Overview 	<br />
Internet Reputation Management<br />What is IRM?<br />Gaining visibility over online presence <br />Understanding impact o...
Internet Reputation Management<br /> We protect corporations from Internet threats to Revenues, Rights and Reputation<br /...
Company Overview<br />Toronto based company, founded 2001 <br />Award winning proprietary Technology<br />Certified by F.I...
Awards<br />Forrester Wave Research <br />Brand Monitoring Q3, 2006<br />“Rated # 1 in Customer Satisfaction”<br />High Pe...
Sample Customers<br />6<br />
      Internet Threats now Serious Business<br />Crime is evolving, more organized and sophisticated<br />Threats have mov...
A Growing Threat<br />By the end of 2010, criminals will routinely use the Internet to extort funds from organizations, th...
How companies benefit from “Protection”<br />
The Anatomy of a Brand’s Reputation <br />“Customers and the broader Community shape their perception of brands every time...
Internet Reputation Management<br />“You Can’t do IRM without integrating all 3!!!”<br />
Registrars<br />Service Providers<br />Legal Counsel<br />Agencies<br />International<br />Law Enforcement<br />Web Hostin...
Steps to Internet Protection<br />13<br />
DETECTION, ANALYSIS and MITIGATION of:<br /><ul><li>Identity Theft
Phishing, Pharming, Vishing, SMShing
Malware
Brand Abuses
Intellectual Property Rights Abuse
Traffic Diversion and Unauthorized Association
Upcoming SlideShare
Loading in …5
×

Bp Corp Pres Short

702 views

Published on

An overview of BrandProtect and its services

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
702
On SlideShare
0
From Embeds
0
Number of Embeds
14
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Deloitte: Technology Fast 50 - “company to watch” (2007)AlwaysOn: Top 100 companies winner for innovation in media (2007)AlwaysOn: Top 100 companies winner for technology innovation (2006)Microsoft: Winner – High Performance Computing Technology global winner (2006)From 2700 entries across the globe Brandimensions technology selected as number 1
  • Allowing issues to go unchecked can lead to irreversible damage, a reputation “Tipping Point
  • Bp Corp Pres Short

    1. 1. Overview <br />
    2. 2. Internet Reputation Management<br />What is IRM?<br />Gaining visibility over online presence <br />Understanding impact on Corporate Image and Values<br />Taking appropriate action<br />
    3. 3. Internet Reputation Management<br /> We protect corporations from Internet threats to Revenues, Rights and Reputation<br /> Continuous Monitoring of the internet<br /> Tools to Manage online presence <br /> Facilitate coordination across the organization<br /> Access to 24x7 response team<br />
    4. 4. Company Overview<br />Toronto based company, founded 2001 <br />Award winning proprietary Technology<br />Certified by F.I.R.S.T(Forum for Incident Response Security Teams)<br />FS-ISAC Affiliate Board Advisor (Financial Services-Information Sharing and Analysis Center)<br />Microsoft & Firefox “Flow through” Phishing Filter data provider<br />4<br />
    5. 5. Awards<br />Forrester Wave Research <br />Brand Monitoring Q3, 2006<br />“Rated # 1 in Customer Satisfaction”<br />High Performance Computing Technology Global WINNER(2006)<br />9th fastest growing Canadian Tech company 2003-2007<br />WINNER 2007: innovation in media WINNER 2006: Technology innovation<br />5<br />
    6. 6. Sample Customers<br />6<br />
    7. 7. Internet Threats now Serious Business<br />Crime is evolving, more organized and sophisticated<br />Threats have moved from stealing money to stealing identities<br />Malware and computer scams are growing exponentially<br />15% of Goods sold online are estimated to be counterfeit<br />Social Media can be the source of brand and financial disaster<br />CEO’s are INVOLVED, as MARKET VALUES are affected<br />7<br />
    8. 8. A Growing Threat<br />By the end of 2010, criminals will routinely use the Internet to extort funds from organizations, threatening to damage their corporate reputation by ensuring that routine online search requests will return negative or even libelous results……<br />&quot;If your business depends on a positive Internet reputation, then you have little choice than to explicitly manage that reputation online. The Internet is like a bad-news Petri dish; negative information multiplies and spreads with frightening speed and becomes virtually impossible to erase.“<br />8<br />
    9. 9. How companies benefit from “Protection”<br />
    10. 10. The Anatomy of a Brand’s Reputation <br />“Customers and the broader Community shape their perception of brands every time they come into contact with them”<br />
    11. 11. Internet Reputation Management<br />“You Can’t do IRM without integrating all 3!!!”<br />
    12. 12. Registrars<br />Service Providers<br />Legal Counsel<br />Agencies<br />International<br />Law Enforcement<br />Web Hosting<br />Your Internet Ecosystem<br />12<br />
    13. 13. Steps to Internet Protection<br />13<br />
    14. 14. DETECTION, ANALYSIS and MITIGATION of:<br /><ul><li>Identity Theft
    15. 15. Phishing, Pharming, Vishing, SMShing
    16. 16. Malware
    17. 17. Brand Abuses
    18. 18. Intellectual Property Rights Abuse
    19. 19. Traffic Diversion and Unauthorized Association
    20. 20. Counterfeiting
    21. 21. Website Integrity issues
    22. 22. Domain Management
    23. 23. Defamatory Discussion
    24. 24. Discussion Monitoring
    25. 25. Social Media Engagement</li></ul>BrandProtect Services<br />
    26. 26. Search, Tracking and Analysis Technology<br />Our Proprietary Technology including Link Walker™andImage Walker™ mines the WEB 7x24 for potentially threatening content, images and discussion and ensuresclients have access to: LinkMap™ and LinkData™ one of the largest maps of the internet with: 90 Billion Links300 Million Domains 12 Billion Web PagesVARI-Score™ Our proprietary automated scoring and classification algorithm with a built in “Learning System”<br />15<br />
    27. 27. Mitigation Support and Services<br />24-7 (follow the sun) Incident Response Team<br />Rapid response service to deal with all forms of identity theft attacks (Phishing, Vishing, SMShing, Pharming and Malware)<br />Automated Cease and Desist capabilities<br />Systems tailored to customer specific guidelines in addressing infractions<br />Social Media Engagement team<br />Subject matter expertise in-house and through partner providers<br />Education Support<br />For employees: Incident response guidelines and simulated attack education<br />For customers: Browser plug-ins to help identify fraudulent websites<br />Workflow Management<br />Secure Portal with enhanced functionality for case management, trending and reporting, as well as Forensics for litigation support<br />
    28. 28. Coordinated Response Who is your company’s Chief Reputation Officer?<br />Legal<br />Webmaster<br />HR<br />Marketing/<br />Sales<br />Security/IT<br />IR/PR<br />Corporate Communications<br />
    29. 29. Cost Drivers<br /><ul><li>Number of brands
    30. 30. Complexity of search
    31. 31. Human intervention requirements
    32. 32. Reporting frequency
    33. 33. Scope and synergy of services selected
    34. 34. Takedown frequency</li></li></ul><li>Insure Your Online reputation<br /><ul><li>Proactive Management of Risks and Opportunities
    35. 35. Integrated Cross-Functional Oversight
    36. 36. Sophisticated Technology Tools
    37. 37. Expertise, “on call” and always available
    38. 38. Rapid and Straightforward Implementation</li></ul>19<br />

    ×