Tasks being solved
Stack of Guardant technologies and products for the protection of executable software code from analysis and modification.
Protection against theft of know-how
Valuable software algorithms cannot be copied by an attacker, and the principle of their operation cannot be revealed by examining the program code
Protection against hacking of the program
The operation of the program cannot be disrupted, and its functions will be reliably protected from changes or additions (for example, from disabling license control, password verification,etc.)
Protection of Confidential data
Access to sensitive data inside the program is protected from intruders(for example, to encryption keys, passwords, personal data)
Advantages
Comprehensiveness
The solution includes the world's best practices - code virtualization technologies, protection from memory dumping, integrity control, code packaging and encryption, hardware protection, etc.
Control of the protected code
The vendor determines on his own which functions are of the greatest value and are subject to protection
Automation
Code protection is integrated into the software product assembly processes, which helps to avoid manual operations when releasing new software versions.
Compatibility
Reverse engineering protection technologies are integrated into the licensing system, providing a significant improvement in code protection
Elements of the solution
Modern
·Developer Tools:Guardant SLK
A modern set of tools for protecting applications from reverse engineering
·Management system:Guardant Station
Complex licensing management system
·Keys:
-Guardant DL
Software keys for products sold on the Internet
-Guardant Sign
A family of classic hardware keys for work in Windows and Linux operating systems
Classic
·Protection system:Guardant Armor
A software tool for protecting applications from hacking, reverse engineering and illegal use
·Developer Tools:Guardant SDK
Distribution with classic developer tools
·Keys:Guardant Code
A family of cross-platform keys for ?software to which increased security requirements are applied
© Copyright 2000-2023 COGITO SOFTWARE CO.,LTD. All rights reserved