SlideShare a Scribd company logo
1 of 26
"For many professionals, the mobile
phone has become a mobile office,“
- Mike Jones, Symantec
"There is no question that mobile security
will eventually equal – if not surpass – PC
security as a threat to IT departments,"
- Denise Culver, Heavy Reading Mobile Networks Insider
“Internal attacks are one of the biggest
threats facing your data and systems,”
-Cortney Thompson, CTO of Green House Data
“According to a BT study, mobile
security breaches have affected more
than two-thirds (68 %) of global
organizations in the last 12 months.”
“Implement mobile security solutions that protect both
corporate data and access to corporate systems while
also respecting user’s privacy through containerization,”
- Nicko van Someren, CTO, Good Technology
• People store much personal info on them: email, calendars,
contacts, pictures, etc.
• Sensitive organizational information.
• Can fit in pockets, easily lost/stolen.
• Built-in billing system: SMS/MMS (mobile operator), in-app
purchases (credit card), etc.
• Many new devices have near field communications (NFC), used
for contactless payments, etc.
• Your device becomes your credit card
• Location privacy issues
With the explosive growth of smartphones, tablets and mobile
devices, companies must find a means of providing access to their
internal systems,information to their mobile workforce securely and
seamlessly along with securing highly sensitive and important data
from stealing.Not only that it’s a high time that we secure devices
from physical damages and theft.
1.AVAILABLE OPTIONS
6.DISCARD/SELL
4.PROTECT
2.DECIDE WHAT TO
BUY
5.USE
3.BUY
SMARTPHONES
• DATA STORED IN MOBILE.
• DEVICE FROM PHYSICAL DAMAGE/THEFT.
• CONTACTS
• MESSAGES
• MAILS
• USERNAME/PASSWORDS
• MEDIA FILES(PICTURES,VIDEOS etc.)
• DOCUMENTS(TEXT FILES,PDFs,PPTs)
• NOTES/REMINDERS.
• VOICE RECORDINGS.
• IMP. DATAS INSIDE APPS.etc.
WHY
PROTECT?
PRIVACY
HERE’S WHAT WE WANT
TO OFFER:
• MALWARE PROTECTION.
• IDENTITY THEFT PROTECTION.
• ENCRYPTION OF DATA.
• FREE CLOUD STORAGE FOR DATA BACK UP.
• INSURANCE OF DEVICE.
• HASSLE FREE CLAIMS!!
Do you have
a smart
phone?
Does it
contain
data?
Does it
contain
photos and
videos?
Do you keep
important
business
information?
Do you use
internet for
monetary
transactions?
• The attacker can manipulate the smart phone as a zombie machine.
• The attacker can easily force the smart phone to make phone calls.
• A compromised smart phone can record conversations between the user and
others and send them to a third party calls.
• An attacker can also steal a user's identity, usurp their identity and thus
impersonate the owner.
• The attacker can reduce the utility of the smart phone, by discharging the battery.
• The attacker can prevent the operation and/or starting of the smart phone by
making it unusable.
• The attacker can remove the personal (photos, music, videos, etc.) or professional
data (contacts, calendars, notes) of the user
TEENAGERS
YOUNG PROFFESSIONALS
MID LEVEL MANAGERS
MODERATE TO HIGH INTERNET USAGE
MOBILE PRICE RANGING BETWEEN 5000-49,999
SMART
AVERT RISK
VALUE FOR
MONEY
LONG TERM
PROTECTION
TENSION
FREE!
•Free up space (for more of the apps & media you love)-
Safely remove hidden clutter, unused apps, calling history, your
largest files, & more to free up space for even more of the apps,
photos, & music you love most.
•Control what you share (across all major social networks)-
Our product takes you straight to your privacy settings to give you
the pros & cons of each one. From there, you can easily turn any of
them on or off with just a click.
•Scan device
Offers multiple scanning options such as Full Scan, Scan All
Apps, Scan Selected Apps, Scan Memory Card and Scan
Selected Folders.
• Security Advisor:
The Security Advisor guides you about settings that can
enhance the overall security of your Smartphone. For
example, if the 'Screen Lock' setting is not enabled on your
phone, then the Security Advisor will instruct you to
enable it.
• Set Privacy-The Set Privacy feature allows you to protect your
privacy with the following functionalities,
1. Call & Message Filter:
With this feature you can easily block incoming calls and SMSs from
unknown or unwanted numbers. And now, you can also use this
feature to block all numbers within a particular series.
2. International Call Block:
This feature allows you to block unknown International calls.
1. Anti-Theft / Remote Device Management
2. Quick Settings Notification
3. Personal Security
4. Intruder detection
5. Security Shield
6. Trusted SIMs List
-As,we already talked about mobile threat and attack .Their exist
another problem device loss and theft.We will just give you a small
statistics about mobile device loss and theft.
-Many mobile devices lost, stolen each year
200 mobile phones lost/stolen every minute in the INDIA .
56% of us misplace our mobile phone or laptop each
month .
Cell phone owner/users who can insure their mobile telephone
instrument from loss and/or damages under this policy.
The policy for mobile phones provides cover against:
• Fire.
• Riot, strike, malicious damage and terrorist activities.
• Theft.
• Accident.
• Fortuitous circumstances.
Exclusions under the mobile phone insurance policy are-
• Mysterious disappearance.
• Theft from unattended vehicles, except from fully enclosed car that is
securely locked.
• Theft, loss or damage during the hire or loan to a third party.
• Mechanical and electronic breakdown or derangement.
• Overloading and experimentation involving imposition of any abnormal
conditions.
• Damage by wear and tear, vermin, atmospheric or climatic condition or
gradual deterioration, inherent defect or from any process of cleaning,
repairing or maintenance.
• Loss or damage due to war or nuclear perils, loss by water or from any
water borne craft.
• Intentional or willful act of the insured party.
The insurance cover provides compensation equivalent
to the the cost of replacement of the instrument by a
new instrument of the same specification and same
capacity, including all taxes and duties.
• WHAT WE ARE PROVIDING
INSURANCE
FOR THEFT
MOBILE
DATA
SECURITY
INSURANCE
FOR
DAMAGE
WORLD CLASS
SERVICE
ASSURANCE
FROM BEST
TECH EXPERT
CLOUD
STORAGE
EASY
INSURANCE
CLAMING
CHEAP
INSURANCE
PRICE
Hand set /tablet
price(INR.)
MARKET PRICE
OF OTHER
INSURANCE(INR
) /ANNUM
MOBISHIELD
price(INR.)/
ANNUM
Total
price(MOBISHIELD
APP
+Insurance)(INR.)/AN
NUM
4000-9999 599 300 700
10,000-14,999 799 450 850
15,000-24,999 1299 800 1200
*Terms and conditions apply
ONE MONTH FREETRAIL VERSION
20% DISCOUNT
Mobisheild  sales promotion  presentation.
Mobisheild  sales promotion  presentation.

More Related Content

What's hot

11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Security measure
Security measureSecurity measure
Security measuresanizah_md
 
Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain SecurityICSA, LLC
 
06. security concept
06. security concept06. security concept
06. security conceptMuhammad Ahad
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationHafiza Abas
 
COMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITYCOMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITYzenbrowski
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterpriseAbha Damani
 
Application of security computer
Application of security computerApplication of security computer
Application of security computeribrahimzubairu2003
 
Surveillance in the workplace - what you should know
Surveillance in the workplace - what you should knowSurveillance in the workplace - what you should know
Surveillance in the workplace - what you should knowRay Welling
 

What's hot (20)

11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Hacking
Hacking Hacking
Hacking
 
INTRODUCTION TO SECURITY
INTRODUCTION TO SECURITYINTRODUCTION TO SECURITY
INTRODUCTION TO SECURITY
 
Security measure
Security measureSecurity measure
Security measure
 
Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain Security
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer security
Computer securityComputer security
Computer security
 
06. security concept
06. security concept06. security concept
06. security concept
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and Operation
 
9 - Security
9 - Security9 - Security
9 - Security
 
COMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITYCOMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITY
 
Information security
Information securityInformation security
Information security
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterprise
 
Application of security computer
Application of security computerApplication of security computer
Application of security computer
 
Cyber crime and security (1)
Cyber crime and security (1)Cyber crime and security (1)
Cyber crime and security (1)
 
Surveillance in the workplace - what you should know
Surveillance in the workplace - what you should knowSurveillance in the workplace - what you should know
Surveillance in the workplace - what you should know
 

Viewers also liked

Mobile Product Strategy Keynote Presentation for Mobile App Europe Conference...
Mobile Product Strategy Keynote Presentation for Mobile App Europe Conference...Mobile Product Strategy Keynote Presentation for Mobile App Europe Conference...
Mobile Product Strategy Keynote Presentation for Mobile App Europe Conference...Marc C. Lange
 
Product Launching Presentation
Product Launching PresentationProduct Launching Presentation
Product Launching Presentationdianaists
 
500’s Demo Day Batch 16 >> Podozi
500’s Demo Day Batch 16 >>  Podozi500’s Demo Day Batch 16 >>  Podozi
500’s Demo Day Batch 16 >> Podozi500 Startups
 
How Wealthsimple raised $2M in 2 weeks
How Wealthsimple raised $2M in 2 weeksHow Wealthsimple raised $2M in 2 weeks
How Wealthsimple raised $2M in 2 weeksWealthsimple
 
AdPushup Fundraising Deck - First Pitch
AdPushup Fundraising Deck - First PitchAdPushup Fundraising Deck - First Pitch
AdPushup Fundraising Deck - First Pitchadpushup
 
AppVirality.com - Investor Pitch Deck
AppVirality.com - Investor Pitch DeckAppVirality.com - Investor Pitch Deck
AppVirality.com - Investor Pitch DeckLaxman Papineni
 
Zenpayroll Pitch Deck Template
Zenpayroll Pitch Deck TemplateZenpayroll Pitch Deck Template
Zenpayroll Pitch Deck TemplateJoseph Hsieh
 
The 10 most interesting slides that helped our SaaS company raise 9 million
The 10 most interesting slides that helped our SaaS company raise 9 millionThe 10 most interesting slides that helped our SaaS company raise 9 million
The 10 most interesting slides that helped our SaaS company raise 9 millionGoCanvas
 
The deck we used to raise $270k for our startup Castle
The deck we used to raise $270k for our startup CastleThe deck we used to raise $270k for our startup Castle
The deck we used to raise $270k for our startup Castleentercastle
 
Investor Presentation Template
Investor Presentation TemplateInvestor Presentation Template
Investor Presentation TemplateShai Goldman
 
Swipes pitch deck for Beta Pitch 2013 Finals in Berlin
Swipes pitch deck for Beta Pitch 2013 Finals in BerlinSwipes pitch deck for Beta Pitch 2013 Finals in Berlin
Swipes pitch deck for Beta Pitch 2013 Finals in BerlinSwipes App
 
The Deck We Used to Raise $1M Seed Round
The Deck We Used to Raise $1M Seed RoundThe Deck We Used to Raise $1M Seed Round
The Deck We Used to Raise $1M Seed RoundBen Lang
 
Fittr Pitch Deck
Fittr Pitch DeckFittr Pitch Deck
Fittr Pitch Decknolanperk
 
Sequoia Capital Pitch Deck Template
Sequoia Capital Pitch Deck TemplateSequoia Capital Pitch Deck Template
Sequoia Capital Pitch Deck TemplateMalcolm Lewis
 
Foursquare's 1st Pitch Deck
Foursquare's 1st Pitch DeckFoursquare's 1st Pitch Deck
Foursquare's 1st Pitch DeckRami Al-Karmi
 
Linkedin Series B Pitch Deck
Linkedin Series B Pitch DeckLinkedin Series B Pitch Deck
Linkedin Series B Pitch DeckJoseph Hsieh
 

Viewers also liked (20)

MOBILE APP PRESENTATION
MOBILE APP PRESENTATIONMOBILE APP PRESENTATION
MOBILE APP PRESENTATION
 
Mobile Product Strategy Keynote Presentation for Mobile App Europe Conference...
Mobile Product Strategy Keynote Presentation for Mobile App Europe Conference...Mobile Product Strategy Keynote Presentation for Mobile App Europe Conference...
Mobile Product Strategy Keynote Presentation for Mobile App Europe Conference...
 
Product Launching Presentation
Product Launching PresentationProduct Launching Presentation
Product Launching Presentation
 
Square Pitch Deck
Square Pitch DeckSquare Pitch Deck
Square Pitch Deck
 
500’s Demo Day Batch 16 >> Podozi
500’s Demo Day Batch 16 >>  Podozi500’s Demo Day Batch 16 >>  Podozi
500’s Demo Day Batch 16 >> Podozi
 
How Wealthsimple raised $2M in 2 weeks
How Wealthsimple raised $2M in 2 weeksHow Wealthsimple raised $2M in 2 weeks
How Wealthsimple raised $2M in 2 weeks
 
AdPushup Fundraising Deck - First Pitch
AdPushup Fundraising Deck - First PitchAdPushup Fundraising Deck - First Pitch
AdPushup Fundraising Deck - First Pitch
 
AppVirality.com - Investor Pitch Deck
AppVirality.com - Investor Pitch DeckAppVirality.com - Investor Pitch Deck
AppVirality.com - Investor Pitch Deck
 
SteadyBudget's Seed Funding Pitch Deck
SteadyBudget's Seed Funding Pitch DeckSteadyBudget's Seed Funding Pitch Deck
SteadyBudget's Seed Funding Pitch Deck
 
Zenpayroll Pitch Deck Template
Zenpayroll Pitch Deck TemplateZenpayroll Pitch Deck Template
Zenpayroll Pitch Deck Template
 
The 10 most interesting slides that helped our SaaS company raise 9 million
The 10 most interesting slides that helped our SaaS company raise 9 millionThe 10 most interesting slides that helped our SaaS company raise 9 million
The 10 most interesting slides that helped our SaaS company raise 9 million
 
The deck we used to raise $270k for our startup Castle
The deck we used to raise $270k for our startup CastleThe deck we used to raise $270k for our startup Castle
The deck we used to raise $270k for our startup Castle
 
Investor Presentation Template
Investor Presentation TemplateInvestor Presentation Template
Investor Presentation Template
 
Swipes pitch deck for Beta Pitch 2013 Finals in Berlin
Swipes pitch deck for Beta Pitch 2013 Finals in BerlinSwipes pitch deck for Beta Pitch 2013 Finals in Berlin
Swipes pitch deck for Beta Pitch 2013 Finals in Berlin
 
Manpacks
ManpacksManpacks
Manpacks
 
The Deck We Used to Raise $1M Seed Round
The Deck We Used to Raise $1M Seed RoundThe Deck We Used to Raise $1M Seed Round
The Deck We Used to Raise $1M Seed Round
 
Fittr Pitch Deck
Fittr Pitch DeckFittr Pitch Deck
Fittr Pitch Deck
 
Sequoia Capital Pitch Deck Template
Sequoia Capital Pitch Deck TemplateSequoia Capital Pitch Deck Template
Sequoia Capital Pitch Deck Template
 
Foursquare's 1st Pitch Deck
Foursquare's 1st Pitch DeckFoursquare's 1st Pitch Deck
Foursquare's 1st Pitch Deck
 
Linkedin Series B Pitch Deck
Linkedin Series B Pitch DeckLinkedin Series B Pitch Deck
Linkedin Series B Pitch Deck
 

Similar to Mobisheild sales promotion presentation.

10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirusconnectsafe
 
Attacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptxAttacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptxNitishChoudhary23
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesFaizan Shaikh
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeRocket Matter, LLC
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingCorporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingSignals Defense, LLC
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?Miradore
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 

Similar to Mobisheild sales promotion presentation. (20)

10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus
 
Attacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptxAttacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptx
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Information security
Information securityInformation security
Information security
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingCorporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
 
3 steps security
3 steps security3 steps security
3 steps security
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 

Recently uploaded

Mastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldMastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldScalenut
 
Local SEO Domination: Put your business at the forefront of local searches!
Local SEO Domination:  Put your business at the forefront of local searches!Local SEO Domination:  Put your business at the forefront of local searches!
Local SEO Domination: Put your business at the forefront of local searches!dstvtechnician
 
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Richard Ingilby
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxarsathsahil
 
Call Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCRCall Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCRSapana Sha
 
How to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessHow to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessAggregage
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...aditipandeya
 
April 2024 - VBOUT Partners Meeting Group
April 2024 - VBOUT Partners Meeting GroupApril 2024 - VBOUT Partners Meeting Group
April 2024 - VBOUT Partners Meeting GroupVbout.com
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceDamien ROBERT
 
Aryabhata I, II of mathematics of both.pptx
Aryabhata I, II of mathematics of both.pptxAryabhata I, II of mathematics of both.pptx
Aryabhata I, II of mathematics of both.pptxtegevi9289
 
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Search Engine Journal
 
Forecast of Content Marketing through AI
Forecast of Content Marketing through AIForecast of Content Marketing through AI
Forecast of Content Marketing through AIRinky
 

Recently uploaded (20)

Mastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldMastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven World
 
Local SEO Domination: Put your business at the forefront of local searches!
Local SEO Domination:  Put your business at the forefront of local searches!Local SEO Domination:  Put your business at the forefront of local searches!
Local SEO Domination: Put your business at the forefront of local searches!
 
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
 
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel LeminTurn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
 
No Cookies No Problem - Steve Krull, Be Found Online
No Cookies No Problem - Steve Krull, Be Found OnlineNo Cookies No Problem - Steve Krull, Be Found Online
No Cookies No Problem - Steve Krull, Be Found Online
 
Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...
Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...
Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptx
 
The Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison KaltmanThe Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison Kaltman
 
Call Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCRCall Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCR
 
How to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessHow to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail Success
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
 
April 2024 - VBOUT Partners Meeting Group
April 2024 - VBOUT Partners Meeting GroupApril 2024 - VBOUT Partners Meeting Group
April 2024 - VBOUT Partners Meeting Group
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
 
How to Create a Social Media Plan Like a Pro - Jordan Scheltgen
How to Create a Social Media Plan Like a Pro - Jordan ScheltgenHow to Create a Social Media Plan Like a Pro - Jordan Scheltgen
How to Create a Social Media Plan Like a Pro - Jordan Scheltgen
 
Aryabhata I, II of mathematics of both.pptx
Aryabhata I, II of mathematics of both.pptxAryabhata I, II of mathematics of both.pptx
Aryabhata I, II of mathematics of both.pptx
 
Top 5 Breakthrough AI Innovations Elevating Content Creation and Personalizat...
Top 5 Breakthrough AI Innovations Elevating Content Creation and Personalizat...Top 5 Breakthrough AI Innovations Elevating Content Creation and Personalizat...
Top 5 Breakthrough AI Innovations Elevating Content Creation and Personalizat...
 
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose GuirgisCreator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
 
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
 
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
 
Forecast of Content Marketing through AI
Forecast of Content Marketing through AIForecast of Content Marketing through AI
Forecast of Content Marketing through AI
 

Mobisheild sales promotion presentation.

  • 1.
  • 2. "For many professionals, the mobile phone has become a mobile office,“ - Mike Jones, Symantec "There is no question that mobile security will eventually equal – if not surpass – PC security as a threat to IT departments," - Denise Culver, Heavy Reading Mobile Networks Insider “Internal attacks are one of the biggest threats facing your data and systems,” -Cortney Thompson, CTO of Green House Data “According to a BT study, mobile security breaches have affected more than two-thirds (68 %) of global organizations in the last 12 months.” “Implement mobile security solutions that protect both corporate data and access to corporate systems while also respecting user’s privacy through containerization,” - Nicko van Someren, CTO, Good Technology
  • 3. • People store much personal info on them: email, calendars, contacts, pictures, etc. • Sensitive organizational information. • Can fit in pockets, easily lost/stolen. • Built-in billing system: SMS/MMS (mobile operator), in-app purchases (credit card), etc. • Many new devices have near field communications (NFC), used for contactless payments, etc. • Your device becomes your credit card • Location privacy issues
  • 4. With the explosive growth of smartphones, tablets and mobile devices, companies must find a means of providing access to their internal systems,information to their mobile workforce securely and seamlessly along with securing highly sensitive and important data from stealing.Not only that it’s a high time that we secure devices from physical damages and theft.
  • 6. • DATA STORED IN MOBILE. • DEVICE FROM PHYSICAL DAMAGE/THEFT. • CONTACTS • MESSAGES • MAILS • USERNAME/PASSWORDS • MEDIA FILES(PICTURES,VIDEOS etc.) • DOCUMENTS(TEXT FILES,PDFs,PPTs) • NOTES/REMINDERS. • VOICE RECORDINGS. • IMP. DATAS INSIDE APPS.etc. WHY PROTECT? PRIVACY
  • 7. HERE’S WHAT WE WANT TO OFFER: • MALWARE PROTECTION. • IDENTITY THEFT PROTECTION. • ENCRYPTION OF DATA. • FREE CLOUD STORAGE FOR DATA BACK UP. • INSURANCE OF DEVICE. • HASSLE FREE CLAIMS!!
  • 8. Do you have a smart phone? Does it contain data? Does it contain photos and videos? Do you keep important business information? Do you use internet for monetary transactions?
  • 9. • The attacker can manipulate the smart phone as a zombie machine. • The attacker can easily force the smart phone to make phone calls. • A compromised smart phone can record conversations between the user and others and send them to a third party calls. • An attacker can also steal a user's identity, usurp their identity and thus impersonate the owner. • The attacker can reduce the utility of the smart phone, by discharging the battery. • The attacker can prevent the operation and/or starting of the smart phone by making it unusable. • The attacker can remove the personal (photos, music, videos, etc.) or professional data (contacts, calendars, notes) of the user
  • 10. TEENAGERS YOUNG PROFFESSIONALS MID LEVEL MANAGERS MODERATE TO HIGH INTERNET USAGE MOBILE PRICE RANGING BETWEEN 5000-49,999
  • 11. SMART AVERT RISK VALUE FOR MONEY LONG TERM PROTECTION TENSION FREE!
  • 12. •Free up space (for more of the apps & media you love)- Safely remove hidden clutter, unused apps, calling history, your largest files, & more to free up space for even more of the apps, photos, & music you love most. •Control what you share (across all major social networks)- Our product takes you straight to your privacy settings to give you the pros & cons of each one. From there, you can easily turn any of them on or off with just a click.
  • 13. •Scan device Offers multiple scanning options such as Full Scan, Scan All Apps, Scan Selected Apps, Scan Memory Card and Scan Selected Folders. • Security Advisor: The Security Advisor guides you about settings that can enhance the overall security of your Smartphone. For example, if the 'Screen Lock' setting is not enabled on your phone, then the Security Advisor will instruct you to enable it.
  • 14. • Set Privacy-The Set Privacy feature allows you to protect your privacy with the following functionalities, 1. Call & Message Filter: With this feature you can easily block incoming calls and SMSs from unknown or unwanted numbers. And now, you can also use this feature to block all numbers within a particular series. 2. International Call Block: This feature allows you to block unknown International calls.
  • 15. 1. Anti-Theft / Remote Device Management 2. Quick Settings Notification 3. Personal Security 4. Intruder detection 5. Security Shield 6. Trusted SIMs List
  • 16. -As,we already talked about mobile threat and attack .Their exist another problem device loss and theft.We will just give you a small statistics about mobile device loss and theft. -Many mobile devices lost, stolen each year 200 mobile phones lost/stolen every minute in the INDIA . 56% of us misplace our mobile phone or laptop each month .
  • 17. Cell phone owner/users who can insure their mobile telephone instrument from loss and/or damages under this policy. The policy for mobile phones provides cover against: • Fire. • Riot, strike, malicious damage and terrorist activities. • Theft. • Accident. • Fortuitous circumstances.
  • 18. Exclusions under the mobile phone insurance policy are- • Mysterious disappearance. • Theft from unattended vehicles, except from fully enclosed car that is securely locked. • Theft, loss or damage during the hire or loan to a third party. • Mechanical and electronic breakdown or derangement. • Overloading and experimentation involving imposition of any abnormal conditions. • Damage by wear and tear, vermin, atmospheric or climatic condition or gradual deterioration, inherent defect or from any process of cleaning, repairing or maintenance. • Loss or damage due to war or nuclear perils, loss by water or from any water borne craft. • Intentional or willful act of the insured party.
  • 19. The insurance cover provides compensation equivalent to the the cost of replacement of the instrument by a new instrument of the same specification and same capacity, including all taxes and duties.
  • 20. • WHAT WE ARE PROVIDING INSURANCE FOR THEFT MOBILE DATA SECURITY INSURANCE FOR DAMAGE
  • 21. WORLD CLASS SERVICE ASSURANCE FROM BEST TECH EXPERT CLOUD STORAGE EASY INSURANCE CLAMING CHEAP INSURANCE PRICE
  • 22. Hand set /tablet price(INR.) MARKET PRICE OF OTHER INSURANCE(INR ) /ANNUM MOBISHIELD price(INR.)/ ANNUM Total price(MOBISHIELD APP +Insurance)(INR.)/AN NUM 4000-9999 599 300 700 10,000-14,999 799 450 850 15,000-24,999 1299 800 1200 *Terms and conditions apply
  • 23.
  • 24. ONE MONTH FREETRAIL VERSION 20% DISCOUNT