We’ve heard… A picture is worth a thousand words Show, don’t tell Visuals give your audience something to focus on while they listen to you
Good Visuals Can Let your audience focus on something while they listen to you Build your credibility Make it easier to understand something for your audience Add details that you cannot cover in your speech
Showing Market Size/Growth (2009-2010) 14.7 Billion Worldwide Software Security Revenue CAGR: 12% $16.5 Trillion New Pieces of Mobile Malware 2,400 CAGR: 46% 3,400 2.5 Billion Number of Application Downloads CAGR: 226% 8.2 Billion *CAGR is compounded annual growth rate.
Target Market The details (below) are just spoken and not put on the slide Musicians Artists on the go Producers Sound Engineers The list goes on… Images to Illustrate Target Market
Little bits of great research can be used as footnotes… Only 23% of IT Professionals agreed that IT Risk management is very well integrated with the overall enterprise approach -2011 ISACA Study Mobile coupons are redeemed 10 times as often as traditional coupons. Average cost of a data breach: $214 per compromised record - Ponemon Institute “I recommend looking at … applications out there that can address security across multiple platforms. It's the only way you're going to gain any semblance of control.” - Kevin Beaver, Principal Information Security Consultant at Principle Logic
Mapping Competitors (Instructions) If you know you have a lot of competitors but know that your idea is better in two major ways Choose two characteristics that are on a scale The positive ones go on the top and the right Then map your competitors to their respective areas Always make sure your company is in the top right as the ideal solution! High Quality Low Quality Customized Mass Produced Your Product HERE!
Mapping Competitors (Example) Mobile Platforms PC Computing Data Protection Device Management Our Company
Competitive Comparison Security and Data Protection Virus/Malware Protection 44 Spyware Detection 424 Data Encryption 234 Data Backup 24 Mobile Firewall 4 Enterprise Readiness Centralized Administration 33334 Secure Login to Enterprise Apps 33334 Forensic and Auditing 114 Reporting 224
Competitors by Category Data LayerApplication Layer Network LayerService Layer Limitations: Designed as extension of PC products Focus on only one or two layers Reactive security – not future-proof Requires role-based administration
‘Smart art’ of all kinds can create great visuals OEM Licensing to: – Corporate Entities – Service Carriers – Mobile Application Developers Banking/Finance Sector with high needs for technical mobile security Enterprise Securing to high importance government networks Security Agencies, DoD, and Civilian Agencies Government More efficient and secure application creation Securely utilize emerging technologies and trends in mobile commerce (e.g. NFC) Developers Ensure security of smartphone and personal information from malware and applications Efficient use of system resources Consumers
$120,000 initial investment. Amazing potential for growth and capital return. We have all the experience and talent needed to launch this app. Investment plan and why should you invest in us? Pie charts are great for investment numbers and asks
Final Tips Think about what visuals can represent the words or ideas in the easiest way Experiment! It might take a few tries to find the right image or diagram. You might have better ideas than the examples presented Remember – you’re the star of the show. The presentation should add to what you are saying, not distract focus from you.
Your consent to our cookies if you continue to use this website.