Software Protection Guarantees Return of Investment

Secure your software and make each license a paid one.

More

Software Licensing

Software Licensing generates follow-up sales and builds customer relationships.

More

Document and Media Protection

Secure distribution
of digital media, audio and video files.

More

Cloud and Internet Security

Secure access to Cloud applications, protected websites and on-line services for authorized users only.

More

Mobile and Embedded Security

Protection and licensing on embedded systems.
Avoid reverse
engineering and
unauthorized usage.

More

CRYPTO-BOX®

The simple answer to your software protection demands.

AutoCrypt

The fastest way to protect your software - without programming knowledge or source code.

AutoCrypt SL

Software based licensing and online activation, including 24/7 online licensing and e-Commerce services.

image description

News

TAA compliance: Crucial for Federal Contractors

The Trade Agreements Act (19 U.S.C. & 2501-2581), most commonly referred to simply as the TAA, requires that U.S. government organizations only purchase finished goods that are "made or substantially transformed" in the United States or another TAA-compliant country. The country of origin of a TAA-compliant product is determined by the last substantial transformation made to the product before it is exported to the United States.

Update for the MARX Analyzer Diagnostic Tool

MARX Analyzer is the ideal diagnostic tool for the maintenance and troubleshooting of the CRYPTO-BOX® software protection and license management hardware and software components. It gives you a detailed system diagnostics report within a few seconds.

CRYPTO‑BOX Protection Kit 8.17: AutoCrypt with .Net Core Support

The Professional Protection Kit (PPK) is the universal toolkit for your protection strategy with the CRYPTO-BOX.

AutoCrypt Wizard: Protection for .NET Core Applications

AutoCrypt protects software quickly and effortlessly – without writing a single line of code, or any access to source code.

Software Protection

The protection of intellectual property has the highest priority for software businesses. Loss of revenues through software piracy and counterfeit licenses climbed to the highest level ever in 2017. Almost 40% of all computer software worldwide was illegally shared or stolen.
The CRYPTO-BOX protection system secures revenues from selling software licenses and protects return of investment. With the CRYPTO-BOX hardware based protection or the AutoCrypt SL software licensing with SOLO server, we offer two strong solutions against loss of revenue due to piracy.
The CRYPTO-BOX encryption microprocessor stops software duplication, cloning and reverse engineering. The protected program cannot be used without the proper software security dongle. Automated or API implementations are available for customer specific authentication strategies.
The AutoCrypt SL and SOLO Server combination offers a variety of licensing options. Activation and prolongation of licenses is done via the SOLO Server. The powerful sales platform includes a fully featured e-Commerce module for selling software online 24/7.
And the benefits of protected software? It keeps your customers happy with genuine products, efficient customer support and always updated software versions.

License Management

License Management with the CRYPTO-BOX effectively prevents infringements of license agreements and generates follow-up sales. Software leasing, time limitation, or activation of different modules of the protected software are smart distribution scenarios. Secure remote updates and safe remote activation guarantee customer satisfaction.
The License Control System (LCS) controls and limits the number of application licenses in networks - only one CRYPTO-BOX per network is required.

Cloud Security

Cloud computing makes IT services available on demand. It minimizes up-front costs for IT infrastructures and storage of data. However, cloud computing poses privacy concerns because the service provider can access the data that is in the cloud at any time.
With the Cloud Security Toolkit only registered users with a valid CRYPTO-BOX have access to the secured web portal. This online authentication for web based applications provides secure access options. For instance the "pay-as-you-go" distribution model with access to certain services or software updates for paying customers only. Another typical application can be access to administration panels for authorized service personnel.

Mobile Security

Smartphones, tablets and notebooks are increasingly being used for mobile work - although this of course means that the protective mechanisms of a secure network cannot be used.

However, to ensure that new work and home office use does not become a gateway for hackers, technical measures are required to ensure that access to company data is only granted by authorized personnel, that data remains protected and that its use is ensured when necessary.

The CRYPTO-BOX provides comprehensive protection including license management for mobile devices in industrial applications and for sensitive company apps. Mobile Security with the CRYPTO-BOX offers hacker-proof and individually configurable protection that goes far beyond the capabilities of standard protection mechanisms under iOS and Android.

Document and Media Protection

"Document Protection" and "Media Protection" secure the distribution of digital media contents. Only users with a valid CRYPTO-BOX have access to protected documents, graphics, web-pages, or multimedia contents. In addition to the protection of the software, users can also protect the documentation of their application with the same CRYPTO-BOX.

Flexible licensing options for the protected contents, such as setting an expiration date or allow printing, can be varied. Digital rights management includes secure updates, upgrading, extending or revoking licenses.

Document Protection can be adapted to customer specific requirements, such as individual licensing/DRM models or watermarks. We deliver the tools and know how for your secure distribution strategy.

Customization

With many years of experience in the International software protection business, MARX has the knowledge and experience to assist you with your customized security solution. We can advise you on individual licensing concepts and modification of software libraries to support your specific application. Over the years we engineered a variety of customized
CRYPTO-BOX hardware and firmware according to our customers requirements.

We can work with you on bulk rates and individual frame contracts with attractive pricing. Our three support category levels Business, Premium and Economy offer you just the right amount of support you need.

The case of the CRYPTO-BOX can be customized to your individual requirements. We offer engraving or individual colors for better identification. Customer specific housing or tags increase the recognition value and can be perfectly integrated into an existing product line.

 

Looking for Secure Authentication solutions? www.cryptoken.com

Please guide me to find the right solution

guide me

I already know what I need. Take me directly to the
Product Overview/Shop

Product Overview