SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
Click to edit Master subtitle style
Agenda
• Absolute Software Overview
• Consumer Absolute LoJack
–
–
–
–
–

Device Theft – A Worldwide Epidemic
Competitive Differentiation
Absolute LoJack Product Portfolio
Go to Market: OEM, Retail, Direct
Value Proposition

• Absolute LoJack Mobility
– Samsung Partnership
– Merchandising
– Go To Market

• Back Up
Absolute Software Overview
Absolute Software – Overview
Technology and services that protect your digital world.

Offices:

Distinguishing Facts:

• Corporate: Vancouver, BC
and Austin, TX USA

• Built into device firmware/BIOS since 2005

• EMEA: Reading, UK
• Regional: Kuala Lampur, Tokyo,
Taipei, Singapore
• In-Country Partners: Australia,
Columbia, Brazil, South Africa and Mexico

• 15 Patents worldwide; 49 pending
• SaaS delivery with over 6 million
subscriptions worldwide
• 30,000+ Devices Recovered
• Proven recoveries in over 106 Countries
• Over 36 million in recovered collateral
Absolute Software – Overview
Specializing in tracking, management and security solutions for
smartphones, tablets & PCs

• Vancouver, B.C. headquartered
• Founded in 1993; publicly traded since 2000
• Global leader in firmware-based security solutions
• Strategic partnerships with leading device OEMs
• Samsung SEAP Partner
Absolute Software – Overview
OEM Partner Success

•

BIOS persistent

•

BIOS persistent

•

BIOS persistent

•

Embedded on
ElitePad 900
Windows tablets

•

Global Anti-theft
ISV for all
Ultrabooks

•

Embedded on
Thinkpad
Android tablets

•

Included in every
HP CarePack

• 2012 Diamond
Supplier Award

• Only security solution
available directly
through Apple

•

BIOS persistent

•

Embedded on
Galaxy flagship
smartphones &
tablets

•

SAFE MDM
support

•

Samsung
Enterprise
Alliance Partner

•

Samsung KNOX
MDM Partner
Absolute Software Overview
Cross-platform & device support, persistence & emergency response services

Endpoint Security for Consumers
Remotely track, manage, secure & recover devices.

Endpoint Security for IT
Centrally track and secure IT assets within a cloud-based
console.

Endpoint Management
Complete end-to-end lifecycle management for iOS,
Android, Windows Phone, PC & Mac devices.
Absolute Software – Overview
Routes to Market
Absolute Firmware Persistent Technology

Device OEMs

Absolute.com

Retailers

Consumer

Telco

OEMs

Corporate

Resellers
Absolute Software – Overview
Over 30 Trusted Partners around the world
Consumer: Absolute LoJack
Absolute LoJack
Device Theft. A World Wide Epidemic.
Top Officials Publicly Pressure manufacturers to solve the problem.

Laptop Theft Stats

2

Mobile Device Theft Stats

3

1
4

5

6

4

Sources:
1. Absolute Software - 2012 End Point Management Report; 2. Ponemon Institute 2008 - Airport Insecurity: the case of lost laptops; 3. FBI Statistics; 4. Huffington Post: March 2013 “Apple Picking: How the iPhone
Became An Object Worth Killing For”; 4. Federal Communications Commissions 5. Jack Wraith, chairman of the Mobile Industry Crime Action Forum,
Absolute LoJack Competitive Differentiation:
Absolute Investigation and Recovery Services Team.
Upping the Ante in Device Theft Recovery.
Absolute LoJack Competitive Differentiation
Persistence the only solution designed to survive a factory reset
Absolute LoJack Product Portfolio
Absolute LoJack
The only solution than can safely recover a stolen device, while providing
features to protect the data on the device.
Product Features

Operating Systems
Windows
8*, 8.1, 7
or Vista

For Mac
OS X 10.7+

Android
2.3+

Android
2.3+
Absolute LoJack Global Availability
ONLINE MERCHANDISING:

Absolute LoJack Marketing
RETAIL PACKAGING:

SELL SHEETS &
BATTLECARDS

INFOGRAPHICS

SALES BROCHURE:
Absolute LoJack News and Awards

RATINGS
& REVIEWS
"Through diligent
work performed
by Absolute
Software and
the LAPD they
recovered my
laptop and its now
in my
possession.“
- R. Vidales,
Los Angles CA
Absolute LoJack
Different Go To Market Programs to meet Your business objectives

Immediate
Revenue

Recurring
revenue stream

Grow Services
Portfolio

• Sell Stand alone at POS
or APOS
• Margin rich product
• Differentiate from
competition
• Added value to
consumer
• ESD – no inventory
costs

• Sell or Bundle Absolute
LoJack with existing
services
• SaaS model
• High lifetime value
• Exponentially grows as
more subscriptions get
into the pipeline

• Stronger security value
prop across portfolio
“most secure device on
the planet”
• Increase attach rates to
an existing item
• Value add to upsell

Industry Leading theft recovery solution with strong brand identification
Bundle Absolute LoJack to Add Revenue and Margin

Immediate
Revenue
• Sell Stand alone at
POS or APOS
• Margin rich product
• Differentiate from
competition
• Added value to
consumer
• No cost inventory
with ESD

Retail Gift Card with “protected” device label

MacMall.com Configurator – POS add on
Build a recurring revenue stream as a bundle or stand alone
The larger the install base, the larger the revenue stream

Recurring
revenue stream
• Sell or Bundle Absolute
LoJack with existing
services
• SaaS model
• High lifetime value
• Exponentially grows as
more subscriptions get
into the pipeline
Include in Services Portfolio to build attach or upsell

Grow Services
Portfolio
• Stronger security value
prop across portfolio
“most secure device
on the planet”
• Increase attach rates
to an existing item
• Value add to upsell
Absolute LoJack Mobility

23
Samsung Strategic Alliance
Expanding Partnership
Samsung PCs
•

Computrace BIOS persistent on Series 2-9 Windows Notebooks

Samsung Mobile Devices
•

Computrace Firmware Persistence on 100M+ flagship Galaxy
smartphones & tablets

Samsung Enterprise Alliance Program (SEAP)
•

SEAP Gold Partner

Samsung Approved For Enterprise (SAFE)
•

Enhanced SAFE API support with Absolute Manage MDM

Samsung KNOX MDM Support
•

Samsung KNOX MDM integration – Q1 2014
Absolute LoJack Marketing
Make your device the most secure on the planet
Mobility Marketing
Premium Security
Add Absolute LoJack to be the most secure device on the planet
Co-Brand or White Label an Absolute LoJack Product

Front

Back
Absolute LoJack Theft Recovery and Security Products
The ideal compliment to insurance for total product protection
Additional slides
Absolute LoJack. Many devices. One solution.

Windows
8*, 8.1, 7
or Vista

For Mac
OS X 10.7+

Android
2.3+

Android
2.3+
Absolute Software
Highest recovery rate in the industry

Agent is installed

Absolute Theft Recovery
Team forensically mines
stolen device

Device is stolen

Thief and location are
identified

Owner contacts
local police and
Absolute

Stolen device is recovered

Weitere ähnliche Inhalte

Was ist angesagt?

Introducing the WSO2 Enterprise Mobility Manager
Introducing the WSO2 Enterprise Mobility ManagerIntroducing the WSO2 Enterprise Mobility Manager
Introducing the WSO2 Enterprise Mobility ManagerWSO2
 
Spontania Online Video Conferencing
Spontania Online Video ConferencingSpontania Online Video Conferencing
Spontania Online Video ConferencingPaul Richards
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0Dilshan Edirisuriya
 
Device management by WSO2 Enterprise Mobility Manager
Device management by WSO2 Enterprise Mobility ManagerDevice management by WSO2 Enterprise Mobility Manager
Device management by WSO2 Enterprise Mobility ManagerWSO2
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldSamsung Business USA
 
Introduction to Enterprise Mobility Manager
Introduction to Enterprise Mobility Manager Introduction to Enterprise Mobility Manager
Introduction to Enterprise Mobility Manager WSO2
 
Guerrilla QA: The Mobile of the Internet of All the Things!
Guerrilla QA: The Mobile of the Internet of All the Things!Guerrilla QA: The Mobile of the Internet of All the Things!
Guerrilla QA: The Mobile of the Internet of All the Things!Josiah Renaudin
 
Verivo and Forrester Mobile Strategies
Verivo and Forrester Mobile StrategiesVerivo and Forrester Mobile Strategies
Verivo and Forrester Mobile StrategiesVerivoSoftware
 
The Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business EnablerThe Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business EnablerSamsung Business USA
 
Mobile interoperability and business productivity
Mobile interoperability and business productivityMobile interoperability and business productivity
Mobile interoperability and business productivityAllSeen Alliance
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices WSO2
 
Mi5 Business Intro 103
Mi5 Business Intro 103Mi5 Business Intro 103
Mi5 Business Intro 103scottwattie
 
Industry Organizations’ global perspective on 5G
Industry Organizations’ global perspective on 5GIndustry Organizations’ global perspective on 5G
Industry Organizations’ global perspective on 5GOpen Mobile Alliance
 
Design Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesDesign Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesInductive Automation
 
Programming the Internet of Things: Why Devices Need APIs
Programming the Internet of Things: Why Devices Need APIsProgramming the Internet of Things: Why Devices Need APIs
Programming the Internet of Things: Why Devices Need APIsAllSeen Alliance
 

Was ist angesagt? (19)

Introducing the WSO2 Enterprise Mobility Manager
Introducing the WSO2 Enterprise Mobility ManagerIntroducing the WSO2 Enterprise Mobility Manager
Introducing the WSO2 Enterprise Mobility Manager
 
Spontania Online Video Conferencing
Spontania Online Video ConferencingSpontania Online Video Conferencing
Spontania Online Video Conferencing
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
 
Device management by WSO2 Enterprise Mobility Manager
Device management by WSO2 Enterprise Mobility ManagerDevice management by WSO2 Enterprise Mobility Manager
Device management by WSO2 Enterprise Mobility Manager
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile world
 
Camdog pitch deck
Camdog pitch deckCamdog pitch deck
Camdog pitch deck
 
Mobility Meets Manufacturing
Mobility Meets ManufacturingMobility Meets Manufacturing
Mobility Meets Manufacturing
 
Introduction to Enterprise Mobility Manager
Introduction to Enterprise Mobility Manager Introduction to Enterprise Mobility Manager
Introduction to Enterprise Mobility Manager
 
Guerrilla QA: The Mobile of the Internet of All the Things!
Guerrilla QA: The Mobile of the Internet of All the Things!Guerrilla QA: The Mobile of the Internet of All the Things!
Guerrilla QA: The Mobile of the Internet of All the Things!
 
Verivo and Forrester Mobile Strategies
Verivo and Forrester Mobile StrategiesVerivo and Forrester Mobile Strategies
Verivo and Forrester Mobile Strategies
 
The Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business EnablerThe Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business Enabler
 
Mobile interoperability and business productivity
Mobile interoperability and business productivityMobile interoperability and business productivity
Mobile interoperability and business productivity
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices
 
Mi5 Business Intro 103
Mi5 Business Intro 103Mi5 Business Intro 103
Mi5 Business Intro 103
 
Get More Data Into Your SCADA
Get More Data Into Your SCADAGet More Data Into Your SCADA
Get More Data Into Your SCADA
 
WWT Intelligent WAN Presentation
WWT Intelligent WAN PresentationWWT Intelligent WAN Presentation
WWT Intelligent WAN Presentation
 
Industry Organizations’ global perspective on 5G
Industry Organizations’ global perspective on 5GIndustry Organizations’ global perspective on 5G
Industry Organizations’ global perspective on 5G
 
Design Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesDesign Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise Architectures
 
Programming the Internet of Things: Why Devices Need APIs
Programming the Internet of Things: Why Devices Need APIsProgramming the Internet of Things: Why Devices Need APIs
Programming the Internet of Things: Why Devices Need APIs
 

Andere mochten auch

therapeutic-hypothermia-global-journal-of-anesthesiology-peertechz-journals
therapeutic-hypothermia-global-journal-of-anesthesiology-peertechz-journalstherapeutic-hypothermia-global-journal-of-anesthesiology-peertechz-journals
therapeutic-hypothermia-global-journal-of-anesthesiology-peertechz-journalsPeertechz Publications
 
ICT - enabler of innovation in education
ICT - enabler of innovation in educationICT - enabler of innovation in education
ICT - enabler of innovation in educationRoman Baranovic
 
Viking Window Corporate Presentation 2008 Uk
Viking Window Corporate Presentation 2008 UkViking Window Corporate Presentation 2008 Uk
Viking Window Corporate Presentation 2008 UkTanel Kookmaa
 
Unlikely Events
Unlikely EventsUnlikely Events
Unlikely Eventsim_shubner
 
teropong hikmat
teropong hikmatteropong hikmat
teropong hikmatAbd Fatah
 
Media Proposal
 Media Proposal  Media Proposal
Media Proposal Pedz97
 
Matchfixnig power point
Matchfixnig power pointMatchfixnig power point
Matchfixnig power pointMarco Buus
 
õPpe ja kasvatustöö käsitlemine õpetajatöö kolme järjestiku etapina
õPpe  ja kasvatustöö käsitlemine õpetajatöö kolme järjestiku etapinaõPpe  ja kasvatustöö käsitlemine õpetajatöö kolme järjestiku etapina
õPpe ja kasvatustöö käsitlemine õpetajatöö kolme järjestiku etapinarita Nevidemskaja
 
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -Promises Addiction Treatment | Alcohol Drug Rehab Malibu -
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -tacitnugget8140
 
L'immagine turistica del Trentino
L'immagine turistica del TrentinoL'immagine turistica del Trentino
L'immagine turistica del TrentinoAntonio N. Preiti
 

Andere mochten auch (18)

therapeutic-hypothermia-global-journal-of-anesthesiology-peertechz-journals
therapeutic-hypothermia-global-journal-of-anesthesiology-peertechz-journalstherapeutic-hypothermia-global-journal-of-anesthesiology-peertechz-journals
therapeutic-hypothermia-global-journal-of-anesthesiology-peertechz-journals
 
Emplyment Tribunal Statistics
Emplyment Tribunal StatisticsEmplyment Tribunal Statistics
Emplyment Tribunal Statistics
 
ICT - enabler of innovation in education
ICT - enabler of innovation in educationICT - enabler of innovation in education
ICT - enabler of innovation in education
 
FINANCIAL IMPLICATIONS OF DIVORCE AFTER 50
FINANCIAL IMPLICATIONS OF DIVORCE AFTER 50FINANCIAL IMPLICATIONS OF DIVORCE AFTER 50
FINANCIAL IMPLICATIONS OF DIVORCE AFTER 50
 
Viking Window Corporate Presentation 2008 Uk
Viking Window Corporate Presentation 2008 UkViking Window Corporate Presentation 2008 Uk
Viking Window Corporate Presentation 2008 Uk
 
R&G21st
R&G21stR&G21st
R&G21st
 
Ann massoud
Ann massoudAnn massoud
Ann massoud
 
Unlikely Events
Unlikely EventsUnlikely Events
Unlikely Events
 
130111 shuvaev brief
130111 shuvaev brief130111 shuvaev brief
130111 shuvaev brief
 
teropong hikmat
teropong hikmatteropong hikmat
teropong hikmat
 
Media Proposal
 Media Proposal  Media Proposal
Media Proposal
 
Maquiecologico
MaquiecologicoMaquiecologico
Maquiecologico
 
Case presentation
Case presentationCase presentation
Case presentation
 
Matchfixnig power point
Matchfixnig power pointMatchfixnig power point
Matchfixnig power point
 
õPpe ja kasvatustöö käsitlemine õpetajatöö kolme järjestiku etapina
õPpe  ja kasvatustöö käsitlemine õpetajatöö kolme järjestiku etapinaõPpe  ja kasvatustöö käsitlemine õpetajatöö kolme järjestiku etapina
õPpe ja kasvatustöö käsitlemine õpetajatöö kolme järjestiku etapina
 
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -Promises Addiction Treatment | Alcohol Drug Rehab Malibu -
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -
 
L'immagine turistica del Trentino
L'immagine turistica del TrentinoL'immagine turistica del Trentino
L'immagine turistica del Trentino
 
Lo1 task 2
Lo1 task 2Lo1 task 2
Lo1 task 2
 

Ähnlich wie Absolute Software & Lojack – 2014 Overview

PeoplePower:HelloWorld
PeoplePower:HelloWorldPeoplePower:HelloWorld
PeoplePower:HelloWorldStan Curtis
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.pptssusera76ea9
 
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokia
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, NokiaThe Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokia
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokiamfrancis
 
Designing a Mobile Device Lab - XBOSoft Webinar
Designing a Mobile Device Lab - XBOSoft WebinarDesigning a Mobile Device Lab - XBOSoft Webinar
Designing a Mobile Device Lab - XBOSoft WebinarXBOSoft
 
Pc tech pitch deck
Pc tech pitch deckPc tech pitch deck
Pc tech pitch deckJune Barrett
 
Particle Keynote with Zach Supalla
Particle Keynote with Zach SupallaParticle Keynote with Zach Supalla
Particle Keynote with Zach SupallaParticle
 
Prosoft mobile services v3
Prosoft mobile services v3Prosoft mobile services v3
Prosoft mobile services v3rajpsft
 
Gadget world-pr-v2.0
Gadget world-pr-v2.0Gadget world-pr-v2.0
Gadget world-pr-v2.0opaclabs
 
Open Source Business Case Final
Open Source Business Case FinalOpen Source Business Case Final
Open Source Business Case FinalFITT
 
Westcon Group Corporate For Von Show Final
Westcon Group Corporate For Von Show FinalWestcon Group Corporate For Von Show Final
Westcon Group Corporate For Von Show FinalCarl Ford
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategyitnewsafrica
 
Lenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnLenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnTony DeGonia (LION)
 
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Blancco
 
Microsoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with RunpipeMicrosoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with RunpipeRunpipe
 
BEACON TECHNOLOGY OVERVIEW
BEACON TECHNOLOGY OVERVIEWBEACON TECHNOLOGY OVERVIEW
BEACON TECHNOLOGY OVERVIEWDonnovan Andrews
 
Why Enterprises are embracing Open Source Technologies
Why Enterprises are embracing Open Source TechnologiesWhy Enterprises are embracing Open Source Technologies
Why Enterprises are embracing Open Source TechnologiesKuliza Technologies
 
LML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILouis-Martin Landry
 

Ähnlich wie Absolute Software & Lojack – 2014 Overview (20)

PeoplePower:HelloWorld
PeoplePower:HelloWorldPeoplePower:HelloWorld
PeoplePower:HelloWorld
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokia
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, NokiaThe Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokia
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokia
 
Designing a Mobile Device Lab - XBOSoft Webinar
Designing a Mobile Device Lab - XBOSoft WebinarDesigning a Mobile Device Lab - XBOSoft Webinar
Designing a Mobile Device Lab - XBOSoft Webinar
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Pc tech pitch deck
Pc tech pitch deckPc tech pitch deck
Pc tech pitch deck
 
Particle Keynote with Zach Supalla
Particle Keynote with Zach SupallaParticle Keynote with Zach Supalla
Particle Keynote with Zach Supalla
 
Prosoft mobile services v3
Prosoft mobile services v3Prosoft mobile services v3
Prosoft mobile services v3
 
Gadget world-pr-v2.0
Gadget world-pr-v2.0Gadget world-pr-v2.0
Gadget world-pr-v2.0
 
Open Source Business Case Final
Open Source Business Case FinalOpen Source Business Case Final
Open Source Business Case Final
 
Westcon Group Corporate For Von Show Final
Westcon Group Corporate For Von Show FinalWestcon Group Corporate For Von Show Final
Westcon Group Corporate For Von Show Final
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
 
Lenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnLenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and Learn
 
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
 
Microsoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with RunpipeMicrosoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with Runpipe
 
BEACON TECHNOLOGY OVERVIEW
BEACON TECHNOLOGY OVERVIEWBEACON TECHNOLOGY OVERVIEW
BEACON TECHNOLOGY OVERVIEW
 
Why Enterprises are embracing Open Source Technologies
Why Enterprises are embracing Open Source TechnologiesWhy Enterprises are embracing Open Source Technologies
Why Enterprises are embracing Open Source Technologies
 
LML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTI
 

Mehr von Absolute LoJack

Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8Absolute LoJack
 
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0Absolute LoJack
 
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Absolute LoJack
 

Mehr von Absolute LoJack (9)

Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8
 
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
 
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
 

Kürzlich hochgeladen

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 

Kürzlich hochgeladen (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 

Absolute Software & Lojack – 2014 Overview

  • 1. Click to edit Master subtitle style
  • 2. Agenda • Absolute Software Overview • Consumer Absolute LoJack – – – – – Device Theft – A Worldwide Epidemic Competitive Differentiation Absolute LoJack Product Portfolio Go to Market: OEM, Retail, Direct Value Proposition • Absolute LoJack Mobility – Samsung Partnership – Merchandising – Go To Market • Back Up
  • 4. Absolute Software – Overview Technology and services that protect your digital world. Offices: Distinguishing Facts: • Corporate: Vancouver, BC and Austin, TX USA • Built into device firmware/BIOS since 2005 • EMEA: Reading, UK • Regional: Kuala Lampur, Tokyo, Taipei, Singapore • In-Country Partners: Australia, Columbia, Brazil, South Africa and Mexico • 15 Patents worldwide; 49 pending • SaaS delivery with over 6 million subscriptions worldwide • 30,000+ Devices Recovered • Proven recoveries in over 106 Countries • Over 36 million in recovered collateral
  • 5. Absolute Software – Overview Specializing in tracking, management and security solutions for smartphones, tablets & PCs • Vancouver, B.C. headquartered • Founded in 1993; publicly traded since 2000 • Global leader in firmware-based security solutions • Strategic partnerships with leading device OEMs • Samsung SEAP Partner
  • 6. Absolute Software – Overview OEM Partner Success • BIOS persistent • BIOS persistent • BIOS persistent • Embedded on ElitePad 900 Windows tablets • Global Anti-theft ISV for all Ultrabooks • Embedded on Thinkpad Android tablets • Included in every HP CarePack • 2012 Diamond Supplier Award • Only security solution available directly through Apple • BIOS persistent • Embedded on Galaxy flagship smartphones & tablets • SAFE MDM support • Samsung Enterprise Alliance Partner • Samsung KNOX MDM Partner
  • 7. Absolute Software Overview Cross-platform & device support, persistence & emergency response services Endpoint Security for Consumers Remotely track, manage, secure & recover devices. Endpoint Security for IT Centrally track and secure IT assets within a cloud-based console. Endpoint Management Complete end-to-end lifecycle management for iOS, Android, Windows Phone, PC & Mac devices.
  • 8. Absolute Software – Overview Routes to Market Absolute Firmware Persistent Technology Device OEMs Absolute.com Retailers Consumer Telco OEMs Corporate Resellers
  • 9. Absolute Software – Overview Over 30 Trusted Partners around the world
  • 11. Absolute LoJack Device Theft. A World Wide Epidemic. Top Officials Publicly Pressure manufacturers to solve the problem. Laptop Theft Stats 2 Mobile Device Theft Stats 3 1 4 5 6 4 Sources: 1. Absolute Software - 2012 End Point Management Report; 2. Ponemon Institute 2008 - Airport Insecurity: the case of lost laptops; 3. FBI Statistics; 4. Huffington Post: March 2013 “Apple Picking: How the iPhone Became An Object Worth Killing For”; 4. Federal Communications Commissions 5. Jack Wraith, chairman of the Mobile Industry Crime Action Forum,
  • 12. Absolute LoJack Competitive Differentiation: Absolute Investigation and Recovery Services Team. Upping the Ante in Device Theft Recovery.
  • 13. Absolute LoJack Competitive Differentiation Persistence the only solution designed to survive a factory reset
  • 15. Absolute LoJack The only solution than can safely recover a stolen device, while providing features to protect the data on the device. Product Features Operating Systems Windows 8*, 8.1, 7 or Vista For Mac OS X 10.7+ Android 2.3+ Android 2.3+
  • 16. Absolute LoJack Global Availability
  • 17. ONLINE MERCHANDISING: Absolute LoJack Marketing RETAIL PACKAGING: SELL SHEETS & BATTLECARDS INFOGRAPHICS SALES BROCHURE:
  • 18. Absolute LoJack News and Awards RATINGS & REVIEWS "Through diligent work performed by Absolute Software and the LAPD they recovered my laptop and its now in my possession.“ - R. Vidales, Los Angles CA
  • 19. Absolute LoJack Different Go To Market Programs to meet Your business objectives Immediate Revenue Recurring revenue stream Grow Services Portfolio • Sell Stand alone at POS or APOS • Margin rich product • Differentiate from competition • Added value to consumer • ESD – no inventory costs • Sell or Bundle Absolute LoJack with existing services • SaaS model • High lifetime value • Exponentially grows as more subscriptions get into the pipeline • Stronger security value prop across portfolio “most secure device on the planet” • Increase attach rates to an existing item • Value add to upsell Industry Leading theft recovery solution with strong brand identification
  • 20. Bundle Absolute LoJack to Add Revenue and Margin Immediate Revenue • Sell Stand alone at POS or APOS • Margin rich product • Differentiate from competition • Added value to consumer • No cost inventory with ESD Retail Gift Card with “protected” device label MacMall.com Configurator – POS add on
  • 21. Build a recurring revenue stream as a bundle or stand alone The larger the install base, the larger the revenue stream Recurring revenue stream • Sell or Bundle Absolute LoJack with existing services • SaaS model • High lifetime value • Exponentially grows as more subscriptions get into the pipeline
  • 22. Include in Services Portfolio to build attach or upsell Grow Services Portfolio • Stronger security value prop across portfolio “most secure device on the planet” • Increase attach rates to an existing item • Value add to upsell
  • 24. Samsung Strategic Alliance Expanding Partnership Samsung PCs • Computrace BIOS persistent on Series 2-9 Windows Notebooks Samsung Mobile Devices • Computrace Firmware Persistence on 100M+ flagship Galaxy smartphones & tablets Samsung Enterprise Alliance Program (SEAP) • SEAP Gold Partner Samsung Approved For Enterprise (SAFE) • Enhanced SAFE API support with Absolute Manage MDM Samsung KNOX MDM Support • Samsung KNOX MDM integration – Q1 2014
  • 25. Absolute LoJack Marketing Make your device the most secure on the planet
  • 27. Premium Security Add Absolute LoJack to be the most secure device on the planet
  • 28. Co-Brand or White Label an Absolute LoJack Product Front Back
  • 29. Absolute LoJack Theft Recovery and Security Products The ideal compliment to insurance for total product protection
  • 31. Absolute LoJack. Many devices. One solution. Windows 8*, 8.1, 7 or Vista For Mac OS X 10.7+ Android 2.3+ Android 2.3+
  • 32. Absolute Software Highest recovery rate in the industry Agent is installed Absolute Theft Recovery Team forensically mines stolen device Device is stolen Thief and location are identified Owner contacts local police and Absolute Stolen device is recovered