We are pleased to announce the release of our smartphone app for programming OATH OTP tokens. Using an NFC-enabled smartphone our programmable tokens can be flashed with new secret keys and settings. This allows hardware tokens to be used as a replacement for authenticator apps for 2FA/MFA on platforms including Microsoft Azure, Office365, AWS and Google.
Windows logon using smart cards and tokens significantly improves the login security for domain user accounts. This post provides an overview of smart card logon and the hardware options available from Microcosm.
You have spent a significant amount of time and creativity in writing your killer application but you are worried about a competitor or hacker reverse-engineering your software and stealing your intellectual property. What is the best way to protect it?
It is common practice for software developers to release demo versions of their software so that potential customers can evaluate its functionality before purchasing it. This licensing model is usually known as trialware, demoware or "try before you buy". This article explores how software demos can be provided in a secure way while protecting IP and revenue streams.
Software protection refers to measures that can be taken by a software developer to prevent unauthorised use of their software, enforcing their licensing agreement and using anti-debugging and anti-reverse engineering techniques to protect their intellectual property (IP) against theft.
With over 30 years experience in the software protection industry, Microcosm offers a range of copy protection solutions that delivers the perfect combination of security and ease of use. In this post we outline our history and describe our current software protection solutions.