SlideShare a Scribd company logo
1 of 15
What is
BackStopp is a simple but effective tool
to help an organisation protect its
mobile data in the event of the loss or
theft of an employee’s laptop, PDA or
mobile phone.
The Problem
 Laptops are becoming smaller,
more powerful and cheaper
 Improvements in mobile
connectivity allow laptop users
to send and receive more
information whilst on the move
 1 laptop and its data is lost or
stolen every 50 seconds
Traditional Security Tools
***********************
Password,
L$K1292_2D
 Traditional security tools require users to remember long
and cryptic passwords.
 Other data security tools rely on external plug in
hardware which is often stored and lost with the device.
 Invisible to the user
 No user passwords
 No hardware requirement
 No restrictions, BackStopp
protects all data regardless of
its location on the device
 No expensive infrastructure to
install or maintain
Internal or
Managed
support service
Hosted
BackStopp servers
Mobile
employee
Employees can activate BackStopp against their lost or stolen laptop
by either notifying their organisation’s support department OR
by logging in directly to the BackStopp console.
Multiple communication channels
 BackStopp uses the most effective communication method
available to locate a lost laptop. BackStopp’s utilisation of the
GSM network means a device can be found almost anywhere
on earth and if necessary decommissioned even if the device
isn’t connected to the internet.
US DoD Data Deletion
 Upon receiving a secure decommission message all data
files on the lost or stolen device will be destroyed using
US Department of Defence standards.
 BackStopp also deletes critical system files which render
the device useless to the thief.
Audit Trail
 BackStopp remotely initiates
pin hole cameras on the
stolen device to provide a
photo of the first person to
use the device.
 GSM cell triangulation can
also provide an approximate
grid reference or point on an
electronic map.
… it doesn’t stop there …
BackStopp Wi-Fi / RFID integration
 As soon as a device breaches a predefined parameter,
e.g. it leaves an authorised area during working hours,
BackStopp automatically issues the decommission
command and starts tracking the device OR …
 .. BackStopp informs the legitimate user or security
personnel of a potential security issue by SMS or email.
Volume Encryption
 BackStopp's integrated volume encryption means that
any thief who attempts to deactivate BackStopp or
remove the device’s hard disk will find nothing more than
highly encrypted data.
Business Continuity
 BackStopp integrates with leading providers of online
data backup services so all your data can easily and
quickly be restored on to a new or replacement device.
User Control
 BackStopp allows the user to specify a date range when the
device should not be used, for example during a holiday.
 If the device is used Backstopp detects it and either
automatically deletes the data or sends an SMS or e-mail
alert to the legitimate user or the organisation's HR
department.
 BackStopp uses the quickest and most cost effective transport
mechanisms to detect and decommission a laptop before the data
can be compromised.
 Uses GSM network for maximum speed as well as internet and
WiFi connections.
 Culprit identification for law enforcement agencies.
 Produces a comprehensive audit trail which is part of an effective
Information Assurance policy.
 Low cost Risk Management for your mobile data.
Summary

More Related Content

What's hot

2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
mrmwood
 

What's hot (19)

Leading Indian IT Services Company uses OpManager
Leading Indian IT Services Company uses OpManagerLeading Indian IT Services Company uses OpManager
Leading Indian IT Services Company uses OpManager
 
The Computer System
The Computer SystemThe Computer System
The Computer System
 
Networking Trends
Networking TrendsNetworking Trends
Networking Trends
 
Better VoIP Network Troubleshooting
Better VoIP Network Troubleshooting Better VoIP Network Troubleshooting
Better VoIP Network Troubleshooting
 
Bank security
Bank securityBank security
Bank security
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
 
System security
System securitySystem security
System security
 
Ch 16 system security
Ch 16 system securityCh 16 system security
Ch 16 system security
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Security
SecuritySecurity
Security
 
Kith Infotech
Kith InfotechKith Infotech
Kith Infotech
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Quickbook adv2 new
Quickbook  adv2 new Quickbook  adv2 new
Quickbook adv2 new
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 

Viewers also liked (8)

Clients Look Ahead at Agencies (RSW/US 2011 Survey)
Clients Look Ahead at Agencies (RSW/US 2011 Survey)Clients Look Ahead at Agencies (RSW/US 2011 Survey)
Clients Look Ahead at Agencies (RSW/US 2011 Survey)
 
Male organ economic growth: does size matter?
Male organ economic growth: does size matter?Male organ economic growth: does size matter?
Male organ economic growth: does size matter?
 
Backstopp Mobile Slides
Backstopp Mobile SlidesBackstopp Mobile Slides
Backstopp Mobile Slides
 
Yandex on Сontext Advertising (autumn 2010)
Yandex on Сontext Advertising (autumn 2010)Yandex on Сontext Advertising (autumn 2010)
Yandex on Сontext Advertising (autumn 2010)
 
All About Tedv3
All About Tedv3All About Tedv3
All About Tedv3
 
Integration by tim lindsay
Integration by tim lindsayIntegration by tim lindsay
Integration by tim lindsay
 
Global Facebook Advertising Report Q2 2011 by TBG Digital
Global Facebook Advertising Report Q2 2011 by TBG DigitalGlobal Facebook Advertising Report Q2 2011 by TBG Digital
Global Facebook Advertising Report Q2 2011 by TBG Digital
 
Pruebazenbakiak Ikasten
Pruebazenbakiak IkastenPruebazenbakiak Ikasten
Pruebazenbakiak Ikasten
 

Similar to Backstopp Slideshow 2003

Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
jpmccormack
 
Room alert introduction
Room alert introductionRoom alert introduction
Room alert introduction
Tod Richardson
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-b
BbAOC
 
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
RAJASHREE B
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
Kristin Helgeson
 

Similar to Backstopp Slideshow 2003 (20)

IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Linkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARDLinkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARD
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
System
SystemSystem
System
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
Room alert introduction
Room alert introductionRoom alert introduction
Room alert introduction
 
Laptop
LaptopLaptop
Laptop
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-b
 
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
IP-guard Catalog
IP-guard CatalogIP-guard Catalog
IP-guard Catalog
 
pda forensics
pda forensicspda forensics
pda forensics
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Backstopp Slideshow 2003

  • 1.
  • 2. What is BackStopp is a simple but effective tool to help an organisation protect its mobile data in the event of the loss or theft of an employee’s laptop, PDA or mobile phone.
  • 3. The Problem  Laptops are becoming smaller, more powerful and cheaper  Improvements in mobile connectivity allow laptop users to send and receive more information whilst on the move  1 laptop and its data is lost or stolen every 50 seconds
  • 4. Traditional Security Tools *********************** Password, L$K1292_2D  Traditional security tools require users to remember long and cryptic passwords.  Other data security tools rely on external plug in hardware which is often stored and lost with the device.
  • 5.  Invisible to the user  No user passwords  No hardware requirement  No restrictions, BackStopp protects all data regardless of its location on the device  No expensive infrastructure to install or maintain
  • 6. Internal or Managed support service Hosted BackStopp servers Mobile employee Employees can activate BackStopp against their lost or stolen laptop by either notifying their organisation’s support department OR by logging in directly to the BackStopp console.
  • 7. Multiple communication channels  BackStopp uses the most effective communication method available to locate a lost laptop. BackStopp’s utilisation of the GSM network means a device can be found almost anywhere on earth and if necessary decommissioned even if the device isn’t connected to the internet.
  • 8. US DoD Data Deletion  Upon receiving a secure decommission message all data files on the lost or stolen device will be destroyed using US Department of Defence standards.  BackStopp also deletes critical system files which render the device useless to the thief.
  • 9. Audit Trail  BackStopp remotely initiates pin hole cameras on the stolen device to provide a photo of the first person to use the device.  GSM cell triangulation can also provide an approximate grid reference or point on an electronic map.
  • 10. … it doesn’t stop there …
  • 11. BackStopp Wi-Fi / RFID integration  As soon as a device breaches a predefined parameter, e.g. it leaves an authorised area during working hours, BackStopp automatically issues the decommission command and starts tracking the device OR …  .. BackStopp informs the legitimate user or security personnel of a potential security issue by SMS or email.
  • 12. Volume Encryption  BackStopp's integrated volume encryption means that any thief who attempts to deactivate BackStopp or remove the device’s hard disk will find nothing more than highly encrypted data.
  • 13. Business Continuity  BackStopp integrates with leading providers of online data backup services so all your data can easily and quickly be restored on to a new or replacement device.
  • 14. User Control  BackStopp allows the user to specify a date range when the device should not be used, for example during a holiday.  If the device is used Backstopp detects it and either automatically deletes the data or sends an SMS or e-mail alert to the legitimate user or the organisation's HR department.
  • 15.  BackStopp uses the quickest and most cost effective transport mechanisms to detect and decommission a laptop before the data can be compromised.  Uses GSM network for maximum speed as well as internet and WiFi connections.  Culprit identification for law enforcement agencies.  Produces a comprehensive audit trail which is part of an effective Information Assurance policy.  Low cost Risk Management for your mobile data. Summary