayCase
 

Was ist angesagt? (10)

Business Service Management Made Easy!
Business Service Management Made Easy!Business Service Management Made Easy!
Business Service Management Made Easy!
 
360is Capabilities
360is Capabilities360is Capabilities
360is Capabilities
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
 
Content Security Brochure
Content Security BrochureContent Security Brochure
Content Security Brochure
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the Market
 
Over 20 years of embedded software development a third way emerges
Over 20 years of embedded software development   a third way emergesOver 20 years of embedded software development   a third way emerges
Over 20 years of embedded software development a third way emerges
 
Iritech Inc.
Iritech Inc.Iritech Inc.
Iritech Inc.
 
Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview Netversant
 

Andere mochten auch

Pme lecture 2012presentationslidespart1
Pme lecture 2012presentationslidespart1Pme lecture 2012presentationslidespart1
Pme lecture 2012presentationslidespart1University of Miami
 
Medical Error Reduction
Medical Error ReductionMedical Error Reduction
Medical Error ReductionLeela Baby
 
Powers Sentinel Event
Powers   Sentinel EventPowers   Sentinel Event
Powers Sentinel EventLori Powers
 
Sentinel Event
Sentinel EventSentinel Event
Sentinel Eventrn_tamer
 
Occurrence variance report
Occurrence variance reportOccurrence variance report
Occurrence variance reportaparnabidu
 
Root cause analysis common problems and solutions
Root cause analysis common problems and solutions Root cause analysis common problems and solutions
Root cause analysis common problems and solutions ASQ Reliability Division
 
Quality Health Occurence-Variance Report-Part 1.ppt
Quality Health Occurence-Variance Report-Part 1.pptQuality Health Occurence-Variance Report-Part 1.ppt
Quality Health Occurence-Variance Report-Part 1.pptGamal ElDin Soliman
 

Andere mochten auch (11)

Pme lecture 2012presentationslidespart1
Pme lecture 2012presentationslidespart1Pme lecture 2012presentationslidespart1
Pme lecture 2012presentationslidespart1
 
Medical Error Reduction
Medical Error ReductionMedical Error Reduction
Medical Error Reduction
 
Powers Sentinel Event
Powers   Sentinel EventPowers   Sentinel Event
Powers Sentinel Event
 
Sentinel Event
Sentinel EventSentinel Event
Sentinel Event
 
Root cause analysis
Root cause analysisRoot cause analysis
Root cause analysis
 
Occurrence variance report
Occurrence variance reportOccurrence variance report
Occurrence variance report
 
Root cause analysis common problems and solutions
Root cause analysis common problems and solutions Root cause analysis common problems and solutions
Root cause analysis common problems and solutions
 
Sentinel Events & OVR (lecture)
Sentinel Events & OVR (lecture)Sentinel Events & OVR (lecture)
Sentinel Events & OVR (lecture)
 
Sentinel event
Sentinel eventSentinel event
Sentinel event
 
Quality Health Occurence-Variance Report-Part 1.ppt
Quality Health Occurence-Variance Report-Part 1.pptQuality Health Occurence-Variance Report-Part 1.ppt
Quality Health Occurence-Variance Report-Part 1.ppt
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Ähnlich wie CPC

Knorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case StudyKnorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case StudySafeNet
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotesStudying
 
Voicecon094distrfinal 090427125221 Phpapp01
Voicecon094distrfinal 090427125221 Phpapp01Voicecon094distrfinal 090427125221 Phpapp01
Voicecon094distrfinal 090427125221 Phpapp01Paolo Mundo
 
Forging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesForging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesPanoptica
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer Englishcynapspro GmbH
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deckRichard (Dick) Kaufman
 
Wibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionWibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionHimanshu Arora
 

Ähnlich wie CPC (20)

DipTech
DipTechDipTech
DipTech
 
Knorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case StudyKnorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case Study
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
 
VSM Case Study
VSM Case StudyVSM Case Study
VSM Case Study
 
Voicecon094distrfinal 090427125221 Phpapp01
Voicecon094distrfinal 090427125221 Phpapp01Voicecon094distrfinal 090427125221 Phpapp01
Voicecon094distrfinal 090427125221 Phpapp01
 
Forging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesForging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for Enterprises
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
 
Redington Value Journal - August 2016
Redington Value Journal - August 2016Redington Value Journal - August 2016
Redington Value Journal - August 2016
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Redington Value Journal - March 2017
Redington Value Journal - March 2017Redington Value Journal - March 2017
Redington Value Journal - March 2017
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
COMOS Plant Manager
COMOS Plant ManagerCOMOS Plant Manager
COMOS Plant Manager
 
RiserTec
RiserTecRiserTec
RiserTec
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
 
Wibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionWibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotection
 

Mehr von LicensingLive! - SafeNet

Turning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing ViewTurning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing ViewLicensingLive! - SafeNet
 
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...LicensingLive! - SafeNet
 
Integrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud EnvironmentIntegrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud EnvironmentLicensingLive! - SafeNet
 
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingThe Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingLicensingLive! - SafeNet
 
Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing LicensingLive! - SafeNet
 
Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service  Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service LicensingLive! - SafeNet
 
Addressing New Challenges in Software Protection for .NET
Addressing New Challenges in Software Protection for .NETAddressing New Challenges in Software Protection for .NET
Addressing New Challenges in Software Protection for .NETLicensingLive! - SafeNet
 
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)LicensingLive! - SafeNet
 
Sentinel Software Monetization Solutions - Family Brochure
Sentinel Software Monetization Solutions - Family BrochureSentinel Software Monetization Solutions - Family Brochure
Sentinel Software Monetization Solutions - Family BrochureLicensingLive! - SafeNet
 
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...LicensingLive! - SafeNet
 

Mehr von LicensingLive! - SafeNet (20)

Cloud Monetization: A Step by Step Guide
Cloud Monetization: A Step by Step GuideCloud Monetization: A Step by Step Guide
Cloud Monetization: A Step by Step Guide
 
Turning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing ViewTurning Technology Threats into Opportunities – The Licensing View
Turning Technology Threats into Opportunities – The Licensing View
 
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
 
Integrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud EnvironmentIntegrating Billing and Licensing in a Cloud Environment
Integrating Billing and Licensing in a Cloud Environment
 
Cloud Adoption - A Practical Approach
Cloud Adoption - A Practical ApproachCloud Adoption - A Practical Approach
Cloud Adoption - A Practical Approach
 
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingThe Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based Licensing
 
EMS Case Study
EMS Case StudyEMS Case Study
EMS Case Study
 
Inea cs en__v4_web
Inea cs en__v4_webInea cs en__v4_web
Inea cs en__v4_web
 
Key Traffic Systems
Key Traffic SystemsKey Traffic Systems
Key Traffic Systems
 
Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing Build vs. Buy: The Hidden Costs of Licensing
Build vs. Buy: The Hidden Costs of Licensing
 
Sentinel HASP Envelope
Sentinel HASP EnvelopeSentinel HASP Envelope
Sentinel HASP Envelope
 
Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service  Navigating the Top Six Business Challenges of Delivering Software as a Service
Navigating the Top Six Business Challenges of Delivering Software as a Service
 
SaaS Pricing and Packaging Strategies
SaaS Pricing and Packaging Strategies SaaS Pricing and Packaging Strategies
SaaS Pricing and Packaging Strategies
 
Cloudy with a Chance of Insight
Cloudy with a Chance of InsightCloudy with a Chance of Insight
Cloudy with a Chance of Insight
 
Addressing New Challenges in Software Protection for .NET
Addressing New Challenges in Software Protection for .NETAddressing New Challenges in Software Protection for .NET
Addressing New Challenges in Software Protection for .NET
 
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
SafeNet Vollständige Schutz-& Lizenzlösung Webcast (DE)
 
Dani Shomron, iSC - On Dinosaurs and Men
Dani Shomron, iSC - On Dinosaurs and MenDani Shomron, iSC - On Dinosaurs and Men
Dani Shomron, iSC - On Dinosaurs and Men
 
Monetizing Cloud Apps - Phil Wainewright
Monetizing Cloud Apps - Phil WainewrightMonetizing Cloud Apps - Phil Wainewright
Monetizing Cloud Apps - Phil Wainewright
 
Sentinel Software Monetization Solutions - Family Brochure
Sentinel Software Monetization Solutions - Family BrochureSentinel Software Monetization Solutions - Family Brochure
Sentinel Software Monetization Solutions - Family Brochure
 
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
Bringing to Market a Successful Cloud Service - Knowing When to Partner, When...
 

Kürzlich hochgeladen

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Kürzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

CPC

  • 1. CPC Protects with SafeNet Sentinel HASP Case study Duis eget nulla ut nisl rhoncus blandit non fermentum. Vivamus ut tempor nisi. Maecenas lacinia leo quis neque. CPC, Leader in Captioning Technology Continues to Rely on Sentinel HASP to Protect & License their Software for the Hearing Impaired Background Computer Prompting and Captioning Co. (CPC) is the industry leader Challenge in captioning, subtitling and teleprompting. CPC was founded in • Ensure license compliance by protecting their high-value 1986 to address a need for visual text in video production, allowing software from unauthorized use the hearing impaired to see dialogue. As CPC embraced emerging technologies such as webcasts, Vchip software and DVDs, they have come to rely on Sentinel HASP’s timely updates to keep their solution captioning software secure. • SafeNet Sentinel HASP the Business Challenge CPC needed an unobtrusive, secure solution to protect their high Rewards value ($2-$9K) captioning software from being pirated, stolen or • Increased sales: Protection against illegal use translates into reverse engineered whenever the equipment left their facilities. increased sales through legal usage. • Remote updates: Sentinel HASP makes it easy to update software Dr. Dilip K. Som, CPC’s President and CTO, explained that service license terms on keys in the field. companies who use CPC’s software frequently grow, requiring more • IP Protection: Sentinel HASP prevents reverse-engineering of code technicians and additional equipment. As is the case with high-value and offers robust anti-debugging and code obfuscation technology. software, rather than purchase additional licenses, users are tempted to violate the license agreement by running a single software copy on multiple machines. “Without powerful, reliable software security, our customers could run the same software on 20 different machines CPC Case Study 1
  • 2. which violates the license terms and results in thousands of dollars “Without powerful, reliable software security, our in lost revenue for CPC,” said Som. “I cannot even imagine letting our customers could run the same software on 20 product go unprotected.” different machines which violates the license the Journey terms and results in thousands of dollars in lost More than a decade ago, CPC was using a different software protection revenue for CPC. I cannot even imagine letting our key, but found the key to be overly large and awkward for technicians who needed to use CPC’s innovative captioning software. After an product go unprotected.” extensive search for a new solution, Som’s team selected Sentinel - dr. dilip K. som, President and CtO HASP for its ease of use and history of superior reliability. It featured Computer Prompting and Captioning Company (CPC) the strong protection required and did not interfere with software use. about Computer Prompting and Captioning Co. (CPC) CPC is the award-winning creator of Windows and Macintosh closed the solution captioning software. Since CPC released the first simultaneous Sentinel HASP allows CPC to license their software to one machine closed captioning/ teleprompting software in 1986, it has been the at a time connected to the Sentinel HASP key, preventing large industry leader. CPC also operates an award-winning captioning clients from sharing software among equipment for increased service, and develops subtitling and teleprompting software. For productivity without due licensing. Sentinel HASP protects CPC’s more information, visit www.cpcweb.com. revenue and intellectual property. CPC was able to grow in its reach and development of new technologies because of Sentinel HASP’s about safeNet flexible configurations and constant upgrades. Using Sentinel HASP, Founded in 1983, SafeNet is a global leader in information security. CPC offers video production companies the latest technology outlets SafeNet protects its customers’ most valuable assets, including for its innovative software without the risk of being unprotected. identities, transactions, communications, data and software “Taking that risk is out of the question,” said Som. licensing, throughout the data lifecycle. More than 25,000 customers across both commercial enterprises and government agencies and in over 100 countries trust their information security needs to SafeNet. the Rewards Using Sentinel HASP, Som gained peace of mind, knowing that his company’s core software products are protected from unauthorized use, safeguarding revenue. Som’s approach to security remains firm, benefiting from SafeNet’s ongoing commitment to updating Sentinel HASP protection and support to allow for new technologies and customer needs. “With every Windows upgrade, we quickly received the updated Sentinel HASP drivers and were able to take care of our customers promptly and efficiently,” Som said. “And upgrading the Sentinel HASP keys to be used for higher versions of software has been very easy. Simple and accomplished via email, we’ve eliminated the wait for updates through the mail and saved on shipping. When we needed information, Sentinel HASP specialists were definitely available and able to answer our questions.” CPC was able to update their software to fit new operating systems, including Mac and the new Windows systems, without worrying about compromising protection or causing delays for their clients. In a fast-moving industry, time spent upgrading software protection is a major concern. Holdups due to protection upgrades can be annoying and even affect the bottom line. CPC found upgrading Sentinel HASP keys to be quick, easy, user- friendly and cost-free. Contact us: For all office locations and contact information, please visit www.safenet-inc.com Follow us: www.safenet-inc.com/connected ©2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names are trademarks of their respective owners. CS (EN)-12.26.10 CPC Case Study 2