SlideShare a Scribd company logo
Security, Cyber
& Intelligence Solutions
Company Confidential
This presentation and the information herein, are the exclusive properties of BLER Ltd. and shall not be disclosed, in whole or in part, to any third party or utilized for any purpose other
than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of the information in this
presentation, whether in electronic or hard copy form, without the express prior written permission of BLER Ltd. The company may update, amend, supplement or otherwise alter the
information without prior notice.
Company Profile
2
Company Profile
Company Info
BLER Ltd. Is a privately owned company.
Product Portfolio
BLER develops innovative tactical detection
and analytic solutions to meet a wide range
of operational needs and security threats.
Technology Expertise
The company has field proven experience in
the delivery of high quality solutions to large
scale security organizations worldwide.
Industry Experience
The teams has decades of industry
experience and has a clear understanding
of customer needs and work methods.
Partnerships
The company maintains close working
relationships with reputable agents,
resellers and distributors worldwide.
3
Product Portfolio
We deliver specialized tactical mobile device detection and analytics solutions
backed by innovative engineering design and world class operational knowledge
SafeZone Detection SafeZone Analytics
4
Target Customers
Law Enforcement
Agencies
Intelligence
Organizations
Critical
Infrastructure
Public
Transportation
Airport
Security
Public
Safety
Prison
Security
Enterprise
Organizations
Security, Cyber
& Intelligence Solutions
Technology Portfolio
6
SafeZone
Detection
Suite
Tactical detection and blocking of mobile
phones, wi-fi devices and wide band
transmitters in public and restricted
areas both indoor and outdoors.
Airport Security Prison Facilities
Restricted Zones Critical Facilities
7
Mobile Device Detection
Support the entire call flow detection cycle including collection,
processing, tracking and reporting of a target cellphone.
Identify the unique IMSI and TMSI
numbers associated with each phone.
Mobile Device ID
Receive alerts and notifications when black and
white listed phones are captured and identified.
Device Alerts
Trigger to gain control over target phone
functionality
Trigger Control
Detect any device including 2G, 3G,
and 4G networks.
Device Compatibility
8
How It Works
Identify a wide range of wireless transmitters, mobile phones, wi-fi devices, cameras and other RF transmitter devices.
Barracuda
IMSI Catcher
Target Devices
and Sensors
SafeZone Detection
Workstation
Shark
TSCM Detection
9
SafeZone
Analytics
Suite
A full suite of applications for the
capture, collection and analysis of
personal device data, web content and
social media information and network
connections.
Law Enforcement Intelligence
Public Safety Enterprise
 Capture Device ID
‒ IMSI, MSISDN, Device name, MAC Address
 Extract Personal Data
‒ Email account, web browsing data
 Collect Social Media Content
‒ Profile data, images, friends
 Identify Social Networks
‒ Related profiles, group associations
SafeZone Analytics Platform
11
How It Works
Identify a wide range of wireless transmitters, mobile phones, wi-fi devices, cameras and other RF transmitter devices.
Target Devices
and Sensors
SafeZone Detection
Workstation
MEDUSA
ID Detector
12
BLER
Professional
Services
BLER products and solutions are backed
by a wide range of expert system design,
customization, project management and
training services.
13
Project Methodology
System
Design
Requirement
Specifications
Custom
Features
Deployment
& Testing
Training
Workshops
Operation &
Maintenance
System
Integration
Security, Cyber
& Intelligence Solutions
Business Profile
15
Our Value Proposition
BLER enables you to deploy effective, cost-effective solutions based on innovative and field proven technology.
Strong Industry Relationships
The team maintains close working relationships
with major intelligence and cyber organizations
worldwide.
Proven Technology Expertise
The team has gained decades of experience and has
a deep understanding of customer operational needs
and work methods.
Rapid Product Development
The company has a strong in-house development
capability to deliver high quality fast-time-to market
products.
Efficient Business Operation
The team runs a “lean and mean” business operation to
ensure a competitive pricing strategy and cost effective
implementation.
16
Go-To-Market Strategy
Sales &
Marketing
Build-up a strong marketing
and sales organization to
generate initial sales. Leverage
existing customer relationships
to achieve market penetration.
Research &
Development
Consolidate integration of
SafeZone products into a single
platform. Continue development
of fast-time-to-market products.
Business
Development
Develop strong, global strategic
partnerships with agents, resellers
and distributors to create new
business opportunities.

More Related Content

What's hot

Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
Forescout Technologies Inc
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
Block Armour
 
BAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise AssessmentBAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise AssessmentPrahlad Reddy
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
Block Armour
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is Yours
Dilum Bandara
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa
 
IOT Security
IOT SecurityIOT Security
IOT Security
Sylvain Martinez
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
Zoe Gilbert
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFH
Block Armour
 
Shining a Light on Shadow Devices
Shining a Light on Shadow DevicesShining a Light on Shadow Devices
Shining a Light on Shadow Devices
Forescout Technologies Inc
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
Forescout Technologies Inc
 
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
DVV Solutions Third Party Risk Management
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Block Armour
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
Jignesh Solanki
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Forescout Technologies Inc
 
Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?
Samsung SDS America
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming Security
Robert Herjavec
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
Arvind Tiwary
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
Srivatsan Desikan
 

What's hot (20)

Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
 
BAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise AssessmentBAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise Assessment
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is Yours
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFH
 
Shining a Light on Shadow Devices
Shining a Light on Shadow DevicesShining a Light on Shadow Devices
Shining a Light on Shadow Devices
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
 
Resume
ResumeResume
Resume
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming Security
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
 

Viewers also liked

Economics: One Stop Shop
Economics: One Stop ShopEconomics: One Stop Shop
Economics: One Stop Shop
Brianna Graves
 
Tulum
TulumTulum
Gizzelle Rojas Boccia Resume 11.6.16
Gizzelle Rojas Boccia Resume 11.6.16Gizzelle Rojas Boccia Resume 11.6.16
Gizzelle Rojas Boccia Resume 11.6.16Gizzelle Rojas Boccia
 
Analysis of men's wearhouse
Analysis of men's wearhouseAnalysis of men's wearhouse
Analysis of men's wearhouse
Wanqing Tang
 
Analysis of Men's Wearhouse
Analysis of Men's WearhouseAnalysis of Men's Wearhouse
Analysis of Men's Wearhouse
Wanqing Tang
 
AJEET GUPTA
AJEET GUPTAAJEET GUPTA
AJEET GUPTA
ajeet gupta
 
Qualcomm lte-performance-challenges-09-01-2011
Qualcomm lte-performance-challenges-09-01-2011Qualcomm lte-performance-challenges-09-01-2011
Qualcomm lte-performance-challenges-09-01-2011Muhammad Noor Ifansyah
 
Elementos y ángulos
Elementos y ángulosElementos y ángulos
Elementos y ángulos
Giorgeana Tapia
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
SlideShare
 

Viewers also liked (10)

Economics: One Stop Shop
Economics: One Stop ShopEconomics: One Stop Shop
Economics: One Stop Shop
 
Tulum
TulumTulum
Tulum
 
Gizzelle Rojas Boccia Resume 11.6.16
Gizzelle Rojas Boccia Resume 11.6.16Gizzelle Rojas Boccia Resume 11.6.16
Gizzelle Rojas Boccia Resume 11.6.16
 
Analysis of men's wearhouse
Analysis of men's wearhouseAnalysis of men's wearhouse
Analysis of men's wearhouse
 
Analysis of Men's Wearhouse
Analysis of Men's WearhouseAnalysis of Men's Wearhouse
Analysis of Men's Wearhouse
 
AJEET GUPTA
AJEET GUPTAAJEET GUPTA
AJEET GUPTA
 
Qualcomm lte-performance-challenges-09-01-2011
Qualcomm lte-performance-challenges-09-01-2011Qualcomm lte-performance-challenges-09-01-2011
Qualcomm lte-performance-challenges-09-01-2011
 
Elementos y ángulos
Elementos y ángulosElementos y ángulos
Elementos y ángulos
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to BLER_Company Intro

Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive Data
Digital Shadows
 
QRadar-XDR-Solution.pdf
QRadar-XDR-Solution.pdfQRadar-XDR-Solution.pdf
QRadar-XDR-Solution.pdf
ssuserf5beb3
 
I3 Technologies Corporation Profile
I3 Technologies Corporation ProfileI3 Technologies Corporation Profile
I3 Technologies Corporation Profilejaymieann
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015Tarek Medini
 
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Block Armour
 
Block Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter Brochure
Block Armour
 
Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows
 
Seclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore Advantage Channel Program
Seclore Advantage Channel Program
Seclore
 
Fastest Growing Cybersecurity Companies.pptx
Fastest Growing Cybersecurity Companies.pptxFastest Growing Cybersecurity Companies.pptx
Fastest Growing Cybersecurity Companies.pptx
SonaliG6
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
Seclore
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
seqriteseo
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
Riaan Bellingan
 
Esd Networks India
Esd Networks IndiaEsd Networks India
Esd Networks India
ESD Networks India
 
Esd Networks india
Esd Networks indiaEsd Networks india
Esd Networks india
ESD Networks India
 
Guide to Understanding Cloud App Security Licensing.pptx
Guide to Understanding Cloud App Security Licensing.pptxGuide to Understanding Cloud App Security Licensing.pptx
Guide to Understanding Cloud App Security Licensing.pptx
Technology Solutions Worldwide
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
Finite Moments
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
David J Rosenthal
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
J
 
Rights Management SDK & API Data Protection Solutions
Rights Management SDK & API Data Protection SolutionsRights Management SDK & API Data Protection Solutions
Rights Management SDK & API Data Protection Solutions
Seclore
 

Similar to BLER_Company Intro (20)

Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive Data
 
QRadar-XDR-Solution.pdf
QRadar-XDR-Solution.pdfQRadar-XDR-Solution.pdf
QRadar-XDR-Solution.pdf
 
I3 Technologies Corporation Profile
I3 Technologies Corporation ProfileI3 Technologies Corporation Profile
I3 Technologies Corporation Profile
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015
 
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
 
Block Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter Brochure
 
Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration Datasheet
 
Seclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore Advantage Channel Program
Seclore Advantage Channel Program
 
Fastest Growing Cybersecurity Companies.pptx
Fastest Growing Cybersecurity Companies.pptxFastest Growing Cybersecurity Companies.pptx
Fastest Growing Cybersecurity Companies.pptx
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Finance
FinanceFinance
Finance
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
Esd Networks India
Esd Networks IndiaEsd Networks India
Esd Networks India
 
Esd Networks india
Esd Networks indiaEsd Networks india
Esd Networks india
 
Guide to Understanding Cloud App Security Licensing.pptx
Guide to Understanding Cloud App Security Licensing.pptxGuide to Understanding Cloud App Security Licensing.pptx
Guide to Understanding Cloud App Security Licensing.pptx
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
Rights Management SDK & API Data Protection Solutions
Rights Management SDK & API Data Protection SolutionsRights Management SDK & API Data Protection Solutions
Rights Management SDK & API Data Protection Solutions
 

BLER_Company Intro

  • 1. Security, Cyber & Intelligence Solutions Company Confidential This presentation and the information herein, are the exclusive properties of BLER Ltd. and shall not be disclosed, in whole or in part, to any third party or utilized for any purpose other than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of the information in this presentation, whether in electronic or hard copy form, without the express prior written permission of BLER Ltd. The company may update, amend, supplement or otherwise alter the information without prior notice. Company Profile
  • 2. 2 Company Profile Company Info BLER Ltd. Is a privately owned company. Product Portfolio BLER develops innovative tactical detection and analytic solutions to meet a wide range of operational needs and security threats. Technology Expertise The company has field proven experience in the delivery of high quality solutions to large scale security organizations worldwide. Industry Experience The teams has decades of industry experience and has a clear understanding of customer needs and work methods. Partnerships The company maintains close working relationships with reputable agents, resellers and distributors worldwide.
  • 3. 3 Product Portfolio We deliver specialized tactical mobile device detection and analytics solutions backed by innovative engineering design and world class operational knowledge SafeZone Detection SafeZone Analytics
  • 5. Security, Cyber & Intelligence Solutions Technology Portfolio
  • 6. 6 SafeZone Detection Suite Tactical detection and blocking of mobile phones, wi-fi devices and wide band transmitters in public and restricted areas both indoor and outdoors. Airport Security Prison Facilities Restricted Zones Critical Facilities
  • 7. 7 Mobile Device Detection Support the entire call flow detection cycle including collection, processing, tracking and reporting of a target cellphone. Identify the unique IMSI and TMSI numbers associated with each phone. Mobile Device ID Receive alerts and notifications when black and white listed phones are captured and identified. Device Alerts Trigger to gain control over target phone functionality Trigger Control Detect any device including 2G, 3G, and 4G networks. Device Compatibility
  • 8. 8 How It Works Identify a wide range of wireless transmitters, mobile phones, wi-fi devices, cameras and other RF transmitter devices. Barracuda IMSI Catcher Target Devices and Sensors SafeZone Detection Workstation Shark TSCM Detection
  • 9. 9 SafeZone Analytics Suite A full suite of applications for the capture, collection and analysis of personal device data, web content and social media information and network connections. Law Enforcement Intelligence Public Safety Enterprise
  • 10.  Capture Device ID ‒ IMSI, MSISDN, Device name, MAC Address  Extract Personal Data ‒ Email account, web browsing data  Collect Social Media Content ‒ Profile data, images, friends  Identify Social Networks ‒ Related profiles, group associations SafeZone Analytics Platform
  • 11. 11 How It Works Identify a wide range of wireless transmitters, mobile phones, wi-fi devices, cameras and other RF transmitter devices. Target Devices and Sensors SafeZone Detection Workstation MEDUSA ID Detector
  • 12. 12 BLER Professional Services BLER products and solutions are backed by a wide range of expert system design, customization, project management and training services.
  • 14. Security, Cyber & Intelligence Solutions Business Profile
  • 15. 15 Our Value Proposition BLER enables you to deploy effective, cost-effective solutions based on innovative and field proven technology. Strong Industry Relationships The team maintains close working relationships with major intelligence and cyber organizations worldwide. Proven Technology Expertise The team has gained decades of experience and has a deep understanding of customer operational needs and work methods. Rapid Product Development The company has a strong in-house development capability to deliver high quality fast-time-to market products. Efficient Business Operation The team runs a “lean and mean” business operation to ensure a competitive pricing strategy and cost effective implementation.
  • 16. 16 Go-To-Market Strategy Sales & Marketing Build-up a strong marketing and sales organization to generate initial sales. Leverage existing customer relationships to achieve market penetration. Research & Development Consolidate integration of SafeZone products into a single platform. Continue development of fast-time-to-market products. Business Development Develop strong, global strategic partnerships with agents, resellers and distributors to create new business opportunities.