SlideShare una empresa de Scribd logo
1 de 7
Content vigilance for forward thinkers Content Raven - Introduction
Who We Are  We help companies who want to share their digital content: Responsibly, Securely, Effectively Content Raven: Secure Content Distribution Cloud based Secures Mobile Analytics
Why We Do It Companies are losing digital content and Intellectual Property  Concerned with digital piracy?Losing video?  Losing documents? Attach a PDF to an email and hit send? Mass General Hospital New York Yankees Research Companies High Tech Software  WikiLeaks posts internal executive memos Losing millions per year in training revenue and IP Training videos and materials end up on YouTube, blogs, etc. Lost Excel spreadsheet of season ticket holders with credit card information Paid $1M fine for an employee leaving printed patient materials on the subway Customers forward pdf reports at will that are pure revenue Spends $40M in PR, technology, legal bills, and 3rd party security Losing millions in revenue
How We Do It Print? Forward? Watermark? Online Offline Mobile Secure Platform Customers Trainees Employees Publishers Users Analytics
Why We Are Different Focus Encryption Mobile Security Easy Install Analytics ,[object Object]
We work between the application and the OS, not within the application like Microsoft DRM or Oracle IRM
More secure, more scalable

Más contenido relacionado

Más de Content Raven

3 Common Sales Enablement Flaws & How to Fix Them
3 Common Sales Enablement Flaws & How to Fix Them3 Common Sales Enablement Flaws & How to Fix Them
3 Common Sales Enablement Flaws & How to Fix ThemContent Raven
 
Case Study - Cost Savings and Secure Digital Content Distribution
Case Study - Cost Savings and Secure Digital Content DistributionCase Study - Cost Savings and Secure Digital Content Distribution
Case Study - Cost Savings and Secure Digital Content DistributionContent Raven
 
Case Study - Customer Training
Case Study - Customer TrainingCase Study - Customer Training
Case Study - Customer TrainingContent Raven
 
Case Study - Global Sales Training
Case Study - Global Sales TrainingCase Study - Global Sales Training
Case Study - Global Sales TrainingContent Raven
 
Sales Enablement Infographic
Sales Enablement InfographicSales Enablement Infographic
Sales Enablement InfographicContent Raven
 
Training infographic
Training infographicTraining infographic
Training infographicContent Raven
 
Three Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content SharingThree Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content SharingContent Raven
 

Más de Content Raven (9)

3 Common Sales Enablement Flaws & How to Fix Them
3 Common Sales Enablement Flaws & How to Fix Them3 Common Sales Enablement Flaws & How to Fix Them
3 Common Sales Enablement Flaws & How to Fix Them
 
Case Study - Cost Savings and Secure Digital Content Distribution
Case Study - Cost Savings and Secure Digital Content DistributionCase Study - Cost Savings and Secure Digital Content Distribution
Case Study - Cost Savings and Secure Digital Content Distribution
 
Case Study - Customer Training
Case Study - Customer TrainingCase Study - Customer Training
Case Study - Customer Training
 
Case Study - Global Sales Training
Case Study - Global Sales TrainingCase Study - Global Sales Training
Case Study - Global Sales Training
 
Video+
Video+Video+
Video+
 
Sales Enablement Infographic
Sales Enablement InfographicSales Enablement Infographic
Sales Enablement Infographic
 
Training infographic
Training infographicTraining infographic
Training infographic
 
Self Paced Labs
Self Paced LabsSelf Paced Labs
Self Paced Labs
 
Three Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content SharingThree Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content Sharing
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Introduction to Content Raven

  • 1. Content vigilance for forward thinkers Content Raven - Introduction
  • 2. Who We Are We help companies who want to share their digital content: Responsibly, Securely, Effectively Content Raven: Secure Content Distribution Cloud based Secures Mobile Analytics
  • 3. Why We Do It Companies are losing digital content and Intellectual Property Concerned with digital piracy?Losing video? Losing documents? Attach a PDF to an email and hit send? Mass General Hospital New York Yankees Research Companies High Tech Software WikiLeaks posts internal executive memos Losing millions per year in training revenue and IP Training videos and materials end up on YouTube, blogs, etc. Lost Excel spreadsheet of season ticket holders with credit card information Paid $1M fine for an employee leaving printed patient materials on the subway Customers forward pdf reports at will that are pure revenue Spends $40M in PR, technology, legal bills, and 3rd party security Losing millions in revenue
  • 4. How We Do It Print? Forward? Watermark? Online Offline Mobile Secure Platform Customers Trainees Employees Publishers Users Analytics
  • 5.
  • 6. We work between the application and the OS, not within the application like Microsoft DRM or Oracle IRM
  • 8. Video, Audio, pdf, flash, html, Microsoft Suite, and more
  • 11. Eliminates problem of users needing admin rights to install an app
  • 12. Desktop app for offline access and collaboration
  • 13.
  • 14. EMC VILT Security Return 2008: unrealized value# VILT shipped = 3948, averagelistprice = $1,099 2009: unrealized value# VILT shipped = 4419 average list price = $970 75% share title once $3,254,139.00 $3,214,822.50 $1,607,411.25 $1,627,069.50 50% share title twice $803,705.63 $813,534.75 25% sharetitlethree times 25% of those sharing nowpurchaseowncopy – NEW SALES $1,406,484.84 $1,423,685.81 EMC Education Services recovered lost revenue opportunity by implementing Content Raven * Assume that 75% of VILT recipients share the product with at least one other person, 50% share with two, and 25% share with three or more others