Top 5 Factors When Picking Copy Protection Software
2012-03-23 John Poulson
Anytime you add a 3rd party component into your overall product stack you need to be thoughtful before you decide. Copy protection software is no different: it's something you will rely on to protect your valuable IP and it's also something that will touch the user's experience of your product.
My top 5 factors when choosing copy protection software for your company:
- First of all, find out if it really provides actual copy protection. Some solutions pretend they can protect your software, but in reality they are doing very little to prevent piracy. By that I mean that any reasonable hacker can crack the protection without breaking a sweat. One way to check is to look for cracked copies of their customer's products on the Internet.
- What platforms does it support? If you are on the Mac OS, and the tools don't support Lion, what are you going to do? Look for a vendor who has a track record of supporting many different platforms, and providing support for new platform releases immediately after they are available.
- How easy is the implementation? Do you have to do everything with API calls? Does it support your programming language of choice? Can you develop your application outside the copy protection software and add the protection after development is finished?
- What license options are allowed or--perhaps more importantly--excluded? Does the system allow for virtual machine (VM) use in legitimate instances while blocking VM usage to circumvent licensing restrictions? Does it support new licensing models like pay per use, pay per feature, pay per function?
- Can the vendor give you a seamless choice between software activation (cheap and simple) and hardware keys (better security)?
Contributor
John Poulson
Sr. Account Manager
A senior manager and well respected security industry expert, John has worked in business development and sales for Wibu-Systems USA since 2001. When not consulting with customers on software licensing and protection solutions, John attends industry trade shows and conferences to stay abreast of the latest developments in the IT world. Prior to Wibu-Systems, John worked for Micro Security Systems, Eagle Data, and Griffin Technologies, all pioneers in software security.
Over the years, John has authored several blog articles on topics of general interest in cryptography as well as monetization of embedded systems in new and innovative ways.