SlideShare a Scribd company logo
1 of 21
Protecting Laptops and Other IT Equipment
STOP Worldwide ,[object Object],[object Object]
Partial Client List ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Who Uses STOP at Corporate and Government Enterprises? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The STOP System Protects: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Where Do Stolen Computers Go? Pawnbrokers On the Street
How STOP Works: Security Plate is Permanently Affixed to Equipment. Plate Features: ,[object Object],[object Object],[object Object]
 
 
If Security Plate is Removed:  ,[object Object],[object Object],Stolen Property 1-800-488-STOP
 
Installation Update Registration Incident Report Created STOP Eliminates Illicit Resale Value RETURNED MISPLACED ,[object Object],[object Object],[object Object],[object Object],STOLEN ,[object Object],[object Object],[object Object],[object Object]
Individual Web Registration
Enterprise Web Registration
STOP Monitor Mobile Scanner
Recoveries Posted on STOP’s Website in Real Time
New from STOP: STOPLock Two Layers of Protection: Cable lock + STOP Security Plate
 
 
Protecting Laptops ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]

More Related Content

Similar to Protect laptops and IT equipment with STOP's security solutions

Hospital management system software in quanta his
Hospital management system software in quanta hisHospital management system software in quanta his
Hospital management system software in quanta hisShree Birla
 
Hospital Management System/Software
Hospital Management System/SoftwareHospital Management System/Software
Hospital Management System/SoftwareCorporate Services
 
Front lobby egan general presentation
Front lobby egan general presentationFront lobby egan general presentation
Front lobby egan general presentationalphathought
 
Rain Concert Mobile Applications
Rain Concert Mobile ApplicationsRain Concert Mobile Applications
Rain Concert Mobile ApplicationsSeema Abhilash
 
Rc mobile profile_ver1 01
Rc mobile profile_ver1 01Rc mobile profile_ver1 01
Rc mobile profile_ver1 01Seema Abhilash
 
Harbor Research and Postscapes Infographic
Harbor Research and Postscapes InfographicHarbor Research and Postscapes Infographic
Harbor Research and Postscapes InfographicHarbor Research
 
OSGi in Consumer Electronics and Connected Homes - M Ossel
OSGi in Consumer Electronics and Connected Homes - M OsselOSGi in Consumer Electronics and Connected Homes - M Ossel
OSGi in Consumer Electronics and Connected Homes - M Osselmfrancis
 
Wind River Medical Devices
Wind River Medical DevicesWind River Medical Devices
Wind River Medical DevicesMarco Thompson
 
Internet of Things Stack
Internet of Things StackInternet of Things Stack
Internet of Things StackPostscapes
 
Ravi Amin B.Eng Work History
Ravi Amin B.Eng Work HistoryRavi Amin B.Eng Work History
Ravi Amin B.Eng Work HistoryFANpay.com
 
Why Cogent
Why CogentWhy Cogent
Why CogentRakson
 
Pace Communication Group
Pace Communication GroupPace Communication Group
Pace Communication GroupTim Dickson
 
Pebs14 what's in your neighbor's garage workshop
Pebs14   what's in your neighbor's garage workshopPebs14   what's in your neighbor's garage workshop
Pebs14 what's in your neighbor's garage workshopBirgit Hess
 
Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Symantec
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 

Similar to Protect laptops and IT equipment with STOP's security solutions (20)

Hospital management system software in quanta his
Hospital management system software in quanta hisHospital management system software in quanta his
Hospital management system software in quanta his
 
Hospital Management System/Software
Hospital Management System/SoftwareHospital Management System/Software
Hospital Management System/Software
 
Front lobby egan general presentation
Front lobby egan general presentationFront lobby egan general presentation
Front lobby egan general presentation
 
Rain Concert Mobile Applications
Rain Concert Mobile ApplicationsRain Concert Mobile Applications
Rain Concert Mobile Applications
 
Emc World Keynote Tucci
Emc World Keynote TucciEmc World Keynote Tucci
Emc World Keynote Tucci
 
Rc mobile profile_ver1 01
Rc mobile profile_ver1 01Rc mobile profile_ver1 01
Rc mobile profile_ver1 01
 
Harbor Research and Postscapes Infographic
Harbor Research and Postscapes InfographicHarbor Research and Postscapes Infographic
Harbor Research and Postscapes Infographic
 
OSGi in Consumer Electronics and Connected Homes - M Ossel
OSGi in Consumer Electronics and Connected Homes - M OsselOSGi in Consumer Electronics and Connected Homes - M Ossel
OSGi in Consumer Electronics and Connected Homes - M Ossel
 
Wind River Medical Devices
Wind River Medical DevicesWind River Medical Devices
Wind River Medical Devices
 
Internet of Things Stack
Internet of Things StackInternet of Things Stack
Internet of Things Stack
 
Ravi Amin B.Eng Work History
Ravi Amin B.Eng Work HistoryRavi Amin B.Eng Work History
Ravi Amin B.Eng Work History
 
ke-1.pptx
ke-1.pptxke-1.pptx
ke-1.pptx
 
Untitleddocument (4)
Untitleddocument (4)Untitleddocument (4)
Untitleddocument (4)
 
Internet Changing Life Of Seniors Multi Format
Internet Changing Life Of Seniors Multi FormatInternet Changing Life Of Seniors Multi Format
Internet Changing Life Of Seniors Multi Format
 
Why Cogent
Why CogentWhy Cogent
Why Cogent
 
Pace Communication Group
Pace Communication GroupPace Communication Group
Pace Communication Group
 
Pebs14 what's in your neighbor's garage workshop
Pebs14   what's in your neighbor's garage workshopPebs14   what's in your neighbor's garage workshop
Pebs14 what's in your neighbor's garage workshop
 
Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Pace IT - Peripheral Devices
Pace IT - Peripheral DevicesPace IT - Peripheral Devices
Pace IT - Peripheral Devices
 

Protect laptops and IT equipment with STOP's security solutions

Editor's Notes

  1. S.T.O.P. has major offices in 11 countries around the world. Our corporate headquarters for US based operations is in Stamford, CT. S.T.O.P.’s network of Resellers and distributors spans the US from coast to coast. You can also buy STOP directly from OEM’s like Toshiba or Dell.
  2. It is because of the effectiveness and the obvious return on investment that S.T.O.P. offers, that many companies have adopted our service. Here is a list of just a few of them. As you can see, most of our clients fall into three categories: 1) Organizations with many portable computers, such as the two largest consulting firms in the world: McKinsey and Andersen Consulting. 2) Universities and school systems which are at high risk of student and outside theft, such as the University of California at Berkeley, Irvine, and Santa Cruz, Harvard, Yale, and the MIT.. 3) Finally, we service government and military organizations such as the Federal Reserve Bank, the U.S. Marines,Department of Defense, or State department. All of which put a major emphasis on inventory tracking. These organizations appreciate the combination of both the loss reduction and the inventory and asset tracking solutions that we offer.
  3. How does it work? The patented process consists of a security plate that is permanently sealed to the case of the equipment. The special high-strength adhesive requires up to 800 pounds of force to remove. The plate bears a unique ID number, a dissuasive warning message, and an 800 number to call for ownership verification and anti-theft information. A bright red police identifiable warning sticker is also affixed next to the plate.
  4. What makes this system truly unique and effective is in the patented process. An indelible Tattoo, underneath the plate, is automatically chemically etched into the case when the plate is affixed. If a thief succeeds - using a special tool - in removing the plate; the STOLEN PROPERTY message, permanently imbedded into the casing, is revealed. Along with your company ID number and the 800 security number, the computer can immediately be identified as stolen. This STOLEN PROPERTY message makes the computer or equipment worthless for thieves since it is virtually impossible to resell. It also allows for rapid recovery of lost or misplaced equipment.
  5. Here is a chart that will summarize how STOP works and how your losses will be reduced by more than 80%. The security plates are affixed to the equipment using our patented process (it takes only 30 seconds). The registration information can either be entered by hand, or using the STOP Asset Tracking Software or even directly on STOP’s Web site. STOP will then maintain and update all information about your equipment. Two things can happen to your machine: 1) If misplaced, it is very likely that a fellow traveler or commuter, the police, a service center, or any individual who finds the machine will call our 800 hot line. We will immediately call you to let you know where your machine is and will take care of returning it. 2) If the machine is stolen, we will immediately identify it as stolen in our database and advise anybody that calls about the equipment that it is “hot”. When the machine is offered for sale, potential buyers, resellers, end-users, and the police may inquire about a suspicious machine. Before buying, they will call S.T.O.P.’s 800 hot line. We will immediately tell them that the machine has been stolen, and thus prevent the resale of the equipment.