Upload
others
View
12
Download
0
Embed Size (px)
Citation preview
ENTERPRISE SECURITY & STORAGE
NOVEMBER 2017
CYBER-SECURITY IS NOW A TRILLION DOLLAR PROBLEM*
2cryptyk.com
* Forecasts for 2018 Forbes / Gartner
** breachlevelindex.com
*** Reuters
D A T A R E C O R D S C O M P R O M I S E D I N 2 0 1 7 * *
R E C E N T N E W S H E A D L I N E S * * *
HACKERS ARE WINNING THE CYBERWAR
3cryptyk.com
Centralized single source cloud storage is inherently vulnerable
A single breach can access millions of records
Migration to the cloud is driving up scale and frequency of hacks
Healthcare
$355per breached record
Finance
$221per breached record
Legal
$208per breached record
COST OF EACH RECORD BREACH IS SIGNIFICANT
NUMBER OF BREACH INCIDENTS BY SOURCE
74%
18%
8%
OutsiderAccidentInsiderStateUnknown
CLOUD SECURITY MARKET IS COMPLEX & INEFFICIENT
4cryptyk.com
CLOUD STORAGE IS BECOMING A COMMODITIZED PRODUCT
CLOUD SECURITY IS COMPLEX, EXPENSIVE AND INEFFECTIVE
Cloud Storage is fast, efficient, cheap offers user mobility and convenience
Cloud Storage market valued at ~ $30B growing at 25% CAGR
The major vulnerability of Cloud Storage is SECURITY
Cloud Security is complicated, expensive and incomplete confuses customers / users
Cloud Security market is valued at ~ $120B growing at 35% CAGR
$0B
$75B
$150B
$225B
$300B
2013 2016 2019
Cloud Storage
Cyber-Security
LOSSES DUE TO HACKS ~ $750B AND GROWING AT 50% CAGR
For every $1 spent on Cloud Security, we are still losing over $6 to hacks
Problem is getting exponentially worse despite ever-emerging new security technologies
STORAGE + SECURITY is $150B p.a. opportunity
CLOUD SECURITY IS A MULTI -FACETED PROBLEM
5cryptyk.com
External
Threats
Viral
Threats
Operational
Failures / DDoS
Internal
Threats
Intercept
Threats / MIM
DATA-AT-REST DATA-IN-MOTION / USE
24/7
FIVE MAJOR THREATS TO THE CLOUD
CURRENT SOLUTIONS OFFER INCOMPLETE PROTECTION
CASB Cloud Access Security Broker
CSGCloud Security
Gateway
Encryption +
Tokenization
Firewall
+ Proxy
Anti-Virus +
Anti-Spyware
AI + Threat
Monitoring
Requires multiple independent vendors
Complex & Expensive when combined
Only reduces attack surface by 80-90%
CRYPTYK IS THE COMPLETE CLOUD SOLUTION
6cryptyk.com
CRYPTYK COUNTERS EACH OF THE FIVE MAJOR THREATS TO THE CLOUD
DECENTRALIZED STORAGE & SHARING DECENTRALIZED AUDITING & TRACKING
VAULT is a decentralized multi-cloud file storage
& sharing platform with user-based encryption that
dramatically reduces the potential attack surface
CRYPTYK IS A DECENTRALIZED FILE STORAGE PLATFORM WITH BLOCKCHAIN AUDITING
Hybrid platform that combines the advantages of two synergistic decentralized systems
SENTRY is a decentralized blockchain platform
for auditing user access & tracking file sharing by
leveraging a permanent, immutable ledger
PASSIVELY IMMUNE TO MONITORS / PROTECTS AGAINST
+
HOW IT WORKS
7cryptyk.com
File Uploaded
Encrypted File
split into N ‘shards’
Each shard is
encrypted again
Dual encrypted
shards stored on N
separate providers
File Encrypted
VAULT
1
2
3
4
5
ID Verification / User Access
+ User / Group Permissions
Device Fingerprint / Security
Info + Offline Key Back-up
Audited record of File Key Sharing
/ Permissions / Maps / History
Instead of trying to prevent security breaches, CRYPTYK ensures all stolen data is useless to hackers
VAULT: Files are first encrypted and spliced into ‘N’ separate file
portions or shards. Each shard is encrypted again and then stored
across N independent cloud storage providers. All N+1 encryption
keys for each individual file are stored on the users personal device
and an offline back-up server (in case of device loss).
• To breach just a single file an external hacker would need to
simultaneously breach N independent cloud providers and break
N+1 different encryption keys. Decryption of multiple files would
take years for even a quantum computer to solve. Large scale
hacking of multiple users becomes impossible.
• Use of a redundant ‘RAID-like’ storage architecture ensures that
user access to authorized files is possible even if a major cloud
storage provider fails or is subject to a DDOS attack.
• If a virus is uploaded to VAULT the corrupted file cannot be
executed because it exists in N different pieces and places.
SENTRY: In principle an internal / surveillance threat (bad actor or
employee) might gain access to a users personal device and
encryption key info. However, with integration of the SENTRY
blockchain platform to verify, audit and track all user / device access
and file sharing, this is a highly traceable and risky proposition.
CRYPTYK eliminates profit and adds risk for hackers.
I
FULLY TESTED PROTOTYPE PLATFORM
8cryptyk.com
3 MONTHS OF SECURITY TESTING BY 20 INVITED HACKERS + 40 CUSTOMERS (CTO / CIO / CISO)
Confirmed low latency performance (< 200 msec) + passive immunity to external / viral / operational threats
PRODUCT DEVELOPMENT TIMELINE IS FOR MARKET-READY ENTERPRISE PRODUCT BY Q1 2019
SECURITY + STORAGE PRODUCT BUNDLE
9cryptyk.com
9
LITEIndividual Free User
(Vault only)
PRO1 - 100 Individual / SMB Users
(Vault + Sentry)
ENTERPRISE100+ Enterprise Users
(Vault + Sentry)
1 GB Storage 500 GB / User + SENTRY 1TB / User + SENTRY PLUS
All of LITE, plus: All of PRO, plus:
Sub-File Level Decentralization API Integrations Suite / SDK Hybrid Drive Link
Two-level RSA User Encryption File-level Access Permissions Shadow Data Analysis / Full Audit
Multiple Vendor Redundancy File Watermarking & Versioning File Tracking & Monitoring
18 Factor Device Fingerprinting File History / Logging / Auditing Network Admin, Security Control
Encrypted UN, PW, Hashes, Keys Group Admin, Migration, Back-up Data Leak Prevention (DLP)
Secure 2FA File Sharing via SMS MFA / Time Sensitive File Sharing Configurable Geofencing
Cold Storage Back-up of all Keys Online Document Editing / Signing Industry Specific Compliance / GRC
File Preview (PDF, Images only) File Preview (all file types) Network/ Group / User/ File AI Tools
Web-based User Interface Web, Desktop Client, Mobile Sync Remote Wipe & Quarantining
API for PW Managers / Digital Wallet Encrypted Email, Chat & Messaging Mobile User Tracking & Analysis
FREE $15 / USER / MONTH $30 / USER/ MONTH
SAAS FREE-TRIAL SUBSCRIPTION MODEL – VIRAL CUSTOMER ADOPTION VIA FILE SHARING
THE CYBER SECURITY ECOSYSTEM
SMB
CUST
OM
ERS
CRYPTYK PLATFORM
3RD PAR
TY DEVELO
PERS
INVESTORS
CRYPTYK INC.
CRYPTYK FOUNDATION
PRODUCT COMMUNITY
We are building an entire ecosystem of likeminded
developers, users, and investors, that will collectively
create, augment, and operate the world’s most secure
cloud application and file management system.
At the heart of this ecosystem is our digital token, the
Cryptyk Token (CTK). These CTKs power the entire
platform by:
1
2
3
Supplying the fuel for the purchase and use of
Cryptyk products.
Funding the development of the platform by
Cryptyk Inc.
Offering incentives for 3rd party developer and
alliance partners through the Cryptyk Foundation.
The CRYPTYK ecosystem is designed for high product
utility that drives inevitable price increases in CTK value
over the long term, scaling directly with increasing
customer adoption.
cryptyk.com 10
COMPETITIVE ANALYSIS
11cryptyk.com
PRODUCT FEATUREConventional Enterprise
Security + Storage Bundle(eg: Amazon + Netskope)
Blockchain-only
File Storage(eg: Sia, Storj, Filecoin)
Relative Attack Surface
for hacker breach< 0.01% 10% 1%
Number of Vendors 1 2 - 3 1
File Access Latency < 200 msec < 200 msec > 20 sec
Secure Data-in-Use,
Live Editing, Chat, AppsYes ✔︎ Yes ✔︎ No ✘
Threat Analysis, DLP,
User AuditingYes ✔︎ Yes ✔︎ No ✘
File Tracking,
Geofence, Compliance Yes ✔︎ No ✘ No ✘
Redundant Storage Format
for 24/7/365Yes ✔︎ No ✘ Yes ✔︎
Suitable for Enterprise Yes ✔︎ Yes ✔︎ No ✘
Suitable for Consumers Yes ✔︎ No ✘ Yes ✔︎
PRICE $15 - $30 /user/month $40 - $60 /user/month $5 - $10 /user/month
CRYPTYK OFFERS MORE SIMPLICITY, SECURITY, PERFORMANCE AND COST-EFFICIENCY
GO-TO-MARKET STRATEGY
12cryptyk.com
$0B
$125B
$250B
$375B
$500B
2017 2018 2019 2020 2021 2022
Total Cloud Security and Storage Market
AQUIRE US BASEDALLIANCE PARTNERS
Issue Cryptyk Tokens to acquire alliance partners for initial trial adoption program
PRIMARY MARKET FOCUS IS (A) ENTERPRISE MARKET AUTOMATIC VIRAL PENETRATION OF (B) AND (C)
Grow enterprise sales via hi-value market niches in regulated & compliant industries
EXPAND SALES STRATEGYTO OTHER MARKETS
Expand sales via new market verticals + viral adoption by SMB & Consumers
MEDIA MILITARY UTILITIES
TARGET ENTERPRISEMARKET NICHES
FINANCEFINRA
LEGALPCI DSS
INSURANCE NAIS
Individual / SMBCustomers
1TB Vault + Sentry($30 / user / month)
1GB Vault (Free)
500GB Vault + Sentry($15 / user / month)
Enterprise-branded free VAULT accounts
2% upgrade to 500GB + SENTRY
Customers ofEnterprises
EnterpriseCustomers
File Sharing
with Clients
Upgrade
Free Paid
(1) Create initial CTK user base via investors / alliance partners in Token Sale (Jan 2018)
(2) Distribute CTKs to alliance partners / developers for 3 month product trial (Dec 2018)
(3) Release security and storage products for enterprise customers (Mar 2019)
(4) Organic customer acquisition results in CTK value growth for all participants
CRYPTYK TOKEN OFFERING
13cryptyk.com
Maximum raise capped at $20M over 2 rounds
- funding for Product and Business Development
250 Mil CTKs for Cryptyk Inc. Shareholders Pool
- with 4 year vesting period for founders + team
250 Mil CTKs for non-profit Cryptyk Foundation Pool
- distributed to Alliance Partners / Customers
and Open Source developers over 4 years
250 Mil CTKs for Token Sale Investor Pool
- for immediate trading on crypto-exchanges
(CTK) TOKEN SALE TERMS
33.3%
33.3%
33.3%
Cryptyk Inc. Pool (retained by Cryptyk Inc. Shareholders) Investor Pool sold via Token Sale (tradeable on exchanges)
Cryptyk Foundation Pool (alliances, miners, developers, R&D)
250M CTKs
250M CTKs
250M CTKs
CTK tokens purchased in USD, ETH or BTC
Feb 8, 2018 : Private Pre-sale Round @ 10 cents
($50k min)
Mar 20, 2018 : Public-sale Round @ 12.5 cents
($500 min)
MILESTONES
14cryptyk.com
Q4 2015$250k AngelInvestment
Q2 2017Prototype
Test & Analysis
2016Prototype
Design + Build
Q1 2018CTK Token Sale Event
Q1 2019Product Build
+ Alliance Trials
Q2 2019Final Product
Launch
Q4 2017Product Design+ White Paper
TEAM, BOARD & ADVISORS
15cryptyk.com
White-hat Hacker,
Cyber-Security and
Blockchain Expert,
former SVB, Bell Labs
Quantum Physicist,
Startup Veteran,
6 Startups: 1 IPO,
2 Public Acquisitions
Dr. Adam WeigoldCEO & Chairman
Raghu KothaCTO
Dennis McMastersChief Architect
Luke LombeCMO
Mihkel TrinkPlatform Development
Dr. Daniel FloreaniEnterprise Solutions
Indra SinghalCOO & Director
Jennifer PengDirector & Investor
Automation Expert,
Platform Architect,
“the guy who
automated the NYSE”
Bus. Dev./ Marketing,
Strategy Consultant,
Event Manager,
2 TEDx talks
Network Architect,
Systems Manager,
Software Developer,
former Ericsson
Computer Scientist,
Research Fellow,
Enterprise Architect,
former Cisco Systems
Corporate lawyer,
M&A expert, former
Executive Director at
Morgan Stanley
Seasoned Silicon
Valley COO / Director,
Venture Capitalist,
Startup Mentor
Financial Security
Specialist, CTO of
Founders Federal
Credit Union
Computer Scientist,
CEO of Blockchain
Information Exchange
Security (BIX)
Dr. Saed MufticBlockchain Technologist
Robert BenderFintech Specialist
Michael KapilkovCrypto-Strategist
Steve HoyemIndustry Compliance
Lina ParnessStrategic Partnerships
Chris GuidrozUI / UX Specialist
Crypto-Currency
Expert & Strategist
Founder of Healthi
and Altcoinz
Process Management
and Compliance
Advisor for financial
services industry
Business Strategist
and Director of
Global Partners and
Alliances at Logitech
Founder of the Leap
Laps, Cyber-security
UX specialist and
product developer
Prof. Erich WeigoldFoundation Governance
World Renowned
Quantum Physicist,
Humboldt Prize,
Lyle Medal, A.O.
www.cryptyk.com
Cryptyk takes the profit out of hacking
and the risk out of the cloud