Advertisment

SafeNet intros HASP SRM solution for SaaS

author-image
CIOL Bureau
Updated On
New Update

NEW DELHI, INDIA: SafeNet has introduced a HASP SRM solution for software-as-a-service (SaaS).

Advertisment

HASP SRM SaaS Pass helps SaaS providers maximize their revenue by preventing users from sharing their login information with others.

Because SaaS Pass only allows users from authorized computers to access your on-demand applications, customers protect their subscription revenues and control access to sensitive end-user software.

HASP SRM SaaS Pass assures revenues by ensuring that login information and access to sensitive data is not shared, either inside or outside the end-user’s organization. In addition, it enhances security of the providers’ existing SaaS authentication system and enables SaaS providers to enforce subscription terms as well.

Advertisment

The solution provides better compliance with contract agreements and also enables more control over use of service. Apart from ensuring only authorized users’ access to the SaaS services, it also guarantees controlled access to sensitive end-user data.

“We strive to provide the most comprehensive solutions available to meet the needs of our customers, enabling them to advance their business and grow revenues. Our solution helps in maximizing the SaaS providers’ revenue and facilitates an improved time-to-market for those ISVs are considering taking their products to SaaS model. This is a great value add from our side,” informed Rana Gupta, business head—India & SAARC, SafeNet.

The HASP SRM SaaS Pass contains two components—the SaaS Pass Login Application and the SaaS Pass Web Service Module. The login application, which service providers distribute to their customers, is fully customizable.

Advertisment

All operations, including distribution and pre-activation of the login application, can be handled over the Internet to minimize logistics costs. The HASP SRM SaaS Pass Web Service Module integrates with the SaaS provider's existing Web application.

The solution is based on a small client application installed on the end-user’s machine or machines that communicates over the Internet with a server-side application in the ISV’s data center.

This client application is responsible for passing encrypted login information to the provider’s server, which can then authenticate the user and that service access is being attempted from an authorized machine.