Tunnel encryption of the communication protocol traffic. Hardware platform bit Cortex-M3 microcontroller. It was designed to protect and license software on Windows. Licensing by the number of workstations and by the number of running instances of the software. Supports symmetric encryption and powerful automatic protection tools. Matr-X A contains a large transparent window on the side panel, while Matr-X M has got a blind panel.

Uploader: Kajilmaran
Date Added: 4 January 2017
File Size: 15.20 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 8076
Price: Free* [*Free Regsitration Required]

Tips from the PitCrew If a hardware device isn’t functioning properly, or if a program srealth game that you’re installing states that it requires newer drivers, a driver update will be in order. Guardant Stealth II is a widely used dongle for software protection against piracy and unauthorized use. Models Description Features Advantages Guardant Sign Net A modern dongle for efficient protection and licensing of software running in computer networks.

The mechanism of network protection Network protection is based on principles common for all dongles, that is, on using all the Auto Protection and Guardant API features to protect a network application.

Driver for Aktiv Company Guardant Stealth II USB dongle – downloading and installing it

Find out how to make your computer faster by running our Free Performance Scan. The mechanism of software protection and licensing in the network works as follows:.

Drivers are the property and the responsibility of their respective manufacturers, and may also be available for free directly from manufacturers’ websites. Provides protection at the level of local dongles by using end-to-end traffic encryption and secure license server. Online Order Where to Buy Terms.

See Also  SDCAB 0603 DRIVER

Guardant Stealth II / All Products / Products / Guardant Europe

Using network dongles helps to reduce the cost of protection, as a single Guardant dongle is sufficient for protection of all the software in the network. NET applications so guaradnt the only computer where the dongle is plugged will run the protected application for this dongle. There is one peculiar feature about Slim Silence A-Plus: Functioning of devices on a network is ensured through use of a high-performance fault-tolerant dongle server.

The efficiency of protection is ensured by the use of the GSII64 hardware encryption algorithm. Has a LED light with diagnostic purposes.

Micro dongles

Protection systems built upon use of local dongles gusrdant easily altered to work with network dongles. All the memory has hardware protection against invasion analysis. Guardant Sign USB dongle. Guardant Time Net The flagship of the network dongles line.

Who is Guardant Stealth II for? Dongle in a mini form factor offering basic functionality.

Welcome to the PC Pitstop Driver Library, the internet’s most complete and comprehensive source for driver information. To find the latest driver for your computer we recommend running our Free Driver Scan. Data protection in the network protocol is hardware-based, i.


Hardware platform ARM microcontroller. You need activate support of JavaScript and Cookies in your browser. You can impose a restriction on the usage time of the application or its specific modules. When selling licenses to organizations, a vendor often needs to control the number of licenses in use.

Guardant Stealth II is stealh mainstream dongle with basic functionality. It’s functionally identical to Guardant Stealth II dongle. From adding new functionality and improving performanceto fixing a major bug. Hardware platform bit Cortex-M3 microcontroller.

Its software contents are identical to those of a full-sized dongle. Network dongles allow you to create floating licenses, in which case a user does not have to carry a local dongle to run the protected application: New drivers can unlock additional features for a device that may not have been available before.

Using a full-sized dongle with portable electronic devices, such as laptops or tablets, can be inconvenient for the end user and may result in mechanical failures. You need activate stealgh of JavaScript and Cookies in your browser.