

As a result, all programs protected by the same protection scheme can be hacked using the same attack method. Q: You’ve recently launched a new global hacking contest to prove the validity and strength of your Blurry Box tell us something more?Ī: Conventional software protections most often rely on the principle of “security through obscurity”, meaning that the security of a system is fundamentally tied to the secrecy of the protection mechanisms that are shielding it from attacks. Recommended: ViriCiti Aims To Expand Its Cloud-based Telematic Service Across The US Software licensing schemes that are versatile by nature, accommodate software, hardware, and cloud-based license containers, and adjust to the customers’ demands are the driving force of Wibu-Systems’ business.

With that, our mission has also shifted: We are leveraging the most sophisticated endpoint security techniques to provide monetization opportunities. Wibu-Systems’ technologies are now used by ISVs and intelligent device manufacturers who distribute their applications through personal and industrial computers, mobile devices, embedded systems, PLC units, and even microcontrollers. Since then, the focus of the company has expanded to several other markets and systems. Marcellus Buchheit and I founded it in 1989 with the goal of helping software publishers protect their intellectual property against piracy and reverse engineering. Q: How would you describe Wibu-Systems in your own words?Ī: Wibu-Systems is an innovative technology leader in the global software licensing and security market.

Below is our interview with Oliver Winzenried, CEO and Co-founder of Wibu-Systems: Their goal is to enforce ethical business practices and provide labor safety by perfecting protection, licensing and security for all types of digital content.

Since 1989 Wibu-Systems has constantly been one of biggest companies supplying the DRM anti-piracy industry.
