What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is...

Post on 08-Oct-2020

4 views 0 download

Transcript of What do you do if your computer is lost or stolen? Suppose it ...What do you do if your computer is...

What do you do if your computerWhat do you do if your computeris lost or stolen?is lost or stolen?

Suppose it just runs away fromSuppose it just runs away fromhome?home?

Is it smart enough to tell youIs it smart enough to tell youwhere it is?where it is?

It is, if it has PC PhoneHomeIt is, if it has PC PhoneHome™™ or orMacPhoneHomeMacPhoneHome™™ inside inside……

PC PhoneHomePC PhoneHome™™ / MacPhoneHome / MacPhoneHome™™ is a transparent theft is a transparent theftprotection, tracking and recovery software that can be installedprotection, tracking and recovery software that can be installedon a Laptop, Desktop, on a Laptop, Desktop, NetbookNetbook, Tablet computer &, Tablet computer & Chromebook Chromebook..

Every time the device makes an internet connection, a stealthEvery time the device makes an internet connection, a stealthemail message containing its exact location will be invisiblyemail message containing its exact location will be invisiblytransmitted to a pre-determined email address of the usertransmitted to a pre-determined email address of the user’’ss

choicechoice

Allows for the quick location and retrieval of your valuableAllows for the quick location and retrieval of your valuableproperty. Prevents loss of expensive equipment and intellectualproperty. Prevents loss of expensive equipment and intellectual

property. Highly Tamperproof - property. Highly Tamperproof - Cannot be removed byCannot be removed byunauthorized partiesunauthorized parties

How does PC PhoneHomeHow does PC PhoneHome™™ and MacPhoneHome and MacPhoneHome™™ work? work?

Software isSoftware isinstalled,installed,

simplesimpleinstallationinstallation

andandconfigurationconfiguration

Every time the protected computer makesEvery time the protected computer makesan internet connection it will send aan internet connection it will send a

stealth email message containing its exactstealth email message containing its exactlocation to a pre-determined emaillocation to a pre-determined email

address of the useraddress of the user’’s choices choice

When the e-mail message from your missingWhen the e-mail message from your missingcomputer is received, recovery experts at BSI workcomputer is received, recovery experts at BSI work

with worldwide ISPs and local law enforcementwith worldwide ISPs and local law enforcementagencies to recover your stolen property. It is aagencies to recover your stolen property. It is a

simple process to trace the identifying information tosimple process to trace the identifying information tofind the computerfind the computer’’s exact locations exact location..

Here is a reprint fromHere is a reprint fromColumbia UniversityColumbia University’’ss

Public Safety newsletterPublic Safety newsletteroutlining the recovery ofoutlining the recovery of

a studenta student’’s laptops laptopprotected byprotected by

MacPhoneHomeMacPhoneHome™…™…

We do this ALL the time forWe do this ALL the time forour clientsour clients……

According to the US Government and Insurance Industry Statistics,According to the US Government and Insurance Industry Statistics,over over EIGHT MILLIONEIGHT MILLION computers were stolen in the USA computers were stolen in the USA

in the last three yearsin the last three years……

Worldwide statistics are proportionally similar.Worldwide statistics are proportionally similar.

According to the FBI, only 3% of stolen computersAccording to the FBI, only 3% of stolen computersare EVER recovered.are EVER recovered.

You don't have to be a victim!You don't have to be a victim!

Recent Computer Theft Stories in the NewsRecent Computer Theft Stories in the News

Prostitute steals laptop with secret software from US ArmyProstitute steals laptop with secret software from US Army Qualcomm chairman's stolen laptop contained sensitive dataQualcomm chairman's stolen laptop contained sensitive data MossadMossad’’s Deputy Chief gets laptop stolen s Deputy Chief gets laptop stolen –– contained secret data contained secret data Visa ExecVisa Exec’’s stolen laptop contained info on 300K issued credit cardss stolen laptop contained info on 300K issued credit cards Stolen MI5 laptop contained top secret dataStolen MI5 laptop contained top secret data Thieves steal 40 IBM infrastructure serversThieves steal 40 IBM infrastructure servers IRS' Case of the 2,332 Missing LaptopsIRS' Case of the 2,332 Missing Laptops Australian government loses 542 laptopsAustralian government loses 542 laptops UK government loses 1933 computersUK government loses 1933 computers FBI loses 184 computersFBI loses 184 computers 2900 laptops lost in London Taxis2900 laptops lost in London Taxis

You donYou don’’tthave to be ahave to be a

victim!victim!

We provide low costWe provide low costEnterprise EditionsEnterprise Editions

of PCof PCPhoneHomePhoneHome™™ and andMacPhoneHomeMacPhoneHome™™

to the academicto the academiccommunitycommunity

Ask about our specialAsk about our specialblanket licenseblanket license

We also provideWe also provideEnterpriseEnterprise

Editions of PCEditions of PCPhoneHomePhoneHome™™ and andMacPhoneHomeMacPhoneHome™™

to the privateto the privatesector andsector and

governmentgovernmentorganizationsorganizations

““I like PC PhoneHomeI like PC PhoneHome™™ a lot a lot…… I Iwant to deploy it on our 160want to deploy it on our 160

computerscomputers…… Do I have to install Do I have to installand configure it on eachand configure it on each

computer?computer?””

Imagine if you had to install andImagine if you had to install andconfigure every computer in yourconfigure every computer in your

organization with PCorganization with PCPhoneHomePhoneHome™™ or MacPhoneHome or MacPhoneHome™™

separatelyseparately…… what a headache! what a headache!

““WeWe’’ve got 5000 computers in ourve got 5000 computers in ourschool systemschool system…… It would take meIt would take me

months to installmonths to installMacPhoneHomeMacPhoneHome™™ on every on every

computercomputer…”…”

There is no need to configure eachThere is no need to configure eachcomputer separately!computer separately!

WeWe’’ve solved that problem withve solved that problem withour Enterprise Edition!our Enterprise Edition!

What’s an Enterprise Edition?

PC PhoneHome™/MacPhoneHome™Enterprise is a custom configurationthat allows organizations to install

PC PhoneHome™/MacPhoneHome™on large numbers of computers

without the need for timeconsuming individual configuration.

Your organizationYour organization’’s contact ands contact andownership information is hard-codedownership information is hard-codeddirectly inside your custom version ofdirectly inside your custom version ofPC PhoneHomePC PhoneHome™™/MacPhoneHome/MacPhoneHome™™

EnterpriseEnterprise

No need to configure each computer No need to configure each computerseparately!separately!

Just click and install over yourJust click and install over yournetworknetwork

• Point of Contact:• P.O.C. 24 hour number:• P.O.C. Email Address:• Organization:• Address:• City:• State/Province:• Zip/Postal Code:• Country:• Tel:• Fax:• Recipient Email:

YourYourorganizationorganization’’ssownershipownershipand contactand contactinformation isinformation ishard-codedhard-codeddirectly intodirectly intoyouryourcustomizedcustomizedEnterpriseEnterpriseEditionEdition

PC PhoneHomePC PhoneHome™™ and andMacPhoneHomeMacPhoneHome™™

Enterprise can be installedEnterprise can be installedusing a variety of popularusing a variety of popular

““network pushnetwork push”” techniques techniques

Installation can beInstallation can becompletely transparentcompletely transparent

PC PhoneHomePC PhoneHome™™ and andMacPhoneHomeMacPhoneHome™™

Enterprise can also beEnterprise can also beinstalled using a variety ofinstalled using a variety of

popular disk imagingpopular disk imagingutilitiesutilities

protects the largest academic rollout ofprotects the largest academic rollout ofcomputers in US history!computers in US history!

When Apple wanted to protect this rolloutWhen Apple wanted to protect this rolloutTHEY called US!THEY called US!

We currently protect over 23,000 HenricoWe currently protect over 23,000 HenricoCounty, Va. Apple iBooks provided toCounty, Va. Apple iBooks provided tofaculty and students.faculty and students.

"This is the mammoth -- the single largest"This is the mammoth -- the single largestsale of portable computers in educationsale of portable computers in educationever," - Apple CEO Steve Jobsever," - Apple CEO Steve Jobs

Did you knowDid you know……

We also offer protection for iPads ...we can track your mobile computing device anywhere

in the world on a MAP!

We also offer Android PhoneHome™

Android PhoneHome™ protects all Android basedPhones and Tablets… Just like our other PhoneHome™ products we can

track your lost or stolen mobile computing device anywhere in the world!

We also offer Chrome PhoneHome ™

Chrome PhoneHome™ protects all Google Chrome basedTablets… Just like our other PhoneHome™ products we can track your

lost or stolen Chromebook anywhere in the world!

We also offer CopyAlert™

CopyAlert™ utilizes our award winning PhoneHome™ core technologyto protect your proprietary files from theft by alerting you via email of

unauthorized copying of your files by unauthorized parties.CopyAlert™ also provides a list of what files were copied! Don't be a

victim of corporate espionage!

Some of our Strategic PartnersSome of our Strategic Partners

Our computer protectionproducts have been

widely embraced and arein current use by the

academic community,private sector and

governmentorganizations

worldwide.

World HeadquartersWorld HeadquartersBrigadoon Software, Inc.Brigadoon Software, Inc.119 Rockland Center, Suite 250119 Rockland Center, Suite 250Nanuet, New York 10954 USANanuet, New York 10954 USATel: + 1-845-624-0909Tel: + 1-845-624-0909Fax: +1-845-624-0990Fax: +1-845-624-0990E-Mail: E-Mail: sales@brigadoonsoftware.comsales@brigadoonsoftware.comWeb Site: Web Site: www.brigadoonsoftware.comwww.brigadoonsoftware.com

Reseller Inquiries InvitedReseller Inquiries Invited

©© 1999-2013 Brigadoon Software, Inc. All rights Reserved. 1999-2013 Brigadoon Software, Inc. All rights Reserved.