Software Licensing and Activation

Comprehensive guide to purchasing, activating, and managing your D-Secure File Eraser Network licenses. Learn how to maximize your investment with proper license management across your organization.

Understanding D-Secure Licensing Model

D-Secure File Eraser Network uses a per-computer licensing model, which means each computer you manage and perform erasure operations on requires one license. This model provides flexibility and scalability for organizations of all sizes, from small businesses managing a dozen computers to large enterprises overseeing thousands of endpoints across global networks.

Licenses are typically sold on an annual subscription basis, though perpetual licenses are available for certain enterprise agreements. Your license allows you to install the management console on the administrator's computer and connect to as many network computers as your license count permits. For example, if you purchase a 50-license pool, you can manage erasure operations across up to 50 different computers simultaneously.

Each license is tied to a specific computer during activation. However, licenses are transferable—if a computer is decommissioned or replaced, you can deactivate its license and reassign it to a new computer without purchasing an additional license. This flexibility ensures you're not wasting licenses on machines that are no longer in use, making the licensing model both cost-effective and practical for dynamic IT environments.

What You Get With Your License:

  • Unlimited erasure operations on licensed computers
  • Access to all erasure algorithms and standards (DoD, NIST, Gutmann, etc.)
  • Comprehensive audit reports and compliance documentation
  • D-Secure Cloud integration for centralized management
  • Free software updates and security patches during subscription period
  • Technical support via email, chat, and phone

How to Purchase Licenses

Purchasing D-Secure File Eraser Network licenses is a straightforward process designed to get you up and running quickly. You can purchase directly through the application or visit our online store. The entire process takes just a few minutes, and you'll receive your activation credentials immediately after payment confirmation.

1

Access the Online Store

Open D-Secure File Eraser Network and click the Buy Now ribbon tab at the top of the interface. Then click the Buy Online button, which will launch your default web browser and navigate to our secure online store.

Alternatively, you can visit https://www.dsecuretech.com/store directly if you prefer to purchase before installing the software. You'll be able to download the installer after purchase.

2

Select License Quantity and Type

Choose how many licenses you need based on the number of computers you plan to manage. Consider your current needs plus anticipated growth over the next year. License packs are available in common sizes:

Small Business

5, 10, 25 licenses

Medium Enterprise

50, 100, 250 licenses

Large Enterprise

500, 1000+ licenses

Volume discounts apply automatically at checkout for larger orders. For custom enterprise arrangements with 1000+ licenses, contact our sales team for a personalized quote and dedicated support options.

3

Complete Checkout Securely

Enter your billing information and payment details. Our checkout process is secured with 256-bit SSL encryption and PCI-DSS compliant payment processing. We accept:

  • Major credit cards (Visa, MasterCard, American Express, Discover)
  • Debit cards with credit card processing
  • PayPal for international transactions
  • Purchase orders for qualified corporate accounts
  • Bank transfers for large enterprise orders

You'll receive an order confirmation immediately after payment. Save this confirmation—it includes your order reference number, which may be needed for support inquiries.

4

Receive Your Activation Key

Within minutes of payment confirmation, you'll receive an automated email at the address you provided during checkout. This critical email contains:

  • 📧

    Your Activation Key

    A unique alphanumeric code (format: XXXX-XXXX-XXXX-XXXX) used to activate your licenses

  • 📄

    Order Receipt and Invoice

    Detailed breakdown of your purchase for accounting and tax purposes

  • ⬇️

    Download Links

    Direct links to download the latest version of the software installer

  • 📖

    Activation Instructions

    Step-by-step guide to activate your software (both online and offline methods)

⚠️ Critical: Protect Your Activation Key

Treat your Activation Key like a password. Store it securely (use a password manager or encrypted document). You'll need it for activation and license management. If you lose it, contact support immediately—recovery requires identity verification and may delay your deployment.

Software Activation Methods

D-Secure File Eraser Network supports two activation methods to accommodate different network environments and security policies. Choose the method that best fits your infrastructure: online activation for internet-connected servers (quickest and easiest), or offline activation for air-gapped or highly secured environments where direct internet access is restricted.

Online Activation (Recommended)

Instant activation in seconds—requires internet connection

Online activation is the quickest and most convenient method. The entire process completes in seconds as the application communicates directly with our secure activation servers to validate your key and create your license pool. This method is ideal for most environments where the server running D-Secure has internet access, even if it's through a corporate proxy or firewall.

Step-by-Step Online Activation:

1

Open Activation Dialog: Launch D-Secure File Eraser Network and click the Activation ribbon tab, then click Add Licenses

A dialog window will appear with fields for your activation key and activation method options.

2

Enter Activation Key: Type or paste your Activation Key exactly as it appears in your email, including dashes

The key format is typically XXXX-XXXX-XXXX-XXXX. Copy-pasting from the email reduces typing errors.

3

Select Online Method: Ensure "Online Activation" is selected (this is usually the default option)

If you're behind a corporate proxy, click "Proxy Settings" to configure your network details first.

4

Click Activate: Press the Activate button and wait for confirmation

The process typically completes in 3-10 seconds. You'll see a progress indicator while communicating with activation servers.

Confirmation: A success message appears, and your license pool is immediately available in Manage Licenses

You can now start connecting to domain computers and performing erasure operations without any restrictions.

💡 Troubleshooting Online Activation

  • If activation takes longer than 30 seconds, check your internet connection
  • Verify firewall settings allow outbound HTTPS connections to *.dsecuretech.com
  • If behind a corporate proxy, ensure proxy settings are configured correctly
  • Invalid key errors: double-check for typos—keys are case-sensitive

Offline Activation

For air-gapped or restricted networks—activation via support

Offline activation is designed for environments where the server cannot access the internet due to security policies, air-gapped networks, or other restrictions. This manual process involves generating a Registration ID on your server, sending it to our support team, and receiving a License Key file that completes activation. While it takes longer than online activation (typically within one business day), it provides the same full functionality once completed.

Step-by-Step Offline Activation:

1

Generate Registration ID

Navigate to Activation → Add Licenses. Enter your Activation Key in the field provided, then select "Offline Activation" as the activation method.

Click the "Generate Registration ID" button. The application will create a unique Registration ID based on your system's hardware fingerprint and the Activation Key. This ID is specific to the computer where you're installing D-Secure.

Save this Registration ID by copying it to clipboard or saving to a text file. You'll need to transfer this to a computer with internet access to email to support.

2

Contact Technical Support

From a computer with internet access, send an email to techsupport@dsecuretech.com with the following information:

Email Template:

Subject: Offline Activation Request

Registration ID: [paste your Registration ID]

Activation Key: [your Activation Key]

Company Name: [your company]

Contact Person: [your name]

Phone: [optional]

Include all information to expedite processing. Missing details will delay activation while support requests clarification.

3

Receive License Key File

Our support team will process your request and email you a License Key file (usually with a .lic or .key extension). This typically arrives within 4-8 business hours during weekdays, though urgent requests can often be processed faster if you mention the urgency in your email.

Save the License Key file to a USB drive or network share accessible from your D-Secure server. Do not modify or open the file—it's encrypted and must remain intact.

4

Complete Activation

Transfer the License Key file to your D-Secure server. In the application, go back to Activation → Add Licenses → Offline Activation.

Click "Browse" or "Select License Key File", navigate to where you saved the file, select it, and click "Activate". The application will validate the file and complete activation immediately.

If successful, you'll see a confirmation message and your license pool will appear in Manage Licenses, ready to use for erasure operations.

⏱️ Planning for Offline Activation

Since offline activation requires email communication with support, plan accordingly. If you're deploying on a tight deadline, request the License Key file immediately after purchase rather than waiting until installation day. Our support team operates Monday-Friday, 9 AM-6 PM EST.

Managing Your License Pools

Once activated, your licenses are organized into "pools"—logical groups of licenses purchased together. Effective license management helps you maximize your investment by monitoring usage, redistributing licenses from decommissioned computers, and planning for renewals before expiration. The Manage Licenses interface provides comprehensive visibility into all your license pools and their status.

Understanding License Pool Information

When you view your license pools in Activation → Manage Licenses, each pool displays comprehensive information to help you track and manage your licenses effectively:

Pool Name & Key (Partial)

Displays first/last 4 characters of your Activation Key for security (e.g., AB12-****-****-CD34)

Activation Date

When the pool was first activated, important for tracking subscription start

Expiry Date

When the subscription expires (for annual licenses). Pools expiring soon are highlighted in red/orange

Total Licenses

Total number of licenses in this pool (e.g., 50 if you purchased a 50-license pack)

Licenses In Use

Number currently assigned to specific computers (actively deployed)

Available Licenses

Remaining unassigned licenses ready to deploy to new computers

Viewing Licensed Computers

Track exactly which computers are using licenses from each pool. This visibility helps you identify unused licenses on decommissioned machines so you can reassign them, and ensures compliance by documenting which endpoints have erasure capabilities.

How to View Computers:

Navigate to Activation → Manage Licenses from the ribbon

Select the license pool you want to examine and click View Computers

Review the list which includes: computer names, activation dates, and online/offline status

To free up a license: select a computer from the list and click Deactivate License

💾 Export for Record Keeping

Click the Save or Export to CSV button to download the computer list for documentation, audit trails, or import into asset management systems. The CSV includes all computer details, activation dates, and current status.

Extending License Validity (Renewals)

Annual subscriptions must be renewed before expiration to maintain access. The Manage Licenses screen highlights pools expiring within 30 days in orange/red to give you advance warning. Renewal is simple—purchase an extension using the same process as initial purchase, then activate the new key.

Renewal Scenarios Explained:

Scenario 1: Purchasing Additional Licenses

If you purchase more licenses than currently in your pool (e.g., you have 50, buy 75), the system creates a new pool or merges them.

Result: Total licenses = 50 + 75 = 125. Expiry date extends based on the new purchase date.

Scenario 2: Purchasing Equal Licenses (Pure Renewal)

If you purchase the same number as your current pool (e.g., you have 50, buy 50), this is treated as a renewal.

Result: License count remains 50. Expiry date extends by one full subscription period (typically 12 months from current expiry).

Scenario 3: Purchasing Fewer Licenses (Downgrade)

If you purchase fewer licenses than currently in your pool (e.g., you have 50, buy 25), contact support for guidance.

Result: Support will help transition to the smaller pool size while maintaining service continuity and providing pro-rated options.

Expiration Warning System

  • 60+ days: Pool displays normally (green)
  • 31-60 days: Pool highlighted in yellow with renewal reminder
  • 15-30 days: Pool highlighted in orange with urgent renewal warning
  • <15 days: Pool highlighted in red—renew immediately to avoid service interruption
  • After expiration: Software continues working in read-only mode (view reports only, no new erasures)

Best Practice: Set calendar reminders 45 days before expiration to allow time for purchase approval and processing.

License Management Best Practices

Follow these proven strategies from experienced IT administrators to optimize your license utilization and avoid common pitfalls:

Set expiry reminders: Add calendar alerts 45 days before license expiration to allow ample time for purchase approvals and renewals

Audit quarterly: Review licensed computers every 3 months, deactivating licenses from retired systems to reclaim for new deployments

Secure activation records: Store Activation Keys in your organization's password manager or encrypted vault with backup copies

Plan for growth: Purchase 10-15% extra licenses beyond current needs to accommodate new hires and system expansions without delays

Document usage: Export computer lists monthly for compliance documentation showing which endpoints have erasure capabilities

Consider volume discounts: Consolidate purchases into bulk orders rather than small incremental buys to maximize cost savings