Cracks in the System
Cybersecurity threats don’t always kick the door down—sometimes, they slip in through the cracks. This month, we’re spotlighting three subtle but serious security risks that could be undermining your defences right now.
![]()
I recently attended Autodesk OTX which is a wonderful event that highlights all the new features of the annual Autodesk release cycle. I attended a session about licensing, and I was amazed at some of the topics discussed.
I will try and share some of these with you, hopefully it will keep the Software Police away from your door.
Beginning with the actual agreement, which can be found here, if you have a few hours spare to read it. It has a word count of 13861.
If you have taken advantage of the Maintenance to subscription (M2S) switch, there are some rights you have that you may not have known about, called flexible licensing rights:
As you can see from the above, you have Global Travel Rights, but there is also something called a Territory. This is what the license agreement says about Territories
I think the highlighted section could be significant for all Symetri customers as many of you work in many different countries.
Basic Compliancy Rules
If you follow these, you should not have any problems
Here is the official wording about using the Autodesk software as a trial.
What does this actually mean? If you have installed a trial version of Inventor on one machine in your company, legally you should not install another trial of the same product anywhere within your organisation.
I suspect that many of you have now used the Autodesk Account page, which is at www.manage.autodesk.com here is basically your one stop shop for everything Autodesk (depending on your access rights)
You can;
What else do you need to know?
If you require any further information regarding Autodesk License Compliance then please get in touch.
Cybersecurity threats don’t always kick the door down—sometimes, they slip in through the cracks. This month, we’re spotlighting three subtle but serious security risks that could be undermining your defences right now.
As 2025 comes to a close, we’re looking back at some of the most impactful cyber threats of the year and more importantly, what they reveal about the challenges ahead. From ransomware tactics to AI-driven phishing and risky app integrations, this round-up highlights where businesses have been most vulnerable and how you can strengthen your defences in 2026.
Learn what Product Lifecycle Management (PLM) is and how it helps teams manage product data, processes, and collaboration across the lifecycle. Discover the key benefits and PLM tools driving innovation.