CYBERDEFENSE IN DEPTH WITHOUT OR WITH VALIDY
Validy Softnaos is a Proof Of Concept (POC) of Validy Technology (Patented)
You are faced with the piracy (illegal copy) of your software applications and/or the sabotage (attack against the integrity) of your IT systems. Validy SoftNaos combines a post-compiler with a secure co-processor which can put you back in control.
After transformation by Validy SoftNaos, your application is made up of a fine mix of unchanged instructions which are executed on the user's PC and transformed instructions that can only be executed by the secure co-processor which is in the form of a USB token.
Users retain full control over their computer, but your protected application can only run on a hybrid system of which you control one part. This principle is radically different from the one that dongles usually rely on.
Only the secret key, used to encrypt the transformed instructions, links the protected application to co-processors which hold this same key. This simplifies the management of applications updates and the distribution of the tokens to your clients.
Based only on published principles and on a secret cryptographic key held in the secure token, Validy SoftNaos gives you robust protection. You can evaluate the SoftNaos solution by downloading the tool, learn more about its working principles or look for answers to your questions.