Google Answers Logo
View Question
 
Q: File Sharing Prevention Research ( Answered 5 out of 5 stars,   0 Comments )
Question  
Subject: File Sharing Prevention Research
Category: Computers > Security
Asked by: ddci-ga
List Price: $20.00
Posted: 01 Nov 2004 10:58 PST
Expires: 01 Dec 2004 10:58 PST
Question ID: 423007
I would like to have a list of companies that specialize in the
prevention of file sharing. I have found four so far, and they are:

1) MediaDefender
2) BayTSP
3) Ranger Online
4) Overpeer

Please give me a list of any others you can find, and make twenty bucks!
Answer  
Subject: Re: File Sharing Prevention Research
Answered By: tutuzdad-ga on 01 Nov 2004 12:08 PST
Rated:5 out of 5 stars
 
Dear ddci-ga;

Thank you for allowing me to answer your interesting question. Let?s
see?I rounded up the few that I could manage to find for you. Here
they are:


VIO Systems Limited 
(CipherPack http://www.cipherpack.com/ )

Microsoft
http://www.microsoft.com/presspass/press/2001/Feb01/02-02ProdActPr.asp

Cinea (A subsidiary of Dolby Laboratories)
http://www.cinea.com/about.html

Corporate Disk Company
(Smarte Solutions Piracy Management Suite)
http://www.disk.com/html/smarte/solutions.htm

PACE
http://www.paceap.com

ContentGuard
http://www.contentguard.com 

Rainbow Technologies
http://www.rainbow.com/ 

SoftwareKey
http://www.softwarekey.com
 
Digital Content Protection LLC
http://www.digital-cp.com/
 
Software Activation Service
http://www.activatesoft.net
 
Fasoo
http://www.fasoo.com/eng/index.asp
 
Aladdin Knowledge Systems Ltd.
http://www.ealaddin.com/privilege/
(Manufacturer of Hasp and Hardlock token-based security systems, eSafe
anti-vandal, anti-virus Internet security, and Privilege, a software
licensing tool.)
 
Microcosm Copy Protection Systems
http://www.microcosm.co.uk
 
Griffon Technologies
http://www.griftech.com/

CrypKey, Inc.
http://www.crypkey.com
 
Arxan Technologies Inc.
http://www.arxan.com/
 
Zapper Software
http://www.zappersoftware.com
 
Ebook 
http://www.ebook-security.com
(Offers protection of PDF and EXE files from illegal file sharing.)

Data Encryption Systems Limited
http://www.des.co.uk/
 
Softlok
http://www.softlok.com/
 
Byssus Hydra
http://www.byssus.com

Guardant USA
http://www.guardantusa.com

Deskey
http://www.deskey.co.uk
 
SlockPK
http://www.crypto-central.com/slock/index.html
 
AntiCrack Protector
http://www.anticrack.us/

SDProtector
http://www.sdprotector.com 

Software Protection Labs
http://www.sofpro.com 

X-Formation
http://www.x-formation.com

ACProtect
http://www.ultraprotect.com
(Executable files protector for securing programs against unauthorized
copying, use and distribution. Affiliated with AntiCrack Protector
above)

SoftLock
http://www.soft-lock.com/
(Software copy protection, usage control products and services.) 

SecuROM Sony DADC
http://www.securom.com

Softkey
http://www.softkey.com.my
(HASP4 Software Piracy Protection.) 

StarForce Software Protection
http://www.star-force.com

Feitian Technologies
http://www.FTsafe.com/

Matrix
http://www.matrixlock.de/english/index.htm
(Protection of your software from unauthorized reproduction.) 

Key-Lok
http://www.keylok.com
(Copy protection, software security, and piracy prevention.)
 
LAN Audit Pro
http://www.lanaudit.co.uk/

ActiveLock
http://www.activelock.com/

Ersatz Media
http://homepage.ntlworld.com/thedarkside/Index.htm
(Provides a service for individuals or companies who wish to prevent
their copyrighted material from being freely shared via the Internet,
peer-to-peer networks or as BitTorrents.)

SoftwareShield
http://www.softwareshield.com
(Licensing and copy-protection system for Windows application developers.)
 
SVK Protector
http://www.anticracking.sk/
(Tool that enables professional protection of software and securing
products against unauthorized copying, use and distribution.)

SoftKey Solutions
http://www.software-key.org

Sheriff
http://www.sheriff-software.com
(Provides software developers with secure copy protection, solving the
problems of software piracy)

ExeShield Software Copy Protection
http://www.exeshield.com
(Provides maximum protection against piracy and reverse-engineering.)
 
Lockware 
http://www.Lockware.com/index1.htm

InfoSeer
http://www.infoseerinc.com
(Products that protect intellectual property distribution throughout the web.)

PC Guard
http://www.pc-guard.co.yu
(Software copy protection)

MindestworX Software
http://www.mindestworx.fr.st/
(Provides software solutions against illegal distribution.)

HexaLock Ltd.
http://hexalock.com/
(Copy protection solutions that help prevent unauthorized copying of
digital content, when stored on optical or other digital media.)

Wizzkey
http://www.wizzkey.com

Copyright Systems Technology (CST) Limited
http://www.cst-ltd.com/
(Copyright and intellectual property rights management. Optical CD
anti-piracy solution for music, film, computer game and software
industries.)

SignetSure
http://www.SignetSure.com
(Protects files from unauthorized modification.)
 
Alkonost ContraCopy
http://www.contracopy.com/
(Software for distribution protection)
 
Global Anti-Piracy Systems
http://www.gapsinc.com
(Activation and protection of software.)
 
Siliconkey
http://www.siliconkey.com/

Obsidium Software Protection
http://www.obsidium.de
(Software protection solution that prevents against unauthorized modifications.)
 
Software Protection for Shareware Developers
http://www.sfu.ca/person/lower/MISC/softprot.html
 
Conus
http://www.conus.info

Seculab
http://www.seculab.ru

Xope Systems
http://www.xopesystems.com

Techno Linguistic Solutions
http://www.technolinguistic.com



I hope you find that my research exceeds your expectations. If you
have any questions about my research please post a clarification
request prior to rating the answer. Otherwise I welcome your rating
and your final comments and I look forward to working with you again
in the near future. Thank you for bringing your question to us.

Best regards;
Tutuzdad-ga ? Google Answers Researcher



INFORMATION SOURCES

DEFINED ABOVE


SEARCH STRATEGY


SEARCH ENGINE USED:

Google ://www.google.com


SEARCH TERMS USED:

SECURITY

ANTI FILE SHARING

ANTI PIRACY

COPYING

PREVENTION

PROTECTION

SECURITY

TECHNOLOGY

Request for Answer Clarification by ddci-ga on 02 Nov 2004 14:25 PST
Thank you for your quick answers.  This is certainly worth the $20.00.
 For another $10.00, do you think that you could specifically find
companies that focus on file sharing?  Check out the 4 companies that
we mentioned to see exactly what they do and possibly find others that
specifically fit that theme?

Clarification of Answer by tutuzdad-ga on 02 Nov 2004 18:01 PST
Certainly.  How's this in exchage for your bonus offer?

Nuke Pirates
http://www.nukepirates.com/

NukePirates is owned and operated by Internet Copyright Enforcement,
company located in California. This is a proactive service that
legally "nukes" pirate sites and gets them offline for it?s customers.

???

Pancho Networks
http://www.panchonetworks.com/

Pancho's FlowPatrol 3.0 and FlowDirector 3.0 application flow control
software run on Windows XP/2000 and can block or throttle all
Peer-to-Peer (P2P) traffic including: - KaZaa, Morpheus, Gnutella
based, and all others

???

Akonix
http://www.akonix.com

Akonix RogueAware is a solution that insures compliance. It is a free
network ?sniffer? that collects information about the use of traffic
that is generated by the major public IM networks including AOL's AIM,
ICQ, MSN, and Yahoo! as well as major P2P File Sharing applications
such as KaZaA, Morpheus and Gnutella, among others.

???


Aladdin Knowledge Systems
http://www.ealaddin.com/

Another compliance oriented company. eSafe, the integrated proactive
content security solution, incorporates AppliFilter? - a new
technology that can block application level threats such as P2P (Peer
to Peer) file-sharing such as KaZaa, iMesh, Gnutella, eDonkey and many
others.

???

DynaComm
http://www.dciseries.com/products/iscan/

Prevent illegal P2P file sharing activity. ?If employees are running
P2P and IM clients, they may well be leaving you wide open to a host
of legal liabilities and opening up your network to outside attack.
Without the ability to track and manage P2P and IM usage, your
security policy could be no security at all.? DynaComm i:scan has the
power to search for, and eliminate, undesirable files across your
network. It can readily seek out, log and remove such items as
peer-to-peer (P2P) file sharing clients, or instant messaging (IM)
software.

???

Telemate
http://www.verso.com/press/prs/pr080.pdf

"Telemate.Net Announces New File Sharing, Instant Messaging and Chat
Content Blocking Features Unique signature-based blocking technology
protects networks against security risks and bandwidth waste from file
sharing, instant messaging and applications that allow spyware and
virus downloads."

???


SCOS Automation
http://www.scos.nl/default.asp?pg=surfcontrol-messagefilter

Helps minimize your exposure to the legal liability resulting from
inadvertent or intentional data leakage, the exchange of offensive
material, and copyright infringement.

???

Procera Networks
http://www.proceranetworks.com/

OptimIP? intelligent network appliance ?rogue warrior? configuration
can block and control instant messenger sessions, P2P traffic for
security and liability purposes.

???


SonicWALL, Inc.
http://www.sonicwall.com/

Content Security Manager 2100 CF is able to manage the use of IM, P2P,
and multimedia applications to reduce security risks and liability.

???

Blue Coat Systems, Inc.
http://www.bluecoat.com/

?Blue Coat's ProxySG line of appliances provide policy-based Web
traffic control for small to large enterprises at the corporate
gateway, including content filtering, IM/P2P control??

???


Mainstream Security Services, LLC
http://www.mainstream.net/security_offering.shtml

Provides a packet-reassembly firewall that can examine streams of data
in-context for possible P2P misuse and protect companies from
liability issues related to potential copyright infringement.

???







sources

GNUTELLA NEWS
?Software Services to Block P2P?
http://www.gnutellanews.com/article/10704


Regards;
tutuzdad-ga
ddci-ga rated this answer:5 out of 5 stars and gave an additional tip of: $15.00
Excellent response time!  Thank you so much for your thoroughness.

Comments  
There are no comments at this time.

Important Disclaimer: Answers and comments provided on Google Answers are general information, and are not intended to substitute for informed professional medical, psychiatric, psychological, tax, legal, investment, accounting, or other professional advice. Google does not endorse, and expressly disclaims liability for any product, manufacturer, distributor, service or service provider mentioned or any opinion expressed in answers or comments. Please read carefully the Google Answers Terms of Service.

If you feel that you have found inappropriate content, please let us know by emailing us at answers-support@google.com with the question ID listed above. Thank you.
Search Google Answers for
Google Answers  


Google Home - Answers FAQ - Terms of Service - Privacy Policy