amulet™ technology digital asset security

19
Certitude Digital Cybersecurity Software Technologies Gary Phillips, CEO/Co-Founder, [email protected] F. Scott Deaver, CTO/Founder, [email protected] Scott Orman, COO/Co-Founder, [email protected] January 2019

Upload: others

Post on 20-May-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: AMULET™ Technology Digital Asset Security

Certitude Digital

Cybersecurity Software Technologies

Gary Phillips, CEO/Co-Founder, [email protected]

F. Scott Deaver, CTO/Founder, [email protected]

Scott Orman, COO/Co-Founder, [email protected]

January 2019

Page 2: AMULET™ Technology Digital Asset Security

is a cybersecurity company solving identity access management problems in a vast market with patented technologies that permanently

protect files.

Page 3: AMULET™ Technology Digital Asset Security

Experienced team…

Management Team

F. Scott Deaver, CTO/Director/Co-Founder [30 yrs. exp., NASA, Exxon, GE, American Airlines,

HP, BMC. Primary listed inventor of over ten cybersecurity & software patents/applications.]

Scott Orman, COO/Director/Co-Founder [25 yrs. exp., Qualcomm, Northrop Grumman.

Patent primary listed inventor and experienced entrepreneur.]

HD Vo, Technology Advisor/Director/Co-Founder [25 yrs. Global exp., MIT, Kellogg MBA,

serial technology entrepreneur with successful 8-digit valuation startup, experienced

executive with extensive overseas experience]

Gary Phillips, CEO/Director/Co-Founder [25 yrs. Global exp., Career Sciences, P&G, VW

Group, SS/L, Honda. Serial Entrepreneur with 2 successful exits, MBA Finance/MSc Strategy

Kelley School of Business, Indiana University]

Page 4: AMULET™ Technology Digital Asset Security

$6tn

Substantial Market Opportunity

Our MarketAny business or individual that wants to protect their files.

Transcends verticals and geographies.

Worldwide Security Spending by Segment2019 in Millions of U.S. Dollars

Application Security

Our Market Segments

Cloud Security

Data Security

Identity Access Management

Other Info Security Software

3,003

459

3,524

10,578

2,285

(Gartner) $19,849

SAMServiceable Available

Market

SOMServiceable & Obtainable

Market

10

10

50

400

10

$480*

* SOM is based on our initial products only, future products (list provided on slide ExpandingProduct Universe) will significantly increase the potential to increase our obtainable market.

$60bn

Total Addressable Market (TAM)

WorldwideSecurity Spending

Total Market

Primary initial Market

Cost of Cyber Damages(Cybersecurity Ventures)

Cost overshadows worldwide spending

$124bn

Total Costs

Page 5: AMULET™ Technology Digital Asset Security

Industry Challenge - Protecting Files

50m+

500m

100m

380k

40k

Users and CustomersCompromised

2018Companies

Breached

Individual

Files

Current Protection at the Gross Level

Container Security Protection

Vendor A & B

(ex. operating systems, file systems,

server farms, cloud infrastructure)

Access

Breach

Vendor B

Vendor A

unprotected

Page 6: AMULET™ Technology Digital Asset Security

Industry Challenge - Protecting Files

1,946,181,599+personal and other sensitive data compromised 2017-2018

1,579publicly disclosed data breaches in 2017

191 daysaverage length of time it takes for organizations to identify a

data breach

66 daysaverage time needed to fully contain a data breach in 2017

Page 7: AMULET™ Technology Digital Asset Security

With our technologies files

are always in a protected state

Keyless = no keys to steal or

unauthorized user access

Files are uniquely enciphered with

each save

Never deciphered on disk

Authorization evaluated at every access attempted

and informs owner

Environmentally aware

Our Technology Protects Unsecured Files

Protected IP with 5 Issued and 4 Pending Patents (more in the pipeline)

Page 8: AMULET™ Technology Digital Asset Security

How Our Technology Works - Owner

Create an AccountCreate your account and

install our Framework Manager.

Define Access RulesLogin to your account and use the online Rules Editor to define the requirements

for accessing your file.

Protect a FileUse your Rules Set (stored in what we call an AMULET )

to create a protected file.

Rules SetSelect, mix, and match different criteria to include in your access rules so only the appropriate users in the appropriate environments will have access (sample rules provided):

File Owner

▪ Process thread▪ Logged-on user▪ User activity▪ Time and Date

▪ IP address▪ Local file▪ Operating system▪ GPS location

▪ Windows registry▪ User membership▪ MAC address▪ WAN address

▪ Child thread▪ Number of instances▪ Other process▪ Known VM

1 2 3

CERTITUDE digital.com

Page 9: AMULET™ Technology Digital Asset Security

How Our Technology Works - Recipient

Create an AccountCreate your account and

install our Framework Manager

Secure and Hassle Free!No password to remember

(or forget), no special codes, ….nothing to steal.

Open the FileUsing an AMULET-enabled

application*, simply open the file. That’s it.

If you don’t meet the Rules set by the owner you will not

have access to the file.

File Recipient 4 5 6

CERTITUDE digital.com

* You could also use our AMULET-enabled Decloak™ tool to permanently decipher the file on disk so you

can access it within any application that isn’t yet AMULET-enabled

Page 10: AMULET™ Technology Digital Asset Security

How Our Technology Works - Examples

NO access for users NOT meeting criteria/rules

User meeting criteria/rules has

access

Example 1Sample Rules for Users:current logged on users = Mark+ Ethernet card address = 00:0a:95:9d:68:16

Files are only accessible in an environment meeting all the rules

Owner creates file assigns AMULET™ with criteria/rules to protect file(s) and

distributes file (and AMULET™)

Example 2Sample Rules for Groups:user group = accounting+ location in {GPS coordinates for the building}+ company WAN address mask = 205.254.211.*/*

Users are unaware of the criteria/rules assigned by the owner

205.254.211.*/*

-72.2814238, 42.9270407-72.2807586, 42.9270642-72.2806835, 42.9268443-72.2813165, 42.9267107-72.2814023, 42.9269621

GPS PolygonUser group WAN

Example 1 Example 2

Accounting

Files are permanently protected, no matter where the files reside.

Access Breach

Accounting MarketingOwner is informed of any unauthorized access attempts providing early detection to potential data breaches.

Page 11: AMULET™ Technology Digital Asset Security

Competitive Advantage

*Only highlights of competitive advantages are listed.

Certitude Digital Solutions vs. Competitive Solutions

CertitudeStandard

EncryptionContainer Protection

Endpoint Protection

DRM (Digital Rights

Management)

Adaptive Authentication

Keyless √ X X X X

Uniquely Enciphered Each Save √ X X X X

Identities Guaranteed √ X

Environmental Context Aware √ X X

Endpoint Protection / Antivirus Products

Authorizes every access attempted √ X

Never deciphered on disk √ X

Flexible control of asset by stakeholder and platform

√ X

Keyless

Individual File Protection

Container File Protection

Key Required

Competitive Map

Page 12: AMULET™ Technology Digital Asset Security

Business Model

GitHub - initial Market100M repositories worldwide31M developers worldwide2.1M businesses worldwide

Revenue: Businesses$1,995 monthly (Package Depot)

Business spending$19bn - Significant opportunity for growth through

licensing and partnership not reflected in estimates

$3.1Million Dollars1% of GitHub Market

$1.2Million Dollars

1% of others

Revenue: Source-Code-HostingNominal monthly fee of $10.

Marketing strategy: online driven, community engagement, feedback loops, broadcast, and PR.

$37.2Million Dollars1% of GitHub Market

$14Million Dollars

1% of others

MRR ARR

$1.9Million Dollars

1000 Businesses

$23.9Million Dollars

1000 Businesses

MRR ARR

Years 2019 - 2021

Years 2020 - 2022

Customer Acquisition: Direct, MSSPs, and Channel Partners. Conversion time 10 to 18 months.

Customer Acquisition: Direct sales and Channel Partners. Conversion time 30 to 90 days.

SourceForge - 3.7M usersBitbucket - 6M developersAssembla - 2M repositories

Page 13: AMULET™ Technology Digital Asset Security

Financial Projections

Assumptions▪ Forecast based on acquiring source-code-

hosting users at $10 MRR per/user▪ Acquiring 310K monthly users by 2021▪ Customer retention with 10% Churn▪ Partnership revenues projected 2021▪ Incremental margin improvement yr./yr.▪ Conversion of early adopters▪ Marketing spend = 6% revenues

Revenue

2019 2020 2021 2022 2023

Revenue 10,882 6,245,684 42,871,988 99,966,897 158,216,271

EBITDA (1,415,011) 1,591,291 30,406,219 76,556,272 124,867,475

Net Income (1,420,197) 1,503,446 18,195,918 45,846,357 74,804,157

Five-Year Financial Projection ($)

Forecast data only, subject to change. Tax rate projected at 40%.Future products (see Expanding Product Universe) are not included in Financial projects.

2019 2020 2021 2022 2023

$11K$6.2M

$42.9M

$100M

$158.2M

(7) (27) (49) (71) (85)Headcount

Page 14: AMULET™ Technology Digital Asset Security

Deal to the Investor

Funding:Founders: $519kCurrent Raise: $2MOffered: Preferred Stock or Note

▪ Software Development▪ Sourcery MVP/alpha/beta/full launch

2020▪ Package Depot launch 2019/2020

▪ Operations, Sales and Marketing▪ Leadership Team Expansion ▪ Corporate development establish

partnerships and licensing agreements ▪ New IP/Patents

Use of proceeds over 18 months:

40%

40%

10%

8%2%

% Use of Proceeds

Software Development

Operations

Marketing

New Hires

IP/Patents

Significant IP Protection✓ Patents: 5 Issued / 4 Pending✓ Additional patents in the pipeline

Key Milestones✓ Sourcery proof of concept (POC)✓ Future product roadmap defined✓ Early adopters identified✓ Key leadership roles filled✓ IP rights transferred to company

Page 15: AMULET™ Technology Digital Asset Security

Expanding Product Universe

CertitudeCore technology

SourcerySource-code-

hosting (initial product)

Package Depot(2019/2020) drag and

drop secure digital package delivery and

pickup

MS Office Plugin(2020) integration

with MS Office products

AMUmail (2020) is a MS Outlook Plugin providing

secure email

Multimedia Rights Suite (2020)

eBook, music, video, movies,

images etc.

AMUwallet(2020) a crypto-currency wallet

secure storage of tokens

AMUbrowser(2021) secure website pages

Other products and services in planning…

2019

Page 16: AMULET™ Technology Digital Asset Security

Exit Strategy

Organic GrowthThe leadership team is committed to the success and growth of Certitude Digital and the continued expansion of our product universe and market share. Based on user and industry feedback, Certitude is a viable business within an industry that is considered recession resistant.

Acquired Acquirer Amount

$300M

$225M

$2.35B

$350M

$350M

Potential AcquirersIntegrators / Partners

Competitors

Major Technology Corporations

Private Equity

*Business Wire (Momentum Cyber 2018)

Acquisitions in Our Space: Acquisition – high probability

Leadership team considers an acquisition a viable exit.

101 M&Atransactions

$4.2B volume

11% increase

year-over-year

Page 17: AMULET™ Technology Digital Asset Security

Thank you

www.certitudedigital.com

ContactGary Phillips

CEO/Co-Founder

[email protected]

Page 18: AMULET™ Technology Digital Asset Security

Appendix

Page 19: AMULET™ Technology Digital Asset Security

2018 Cyber Defender report

2018 Critical Cybersecurity Issues

CERTITUDE IMPACT ON CYBERSECURITY

Will be obsoleted, replaced, or radically improved by Certitude Digital products and technologies

Significantly impacted by Certitude Digital products and technologies

Not Applicable

Human factor security Cyber actuaries Fraud hunters

Autonomous watchdogs Crowd-sourced security Dark web intelligence

DIY digital privacy IIoT shields Web policing

Next gen cloud security

Identity values

Security by design

Continuous authentication

File-less attack security