10Duke have been called "the thought leaders of the software licensing industry" by our customers. On this blog you'll find useful guides as well as our thoughts on software licensing, identity management and other related topics.
15th September 2020
Digital Rights Management (DRM) and Software Licensing both deal with protecting copyrighted materials. Learn the difference and more.
27th August 2020
The subscription license model is the main license model supported by most payment providers. But not all products can be forced into a subscription license model.
18th August 2020
All software licensing providers say they’re good. But are they, really? Find out as we examine the pain licensing providers may be causing to your company.
30th June 2020
Delivering an effective Identity and Access Management strategy has become a strategic imperative for all businesses operating online.
5th June 2020
Identity-based licensing is a method by 10Duke of controlling access to a digital product based on the authenticated identity of an individual.
19th May 2020
We get a lot of questions from partners regarding ‘federated identity’ or ‘identity federation’, so we thought we’d do a short summary to explain what it […]
6th May 2020
Comparison between 10Duke Enterprise vs. Flexera’s Flexnet.
23rd December 2019
Multi Factor Authentication (MFA) involves two or more methods of authentication in order for an individual user to be given access to a system.
10th December 2019
In the world of software licensing, the license dongle was once the solution of choice for software developers, but no longer. Today’s ISVs require flexible licensing […]
28th November 2019
Brute Force Attack involves multiple attempts to guess a password. But how do you protect against them? Learn all about it on this blog.
29th October 2019
SCA first came into being in September 2019* as a response to the European Second Payment Services Directive (PSD2). These plans detail a list of requirements […]
18th October 2019
Ideally, most sites you use should enforce the creation of a strong password on their system. Ideally this should involve the following steps.