SlideShare a Scribd company logo
1 of 15
What is
BackStopp is a simple but effective tool
to help an organisation protect its
mobile data in the event of the loss or
theft of an employee’s laptop, PDA or
mobile phone.
The Problem
 Laptops are becoming smaller,
more powerful and cheaper
 Improvements in mobile
connectivity allow laptop users
to send and receive more
information whilst on the move
 1 laptop and its data is lost or
stolen every 50 seconds
Traditional Security Tools
***********************
Password,
L$K1292_2D
 Traditional security tools require users to remember long
and cryptic passwords.
 Other data security tools rely on external plug in
hardware which is often stored and lost with the device.
 Invisible to the user
 No user passwords
 No hardware requirement
 No restrictions, BackStopp
protects all data regardless of
its location on the device
 No expensive infrastructure to
install or maintain
Internal or
Managed
support service
Hosted
BackStopp servers
Mobile
employee
Employees can activate BackStopp against their lost or stolen laptop
by either notifying their organisation’s support department OR
by logging in directly to the BackStopp console.
Multiple communication channels
 BackStopp uses the most effective communication method
available to locate a lost laptop. BackStopp’s utilisation of the
GSM network means a device can be found almost anywhere
on earth and if necessary decommissioned even if the device
isn’t connected to the internet.
US DoD Data Deletion
 Upon receiving a secure decommission message all data
files on the lost or stolen device will be destroyed using
US Department of Defence standards.
 BackStopp also deletes critical system files which render
the device useless to the thief.
Audit Trail
 BackStopp remotely initiates
pin hole cameras on the
stolen device to provide a
photo of the first person to
use the device.
 GSM cell triangulation can
also provide an approximate
grid reference or point on an
electronic map.
… it doesn’t stop there …
BackStopp Wi-Fi / RFID integration
 As soon as a device breaches a predefined parameter,
e.g. it leaves an authorised area during working hours,
BackStopp automatically issues the decommission
command and starts tracking the device OR …
 .. BackStopp informs the legitimate user or security
personnel of a potential security issue by SMS or email.
Volume Encryption
 BackStopp's integrated volume encryption means that
any thief who attempts to deactivate BackStopp or
remove the device’s hard disk will find nothing more than
highly encrypted data.
Business Continuity
 BackStopp integrates with leading providers of online
data backup services so all your data can easily and
quickly be restored on to a new or replacement device.
User Control
 BackStopp allows the user to specify a date range when the
device should not be used, for example during a holiday.
 If the device is used Backstopp detects it and either
automatically deletes the data or sends an SMS or e-mail
alert to the legitimate user or the organisation's HR
department.
 BackStopp uses the quickest and most cost effective transport
mechanisms to detect and decommission a laptop before the data
can be compromised.
 Uses GSM network for maximum speed as well as internet and
WiFi connections.
 Culprit identification for law enforcement agencies.
 Produces a comprehensive audit trail which is part of an effective
Information Assurance policy.
 Low cost Risk Management for your mobile data.
Summary

More Related Content

What's hot

Better VoIP Network Troubleshooting
Better VoIP Network Troubleshooting Better VoIP Network Troubleshooting
Better VoIP Network Troubleshooting Tracy King
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPJavier Arrospide
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security TipsPECB
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitalsMohammed Alabdali
 
Bank locker system
Bank locker systemBank locker system
Bank locker systemRahul Wagh
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
Quickbook adv2 new
Quickbook  adv2 new Quickbook  adv2 new
Quickbook adv2 new Step 991
 

What's hot (19)

Leading Indian IT Services Company uses OpManager
Leading Indian IT Services Company uses OpManagerLeading Indian IT Services Company uses OpManager
Leading Indian IT Services Company uses OpManager
 
The Computer System
The Computer SystemThe Computer System
The Computer System
 
Networking Trends
Networking TrendsNetworking Trends
Networking Trends
 
Better VoIP Network Troubleshooting
Better VoIP Network Troubleshooting Better VoIP Network Troubleshooting
Better VoIP Network Troubleshooting
 
Bank security
Bank securityBank security
Bank security
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
 
System security
System securitySystem security
System security
 
Ch 16 system security
Ch 16 system securityCh 16 system security
Ch 16 system security
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Security
SecuritySecurity
Security
 
Kith Infotech
Kith InfotechKith Infotech
Kith Infotech
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Quickbook adv2 new
Quickbook  adv2 new Quickbook  adv2 new
Quickbook adv2 new
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 

Viewers also liked

Clients Look Ahead at Agencies (RSW/US 2011 Survey)
Clients Look Ahead at Agencies (RSW/US 2011 Survey)Clients Look Ahead at Agencies (RSW/US 2011 Survey)
Clients Look Ahead at Agencies (RSW/US 2011 Survey)Kirill Smirnov
 
Male organ economic growth: does size matter?
Male organ economic growth: does size matter?Male organ economic growth: does size matter?
Male organ economic growth: does size matter?Kirill Smirnov
 
Backstopp Mobile Slides
Backstopp Mobile SlidesBackstopp Mobile Slides
Backstopp Mobile SlidesRegan McCarthy
 
Yandex on Сontext Advertising (autumn 2010)
Yandex on Сontext Advertising (autumn 2010)Yandex on Сontext Advertising (autumn 2010)
Yandex on Сontext Advertising (autumn 2010)Kirill Smirnov
 
Integration by tim lindsay
Integration by tim lindsayIntegration by tim lindsay
Integration by tim lindsayKirill Smirnov
 
Global Facebook Advertising Report Q2 2011 by TBG Digital
Global Facebook Advertising Report Q2 2011 by TBG DigitalGlobal Facebook Advertising Report Q2 2011 by TBG Digital
Global Facebook Advertising Report Q2 2011 by TBG DigitalKirill Smirnov
 

Viewers also liked (8)

Clients Look Ahead at Agencies (RSW/US 2011 Survey)
Clients Look Ahead at Agencies (RSW/US 2011 Survey)Clients Look Ahead at Agencies (RSW/US 2011 Survey)
Clients Look Ahead at Agencies (RSW/US 2011 Survey)
 
Male organ economic growth: does size matter?
Male organ economic growth: does size matter?Male organ economic growth: does size matter?
Male organ economic growth: does size matter?
 
Backstopp Mobile Slides
Backstopp Mobile SlidesBackstopp Mobile Slides
Backstopp Mobile Slides
 
Yandex on Сontext Advertising (autumn 2010)
Yandex on Сontext Advertising (autumn 2010)Yandex on Сontext Advertising (autumn 2010)
Yandex on Сontext Advertising (autumn 2010)
 
All About Tedv3
All About Tedv3All About Tedv3
All About Tedv3
 
Integration by tim lindsay
Integration by tim lindsayIntegration by tim lindsay
Integration by tim lindsay
 
Global Facebook Advertising Report Q2 2011 by TBG Digital
Global Facebook Advertising Report Q2 2011 by TBG DigitalGlobal Facebook Advertising Report Q2 2011 by TBG Digital
Global Facebook Advertising Report Q2 2011 by TBG Digital
 
Pruebazenbakiak Ikasten
Pruebazenbakiak IkastenPruebazenbakiak Ikasten
Pruebazenbakiak Ikasten
 

Similar to Backstopp Slideshow 2003

IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET Journal
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint securityhassan latifi
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPNetwork_security
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Securityguest95226d
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Linkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARDLinkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARDLinkwise Technology
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Securitynexxtep
 
Room alert introduction
Room alert introductionRoom alert introduction
Room alert introductionTod Richardson
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-bBbAOC
 
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...RAJASHREE B
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesKristin Helgeson
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 

Similar to Backstopp Slideshow 2003 (20)

IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Linkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARDLinkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARD
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
System
SystemSystem
System
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
Room alert introduction
Room alert introductionRoom alert introduction
Room alert introduction
 
Laptop
LaptopLaptop
Laptop
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-b
 
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
IP-guard Catalog
IP-guard CatalogIP-guard Catalog
IP-guard Catalog
 
pda forensics
pda forensicspda forensics
pda forensics
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Backstopp Slideshow 2003

  • 1.
  • 2. What is BackStopp is a simple but effective tool to help an organisation protect its mobile data in the event of the loss or theft of an employee’s laptop, PDA or mobile phone.
  • 3. The Problem  Laptops are becoming smaller, more powerful and cheaper  Improvements in mobile connectivity allow laptop users to send and receive more information whilst on the move  1 laptop and its data is lost or stolen every 50 seconds
  • 4. Traditional Security Tools *********************** Password, L$K1292_2D  Traditional security tools require users to remember long and cryptic passwords.  Other data security tools rely on external plug in hardware which is often stored and lost with the device.
  • 5.  Invisible to the user  No user passwords  No hardware requirement  No restrictions, BackStopp protects all data regardless of its location on the device  No expensive infrastructure to install or maintain
  • 6. Internal or Managed support service Hosted BackStopp servers Mobile employee Employees can activate BackStopp against their lost or stolen laptop by either notifying their organisation’s support department OR by logging in directly to the BackStopp console.
  • 7. Multiple communication channels  BackStopp uses the most effective communication method available to locate a lost laptop. BackStopp’s utilisation of the GSM network means a device can be found almost anywhere on earth and if necessary decommissioned even if the device isn’t connected to the internet.
  • 8. US DoD Data Deletion  Upon receiving a secure decommission message all data files on the lost or stolen device will be destroyed using US Department of Defence standards.  BackStopp also deletes critical system files which render the device useless to the thief.
  • 9. Audit Trail  BackStopp remotely initiates pin hole cameras on the stolen device to provide a photo of the first person to use the device.  GSM cell triangulation can also provide an approximate grid reference or point on an electronic map.
  • 10. … it doesn’t stop there …
  • 11. BackStopp Wi-Fi / RFID integration  As soon as a device breaches a predefined parameter, e.g. it leaves an authorised area during working hours, BackStopp automatically issues the decommission command and starts tracking the device OR …  .. BackStopp informs the legitimate user or security personnel of a potential security issue by SMS or email.
  • 12. Volume Encryption  BackStopp's integrated volume encryption means that any thief who attempts to deactivate BackStopp or remove the device’s hard disk will find nothing more than highly encrypted data.
  • 13. Business Continuity  BackStopp integrates with leading providers of online data backup services so all your data can easily and quickly be restored on to a new or replacement device.
  • 14. User Control  BackStopp allows the user to specify a date range when the device should not be used, for example during a holiday.  If the device is used Backstopp detects it and either automatically deletes the data or sends an SMS or e-mail alert to the legitimate user or the organisation's HR department.
  • 15.  BackStopp uses the quickest and most cost effective transport mechanisms to detect and decommission a laptop before the data can be compromised.  Uses GSM network for maximum speed as well as internet and WiFi connections.  Culprit identification for law enforcement agencies.  Produces a comprehensive audit trail which is part of an effective Information Assurance policy.  Low cost Risk Management for your mobile data. Summary