What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is...
Transcript of What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is...
What do you do if your computerWhat do you do if your computeris lost or stolen?is lost or stolen?
Suppose it just runs away fromSuppose it just runs away fromhome?home?
Is it smart enough to tell youIs it smart enough to tell youwhere it is?where it is?
It is, if it has PC PhoneHomeIt is, if it has PC PhoneHome™™ or orMacPhoneHomeMacPhoneHome™™ inside inside……
PC PhoneHomePC PhoneHome™™ / MacPhoneHome / MacPhoneHome™™ is a transparent theft is a transparent theftprotection, tracking and recovery software that can be installedprotection, tracking and recovery software that can be installedon a Laptop, Desktop, on a Laptop, Desktop, NetbookNetbook, Tablet computer &, Tablet computer & Chromebook Chromebook..
Every time the device makes an internet connection, a stealthEvery time the device makes an internet connection, a stealthemail message containing its exact location will be invisiblyemail message containing its exact location will be invisiblytransmitted to a pre-determined email address of the usertransmitted to a pre-determined email address of the user’’ss
choicechoice
Allows for the quick location and retrieval of your valuableAllows for the quick location and retrieval of your valuableproperty. Prevents loss of expensive equipment and intellectualproperty. Prevents loss of expensive equipment and intellectual
property. Highly Tamperproof - property. Highly Tamperproof - Cannot be removed byCannot be removed byunauthorized partiesunauthorized parties
How does PC PhoneHomeHow does PC PhoneHome™™ and MacPhoneHome and MacPhoneHome™™ work? work?
Software isSoftware isinstalled,installed,
simplesimpleinstallationinstallation
andandconfigurationconfiguration
Every time the protected computer makesEvery time the protected computer makesan internet connection it will send aan internet connection it will send a
stealth email message containing its exactstealth email message containing its exactlocation to a pre-determined emaillocation to a pre-determined email
address of the useraddress of the user’’s choices choice
When the e-mail message from your missingWhen the e-mail message from your missingcomputer is received, recovery experts at BSI workcomputer is received, recovery experts at BSI work
with worldwide ISPs and local law enforcementwith worldwide ISPs and local law enforcementagencies to recover your stolen property. It is aagencies to recover your stolen property. It is a
simple process to trace the identifying information tosimple process to trace the identifying information tofind the computerfind the computer’’s exact locations exact location..
Here is a reprint fromHere is a reprint fromColumbia UniversityColumbia University’’ss
Public Safety newsletterPublic Safety newsletteroutlining the recovery ofoutlining the recovery of
a studenta student’’s laptops laptopprotected byprotected by
MacPhoneHomeMacPhoneHome™…™…
We do this ALL the time forWe do this ALL the time forour clientsour clients……
According to the US Government and Insurance Industry Statistics,According to the US Government and Insurance Industry Statistics,over over EIGHT MILLIONEIGHT MILLION computers were stolen in the USA computers were stolen in the USA
in the last three yearsin the last three years……
Worldwide statistics are proportionally similar.Worldwide statistics are proportionally similar.
According to the FBI, only 3% of stolen computersAccording to the FBI, only 3% of stolen computersare EVER recovered.are EVER recovered.
You don't have to be a victim!You don't have to be a victim!
Recent Computer Theft Stories in the NewsRecent Computer Theft Stories in the News
Prostitute steals laptop with secret software from US ArmyProstitute steals laptop with secret software from US Army Qualcomm chairman's stolen laptop contained sensitive dataQualcomm chairman's stolen laptop contained sensitive data MossadMossad’’s Deputy Chief gets laptop stolen s Deputy Chief gets laptop stolen –– contained secret data contained secret data Visa ExecVisa Exec’’s stolen laptop contained info on 300K issued credit cardss stolen laptop contained info on 300K issued credit cards Stolen MI5 laptop contained top secret dataStolen MI5 laptop contained top secret data Thieves steal 40 IBM infrastructure serversThieves steal 40 IBM infrastructure servers IRS' Case of the 2,332 Missing LaptopsIRS' Case of the 2,332 Missing Laptops Australian government loses 542 laptopsAustralian government loses 542 laptops UK government loses 1933 computersUK government loses 1933 computers FBI loses 184 computersFBI loses 184 computers 2900 laptops lost in London Taxis2900 laptops lost in London Taxis
You donYou don’’tthave to be ahave to be a
victim!victim!
We provide low costWe provide low costEnterprise EditionsEnterprise Editions
of PCof PCPhoneHomePhoneHome™™ and andMacPhoneHomeMacPhoneHome™™
to the academicto the academiccommunitycommunity
Ask about our specialAsk about our specialblanket licenseblanket license
We also provideWe also provideEnterpriseEnterprise
Editions of PCEditions of PCPhoneHomePhoneHome™™ and andMacPhoneHomeMacPhoneHome™™
to the privateto the privatesector andsector and
governmentgovernmentorganizationsorganizations
““I like PC PhoneHomeI like PC PhoneHome™™ a lot a lot…… I Iwant to deploy it on our 160want to deploy it on our 160
computerscomputers…… Do I have to install Do I have to installand configure it on eachand configure it on each
computer?computer?””
Imagine if you had to install andImagine if you had to install andconfigure every computer in yourconfigure every computer in your
organization with PCorganization with PCPhoneHomePhoneHome™™ or MacPhoneHome or MacPhoneHome™™
separatelyseparately…… what a headache! what a headache!
““WeWe’’ve got 5000 computers in ourve got 5000 computers in ourschool systemschool system…… It would take meIt would take me
months to installmonths to installMacPhoneHomeMacPhoneHome™™ on every on every
computercomputer…”…”
There is no need to configure eachThere is no need to configure eachcomputer separately!computer separately!
WeWe’’ve solved that problem withve solved that problem withour Enterprise Edition!our Enterprise Edition!
What’s an Enterprise Edition?
PC PhoneHome™/MacPhoneHome™Enterprise is a custom configurationthat allows organizations to install
PC PhoneHome™/MacPhoneHome™on large numbers of computers
without the need for timeconsuming individual configuration.
Your organizationYour organization’’s contact ands contact andownership information is hard-codedownership information is hard-codeddirectly inside your custom version ofdirectly inside your custom version ofPC PhoneHomePC PhoneHome™™/MacPhoneHome/MacPhoneHome™™
EnterpriseEnterprise
No need to configure each computer No need to configure each computerseparately!separately!
Just click and install over yourJust click and install over yournetworknetwork
• Point of Contact:• P.O.C. 24 hour number:• P.O.C. Email Address:• Organization:• Address:• City:• State/Province:• Zip/Postal Code:• Country:• Tel:• Fax:• Recipient Email:
YourYourorganizationorganization’’ssownershipownershipand contactand contactinformation isinformation ishard-codedhard-codeddirectly intodirectly intoyouryourcustomizedcustomizedEnterpriseEnterpriseEditionEdition
PC PhoneHomePC PhoneHome™™ and andMacPhoneHomeMacPhoneHome™™
Enterprise can be installedEnterprise can be installedusing a variety of popularusing a variety of popular
““network pushnetwork push”” techniques techniques
Installation can beInstallation can becompletely transparentcompletely transparent
PC PhoneHomePC PhoneHome™™ and andMacPhoneHomeMacPhoneHome™™
Enterprise can also beEnterprise can also beinstalled using a variety ofinstalled using a variety of
popular disk imagingpopular disk imagingutilitiesutilities
protects the largest academic rollout ofprotects the largest academic rollout ofcomputers in US history!computers in US history!
When Apple wanted to protect this rolloutWhen Apple wanted to protect this rolloutTHEY called US!THEY called US!
We currently protect over 23,000 HenricoWe currently protect over 23,000 HenricoCounty, Va. Apple iBooks provided toCounty, Va. Apple iBooks provided tofaculty and students.faculty and students.
"This is the mammoth -- the single largest"This is the mammoth -- the single largestsale of portable computers in educationsale of portable computers in educationever," - Apple CEO Steve Jobsever," - Apple CEO Steve Jobs
Did you knowDid you know……
We also offer protection for iPads ...we can track your mobile computing device anywhere
in the world on a MAP!
We also offer Android PhoneHome™
Android PhoneHome™ protects all Android basedPhones and Tablets… Just like our other PhoneHome™ products we can
track your lost or stolen mobile computing device anywhere in the world!
We also offer Chrome PhoneHome ™
Chrome PhoneHome™ protects all Google Chrome basedTablets… Just like our other PhoneHome™ products we can track your
lost or stolen Chromebook anywhere in the world!
We also offer CopyAlert™
CopyAlert™ utilizes our award winning PhoneHome™ core technologyto protect your proprietary files from theft by alerting you via email of
unauthorized copying of your files by unauthorized parties.CopyAlert™ also provides a list of what files were copied! Don't be a
victim of corporate espionage!
Some of our Strategic PartnersSome of our Strategic Partners
Our computer protectionproducts have been
widely embraced and arein current use by the
academic community,private sector and
governmentorganizations
worldwide.
World HeadquartersWorld HeadquartersBrigadoon Software, Inc.Brigadoon Software, Inc.119 Rockland Center, Suite 250119 Rockland Center, Suite 250Nanuet, New York 10954 USANanuet, New York 10954 USATel: + 1-845-624-0909Tel: + 1-845-624-0909Fax: +1-845-624-0990Fax: +1-845-624-0990E-Mail: E-Mail: [email protected]@brigadoonsoftware.comWeb Site: Web Site: www.brigadoonsoftware.comwww.brigadoonsoftware.com
Reseller Inquiries InvitedReseller Inquiries Invited
©© 1999-2013 Brigadoon Software, Inc. All rights Reserved. 1999-2013 Brigadoon Software, Inc. All rights Reserved.