Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Backstopp Mobile Slides


Published on

  • Be the first to comment

  • Be the first to like this

Backstopp Mobile Slides

  1. 2. What is <ul><li>BackStopp is a simple but effective tool to help an organisation protect its mobile data in the event of the loss or theft of an employee’s laptop, PDA or mobile phone. </li></ul>
  2. 3. The Problem <ul><li>PDAs and mobile phones are getting more powerful and cheaper, with bigger storage capacity </li></ul><ul><li>They are increasingly used in business as mini PCs and for sending and receiving information </li></ul><ul><li>Hundreds of thousands of these devices are lost or stolen every year </li></ul>
  3. 4. Traditional Security Tools <ul><li>Most mobile phones and PDAs have little more than a four digit pin code to deter access by unauthorised users which can easily be bypassed. </li></ul>1 2 3 4
  4. 5. <ul><li>Locate lost or stolen devices anywhere in the world </li></ul><ul><li>Remotely wipe out all personal and business data held on the device </li></ul><ul><li>Provide a detailed proof of decommission report for absolute peace of mind </li></ul><ul><li>Invisible to the user </li></ul><ul><li>No user passwords, PIN codes or other intervention required </li></ul><ul><li>Easily installed on mobile phones, smartphones, PDAs and other mobile comms devices </li></ul>
  5. 6. Mobile employee When the device disappears simply log onto the Backstopp Mobile website and wipe the mobile data out directly or notify the appropriate Backstopp operator to perform the decommission. Internal or Managed support service Hosted BackStopp servers
  6. 7. US DoD Data Deletion <ul><li>Upon receiving a secure decommission message all data files, emails, text messages, contacts, appointments and cookies on the lost or stolen device will be destroyed using US Department of Defence standards. </li></ul>
  7. 8. Line of business applications <ul><li>Where the device is used for a line of business application BackStopp Mobile will delete any associated data and go on to permanently shut down the application itself. </li></ul>
  8. 9. Audit Trail <ul><li>Once BackStopp has wiped out the contents of the device it sets about proving it. </li></ul><ul><li>BackStopp returns a detailed report listing what data was erased, when and whether it was accessed in the time that it was lost. </li></ul><ul><li>BackStopp uses GSM cell triangulation to provide a map location of where the device is at the moment it is turned on. </li></ul>
  9. 10. <ul><li>BackStopp Mobile uses US Department of defence standards to remotely destroy any data files, emails, text messages, contacts and appointments stored on a lost or stolen mobile phone. </li></ul><ul><li>Uses GSM cell triangulation to locate a mobile phone anywhere in the world. </li></ul><ul><li>BackStopp Mobile is a subset of BackStopp which can be used to protect other assets in your organisation including laptops, desktops and servers. </li></ul><ul><li>Produces a comprehensive audit trail which is part of an effective Information Assurance policy. </li></ul><ul><li>Low cost Risk Management for your mobile data. </li></ul>Summary