Contact Us

Feel free to reach out with any questions or inquiries.

Your message has been sent successfully

Service Level Agreement

Our commitment to responsiveness is integral to our service ethos. We aim to acknowledge all inquiries submitted within a maximum timeframe of 72 hours. However, it is noteworthy that we typically endeavor to respond within a more expedited timeframe, usually within 24 hours. Please be advised that responses may not be issued if deemed unnecessary or if the nature of the inquiry falls outside the scope of our services. Additionally, please ensure that all communications are directed from a business email address.

For urgent matters requiring immediate attention, please refer to the contact information provided within the Statement of Work (SOW) document. This includes a designated phone number for urgent matters that require immediate assistance. We appreciate your understanding of our SLA and assure you of our dedication to providing timely and efficient responses to all inquiries within our purview.

Frequently Asked Questions

Anti-Piracy

Safeguarding the DRM of software applications yields multifaceted benefits, foremost among them being revenue preservation. By thwarting unauthorized access and piracy, developers and publishers can safeguard their revenue streams, ensuring that their intellectual property generates the deserved returns on investment. Additionally, hardening store license management against piracy safeguards the integrity of the brand, upholding its reputation and prestige within the relevant communities. Furthermore, robust DRM measures enhance user trust and confidence by assuring them of a secure and authentic experience, thereby fostering long-term customer loyalty. Beyond financial considerations, anti-piracy tech bolsters regulatory compliance, ensuring adherence to copyright laws and industry standards, thus mitigating legal risks and liabilities. Moreover, it enables developers to maintain control over software distribution channels, optimizing market reach and maximizing the potential for commercial success. Ultimately, DRM protection serves as a cornerstone for sustainable growth, innovation, and competitiveness in the dynamic landscape of the software industry.

No, our solution does not install any software. It simply saves a binary blob, which functions as the activation token. There are no drivers or services installed as part of our solution.

Yes, an internet connection is required for the initial activation process or after major system updates. During activation, a unique activation token needs to be downloaded and installed, ensuring secure and authenticated access to the software. Connections are outgoing on port 443 (https). This process occurs seamlessly in the background, minimizing disruption to the user experience. Once activation is complete, you can subsequently start the activated software without requiring an internet connection, enabling offline usage convenience.

We specialize in protecting 64-bit Windows portable executables, encompassing both .exe and .dll files. Our solution is tailored to ensure robust protection for a wide range of software applications, offering comprehensive security measures to safeguard executable files from unauthorized access and piracy threats on the Windows platform.

The duration of protection against piracy can vary depending on various factors and the specific context of its implementation. To ascertain the effectiveness of our solution in safeguarding against piracy, we propose collaborating and evaluating its performance together, ensuring that it meets your unique requirements and expectations.

Our protection solution is applied post-build, eliminating the need for any source-code changes. The implementation process typically involves running a standalone executable with a brief command-line input and checking the exit code. In some cases, a compiler flag may need to be adjusted. This straightforward integration process can usually be completed within an hour, excluding testing.

The duration for protecting your executable within your build script typically ranges between 30 and 120 minutes, contingent upon factors such as the selected level of protection and enabled features. This timeframe accommodates the comprehensive integration of encryption, obfuscation, and other security measures tailored to meet your specific requirements, ensuring robust protection against unauthorized access and piracy threats.

Pirates possess automated tools and store emulators, enabling them to crack unprotected DRM swiftly, often in a matter of minutes. In fact, the process of testing whether the crack functions properly often consumes more time than the actual cracking process itself. With readily available tools and techniques, pirates can exploit vulnerabilities in unprotected DRM systems with alarming efficiency, underscoring the critical importance of implementing robust anti-piracy measures.

Our pricing structure is tiered based on the forecasted number of buyers, ensuring flexibility and scalability to accommodate varying needs and budgets. Additionally, we offer additional bespoke services tailored to specific requirements. For detailed pricing information and to explore customized solutions, we invite you to contact us directly for a confidential discussion. Our team will be more than happy to assist you in finding the most suitable option for your needs.

Yes, we can protect DLCs with the same level of protection as base games. This entails implementing security measures to safeguard the integrity of the DLC content. However, it's important to note that the protection process may introduce slight delays in launching the game, with a few seconds added for each protected DLC within the game. Additionally, when protecting both the base game and a DLC simultaneously, the protection time is doubled. Therefore, we recommend not protecting more than two DLCs at once to optimize performance and minimize any potential impact on the user experience.

Yes, our protection is fully compatible with Valve Steam Deck, ensuring seamless integration and robust security for gaming experiences on this platform. Additionally, our solution is also compatible with Linux Wine, extending its versatility across different environments. It's worth noting that our approach to protection optimizes resource utilization, as our solution does not run protection code frequently. By selectively limiting the execution of protected functions to startup and loading functions, we ensure no impact on battery consumption during gameplay. This thoughtful design allows gamers to enjoy uninterrupted gaming sessions without compromising performance or draining battery life unnecessarily.

File writing is minimal, occurring only during the initial launch of the software or after system changes, where just a single tiny file is deposited onto the hard drive. That's all.

Anti-Leak

Our anti-leak solution periodically sends reports with authorized launch data, giving you complete visibility into who launched your protected software, from where, and when. Optionally, it can also offer comprehensive protection by verifying that the software is launched from preconfigured IP address ranges. In the event that someone attempts to initiate the software from an unauthorized IP address, our system prevents the software from starting and simultaneously sends notifications to preconfigured contacts, providing detailed information regarding the attempted leak. This proactive approach ensures that unauthorized access attempts are swiftly identified and addressed, bolstering the security and integrity of your software assets. Ownership verification can happen seamlessly through a supported store or manually with an activation key or with Okta.

No, our anti-leak solution is bundled with anti-piracy to safeguard against potential removal or tampering. This integrated approach ensures comprehensive security for your software assets. Depending on your specific requirements, you have the option to utilize our DRM solution with activation keys if your software is not distributed through a store. Alternatively, we can implement a custom store solution tailored to your needs.

Yes, an internet connection is required at all times to initiate the protected software. Our anti-leak system verifies the location from which the software is launched by checking public IP addresses. If you are a remote worker, you may still be able to start the software when connected to your company's VPN, provided that the VPN connection is established. This ensures that software access is monitored and restricted based on predefined parameters.

Bespoke Protection

No, the generation of activation keys is not a user-controlled process. To obtain activation keys, you need to place orders directly with us. For further assistance or to initiate an order, please contact us through our direct channels, and our team will be glad to assist you promptly.

Yes, you have the capability to manage activation keys through our provided dashboard. Within this dashboard, you can modify the status of activation keys and input relevant information as needed. Additionally, the dashboard facilitates bulk actions, enabling efficient management of multiple activation keys simultaneously.

Event Security

Our solution operates seamlessly by executing a standalone executable. It actively monitors the configured application, promptly detecting when it enters fullscreen mode. Once detected, users are effectively restricted from utilizing keyboard shortcuts to exit the software. In instances where users manage to circumvent this restriction, such as by quitting the software through a menu or adjusting resolution settings, our system swiftly locks the Windows session, preventing access to the desktop. This comprehensive approach ensures that users are confined to using only the designated software, thereby mitigating the risk of data leaks and cheating.