TRULY PROTECT
TrulyProtect is a Cyber-Security Company that developed a suite of Code Security Tools that protect creators of software - Independent Software Vendors and other companies - against Reverse Engineering, Modification and Theft of Algorithmic and other coded-IP. We permit the creators and users of software to "Trust The Information and The Systems Delivering It". Our suite of tools are supplied "as-a-service" on a continuous basis (24/365 TrulyProtect’s patented technology implements modern H... W virtualization technology, state-of-the-art cryptography and follows the Security by Design paradigm recommended by NIST software reverse-engineering, theft or modification becomes impossible (we do NOT use obfuscation!). Our Tools integrate with the developers' software executable files while staying transparent to the user and not interfering with the "normal" operation. This is a general description of how our technology "works": • a creator of software finishes developing an application and decides which executables are critical for the application to operate properly; • this choice dictates which executables will be "trulyprotected" – meaning encrypted by our technology, with the decryption keys stored on our cloud server; • when the application is later initiated, it sends a request for the keys to our server; • the keys are obtained by our patented hypervisor, and are encapsulated inside the CPU, within a protected memory “ringfence”; • but, before transferring the keys, our server sends a validation challenge, to verify the endpoint’s trustworthiness, and only after successfully completing a challenge, the keys are released…and the application can operate as intended; • the keys are never stored with the application! Therefore, reverse engineering, modification, theft – not possible TrulyProtect Solutions: • Software Theft-Protection - “Sapphire” - Illegal software copies become useless (non-operable). • Anti-Reverse-Engineering – “Emerald” - Algorithmic and other coded IP cannot be stolen. • Software verified to Run-As-Intended (by the creator) - Illegal Software modifications not possible. • Short-Term (Transaction) Data Encryption - Keep local credentials secret in Server (i.e., DB connect credentials); Provide instantaneous Encrypt/Decrypt services for critical DB fields. • External/Remote Execution Control - Control execution rights of software from off of target system (remotely): Control Demo periods, Control software rental schemes, Support software schedule execution-rights. Customers and business model; TrulyProtects' as-a-service tools are provided to creators of software worldwide. The customer pays for an initial set-up/license, support, and "transaction" or "per server" fees. Other payment options are negotiable with larger clients or on a "per case" basis. Our services are supplied on a continuous basis (24/365) and that is what our customers pay for.
TRULY PROTECT
Industry:
Apps Cloud Security Network Security Software Virtualization
Founded:
2012-01-01
Address:
Jyväskylä, Western Finland, Finland
Country:
Finland
Website Url:
http://www.trulyprotect.com
Total Employee:
11+
Status:
Active
Contact:
+972545767050
Email Addresses:
[email protected]
Technology used in webpage:
Amazon Google Apps For Business GoDaddy DNS AWS Global Accelerator
Current Employees Featured
Founder
Official Site Inspections
http://www.trulyprotect.com Semrush global rank: 9.53 M Semrush visits lastest month: 141
- Host name: aec037177372cc6cd.awsglobalaccelerator.com
- IP address: 3.33.251.168
- Location: Seattle United States
- Latitude: 47.6348
- Longitude: -122.3451
- Metro Code: 819
- Timezone: America/Los_Angeles
- Postal: 98109