SlideShare une entreprise Scribd logo
1  sur  13
Simon Cuthbert, Director
Introducing Security Guardian
• ‘Enterprise Level’ USB solutions
• All very good but all very similar solutions
• Most are encrypted
• Some have central management capability
• BUT…What Happens When the Device is Lost or Stolen?
• All these solutions rely on being plugged into a 3rd party
internet connect PC/Laptop to be managed
• If the device is not plugged in it…
• Can not be traced
• Can not be managed
• No verifiable audit trail
INTRODUCTION - USB Technology in use Today
3
• 561 Million USB Flash Drives will be sold between 2014 and 2018
• Forrsights Survey 2014
• More than 30% have lost a USB drive containing confidential
information
• 77% have lost a laptop, tablet or mobile with sensitive data
• 63% of IT managers lack visibility of mobile data within their
organisation
• 84% use personal emails to send sensitive information
• 50% use public cloud services to send sensitive files
• Wall Street Journal Aug 2014 5000 interviews
INTRODUCTION - Don’t Forget the Insider Threat!
4
People Lose Stuff!
More than 30% have lost a USB drive containing confidential information
77% have lost a laptop, tablet or mobile with sensitive data
* Wall Street Journal Aug 2014 5000 interviews
5
THE DETAILS - Human Error!
6
THE DETAILS - Human Error!
6
THE DETAILS - Human Error!
6
• Encryption
• Many end users turn off encryption on their device due to it
slowing down operation
• Data Stored in Cloud
• Many users will download a piece of sensitive information from
the Cloud but then store it locally to save time when it is
needed again
• Responsibility for security management should to be
taken away from the End User
THE DETAILS - People Just Want to Get On With Life!
9
Remote delete requests
Recovered % deleted
• iOS 317 43%
• Android 193 57%
• Blackberry 170 61%
THE DETAILS - Deleting/Overwriting Data
12
• Mobile Data Tracking &
Management Specialist
• Manufactures of Security Guardian
SOLUTIONS - What is Security Guardian?
13
15
• Cloud based or On-Premise
Management & user interface
• Location via GPS, GSM & RFID
• Geofencing
• Time controlled access
• Over The Air configuration
• Remote turn On and Off
• Remote data destruct
• Verifiable audit trail and
reporting
SOLUTIONS - Management console
16
Thank you
Simon Cuthbert, Director – ExactTrak Ltd
Simon.cuthbert@exactTrak.com
LinkedIn: Simon Cuthbert +44 (0) 7710 253340 Twitter: @exactTrak

Contenu connexe

Tendances

IAEM cybersecurity 101
IAEM cybersecurity 101IAEM cybersecurity 101
IAEM cybersecurity 101Sarah K Miller
 
iBeacon Wrapped Events: Trends in Geolocation, Gamification and Bluetooth
iBeacon Wrapped Events: Trends in Geolocation, Gamification and BluetoothiBeacon Wrapped Events: Trends in Geolocation, Gamification and Bluetooth
iBeacon Wrapped Events: Trends in Geolocation, Gamification and Bluetoothtechsytalk
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 
2016 Network Security Outlook
2016 Network Security Outlook2016 Network Security Outlook
2016 Network Security OutlookWestern NRG
 
Iot, analytics and other trends
Iot, analytics and other trendsIot, analytics and other trends
Iot, analytics and other trendsJim Boland
 
Mobile security and what it means to you bb
Mobile security and what it means to you bbMobile security and what it means to you bb
Mobile security and what it means to you bbtechnosyah
 
Privacy and technology
Privacy and technologyPrivacy and technology
Privacy and technologyIzuho Niwa
 
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective AugmentedWorldExpo
 
Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT DefCamp
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanIndus Khaitan
 
Smartphone security
Smartphone securitySmartphone security
Smartphone securityMike Brannon
 
eCSI - The Agile IT security
eCSI - The Agile IT securityeCSI - The Agile IT security
eCSI - The Agile IT securityBalaBit
 
Major General Brett Williams
Major General Brett WilliamsMajor General Brett Williams
Major General Brett WilliamsHanah Croft
 
Challenges posed by iot
Challenges posed by iotChallenges posed by iot
Challenges posed by iotmusfirahahmed
 
Mobile security v2
Mobile security v2Mobile security v2
Mobile security v2James Sutter
 
Going LIVE at #ACPA16 | Streaming Mobile Apps Tutorial
Going LIVE at #ACPA16 | Streaming Mobile Apps TutorialGoing LIVE at #ACPA16 | Streaming Mobile Apps Tutorial
Going LIVE at #ACPA16 | Streaming Mobile Apps TutorialDr. Josie Ahlquist
 

Tendances (20)

Adam w. mosher - geo tagging - atlseccon2011
Adam w. mosher - geo tagging - atlseccon2011Adam w. mosher - geo tagging - atlseccon2011
Adam w. mosher - geo tagging - atlseccon2011
 
IAEM cybersecurity 101
IAEM cybersecurity 101IAEM cybersecurity 101
IAEM cybersecurity 101
 
iBeacon Wrapped Events: Trends in Geolocation, Gamification and Bluetooth
iBeacon Wrapped Events: Trends in Geolocation, Gamification and BluetoothiBeacon Wrapped Events: Trends in Geolocation, Gamification and Bluetooth
iBeacon Wrapped Events: Trends in Geolocation, Gamification and Bluetooth
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
2016 Network Security Outlook
2016 Network Security Outlook2016 Network Security Outlook
2016 Network Security Outlook
 
Iot, analytics and other trends
Iot, analytics and other trendsIot, analytics and other trends
Iot, analytics and other trends
 
Mobile security and what it means to you bb
Mobile security and what it means to you bbMobile security and what it means to you bb
Mobile security and what it means to you bb
 
Privacy and technology
Privacy and technologyPrivacy and technology
Privacy and technology
 
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
 
Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
eCSI - The Agile IT security
eCSI - The Agile IT securityeCSI - The Agile IT security
eCSI - The Agile IT security
 
Major General Brett Williams
Major General Brett WilliamsMajor General Brett Williams
Major General Brett Williams
 
Challenges posed by iot
Challenges posed by iotChallenges posed by iot
Challenges posed by iot
 
Mobile security v2
Mobile security v2Mobile security v2
Mobile security v2
 
Going LIVE at #ACPA16 | Streaming Mobile Apps Tutorial
Going LIVE at #ACPA16 | Streaming Mobile Apps TutorialGoing LIVE at #ACPA16 | Streaming Mobile Apps Tutorial
Going LIVE at #ACPA16 | Streaming Mobile Apps Tutorial
 

En vedette

Erasmus+honza
Erasmus+honzaErasmus+honza
Erasmus+honzakunovska
 
大学付属教育放送局から公共放送組織へ -Frieda Hennock・Ford Foundation・Carnegie Commissionが果たした役割-
大学付属教育放送局から公共放送組織へ -Frieda Hennock・Ford Foundation・Carnegie Commissionが果たした役割-大学付属教育放送局から公共放送組織へ -Frieda Hennock・Ford Foundation・Carnegie Commissionが果たした役割-
大学付属教育放送局から公共放送組織へ -Frieda Hennock・Ford Foundation・Carnegie Commissionが果たした役割-Koach Shigaki
 
Творческий сборник
Творческий сборникТворческий сборник
Творческий сборникolegkorobko
 
Red bull partnerships
Red bull partnershipsRed bull partnerships
Red bull partnershipsBrent Gibson
 
Tips for handling employees in an m&a jm clark
Tips for handling employees in an m&a   jm clarkTips for handling employees in an m&a   jm clark
Tips for handling employees in an m&a jm clarkJane-Michele Clark
 
檸檬鯊人文社課:探索內心的小宇宙──批判性思考、非形式謬誤
檸檬鯊人文社課:探索內心的小宇宙──批判性思考、非形式謬誤檸檬鯊人文社課:探索內心的小宇宙──批判性思考、非形式謬誤
檸檬鯊人文社課:探索內心的小宇宙──批判性思考、非形式謬誤HongLemon
 
presented by Nadia Asghar
presented by Nadia Asgharpresented by Nadia Asghar
presented by Nadia AsgharNadia Asghar
 
Родительский лекторий
Родительский лекторийРодительский лекторий
Родительский лекторийolegkorobko
 
Present Automation Senerio of Bangladesh.
Present Automation Senerio of Bangladesh.Present Automation Senerio of Bangladesh.
Present Automation Senerio of Bangladesh.Rabbi Al-Mamun
 
15 pillars of business success - Jane-Michele Clark
15 pillars of business success - Jane-Michele Clark15 pillars of business success - Jane-Michele Clark
15 pillars of business success - Jane-Michele ClarkJane-Michele Clark
 
Curso para tecnologia
Curso para tecnologiaCurso para tecnologia
Curso para tecnologiamarytzenia
 
Уильям Шекспир
Уильям ШекспирУильям Шекспир
Уильям Шекспирolegkorobko
 

En vedette (20)

Erasmus+honza
Erasmus+honzaErasmus+honza
Erasmus+honza
 
大学付属教育放送局から公共放送組織へ -Frieda Hennock・Ford Foundation・Carnegie Commissionが果たした役割-
大学付属教育放送局から公共放送組織へ -Frieda Hennock・Ford Foundation・Carnegie Commissionが果たした役割-大学付属教育放送局から公共放送組織へ -Frieda Hennock・Ford Foundation・Carnegie Commissionが果たした役割-
大学付属教育放送局から公共放送組織へ -Frieda Hennock・Ford Foundation・Carnegie Commissionが果たした役割-
 
Food
FoodFood
Food
 
Творческий сборник
Творческий сборникТворческий сборник
Творческий сборник
 
Red bull partnerships
Red bull partnershipsRed bull partnerships
Red bull partnerships
 
Tips for handling employees in an m&a jm clark
Tips for handling employees in an m&a   jm clarkTips for handling employees in an m&a   jm clark
Tips for handling employees in an m&a jm clark
 
檸檬鯊人文社課:探索內心的小宇宙──批判性思考、非形式謬誤
檸檬鯊人文社課:探索內心的小宇宙──批判性思考、非形式謬誤檸檬鯊人文社課:探索內心的小宇宙──批判性思考、非形式謬誤
檸檬鯊人文社課:探索內心的小宇宙──批判性思考、非形式謬誤
 
presented by Nadia Asghar
presented by Nadia Asgharpresented by Nadia Asghar
presented by Nadia Asghar
 
Родительский лекторий
Родительский лекторийРодительский лекторий
Родительский лекторий
 
Welcome
WelcomeWelcome
Welcome
 
Shruti_ProjMgt_Ext
Shruti_ProjMgt_ExtShruti_ProjMgt_Ext
Shruti_ProjMgt_Ext
 
Present Automation Senerio of Bangladesh.
Present Automation Senerio of Bangladesh.Present Automation Senerio of Bangladesh.
Present Automation Senerio of Bangladesh.
 
15 pillars of business success - Jane-Michele Clark
15 pillars of business success - Jane-Michele Clark15 pillars of business success - Jane-Michele Clark
15 pillars of business success - Jane-Michele Clark
 
Curso para tecnologia
Curso para tecnologiaCurso para tecnologia
Curso para tecnologia
 
сламәтлек
сламәтлексламәтлек
сламәтлек
 
MICLIC
MICLICMICLIC
MICLIC
 
Уильям Шекспир
Уильям ШекспирУильям Шекспир
Уильям Шекспир
 
Uso de-las-tics-android
Uso de-las-tics-androidUso de-las-tics-android
Uso de-las-tics-android
 
ქანდაკება
ქანდაკებაქანდაკება
ქანდაკება
 
Zahir Shah updated
Zahir Shah updatedZahir Shah updated
Zahir Shah updated
 

Similaire à Security Guardian LinkedIn

SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellAMD Developer Central
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Otherbradley_g
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityThom. Poole
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBsISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBsBitglass
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcareBitglass
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices Troy C. Fulton
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsJeff Katz
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...UL Transaction Security
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…Christopher Kranich
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeRocket Matter, LLC
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobilegrugq
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...Information Security Awareness Group
 

Similaire à Security Guardian LinkedIn (20)

SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
 
OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBsISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
 
3 steps security
3 steps security3 steps security
3 steps security
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobile
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 

Security Guardian LinkedIn

  • 2. • ‘Enterprise Level’ USB solutions • All very good but all very similar solutions • Most are encrypted • Some have central management capability • BUT…What Happens When the Device is Lost or Stolen? • All these solutions rely on being plugged into a 3rd party internet connect PC/Laptop to be managed • If the device is not plugged in it… • Can not be traced • Can not be managed • No verifiable audit trail INTRODUCTION - USB Technology in use Today 3
  • 3. • 561 Million USB Flash Drives will be sold between 2014 and 2018 • Forrsights Survey 2014 • More than 30% have lost a USB drive containing confidential information • 77% have lost a laptop, tablet or mobile with sensitive data • 63% of IT managers lack visibility of mobile data within their organisation • 84% use personal emails to send sensitive information • 50% use public cloud services to send sensitive files • Wall Street Journal Aug 2014 5000 interviews INTRODUCTION - Don’t Forget the Insider Threat! 4
  • 4. People Lose Stuff! More than 30% have lost a USB drive containing confidential information 77% have lost a laptop, tablet or mobile with sensitive data * Wall Street Journal Aug 2014 5000 interviews 5
  • 5. THE DETAILS - Human Error! 6
  • 6. THE DETAILS - Human Error! 6
  • 7. THE DETAILS - Human Error! 6
  • 8. • Encryption • Many end users turn off encryption on their device due to it slowing down operation • Data Stored in Cloud • Many users will download a piece of sensitive information from the Cloud but then store it locally to save time when it is needed again • Responsibility for security management should to be taken away from the End User THE DETAILS - People Just Want to Get On With Life! 9
  • 9. Remote delete requests Recovered % deleted • iOS 317 43% • Android 193 57% • Blackberry 170 61% THE DETAILS - Deleting/Overwriting Data 12
  • 10. • Mobile Data Tracking & Management Specialist • Manufactures of Security Guardian SOLUTIONS - What is Security Guardian? 13
  • 11. 15
  • 12. • Cloud based or On-Premise Management & user interface • Location via GPS, GSM & RFID • Geofencing • Time controlled access • Over The Air configuration • Remote turn On and Off • Remote data destruct • Verifiable audit trail and reporting SOLUTIONS - Management console 16
  • 13. Thank you Simon Cuthbert, Director – ExactTrak Ltd Simon.cuthbert@exactTrak.com LinkedIn: Simon Cuthbert +44 (0) 7710 253340 Twitter: @exactTrak

Notes de l'éditeur

  1. Figures come from a global financial services company and cover two years. These figures only relate to product that were subsequently found / recovered. In essence there is only a 50% chance that remote data is detected with current technology. It has to get better.