{background_position=MIDDLE_CENTER, background_size=cover, src=https://143552897.fs1.hubspotusercontent-eu1.net/hubfs/143552897/default-hero-bg.png, css=background-image: url('https://143552897.fs1.hubspotusercontent-eu1.net/hubfs/143552897/default-hero-bg.png'); background-size: cover; background-position: center center; }
background-image: url('https://143552897.fs1.hubspotusercontent-eu1.net/hubfs/143552897/default-hero-bg.png'); background-size: cover; background-position: center center;
unnamed-2

What and for whom?

The IDA Pro OEM License is tailored for companies looking to create derivative works based on IDA. This license is ideal if you want to, for instance:



  • Embed IDA into your own off-the-shelf software,
  • Use IDA as the engine for your SaaS platform,
  • Build a private server that leverages IDA to provide services to your internal teams.

In contrast, the standard (non-OEM) IDA Pro License only permits the creation of derivative works in the form of plugins or idalib-based applications. While you can distribute these plugins/applications to the IDA community, it must be free of charge. Additionally, the standard license requires you to purchase as many IDA Pro licenses as the number of end users or systems utilizing your plugins/applications, which may restrict your use cases.

To offer more flexibility and scalability, we created the IDA Pro OEM License, giving you greater freedom to integrate IDA into your products and platforms without those limitations.

Customers stories involving IDA Pro OEM

Saas-2

Saas application
relying on IDA

Our customer provides on-line software analysis services, which rely on IDA behind the scenes for disassembly and decompilation. The customer has built a back-end application that orchestrates threads running IDALIB

Malware analysis software embedding IDA

Our customer sells an off-the-shelf malware analysis solution that embeds IDA as a library for enhanced function recognition, disassembly and decompilation.

Embedding-2
Managed services

Managed services provided to a Saas threat intelligence provider

Our customer sends us a flow of suspicious files, which get disassembled and decompiled on the cloud. The results are fed into our customer AI cloud, which then provides human-readable threat intelligence reports.