33
UPON NDA © 2016 The Internet of Private ThingsConfidential Document 1 NAME WITHHELD “Top Secret” A Delaware Corporation Sale of Internet and IoT Security Technology Confidential Brochure Please see conditions page 32. Millitzer Capital

Top Secret - The Secure Internet Starts Here

Embed Size (px)

Citation preview

Page 1: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 1

NAMEWITHHELD“TopSecret”

ADelawareCorporation

SaleofInternetandIoTSecurityTechnology

ConfidentialBrochurePleaseseeconditionspage32.

Millitzer Capital

Page 2: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument

TOPSECRETPrivacy,SecurityandAccountabilityforaConnectedWorld

2

Yournewphrasefortoday:proactivesecurity.

Page 3: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 3

TheInternettodaylackstheend-to-endprivacyneededtosecureIoTcommunicationsandothercriticalonlinemessagingoperations.

Lackingprivacy,enterprises, devicesandserversaredangerouslyexposedtoagrowingpandemicofpenetrationthreats,malwareandcybercrime.

ThePrivacyProblem

Therootcauseofthisuniversalproblemisthelackoftotalmessageencryption.

Encryptingcontentiscommon(HTTPS)buthasproventobewoefullyinadequate.

Thedangerousexposureis intheunencryptedandeasilyhijackedmessageheaders–themetadata.

Page 4: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 4

HowImportantisMetadata?

“Wekillpeoplebasedonmetadata.”

GeneralMichaelHaydenFormerDirector,NSA&CIA

Page 5: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument

Today,wehavelotsofSecuritybutzeroPrivacy

5

Thisproblemthrivesbecauseitisfueledexclusivelybypurloinedmetadata.

Therefore,privacyacrosstheInternetcanonlybeachievedbyencryptingthewholemessage-contentandmetadata.Shuttingdowntherootcauseofthreatsandevil.

So,thesecuritymodelmustinvertfromreactivedefenseto:

PreventativeProactiveProtection.

Theprevailingsecuritymodelworldwideisoneofreactiveperimeterdefenseandthreatmitigation.

Addingmorelayerstothismodel hasfailedtoimprovesecurity,andwillcontinuetofail.

Contentiseasilyencrypted.Butcontentdoesnotfuelthesecuritythreatproblems.

Page 6: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 6

EncryptedMetadata:theSilverBulletforPrivacy

ExploitingvisiblemetadataisthemeansbywhichalmostalldangerousthingshappenontheInternet.

Frommetadataaloneprying eyeseasilydiscernwhoyou are,whereyouareandwhoyou aremessaging,alongwithotherhighlysensitivepersonaldata.

Page 7: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 7

HowImportantisMetadata?

“Weknowwhereyouare.Weknowwhereyou’vebeen.

Wecanmoreorlessknowwhatyou’rethinkingabout.” (AllfromMetadata-notContent.)

EricSchmidt,GoogleCEO

Page 8: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument

HowUnencryptedMetadataFuelstheProblem

EncryptedMessageContent&Attachments

Device/Serveridentity,DomainNames,Personalinformation,RoutingInformation,Forwards:Location,To:From:Subject:Date/time:CC:BCC:URLs,etc.

UnencryptedMetadata:

MessageRecipient

HijackersofMetadata

EncryptedContent

ExposedMetadata

Threats,Ads, Malware&Cybercrime

8

ThedefensivefocusoftheSecurityIndustrydoesnotsolvetheprivacyproblem.

Page 9: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument

MetadataMyth:Packetheadersandrelatedmetadatacannotbeencrypted.

ItisacommonlyheldbeliefthatallmetadatamustremainunencryptedtofacilitateDNSlookups,theroutingofpackettraffic,anddefensivemeasures.

9

CanMetadatabeProtected?

TopSecretReality:Toachievetrueprivacy,packetheadersandrelatedmetadatamustbeencrypted.

Privaterouting,uniquetoTopSecret,encryptsallpartsofpackettraffic-headers,metadataandcontent.

Byleavingnothingexploitablebypryingeyes,TopSecretshutsdownmalware,threatsandcybercrime.

Page 10: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 10

istheFirstStrategically FocusedPrivacySolution

TopSecret

Page 11: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument

TopSecretisadrop-innetworkmessagingoverlaythatseamlesslybundlesallsecurityandprivacyrequirementsintoasingle,enterprise-managedsolution.

TopSecretfreesdevelopersandsystemmanagersfromthecostlyoverhead,ongoingmaintenanceandcyber-risksofcustom-builtandone-offsecurityandprivacysolutions.

11

TopSecretTheFirstStrategicallyFocusedPrivacySolution

Toachievetotalprivacy,TopSecretrenderstheentiremessagedialogsecurebyencryptingtheentiremessage:

.allmetadata,routingandaddressing,

.allmessagecontentandattachments,

.andallcentralpolicydatabases.

Nothingofpotentiallycompromisingvalueisleftexposedtopryingeyesanywherebetweenendpoints.

Page 12: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 12

TopSecretPrivateMessaging:.Deliverstotalend-to-end messagingprivacy..ProtectsusersofIoTdevicesandnetworksfromthreats..Relievesappdevelopersfromsecurityandprivacyconcerns..Providesaccountability..Savestimeandmoney,and,ensuresstableandsafeIoTcommunications.

ItisnowabsolutelycrucialthatIoTbesafelyprotectedbyaPrivateMessagingSolutionthatis:

.AdaptabletoanyProtocol

.ComprehensivelySecure

.Policy&RulesDriven

.Tested&Trustworthy

.EasytoImplement

.Cost-effective

Mission: PrivateMessagingforIoT

Page 13: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 13

HowdoesTopSecretwork?

Page 14: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument

CentralPolicyGatewayservices, on-premisesorintheCloud,provide:

.Integratedpolicy-basedmanagementofaccountsanddevices..Security,portandfirewallcontrols..AnonymousaddressingandroutingusingcloakedIPaddresses..Messagetransactionaccountabilityandreporting.

14

PolicyDrivenMessaging

Small-footprintclientsprovideno-codedeviceintegrationforanymessagingprotocol-withencryptedlinkstogateways andservers.

TopSecret-SecureDeviceClient

AnymessagingprotocolStrongport&firewallsecurityEncryption/decryptionSourceIP&Deviceverification

EncryptedGateway- ServerTraffic

TopSecretappinterface

DeviceApplications

TopSecret

Page 15: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument

TopSecretProvidesStrongProtectionAgainst:

.Exploitationofaddressing,metadataandcontent.

.AllDNSexploits&cryptographyattacks.

.Encryptionkeyandpassworddisclosure.

.IPaddressandmessagesourcespoofing.

.Accountimitation&insiderthreats.

.Malware,ransomware&DDoSattacks,andothercriticalthreatstotheprivacy

andsecurityoffixedandmobileIOT messagingoperations.

15

TopSecretPrivate Messaginggreatlyreducestheneedsforandhighcostsofdefensiveperimetersecurityandthreatmitigation.

Page 16: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument

Gateway ServicesIPWhiteListDeviceFingerprint Policychecks

TopSecretMessageOperationFromDeviceApplicationtoServerApplication

DeviceApplication

MessageTo:

ServerApplication

TopSecret-DeviceClientProtocolBrokerIPWhiteListDeviceFingerprintMessageEncryption

ServerApplication

MessageFrom:

TopSecret-ServerClientProtocolBrokerIPWhiteListDeviceFingerprintMessageDecryption

POLICIESDATABASE

ACCOUNTSDATABASE

PUBLICKEYDATABASE

NON-PUBLICIPADDRESSES

TopSecret-PolicyGateway

MESSAGESERVER

TRANSACTIONDATABASE

DeviceApplication

InternetCloud

4EncryptedMessage 5SetupServerRelays 8DeliverMsg

(NottheIPAddress)

GatewayServices

PolicyManagementIPWhiteListDeviceFingerprint

SaaSorEnterprise

1Confirmaccountpolicies

7Confirmpolicies2StartMessage-TO:serveraddress

3ReturnServerAppPublicKey6NotifyIncoming

16

EncryptedDatabases

Page 17: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 17

TopSecretMain SolutionAttributesComparedwithHTTPS,VPNs&TOR

Page 18: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 18

Atthispointasareaderyoumaybeindisbelief.

TopSecrethasupset,turnedoverandquestionedmanyofthetimehonoredinternetsecuritytenants.

Fewpeoplereallydolookoutsidethebox

Notallfigureouttheopticalillusion.*

Takealeapoffaith.Thisissolidrealtechnology.

*Solutionincredits.

Page 19: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 19

Howbigisthemarket?

Page 20: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument

IoTMarketOpportunitiesPrivatemessagingneedsareeverywhere...

HealthCareNetworks&DevicesHome&ApplianceAutomationRetaildisplays,Vendingmachines,Homeautomation,heatsensors,healthclubs,nailandhairsalons,boats,hover-boards,recreationalitems,toys,Christmastrees.Passenger&CommercialVehiclesMobileDevices&SensorsCommercialBuildingAutomationEnergy/Utilities–thepowergridGovernmentApps&SmartCitiesManufacturing&Distribution.

20

ExclusiveofalllegacyInternet,messagingande-mail.

Page 21: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument

TopSecretBasicBusinessModelCustomersareOEMs,enterprisesandappproviders.Notend-usersorprovidersoftexting,socialmedia,VOIP,email,etc.

Sourcesofrevenue:

.ChannelPartnerlicensing.

.Enterpriselicensesforon-premisesolutions.

.CarrierandISPhostinglicenses.

.TopSecretcloud-hostedservices.

.One-timefeesfrombulkIoTdevicelicenses.

.Tieredsupportandupdateservices.

.Implementationconsultingservices.

21

Page 22: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument

AppdeveloperswillloveTopSecretbecauseitfreesthemfrom:

.Includingsecuritywhiledevelopingapplications..Encryptionexpertiseandimplementation..Keyexchangeandmanagement..HTTPS&SecureCertificatehassles..DNSsetupandmaintenance..Port&firewallmanagement.

22

Programmersfocusonappfunctionality... TopSecretprovidesasophisticated,rigorouslytestedand cost-effectivedrop-inoverlayfortotalmessagingprivacy.

.

Page 23: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 23

IoTMarketConditions&Competition

Competition

✓ Defenseandmitigationsolutionsfromlegacysecuritysolutionvendors.

✓ NewIoTsecurityvendorsofferingoldwineinnewbottles.Notrulyprivatemessagingsolutionshavesurfacedthusfar.

✓ Custom-built,one-offapplicationencryption.

WorldwideMarketSizeTolargetoguess.

CurrentEncryptionMethodsHTTPS,SSL/TLS,VPNs,TOR(NonesuitableforIoTmessaging)

Current(Legacy)SecurityIndustryPerimeterdefense&threatmitigationsolutions.(PrivateMessagingisadifferentbutrelatedspace.)

Page 24: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 24

HowisTopSecretprotected?

Page 25: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument

Originallydevelopedandprovenasaprivateemailsolution,themessagingfoundationisundergoingexpansiontothemuchlargerandmorelucrativeIoTprivatemessagingmarketplace.

25

Patents

Theoriginalmessagingtechnologyhasbeendeveloped,extensivelyvettedandlabtestedatacostof~US$3.5million.(Testreportsavailableonrequest)

US Patents:

No. 8,***,421 – Issued 2012 - Effective Date: 2004

No. 8,***,410 – Issued 2014

All patent rights assigned to Top Secret

TopSecret

Page 26: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 26

TopSecret,IncTheCompanyTheoriginalinventor,formerCEOandleaderofallpriortechnologydevelopmentisatthehelmofthenewcompany.

TopSecret,IncisaDelawareCCorporation,foundedonthe$3.5millionindevelopedtechnologyandintellectualpropertyfromapredecessorcompany.

Seedfundinginprocesswithmoneyinthebank.

TechnologyisrunningtodayinevaluationandtestmodeonAmazonWebServices.

Mr.ClarkKent(Superman)Chairman&CEOA30-yeartrackrecordinlaunchingandgrowingsuccessfulsoftwareandInternetcompanies.Inventor,ChairmanandCTAofahighlysecureemailsolution.

Page 27: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 27

TheCompanycontinued:

IoTsoftwaremodifications andadaptationinprocess.

Technicalrequirementsforconversiontoexpanding IoTmarketneedsundercomprehensivedesignreview.

Newpatentopportunitiesunderevaluation.

FinancialStatus

TopSecretisweighingitsoptions,includingapreferredofferingandleasingthetechnology.

Thiseffort,thesaleorthecompanyandunderlyingtechnologywouldenabletheproducttogotomarketandhopefullyobtainmarketsuperiorityinaquickfashion.

Page 28: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 28

May06,2016-1QEarningsCall MichaelA.Brown,FormerCEOSymantec

“Thethreatenvironment…willcostourglobaleconomyintheneighborhoodof$2trillionto$3trillion,annually…”

Insummary:

Page 29: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 29

Whatisitworth?

Page 30: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 30

Millitzer Capital has been engaged by Top Secret, Inc. to represent the firm in the sale of the shares of the corporation, it’s technology or assets.

Rationale:The shareholders believe that this can be a multi-billion revenue company, but realize under the ownership of a larger company it can expedite that goal.

Transition:The owner is committed to a smooth transition in the best interest of both buyer and seller including what a buyer would expect in the sale of this type.

Purchase Price:There is no set or listing price. Millitzer Capital and Top Secret believe this product is unique in a very competitive industry; it has no known competition. Although the word “disruptive” has been overused over the past year, in our opinion, Top Secret defines that term. This product exceeds the security IT professionals expect for Fortune 500 firms and governmental agencies. We foresee this technology as a threat to the largest Internet security companies. We are considering a bidding program, but aggressive pre-emptive offers will be considered.

Process

Page 31: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 31

MillitzerCapitalhasbeenengagedbyTopSecret,Incinthesaleofthecompanyortechnology.

ContactMillitzerCapitalfordetailedinformation,due-diligenceandthebiddingpackage.

TomMillitzerPresidentMillitzerCapital239-282-5550tom@millitzercapital.com

Preemptiveoffersconsidered.

Page 32: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 32

PLEASE NOTE:

Although this document, including the name of the company has been released on a one by one basis without an NDA. To provide the public with the general overview we have used the name Top Secret for the company and Clark Kent (Superman) for the name of the CEO.

New Commerce Communications, Inc. (“NCC”), dba Millitzer Capital, has been appointed the exclusive agent by Top Secret, Inc (“Top Secret" or the "Company") concerning the transactions discussed herein. All questions and inquiries regarding this transaction should be directed to NCC. Employees of the Company should not be contacted. By receiving this document you have been registered as a (“Recipient “) of this brochure and understand the terms outlined herein. The information in this brochure was provided by the Company or its agents and from other sources believed to be reliable. No representation or warranty is made by NCC as to the completeness or accuracy of such information including financial information, financial pro-forma or interpretation of such information by NCC or subsequent information, which may be supplied.

Recipients of this brochure are presumed to be familiar with the software, Internet and telecommunications industry. Accordingly, this brochure contains only selected operating, financial and other information about the proposed transaction. This brochure is not intended to provide the sole basis for an evaluation of the proposed transaction. Each Recipient is advised to determine its own interest in the transaction based on its own on site and other investigations. The Company will upon request, make available reasonable additional information or data necessary to verify the accuracy of the information to the extent it possesses such information or can acquire it with reasonable expense and/or effort.

Recipients of this brochure are not to construe the contents of this memorandum as legal or tax advice. Each Recipient should consult its own counsel, accountant or business adviser as to the legal, tax and related matters concerning this transaction.

This brochure is for the confidential use of the Recipient for the sole purpose of assisting in its evaluation of the potential acquisition of the Company. The Recipient agrees that any information contained in this brochure will not be used for any other purpose than to consider the acquisition of the Company. Furthermore, the Recipient will not appropriate for its own use any business, intellectual property or any all all plans or technology developed by the Company as outlined in this brochure. Delivery of this brochure to anyone other than the Recipient of this brochure is unauthorized. Any reproduction of its contents in whole or in part, without the prior written consent of NCC and the Company is prohibited. Upon written request, the recipient will return all brochures, copies and supplemental information, which may be provided, by NCC or the Company.

Neither this Confidential Information Memorandum nor its delivery to any party shall constitute an offer to sell or the solicitation of an offer to buy any securities. Please direct communications or requests for information to:

Mr. Thomas Millitzer New Commerce Communications, Inc./Millitzer Capital

239-282-5550 -5 GMT [email protected]

Page 33: Top Secret - The Secure Internet Starts Here

UPONNDA©2016 TheInternetofPrivateThings™ ConfidentialDocument 33

Copyright Notice: This presentation is copyrighted by; New Commerce Communications, Inc.© 2106 All Rights Reserved.

The following photographs have been used in this presentation;

Ian Fleming, copyright 2006 Paul Baack, with permission.

Vintage photographs, courtesy US Government.

All other photographs are either in the public domain or licensed by NCC.

Solution; see the cigar.

©