What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is...

25

Transcript of What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is...

Page 1: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell
Page 2: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

What do you do if your computerWhat do you do if your computeris lost or stolen?is lost or stolen?

Suppose it just runs away fromSuppose it just runs away fromhome?home?

Is it smart enough to tell youIs it smart enough to tell youwhere it is?where it is?

It is, if it has PC PhoneHomeIt is, if it has PC PhoneHome™™ or orMacPhoneHomeMacPhoneHome™™ inside inside……

Page 3: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

PC PhoneHomePC PhoneHome™™ / MacPhoneHome / MacPhoneHome™™ is a transparent theft is a transparent theftprotection, tracking and recovery software that can be installedprotection, tracking and recovery software that can be installedon a Laptop, Desktop, on a Laptop, Desktop, NetbookNetbook, Tablet computer &, Tablet computer & Chromebook Chromebook..

Every time the device makes an internet connection, a stealthEvery time the device makes an internet connection, a stealthemail message containing its exact location will be invisiblyemail message containing its exact location will be invisiblytransmitted to a pre-determined email address of the usertransmitted to a pre-determined email address of the user’’ss

choicechoice

Allows for the quick location and retrieval of your valuableAllows for the quick location and retrieval of your valuableproperty. Prevents loss of expensive equipment and intellectualproperty. Prevents loss of expensive equipment and intellectual

property. Highly Tamperproof - property. Highly Tamperproof - Cannot be removed byCannot be removed byunauthorized partiesunauthorized parties

Page 4: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

How does PC PhoneHomeHow does PC PhoneHome™™ and MacPhoneHome and MacPhoneHome™™ work? work?

Software isSoftware isinstalled,installed,

simplesimpleinstallationinstallation

andandconfigurationconfiguration

Page 5: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

Every time the protected computer makesEvery time the protected computer makesan internet connection it will send aan internet connection it will send a

stealth email message containing its exactstealth email message containing its exactlocation to a pre-determined emaillocation to a pre-determined email

address of the useraddress of the user’’s choices choice

Page 6: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

When the e-mail message from your missingWhen the e-mail message from your missingcomputer is received, recovery experts at BSI workcomputer is received, recovery experts at BSI work

with worldwide ISPs and local law enforcementwith worldwide ISPs and local law enforcementagencies to recover your stolen property. It is aagencies to recover your stolen property. It is a

simple process to trace the identifying information tosimple process to trace the identifying information tofind the computerfind the computer’’s exact locations exact location..

Page 7: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

Here is a reprint fromHere is a reprint fromColumbia UniversityColumbia University’’ss

Public Safety newsletterPublic Safety newsletteroutlining the recovery ofoutlining the recovery of

a studenta student’’s laptops laptopprotected byprotected by

MacPhoneHomeMacPhoneHome™…™…

We do this ALL the time forWe do this ALL the time forour clientsour clients……

Page 8: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

According to the US Government and Insurance Industry Statistics,According to the US Government and Insurance Industry Statistics,over over EIGHT MILLIONEIGHT MILLION computers were stolen in the USA computers were stolen in the USA

in the last three yearsin the last three years……

Worldwide statistics are proportionally similar.Worldwide statistics are proportionally similar.

According to the FBI, only 3% of stolen computersAccording to the FBI, only 3% of stolen computersare EVER recovered.are EVER recovered.

You don't have to be a victim!You don't have to be a victim!

Page 9: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

Recent Computer Theft Stories in the NewsRecent Computer Theft Stories in the News

Prostitute steals laptop with secret software from US ArmyProstitute steals laptop with secret software from US Army Qualcomm chairman's stolen laptop contained sensitive dataQualcomm chairman's stolen laptop contained sensitive data MossadMossad’’s Deputy Chief gets laptop stolen s Deputy Chief gets laptop stolen –– contained secret data contained secret data Visa ExecVisa Exec’’s stolen laptop contained info on 300K issued credit cardss stolen laptop contained info on 300K issued credit cards Stolen MI5 laptop contained top secret dataStolen MI5 laptop contained top secret data Thieves steal 40 IBM infrastructure serversThieves steal 40 IBM infrastructure servers IRS' Case of the 2,332 Missing LaptopsIRS' Case of the 2,332 Missing Laptops Australian government loses 542 laptopsAustralian government loses 542 laptops UK government loses 1933 computersUK government loses 1933 computers FBI loses 184 computersFBI loses 184 computers 2900 laptops lost in London Taxis2900 laptops lost in London Taxis

You donYou don’’tthave to be ahave to be a

victim!victim!

Page 10: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

We provide low costWe provide low costEnterprise EditionsEnterprise Editions

of PCof PCPhoneHomePhoneHome™™ and andMacPhoneHomeMacPhoneHome™™

to the academicto the academiccommunitycommunity

Ask about our specialAsk about our specialblanket licenseblanket license

Page 11: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

We also provideWe also provideEnterpriseEnterprise

Editions of PCEditions of PCPhoneHomePhoneHome™™ and andMacPhoneHomeMacPhoneHome™™

to the privateto the privatesector andsector and

governmentgovernmentorganizationsorganizations

Page 12: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

““I like PC PhoneHomeI like PC PhoneHome™™ a lot a lot…… I Iwant to deploy it on our 160want to deploy it on our 160

computerscomputers…… Do I have to install Do I have to installand configure it on eachand configure it on each

computer?computer?””

Imagine if you had to install andImagine if you had to install andconfigure every computer in yourconfigure every computer in your

organization with PCorganization with PCPhoneHomePhoneHome™™ or MacPhoneHome or MacPhoneHome™™

separatelyseparately…… what a headache! what a headache!

Page 13: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

““WeWe’’ve got 5000 computers in ourve got 5000 computers in ourschool systemschool system…… It would take meIt would take me

months to installmonths to installMacPhoneHomeMacPhoneHome™™ on every on every

computercomputer…”…”

There is no need to configure eachThere is no need to configure eachcomputer separately!computer separately!

WeWe’’ve solved that problem withve solved that problem withour Enterprise Edition!our Enterprise Edition!

Page 14: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

What’s an Enterprise Edition?

PC PhoneHome™/MacPhoneHome™Enterprise is a custom configurationthat allows organizations to install

PC PhoneHome™/MacPhoneHome™on large numbers of computers

without the need for timeconsuming individual configuration.

Page 15: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

Your organizationYour organization’’s contact ands contact andownership information is hard-codedownership information is hard-codeddirectly inside your custom version ofdirectly inside your custom version ofPC PhoneHomePC PhoneHome™™/MacPhoneHome/MacPhoneHome™™

EnterpriseEnterprise

No need to configure each computer No need to configure each computerseparately!separately!

Just click and install over yourJust click and install over yournetworknetwork

• Point of Contact:• P.O.C. 24 hour number:• P.O.C. Email Address:• Organization:• Address:• City:• State/Province:• Zip/Postal Code:• Country:• Tel:• Fax:• Recipient Email:

YourYourorganizationorganization’’ssownershipownershipand contactand contactinformation isinformation ishard-codedhard-codeddirectly intodirectly intoyouryourcustomizedcustomizedEnterpriseEnterpriseEditionEdition

Page 16: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

PC PhoneHomePC PhoneHome™™ and andMacPhoneHomeMacPhoneHome™™

Enterprise can be installedEnterprise can be installedusing a variety of popularusing a variety of popular

““network pushnetwork push”” techniques techniques

Installation can beInstallation can becompletely transparentcompletely transparent

Page 17: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

PC PhoneHomePC PhoneHome™™ and andMacPhoneHomeMacPhoneHome™™

Enterprise can also beEnterprise can also beinstalled using a variety ofinstalled using a variety of

popular disk imagingpopular disk imagingutilitiesutilities

Page 18: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

protects the largest academic rollout ofprotects the largest academic rollout ofcomputers in US history!computers in US history!

When Apple wanted to protect this rolloutWhen Apple wanted to protect this rolloutTHEY called US!THEY called US!

We currently protect over 23,000 HenricoWe currently protect over 23,000 HenricoCounty, Va. Apple iBooks provided toCounty, Va. Apple iBooks provided tofaculty and students.faculty and students.

"This is the mammoth -- the single largest"This is the mammoth -- the single largestsale of portable computers in educationsale of portable computers in educationever," - Apple CEO Steve Jobsever," - Apple CEO Steve Jobs

Did you knowDid you know……

Page 19: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

We also offer protection for iPads ...we can track your mobile computing device anywhere

in the world on a MAP!

Page 20: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

We also offer Android PhoneHome™

Android PhoneHome™ protects all Android basedPhones and Tablets… Just like our other PhoneHome™ products we can

track your lost or stolen mobile computing device anywhere in the world!

Page 21: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

We also offer Chrome PhoneHome ™

Chrome PhoneHome™ protects all Google Chrome basedTablets… Just like our other PhoneHome™ products we can track your

lost or stolen Chromebook anywhere in the world!

Page 22: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

We also offer CopyAlert™

CopyAlert™ utilizes our award winning PhoneHome™ core technologyto protect your proprietary files from theft by alerting you via email of

unauthorized copying of your files by unauthorized parties.CopyAlert™ also provides a list of what files were copied! Don't be a

victim of corporate espionage!

Page 23: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

Some of our Strategic PartnersSome of our Strategic Partners

Page 24: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

Our computer protectionproducts have been

widely embraced and arein current use by the

academic community,private sector and

governmentorganizations

worldwide.

Page 25: What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is lost or stolen? Suppose it just runs away from home? Is it smart enough to tell

World HeadquartersWorld HeadquartersBrigadoon Software, Inc.Brigadoon Software, Inc.119 Rockland Center, Suite 250119 Rockland Center, Suite 250Nanuet, New York 10954 USANanuet, New York 10954 USATel: + 1-845-624-0909Tel: + 1-845-624-0909Fax: +1-845-624-0990Fax: +1-845-624-0990E-Mail: E-Mail: [email protected]@brigadoonsoftware.comWeb Site: Web Site: www.brigadoonsoftware.comwww.brigadoonsoftware.com

Reseller Inquiries InvitedReseller Inquiries Invited

©© 1999-2013 Brigadoon Software, Inc. All rights Reserved. 1999-2013 Brigadoon Software, Inc. All rights Reserved.