SlideShare una empresa de Scribd logo
1 de 32
Descargar para leer sin conexión
Click to edit Master subtitle style
Agenda
• Absolute Software Overview
• Consumer Absolute LoJack
–
–
–
–
–

Device Theft – A Worldwide Epidemic
Competitive Differentiation
Absolute LoJack Product Portfolio
Go to Market: OEM, Retail, Direct
Value Proposition

• Absolute LoJack Mobility
– Samsung Partnership
– Merchandising
– Go To Market

• Back Up
Absolute Software Overview
Absolute Software – Overview
Technology and services that protect your digital world.

Offices:

Distinguishing Facts:

• Corporate: Vancouver, BC
and Austin, TX USA

• Built into device firmware/BIOS since 2005

• EMEA: Reading, UK
• Regional: Kuala Lampur, Tokyo,
Taipei, Singapore
• In-Country Partners: Australia,
Columbia, Brazil, South Africa and Mexico

• 15 Patents worldwide; 49 pending
• SaaS delivery with over 6 million
subscriptions worldwide
• 30,000+ Devices Recovered
• Proven recoveries in over 106 Countries
• Over 36 million in recovered collateral
Absolute Software – Overview
Specializing in tracking, management and security solutions for
smartphones, tablets & PCs

• Vancouver, B.C. headquartered
• Founded in 1993; publicly traded since 2000
• Global leader in firmware-based security solutions
• Strategic partnerships with leading device OEMs
• Samsung SEAP Partner
Absolute Software – Overview
OEM Partner Success

•

BIOS persistent

•

BIOS persistent

•

BIOS persistent

•

Embedded on
ElitePad 900
Windows tablets

•

Global Anti-theft
ISV for all
Ultrabooks

•

Embedded on
Thinkpad
Android tablets

•

Included in every
HP CarePack

• 2012 Diamond
Supplier Award

• Only security solution
available directly
through Apple

•

BIOS persistent

•

Embedded on
Galaxy flagship
smartphones &
tablets

•

SAFE MDM
support

•

Samsung
Enterprise
Alliance Partner

•

Samsung KNOX
MDM Partner
Absolute Software Overview
Cross-platform & device support, persistence & emergency response services

Endpoint Security for Consumers
Remotely track, manage, secure & recover devices.

Endpoint Security for IT
Centrally track and secure IT assets within a cloud-based
console.

Endpoint Management
Complete end-to-end lifecycle management for iOS,
Android, Windows Phone, PC & Mac devices.
Absolute Software – Overview
Routes to Market
Absolute Firmware Persistent Technology

Device OEMs

Absolute.com

Retailers

Consumer

Telco

OEMs

Corporate

Resellers
Absolute Software – Overview
Over 30 Trusted Partners around the world
Consumer: Absolute LoJack
Absolute LoJack
Device Theft. A World Wide Epidemic.
Top Officials Publicly Pressure manufacturers to solve the problem.

Laptop Theft Stats

2

Mobile Device Theft Stats

3

1
4

5

6

4

Sources:
1. Absolute Software - 2012 End Point Management Report; 2. Ponemon Institute 2008 - Airport Insecurity: the case of lost laptops; 3. FBI Statistics; 4. Huffington Post: March 2013 “Apple Picking: How the iPhone
Became An Object Worth Killing For”; 4. Federal Communications Commissions 5. Jack Wraith, chairman of the Mobile Industry Crime Action Forum,
Absolute LoJack Competitive Differentiation:
Absolute Investigation and Recovery Services Team.
Upping the Ante in Device Theft Recovery.
Absolute LoJack Competitive Differentiation
Persistence the only solution designed to survive a factory reset
Absolute LoJack Product Portfolio
Absolute LoJack
The only solution than can safely recover a stolen device, while providing
features to protect the data on the device.
Product Features

Operating Systems
Windows
8*, 8.1, 7
or Vista

For Mac
OS X 10.7+

Android
2.3+

Android
2.3+
Absolute LoJack Global Availability
ONLINE MERCHANDISING:

Absolute LoJack Marketing
RETAIL PACKAGING:

SELL SHEETS &
BATTLECARDS

INFOGRAPHICS

SALES BROCHURE:
Absolute LoJack News and Awards

RATINGS
& REVIEWS
"Through diligent
work performed
by Absolute
Software and
the LAPD they
recovered my
laptop and its now
in my
possession.“
- R. Vidales,
Los Angles CA
Absolute LoJack
Different Go To Market Programs to meet Your business objectives

Immediate
Revenue

Recurring
revenue stream

Grow Services
Portfolio

• Sell Stand alone at POS
or APOS
• Margin rich product
• Differentiate from
competition
• Added value to
consumer
• ESD – no inventory
costs

• Sell or Bundle Absolute
LoJack with existing
services
• SaaS model
• High lifetime value
• Exponentially grows as
more subscriptions get
into the pipeline

• Stronger security value
prop across portfolio
“most secure device on
the planet”
• Increase attach rates to
an existing item
• Value add to upsell

Industry Leading theft recovery solution with strong brand identification
Bundle Absolute LoJack to Add Revenue and Margin

Immediate
Revenue
• Sell Stand alone at
POS or APOS
• Margin rich product
• Differentiate from
competition
• Added value to
consumer
• No cost inventory
with ESD

Retail Gift Card with “protected” device label

MacMall.com Configurator – POS add on
Build a recurring revenue stream as a bundle or stand alone
The larger the install base, the larger the revenue stream

Recurring
revenue stream
• Sell or Bundle Absolute
LoJack with existing
services
• SaaS model
• High lifetime value
• Exponentially grows as
more subscriptions get
into the pipeline
Include in Services Portfolio to build attach or upsell

Grow Services
Portfolio
• Stronger security value
prop across portfolio
“most secure device
on the planet”
• Increase attach rates
to an existing item
• Value add to upsell
Absolute LoJack Mobility

23
Samsung Strategic Alliance
Expanding Partnership
Samsung PCs
•

Computrace BIOS persistent on Series 2-9 Windows Notebooks

Samsung Mobile Devices
•

Computrace Firmware Persistence on 100M+ flagship Galaxy
smartphones & tablets

Samsung Enterprise Alliance Program (SEAP)
•

SEAP Gold Partner

Samsung Approved For Enterprise (SAFE)
•

Enhanced SAFE API support with Absolute Manage MDM

Samsung KNOX MDM Support
•

Samsung KNOX MDM integration – Q1 2014
Absolute LoJack Marketing
Make your device the most secure on the planet
Mobility Marketing
Premium Security
Add Absolute LoJack to be the most secure device on the planet
Co-Brand or White Label an Absolute LoJack Product

Front

Back
Absolute LoJack Theft Recovery and Security Products
The ideal compliment to insurance for total product protection
Additional slides
Absolute LoJack. Many devices. One solution.

Windows
8*, 8.1, 7
or Vista

For Mac
OS X 10.7+

Android
2.3+

Android
2.3+
Absolute Software
Highest recovery rate in the industry

Agent is installed

Absolute Theft Recovery
Team forensically mines
stolen device

Device is stolen

Thief and location are
identified

Owner contacts
local police and
Absolute

Stolen device is recovered

Más contenido relacionado

La actualidad más candente

Introducing the WSO2 Enterprise Mobility Manager
Introducing the WSO2 Enterprise Mobility ManagerIntroducing the WSO2 Enterprise Mobility Manager
Introducing the WSO2 Enterprise Mobility ManagerWSO2
 
Spontania Online Video Conferencing
Spontania Online Video ConferencingSpontania Online Video Conferencing
Spontania Online Video ConferencingPaul Richards
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0Dilshan Edirisuriya
 
Device management by WSO2 Enterprise Mobility Manager
Device management by WSO2 Enterprise Mobility ManagerDevice management by WSO2 Enterprise Mobility Manager
Device management by WSO2 Enterprise Mobility ManagerWSO2
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldSamsung Business USA
 
Introduction to Enterprise Mobility Manager
Introduction to Enterprise Mobility Manager Introduction to Enterprise Mobility Manager
Introduction to Enterprise Mobility Manager WSO2
 
Guerrilla QA: The Mobile of the Internet of All the Things!
Guerrilla QA: The Mobile of the Internet of All the Things!Guerrilla QA: The Mobile of the Internet of All the Things!
Guerrilla QA: The Mobile of the Internet of All the Things!Josiah Renaudin
 
Verivo and Forrester Mobile Strategies
Verivo and Forrester Mobile StrategiesVerivo and Forrester Mobile Strategies
Verivo and Forrester Mobile StrategiesVerivoSoftware
 
The Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business EnablerThe Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business EnablerSamsung Business USA
 
Mobile interoperability and business productivity
Mobile interoperability and business productivityMobile interoperability and business productivity
Mobile interoperability and business productivityAllSeen Alliance
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices WSO2
 
Mi5 Business Intro 103
Mi5 Business Intro 103Mi5 Business Intro 103
Mi5 Business Intro 103scottwattie
 
Industry Organizations’ global perspective on 5G
Industry Organizations’ global perspective on 5GIndustry Organizations’ global perspective on 5G
Industry Organizations’ global perspective on 5GOpen Mobile Alliance
 
Design Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesDesign Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesInductive Automation
 
Programming the Internet of Things: Why Devices Need APIs
Programming the Internet of Things: Why Devices Need APIsProgramming the Internet of Things: Why Devices Need APIs
Programming the Internet of Things: Why Devices Need APIsAllSeen Alliance
 

La actualidad más candente (19)

Introducing the WSO2 Enterprise Mobility Manager
Introducing the WSO2 Enterprise Mobility ManagerIntroducing the WSO2 Enterprise Mobility Manager
Introducing the WSO2 Enterprise Mobility Manager
 
Spontania Online Video Conferencing
Spontania Online Video ConferencingSpontania Online Video Conferencing
Spontania Online Video Conferencing
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
 
Device management by WSO2 Enterprise Mobility Manager
Device management by WSO2 Enterprise Mobility ManagerDevice management by WSO2 Enterprise Mobility Manager
Device management by WSO2 Enterprise Mobility Manager
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile world
 
Camdog pitch deck
Camdog pitch deckCamdog pitch deck
Camdog pitch deck
 
Mobility Meets Manufacturing
Mobility Meets ManufacturingMobility Meets Manufacturing
Mobility Meets Manufacturing
 
Introduction to Enterprise Mobility Manager
Introduction to Enterprise Mobility Manager Introduction to Enterprise Mobility Manager
Introduction to Enterprise Mobility Manager
 
Guerrilla QA: The Mobile of the Internet of All the Things!
Guerrilla QA: The Mobile of the Internet of All the Things!Guerrilla QA: The Mobile of the Internet of All the Things!
Guerrilla QA: The Mobile of the Internet of All the Things!
 
Verivo and Forrester Mobile Strategies
Verivo and Forrester Mobile StrategiesVerivo and Forrester Mobile Strategies
Verivo and Forrester Mobile Strategies
 
The Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business EnablerThe Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business Enabler
 
Mobile interoperability and business productivity
Mobile interoperability and business productivityMobile interoperability and business productivity
Mobile interoperability and business productivity
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices
 
Mi5 Business Intro 103
Mi5 Business Intro 103Mi5 Business Intro 103
Mi5 Business Intro 103
 
Get More Data Into Your SCADA
Get More Data Into Your SCADAGet More Data Into Your SCADA
Get More Data Into Your SCADA
 
WWT Intelligent WAN Presentation
WWT Intelligent WAN PresentationWWT Intelligent WAN Presentation
WWT Intelligent WAN Presentation
 
Industry Organizations’ global perspective on 5G
Industry Organizations’ global perspective on 5GIndustry Organizations’ global perspective on 5G
Industry Organizations’ global perspective on 5G
 
Design Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesDesign Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise Architectures
 
Programming the Internet of Things: Why Devices Need APIs
Programming the Internet of Things: Why Devices Need APIsProgramming the Internet of Things: Why Devices Need APIs
Programming the Internet of Things: Why Devices Need APIs
 

Destacado

therapeutic-hypothermia-global-journal-of-anesthesiology-peertechz-journals
therapeutic-hypothermia-global-journal-of-anesthesiology-peertechz-journalstherapeutic-hypothermia-global-journal-of-anesthesiology-peertechz-journals
therapeutic-hypothermia-global-journal-of-anesthesiology-peertechz-journalsPeertechz Publications
 
ICT - enabler of innovation in education
ICT - enabler of innovation in educationICT - enabler of innovation in education
ICT - enabler of innovation in educationRoman Baranovic
 
Viking Window Corporate Presentation 2008 Uk
Viking Window Corporate Presentation 2008 UkViking Window Corporate Presentation 2008 Uk
Viking Window Corporate Presentation 2008 UkTanel Kookmaa
 
Unlikely Events
Unlikely EventsUnlikely Events
Unlikely Eventsim_shubner
 
teropong hikmat
teropong hikmatteropong hikmat
teropong hikmatAbd Fatah
 
Media Proposal
 Media Proposal  Media Proposal
Media Proposal Pedz97
 
Matchfixnig power point
Matchfixnig power pointMatchfixnig power point
Matchfixnig power pointMarco Buus
 
õPpe ja kasvatustöö käsitlemine õpetajatöö kolme järjestiku etapina
õPpe  ja kasvatustöö käsitlemine õpetajatöö kolme järjestiku etapinaõPpe  ja kasvatustöö käsitlemine õpetajatöö kolme järjestiku etapina
õPpe ja kasvatustöö käsitlemine õpetajatöö kolme järjestiku etapinarita Nevidemskaja
 
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -Promises Addiction Treatment | Alcohol Drug Rehab Malibu -
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -tacitnugget8140
 
L'immagine turistica del Trentino
L'immagine turistica del TrentinoL'immagine turistica del Trentino
L'immagine turistica del TrentinoAntonio N. Preiti
 

Destacado (18)

therapeutic-hypothermia-global-journal-of-anesthesiology-peertechz-journals
therapeutic-hypothermia-global-journal-of-anesthesiology-peertechz-journalstherapeutic-hypothermia-global-journal-of-anesthesiology-peertechz-journals
therapeutic-hypothermia-global-journal-of-anesthesiology-peertechz-journals
 
Emplyment Tribunal Statistics
Emplyment Tribunal StatisticsEmplyment Tribunal Statistics
Emplyment Tribunal Statistics
 
ICT - enabler of innovation in education
ICT - enabler of innovation in educationICT - enabler of innovation in education
ICT - enabler of innovation in education
 
FINANCIAL IMPLICATIONS OF DIVORCE AFTER 50
FINANCIAL IMPLICATIONS OF DIVORCE AFTER 50FINANCIAL IMPLICATIONS OF DIVORCE AFTER 50
FINANCIAL IMPLICATIONS OF DIVORCE AFTER 50
 
Viking Window Corporate Presentation 2008 Uk
Viking Window Corporate Presentation 2008 UkViking Window Corporate Presentation 2008 Uk
Viking Window Corporate Presentation 2008 Uk
 
R&G21st
R&G21stR&G21st
R&G21st
 
Ann massoud
Ann massoudAnn massoud
Ann massoud
 
Unlikely Events
Unlikely EventsUnlikely Events
Unlikely Events
 
130111 shuvaev brief
130111 shuvaev brief130111 shuvaev brief
130111 shuvaev brief
 
teropong hikmat
teropong hikmatteropong hikmat
teropong hikmat
 
Media Proposal
 Media Proposal  Media Proposal
Media Proposal
 
Maquiecologico
MaquiecologicoMaquiecologico
Maquiecologico
 
Case presentation
Case presentationCase presentation
Case presentation
 
Matchfixnig power point
Matchfixnig power pointMatchfixnig power point
Matchfixnig power point
 
õPpe ja kasvatustöö käsitlemine õpetajatöö kolme järjestiku etapina
õPpe  ja kasvatustöö käsitlemine õpetajatöö kolme järjestiku etapinaõPpe  ja kasvatustöö käsitlemine õpetajatöö kolme järjestiku etapina
õPpe ja kasvatustöö käsitlemine õpetajatöö kolme järjestiku etapina
 
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -Promises Addiction Treatment | Alcohol Drug Rehab Malibu -
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -
 
L'immagine turistica del Trentino
L'immagine turistica del TrentinoL'immagine turistica del Trentino
L'immagine turistica del Trentino
 
Lo1 task 2
Lo1 task 2Lo1 task 2
Lo1 task 2
 

Similar a Absolute Software & Lojack – 2014 Overview

PeoplePower:HelloWorld
PeoplePower:HelloWorldPeoplePower:HelloWorld
PeoplePower:HelloWorldStan Curtis
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.pptssusera76ea9
 
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokia
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, NokiaThe Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokia
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokiamfrancis
 
Designing a Mobile Device Lab - XBOSoft Webinar
Designing a Mobile Device Lab - XBOSoft WebinarDesigning a Mobile Device Lab - XBOSoft Webinar
Designing a Mobile Device Lab - XBOSoft WebinarXBOSoft
 
Pc tech pitch deck
Pc tech pitch deckPc tech pitch deck
Pc tech pitch deckJune Barrett
 
Particle Keynote with Zach Supalla
Particle Keynote with Zach SupallaParticle Keynote with Zach Supalla
Particle Keynote with Zach SupallaParticle
 
Prosoft mobile services v3
Prosoft mobile services v3Prosoft mobile services v3
Prosoft mobile services v3rajpsft
 
Gadget world-pr-v2.0
Gadget world-pr-v2.0Gadget world-pr-v2.0
Gadget world-pr-v2.0opaclabs
 
Open Source Business Case Final
Open Source Business Case FinalOpen Source Business Case Final
Open Source Business Case FinalFITT
 
Westcon Group Corporate For Von Show Final
Westcon Group Corporate For Von Show FinalWestcon Group Corporate For Von Show Final
Westcon Group Corporate For Von Show FinalCarl Ford
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategyitnewsafrica
 
Lenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnLenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnTony DeGonia (LION)
 
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Blancco
 
Microsoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with RunpipeMicrosoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with RunpipeRunpipe
 
BEACON TECHNOLOGY OVERVIEW
BEACON TECHNOLOGY OVERVIEWBEACON TECHNOLOGY OVERVIEW
BEACON TECHNOLOGY OVERVIEWDonnovan Andrews
 
Why Enterprises are embracing Open Source Technologies
Why Enterprises are embracing Open Source TechnologiesWhy Enterprises are embracing Open Source Technologies
Why Enterprises are embracing Open Source TechnologiesKuliza Technologies
 
LML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILouis-Martin Landry
 

Similar a Absolute Software & Lojack – 2014 Overview (20)

PeoplePower:HelloWorld
PeoplePower:HelloWorldPeoplePower:HelloWorld
PeoplePower:HelloWorld
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokia
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, NokiaThe Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokia
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokia
 
Designing a Mobile Device Lab - XBOSoft Webinar
Designing a Mobile Device Lab - XBOSoft WebinarDesigning a Mobile Device Lab - XBOSoft Webinar
Designing a Mobile Device Lab - XBOSoft Webinar
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Pc tech pitch deck
Pc tech pitch deckPc tech pitch deck
Pc tech pitch deck
 
Particle Keynote with Zach Supalla
Particle Keynote with Zach SupallaParticle Keynote with Zach Supalla
Particle Keynote with Zach Supalla
 
Prosoft mobile services v3
Prosoft mobile services v3Prosoft mobile services v3
Prosoft mobile services v3
 
Gadget world-pr-v2.0
Gadget world-pr-v2.0Gadget world-pr-v2.0
Gadget world-pr-v2.0
 
Open Source Business Case Final
Open Source Business Case FinalOpen Source Business Case Final
Open Source Business Case Final
 
Westcon Group Corporate For Von Show Final
Westcon Group Corporate For Von Show FinalWestcon Group Corporate For Von Show Final
Westcon Group Corporate For Von Show Final
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
 
Lenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnLenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and Learn
 
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
 
Microsoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with RunpipeMicrosoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with Runpipe
 
BEACON TECHNOLOGY OVERVIEW
BEACON TECHNOLOGY OVERVIEWBEACON TECHNOLOGY OVERVIEW
BEACON TECHNOLOGY OVERVIEW
 
Why Enterprises are embracing Open Source Technologies
Why Enterprises are embracing Open Source TechnologiesWhy Enterprises are embracing Open Source Technologies
Why Enterprises are embracing Open Source Technologies
 
LML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTI
 

Más de Absolute LoJack

Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8Absolute LoJack
 
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0Absolute LoJack
 
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Absolute LoJack
 

Más de Absolute LoJack (9)

Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8
 
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
 
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
 

Último

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Último (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Absolute Software & Lojack – 2014 Overview

  • 1. Click to edit Master subtitle style
  • 2. Agenda • Absolute Software Overview • Consumer Absolute LoJack – – – – – Device Theft – A Worldwide Epidemic Competitive Differentiation Absolute LoJack Product Portfolio Go to Market: OEM, Retail, Direct Value Proposition • Absolute LoJack Mobility – Samsung Partnership – Merchandising – Go To Market • Back Up
  • 4. Absolute Software – Overview Technology and services that protect your digital world. Offices: Distinguishing Facts: • Corporate: Vancouver, BC and Austin, TX USA • Built into device firmware/BIOS since 2005 • EMEA: Reading, UK • Regional: Kuala Lampur, Tokyo, Taipei, Singapore • In-Country Partners: Australia, Columbia, Brazil, South Africa and Mexico • 15 Patents worldwide; 49 pending • SaaS delivery with over 6 million subscriptions worldwide • 30,000+ Devices Recovered • Proven recoveries in over 106 Countries • Over 36 million in recovered collateral
  • 5. Absolute Software – Overview Specializing in tracking, management and security solutions for smartphones, tablets & PCs • Vancouver, B.C. headquartered • Founded in 1993; publicly traded since 2000 • Global leader in firmware-based security solutions • Strategic partnerships with leading device OEMs • Samsung SEAP Partner
  • 6. Absolute Software – Overview OEM Partner Success • BIOS persistent • BIOS persistent • BIOS persistent • Embedded on ElitePad 900 Windows tablets • Global Anti-theft ISV for all Ultrabooks • Embedded on Thinkpad Android tablets • Included in every HP CarePack • 2012 Diamond Supplier Award • Only security solution available directly through Apple • BIOS persistent • Embedded on Galaxy flagship smartphones & tablets • SAFE MDM support • Samsung Enterprise Alliance Partner • Samsung KNOX MDM Partner
  • 7. Absolute Software Overview Cross-platform & device support, persistence & emergency response services Endpoint Security for Consumers Remotely track, manage, secure & recover devices. Endpoint Security for IT Centrally track and secure IT assets within a cloud-based console. Endpoint Management Complete end-to-end lifecycle management for iOS, Android, Windows Phone, PC & Mac devices.
  • 8. Absolute Software – Overview Routes to Market Absolute Firmware Persistent Technology Device OEMs Absolute.com Retailers Consumer Telco OEMs Corporate Resellers
  • 9. Absolute Software – Overview Over 30 Trusted Partners around the world
  • 11. Absolute LoJack Device Theft. A World Wide Epidemic. Top Officials Publicly Pressure manufacturers to solve the problem. Laptop Theft Stats 2 Mobile Device Theft Stats 3 1 4 5 6 4 Sources: 1. Absolute Software - 2012 End Point Management Report; 2. Ponemon Institute 2008 - Airport Insecurity: the case of lost laptops; 3. FBI Statistics; 4. Huffington Post: March 2013 “Apple Picking: How the iPhone Became An Object Worth Killing For”; 4. Federal Communications Commissions 5. Jack Wraith, chairman of the Mobile Industry Crime Action Forum,
  • 12. Absolute LoJack Competitive Differentiation: Absolute Investigation and Recovery Services Team. Upping the Ante in Device Theft Recovery.
  • 13. Absolute LoJack Competitive Differentiation Persistence the only solution designed to survive a factory reset
  • 15. Absolute LoJack The only solution than can safely recover a stolen device, while providing features to protect the data on the device. Product Features Operating Systems Windows 8*, 8.1, 7 or Vista For Mac OS X 10.7+ Android 2.3+ Android 2.3+
  • 16. Absolute LoJack Global Availability
  • 17. ONLINE MERCHANDISING: Absolute LoJack Marketing RETAIL PACKAGING: SELL SHEETS & BATTLECARDS INFOGRAPHICS SALES BROCHURE:
  • 18. Absolute LoJack News and Awards RATINGS & REVIEWS "Through diligent work performed by Absolute Software and the LAPD they recovered my laptop and its now in my possession.“ - R. Vidales, Los Angles CA
  • 19. Absolute LoJack Different Go To Market Programs to meet Your business objectives Immediate Revenue Recurring revenue stream Grow Services Portfolio • Sell Stand alone at POS or APOS • Margin rich product • Differentiate from competition • Added value to consumer • ESD – no inventory costs • Sell or Bundle Absolute LoJack with existing services • SaaS model • High lifetime value • Exponentially grows as more subscriptions get into the pipeline • Stronger security value prop across portfolio “most secure device on the planet” • Increase attach rates to an existing item • Value add to upsell Industry Leading theft recovery solution with strong brand identification
  • 20. Bundle Absolute LoJack to Add Revenue and Margin Immediate Revenue • Sell Stand alone at POS or APOS • Margin rich product • Differentiate from competition • Added value to consumer • No cost inventory with ESD Retail Gift Card with “protected” device label MacMall.com Configurator – POS add on
  • 21. Build a recurring revenue stream as a bundle or stand alone The larger the install base, the larger the revenue stream Recurring revenue stream • Sell or Bundle Absolute LoJack with existing services • SaaS model • High lifetime value • Exponentially grows as more subscriptions get into the pipeline
  • 22. Include in Services Portfolio to build attach or upsell Grow Services Portfolio • Stronger security value prop across portfolio “most secure device on the planet” • Increase attach rates to an existing item • Value add to upsell
  • 24. Samsung Strategic Alliance Expanding Partnership Samsung PCs • Computrace BIOS persistent on Series 2-9 Windows Notebooks Samsung Mobile Devices • Computrace Firmware Persistence on 100M+ flagship Galaxy smartphones & tablets Samsung Enterprise Alliance Program (SEAP) • SEAP Gold Partner Samsung Approved For Enterprise (SAFE) • Enhanced SAFE API support with Absolute Manage MDM Samsung KNOX MDM Support • Samsung KNOX MDM integration – Q1 2014
  • 25. Absolute LoJack Marketing Make your device the most secure on the planet
  • 27. Premium Security Add Absolute LoJack to be the most secure device on the planet
  • 28. Co-Brand or White Label an Absolute LoJack Product Front Back
  • 29. Absolute LoJack Theft Recovery and Security Products The ideal compliment to insurance for total product protection
  • 31. Absolute LoJack. Many devices. One solution. Windows 8*, 8.1, 7 or Vista For Mac OS X 10.7+ Android 2.3+ Android 2.3+
  • 32. Absolute Software Highest recovery rate in the industry Agent is installed Absolute Theft Recovery Team forensically mines stolen device Device is stolen Thief and location are identified Owner contacts local police and Absolute Stolen device is recovered