The Ultimate Guide to Choosing WordPress Pros and Cons
Virtual Surveillance Case Study
1. Sentinel HASP Halts an Attack in
Progress, Protecting Virtual Surveillance’s
Hardware and Software Systems from
Reverse-Engineering and Theft
Case Study
Virtual Surveillance is one of only six companies worldwide licensed to sell surveillance equipment to Las Vegas and
Washington state casino markets. Competing in such a highly aggressive industry, it is vital that the company protects its
products from reverse engineering. Initially, Virtual Surveillance used an in-house protection method, however they realized
the need for a more robust method when they learned of a hack in progress. The company quickly implemented Sentinel
HASP and foiled the attack.
The Back Story
Virtual Surveillance understands protection. The company provides Challenge
hardware and software protection to industries that require the When their in-house solution was not able to protect an attack in
highest levels of security and confidentiality, including government progress, Virtual Surveillance needed a new protection solution.
agencies, medical facilities, hotels and casinos. Their intelligent
video surveillance program contains software that analyzes video Solution
in real-time and creates alerts that address security threats before Virtual Surveillance chose Sentinel HASP to protect their global
they escalate. When their own security was compromised, Virtual surveillance equipment from reverse-engineering.
Surveillance realized the need for a new protection solution.
The Business Challenge Results
Originally, Virtual Surveillance produced their copy protection in- Sentinel HASP was able to halt an attack in progress and save Virtual
house. Their homegrown protection made it difficult to move the Surveillance costly losses.
software license to a different machine, or to copy it. For instance, if
someone were to use one of the readily-available tools to spoof the
MAC addresses of network cards, they could continuously re-use a
single software license key. Their worst fears became a reality when
Virtual Surveillance discovered a breach in security. Someone was
attempting to reverse-engineer both their hardware and software
products.
The Solution
This attack led them to Sentinel HASP. Virtual Surveillance’s
software is spread across many different applications, each of
which is dependent on an ASP.Net web service used for sharing
Virtual Sureveillance Case Study 1