SlideShare a Scribd company logo
1 of 28
Download to read offline
Introducing
The world’s leading IoT and Wearable
Device Management Platform
Connecting your employees, customers, devices and data.
Solving the Infrastructure Problem
Overcoming Issues
VR Device technology
has proven ROI in many
industries including
manufacturing,
aerospace, logistics and
healthcare, but needs
proper infrastructure to
support it in a secure
enterprise environment.
SECURITY
Protect data and
prevent unintended
usage of devices
ISSUE 01
INTEGRATION
Get hardware 

and software systems
to work together
ISSUE 03
SCALABILITY
Monitor and manage a
fleet of devices, data,
and usage
ISSUE 02
PROBLEMS WE SOLVE
Solution: Device Management
3
Wearable Environment
Manager™ (WEM)
enables enterprise IT
administrators, application
developers, ERP, and SI’s
to efficiently manage fleets
of wearable devices like
VR.
WEARABLE INTERFACE
7
A Proven Solution
8
Leadership
Pete Wassell
Founder & CEO
Dana Farbo
COO
High Caliber Team with Deep Domain Knowledge
Thomas Miller
CMO
Ved Prakash
CTO
Eddie Quiroz
CIO
Investors
10
Press & Awards
Gartner Cool Vendor 2017 

in Enterprise Wearable 

and Immersive Technologies
Augmate Connect Platform Architecture
We do provide MDM-like
functionality, however
MDM companies have not
entered this space. We not
only have a first mover
advantage, we have a
deep knowledge of
customer needs and
strong network ties within
this ecosystem.
17
Competition
FEATURES Augmate Airwatch Mobileiron SOTi
Wearable-first platform posture X
Remote Application Management for Virtual Reality X
Remote Connectivity Management X X X X
Privlidged System level device Access for complete lock down of
device access by end user
X X X
Common UI for Normalized navigation across different
smartglasses
X
Remote lockout of device X X X
Real Time Battery Life Monitoring X
User Authentication X X X
Shared Device Tracking/History X X
Real Time Messaging to VR Device end user X
Parent Child Heirarchy for separating environment by customer,
use case, or region
X X X X
Shared Environment Pilot/production management control
between application developers and end customers
X X X X
Choice of auto-app launch on each device X
Security GeoFencing X X X
Beacon integration X
Device Sensor data collection, BPM X
18
Use Cases / WEM
Learn more
augmate.io/learn/resources
19
Use Cases / Connect
Learn more
augmate.io/learn/resources
20
Verticals
Building for a
connected world, 

but focusing on
industry, field
services and
supply chain.
Smart Agriculture IoT Devices Smart Homes
Smart Energy Smart Industry Smart Medicine
Connected Cars Smart Retail Military
Learn more
augmate.io/learn/resources
Channel Strategy
Direct Sales
Build a focused in-house effort:
Outbound through sales team
Inbound through web-based lead generation
Inbound through free trial offers
Event exposure
Partnerships
Leverage larger sales force:
Device manufacturers
Application developers
Integrated service providers
Clients & Partners
28
Product Roadmap
20212017
2018
• WEM 1.0
2020
2019
2022
2023
• Connect dev
• Marketplace dev
• Pilot / AR dev
• Asset Tracking POC
• Connect platform launch
with WEM 2.0
• MDM expansion
• Marketplace launch
• Pilot in a Box launch
• Blockchain development
• SSO
• Rule engine dev
• Support
• Blockchain Protocol 1
• Open APIs
• Broader set of IoT devices
supported
• App Developer dev
• Rule engine
• Developer Portal
• Data Analytics / Reporting
• App Developer v1
• Blockchain Protocol 2, 3
• Data Strategy
• Machine Learning Modules
• App Developer v2
• Predictive ML modules
• Anomaly detection
• Blockchain Protocol 4+
• Market expansion
Augmate Platform Solution Overview
POLICY
Wifi Credentials
Static Files
Applications
Security Settings
Selected Devices
USERS
Password Credentials
Usage Analytics
SMS Notifications
DEVICES
Application History
Device Properties
Current User Profile
SMS Notifications
Usage Analytics
WEM platform
Augmate’s Wearable Environment
Manager (WEM) platform enables
enterprise IT administrators application
developers, ERP, and SI’s to efficiently
manage fleets of wearable
environments.
Our platform enhances device security,
while providing policy management
tools that enable application and
connectivity management, user and
device tracking, real-time
communications, sensor data collection,
and beacon management—all done
securely and remotely from a single
management portal.
Augmate WEM Architecture
Launcher
User Interface for Smart Eyewear
Secure Login
Wearable users sign into the device
by entering a 4-digit PIN. User
accounts and passwords are created
and managed via the Augmate
Portal.
Kiosk Mode
Limits user access to only specific,
pre-determined applications.
Messaging
Wearable Users can receive
messages sent by network admins
via the Augmate web portal.
Services
Real-time background services
Device data collection
Services tracks the device’s battery
status and usage, granting users of
the Augmate web portal a real-time
snapshot of their organizations’
wearables.
By implementing AugmateWear in
combination with Internet-of-Things
technologies like locational beacons,
Augmate web portal users can
visualize device locations in a
graphical floorplan.
Wifi Admin
Network Accessibility Management
Easy Enrollment
Devices are provisioned onto
customer networks wirelessly
through a web browser for a simple
and speedy rollout process.
Multiple Wi-Fi Networks
Set up multiple Wi-Fi networks to
allow devices to move without losing
connectivity.
Updater
System-level OTA Updates
Over-the-air (OTA) Updates
Updater remotely installs and
uninstalls applications, configures
hardware permissions, and manages
system-level settings on the
wearable.
Policies
Admins can establish policies via the
Augmate web portal and ascribe
them to specified devices. This
allows customers to manage devices
according to various business needs.
Shim
System-privileged Library
Admin/Root-level Access
By installing the Shim—Augmate’s
system-privileged library—customers
are able to perform various admin/
root-level operations like installing
applications and configuring
hardware permissions.
Augmate / Device Features
Key Features
• Augmate software at hardware layer
• Device Agnostic
• Common Menu across devices
• Provisioning Software signed by OEM
• Receive Text Messages
Key Features
• Create and administer wearable users and devices
• Install/uninstall apps
• Send system-wide messages and notifications
• Establish policies to facilitate whitelisting of software
applications
• Lock devices remotely
• Enable devices to seamlessly connect to multiple wifi
networks
• Organize devices and users by team or customer
Manage each wearable across your entire
organization from our portal.
Augmate / Portal Features
Augmate Launcher
Launcher
Augmate’s smart eyewear user interface
providing user authentication, messaging,
application kiosk mode, and remote lock out.
Security Kiosk Mode
• Secure your fleet of wearables by preventing end user access to device accessories that may pose a security risk.
• Applications are pre-approved by the enterprise IT department.
Augmate Platform Demo
https://goo.gl/PGCmaK
Augmate gives enterprises
complete control over the
management of VR Devices by
allowing IT administrators to
operate the devices through a
WEM portal. Our infrastructure
platform handles device
management, user management,
security, policies, and over the air
application deployments from the
Augmate platform.
Portal / Wearables
Augmate Technical Security Details
Mobile security incidents are expensive causing half of all medium to large companies over $100,000 per year
Device Management Infrastructure Database Level Android Device Level
Security kiosk mode prevents
unintended usage of devices
Immutable infrastructure for our 

web, API, and data ingest
SQL injection prevention Security kiosk mode enforced by
system level operations
Prevent access by remotely
locking device
Managed database with periodic
backups
SQL level multi-tenancy Privileged shim that only tals with our
OTA updater
Restrict device usage to Wi-Fi and
Bluetooth based geofences
Multi-factor authentication to
access Augmate infrastructure
Periodic backups and
point-in-time recovery
APK Encryption In Transfer and
at Rest
Audit applications to detect
modifications installed on device
Segmented access keys to limit
access between cloud resources
Wifi Credential Encryption In
Transfer and at Rest
Ensure latest software is delivered to
device
HTTPS encryption everywhere
using only strong protocols (TLS)
Respond quickly to security
vulnerabilities
Per-organization isolation of all
data
Source: dimensional research
Department of Homeland Security Selects Augmate Platform
https://www.dhs.gov/science-and-technology/news/2016/10/06/news-release-
dhs-st-selects-10-start-ups-first-responder
• 52% of large companies say cost of mobile 

security incidents last year exceeded $500,000
• 45% of businesses with less than 1,000 employees
reported mobile security incident costs exceeding
$100,000
Pilot / AR
Use Cases
• Remote Field Service Work
• Warehouse Pick-n-Pack
• Manufacturing
• Transportation & Logistics
• Construction & Mining
• IT & Telecom
Included
• Augmate WEM™ (6-month trial)
• Laptop/Gateway
• Three Head-Mounted Displays
39
4047
One Stop Shop for IoT 

& Wearable App Buyers
• Simple, intuitive interface
• New and featured apps
• Advanced application 

and device filtering
• Developer admin tools
• Dashboard & Analytics
• Payments via Stripe
• ZenDesk support
Marketplace
47
Thank You
335 Madison Ave, 16th Fl
New York, NY 10017
info@augmate.com
/augmate
/augmate
/augmate
www.augmate.com
12
augmate.io

More Related Content

What's hot

Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
Ronni Pedersen
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15
Mike Lemons
 

What's hot (20)

Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
 
Vmware’s move to a digital workspace
Vmware’s move to a digital workspaceVmware’s move to a digital workspace
Vmware’s move to a digital workspace
 
Company presentation
Company presentationCompany presentation
Company presentation
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 

Similar to Augmate Capabilities Deck

How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
SolarWinds
 

Similar to Augmate Capabilities Deck (20)

Pitch Deck
Pitch DeckPitch Deck
Pitch Deck
 
Augmate connect_Deck
Augmate connect_DeckAugmate connect_Deck
Augmate connect_Deck
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
 
Augmate connect deck
Augmate connect deckAugmate connect deck
Augmate connect deck
 
What's New at VMware?
What's New at VMware?What's New at VMware?
What's New at VMware?
 
Gartner Catalyst: How to succeed with your IT Mobile Strategy
Gartner Catalyst: How to succeed with your IT Mobile StrategyGartner Catalyst: How to succeed with your IT Mobile Strategy
Gartner Catalyst: How to succeed with your IT Mobile Strategy
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
 
AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management
 AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management
AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
 
Voip automation framework
Voip automation frameworkVoip automation framework
Voip automation framework
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
IoT and M2M Services for the Railway Market
IoT and M2M Services for the Railway MarketIoT and M2M Services for the Railway Market
IoT and M2M Services for the Railway Market
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxAirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Augmate Capabilities Deck

  • 1. Introducing The world’s leading IoT and Wearable Device Management Platform Connecting your employees, customers, devices and data.
  • 2. Solving the Infrastructure Problem Overcoming Issues VR Device technology has proven ROI in many industries including manufacturing, aerospace, logistics and healthcare, but needs proper infrastructure to support it in a secure enterprise environment. SECURITY Protect data and prevent unintended usage of devices ISSUE 01 INTEGRATION Get hardware 
 and software systems to work together ISSUE 03 SCALABILITY Monitor and manage a fleet of devices, data, and usage ISSUE 02 PROBLEMS WE SOLVE
  • 4. Wearable Environment Manager™ (WEM) enables enterprise IT administrators, application developers, ERP, and SI’s to efficiently manage fleets of wearable devices like VR. WEARABLE INTERFACE 7 A Proven Solution
  • 5. 8 Leadership Pete Wassell Founder & CEO Dana Farbo COO High Caliber Team with Deep Domain Knowledge Thomas Miller CMO Ved Prakash CTO Eddie Quiroz CIO
  • 7. 10 Press & Awards Gartner Cool Vendor 2017 
 in Enterprise Wearable 
 and Immersive Technologies
  • 9. We do provide MDM-like functionality, however MDM companies have not entered this space. We not only have a first mover advantage, we have a deep knowledge of customer needs and strong network ties within this ecosystem. 17 Competition FEATURES Augmate Airwatch Mobileiron SOTi Wearable-first platform posture X Remote Application Management for Virtual Reality X Remote Connectivity Management X X X X Privlidged System level device Access for complete lock down of device access by end user X X X Common UI for Normalized navigation across different smartglasses X Remote lockout of device X X X Real Time Battery Life Monitoring X User Authentication X X X Shared Device Tracking/History X X Real Time Messaging to VR Device end user X Parent Child Heirarchy for separating environment by customer, use case, or region X X X X Shared Environment Pilot/production management control between application developers and end customers X X X X Choice of auto-app launch on each device X Security GeoFencing X X X Beacon integration X Device Sensor data collection, BPM X
  • 10. 18 Use Cases / WEM Learn more augmate.io/learn/resources
  • 11. 19 Use Cases / Connect Learn more augmate.io/learn/resources
  • 12. 20 Verticals Building for a connected world, 
 but focusing on industry, field services and supply chain. Smart Agriculture IoT Devices Smart Homes Smart Energy Smart Industry Smart Medicine Connected Cars Smart Retail Military Learn more augmate.io/learn/resources
  • 13. Channel Strategy Direct Sales Build a focused in-house effort: Outbound through sales team Inbound through web-based lead generation Inbound through free trial offers Event exposure Partnerships Leverage larger sales force: Device manufacturers Application developers Integrated service providers
  • 15. 28 Product Roadmap 20212017 2018 • WEM 1.0 2020 2019 2022 2023 • Connect dev • Marketplace dev • Pilot / AR dev • Asset Tracking POC • Connect platform launch with WEM 2.0 • MDM expansion • Marketplace launch • Pilot in a Box launch • Blockchain development • SSO • Rule engine dev • Support • Blockchain Protocol 1 • Open APIs • Broader set of IoT devices supported • App Developer dev • Rule engine • Developer Portal • Data Analytics / Reporting • App Developer v1 • Blockchain Protocol 2, 3 • Data Strategy • Machine Learning Modules • App Developer v2 • Predictive ML modules • Anomaly detection • Blockchain Protocol 4+ • Market expansion
  • 16. Augmate Platform Solution Overview POLICY Wifi Credentials Static Files Applications Security Settings Selected Devices USERS Password Credentials Usage Analytics SMS Notifications DEVICES Application History Device Properties Current User Profile SMS Notifications Usage Analytics
  • 17. WEM platform Augmate’s Wearable Environment Manager (WEM) platform enables enterprise IT administrators application developers, ERP, and SI’s to efficiently manage fleets of wearable environments. Our platform enhances device security, while providing policy management tools that enable application and connectivity management, user and device tracking, real-time communications, sensor data collection, and beacon management—all done securely and remotely from a single management portal.
  • 18. Augmate WEM Architecture Launcher User Interface for Smart Eyewear Secure Login Wearable users sign into the device by entering a 4-digit PIN. User accounts and passwords are created and managed via the Augmate Portal. Kiosk Mode Limits user access to only specific, pre-determined applications. Messaging Wearable Users can receive messages sent by network admins via the Augmate web portal. Services Real-time background services Device data collection Services tracks the device’s battery status and usage, granting users of the Augmate web portal a real-time snapshot of their organizations’ wearables. By implementing AugmateWear in combination with Internet-of-Things technologies like locational beacons, Augmate web portal users can visualize device locations in a graphical floorplan. Wifi Admin Network Accessibility Management Easy Enrollment Devices are provisioned onto customer networks wirelessly through a web browser for a simple and speedy rollout process. Multiple Wi-Fi Networks Set up multiple Wi-Fi networks to allow devices to move without losing connectivity. Updater System-level OTA Updates Over-the-air (OTA) Updates Updater remotely installs and uninstalls applications, configures hardware permissions, and manages system-level settings on the wearable. Policies Admins can establish policies via the Augmate web portal and ascribe them to specified devices. This allows customers to manage devices according to various business needs. Shim System-privileged Library Admin/Root-level Access By installing the Shim—Augmate’s system-privileged library—customers are able to perform various admin/ root-level operations like installing applications and configuring hardware permissions.
  • 19. Augmate / Device Features Key Features • Augmate software at hardware layer • Device Agnostic • Common Menu across devices • Provisioning Software signed by OEM • Receive Text Messages
  • 20. Key Features • Create and administer wearable users and devices • Install/uninstall apps • Send system-wide messages and notifications • Establish policies to facilitate whitelisting of software applications • Lock devices remotely • Enable devices to seamlessly connect to multiple wifi networks • Organize devices and users by team or customer Manage each wearable across your entire organization from our portal. Augmate / Portal Features
  • 21. Augmate Launcher Launcher Augmate’s smart eyewear user interface providing user authentication, messaging, application kiosk mode, and remote lock out.
  • 22. Security Kiosk Mode • Secure your fleet of wearables by preventing end user access to device accessories that may pose a security risk. • Applications are pre-approved by the enterprise IT department.
  • 23. Augmate Platform Demo https://goo.gl/PGCmaK Augmate gives enterprises complete control over the management of VR Devices by allowing IT administrators to operate the devices through a WEM portal. Our infrastructure platform handles device management, user management, security, policies, and over the air application deployments from the Augmate platform. Portal / Wearables
  • 24. Augmate Technical Security Details Mobile security incidents are expensive causing half of all medium to large companies over $100,000 per year Device Management Infrastructure Database Level Android Device Level Security kiosk mode prevents unintended usage of devices Immutable infrastructure for our 
 web, API, and data ingest SQL injection prevention Security kiosk mode enforced by system level operations Prevent access by remotely locking device Managed database with periodic backups SQL level multi-tenancy Privileged shim that only tals with our OTA updater Restrict device usage to Wi-Fi and Bluetooth based geofences Multi-factor authentication to access Augmate infrastructure Periodic backups and point-in-time recovery APK Encryption In Transfer and at Rest Audit applications to detect modifications installed on device Segmented access keys to limit access between cloud resources Wifi Credential Encryption In Transfer and at Rest Ensure latest software is delivered to device HTTPS encryption everywhere using only strong protocols (TLS) Respond quickly to security vulnerabilities Per-organization isolation of all data Source: dimensional research Department of Homeland Security Selects Augmate Platform https://www.dhs.gov/science-and-technology/news/2016/10/06/news-release- dhs-st-selects-10-start-ups-first-responder • 52% of large companies say cost of mobile 
 security incidents last year exceeded $500,000 • 45% of businesses with less than 1,000 employees reported mobile security incident costs exceeding $100,000
  • 25. Pilot / AR Use Cases • Remote Field Service Work • Warehouse Pick-n-Pack • Manufacturing • Transportation & Logistics • Construction & Mining • IT & Telecom Included • Augmate WEM™ (6-month trial) • Laptop/Gateway • Three Head-Mounted Displays 39
  • 26. 4047 One Stop Shop for IoT 
 & Wearable App Buyers • Simple, intuitive interface • New and featured apps • Advanced application 
 and device filtering • Developer admin tools • Dashboard & Analytics • Payments via Stripe • ZenDesk support Marketplace 47
  • 27. Thank You 335 Madison Ave, 16th Fl New York, NY 10017 info@augmate.com /augmate /augmate /augmate www.augmate.com