1 / 20

17959 Dumfries Shopping Plaza Suite B Dumfries, VA 22026-2490 703.402.2542

17959 Dumfries Shopping Plaza Suite B Dumfries, VA 22026-2490 703.402.2542 www.keycybersecurity.com skey@keycybersecurity.com. $250k raised from 09/13-12/14 Beta Product has been deployed Debt free company 100+ years of Executive and Advisory Board business d evelopment experience.

Download Presentation

17959 Dumfries Shopping Plaza Suite B Dumfries, VA 22026-2490 703.402.2542

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 17959 Dumfries Shopping Plaza Suite B Dumfries, VA 22026-2490 703.402.2542 www.keycybersecurity.com skey@keycybersecurity.com

  2. $250k raised from 09/13-12/14 • Beta Product has been deployed • Debt free company • 100+ years of Executive and Advisory Board business development experience

  3. Pro-actively detects illicit file activity (i.e child pornography) • Safeguards intellectual property/sensitive data on enterprise networks & via connected devices. Cyber Tipline Partner

  4. The Problem • Illicit files exist on nearly all enterprise networks that are not currently detectable by existing safeguards (i.e content filters, malware detectors, etc.). • “If you’ve got a big company system, I can almost guarnatee that you have child pornography on it.” – Kenneth Citarella, Deputy Chief of Investigations, Westchester County DA’s Office.” • Intellectual property and sensitive data is not typically tracked via existing solutions. • “The average company reported 2.45 (intellectual property loss related) incidents with estimated losses per incident of over $500,000”. - Riskvue

  5. Fortune 500 and K-12 Organizations Must Act “The company must take steps to minimize its own liability risks from an employee’s illegal access to child porn, and those risks can loom large if the illicit images are mishandled.” - ABA

  6. ValueProposition CyberMerlin Result Problem Locate files pro-actively, reduce liability, handle the issue internally Undetected illicit files are being stored on the network. Corporate reputation is at stake Embarrassing headlines Remediation costs Reputational damage. Embarrassing headlines Remediation costs Identify PI, mitigate concern, ensure compliance with standards/regulations Compliance violation Fines/Fees ATO revoked Compliance violation Fines/Fees ATO revoked Privacy Information is being stored in the clear Intellectual Property is being sent to or accessed by competitors Monitor file activity and “bad actors”, locate source of leak, remediate issue Corporate espionage Competitor advantage Financial loss

  7. The Competition

  8. DifferentiatorsProvisional Patent No. 61/986,553 • Algorithmic identification of illicit files which go typically undetected by existing safeguards (such as content filters and malware analyzers). • Discovers files via match or similarity even if the file has been modified. • Lightning fast and “relative file” focused • Customizable databases CyberMerlin is a Specialized Threat and Protection (STAP) solution which has a $1.17 billion market by 2017. - IDC

  9. Capabilities • Automatically Detects/Monitors/Alerts • Compiles Forensic Reports • Customization and “Webcrawling” Capability • Proprietary “Certainty Hash Value” Differentiator • Integrated Vision Technology for video (4Q 2014) Search Mode Find all instances of a known file Forensics Mode Utilize file reports to augment forensic activities ™ Detection Mode Find unknown problematic files

  10. How it WorksProvisional Patent No. 61/986,553 Search Detection Intellectual Property Sensitive/Private Data Illicit Files Abusive Content Available as cloud based, client/server or appliance solution

  11. CyberMerlin Screenshot

  12. A Large and Growing Market The Specialized Threat and Protection (STAP) market is expected to reach $1.17 billion by 2017. -IDC IDC is defining STAP as technologies that are primarily “signatureless,” that is, not relying on malware signatures. The US Forensic Technologies market is projected to reach US $21.2 billion by 2018, driven by rising crime rates and increasing sophistication of forensic investigations. -IDC - CyberMerlin is an augmentivesolution to this industry.

  13. Revenue Model Assumptions Based on IDC and Gartner research within the STAP marketplace, we believe that anticipated demand will support significant high margin sales growth ($250k per average enterprise sale) over a 2-5 year period.

  14. 24 Month Staffing Projections • 25

  15. Go to Market Strategy – Integrate with the Best Dell Solutions Center (DSC) Integrating scalable, cloud based solution which runs on ALL major platforms into DSC. Dell Appliance Group (NCS) Appliance based solution has been scoped. Dell Entrepreneur in Residence (EIR) Applicant for the prestigious Dell Founders Club. Dell OEM Division Exploring the marketing of CyberMerlin as a desktop OEM solution and/or a network appliance for K-12 organizations (CIPA/FERPA compliance).

  16. Strategic Pipeline • Fortune 500 companies • Federal Agencies • K-12 • Law Enforcement

  17. Executive Management and Advisory Team • Dan Woolley • Mach 37 General Partner • Dell, Computer Associates • CEO, Global Integrity • Shawn R. Key • Founder • 15 years of Cyber Security and Information Assurance product and services experience • Charles Gold • C. Gold Strategic Marketing • 20 years software marketing experience • Wilson Cochran • V.P., Sales and Marketing • 15 years of Sales and Marketing $20M in sales generated • Skip Lawver • Former Cybercrime SME • Professor Emeritus, Eastern Michigan University • Informal Advisors • (in contractual discussions) Legal Advisors

  18. Thank You On behalf of Key Cybersecurity, Inc., we thank you for your time and consideration.

  19. Capital Sought • Series B • $5.0M • Series A • $2.0M • Seed • $.5M • 28

  20. Capitalization Table

More Related