You are on page 1of 6

SLIDE 1

A very Good Morning/Afternoon/Evening my name is [YOUR NAME] representing Synersoft


– Black Box.

Before I start my presentation I would like to mention something about Synersoft as a


company.

It is a 15-year-old company and we are the owner of Black Box. We created this product
from scratch and we own the technology. It is not a product that we resell but something
that our own developers have built over the years to which we own the patents.

We have over 10,000 plus deployments of Black Box around US, UK, UAE and of course
India.

We are seed funded by Government of India and incubated by IIM (Indian Institute of
Management Ahmedabad)

_________________________________________________________________
TRANSITION – If I have to explain what BLACKbox does for an enterprise in
one sentence, then I would choose to state that BLACKbox is an ultimate
solution for Data Loss Leakage and Theft Prevention.

SLIDE 2
So now let us understand what do we mean by Data

Data is all the digital assets in your company.


And this data includes Documents, Spreadsheets, Designs, Drawings, Formula, Cost Sheet,
Customer Information, Accounts Data, ERP Data, HR Data Etc.

Now if data is lost the business cannot continue.

If data is stolen then the organization is prone to competitive exploitation.

TRANSITION – Then how do we ensure that data is not lost, leaked or stolen?
Let us see.

SLIDE 3
Now let me give you a Laymen example. Imagine, in this room, hundreds of marbles
scattered on the floor. You will agree with me that it will be very difficult to protect these
scattered marbles from loss or theft.

Now what if we gather all those marbles and put them in a jar altogether and put them in
one corner of a room? You will agree with me that it will be far easier to protect those
marbles from loss or theft.

The same applies to data. When data is kept scattered across desktops, laptops, servers it is
very difficult to protect it from loss, leakage and theft. You will agree with me that If the
data is centralized on central storage, it is far easier to protect it from loss, leakage and
theft.

Let us understand how data is centralized.


SLIDE 4
Traditionally Data is Centralized by:-
1. Setting up a File Server or NAS (Network Attached Storage)
2. Then Sharing the Folders over the network and map those folders on users’ systems
3. Then Requesting users to save data on a network drive

Now there is a major problem here as we are completely dependent on the will and desire
of the employee to save their data on these centralized location and its not stopping them
from saving the file on their own desktop or laptop.

This democratic choice of user's discretion to centralize or scatter the data cannot be
allowed.

So here is where BLACKbox makes a difference.


Black Box helps in forced centralization of data.
Blackbox does device hardening to restrict the user to scatter data.

And this is done in two parts. With a Hardware storage device which can be deployed on
your premises as well as on data center.

And secondly a Software agent deployed on a windows laptop or desktop.

Device Hardening and Forced Centralization by BLACKbox is achieved by:


 By defining which computer / computers the user will have access to.
 By withdrawing admin rights from users.
 By denying access to local resources.
 Defining which applications the user will work on.
 By forcing user to access / store data from / to central location only.

Device Hardening Technology of BLACKbox can save significant MS server and client access
license cost. If this sounds interesting to you, we can organize a demonstration of the
product and show how it is done.

In addition to this there is addon product which is called Black Box AAA (Access Application
Anywhere). With this the user can access applications such as Tally, SAP, customized ERP
etc. (Client / Server based applications) from anywhere. It is the most cost effective and
secured solution for work from home or remote access requirements.

BLACKbox AAA can save significant licensing cost on MS Terminal Server and RDP CAL used
for remote access.
If this sound interesting to you, we can organize a demonstration session to show how it
This can also be very useful for WFH environment as it can work on very low bandwidth.

SLIDE 5
Now in this part we will see how data loss is taken care off by Black Box

First let us understand data loss possibilities:-

Data can be deleted accidentally where in a user by mistakenly deletes a file or it can be
intentional where a user mischievously deletes all the data before leaving the organization.

Data can also be lost due to infection which may arise from a ransomware attack or a virus
attack.
And thirdly the data can be lost due to hardware crash, natural disaster like a fire in the
office etc.
Or a user laptop can get formatted or is lost.

Investment in BLACKbox can prevent loss of your digital assets due to accidental or
intentional deletion, ransomware attack, disaster, hardware crash or loss of laptop.

It can save significant hardware and software cost in terms of smart hardware and DLP
agetns. If this sounds interesting to you we can organize a demonstration to show how
BLACKbox can protect data in live environment.

SLIDE 6
Now, let us understand how data can be stolen from the organization.

Most of the times data is stolen by the employees, they just take the data while they quit
the job or it is the last day of the job or many times for competitive purposes also.

And these data can be stolen over USB port or email attachment or internet drives. So,
either of the three possibilities are there to take away the data out of the organization.

BLACKbox can save significant cost of DLP end point agents and protect data from being
stolen over USB port, Email Attachment or the Internet.

If this sounds interesting to you, we can show the demonstration in live environment how
BLACKbox can protect data from being stolen over USB port, Email Attachment or the
Internet.
Not only that but also, BLACKbox has some smart features like screen capturing to monitor
productivity of work from home users or remote users.

SLIDE 7
So to summarize, this is how you can have complete control on your IT systems, you can
harden the system and force the user to save data where you want them to.

You can make sure that your data is not lost due to deletion infection or disaster.

You can make sure that all your data is not stolen over USB port or email attachments or
over the internet.

You can also have a complete control on your users so that you can monitor their
productivity through the screen capture facility.

So this is all in our today’s presentation.

At this moment I am very sure that you will be interested in knowing how this technology
BlackBox works in a live environment. For that I can organize a demonstration for you in a
live environment and show you the hardening policy of the BlackBox and its other useful
features on a working network.

Now I am open to any questions you might have for me. Thank you.

You might also like