Hardware Root of Trust (TPM)
We anchor your licenses directly into the operating system's hardware enclaves (TPM 2.0 & Apple
Secure Enclave). Perfect hardware binding that mathematically prevents cloning, key sharing, or
unauthorized replication.
Encrypted Local State & Anti-Debug
License usage and states are strictly encrypted using dynamic validation contexts. Built-in
anti-debug protections, VM detection prevent reverse-engineering, memory dumping, and
sophisticated host patching.
Zero-Trust Delivery Architecture
Multi-Generation Key hierarchies completely isolate deployments. Your software remains air-tight
with strict lease validations, fallback countermeasures, and hardware-level signature
enforcement.
Flexible Licensing Models
Choose the model that matches your business perfectly, whether it is node-locked, floating seats,
subscription-based, or volume licensing. You can seamlessly switch anytime.
Product & Feature Gates
Control exactly which features, editions, or products each customer can access. Build free,
standard, and enterprise tiers from a single codebase.
Web & CLI Management
Manage licenses through an intuitive web dashboard or a powerful command-line interface. You have
the complete flexibility to issue, inspect, and revoke keys using your preferred workflow.
Cross-Platform
Runs natively on Linux, Windows, and macOS. One integration, three platforms. Your customers are
covered no matter what they run.
Built for Compliance
Compliant by design. Zero-Trust architecture, full audit trails, and OCSP-based authority
validation align your licensing stack seamlessly with ISO/IEC 27001, GDPR, and SOC 2
requirements.
Usage Telemetry
Optional usage analytics show you how your software is being used. Heartbeat monitoring and seat
tracking for subscription and floating models.
Floating License Pools
Create shared license pools for your clients' teams. Users can rent and check out/release
licenses instantly, and you can monitor active sessions second by second.
Modular Locks
Sell your software piecemeal. Remotely enable or disable modules, features, or usage limits
(e.g., maximum CPU cores) according to the package the customer pays for.
Subscription & Counter
Offer either time-limited (SaaS-style) subscriptions or per-use "credit" license models. Hardware
anti-rollback eliminates time and counter manipulation.