SlideShare a Scribd company logo
1 of 16
Download to read offline
SecuredBOX
Providing security to the things that matter
Are you sure you are secured?
You never know who is
listening and watchingg
TTelecom operators
Software creators
YYour wife
GGoverment and authorities
Competition
Do you really believe that your
data are used only against
terrorism protection?
"And if all others accepted the lie which the Party imposed if all records
told the same tale then the lie passed into history and become truth.
‘Who controls the past’ ran the Party slogan, ‘controls the future: who
controls the present controls the past.”
~ George Orwell, 1984
Do you think we are overreacting?
Look what’s happening in this world and make your own opinion
All your cloud data are provided to
lots of people without your
knowledge
All your emails are stored for 12
months even if you delete them from
your inbox
All your phone conversations are
stored for years in telecom companies
Your IT system can be infiltrated by
other people using Malware and
backdoor software
Yes you can protect your privacy by yourself!
3 simple rules will make you 99,9% more secured than other people
Communicate using
encryption
Keep your data on your
hard drive
Encrypt and protect files
DDon't use any commercial
system for communication to
send important files and to talk to
other people. Use encryption like
SSL to secure your chat
Fight with all people that want to ac-
cess your data in smart way. Keep files
on Hard drive that is placed in your
home or office
Prevent files to be stolen using
encryption. Make sure you have a
copy of your files if your hard drive
is broken
That's why we created one device
that covers all your security needs
One BOX that covers all your security needs
For your Business and home usage.
Secured Communication
Create video conferences up to 16 people in SSL
Peer-to-Peer channel and control it using the BOX in
your own office or home. We are protecting your
private talks with family and business partners
Secured KEY
Use secure entry control system for your lock
in your office area. Restrict access for your
employees and visitors
Secured Drive
Use secured storage up to 2TB that works
like Dropbox or BOX. All files will be
encrypted and secured in physical way.
We are protecting them to be stolen
Secured Drop
Create special place where your customers
can drop files from the internet directly to
your secured drive. Eliminate mail and FTP
that can be infiltrated.
Secured Communication
Create secured video conference rooms up to 16 people
http://www.yourbox.securedbox.com/
Secured Video Conference
You
Your business
partners
Peer 2 Peer Media Stream2048 Encryption Secured File Sharing Nothing in the middle Operator blidness
All data are transfered only
between people without
touching your BOX
We use proffesional SSL
encryption based on 2048/256
bit key and authorized certificate
You can share the files in
secured safe room without
saving them on hard drive
There is nothing in the middle.
All media like Video and Voice
are transfereed between hosts
Our transfered data looks exactly
like other staff in SSL channel.
They can't be saved or encypted
Secured Cloud Drive
Store your important data on encrypted hard drive
http://www.yourbox.securedbox.com/drive
Encrypted Files
Contracts
Progress Data
Business_plan.doc
Secret_lawyer_data.pdf
Operational-strategy.xls
New-design.jpg
On you physical BOX in
the office
Restricted Access Download history
Hardware protection
Burglers protection
We use AES and Blowfish
encryption for every single file
Everything is stored in your office,
not in a internet cloud or CRM
system
Decide who can decrypt the files,
add them or delete them. We
keep history also
We keep history of all decryption
and access points so you know
who stole your data if that
happens
All data are duplicated using RAID
technology to make sure you
protect them in a good way
We protect the box from burglers.
Even if your BOX is stolen nobody
can't decrypt the files, and when
they try to open the BOX all data
will be destroyed
Drop to add file
Secured Drop for important files
Let your customers drop you files in secured way, not email
http://www.yourbox.securedbox.com/drop
My transfered files
client1_file1.pdf
client1_file2.xls
Drop to add file
http://www.yourbox.securedbox.com/drive
CLIENT1
CLIENT2
CLIENT3
CLIENT4
CLIENT5
client1_file1.pdf
client1_file2.xls
You give your customer a website where
he can drop processing flies
Files are visible on your Cloud Secured
Drive in client folder. Files are encrypted
and secured
What’s inside SecuredBOX
Banana Pi M1+
2 x 2.5in 1TB HDD
5V/3A Power Adapter
A20 ARM Coretx -A7 Dual Core
1GB DDR3
10/100/1000 Ethernet RJ45 WIFI
Samsung 1TB silent Drive Raid 1
With Plug for your country
How does it works?
It's plug and play
Connect to Internet
You just enter the Ethernet cable or connect
device to WIFI. Box will connect to the internet
automatically and allow you to access it
Use wizard to set-up
You will find web address attached to your BOX
use it to access your BOX from your regular
web-broswer like Firefox or Mozilla. We will
drive you through simple step-by-step process
where you will set your BOX
Use it!
It's done you can use it by youself or invite other
people. BOX stays in your office or home but it's
available throught the web address. Of course
you can lock it only for your office usage. it's up to
you. Enjoy it!
Choose your own security level
It's your BOX and your rules
All computers in internet network
T
rusted computers from interne
t
Your office
Office only
All services are available only in
your intranet environment
without access to internet
Public access
Restricted access
all your services are open for
public under your own scsbox
domain
You decide what computers or
users can access your services
For whom?
Lawyers/Notaries
Personal
Business people
Newspapers/Blogs
Accountants
Government agencies
Project Management
Finance/Insurance
Use BOX to store your client data
and communicate in secured way
Keep register of your files in a
secure way. Give gateways to your
clients so they can have instant
access to their important files
Store data of your ideas,
communicate and talk about new
ventures, share files with your
partners
Store sensitive information about
people according to best possible
rules. Control who and when get
access and download them
Get files from you clients in more
effective and secured way directly
to your hard-drive
Store data on a device that can be
stoled and infiltrated. Give access to
your sources for dropping files in
secure way. Talk privately with
contacts
Keep all files from your client in
one folder, set privileges to your
employees and communicate in
group to talk about progress
Keep your personal files in a place
where nobody can steal them,
access them in a way you like and
give access to your family
members
Think about it and start using SecuredBOX
Go to www.securedbox.io and order now

More Related Content

What's hot

OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...OSCON Byrum
 
Internet
InternetInternet
InternetKZCheng
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
How to manage your client's data responsibly
How to manage your client's data responsiblyHow to manage your client's data responsibly
How to manage your client's data responsiblyGabor Szathmari
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Deep web & Darknet
Deep web & DarknetDeep web & Darknet
Deep web & DarknetNiloy Sikder
 
Web Browser ! Batra Computer Centre
Web Browser ! Batra Computer CentreWeb Browser ! Batra Computer Centre
Web Browser ! Batra Computer Centrejatin batra
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry
 
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareThe Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareHybrid Cloud
 

What's hot (11)

OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
 
Internet
InternetInternet
Internet
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
HTTPS
HTTPSHTTPS
HTTPS
 
The dark web
The dark webThe dark web
The dark web
 
How to manage your client's data responsibly
How to manage your client's data responsiblyHow to manage your client's data responsibly
How to manage your client's data responsibly
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Deep web & Darknet
Deep web & DarknetDeep web & Darknet
Deep web & Darknet
 
Web Browser ! Batra Computer Centre
Web Browser ! Batra Computer CentreWeb Browser ! Batra Computer Centre
Web Browser ! Batra Computer Centre
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for Government
 
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareThe Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
 

Similar to SecuredBox - Secure your privacy

2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodataSteph Cliche
 
Essential Technologies for Psychologists
Essential Technologies for PsychologistsEssential Technologies for Psychologists
Essential Technologies for PsychologistsBradnor444
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tipspgmaynard
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
CLOUD SERVICE IS NOW OPEN FOR BUSINESS
CLOUD SERVICE IS NOW OPEN FOR BUSINESSCLOUD SERVICE IS NOW OPEN FOR BUSINESS
CLOUD SERVICE IS NOW OPEN FOR BUSINESSStuart Crawford
 
Encrypted mobile communications
Encrypted mobile communicationsEncrypted mobile communications
Encrypted mobile communicationsPhantom Encrypt
 
What is Secured Data Room.pdf
What is Secured Data Room.pdfWhat is Secured Data Room.pdf
What is Secured Data Room.pdfHokme
 
What's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesWhat's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesUL Transaction Security
 
Security and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOSecurity and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOAtlantic Training, LLC.
 
Cloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency CommunicationsCloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency CommunicationsStrategic Insurance Software
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalistsantoniokisembo
 

Similar to SecuredBox - Secure your privacy (20)

2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata
 
Dart Key ENG
Dart Key ENGDart Key ENG
Dart Key ENG
 
virtualdealroom.ent
virtualdealroom.entvirtualdealroom.ent
virtualdealroom.ent
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
Most Secure Messaging Apps.pdf
Most Secure Messaging Apps.pdfMost Secure Messaging Apps.pdf
Most Secure Messaging Apps.pdf
 
Essential Technologies for Psychologists
Essential Technologies for PsychologistsEssential Technologies for Psychologists
Essential Technologies for Psychologists
 
Data security
Data securityData security
Data security
 
CHiWAO_for_All.compressed
CHiWAO_for_All.compressedCHiWAO_for_All.compressed
CHiWAO_for_All.compressed
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
 
MADS6638
MADS6638MADS6638
MADS6638
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
CLOUD SERVICE IS NOW OPEN FOR BUSINESS
CLOUD SERVICE IS NOW OPEN FOR BUSINESSCLOUD SERVICE IS NOW OPEN FOR BUSINESS
CLOUD SERVICE IS NOW OPEN FOR BUSINESS
 
Encrypted mobile communications
Encrypted mobile communicationsEncrypted mobile communications
Encrypted mobile communications
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
What is Secured Data Room.pdf
What is Secured Data Room.pdfWhat is Secured Data Room.pdf
What is Secured Data Room.pdf
 
What's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesWhat's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management Services
 
Security and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOSecurity and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPO
 
E locker
E lockerE locker
E locker
 
Cloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency CommunicationsCloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency Communications
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

SecuredBox - Secure your privacy

  • 1. SecuredBOX Providing security to the things that matter
  • 2. Are you sure you are secured?
  • 3. You never know who is listening and watchingg TTelecom operators Software creators YYour wife GGoverment and authorities Competition
  • 4. Do you really believe that your data are used only against terrorism protection? "And if all others accepted the lie which the Party imposed if all records told the same tale then the lie passed into history and become truth. ‘Who controls the past’ ran the Party slogan, ‘controls the future: who controls the present controls the past.” ~ George Orwell, 1984
  • 5. Do you think we are overreacting? Look what’s happening in this world and make your own opinion All your cloud data are provided to lots of people without your knowledge All your emails are stored for 12 months even if you delete them from your inbox All your phone conversations are stored for years in telecom companies Your IT system can be infiltrated by other people using Malware and backdoor software
  • 6. Yes you can protect your privacy by yourself! 3 simple rules will make you 99,9% more secured than other people Communicate using encryption Keep your data on your hard drive Encrypt and protect files DDon't use any commercial system for communication to send important files and to talk to other people. Use encryption like SSL to secure your chat Fight with all people that want to ac- cess your data in smart way. Keep files on Hard drive that is placed in your home or office Prevent files to be stolen using encryption. Make sure you have a copy of your files if your hard drive is broken
  • 7. That's why we created one device that covers all your security needs
  • 8. One BOX that covers all your security needs For your Business and home usage. Secured Communication Create video conferences up to 16 people in SSL Peer-to-Peer channel and control it using the BOX in your own office or home. We are protecting your private talks with family and business partners Secured KEY Use secure entry control system for your lock in your office area. Restrict access for your employees and visitors Secured Drive Use secured storage up to 2TB that works like Dropbox or BOX. All files will be encrypted and secured in physical way. We are protecting them to be stolen Secured Drop Create special place where your customers can drop files from the internet directly to your secured drive. Eliminate mail and FTP that can be infiltrated.
  • 9. Secured Communication Create secured video conference rooms up to 16 people http://www.yourbox.securedbox.com/ Secured Video Conference You Your business partners Peer 2 Peer Media Stream2048 Encryption Secured File Sharing Nothing in the middle Operator blidness All data are transfered only between people without touching your BOX We use proffesional SSL encryption based on 2048/256 bit key and authorized certificate You can share the files in secured safe room without saving them on hard drive There is nothing in the middle. All media like Video and Voice are transfereed between hosts Our transfered data looks exactly like other staff in SSL channel. They can't be saved or encypted
  • 10. Secured Cloud Drive Store your important data on encrypted hard drive http://www.yourbox.securedbox.com/drive Encrypted Files Contracts Progress Data Business_plan.doc Secret_lawyer_data.pdf Operational-strategy.xls New-design.jpg On you physical BOX in the office Restricted Access Download history Hardware protection Burglers protection We use AES and Blowfish encryption for every single file Everything is stored in your office, not in a internet cloud or CRM system Decide who can decrypt the files, add them or delete them. We keep history also We keep history of all decryption and access points so you know who stole your data if that happens All data are duplicated using RAID technology to make sure you protect them in a good way We protect the box from burglers. Even if your BOX is stolen nobody can't decrypt the files, and when they try to open the BOX all data will be destroyed Drop to add file
  • 11. Secured Drop for important files Let your customers drop you files in secured way, not email http://www.yourbox.securedbox.com/drop My transfered files client1_file1.pdf client1_file2.xls Drop to add file http://www.yourbox.securedbox.com/drive CLIENT1 CLIENT2 CLIENT3 CLIENT4 CLIENT5 client1_file1.pdf client1_file2.xls You give your customer a website where he can drop processing flies Files are visible on your Cloud Secured Drive in client folder. Files are encrypted and secured
  • 12. What’s inside SecuredBOX Banana Pi M1+ 2 x 2.5in 1TB HDD 5V/3A Power Adapter A20 ARM Coretx -A7 Dual Core 1GB DDR3 10/100/1000 Ethernet RJ45 WIFI Samsung 1TB silent Drive Raid 1 With Plug for your country
  • 13. How does it works? It's plug and play Connect to Internet You just enter the Ethernet cable or connect device to WIFI. Box will connect to the internet automatically and allow you to access it Use wizard to set-up You will find web address attached to your BOX use it to access your BOX from your regular web-broswer like Firefox or Mozilla. We will drive you through simple step-by-step process where you will set your BOX Use it! It's done you can use it by youself or invite other people. BOX stays in your office or home but it's available throught the web address. Of course you can lock it only for your office usage. it's up to you. Enjoy it!
  • 14. Choose your own security level It's your BOX and your rules All computers in internet network T rusted computers from interne t Your office Office only All services are available only in your intranet environment without access to internet Public access Restricted access all your services are open for public under your own scsbox domain You decide what computers or users can access your services
  • 15. For whom? Lawyers/Notaries Personal Business people Newspapers/Blogs Accountants Government agencies Project Management Finance/Insurance Use BOX to store your client data and communicate in secured way Keep register of your files in a secure way. Give gateways to your clients so they can have instant access to their important files Store data of your ideas, communicate and talk about new ventures, share files with your partners Store sensitive information about people according to best possible rules. Control who and when get access and download them Get files from you clients in more effective and secured way directly to your hard-drive Store data on a device that can be stoled and infiltrated. Give access to your sources for dropping files in secure way. Talk privately with contacts Keep all files from your client in one folder, set privileges to your employees and communicate in group to talk about progress Keep your personal files in a place where nobody can steal them, access them in a way you like and give access to your family members
  • 16. Think about it and start using SecuredBOX Go to www.securedbox.io and order now