SlideShare a Scribd company logo
Prot-On is going
to become the standard
in protecting information
that individuals and enterprises
share on the Internet
www.prot-on.com protonline
@prot_on
A clear need
info@prot-on.com
Today we need a standard
for protecting files
www.prot-on.com protonline
@prot_on
A innovating Vision: a standard for protecting files
Like 20 years ago we needed it
for portability
info@prot-on.com
All documents All devices All Users
www.prot-on.com protonline
@prot_on
A innovating Vision: Become a standard for protecting
Value-for-money Easy to use
info@prot-on.com
Cloud Integration
www.prot-on.com protonline
@prot_on
How it works (professional use case) I
info@prot-on.com
3. Sends the offer as always
(by email, uploading to Dropbox, in a USB, etc.)
1. A seller protects a proposal
with Prot-On
4. John receives the files, Prot-On checks
permissions and allows him to open the proposal
2. Deciding who, how and when can
access its offer
Read Print Edit Copy Manage
John
Mary
www.prot-on.com protonline
@prot_on
How it works (professional use case) II
info@prot-on.com
1. John requests to make modifications 2. The seller change permissions in real time
Read Print Edit Copy Manage
John
Mary
1. John forward the documents to Peter
John read Project_1 at 12:32 of Nov 20th, 2012
Mary edit Project_1 at 18:15 of Nov 21st, 2012
Peter couldn’t open Project_1 at 19:34 of Nov 21st, 2012
 With Audit tracking:
The seller knows who, what and when has
accessed any existing copy of its proposal
2. Peter tries to open the files, but Prot-On doesn’t give him
permissions: Peter cannot see the information
Read Print Edit Copy Manage
John
Mary
Peter
www.prot-on.com protonline
@prot_on
A groundbreaking business model
info@prot-on.com
Professionals PREMIUM service
• Additional features focused in a professional use
• Technical support
CORPORATE licenses
• Security keys stored in-house
• Integration with user
repository
• Integration with corporate
applications
CORPORATE service
• Administration level that allows that the
owner of a protected file is not the employee
who protects it but the company he/she
works for
• Additional features focused in enterprises
• Provide Premium Service to all employees
Enterprises and
Public
Administration
FREE serviceHome-Users
• Enabling the use of the Internet with confidence
(cloud storing, social networks, email)
• Goal: more than 10 M users in 2016
 More than 15.000 users
 More than 200 enterprises
 Great reception in big companies
www.prot-on.com protonline
@prot_on
Already a reality
Named best IT Security Solution 2012
by magazine “Red Seguridad” Spain
info@prot-on.com
Selected “They Could be Giants”
European Business Awards 2013
Winner Security Solution
of the year 2014 in the
European IT & Software
Excellence Awards 2014
Finalist as “Best Data
Leakage Prevention (DLP)
Solution” and “Rookie
Security Company of the
Year 2014” by SC
Magazine
protonline
@prot_on
www.prot-on.com
info@prot-on.com

More Related Content

PDF
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis
 
PDF
What will be the Impact of GDPR Compliance in EU & UK?
Cigniti Technologies Ltd
 
PDF
10-22-13 Presentation on Google Glass and Privacy Challenges
Jonathan Ezor
 
PPTX
Walk about tour in 淡水 by Wayne
wen pan Lin
 
PPT
развитие творческих способностей (презентация проекта)
wotjakowa
 
PPTX
為什麼低價團會有很多購物站?-胖哥哥旅遊創業
wen pan Lin
 
DOCX
Creation of a web service in sap
rajdongre
 
PPTX
Watchful-Corporate-Overview-Q1-16
Ravindran Vasu
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis
 
What will be the Impact of GDPR Compliance in EU & UK?
Cigniti Technologies Ltd
 
10-22-13 Presentation on Google Glass and Privacy Challenges
Jonathan Ezor
 
Walk about tour in 淡水 by Wayne
wen pan Lin
 
развитие творческих способностей (презентация проекта)
wotjakowa
 
為什麼低價團會有很多購物站?-胖哥哥旅遊創業
wen pan Lin
 
Creation of a web service in sap
rajdongre
 
Watchful-Corporate-Overview-Q1-16
Ravindran Vasu
 

Similar to elevatorpitchstartupawards-140409072128-phpapp02 (20)

PPTX
Making the Case for Stronger Endpoint Data Visibility
dianadvo
 
PDF
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
Joel Oleson
 
PDF
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir
 
PPT
Security in Web 2.0, Social Web and Cloud
ITDogadjaji.com
 
PDF
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
aradhana9856
 
PPTX
How To Connect To Your Customers, Partners Securely, Privately and Effectively
Andy Harjanto
 
PPT
FaceTime Web 2.0
Chris Sparshott
 
PDF
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Infosecurity2010
 
PDF
CIS13: The Power of the Cloud and Transformation in the Enterprise
CloudIDSummit
 
PDF
CHiWAO_for_All.compressed
Gennady Klemeshev
 
PPTX
info-sys-security.pptx
MhndHTaani
 
PDF
Securing Your Data for Your Journey to the Cloud
Liwei Ren任力偉
 
PPTX
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
Create IT
 
PPTX
SharePoint Securely Moblized - webinar with Colligo and Bitzer Mobile
Bitzer Mobile, now part of Oracle
 
PPTX
"We're all in this together" - educating users on the importance of cyber sec...
Jisc
 
PPTX
Seclore FileSecure IBM Filenet Walkthrough
siddarthc
 
PPTX
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Art Ocain
 
PPTX
Fyronic seminar-engage-slideshare
Franky Redant
 
PDF
Information protection and compliance
Dean Iacovelli
 
PDF
The 10 most trusted companies in enterprise security 2019
Insights success media and technology pvt ltd
 
Making the Case for Stronger Endpoint Data Visibility
dianadvo
 
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
Joel Oleson
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir
 
Security in Web 2.0, Social Web and Cloud
ITDogadjaji.com
 
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
aradhana9856
 
How To Connect To Your Customers, Partners Securely, Privately and Effectively
Andy Harjanto
 
FaceTime Web 2.0
Chris Sparshott
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Infosecurity2010
 
CIS13: The Power of the Cloud and Transformation in the Enterprise
CloudIDSummit
 
CHiWAO_for_All.compressed
Gennady Klemeshev
 
info-sys-security.pptx
MhndHTaani
 
Securing Your Data for Your Journey to the Cloud
Liwei Ren任力偉
 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
Create IT
 
SharePoint Securely Moblized - webinar with Colligo and Bitzer Mobile
Bitzer Mobile, now part of Oracle
 
"We're all in this together" - educating users on the importance of cyber sec...
Jisc
 
Seclore FileSecure IBM Filenet Walkthrough
siddarthc
 
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Art Ocain
 
Fyronic seminar-engage-slideshare
Franky Redant
 
Information protection and compliance
Dean Iacovelli
 
The 10 most trusted companies in enterprise security 2019
Insights success media and technology pvt ltd
 
Ad

More from Ravindran Vasu (6)

PPTX
GTB Data Leakage Prevention Use Cases 2014
Ravindran Vasu
 
PDF
GTB Technologies Datasheet 2014
Ravindran Vasu
 
PDF
GTB DLP Brochure
Ravindran Vasu
 
PDF
GTB IRM - Business Use Cases - 2013
Ravindran Vasu
 
PDF
GTB IRM - How it Works - 2013
Ravindran Vasu
 
PDF
GTB IRM - Usage Rights Matrix
Ravindran Vasu
 
GTB Data Leakage Prevention Use Cases 2014
Ravindran Vasu
 
GTB Technologies Datasheet 2014
Ravindran Vasu
 
GTB DLP Brochure
Ravindran Vasu
 
GTB IRM - Business Use Cases - 2013
Ravindran Vasu
 
GTB IRM - How it Works - 2013
Ravindran Vasu
 
GTB IRM - Usage Rights Matrix
Ravindran Vasu
 
Ad

elevatorpitchstartupawards-140409072128-phpapp02

  • 1. Prot-On is going to become the standard in protecting information that individuals and enterprises share on the Internet
  • 3. Today we need a standard for protecting files www.prot-on.com protonline @prot_on A innovating Vision: a standard for protecting files Like 20 years ago we needed it for portability [email protected]
  • 4. All documents All devices All Users www.prot-on.com protonline @prot_on A innovating Vision: Become a standard for protecting Value-for-money Easy to use [email protected] Cloud Integration
  • 5. www.prot-on.com protonline @prot_on How it works (professional use case) I [email protected] 3. Sends the offer as always (by email, uploading to Dropbox, in a USB, etc.) 1. A seller protects a proposal with Prot-On 4. John receives the files, Prot-On checks permissions and allows him to open the proposal 2. Deciding who, how and when can access its offer Read Print Edit Copy Manage John Mary
  • 6. www.prot-on.com protonline @prot_on How it works (professional use case) II [email protected] 1. John requests to make modifications 2. The seller change permissions in real time Read Print Edit Copy Manage John Mary 1. John forward the documents to Peter John read Project_1 at 12:32 of Nov 20th, 2012 Mary edit Project_1 at 18:15 of Nov 21st, 2012 Peter couldn’t open Project_1 at 19:34 of Nov 21st, 2012  With Audit tracking: The seller knows who, what and when has accessed any existing copy of its proposal 2. Peter tries to open the files, but Prot-On doesn’t give him permissions: Peter cannot see the information Read Print Edit Copy Manage John Mary Peter
  • 7. www.prot-on.com protonline @prot_on A groundbreaking business model [email protected] Professionals PREMIUM service • Additional features focused in a professional use • Technical support CORPORATE licenses • Security keys stored in-house • Integration with user repository • Integration with corporate applications CORPORATE service • Administration level that allows that the owner of a protected file is not the employee who protects it but the company he/she works for • Additional features focused in enterprises • Provide Premium Service to all employees Enterprises and Public Administration FREE serviceHome-Users • Enabling the use of the Internet with confidence (cloud storing, social networks, email) • Goal: more than 10 M users in 2016
  • 8.  More than 15.000 users  More than 200 enterprises  Great reception in big companies www.prot-on.com protonline @prot_on Already a reality Named best IT Security Solution 2012 by magazine “Red Seguridad” Spain [email protected] Selected “They Could be Giants” European Business Awards 2013 Winner Security Solution of the year 2014 in the European IT & Software Excellence Awards 2014 Finalist as “Best Data Leakage Prevention (DLP) Solution” and “Rookie Security Company of the Year 2014” by SC Magazine