SlideShare a Scribd company logo
1 of 9
Prot-On is going
to become the standard
in protecting information
that individuals and enterprises
share on the Internet
www.prot-on.com protonline
@prot_on
A clear need
info@prot-on.com
Today we need a standard
for protecting files
www.prot-on.com protonline
@prot_on
A innovating Vision: a standard for protecting files
Like 20 years ago we needed it
for portability
info@prot-on.com
All documents All devices All Users
www.prot-on.com protonline
@prot_on
A innovating Vision: Become a standard for protecting
Value-for-money Easy to use
info@prot-on.com
Cloud Integration
www.prot-on.com protonline
@prot_on
How it works (professional use case) I
info@prot-on.com
3. Sends the offer as always
(by email, uploading to Dropbox, in a USB, etc.)
1. A seller protects a proposal
with Prot-On
4. John receives the files, Prot-On checks
permissions and allows him to open the proposal
2. Deciding who, how and when can
access its offer
Read Print Edit Copy Manage
John
Mary
www.prot-on.com protonline
@prot_on
How it works (professional use case) II
info@prot-on.com
1. John requests to make modifications 2. The seller change permissions in real time
Read Print Edit Copy Manage
John
Mary
1. John forward the documents to Peter
John read Project_1 at 12:32 of Nov 20th, 2012
Mary edit Project_1 at 18:15 of Nov 21st, 2012
Peter couldnā€™t open Project_1 at 19:34 of Nov 21st, 2012
ļƒ˜ With Audit tracking:
The seller knows who, what and when has
accessed any existing copy of its proposal
2. Peter tries to open the files, but Prot-On doesnā€™t give him
permissions: Peter cannot see the information
Read Print Edit Copy Manage
John
Mary
Peter
www.prot-on.com protonline
@prot_on
A groundbreaking business model
info@prot-on.com
Professionals PREMIUM service
ā€¢ Additional features focused in a professional use
ā€¢ Technical support
CORPORATE licenses
ā€¢ Security keys stored in-house
ā€¢ Integration with user
repository
ā€¢ Integration with corporate
applications
CORPORATE service
ā€¢ Administration level that allows that the
owner of a protected file is not the employee
who protects it but the company he/she
works for
ā€¢ Additional features focused in enterprises
ā€¢ Provide Premium Service to all employees
Enterprises and
Public
Administration
FREE serviceHome-Users
ā€¢ Enabling the use of the Internet with confidence
(cloud storing, social networks, email)
ā€¢ Goal: more than 10 M users in 2016
ļ‚« More than 15.000 users
ļ‚« More than 200 enterprises
ļ‚« Great reception in big companies
www.prot-on.com protonline
@prot_on
Already a reality
Named best IT Security Solution 2012
by magazine ā€œRed Seguridadā€ Spain
info@prot-on.com
Selected ā€œThey Could be Giantsā€
European Business Awards 2013
Winner Security Solution
of the year 2014 in the
European IT & Software
Excellence Awards 2014
Finalist as ā€œBest Data
Leakage Prevention (DLP)
Solutionā€ and ā€œRookie
Security Company of the
Year 2014ā€ by SC
Magazine
protonline
@prot_on
www.prot-on.com
info@prot-on.com

More Related Content

Similar to Prot-On - Keep control of your files wherever they are

ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir
Ā 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
Ā 
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdfLogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdfaradhana9856
Ā 
How To Connect To Your Customers, Partners Securely, Privately and Effectively
How To Connect To Your Customers, Partners Securely, Privately and EffectivelyHow To Connect To Your Customers, Partners Securely, Privately and Effectively
How To Connect To Your Customers, Partners Securely, Privately and EffectivelyAndy Harjanto
Ā 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
Ā 
CIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the EnterpriseCIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the EnterpriseCloudIDSummit
Ā 
CHiWAO_for_All.compressed
CHiWAO_for_All.compressedCHiWAO_for_All.compressed
CHiWAO_for_All.compressedGennady Klemeshev
Ā 
info-sys-security.pptx
info-sys-security.pptxinfo-sys-security.pptx
info-sys-security.pptxMhndHTaani
Ā 
Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudLiwei Ren任力偉
Ā 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and SecurityCreate IT
Ā 
SharePoint Securely Moblized - webinar with Colligo and Bitzer Mobile
SharePoint Securely Moblized - webinar with Colligo and Bitzer MobileSharePoint Securely Moblized - webinar with Colligo and Bitzer Mobile
SharePoint Securely Moblized - webinar with Colligo and Bitzer MobileBitzer Mobile, now part of Oracle
Ā 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...Jisc
Ā 
Seclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet WalkthroughSeclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet Walkthroughsiddarthc
Ā 
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Control Your Data:  3 Steps for Data Governance for Work from Home StaffControl Your Data:  3 Steps for Data Governance for Work from Home Staff
Control Your Data: 3 Steps for Data Governance for Work from Home StaffArt Ocain
Ā 
Fyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshareFyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshareFranky Redant
Ā 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
Ā 
Microsoft Ignite 2019 State of the Browser: Microsoft Edge
Microsoft Ignite 2019 State of the Browser: Microsoft EdgeMicrosoft Ignite 2019 State of the Browser: Microsoft Edge
Microsoft Ignite 2019 State of the Browser: Microsoft EdgeColleenWilliams31
Ā 
Seclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder WalkthroughSeclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder Walkthroughsiddarthc
Ā 

Similar to Prot-On - Keep control of your files wherever they are (20)

ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
Ā 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
Ā 
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdfLogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
Ā 
How To Connect To Your Customers, Partners Securely, Privately and Effectively
How To Connect To Your Customers, Partners Securely, Privately and EffectivelyHow To Connect To Your Customers, Partners Securely, Privately and Effectively
How To Connect To Your Customers, Partners Securely, Privately and Effectively
Ā 
FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
Ā 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ā 
CIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the EnterpriseCIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the Enterprise
Ā 
CHiWAO_for_All.compressed
CHiWAO_for_All.compressedCHiWAO_for_All.compressed
CHiWAO_for_All.compressed
Ā 
info-sys-security.pptx
info-sys-security.pptxinfo-sys-security.pptx
info-sys-security.pptx
Ā 
Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the Cloud
Ā 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
Ā 
SharePoint Securely Moblized - webinar with Colligo and Bitzer Mobile
SharePoint Securely Moblized - webinar with Colligo and Bitzer MobileSharePoint Securely Moblized - webinar with Colligo and Bitzer Mobile
SharePoint Securely Moblized - webinar with Colligo and Bitzer Mobile
Ā 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...
Ā 
Seclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet WalkthroughSeclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet Walkthrough
Ā 
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Control Your Data:  3 Steps for Data Governance for Work from Home StaffControl Your Data:  3 Steps for Data Governance for Work from Home Staff
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Ā 
Fyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshareFyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshare
Ā 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
Ā 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
Ā 
Microsoft Ignite 2019 State of the Browser: Microsoft Edge
Microsoft Ignite 2019 State of the Browser: Microsoft EdgeMicrosoft Ignite 2019 State of the Browser: Microsoft Edge
Microsoft Ignite 2019 State of the Browser: Microsoft Edge
Ā 
Seclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder WalkthroughSeclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder Walkthrough
Ā 

Recently uploaded

Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlanā€™s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlanā€™s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlanā€™s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlanā€™s ...OnePlan Solutions
Ā 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
Ā 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
Ā 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
Ā 
(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...
(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...
(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...gurkirankumar98700
Ā 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
Ā 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
Ā 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
Ā 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
Ā 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
Ā 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
Ā 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
Ā 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
Ā 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
Ā 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
Ā 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
Ā 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
Ā 
Shapes for Sharing between Graph Data SpacesĀ - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data SpacesĀ - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data SpacesĀ - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data SpacesĀ - and Epistemic Querying of RDF-...Steffen Staab
Ā 
CHEAP Call Girls in Pushp Vihar (-DELHI )šŸ” 9953056974šŸ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )šŸ” 9953056974šŸ”(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )šŸ” 9953056974šŸ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )šŸ” 9953056974šŸ”(=)/CALL GIRLS SERVICE9953056974 Low Rate Call Girls In Saket, Delhi NCR
Ā 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
Ā 

Recently uploaded (20)

Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlanā€™s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlanā€™s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlanā€™s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlanā€™s ...
Ā 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
Ā 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
Ā 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
Ā 
(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...
(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...
(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...
Ā 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
Ā 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
Ā 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
Ā 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
Ā 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
Ā 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
Ā 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
Ā 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Ā 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
Ā 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
Ā 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
Ā 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Ā 
Shapes for Sharing between Graph Data SpacesĀ - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data SpacesĀ - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data SpacesĀ - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data SpacesĀ - and Epistemic Querying of RDF-...
Ā 
CHEAP Call Girls in Pushp Vihar (-DELHI )šŸ” 9953056974šŸ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )šŸ” 9953056974šŸ”(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )šŸ” 9953056974šŸ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )šŸ” 9953056974šŸ”(=)/CALL GIRLS SERVICE
Ā 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
Ā 

Prot-On - Keep control of your files wherever they are

  • 1. Prot-On is going to become the standard in protecting information that individuals and enterprises share on the Internet
  • 3. Today we need a standard for protecting files www.prot-on.com protonline @prot_on A innovating Vision: a standard for protecting files Like 20 years ago we needed it for portability info@prot-on.com
  • 4. All documents All devices All Users www.prot-on.com protonline @prot_on A innovating Vision: Become a standard for protecting Value-for-money Easy to use info@prot-on.com Cloud Integration
  • 5. www.prot-on.com protonline @prot_on How it works (professional use case) I info@prot-on.com 3. Sends the offer as always (by email, uploading to Dropbox, in a USB, etc.) 1. A seller protects a proposal with Prot-On 4. John receives the files, Prot-On checks permissions and allows him to open the proposal 2. Deciding who, how and when can access its offer Read Print Edit Copy Manage John Mary
  • 6. www.prot-on.com protonline @prot_on How it works (professional use case) II info@prot-on.com 1. John requests to make modifications 2. The seller change permissions in real time Read Print Edit Copy Manage John Mary 1. John forward the documents to Peter John read Project_1 at 12:32 of Nov 20th, 2012 Mary edit Project_1 at 18:15 of Nov 21st, 2012 Peter couldnā€™t open Project_1 at 19:34 of Nov 21st, 2012 ļƒ˜ With Audit tracking: The seller knows who, what and when has accessed any existing copy of its proposal 2. Peter tries to open the files, but Prot-On doesnā€™t give him permissions: Peter cannot see the information Read Print Edit Copy Manage John Mary Peter
  • 7. www.prot-on.com protonline @prot_on A groundbreaking business model info@prot-on.com Professionals PREMIUM service ā€¢ Additional features focused in a professional use ā€¢ Technical support CORPORATE licenses ā€¢ Security keys stored in-house ā€¢ Integration with user repository ā€¢ Integration with corporate applications CORPORATE service ā€¢ Administration level that allows that the owner of a protected file is not the employee who protects it but the company he/she works for ā€¢ Additional features focused in enterprises ā€¢ Provide Premium Service to all employees Enterprises and Public Administration FREE serviceHome-Users ā€¢ Enabling the use of the Internet with confidence (cloud storing, social networks, email) ā€¢ Goal: more than 10 M users in 2016
  • 8. ļ‚« More than 15.000 users ļ‚« More than 200 enterprises ļ‚« Great reception in big companies www.prot-on.com protonline @prot_on Already a reality Named best IT Security Solution 2012 by magazine ā€œRed Seguridadā€ Spain info@prot-on.com Selected ā€œThey Could be Giantsā€ European Business Awards 2013 Winner Security Solution of the year 2014 in the European IT & Software Excellence Awards 2014 Finalist as ā€œBest Data Leakage Prevention (DLP) Solutionā€ and ā€œRookie Security Company of the Year 2014ā€ by SC Magazine