SlideShare a Scribd company logo
 
What is  BackStopp is a simple but effective tool to help an organisation protect its mobile data in the event of the loss or theft of an employee’s laptop, PDA or mobile phone.
The Problem PDAs and mobile phones are getting more powerful and cheaper, with bigger storage capacity They are increasingly used in business as mini PCs and for sending and receiving information Hundreds of thousands of these devices are lost or stolen every year
Traditional Security Tools Most mobile phones and PDAs have little more than a four digit pin code to deter access by unauthorised users which can easily be bypassed. 1 2 3 4
Locate lost or stolen devices anywhere in the world Remotely wipe out all personal and business data held on the device Provide a detailed proof of decommission report for absolute peace of mind Invisible to the user No user passwords, PIN codes or other intervention required Easily installed on mobile phones, smartphones, PDAs and other mobile comms devices
Mobile employee When the device disappears simply log onto the Backstopp Mobile website and wipe the mobile data out directly or notify the appropriate Backstopp operator to perform the decommission.  Internal or Managed support service Hosted  BackStopp servers
US DoD Data Deletion Upon receiving a secure decommission message all data files, emails, text messages, contacts, appointments and cookies on the lost or stolen device will be destroyed using US Department of Defence standards.
Line of business applications  Where the device is used for a line of business application BackStopp Mobile will delete any associated data and go on to permanently shut down the application itself.
Audit Trail Once BackStopp has wiped out the contents of the device it sets about proving it. BackStopp returns a detailed report  listing what data was erased, when and whether it was accessed in the time that it was lost. BackStopp uses GSM cell triangulation to provide a map location of where the device is at the moment it is turned on.
BackStopp Mobile uses US Department of defence standards to remotely destroy any data files, emails, text messages, contacts and appointments stored on a lost or stolen mobile phone.  Uses GSM cell triangulation to locate a mobile phone anywhere in the world. BackStopp Mobile is a subset of BackStopp which can be used to protect other assets in your organisation including laptops, desktops and servers. Produces a comprehensive audit trail which is part of an effective Information Assurance policy.  Low cost Risk Management for your mobile data. Summary

More Related Content

PDF
Profile securitarian
PDF
Shining a Light on Shadow Devices
PDF
Top 10 Cyber Security Tips for SMEs
PDF
Covid 19 guide how to secure your data while working away from office
PDF
What is CryptoLocker and How Can I Protect My Business From It?
PDF
Five mobile security challenges facing the enterprise
DOCX
8 threats that even antivirus cannot catch
PPTX
FileTrax, Remote File Deletion System
Profile securitarian
Shining a Light on Shadow Devices
Top 10 Cyber Security Tips for SMEs
Covid 19 guide how to secure your data while working away from office
What is CryptoLocker and How Can I Protect My Business From It?
Five mobile security challenges facing the enterprise
8 threats that even antivirus cannot catch
FileTrax, Remote File Deletion System

What's hot (20)

PPTX
Cloud Printing For SaaS Providers With OM Plus i-Sat
PDF
Black Friday Kicks Off Holiday Cyber-Crime Season
PDF
Cyber-Leave-Behind-Brochure-Done (1)
PPTX
LIFT OFF 2017: Transforming Security
PDF
Four Network Security Challenges for the Cloud Generation
PPTX
Mobile database security threats
PDF
Securing Mobile & Online Identity in the Cyber World
PDF
Small Business Guide to Information Security
PPSX
Intelligence Driven Security
PPTX
Mobile Security - 2015 Wrap-up and 2016 Predictions
PDF
Datashur Presentation pin flash drive - Kingfin
PPTX
DLP Solutions Protection | Seclore
PDF
Your Data Is Under Siege: Fortify Your Endpoints
PDF
secureIoT Presentation #1
PPTX
HEM INNOVATIVE SOLUTIONS
PDF
Next-level mobile app security: A programmatic approach
PDF
Four ways to secure the internet of things - infographic
PDF
SYPHERSAFE
PDF
Cybersecuity Tips for Small Businesses
PDF
Mobile Security at the World Cup
Cloud Printing For SaaS Providers With OM Plus i-Sat
Black Friday Kicks Off Holiday Cyber-Crime Season
Cyber-Leave-Behind-Brochure-Done (1)
LIFT OFF 2017: Transforming Security
Four Network Security Challenges for the Cloud Generation
Mobile database security threats
Securing Mobile & Online Identity in the Cyber World
Small Business Guide to Information Security
Intelligence Driven Security
Mobile Security - 2015 Wrap-up and 2016 Predictions
Datashur Presentation pin flash drive - Kingfin
DLP Solutions Protection | Seclore
Your Data Is Under Siege: Fortify Your Endpoints
secureIoT Presentation #1
HEM INNOVATIVE SOLUTIONS
Next-level mobile app security: A programmatic approach
Four ways to secure the internet of things - infographic
SYPHERSAFE
Cybersecuity Tips for Small Businesses
Mobile Security at the World Cup
Ad

Viewers also liked (7)

PDF
Global Facebook Advertising Report Q2 2011 by TBG Digital
PDF
Integration by tim lindsay
PPT
All About Tedv3
PDF
Male organ economic growth: does size matter?
PDF
Clients Look Ahead at Agencies (RSW/US 2011 Survey)
PDF
Male organ economic growth: does size matter?
PPT
Pruebazenbakiak Ikasten
Global Facebook Advertising Report Q2 2011 by TBG Digital
Integration by tim lindsay
All About Tedv3
Male organ economic growth: does size matter?
Clients Look Ahead at Agencies (RSW/US 2011 Survey)
Male organ economic growth: does size matter?
Pruebazenbakiak Ikasten
Ad

Similar to Backstopp Mobile Slides (10)

PPS
Backstopp Slideshow 2003
PPTX
MOBOCOP Enterprise Mobile Security
PDF
Business Mobility Brochure - client: Deptive
DOC
Mobile Device Security Policy
PPTX
Mobisheild sales promotion presentation.
PPTX
Mobile Forensics and Cybersecurity
PDF
Tisa mobile forensic
PPTX
Check Point Mobile Security
PDF
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
Backstopp Slideshow 2003
MOBOCOP Enterprise Mobile Security
Business Mobility Brochure - client: Deptive
Mobile Device Security Policy
Mobisheild sales promotion presentation.
Mobile Forensics and Cybersecurity
Tisa mobile forensic
Check Point Mobile Security
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Backstopp Mobile Slides

  • 1.  
  • 2. What is BackStopp is a simple but effective tool to help an organisation protect its mobile data in the event of the loss or theft of an employee’s laptop, PDA or mobile phone.
  • 3. The Problem PDAs and mobile phones are getting more powerful and cheaper, with bigger storage capacity They are increasingly used in business as mini PCs and for sending and receiving information Hundreds of thousands of these devices are lost or stolen every year
  • 4. Traditional Security Tools Most mobile phones and PDAs have little more than a four digit pin code to deter access by unauthorised users which can easily be bypassed. 1 2 3 4
  • 5. Locate lost or stolen devices anywhere in the world Remotely wipe out all personal and business data held on the device Provide a detailed proof of decommission report for absolute peace of mind Invisible to the user No user passwords, PIN codes or other intervention required Easily installed on mobile phones, smartphones, PDAs and other mobile comms devices
  • 6. Mobile employee When the device disappears simply log onto the Backstopp Mobile website and wipe the mobile data out directly or notify the appropriate Backstopp operator to perform the decommission. Internal or Managed support service Hosted BackStopp servers
  • 7. US DoD Data Deletion Upon receiving a secure decommission message all data files, emails, text messages, contacts, appointments and cookies on the lost or stolen device will be destroyed using US Department of Defence standards.
  • 8. Line of business applications Where the device is used for a line of business application BackStopp Mobile will delete any associated data and go on to permanently shut down the application itself.
  • 9. Audit Trail Once BackStopp has wiped out the contents of the device it sets about proving it. BackStopp returns a detailed report listing what data was erased, when and whether it was accessed in the time that it was lost. BackStopp uses GSM cell triangulation to provide a map location of where the device is at the moment it is turned on.
  • 10. BackStopp Mobile uses US Department of defence standards to remotely destroy any data files, emails, text messages, contacts and appointments stored on a lost or stolen mobile phone. Uses GSM cell triangulation to locate a mobile phone anywhere in the world. BackStopp Mobile is a subset of BackStopp which can be used to protect other assets in your organisation including laptops, desktops and servers. Produces a comprehensive audit trail which is part of an effective Information Assurance policy. Low cost Risk Management for your mobile data. Summary