|
Metaforic |
Metaforic is a leading provider of security software technology for anti-tamper protection. This technology protects virtually any software from subversion, theft, tampering or other corruption. It is proven in millions of deployed instances, from consumer software to business devices. Metaforic’s software immune system strengthens licensing and reporting systems for deployed software, as well as protecting cloud-based services from subversion. Its products are available for nearly any operating platform, including mobile, embedded, desktop and servers. Metaforic has offices worldwide. |
Company URL: http://www.metaforic.com | Address: 560 S. Winchester Blvd., San Jose, CA 95128 |
|
| Metaforic Core Last Updated: 07/05/12
|
Metaforic Core™ software analyzes code both statically and dynamically, then automatically injects an optimized schema of various software antibodies into a copy of the source code, which developers then compile and build as normal. Developers never have to interact with the immune system; it is part of the automated build process.
Metaforic Core provides the foundation for all Metaforic software protection; it is a prerequisite for additional Metaforic capabilities:
• Metaforic Authenticator™– Ensures an application is in constant communication with an authentication device or cloud service.
• Metaforic Concealer™– Hides sensitive data and obfuscates sensitive code.
• Metaforic Enhanced Integrator™– Facilitates easy deployment into complex build environments.
|
Categories: » Asset Management/Protection » Software License Management » Security Systems » Enterprise IT Management
|
» Request More Information |
| |
|
White Papers |
5 Simple Steps
By Metaforic 07/18/12
Metaforic can help to stop this massive drain of revenue and stop piracy on your products. In this paper we examine why license management is ineffective in stopping piracy, and how pirates actually steal your software.
|
|
Protecting FlexNet License Management
By Metaforic 07/05/12
Metaforic automatically works with FlexNet to harden your licensing, making it much more difficult for hackers to strip out licensing calls, or subvert your software in any way.
|
|
Related Editorial |
By Rudolph Araujo and Neelay Shah 09/19/12
SSL is not as secure as you may think—it has many limitations and flaws, as does the public key infrastructure that makes it possible.
|
|
By Rudolph Araujo and Neelay Shah 11/28/12
Web sites are only as secure as the certifying authorities behind them; a number of options exist to make these more secure.
|
|
By Cassandra Balentine 02/13/13
The latest trends in software development address security concerns throughout the entire lifecycle.
|
|