Button Up

Our Markets

StarForce Solutions

Business information security

Business information security

against leak and unauthorised use

  • Corporate information
  • Corporate documents
  • DMS & ECM control
  • Email security
Electronic documents protection

Electronic documents protection

against unauthorised viewing and illegal distribution

  • PDF, DOC, XLS, RTF, JPG, PNG, PPT, HTML, and GIF protection
  • Email messages & attachment security
  • Electronic libraries & archives protection
  • eBooks and eMagazines protection
Protection of educational software and e-Learning materials

Protection of educational software and e-Learning materials

against copying, hacking and illegal use

  • Training courses, books, presentations, reports and other electronic documents (PDF documents protection).
  • Trainings, courses, lectures and seminars in audio/video format (multimedia content protection).
  • Educational software
Software and games protection

Software and games protection

against cracking, copying and illegal use

  • Business software protection
  • Corporate applications protection
  • Computer games and MMOG protection
  • Downloadable content (DLC) protection
Source code protection and obfuscation

Source code protection and obfuscation

against analysis, cracking, reverse engineering and modification

  • C++ obfuscation
  • .NET obfuscation
  • Anti-reverse-engineering
  • Anti-debagging and decompiling
Audio/video files protection

Audio/video files protection

against unauthorised viewing and illegal distribution

  • Protection of teaching and educational materials
  • Protection of materials for corporate use
  • Protection of personal and copyrighted materials
  • Protection of audiobooks
  • Protection of movies
Data protection on USB flash drives

Data protection on USB flash drives

against piracy and unauthorized use

  • Protection of software
  • Protection of audio/video content
Optical disc protection

Optical disc protection

against copying and illegal distribution

  • Protection of software
  • Protection of multimedia content
  • Protection of electronic documents
  • Protection of DVD-Video
Copy protection with binding

Copy protection with binding

The binding is a method to protect software from copying and illegal distribution. In this method, a link to a physical license carrier (the binding object) is embedded into the file being protected. The binding object usually has unique parameters that are difficult to copy or reproduce, for example, the geometry of the tracks on CD and DVD discs, serial numbers of the computer hardware or of USB drives.

DRM: access activation over Internet

DRM: access activation over Internet

binding to the hardware and software parameters of the user's device

  • Reducing the cost of material media
  • Access control
  • Usage statistics
Software licensing

Software licensing

for comprehensive statistics governing distribution and use

  • Define distribution policy
  • Various licensing models
  • Sales tracking and reporting
  • Time and regional restrictions
ATM security

ATM security

from hacker attacks and cyber-threats

  • ATM software security
  • Automated system software protection
  • Microchip firmware protection
Custom software development

Custom software development

Development of software to solve unique tasks

  • Own obfuscation technology
  • Guaranteed level of quality for custom software development
  • Cost-effectiveness