Posts Tagged ‘Technology’

ZBRELLA, SmartAdvocate Reach Partnership Agreement

January 1st, 2014

ZBRELLA, a top technology consulting firm with a focus on the legal industry, has announced that it has reached an agreement with Smart Advocate to become strategic partners.

Jerrold S. Parker, the co-founder of national personal injury law firm Parker Waichman LLP, developed SmartAdvocate over 10 years ago out of his own frustration with the limited capabilities of the available law firm customer resource management (CRM) tools available at the time. SmartAdvocate provides a web-based CRM tool developed specifically for effective and efficient case management by personal injury law firms. The software has been in use and continuous development for over a decade. It is used daily by a New York-based national law firm with over 50,000 intakes per year.

Under the strategic partnership agreement, ZBRELLA will resell, install, and provide training for Smart Advocates. Michael Zucchi, ZBRELLA co-founder and CEO, said the partnership is a natural fit for the two organizations. He said as leaders in their respective trades, ZBRELLA and SmartAdvocate stand to gain much from the relationship which will greatly benefit their current and future clients.

“Smart Advocate is the absolute leader when it comes to case management solutions for downstate New York Personal Injury attorneys and ZBRELLA welcomes Smart Advocate into our portfolio of strategic partners,” Zucchi said. “At ZBRELLA, we are the top-notch technology firm in New York, and we associate with only the best. The partnership will deliver opportunities for our clients to benefit from real-time business information and business process automation.”

ZBRELLA tailors its solutions to each client. ZBRELLA works with its customers to find and implement the right software and hardware solutions, trains them how to use the technology and provides ongoing support to ensure the strategy in place continues to work for the client. And because ZBRELLA is deeply entrenched in the software industry, it is constantly monitoring new advances and determining how they could better serve their clients.


SafeNet intros AppOnChip technology for software security

September 11th, 2013

SafeNet today announced an enhanced version of the Sentinel Envelope file-wrapper technology within its software protection, licensing, and entitlement management system, Sentinel License Development Kit (LDK).
With the new AppOnChip functionality, software developers bind protected software to hardware keys, requiring the physical presence of the key to not only validate usage authorization but to execute the code itself, further strengthening the protection, said a press release.
AppOnChip is a fully automated process for binding a Sentinel hardware key to protected software by forcing selected pieces of code to execute on the key. In the absence of the key, the application fails to execute. All this is done without storing any of the application code on the key itself, the release added.

AppOnChip strengthens Sentinel LDK’s intellectual property protection, adding to Sentinel Envelope’s file encryption, code obfuscation, and anti-debugging features. AppOnChip evolves software security to prevent the illegal use of commercial software by unauthorized users.

Michael Zunke, CTO of SafeNet’s software monetization division, said, “Many ISVs have avoided implementing software security to the level provided by AppOnChip because it was a cumbersome, manual process.”

“Now, SafeNet customers can implement token-based software execution technology at the touch of a button. We believe that the additional security that AppOnChip delivers makes Sentinel LDK the most secure software licensing implementation available in the market,” added Zunke.

Benefits of SafeNet’s AppOnChip software protection technology include:

* Stronger security – As AppOnChip forces a small piece of code to run on the token, and the results are necessary for the application to fully execute, the application will fail to execute without the hardware key. Software vendors can choose which specific code blocks should be protected via an easy-to-use graphical interface.

* Easy implementation – The process of binding the software to the hardware key, analyzing which code can be executed on the token, and converting code into token-executable form is fully automated- no engineering effort is required.

* Nothing is stored on the token – Unlike competitive solutions, all of the code resides on the hard drive of the machine running the protected application. Only at run time, a small piece of code is executed on the token. User memory on the key is not impacted.

* Internal processes are unaffected – Protected applications do not require version tracking at the software vendor’s end, and key updates in the field are not required for new versions of the protected software.


Axis Technology Software Assigned Patent

September 11th, 2013

Axis Technology Software, Boston, has been assigned a patent (8,533,470) developed by Ilker Taskaya, Natick, Mass., and Alex Nauda, Melrose, Mass., for a segmented mapping.

The abstract of the patent published by the U.S. Patent and Trademark Office states: “Described are methods and apparatus, including computer program products for masking data. The inventions involves receiving a mapping scheme with a number of segments and a different cryptographic algorithm for each segment and then receiving a target value to be masked.

The target value is then split into a number of segments based on the number of segments of the mapping scheme and the cryptographic algorithm is applied for each segment in the mapping scheme to each segment of the target value to generate an encrypted segment for each segment in the target value. Then, the encrypted segments are concatenated to create a masked value.”


Get Adobe Flash player