

#USB SECURITY KEY DONGLE MICROTECH SOFTWARE#
Your customers demand flexibility in their software licensing options. The result? A level of dongle software protection that is unmatched by software-based solutions. Go even further with our Fortress dongle and CodeVault solution to run application code separately on the dongle. The security algorithms run on the dongle itself, instead of the computer's memory.

That's because the dongle's firmware is tightly integrated with the software. Why protect your software and systems with security dongles?Įxternal hardware devices provide an indisputable increase in security.

Particularly vulnerable are those products sold in high-risk markets, high-value software, certain software classes/industries that are targeted by hackers and innovative, leading-edge software. Industry experts generally agree that hardware-based protection provides superior security since a physical piece of hardware has to be bypassed to misuse the software. Whether it's time or usage-based restrictions or limiting the modules and features available, the end-user's access is managed and enforced by the dongle. Additionally, the dongle can also control how the end-user actually uses the software, referred to as software licensing. Afterwards, the software only runs if the dongle is physically present on the computer or machine. To implement, KEYLOK APIs are integrated with your software. Hardware-based protection uses a physical device, commonly known as a dongle, USB hardware key or USB security key.
