amulet™ technology digital asset security
TRANSCRIPT
Certitude Digital
Cybersecurity Software Technologies
Gary Phillips, CEO/Co-Founder, [email protected]
F. Scott Deaver, CTO/Founder, [email protected]
Scott Orman, COO/Co-Founder, [email protected]
January 2019
is a cybersecurity company solving identity access management problems in a vast market with patented technologies that permanently
protect files.
Experienced team…
Management Team
F. Scott Deaver, CTO/Director/Co-Founder [30 yrs. exp., NASA, Exxon, GE, American Airlines,
HP, BMC. Primary listed inventor of over ten cybersecurity & software patents/applications.]
Scott Orman, COO/Director/Co-Founder [25 yrs. exp., Qualcomm, Northrop Grumman.
Patent primary listed inventor and experienced entrepreneur.]
HD Vo, Technology Advisor/Director/Co-Founder [25 yrs. Global exp., MIT, Kellogg MBA,
serial technology entrepreneur with successful 8-digit valuation startup, experienced
executive with extensive overseas experience]
Gary Phillips, CEO/Director/Co-Founder [25 yrs. Global exp., Career Sciences, P&G, VW
Group, SS/L, Honda. Serial Entrepreneur with 2 successful exits, MBA Finance/MSc Strategy
Kelley School of Business, Indiana University]
$6tn
Substantial Market Opportunity
Our MarketAny business or individual that wants to protect their files.
Transcends verticals and geographies.
Worldwide Security Spending by Segment2019 in Millions of U.S. Dollars
Application Security
Our Market Segments
Cloud Security
Data Security
Identity Access Management
Other Info Security Software
3,003
459
3,524
10,578
2,285
(Gartner) $19,849
SAMServiceable Available
Market
SOMServiceable & Obtainable
Market
10
10
50
400
10
$480*
* SOM is based on our initial products only, future products (list provided on slide ExpandingProduct Universe) will significantly increase the potential to increase our obtainable market.
$60bn
Total Addressable Market (TAM)
WorldwideSecurity Spending
Total Market
Primary initial Market
Cost of Cyber Damages(Cybersecurity Ventures)
Cost overshadows worldwide spending
$124bn
Total Costs
Industry Challenge - Protecting Files
50m+
500m
100m
380k
40k
Users and CustomersCompromised
2018Companies
Breached
Individual
Files
Current Protection at the Gross Level
Container Security Protection
Vendor A & B
(ex. operating systems, file systems,
server farms, cloud infrastructure)
Access
Breach
Vendor B
Vendor A
unprotected
Industry Challenge - Protecting Files
1,946,181,599+personal and other sensitive data compromised 2017-2018
1,579publicly disclosed data breaches in 2017
191 daysaverage length of time it takes for organizations to identify a
data breach
66 daysaverage time needed to fully contain a data breach in 2017
With our technologies files
are always in a protected state
Keyless = no keys to steal or
unauthorized user access
Files are uniquely enciphered with
each save
Never deciphered on disk
Authorization evaluated at every access attempted
and informs owner
Environmentally aware
Our Technology Protects Unsecured Files
Protected IP with 5 Issued and 4 Pending Patents (more in the pipeline)
How Our Technology Works - Owner
Create an AccountCreate your account and
install our Framework Manager.
Define Access RulesLogin to your account and use the online Rules Editor to define the requirements
for accessing your file.
Protect a FileUse your Rules Set (stored in what we call an AMULET )
to create a protected file.
Rules SetSelect, mix, and match different criteria to include in your access rules so only the appropriate users in the appropriate environments will have access (sample rules provided):
File Owner
▪ Process thread▪ Logged-on user▪ User activity▪ Time and Date
▪ IP address▪ Local file▪ Operating system▪ GPS location
▪ Windows registry▪ User membership▪ MAC address▪ WAN address
▪ Child thread▪ Number of instances▪ Other process▪ Known VM
1 2 3
CERTITUDE digital.com
How Our Technology Works - Recipient
Create an AccountCreate your account and
install our Framework Manager
Secure and Hassle Free!No password to remember
(or forget), no special codes, ….nothing to steal.
Open the FileUsing an AMULET-enabled
application*, simply open the file. That’s it.
If you don’t meet the Rules set by the owner you will not
have access to the file.
File Recipient 4 5 6
CERTITUDE digital.com
* You could also use our AMULET-enabled Decloak™ tool to permanently decipher the file on disk so you
can access it within any application that isn’t yet AMULET-enabled
How Our Technology Works - Examples
NO access for users NOT meeting criteria/rules
User meeting criteria/rules has
access
Example 1Sample Rules for Users:current logged on users = Mark+ Ethernet card address = 00:0a:95:9d:68:16
Files are only accessible in an environment meeting all the rules
Owner creates file assigns AMULET™ with criteria/rules to protect file(s) and
distributes file (and AMULET™)
Example 2Sample Rules for Groups:user group = accounting+ location in {GPS coordinates for the building}+ company WAN address mask = 205.254.211.*/*
Users are unaware of the criteria/rules assigned by the owner
205.254.211.*/*
-72.2814238, 42.9270407-72.2807586, 42.9270642-72.2806835, 42.9268443-72.2813165, 42.9267107-72.2814023, 42.9269621
GPS PolygonUser group WAN
Example 1 Example 2
Accounting
Files are permanently protected, no matter where the files reside.
Access Breach
Accounting MarketingOwner is informed of any unauthorized access attempts providing early detection to potential data breaches.
Competitive Advantage
*Only highlights of competitive advantages are listed.
Certitude Digital Solutions vs. Competitive Solutions
CertitudeStandard
EncryptionContainer Protection
Endpoint Protection
DRM (Digital Rights
Management)
Adaptive Authentication
Keyless √ X X X X
Uniquely Enciphered Each Save √ X X X X
Identities Guaranteed √ X
Environmental Context Aware √ X X
Endpoint Protection / Antivirus Products
√
Authorizes every access attempted √ X
Never deciphered on disk √ X
Flexible control of asset by stakeholder and platform
√ X
Keyless
Individual File Protection
Container File Protection
Key Required
Competitive Map
Business Model
GitHub - initial Market100M repositories worldwide31M developers worldwide2.1M businesses worldwide
Revenue: Businesses$1,995 monthly (Package Depot)
Business spending$19bn - Significant opportunity for growth through
licensing and partnership not reflected in estimates
$3.1Million Dollars1% of GitHub Market
$1.2Million Dollars
1% of others
Revenue: Source-Code-HostingNominal monthly fee of $10.
Marketing strategy: online driven, community engagement, feedback loops, broadcast, and PR.
$37.2Million Dollars1% of GitHub Market
$14Million Dollars
1% of others
MRR ARR
$1.9Million Dollars
1000 Businesses
$23.9Million Dollars
1000 Businesses
MRR ARR
Years 2019 - 2021
Years 2020 - 2022
Customer Acquisition: Direct, MSSPs, and Channel Partners. Conversion time 10 to 18 months.
Customer Acquisition: Direct sales and Channel Partners. Conversion time 30 to 90 days.
SourceForge - 3.7M usersBitbucket - 6M developersAssembla - 2M repositories
Financial Projections
Assumptions▪ Forecast based on acquiring source-code-
hosting users at $10 MRR per/user▪ Acquiring 310K monthly users by 2021▪ Customer retention with 10% Churn▪ Partnership revenues projected 2021▪ Incremental margin improvement yr./yr.▪ Conversion of early adopters▪ Marketing spend = 6% revenues
Revenue
2019 2020 2021 2022 2023
Revenue 10,882 6,245,684 42,871,988 99,966,897 158,216,271
EBITDA (1,415,011) 1,591,291 30,406,219 76,556,272 124,867,475
Net Income (1,420,197) 1,503,446 18,195,918 45,846,357 74,804,157
Five-Year Financial Projection ($)
Forecast data only, subject to change. Tax rate projected at 40%.Future products (see Expanding Product Universe) are not included in Financial projects.
2019 2020 2021 2022 2023
$11K$6.2M
$42.9M
$100M
$158.2M
(7) (27) (49) (71) (85)Headcount
Deal to the Investor
Funding:Founders: $519kCurrent Raise: $2MOffered: Preferred Stock or Note
▪ Software Development▪ Sourcery MVP/alpha/beta/full launch
2020▪ Package Depot launch 2019/2020
▪ Operations, Sales and Marketing▪ Leadership Team Expansion ▪ Corporate development establish
partnerships and licensing agreements ▪ New IP/Patents
Use of proceeds over 18 months:
40%
40%
10%
8%2%
% Use of Proceeds
Software Development
Operations
Marketing
New Hires
IP/Patents
Significant IP Protection✓ Patents: 5 Issued / 4 Pending✓ Additional patents in the pipeline
Key Milestones✓ Sourcery proof of concept (POC)✓ Future product roadmap defined✓ Early adopters identified✓ Key leadership roles filled✓ IP rights transferred to company
Expanding Product Universe
CertitudeCore technology
SourcerySource-code-
hosting (initial product)
Package Depot(2019/2020) drag and
drop secure digital package delivery and
pickup
MS Office Plugin(2020) integration
with MS Office products
AMUmail (2020) is a MS Outlook Plugin providing
secure email
Multimedia Rights Suite (2020)
eBook, music, video, movies,
images etc.
AMUwallet(2020) a crypto-currency wallet
secure storage of tokens
AMUbrowser(2021) secure website pages
Other products and services in planning…
2019
Exit Strategy
Organic GrowthThe leadership team is committed to the success and growth of Certitude Digital and the continued expansion of our product universe and market share. Based on user and industry feedback, Certitude is a viable business within an industry that is considered recession resistant.
Acquired Acquirer Amount
$300M
$225M
$2.35B
$350M
$350M
Potential AcquirersIntegrators / Partners
Competitors
Major Technology Corporations
Private Equity
*Business Wire (Momentum Cyber 2018)
Acquisitions in Our Space: Acquisition – high probability
Leadership team considers an acquisition a viable exit.
101 M&Atransactions
$4.2B volume
11% increase
year-over-year
Thank you
www.certitudedigital.com
ContactGary Phillips
CEO/Co-Founder
Appendix
2018 Cyber Defender report
2018 Critical Cybersecurity Issues
CERTITUDE IMPACT ON CYBERSECURITY
Will be obsoleted, replaced, or radically improved by Certitude Digital products and technologies
Significantly impacted by Certitude Digital products and technologies
Not Applicable
Human factor security Cyber actuaries Fraud hunters
Autonomous watchdogs Crowd-sourced security Dark web intelligence
DIY digital privacy IIoT shields Web policing
Next gen cloud security
Identity values
Security by design
Continuous authentication
File-less attack security