The findings of Gemalto’s State of Software Monetization report are in! ISVs are losing revenue due to rigid licensing and delivery options. Find out what they should be doing to meet the growing expectations of enterprise users.
GET THE INSIDE SCOOP!We ask Gemalto’s VP, CTO Software Monetization, Michael Zunke, about the rising tide of security breaches in connected environments, and the preventative measures companies should be taking to ensure the integrity of their code.
READ THE INTERVIEWSentinel LDK introduces all-new video content protection in build 7.4; Sentinel LDK Embedded 7.3 adds support for the Linux ARM platform; and the Sentinel EMS 3.2.5 service pack brings users a number of new enhancements.
GET THE FULL DETAILSQ1 2016
Software vendors and intelligent device manufacturers must constantly adapt to the ever-changing demands of enterprise customers, claims a new report by Gemalto. Results of The State of Software Monetization survey suggest that the road to increased revenue opportunities is paved with flexible licensing and packaging solutions. This is a logical conclusion as end users are increasingly interested in consuming software on their own terms and only paying for what they use. However, delivering software in user-friendly ways is easier said than done. Software piracy, reverse engineering, and unauthorized use are rampant, making it harder to innovate and remain competitive. From an operational perspective, disparate back office systems are more hassle than they’re worth, hindering ISVs’ ability to effectively monetize their software. In fact, the biggest challenge faced by respondents is not just the cost of managing and renewing licenses, but also the time spent engaged in those activities – resources that are more wisely invested in product development.
Another concern among ISVs is licensing compliance. The majority are worried about unlicensed copies of their software being used – whether intentionally or unintentionally – as well as intellectual property theft, software piracy, and licensing agreement violations. Alarmingly, almost half the enterprise users polled admitted to being guilty of such violations, which only serves to highlight the need for licensing enforcement. As far as they are concerned, ISVs ought to provide more transparency around their processes and audits, and improve usage tracking.
Elsewhere in the report, enterprise users expressed dissatisfaction with traditional licensing, packaging, and delivery options, which they described as being too rigid for their needs. The flexible nature of online software delivery, metered usage, and device-agnostic licensing are widely seen as more preferable options. The latter is especially important as having accessibility across multiple devices, rather than being tied to just one, is considered a necessity in today’s user-centric world.
With expectations of ISVs at an all-time high, it is imperative that they consider future-proofing their software to ensure continued success.
Download the full report for a more in-depth analysis, then head over to the microsite for region-specific data, and finally, check out the infographic.
Q1 2016
Join this Ask the Experts webinar to hear Frost & Sullivan’s Avni Rambhia talk about the growth enablers for the IoT, while sharing data from the: Analysis of the Global Software Monetization Market report. Together with Gemalto’s Laila Arad-Allan, Avni will take us through the report's highlights, with a focus on the importance of software as an enabler of improved business processes and increased customer satisfaction.
What can you expect to learn?
In this session of Ask the Experts, we reveal the report’s findings on:
The webinar will be held on March 16 at 11:00 EST. Click here to register!
Ask the Experts is a quarterly webcast series introducing new trends in the licensing, entitlement, and protection space.
Click here to access the previous session, ‘The Internet of Things – All Hype or a Monetization Opportunity?’
Please join us for lunch on March 15th at 11:30am and learn about monetization strategies and technologies necessary to future-proof your business.
In addition to supporting subscriptions and implementing quote-to-cash processes, you're probably thinking about how to plan for the Internet-of-Things and how this will affect your business. Whether you sell digital goods, hardware, software or physical things - how should you think and prepare for provisioning entitlements, usage/consumption, customer engage, and reporting?
Join the conversation and learn about:
Join us for lunch and gain practical knowledge on how to package and price your products, services, and assets using the latest monetization strategies.
Schedule
Date: Tuesday, March 15th, 2016
Registration: 11:30AM
Lunch Begins Promptly: 12:00PM
Luncheon Concludes: 2:00PM
Location
Fleming's Prime Steak House
8970 University Center Lane
San Diego, CA 92122
Space is limited. Reserve your seat now.
We ran a joint webinar with Aria Systems exploring the challenges of pricing, packaging, and delivering products and services in rapidly changing markets. Find out what software monetization means for the future of your business. Watch the webinar now.
Tune into the TMCnet webinar Subscriptions Are Eating Software to discover how you can tap into this lucrative market. Featuring insight from Gemalto’s Shlomo Weiss, Constellation Research’s Ray Wang, and Viavi’s Will Brouwer. Click here to view the recorded webinar.
In February, Gemalto attended Industry of Things World USA in San Diego; an international event that brings together thought leaders in the industrial IoT space. We were also on hand at Embedded World in Nuremberg, Germany to explain how our range of software monetization solutions can bring value to the IoT ecosystem.
Q1 2016
Sentinel LDK is an out-of-the-box software monetization solution combining IP protection, licensing, and entitlement management.
New features and improvements in this build include:
Sentinel LDK 7.4 also makes it possible to offer software trials that can be installed on any machine, with a license expiration date of your choosing, and promises improved compatibility with Java applications.
Click here to learn more about Sentinel LDK, or download the latest version now!
A new and improved version of Sentinel LDK Embedded for Linux ARM is now available. This build adds support for Sentinel HL driverless configuration keys, hard-float EABI, and optional Envelope support on the Linux ARM platform. It provides a subset of the full Sentinel LDK, which is required for license generation.
The SDK can be downloaded here.
EMS 3.2.5 service pack brings all-new enhancements to the Web-based software licensing and entitlement management system.
Improved usability features include:
Performance improvements include:
Miscellaneous improvements include:
Download the service pack here.
Software hackers are growing bolder and more resourceful by the day. They take advantage of the fact that so many companies today blindly put their faith in the IoT, assuming that the environment’s complexity is enough to keep their applications safe. As Gemalto’s VP, CTO Software Monetization, Michael Zunke, explains, nothing could be further from the truth.
LEAP: Last year, Volkswagen took High Court action to cover up claims that the keyless ignition system in its luxury cars was easily hackable. Why do you think it went to such great lengths?
MZ: That was an exercise in damage control. VW was clearly worried that if word got out that the signal between its immobilizer and key fob could be intercepted and cracked within 30 minutes, every hacker with a penchant for luxury cars would try to beat those odds. It had a lot at stake.
LEAP: What are the implications of this type of cyber attack?
MZ: In the short term, the cost of fixing a security breach can set a company back millions of dollars. It can also put a serious dent in its brand reputation, which can be harder to recover from in the long term. In VW’s case, the prospect of thieves gaining control of its cars posed a serious threat to road safety as well.
LEAP: Is this problem more prevalent in the automotive industry or does it affect all verticals?
MZ: Volkswagen is just one example of hackers exploiting the lax security measures in the IoT. Oracle has also reported an uptick in customers reverse engineering its code in order to uncover vulnerabilities. More recently, Juniper had to issue a security announcement warning its customers to patch their enterprise firewalls against bad code. If left unchecked, this would’ve given attackers free rein to hijack its devices and decrypt VPN traffic. Even Juniper’s largest rival, Cisco, couldn’t escape the effects of tampering. Despite protestations that the security of its code is rock solid due to a strict no-backdoor policy, Cisco began an internal code review to find malicious modifications, suggesting that perhaps it’s not quite as confident in its own implementation as it would have us believe.
LEAP: It’s quite a bleak picture you’re painting! Just how widespread are these security threats and what, if anything, can companies do to protect themselves?
MZ: Unfortunately, they’re a lot more common than most companies are willing to admit. Practically every time an IoT device enters the market, a new attack surface is born, exposing it to unauthorized use and reverse engineering. While it isn’t possible to completely eliminate these threats, there are ways of mitigating them. Software encryption, for example, ensures that only authorized personnel have access to your device, while IP protection prevents reverse engineering of crucial code. I go into this in more detail in my LicensingLive presentation, which explores the various techniques you can use to safeguard the application and data that make up the core of your device.
Q1 2016
We’re pleased to unveil our customer testimonials page, a platform for customers to share their experiences of working with us. Here you’ll find a selection of presentations, testimonials, blog posts, and case studies, all in one convenient location.
Don’t just take our word for it – see for yourself why tens of thousands of customers worldwide trust Sentinel to monetize their software.
Featured customers include:
Check back often as we’ll be updating the page with additional customers and content throughout the year.