Upload
tom-millitzer
View
171
Download
4
Embed Size (px)
Citation preview
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 1
NAMEWITHHELD“TopSecret”
ADelawareCorporation
SaleofInternetandIoTSecurityTechnology
ConfidentialBrochurePleaseseeconditionspage32.
Millitzer Capital
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument
TOPSECRETPrivacy,SecurityandAccountabilityforaConnectedWorld
2
Yournewphrasefortoday:proactivesecurity.
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 3
TheInternettodaylackstheend-to-endprivacyneededtosecureIoTcommunicationsandothercriticalonlinemessagingoperations.
Lackingprivacy,enterprises, devicesandserversaredangerouslyexposedtoagrowingpandemicofpenetrationthreats,malwareandcybercrime.
ThePrivacyProblem
Therootcauseofthisuniversalproblemisthelackoftotalmessageencryption.
Encryptingcontentiscommon(HTTPS)buthasproventobewoefullyinadequate.
Thedangerousexposureis intheunencryptedandeasilyhijackedmessageheaders–themetadata.
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 4
HowImportantisMetadata?
“Wekillpeoplebasedonmetadata.”
GeneralMichaelHaydenFormerDirector,NSA&CIA
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument
Today,wehavelotsofSecuritybutzeroPrivacy
5
Thisproblemthrivesbecauseitisfueledexclusivelybypurloinedmetadata.
Therefore,privacyacrosstheInternetcanonlybeachievedbyencryptingthewholemessage-contentandmetadata.Shuttingdowntherootcauseofthreatsandevil.
So,thesecuritymodelmustinvertfromreactivedefenseto:
PreventativeProactiveProtection.
Theprevailingsecuritymodelworldwideisoneofreactiveperimeterdefenseandthreatmitigation.
Addingmorelayerstothismodel hasfailedtoimprovesecurity,andwillcontinuetofail.
Contentiseasilyencrypted.Butcontentdoesnotfuelthesecuritythreatproblems.
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 6
EncryptedMetadata:theSilverBulletforPrivacy
ExploitingvisiblemetadataisthemeansbywhichalmostalldangerousthingshappenontheInternet.
Frommetadataaloneprying eyeseasilydiscernwhoyou are,whereyouareandwhoyou aremessaging,alongwithotherhighlysensitivepersonaldata.
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 7
HowImportantisMetadata?
“Weknowwhereyouare.Weknowwhereyou’vebeen.
Wecanmoreorlessknowwhatyou’rethinkingabout.” (AllfromMetadata-notContent.)
EricSchmidt,GoogleCEO
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument
HowUnencryptedMetadataFuelstheProblem
EncryptedMessageContent&Attachments
Device/Serveridentity,DomainNames,Personalinformation,RoutingInformation,Forwards:Location,To:From:Subject:Date/time:CC:BCC:URLs,etc.
UnencryptedMetadata:
MessageRecipient
HijackersofMetadata
EncryptedContent
ExposedMetadata
Threats,Ads, Malware&Cybercrime
8
ThedefensivefocusoftheSecurityIndustrydoesnotsolvetheprivacyproblem.
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument
MetadataMyth:Packetheadersandrelatedmetadatacannotbeencrypted.
ItisacommonlyheldbeliefthatallmetadatamustremainunencryptedtofacilitateDNSlookups,theroutingofpackettraffic,anddefensivemeasures.
9
CanMetadatabeProtected?
TopSecretReality:Toachievetrueprivacy,packetheadersandrelatedmetadatamustbeencrypted.
Privaterouting,uniquetoTopSecret,encryptsallpartsofpackettraffic-headers,metadataandcontent.
Byleavingnothingexploitablebypryingeyes,TopSecretshutsdownmalware,threatsandcybercrime.
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 10
istheFirstStrategically FocusedPrivacySolution
TopSecret
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument
TopSecretisadrop-innetworkmessagingoverlaythatseamlesslybundlesallsecurityandprivacyrequirementsintoasingle,enterprise-managedsolution.
TopSecretfreesdevelopersandsystemmanagersfromthecostlyoverhead,ongoingmaintenanceandcyber-risksofcustom-builtandone-offsecurityandprivacysolutions.
11
TopSecretTheFirstStrategicallyFocusedPrivacySolution
Toachievetotalprivacy,TopSecretrenderstheentiremessagedialogsecurebyencryptingtheentiremessage:
.allmetadata,routingandaddressing,
.allmessagecontentandattachments,
.andallcentralpolicydatabases.
Nothingofpotentiallycompromisingvalueisleftexposedtopryingeyesanywherebetweenendpoints.
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 12
TopSecretPrivateMessaging:.Deliverstotalend-to-end messagingprivacy..ProtectsusersofIoTdevicesandnetworksfromthreats..Relievesappdevelopersfromsecurityandprivacyconcerns..Providesaccountability..Savestimeandmoney,and,ensuresstableandsafeIoTcommunications.
ItisnowabsolutelycrucialthatIoTbesafelyprotectedbyaPrivateMessagingSolutionthatis:
.AdaptabletoanyProtocol
.ComprehensivelySecure
.Policy&RulesDriven
.Tested&Trustworthy
.EasytoImplement
.Cost-effective
Mission: PrivateMessagingforIoT
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 13
HowdoesTopSecretwork?
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument
CentralPolicyGatewayservices, on-premisesorintheCloud,provide:
.Integratedpolicy-basedmanagementofaccountsanddevices..Security,portandfirewallcontrols..AnonymousaddressingandroutingusingcloakedIPaddresses..Messagetransactionaccountabilityandreporting.
14
PolicyDrivenMessaging
Small-footprintclientsprovideno-codedeviceintegrationforanymessagingprotocol-withencryptedlinkstogateways andservers.
TopSecret-SecureDeviceClient
AnymessagingprotocolStrongport&firewallsecurityEncryption/decryptionSourceIP&Deviceverification
EncryptedGateway- ServerTraffic
TopSecretappinterface
DeviceApplications
TopSecret
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument
TopSecretProvidesStrongProtectionAgainst:
.Exploitationofaddressing,metadataandcontent.
.AllDNSexploits&cryptographyattacks.
.Encryptionkeyandpassworddisclosure.
.IPaddressandmessagesourcespoofing.
.Accountimitation&insiderthreats.
.Malware,ransomware&DDoSattacks,andothercriticalthreatstotheprivacy
andsecurityoffixedandmobileIOT messagingoperations.
15
TopSecretPrivate Messaginggreatlyreducestheneedsforandhighcostsofdefensiveperimetersecurityandthreatmitigation.
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument
Gateway ServicesIPWhiteListDeviceFingerprint Policychecks
TopSecretMessageOperationFromDeviceApplicationtoServerApplication
DeviceApplication
MessageTo:
ServerApplication
TopSecret-DeviceClientProtocolBrokerIPWhiteListDeviceFingerprintMessageEncryption
ServerApplication
MessageFrom:
TopSecret-ServerClientProtocolBrokerIPWhiteListDeviceFingerprintMessageDecryption
POLICIESDATABASE
ACCOUNTSDATABASE
PUBLICKEYDATABASE
NON-PUBLICIPADDRESSES
TopSecret-PolicyGateway
MESSAGESERVER
TRANSACTIONDATABASE
DeviceApplication
InternetCloud
4EncryptedMessage 5SetupServerRelays 8DeliverMsg
(NottheIPAddress)
GatewayServices
PolicyManagementIPWhiteListDeviceFingerprint
SaaSorEnterprise
1Confirmaccountpolicies
7Confirmpolicies2StartMessage-TO:serveraddress
3ReturnServerAppPublicKey6NotifyIncoming
16
EncryptedDatabases
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 17
TopSecretMain SolutionAttributesComparedwithHTTPS,VPNs&TOR
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 18
Atthispointasareaderyoumaybeindisbelief.
TopSecrethasupset,turnedoverandquestionedmanyofthetimehonoredinternetsecuritytenants.
Fewpeoplereallydolookoutsidethebox
Notallfigureouttheopticalillusion.*
Takealeapoffaith.Thisissolidrealtechnology.
*Solutionincredits.
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 19
Howbigisthemarket?
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument
IoTMarketOpportunitiesPrivatemessagingneedsareeverywhere...
HealthCareNetworks&DevicesHome&ApplianceAutomationRetaildisplays,Vendingmachines,Homeautomation,heatsensors,healthclubs,nailandhairsalons,boats,hover-boards,recreationalitems,toys,Christmastrees.Passenger&CommercialVehiclesMobileDevices&SensorsCommercialBuildingAutomationEnergy/Utilities–thepowergridGovernmentApps&SmartCitiesManufacturing&Distribution.
20
ExclusiveofalllegacyInternet,messagingande-mail.
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument
TopSecretBasicBusinessModelCustomersareOEMs,enterprisesandappproviders.Notend-usersorprovidersoftexting,socialmedia,VOIP,email,etc.
Sourcesofrevenue:
.ChannelPartnerlicensing.
.Enterpriselicensesforon-premisesolutions.
.CarrierandISPhostinglicenses.
.TopSecretcloud-hostedservices.
.One-timefeesfrombulkIoTdevicelicenses.
.Tieredsupportandupdateservices.
.Implementationconsultingservices.
21
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument
AppdeveloperswillloveTopSecretbecauseitfreesthemfrom:
.Includingsecuritywhiledevelopingapplications..Encryptionexpertiseandimplementation..Keyexchangeandmanagement..HTTPS&SecureCertificatehassles..DNSsetupandmaintenance..Port&firewallmanagement.
22
Programmersfocusonappfunctionality... TopSecretprovidesasophisticated,rigorouslytestedand cost-effectivedrop-inoverlayfortotalmessagingprivacy.
.
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 23
IoTMarketConditions&Competition
Competition
✓ Defenseandmitigationsolutionsfromlegacysecuritysolutionvendors.
✓ NewIoTsecurityvendorsofferingoldwineinnewbottles.Notrulyprivatemessagingsolutionshavesurfacedthusfar.
✓ Custom-built,one-offapplicationencryption.
WorldwideMarketSizeTolargetoguess.
CurrentEncryptionMethodsHTTPS,SSL/TLS,VPNs,TOR(NonesuitableforIoTmessaging)
Current(Legacy)SecurityIndustryPerimeterdefense&threatmitigationsolutions.(PrivateMessagingisadifferentbutrelatedspace.)
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 24
HowisTopSecretprotected?
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument
Originallydevelopedandprovenasaprivateemailsolution,themessagingfoundationisundergoingexpansiontothemuchlargerandmorelucrativeIoTprivatemessagingmarketplace.
25
Patents
Theoriginalmessagingtechnologyhasbeendeveloped,extensivelyvettedandlabtestedatacostof~US$3.5million.(Testreportsavailableonrequest)
US Patents:
No. 8,***,421 – Issued 2012 - Effective Date: 2004
No. 8,***,410 – Issued 2014
All patent rights assigned to Top Secret
TopSecret
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 26
TopSecret,IncTheCompanyTheoriginalinventor,formerCEOandleaderofallpriortechnologydevelopmentisatthehelmofthenewcompany.
TopSecret,IncisaDelawareCCorporation,foundedonthe$3.5millionindevelopedtechnologyandintellectualpropertyfromapredecessorcompany.
Seedfundinginprocesswithmoneyinthebank.
TechnologyisrunningtodayinevaluationandtestmodeonAmazonWebServices.
Mr.ClarkKent(Superman)Chairman&CEOA30-yeartrackrecordinlaunchingandgrowingsuccessfulsoftwareandInternetcompanies.Inventor,ChairmanandCTAofahighlysecureemailsolution.
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 27
TheCompanycontinued:
IoTsoftwaremodifications andadaptationinprocess.
Technicalrequirementsforconversiontoexpanding IoTmarketneedsundercomprehensivedesignreview.
Newpatentopportunitiesunderevaluation.
FinancialStatus
TopSecretisweighingitsoptions,includingapreferredofferingandleasingthetechnology.
Thiseffort,thesaleorthecompanyandunderlyingtechnologywouldenabletheproducttogotomarketandhopefullyobtainmarketsuperiorityinaquickfashion.
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 28
May06,2016-1QEarningsCall MichaelA.Brown,FormerCEOSymantec
“Thethreatenvironment…willcostourglobaleconomyintheneighborhoodof$2trillionto$3trillion,annually…”
Insummary:
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 29
Whatisitworth?
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 30
Millitzer Capital has been engaged by Top Secret, Inc. to represent the firm in the sale of the shares of the corporation, it’s technology or assets.
Rationale:The shareholders believe that this can be a multi-billion revenue company, but realize under the ownership of a larger company it can expedite that goal.
Transition:The owner is committed to a smooth transition in the best interest of both buyer and seller including what a buyer would expect in the sale of this type.
Purchase Price:There is no set or listing price. Millitzer Capital and Top Secret believe this product is unique in a very competitive industry; it has no known competition. Although the word “disruptive” has been overused over the past year, in our opinion, Top Secret defines that term. This product exceeds the security IT professionals expect for Fortune 500 firms and governmental agencies. We foresee this technology as a threat to the largest Internet security companies. We are considering a bidding program, but aggressive pre-emptive offers will be considered.
Process
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 31
MillitzerCapitalhasbeenengagedbyTopSecret,Incinthesaleofthecompanyortechnology.
ContactMillitzerCapitalfordetailedinformation,due-diligenceandthebiddingpackage.
TomMillitzerPresidentMillitzerCapital239-282-5550tom@millitzercapital.com
Preemptiveoffersconsidered.
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 32
PLEASE NOTE:
Although this document, including the name of the company has been released on a one by one basis without an NDA. To provide the public with the general overview we have used the name Top Secret for the company and Clark Kent (Superman) for the name of the CEO.
New Commerce Communications, Inc. (“NCC”), dba Millitzer Capital, has been appointed the exclusive agent by Top Secret, Inc (“Top Secret" or the "Company") concerning the transactions discussed herein. All questions and inquiries regarding this transaction should be directed to NCC. Employees of the Company should not be contacted. By receiving this document you have been registered as a (“Recipient “) of this brochure and understand the terms outlined herein. The information in this brochure was provided by the Company or its agents and from other sources believed to be reliable. No representation or warranty is made by NCC as to the completeness or accuracy of such information including financial information, financial pro-forma or interpretation of such information by NCC or subsequent information, which may be supplied.
Recipients of this brochure are presumed to be familiar with the software, Internet and telecommunications industry. Accordingly, this brochure contains only selected operating, financial and other information about the proposed transaction. This brochure is not intended to provide the sole basis for an evaluation of the proposed transaction. Each Recipient is advised to determine its own interest in the transaction based on its own on site and other investigations. The Company will upon request, make available reasonable additional information or data necessary to verify the accuracy of the information to the extent it possesses such information or can acquire it with reasonable expense and/or effort.
Recipients of this brochure are not to construe the contents of this memorandum as legal or tax advice. Each Recipient should consult its own counsel, accountant or business adviser as to the legal, tax and related matters concerning this transaction.
This brochure is for the confidential use of the Recipient for the sole purpose of assisting in its evaluation of the potential acquisition of the Company. The Recipient agrees that any information contained in this brochure will not be used for any other purpose than to consider the acquisition of the Company. Furthermore, the Recipient will not appropriate for its own use any business, intellectual property or any all all plans or technology developed by the Company as outlined in this brochure. Delivery of this brochure to anyone other than the Recipient of this brochure is unauthorized. Any reproduction of its contents in whole or in part, without the prior written consent of NCC and the Company is prohibited. Upon written request, the recipient will return all brochures, copies and supplemental information, which may be provided, by NCC or the Company.
Neither this Confidential Information Memorandum nor its delivery to any party shall constitute an offer to sell or the solicitation of an offer to buy any securities. Please direct communications or requests for information to:
Mr. Thomas Millitzer New Commerce Communications, Inc./Millitzer Capital
239-282-5550 -5 GMT [email protected]
UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 33
Copyright Notice: This presentation is copyrighted by; New Commerce Communications, Inc.© 2106 All Rights Reserved.
The following photographs have been used in this presentation;
Ian Fleming, copyright 2006 Paul Baack, with permission.
Vintage photographs, courtesy US Government.
All other photographs are either in the public domain or licensed by NCC.
Solution; see the cigar.
©