16
ENTERPRISE SECURITY & STORAGE NOVEMBER 2017

ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

Page 1: ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

ENTERPRISE SECURITY & STORAGE

NOVEMBER 2017

Page 2: ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

CYBER-SECURITY IS NOW A TRILLION DOLLAR PROBLEM*

2cryptyk.com

* Forecasts for 2018 Forbes / Gartner

** breachlevelindex.com

*** Reuters

D A T A R E C O R D S C O M P R O M I S E D I N 2 0 1 7 * *

R E C E N T N E W S H E A D L I N E S * * *

Page 3: ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

HACKERS ARE WINNING THE CYBERWAR

3cryptyk.com

Centralized single source cloud storage is inherently vulnerable

A single breach can access millions of records

Migration to the cloud is driving up scale and frequency of hacks

Healthcare

$355per breached record

Finance

$221per breached record

Legal

$208per breached record

COST OF EACH RECORD BREACH IS SIGNIFICANT

NUMBER OF BREACH INCIDENTS BY SOURCE

74%

18%

8%

OutsiderAccidentInsiderStateUnknown

Page 4: ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

CLOUD SECURITY MARKET IS COMPLEX & INEFFICIENT

4cryptyk.com

CLOUD STORAGE IS BECOMING A COMMODITIZED PRODUCT

CLOUD SECURITY IS COMPLEX, EXPENSIVE AND INEFFECTIVE

Cloud Storage is fast, efficient, cheap offers user mobility and convenience

Cloud Storage market valued at ~ $30B growing at 25% CAGR

The major vulnerability of Cloud Storage is SECURITY

Cloud Security is complicated, expensive and incomplete confuses customers / users

Cloud Security market is valued at ~ $120B growing at 35% CAGR

$0B

$75B

$150B

$225B

$300B

2013 2016 2019

Cloud Storage

Cyber-Security

LOSSES DUE TO HACKS ~ $750B AND GROWING AT 50% CAGR

For every $1 spent on Cloud Security, we are still losing over $6 to hacks

Problem is getting exponentially worse despite ever-emerging new security technologies

STORAGE + SECURITY is $150B p.a. opportunity

Page 5: ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

CLOUD SECURITY IS A MULTI -FACETED PROBLEM

5cryptyk.com

External

Threats

Viral

Threats

Operational

Failures / DDoS

Internal

Threats

Intercept

Threats / MIM

DATA-AT-REST DATA-IN-MOTION / USE

24/7

FIVE MAJOR THREATS TO THE CLOUD

CURRENT SOLUTIONS OFFER INCOMPLETE PROTECTION

CASB Cloud Access Security Broker

CSGCloud Security

Gateway

Encryption +

Tokenization

Firewall

+ Proxy

Anti-Virus +

Anti-Spyware

AI + Threat

Monitoring

Requires multiple independent vendors

Complex & Expensive when combined

Only reduces attack surface by 80-90%

Page 6: ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

CRYPTYK IS THE COMPLETE CLOUD SOLUTION

6cryptyk.com

CRYPTYK COUNTERS EACH OF THE FIVE MAJOR THREATS TO THE CLOUD

DECENTRALIZED STORAGE & SHARING DECENTRALIZED AUDITING & TRACKING

VAULT is a decentralized multi-cloud file storage

& sharing platform with user-based encryption that

dramatically reduces the potential attack surface

CRYPTYK IS A DECENTRALIZED FILE STORAGE PLATFORM WITH BLOCKCHAIN AUDITING

Hybrid platform that combines the advantages of two synergistic decentralized systems

SENTRY is a decentralized blockchain platform

for auditing user access & tracking file sharing by

leveraging a permanent, immutable ledger

PASSIVELY IMMUNE TO MONITORS / PROTECTS AGAINST

+

Page 7: ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

HOW IT WORKS

7cryptyk.com

File Uploaded

Encrypted File

split into N ‘shards’

Each shard is

encrypted again

Dual encrypted

shards stored on N

separate providers

File Encrypted

VAULT

1

2

3

4

5

ID Verification / User Access

+ User / Group Permissions

Device Fingerprint / Security

Info + Offline Key Back-up

Audited record of File Key Sharing

/ Permissions / Maps / History

Instead of trying to prevent security breaches, CRYPTYK ensures all stolen data is useless to hackers

VAULT: Files are first encrypted and spliced into ‘N’ separate file

portions or shards. Each shard is encrypted again and then stored

across N independent cloud storage providers. All N+1 encryption

keys for each individual file are stored on the users personal device

and an offline back-up server (in case of device loss).

• To breach just a single file an external hacker would need to

simultaneously breach N independent cloud providers and break

N+1 different encryption keys. Decryption of multiple files would

take years for even a quantum computer to solve. Large scale

hacking of multiple users becomes impossible.

• Use of a redundant ‘RAID-like’ storage architecture ensures that

user access to authorized files is possible even if a major cloud

storage provider fails or is subject to a DDOS attack.

• If a virus is uploaded to VAULT the corrupted file cannot be

executed because it exists in N different pieces and places.

SENTRY: In principle an internal / surveillance threat (bad actor or

employee) might gain access to a users personal device and

encryption key info. However, with integration of the SENTRY

blockchain platform to verify, audit and track all user / device access

and file sharing, this is a highly traceable and risky proposition.

CRYPTYK eliminates profit and adds risk for hackers.

I

Page 8: ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

FULLY TESTED PROTOTYPE PLATFORM

8cryptyk.com

3 MONTHS OF SECURITY TESTING BY 20 INVITED HACKERS + 40 CUSTOMERS (CTO / CIO / CISO)

Confirmed low latency performance (< 200 msec) + passive immunity to external / viral / operational threats

PRODUCT DEVELOPMENT TIMELINE IS FOR MARKET-READY ENTERPRISE PRODUCT BY Q1 2019

Page 9: ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

SECURITY + STORAGE PRODUCT BUNDLE

9cryptyk.com

9

LITEIndividual Free User

(Vault only)

PRO1 - 100 Individual / SMB Users

(Vault + Sentry)

ENTERPRISE100+ Enterprise Users

(Vault + Sentry)

1 GB Storage 500 GB / User + SENTRY 1TB / User + SENTRY PLUS

All of LITE, plus: All of PRO, plus:

Sub-File Level Decentralization API Integrations Suite / SDK Hybrid Drive Link

Two-level RSA User Encryption File-level Access Permissions Shadow Data Analysis / Full Audit

Multiple Vendor Redundancy File Watermarking & Versioning File Tracking & Monitoring

18 Factor Device Fingerprinting File History / Logging / Auditing Network Admin, Security Control

Encrypted UN, PW, Hashes, Keys Group Admin, Migration, Back-up Data Leak Prevention (DLP)

Secure 2FA File Sharing via SMS MFA / Time Sensitive File Sharing Configurable Geofencing

Cold Storage Back-up of all Keys Online Document Editing / Signing Industry Specific Compliance / GRC

File Preview (PDF, Images only) File Preview (all file types) Network/ Group / User/ File AI Tools

Web-based User Interface Web, Desktop Client, Mobile Sync Remote Wipe & Quarantining

API for PW Managers / Digital Wallet Encrypted Email, Chat & Messaging Mobile User Tracking & Analysis

FREE $15 / USER / MONTH $30 / USER/ MONTH

SAAS FREE-TRIAL SUBSCRIPTION MODEL – VIRAL CUSTOMER ADOPTION VIA FILE SHARING

Page 10: ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

THE CYBER SECURITY ECOSYSTEM

SMB

CUST

OM

ERS

CRYPTYK PLATFORM

3RD PAR

TY DEVELO

PERS

INVESTORS

CRYPTYK INC.

CRYPTYK FOUNDATION

PRODUCT COMMUNITY

We are building an entire ecosystem of likeminded

developers, users, and investors, that will collectively

create, augment, and operate the world’s most secure

cloud application and file management system.

At the heart of this ecosystem is our digital token, the

Cryptyk Token (CTK). These CTKs power the entire

platform by:

1

2

3

Supplying the fuel for the purchase and use of

Cryptyk products.

Funding the development of the platform by

Cryptyk Inc.

Offering incentives for 3rd party developer and

alliance partners through the Cryptyk Foundation.

The CRYPTYK ecosystem is designed for high product

utility that drives inevitable price increases in CTK value

over the long term, scaling directly with increasing

customer adoption.

cryptyk.com 10

Page 11: ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

COMPETITIVE ANALYSIS

11cryptyk.com

PRODUCT FEATUREConventional Enterprise

Security + Storage Bundle(eg: Amazon + Netskope)

Blockchain-only

File Storage(eg: Sia, Storj, Filecoin)

Relative Attack Surface

for hacker breach< 0.01% 10% 1%

Number of Vendors 1 2 - 3 1

File Access Latency < 200 msec < 200 msec > 20 sec

Secure Data-in-Use,

Live Editing, Chat, AppsYes ✔︎ Yes ✔︎ No ✘

Threat Analysis, DLP,

User AuditingYes ✔︎ Yes ✔︎ No ✘

File Tracking,

Geofence, Compliance Yes ✔︎ No ✘ No ✘

Redundant Storage Format

for 24/7/365Yes ✔︎ No ✘ Yes ✔︎

Suitable for Enterprise Yes ✔︎ Yes ✔︎ No ✘

Suitable for Consumers Yes ✔︎ No ✘ Yes ✔︎

PRICE $15 - $30 /user/month $40 - $60 /user/month $5 - $10 /user/month

CRYPTYK OFFERS MORE SIMPLICITY, SECURITY, PERFORMANCE AND COST-EFFICIENCY

Page 12: ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

GO-TO-MARKET STRATEGY

12cryptyk.com

$0B

$125B

$250B

$375B

$500B

2017 2018 2019 2020 2021 2022

Total Cloud Security and Storage Market

AQUIRE US BASEDALLIANCE PARTNERS

Issue Cryptyk Tokens to acquire alliance partners for initial trial adoption program

PRIMARY MARKET FOCUS IS (A) ENTERPRISE MARKET AUTOMATIC VIRAL PENETRATION OF (B) AND (C)

Grow enterprise sales via hi-value market niches in regulated & compliant industries

EXPAND SALES STRATEGYTO OTHER MARKETS

Expand sales via new market verticals + viral adoption by SMB & Consumers

MEDIA MILITARY UTILITIES

TARGET ENTERPRISEMARKET NICHES

FINANCEFINRA

LEGALPCI DSS

INSURANCE NAIS

Individual / SMBCustomers

1TB Vault + Sentry($30 / user / month)

1GB Vault (Free)

500GB Vault + Sentry($15 / user / month)

Enterprise-branded free VAULT accounts

2% upgrade to 500GB + SENTRY

Customers ofEnterprises

EnterpriseCustomers

File Sharing

with Clients

Upgrade

Free Paid

Page 13: ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

(1) Create initial CTK user base via investors / alliance partners in Token Sale (Jan 2018)

(2) Distribute CTKs to alliance partners / developers for 3 month product trial (Dec 2018)

(3) Release security and storage products for enterprise customers (Mar 2019)

(4) Organic customer acquisition results in CTK value growth for all participants

CRYPTYK TOKEN OFFERING

13cryptyk.com

Maximum raise capped at $20M over 2 rounds

- funding for Product and Business Development

250 Mil CTKs for Cryptyk Inc. Shareholders Pool

- with 4 year vesting period for founders + team

250 Mil CTKs for non-profit Cryptyk Foundation Pool

- distributed to Alliance Partners / Customers

and Open Source developers over 4 years

250 Mil CTKs for Token Sale Investor Pool

- for immediate trading on crypto-exchanges

(CTK) TOKEN SALE TERMS

33.3%

33.3%

33.3%

Cryptyk Inc. Pool (retained by Cryptyk Inc. Shareholders) Investor Pool sold via Token Sale (tradeable on exchanges)

Cryptyk Foundation Pool (alliances, miners, developers, R&D)

250M CTKs

250M CTKs

250M CTKs

CTK tokens purchased in USD, ETH or BTC

Feb 8, 2018 : Private Pre-sale Round @ 10 cents

($50k min)

Mar 20, 2018 : Public-sale Round @ 12.5 cents

($500 min)

Page 14: ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

MILESTONES

14cryptyk.com

Q4 2015$250k AngelInvestment

Q2 2017Prototype

Test & Analysis

2016Prototype

Design + Build

Q1 2018CTK Token Sale Event

Q1 2019Product Build

+ Alliance Trials

Q2 2019Final Product

Launch

Q4 2017Product Design+ White Paper

Page 15: ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

TEAM, BOARD & ADVISORS

15cryptyk.com

White-hat Hacker,

Cyber-Security and

Blockchain Expert,

former SVB, Bell Labs

Quantum Physicist,

Startup Veteran,

6 Startups: 1 IPO,

2 Public Acquisitions

Dr. Adam WeigoldCEO & Chairman

Raghu KothaCTO

Dennis McMastersChief Architect

Luke LombeCMO

Mihkel TrinkPlatform Development

Dr. Daniel FloreaniEnterprise Solutions

Indra SinghalCOO & Director

Jennifer PengDirector & Investor

Automation Expert,

Platform Architect,

“the guy who

automated the NYSE”

Bus. Dev./ Marketing,

Strategy Consultant,

Event Manager,

2 TEDx talks

Network Architect,

Systems Manager,

Software Developer,

former Ericsson

Computer Scientist,

Research Fellow,

Enterprise Architect,

former Cisco Systems

Corporate lawyer,

M&A expert, former

Executive Director at

Morgan Stanley

Seasoned Silicon

Valley COO / Director,

Venture Capitalist,

Startup Mentor

Financial Security

Specialist, CTO of

Founders Federal

Credit Union

Computer Scientist,

CEO of Blockchain

Information Exchange

Security (BIX)

Dr. Saed MufticBlockchain Technologist

Robert BenderFintech Specialist

Michael KapilkovCrypto-Strategist

Steve HoyemIndustry Compliance

Lina ParnessStrategic Partnerships

Chris GuidrozUI / UX Specialist

Crypto-Currency

Expert & Strategist

Founder of Healthi

and Altcoinz

Process Management

and Compliance

Advisor for financial

services industry

Business Strategist

and Director of

Global Partners and

Alliances at Logitech

Founder of the Leap

Laps, Cyber-security

UX specialist and

product developer

Prof. Erich WeigoldFoundation Governance

World Renowned

Quantum Physicist,

Humboldt Prize,

Lyle Medal, A.O.

Page 16: ENTERPRISE SECURITY & STORAGE€¦ · Internal Threats Intercept Threats / MIM DATA-AT-REST DATA-IN-MOTION / USE 24/7 ... Sub-File Level Decentralization API Integrations Suite

www.cryptyk.com

[email protected]

Cryptyk takes the profit out of hacking

and the risk out of the cloud