SlideShare a Scribd company logo
1 of 21
Download to read offline
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
Richard Atkinson |  Director, Worldwide Anti‐Piracy
Corporate Worldwide Anti‐Piracy:  Introduction
Driving Adobe’s Comprehensive Approach to Grow Revenue & CCM through Conversion From Piracy
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
Pure
Pirates
13%
Tend Pirates
34%
Tend Legitimate
40%
Pure
Legitimate
13%
Only 13% of Software
Users are “Pure Legit”
74% of Software Users are
“Dual-Users”
(Purchase AND Pirate)
* Source MPA 2007 and 2009 studies focused on Dual-Consumers
All other: 2011 BSA/IDC global study of software consumption and piracy.
Debunking Misconceptions about our Software Pirate User Base
Non-Monetized
(piracy market share)
Consumers of Adobe Products
Monetized
(sales market share)
Perception
Reality
2
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. * Source 2011 BSA/IDC global study of software consumption and piracy.
Contrary to Common Belief:
 ¾ of Software Users are Dual Users
 ~50% of IT Professions believe “over-deployment” is LEGAL
 ~50% of Users believe Peer-2-Peer Downloading is LEGAL
Individual Users
(Mature / Emerging)
Business IT Leaders
(</>500 employees)
NotConsideredPiracy
Considered
Piracy
Debunking Misconceptions about our Software Pirate User Base
3
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 4
Software:
1x/year PC Games:
1x/quarter
eBooks:
1x/month
Movies:
1x/2 weeks
TV:
1x/week
Music:
1x/day
“Apps”:
1x/week
Are our consumers that different?
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
Deter End User Consumption through audits,
legalization, enforcement, and campaigns
Disrupt Distribution through internet
takedowns and enforcement
Disrupt Supply through investigations,
intelligence collection, and supply chain
security
Integrated Strategies and Actions across
stakeholders, focused on Pirate-Conversion
Improve Understanding of Pirate-User
Segments and Motivations
Enhance Differentiation between pirate and
legitimate product, experience, and value
Compete Better with Piracy                
through Increased Value Proposition
Suppress Piracy 
through Corrective Action
Mission: Drive Incremental Revenue and Adoption of CCM 
through Conversion From Piracy
$
5
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
Alignment is Key to Achieving Our Goal
6
EXTERNAL PARTNERS
Leverage partners to curb piracy 
beyond Adobe’s reach:
• Industry Organizations (BSA, etc)
• Supply Chain & Ecosystem
• Law Enforcement
• Resellers/Distributors/Channel
PRODUCT
Reinforce piracy deterrents as 
well as add non pirate‐able 
product benefits: 
• Engineering/Architecture
• Product Mgt/Features
• Customer Experience/UI
CUSTOMER‐FACING
Work with internal teams to 
maximize customer satisfaction and 
conversion from pirate to legit:
• License & Compliance
• Field Sales
• Channel
• Customer Service
MARKETING
Market benefits of legitimate 
software to drive conversion:
• Pricing / Positioning
• Research & Understanding
• PR / Communications
ANTI‐PIRACY
Provide overall Strategy, Central 
Services, and data‐based insights 
and guidance:
• Pirate‐Conversion Strategy
• Business Intelligence
• Global Investigations
• Online Enforcement
• Legal Coordination
• Communications
• BSA /Industry Assoc. Global /Regional
LEGAL AND SECURITY
Define processes and influence 
legislation:
• Litigation/Enforcement
• Contracts/EULA’s
• Government Affairs & Legislation
• Action & Risk Management
• Joint Investigations
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
Guiding Principles
ALIGNMENT  FOCUS
RESPONSIVE LEVERAGE
• Focus limited resources to maximize impact
• Prioritize efforts within geographies and segments of 
highest impact/opportunity
• Progressively sequence actions to optimize the 
cumulative effect
• Internal investments, activities & resources are 
complementary, not silo‐ed
• Internal stakeholders aligned to Goals, Objectives, Priorities
• Internal efforts aligned with industry & associations efforts
• Adapt to new business models and associated piracy patterns
• Respond to measured effectiveness, trends, insights
• Adapt tactics to local market conditions
• Extend impact by coordinating business partners
• Spread cost and burden across industry
• Maximize law enforcement, govm’t relationships, legislation
Execute
Learn
Adapt
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
Corporate WW Anti-Piracy Team
Strategy & Leadership
Richard Atkinson
Global Program Manager
Mason Bacon
Business Intelligence
Pingping Medley
Legal Coordination
Diana Olin
Investigations
Michael Draper
Business Analysis
Jonas Brueggemann
Communications
Annick Mohageg-Baudot
EMEA Regional Manager
Philippe Briere
J/APAC Regional Manager
Rachel Fung
LTAM Regional Manager
TBD – final stage of interviews
8
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
Fill key gaps in consumer understanding, enabling enhanced targeting,
engagements, and opportunity for conversion:
 Understand consumer piracy behavior, attitudes, motivations (doing & thinking)
 Determine best opportunities for conversion (triggers & elasticity)
 Estimate piracy impacts & opportunities to business
 Provide strategic insights on where piracy is headed
Business Intelligence
General Profile Existing Sales Pipeline Pirate Downloading Product Activation Customer Research
Business
Intelligence
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
Using Data to Understand Consumers and their Behavior
10
P2P pirate download tracking
Product activation tracking
Piracy activity is
monitored by IP
address
Tracking data is
then used to
profile and
target pirates
Home Users
(trace to their ISP and to their
near-location/zip-code)
Employees at Businesses
(trace to Company Name)
Students & Faculty at Schools
and Universities
(trace to School Name)
All Internet-
enabled devices
have a unique,
traceable IP
address
Business
Intelligence
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 11
Dramatically decrease the availability of pirated product online, which is the
primary distribution method in most markets for counterfeit and regular piracy:
 Increase frustration of pirate-consumers
 Maximized leverage of tools and approaches
Global Online Enforcement
P2P
Locker &
Link
Auction
B2C/B2B
Web HTTP
(websites)
Search
Engine
Results
UseNet iRC
High High Very High Very High Very High Moderate Low
Low Moderate Moderate High High Moderate Low
Short-Term
Trial
Short-Term
Trial
BSA (WW)
SIIA (N/A)
IACC
Short-Term
Trial
None None
Appears
Low
Appears
High
Low to
Moderate
Too
Early
Too
Early
n/a n/a
Responses
Scale/Impact
Ability to
significantly disrupt?
Current Approach
Effectiveness
Online
Enforcement
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
Online Enforcement Effectiveness: How Long Does It Take
to Find “Pirate” Copies of Our Software? (13 seconds)
12
• This approach will be used to measure our Online Enforcement efforts (NOTE: STILL ESTABLISHING BASELINE, ENFORCEMENT
PILOTS IN THIS AREA HAD NOT YET STARTED)
• Currently, It only takes a consumer an average of 13 sec. to find a live download link ----- Our Target is 360 sec.
Online
Enforcement
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 13
Combat large piracy operations via the results of key global investigations:
 Provide insights to Adobe processes being wrongfully leveraged
 Create strategic disruptions to the Piracy Supply Chain / Ecosystem
 Stop pirate-discount products from displacing legitimate sales
Global Anti Piracy Investigations
Intelligence
Gathering
piracy@
adobe
Internal
Reporting
Piracy
Hotline
Industry
Partners
Internal
Tips
Law
Enforce
ment
Customer
Impact
Global
Impact
Pirates’ level of
sophistication
Revenue
Potential
Business
Impact
Investigation
Decision Factors
Global
Investigations
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
Linking 3 Teams/Experience for Investigations & Resolution
14
Worldwide
Anti-Piracy
(abuse by our consumers)
Corporate Legal
Fraud Investigations
(abuse by our employees)
Customer Service
Fraud Investigations
(abuse of Customer Service)
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
Example: current OEM Investigation
15
Futuresoft.com
Business and
Individual Customers
Government
Customers
Replicator
Replicator
OEM GL
Partners
Grey Market
Education
Distributer
Counterfeit
OEM
Distributor
Channel
Partner
Upgrades
Only
Potential
source of
leaked serial
numbers
Customers receive
Counterfeit Software
of Older Version +
Legitimate Upgrade to
Current Version
OEM
Serial #s
OEM Partner
OEM China
Replication
Supply Chain
Pirate Counterfeit
Ecosystem
(wholesale)
Retail Ecosystem
(some are Adobe APC Partners)
Being sold ~50% Off
To Customers believing they are getting
Legitimate Product at a discount
Current-Product Model (single element)
Older-Product + Upgrade Model (2 elements)
Primarily Impacting Key Mature Markets:
USA, UK, Germany, Japan, Australia
Global
Investigations
Redacted
Redacted
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
Intelligence Gathering
 Limited Intel
 Internal Test Purchases
 Internal Reporting
 Industry partners
 Industry Associations
 Strategic test purchases
16
Serial Number
Analysis
Industry
Associations
Internal
Reporting
Test
Purchases
Industry
Partners
German
Investigation
Law
Enforcement
Cases
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
Investigative Priorities
 Focus on point of compromise
 Eliminate internal source
 Establish scope
 How big is the problem
 Establish testing protocol
 How to identify compromised serial numbers
 Discover additional victims
 Combine investigative efforts
17
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
Data Analysis
18
Gather
subset of
serial
numbers
Identify
single point
of relation
All
numbers
relate to
one OEM
partner
All
numbers
sent to
same
country
Replicators
in China
identified
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
Current and Next Steps
19
Identified Main Distribution Channel
Identified Primary Suspects
Identified loopholes that allow
numbers to be compromised
Solidified partnership with other
victims
Prepare Civil and Criminal actions Last Step
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 20
Questions?
© 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.

More Related Content

Similar to 10/20/2012 Meeting - Corporate Worldwide Anti-Piracy

Adobe presentation sydney
Adobe presentation sydneyAdobe presentation sydney
Adobe presentation sydneyMichael Buckley
 
Social Media Bootcamp -Cory Edwards-Adobe Presentation
Social Media Bootcamp -Cory Edwards-Adobe PresentationSocial Media Bootcamp -Cory Edwards-Adobe Presentation
Social Media Bootcamp -Cory Edwards-Adobe PresentationUtah Business Magazine
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsEnterprise Management Associates
 
Obedience v Compliance : Getting Sales & Marketing Talking the Same Language
Obedience v Compliance : Getting Sales & Marketing Talking the Same LanguageObedience v Compliance : Getting Sales & Marketing Talking the Same Language
Obedience v Compliance : Getting Sales & Marketing Talking the Same LanguageJohn Watton
 
Better Informed Decisions by Riaaz Jeena (ict business breakfast)
Better Informed Decisions by Riaaz Jeena (ict business breakfast)Better Informed Decisions by Riaaz Jeena (ict business breakfast)
Better Informed Decisions by Riaaz Jeena (ict business breakfast)itnewsafrica
 
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016AGILLY
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicyAllot Communications
 
Don't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksDon't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksPrathan Phongthiproek
 
20130712 Opening Keynote Adobe Andreas Helios
20130712 Opening Keynote Adobe Andreas Helios20130712 Opening Keynote Adobe Andreas Helios
20130712 Opening Keynote Adobe Andreas HeliosWerbeplanung.at Summit
 
Adobe Experience Manager Vision and Roadmap
Adobe Experience Manager Vision and RoadmapAdobe Experience Manager Vision and Roadmap
Adobe Experience Manager Vision and RoadmapLoni Stark
 
20140327-S602-Mobile
20140327-S602-Mobile20140327-S602-Mobile
20140327-S602-MobileRussell Lewis
 
John watton adobe - deck
John watton   adobe - deckJohn watton   adobe - deck
John watton adobe - deckSSYLVYEE
 
Reinventing Marketing in the Age of Digital
Reinventing Marketing in the Age of DigitalReinventing Marketing in the Age of Digital
Reinventing Marketing in the Age of DigitalJohn Watton
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...ForgeRock
 
Adobe DMP - Générer de l'engagement - eCommerce Paris 2014
Adobe DMP - Générer de l'engagement - eCommerce Paris 2014Adobe DMP - Générer de l'engagement - eCommerce Paris 2014
Adobe DMP - Générer de l'engagement - eCommerce Paris 2014Christophe Lauer
 
CIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCloudIDSummit
 
Improving traffic quality in a more private world
Improving traffic quality in a more private worldImproving traffic quality in a more private world
Improving traffic quality in a more private worldAmyStamper3
 
What Every Procurement Professional Should Know About Supplier Risk Managemen...
What Every Procurement Professional Should Know About Supplier Risk Managemen...What Every Procurement Professional Should Know About Supplier Risk Managemen...
What Every Procurement Professional Should Know About Supplier Risk Managemen...IBM Watson Commerce
 

Similar to 10/20/2012 Meeting - Corporate Worldwide Anti-Piracy (20)

Adobe presentation sydney
Adobe presentation sydneyAdobe presentation sydney
Adobe presentation sydney
 
Social Media Bootcamp -Cory Edwards-Adobe Presentation
Social Media Bootcamp -Cory Edwards-Adobe PresentationSocial Media Bootcamp -Cory Edwards-Adobe Presentation
Social Media Bootcamp -Cory Edwards-Adobe Presentation
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
Obedience v Compliance : Getting Sales & Marketing Talking the Same Language
Obedience v Compliance : Getting Sales & Marketing Talking the Same LanguageObedience v Compliance : Getting Sales & Marketing Talking the Same Language
Obedience v Compliance : Getting Sales & Marketing Talking the Same Language
 
Better Informed Decisions by Riaaz Jeena (ict business breakfast)
Better Informed Decisions by Riaaz Jeena (ict business breakfast)Better Informed Decisions by Riaaz Jeena (ict business breakfast)
Better Informed Decisions by Riaaz Jeena (ict business breakfast)
 
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use Policy
 
Don't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksDon't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application Attacks
 
20130712 Opening Keynote Adobe Andreas Helios
20130712 Opening Keynote Adobe Andreas Helios20130712 Opening Keynote Adobe Andreas Helios
20130712 Opening Keynote Adobe Andreas Helios
 
Adobe Experience Manager Vision and Roadmap
Adobe Experience Manager Vision and RoadmapAdobe Experience Manager Vision and Roadmap
Adobe Experience Manager Vision and Roadmap
 
20140327-S602-Mobile
20140327-S602-Mobile20140327-S602-Mobile
20140327-S602-Mobile
 
John watton adobe - deck
John watton   adobe - deckJohn watton   adobe - deck
John watton adobe - deck
 
Reinventing Marketing in the Age of Digital
Reinventing Marketing in the Age of DigitalReinventing Marketing in the Age of Digital
Reinventing Marketing in the Age of Digital
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
 
Adobe DMP - Générer de l'engagement - eCommerce Paris 2014
Adobe DMP - Générer de l'engagement - eCommerce Paris 2014Adobe DMP - Générer de l'engagement - eCommerce Paris 2014
Adobe DMP - Générer de l'engagement - eCommerce Paris 2014
 
CIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCIS14: Global Trends in BYOID
CIS14: Global Trends in BYOID
 
Improving traffic quality in a more private world
Improving traffic quality in a more private worldImproving traffic quality in a more private world
Improving traffic quality in a more private world
 
The Truth About Mobile Marketing for B2B Companies
The Truth About Mobile Marketing for B2B CompaniesThe Truth About Mobile Marketing for B2B Companies
The Truth About Mobile Marketing for B2B Companies
 
What Every Procurement Professional Should Know About Supplier Risk Managemen...
What Every Procurement Professional Should Know About Supplier Risk Managemen...What Every Procurement Professional Should Know About Supplier Risk Managemen...
What Every Procurement Professional Should Know About Supplier Risk Managemen...
 

Recently uploaded

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Recently uploaded (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

10/20/2012 Meeting - Corporate Worldwide Anti-Piracy

  • 1. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Richard Atkinson |  Director, Worldwide Anti‐Piracy Corporate Worldwide Anti‐Piracy:  Introduction Driving Adobe’s Comprehensive Approach to Grow Revenue & CCM through Conversion From Piracy
  • 2. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Pure Pirates 13% Tend Pirates 34% Tend Legitimate 40% Pure Legitimate 13% Only 13% of Software Users are “Pure Legit” 74% of Software Users are “Dual-Users” (Purchase AND Pirate) * Source MPA 2007 and 2009 studies focused on Dual-Consumers All other: 2011 BSA/IDC global study of software consumption and piracy. Debunking Misconceptions about our Software Pirate User Base Non-Monetized (piracy market share) Consumers of Adobe Products Monetized (sales market share) Perception Reality 2
  • 3. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. * Source 2011 BSA/IDC global study of software consumption and piracy. Contrary to Common Belief:  ¾ of Software Users are Dual Users  ~50% of IT Professions believe “over-deployment” is LEGAL  ~50% of Users believe Peer-2-Peer Downloading is LEGAL Individual Users (Mature / Emerging) Business IT Leaders (</>500 employees) NotConsideredPiracy Considered Piracy Debunking Misconceptions about our Software Pirate User Base 3
  • 4. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 4 Software: 1x/year PC Games: 1x/quarter eBooks: 1x/month Movies: 1x/2 weeks TV: 1x/week Music: 1x/day “Apps”: 1x/week Are our consumers that different?
  • 5. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Deter End User Consumption through audits, legalization, enforcement, and campaigns Disrupt Distribution through internet takedowns and enforcement Disrupt Supply through investigations, intelligence collection, and supply chain security Integrated Strategies and Actions across stakeholders, focused on Pirate-Conversion Improve Understanding of Pirate-User Segments and Motivations Enhance Differentiation between pirate and legitimate product, experience, and value Compete Better with Piracy                 through Increased Value Proposition Suppress Piracy  through Corrective Action Mission: Drive Incremental Revenue and Adoption of CCM  through Conversion From Piracy $ 5
  • 6. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Alignment is Key to Achieving Our Goal 6 EXTERNAL PARTNERS Leverage partners to curb piracy  beyond Adobe’s reach: • Industry Organizations (BSA, etc) • Supply Chain & Ecosystem • Law Enforcement • Resellers/Distributors/Channel PRODUCT Reinforce piracy deterrents as  well as add non pirate‐able  product benefits:  • Engineering/Architecture • Product Mgt/Features • Customer Experience/UI CUSTOMER‐FACING Work with internal teams to  maximize customer satisfaction and  conversion from pirate to legit: • License & Compliance • Field Sales • Channel • Customer Service MARKETING Market benefits of legitimate  software to drive conversion: • Pricing / Positioning • Research & Understanding • PR / Communications ANTI‐PIRACY Provide overall Strategy, Central  Services, and data‐based insights  and guidance: • Pirate‐Conversion Strategy • Business Intelligence • Global Investigations • Online Enforcement • Legal Coordination • Communications • BSA /Industry Assoc. Global /Regional LEGAL AND SECURITY Define processes and influence  legislation: • Litigation/Enforcement • Contracts/EULA’s • Government Affairs & Legislation • Action & Risk Management • Joint Investigations
  • 7. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Guiding Principles ALIGNMENT  FOCUS RESPONSIVE LEVERAGE • Focus limited resources to maximize impact • Prioritize efforts within geographies and segments of  highest impact/opportunity • Progressively sequence actions to optimize the  cumulative effect • Internal investments, activities & resources are  complementary, not silo‐ed • Internal stakeholders aligned to Goals, Objectives, Priorities • Internal efforts aligned with industry & associations efforts • Adapt to new business models and associated piracy patterns • Respond to measured effectiveness, trends, insights • Adapt tactics to local market conditions • Extend impact by coordinating business partners • Spread cost and burden across industry • Maximize law enforcement, govm’t relationships, legislation Execute Learn Adapt
  • 8. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Corporate WW Anti-Piracy Team Strategy & Leadership Richard Atkinson Global Program Manager Mason Bacon Business Intelligence Pingping Medley Legal Coordination Diana Olin Investigations Michael Draper Business Analysis Jonas Brueggemann Communications Annick Mohageg-Baudot EMEA Regional Manager Philippe Briere J/APAC Regional Manager Rachel Fung LTAM Regional Manager TBD – final stage of interviews 8
  • 9. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Fill key gaps in consumer understanding, enabling enhanced targeting, engagements, and opportunity for conversion:  Understand consumer piracy behavior, attitudes, motivations (doing & thinking)  Determine best opportunities for conversion (triggers & elasticity)  Estimate piracy impacts & opportunities to business  Provide strategic insights on where piracy is headed Business Intelligence General Profile Existing Sales Pipeline Pirate Downloading Product Activation Customer Research Business Intelligence
  • 10. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Using Data to Understand Consumers and their Behavior 10 P2P pirate download tracking Product activation tracking Piracy activity is monitored by IP address Tracking data is then used to profile and target pirates Home Users (trace to their ISP and to their near-location/zip-code) Employees at Businesses (trace to Company Name) Students & Faculty at Schools and Universities (trace to School Name) All Internet- enabled devices have a unique, traceable IP address Business Intelligence
  • 11. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 11 Dramatically decrease the availability of pirated product online, which is the primary distribution method in most markets for counterfeit and regular piracy:  Increase frustration of pirate-consumers  Maximized leverage of tools and approaches Global Online Enforcement P2P Locker & Link Auction B2C/B2B Web HTTP (websites) Search Engine Results UseNet iRC High High Very High Very High Very High Moderate Low Low Moderate Moderate High High Moderate Low Short-Term Trial Short-Term Trial BSA (WW) SIIA (N/A) IACC Short-Term Trial None None Appears Low Appears High Low to Moderate Too Early Too Early n/a n/a Responses Scale/Impact Ability to significantly disrupt? Current Approach Effectiveness Online Enforcement
  • 12. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Online Enforcement Effectiveness: How Long Does It Take to Find “Pirate” Copies of Our Software? (13 seconds) 12 • This approach will be used to measure our Online Enforcement efforts (NOTE: STILL ESTABLISHING BASELINE, ENFORCEMENT PILOTS IN THIS AREA HAD NOT YET STARTED) • Currently, It only takes a consumer an average of 13 sec. to find a live download link ----- Our Target is 360 sec. Online Enforcement
  • 13. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 13 Combat large piracy operations via the results of key global investigations:  Provide insights to Adobe processes being wrongfully leveraged  Create strategic disruptions to the Piracy Supply Chain / Ecosystem  Stop pirate-discount products from displacing legitimate sales Global Anti Piracy Investigations Intelligence Gathering piracy@ adobe Internal Reporting Piracy Hotline Industry Partners Internal Tips Law Enforce ment Customer Impact Global Impact Pirates’ level of sophistication Revenue Potential Business Impact Investigation Decision Factors Global Investigations
  • 14. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Linking 3 Teams/Experience for Investigations & Resolution 14 Worldwide Anti-Piracy (abuse by our consumers) Corporate Legal Fraud Investigations (abuse by our employees) Customer Service Fraud Investigations (abuse of Customer Service)
  • 15. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Example: current OEM Investigation 15 Futuresoft.com Business and Individual Customers Government Customers Replicator Replicator OEM GL Partners Grey Market Education Distributer Counterfeit OEM Distributor Channel Partner Upgrades Only Potential source of leaked serial numbers Customers receive Counterfeit Software of Older Version + Legitimate Upgrade to Current Version OEM Serial #s OEM Partner OEM China Replication Supply Chain Pirate Counterfeit Ecosystem (wholesale) Retail Ecosystem (some are Adobe APC Partners) Being sold ~50% Off To Customers believing they are getting Legitimate Product at a discount Current-Product Model (single element) Older-Product + Upgrade Model (2 elements) Primarily Impacting Key Mature Markets: USA, UK, Germany, Japan, Australia Global Investigations Redacted Redacted
  • 16. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Intelligence Gathering  Limited Intel  Internal Test Purchases  Internal Reporting  Industry partners  Industry Associations  Strategic test purchases 16 Serial Number Analysis Industry Associations Internal Reporting Test Purchases Industry Partners German Investigation Law Enforcement Cases
  • 17. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Investigative Priorities  Focus on point of compromise  Eliminate internal source  Establish scope  How big is the problem  Establish testing protocol  How to identify compromised serial numbers  Discover additional victims  Combine investigative efforts 17
  • 18. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Data Analysis 18 Gather subset of serial numbers Identify single point of relation All numbers relate to one OEM partner All numbers sent to same country Replicators in China identified
  • 19. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Current and Next Steps 19 Identified Main Distribution Channel Identified Primary Suspects Identified loopholes that allow numbers to be compromised Solidified partnership with other victims Prepare Civil and Criminal actions Last Step
  • 20. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 20 Questions?
  • 21. © 2012 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.