SlideShare a Scribd company logo
1 of 12
Download to read offline
The World Internet Security Company




                                      WISeKey eKey+

                 Securing your identity, applications
                   and data for universal access.
Data theft loss and mismanagement is costing
                                        individuals and enterprises lots of money
The World Internet Security Company




     • Data Loss costs us money
              – Regulatory penalties
              – Loss of valuable intellectual property, commercial data
              – Lost productive time
     • Identity and data theft
              – Huge and growing problem
              – Banks are now rolling out strong authentication
     • Mobile workers losing productivity
              – Un-synchronised, unavailable data
              – My document update is at home!
our solution is a tangible device that fuses high
                                      security portable identity and data synchronicity
The World Internet Security Company

                                                       Consumer friendly
                                                            & Water Proof !
  an advanced                                          Secure Identity and Online Authentication
                                                       • secure digital ID authentication & diigtal
                                                          signature
                                                       • secure password (SSO) portability.
                                                       • up to 3-factor strong authentication
                                                           –   Password
           Personal Portable Security                      –   Match on Device Biometrics
         Device (PPSD)      that
                                                       Secure Data Storage and Synchronization
                    securely stores           and      • portable secure storage (Gigabyets)
                                                       • secure hardened applications
         synchronises                  your            • synchronization across network devices


         electronic identity ,                         Multiplicity of Add on Features:
                                                       • Add-on services via subscriptions
                                                       • RFID for physical access
  applications and data.
                                                       • Post Quantum Cryptography
Types of eKey+
The World Internet Security Company
eKey+ Models
The World Internet Security Company
The World Internet Security Company




   WISeKey Smartcard Kit contains a state-
   of-the-art digital security system. The Kit
   includes WISekey technologies
   for securing websites, a biometric-
   protected electronic token, smartcard
   reader and Alinghi.
   Contains:
   • 2GB Biometric Token (Level 1 software
   encryption, fingerprint slide)
   • Smartcard (RSA 2048 bit, X.509
   compatible)
   • WISekey digital certificate (proof of
   identity, secure email, site access)
   • Smartcard Reader (USB)
The World Internet Security Company
The World Internet Security Company
The World Internet Security Company
Everyone that needs secure identity,
                                          application and data portability
 The World Internet Security Company


       Target Market :                               Everyone that needs Secure Data Portability (USB, et. Al.)
            (15% CAGR)                               172 Mn to 227 Mn units p.a. / € 4 Bn to € 5.6 Bn
           (50% CAGR)                                261 Mn 658 Mn units p.a. / € 8.1 Bn to € 27.3 Bn

      “Revenue from Universal Serial Bus flash drives will rise by 64 percent in 2005, to $2.4
      billion. It will grow at a compound annual rate of 15 percent between 2004 and 2010,
      fuelled partly by demand for smart USB drives.” - Gartner


                                                                              USB Flash Drive - Units (Millions)
      Best Selling Brands (Channel Survey)
      • SanDisk – 37%                                                       250
      • Kingston – 25%                                                      200
      • HP – 19%                                                            150
      • Memorex – 11%                                                       100
                                                                             50
      • PNY – 7%
                                                                              0
      • Tanscend – 4%
      • Sony – 4%

Ref: http://www.pma-show.com/sandisk/003_expands_flash_memory_market.html
Kingston HP gain USB Flash Drive market share…
USB on Steroids Revenue Potential
The World Internet Security Company




                           Conservative Revenue Projection: € 27 Mn in Year 1
                                                            € 160 Mn in Year 5

                                                                    Revenue Projection (€ Mn)
                            ASSUMPTIONS                            Device Revenue     Subs. Revenue

  MKT SHARE:                          0.1 % total USB sales     200.0
  MSRP:                               € 90
                                                                150.0
  DEVICE COGS:                        € 40
                                                                100.0
  SUBS:                               50% signup., € 100 p.a.
  SUBS COGS:                          50%
  SUBS Retention                      75%                        50.0

                                                                  0.0
                                                                        2010 2011 2012 2013 2014 2015
Long List Features
The World Internet Security Company


     •      Use as a wireless physical access badge.
     •      Securely store and access your data on any PC with a USB port.
     •      Assure secure encrypted access to secured Websites, and online data storage.
     •      Allows execution of applications such as Internet Browsers and Email from onboard
            storage, and can securely encrypt all application data.
     •      Allows access to be secure by biometrics, PIN, or PIN and Biometrics.
     •      Onboard storage and matching of fingerprint templates guarantees security and
            privacy.
     •      Secure portable desktop environment: allows for secure mobile computing with
            standalone portable applications
     •      a hardened browser with a restricted operating environment and secure.
     •      organizations and users that require up to 3-factor strong authentication to satisfy
            their needs for secure portable storage, identity and user authentication.
     •      It features very secure native hardware based file encryption
     •      Optional biometric match-on-device authentication
     •      It features a rugged waterproof design.
     •      Dev: an easy to use system to add portable applications and secure services.
     •      Dev: Additional online services and subscriptions

More Related Content

What's hot

Cidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 FullCidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 Fulllfilliat
 
Luxemburg event - airtight networks
Luxemburg event - airtight networksLuxemburg event - airtight networks
Luxemburg event - airtight networksKappa Data
 
Honeywell 5800-wireless-series
Honeywell 5800-wireless-seriesHoneywell 5800-wireless-series
Honeywell 5800-wireless-seriesAlarm Grid
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile AppsDenim Group
 
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/PerspectiveContactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/PerspectiveBurak Ilgıcıoğlu
 
Business Ready Solution from Motorola
Business Ready Solution from MotorolaBusiness Ready Solution from Motorola
Business Ready Solution from Motorolarodbarker
 
Assurity seminar 24 jan
Assurity seminar 24 janAssurity seminar 24 jan
Assurity seminar 24 janJason Kong
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demandpjpallen
 
SmartTrust WIB 1.3
SmartTrust WIB 1.3SmartTrust WIB 1.3
SmartTrust WIB 1.3Julien SIMON
 
NEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security SolutionsNEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security SolutionsNECIndia
 
Bluetooth Smart (Low Energy) for Android
Bluetooth Smart (Low Energy) for AndroidBluetooth Smart (Low Energy) for Android
Bluetooth Smart (Low Energy) for AndroidLocalz
 
Microlink investment limited profile
Microlink investment limited profileMicrolink investment limited profile
Microlink investment limited profileOmobulejo Abiodun
 
Samsung galaxy note ii 4 g android phone, titanium gray (verizon wireless)
Samsung galaxy note ii 4 g android phone, titanium gray (verizon wireless)Samsung galaxy note ii 4 g android phone, titanium gray (verizon wireless)
Samsung galaxy note ii 4 g android phone, titanium gray (verizon wireless)todd lpierces
 

What's hot (19)

Cidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 FullCidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 Full
 
Luxemburg event - airtight networks
Luxemburg event - airtight networksLuxemburg event - airtight networks
Luxemburg event - airtight networks
 
Honeywell 5800-wireless-series
Honeywell 5800-wireless-seriesHoneywell 5800-wireless-series
Honeywell 5800-wireless-series
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile Apps
 
Android App
Android AppAndroid App
Android App
 
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/PerspectiveContactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
 
Nokia 700 & Nokia 701 - Try something new!
Nokia 700 & Nokia 701 - Try something new!Nokia 700 & Nokia 701 - Try something new!
Nokia 700 & Nokia 701 - Try something new!
 
Business Ready Solution from Motorola
Business Ready Solution from MotorolaBusiness Ready Solution from Motorola
Business Ready Solution from Motorola
 
Assurity seminar 24 jan
Assurity seminar 24 janAssurity seminar 24 jan
Assurity seminar 24 jan
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demand
 
SmartTrust WIB 1.3
SmartTrust WIB 1.3SmartTrust WIB 1.3
SmartTrust WIB 1.3
 
Somo 650 Ds
Somo 650 DsSomo 650 Ds
Somo 650 Ds
 
Catalogo 6110
Catalogo 6110 Catalogo 6110
Catalogo 6110
 
NEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security SolutionsNEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security Solutions
 
Next gen 80211ac_overview
Next gen 80211ac_overviewNext gen 80211ac_overview
Next gen 80211ac_overview
 
Bluetooth Smart (Low Energy) for Android
Bluetooth Smart (Low Energy) for AndroidBluetooth Smart (Low Energy) for Android
Bluetooth Smart (Low Energy) for Android
 
Microlink investment limited profile
Microlink investment limited profileMicrolink investment limited profile
Microlink investment limited profile
 
Samsung galaxy note ii 4 g android phone, titanium gray (verizon wireless)
Samsung galaxy note ii 4 g android phone, titanium gray (verizon wireless)Samsung galaxy note ii 4 g android phone, titanium gray (verizon wireless)
Samsung galaxy note ii 4 g android phone, titanium gray (verizon wireless)
 

Viewers also liked

Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Creus Moreira Carlos
 
W T C I I I Geneva Project Presentation
W T C I I I Geneva Project PresentationW T C I I I Geneva Project Presentation
W T C I I I Geneva Project PresentationCreus Moreira Carlos
 
WISekey Global Clinton Initiative Commitment Status Report
WISekey Global Clinton Initiative Commitment Status ReportWISekey Global Clinton Initiative Commitment Status Report
WISekey Global Clinton Initiative Commitment Status ReportCreus Moreira Carlos
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Creus Moreira Carlos
 

Viewers also liked (6)

Ft ifa football a4 brochure
Ft ifa football a4 brochureFt ifa football a4 brochure
Ft ifa football a4 brochure
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
 
W T C I I I Geneva Project Presentation
W T C I I I Geneva Project PresentationW T C I I I Geneva Project Presentation
W T C I I I Geneva Project Presentation
 
WISekey Global Clinton Initiative Commitment Status Report
WISekey Global Clinton Initiative Commitment Status ReportWISekey Global Clinton Initiative Commitment Status Report
WISekey Global Clinton Initiative Commitment Status Report
 
Forging A New Path
Forging A New PathForging A New Path
Forging A New Path
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
 

Similar to ekey+ Presentation

Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentationguestf018d88
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12lfilliat
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsMaxim Salnikov
 
Cidway Byod Authentication
Cidway Byod AuthenticationCidway Byod Authentication
Cidway Byod Authenticationlfilliat
 
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPasswords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPriyanka Aash
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseOKsystem
 
Commtex solutions
Commtex solutionsCommtex solutions
Commtex solutionsSameer Wagh
 
Nokia E6 Data Specs
Nokia E6 Data SpecsNokia E6 Data Specs
Nokia E6 Data SpecsAbe Olandres
 
GatelessVPN technology pitch
GatelessVPN technology pitchGatelessVPN technology pitch
GatelessVPN technology pitchGVNetworks
 
Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011bluechipper
 
Audio card - VoIP - Phonecard
Audio card - VoIP - PhonecardAudio card - VoIP - Phonecard
Audio card - VoIP - PhonecardGuy Romanus
 
Crexendo Services
Crexendo ServicesCrexendo Services
Crexendo Servicesdouggaylor
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCloudIDSummit
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Context Automation (with video demos)
Context Automation (with video demos)Context Automation (with video demos)
Context Automation (with video demos)Phil Windley
 
Context Automation
Context AutomationContext Automation
Context AutomationPhil Windley
 

Similar to ekey+ Presentation (20)

Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
Wisekey italia presentation 2012
Wisekey italia presentation 2012Wisekey italia presentation 2012
Wisekey italia presentation 2012
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
Cidway Byod Authentication
Cidway Byod AuthenticationCidway Byod Authentication
Cidway Byod Authentication
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPasswords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
 
Commtex solutions
Commtex solutionsCommtex solutions
Commtex solutions
 
Nokia E6 Data Specs
Nokia E6 Data SpecsNokia E6 Data Specs
Nokia E6 Data Specs
 
GatelessVPN technology pitch
GatelessVPN technology pitchGatelessVPN technology pitch
GatelessVPN technology pitch
 
Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011
 
Audio card - VoIP - Phonecard
Audio card - VoIP - PhonecardAudio card - VoIP - Phonecard
Audio card - VoIP - Phonecard
 
Crexendo Services
Crexendo ServicesCrexendo Services
Crexendo Services
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Context Automation (with video demos)
Context Automation (with video demos)Context Automation (with video demos)
Context Automation (with video demos)
 
Context Automation
Context AutomationContext Automation
Context Automation
 

More from Creus Moreira Carlos

Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin Dimanche Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin Dimanche Creus Moreira Carlos
 
Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin DimancheInterview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin DimancheCreus Moreira Carlos
 
Security aspects on blockchain white paper
Security aspects on blockchain  white paperSecurity aspects on blockchain  white paper
Security aspects on blockchain white paperCreus Moreira Carlos
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationCreus Moreira Carlos
 
Vedomostiprl17011021 110921095139-phpapp02
Vedomostiprl17011021 110921095139-phpapp02Vedomostiprl17011021 110921095139-phpapp02
Vedomostiprl17011021 110921095139-phpapp02Creus Moreira Carlos
 
Billionaire hinduja hits lima for more business, less ego bloomberg business
Billionaire hinduja hits lima for more business, less ego   bloomberg businessBillionaire hinduja hits lima for more business, less ego   bloomberg business
Billionaire hinduja hits lima for more business, less ego bloomberg businessCreus Moreira Carlos
 
3 Swiss companies listed among the World Economic Forum Global Growth Companies
3 Swiss companies listed among the World Economic Forum Global Growth Companies3 Swiss companies listed among the World Economic Forum Global Growth Companies
3 Swiss companies listed among the World Economic Forum Global Growth CompaniesCreus Moreira Carlos
 
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...Creus Moreira Carlos
 
Presentation BigTrust at Malaga Valley by Carlos Moreira
Presentation BigTrust at Malaga Valley by Carlos MoreiraPresentation BigTrust at Malaga Valley by Carlos Moreira
Presentation BigTrust at Malaga Valley by Carlos MoreiraCreus Moreira Carlos
 
OISTE.ORG granted by the UN Special consultative status
OISTE.ORG  granted by the UN Special consultative status OISTE.ORG  granted by the UN Special consultative status
OISTE.ORG granted by the UN Special consultative status Creus Moreira Carlos
 
Copie article tribune_de_genève_11_fév2013
Copie article tribune_de_genève_11_fév2013Copie article tribune_de_genève_11_fév2013
Copie article tribune_de_genève_11_fév2013Creus Moreira Carlos
 
Carlos Moreira Interview to Vedomosti Russia
Carlos Moreira Interview to Vedomosti RussiaCarlos Moreira Interview to Vedomosti Russia
Carlos Moreira Interview to Vedomosti RussiaCreus Moreira Carlos
 
Vedomosti Coverage Carlos Moreira WISekey
Vedomosti Coverage Carlos Moreira WISekeyVedomosti Coverage Carlos Moreira WISekey
Vedomosti Coverage Carlos Moreira WISekeyCreus Moreira Carlos
 

More from Creus Moreira Carlos (20)

Wisekey kamp
Wisekey kampWisekey kamp
Wisekey kamp
 
Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin Dimanche Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin Dimanche
 
Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin DimancheInterview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin Dimanche
 
Security aspects on blockchain white paper
Security aspects on blockchain  white paperSecurity aspects on blockchain  white paper
Security aspects on blockchain white paper
 
wisekey history
wisekey historywisekey history
wisekey history
 
WISekey presentation
WISekey presentation WISekey presentation
WISekey presentation
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
Vedomostiprl17011021 110921095139-phpapp02
Vedomostiprl17011021 110921095139-phpapp02Vedomostiprl17011021 110921095139-phpapp02
Vedomostiprl17011021 110921095139-phpapp02
 
Billionaire hinduja hits lima for more business, less ego bloomberg business
Billionaire hinduja hits lima for more business, less ego   bloomberg businessBillionaire hinduja hits lima for more business, less ego   bloomberg business
Billionaire hinduja hits lima for more business, less ego bloomberg business
 
3 Swiss companies listed among the World Economic Forum Global Growth Companies
3 Swiss companies listed among the World Economic Forum Global Growth Companies3 Swiss companies listed among the World Economic Forum Global Growth Companies
3 Swiss companies listed among the World Economic Forum Global Growth Companies
 
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...
 
Presentation BigTrust at Malaga Valley by Carlos Moreira
Presentation BigTrust at Malaga Valley by Carlos MoreiraPresentation BigTrust at Malaga Valley by Carlos Moreira
Presentation BigTrust at Malaga Valley by Carlos Moreira
 
OISTE.ORG granted by the UN Special consultative status
OISTE.ORG  granted by the UN Special consultative status OISTE.ORG  granted by the UN Special consultative status
OISTE.ORG granted by the UN Special consultative status
 
Copie article tribune_de_genève_11_fév2013
Copie article tribune_de_genève_11_fév2013Copie article tribune_de_genève_11_fév2013
Copie article tribune_de_genève_11_fév2013
 
Wi se key - wisephoneplus (esp)
Wi se key - wisephoneplus (esp)Wi se key - wisephoneplus (esp)
Wi se key - wisephoneplus (esp)
 
Bilan fev 2012 300dpi
Bilan fev 2012 300dpiBilan fev 2012 300dpi
Bilan fev 2012 300dpi
 
Fcb 4
Fcb 4Fcb 4
Fcb 4
 
Cleantech switzerland 2010-1
Cleantech switzerland 2010-1Cleantech switzerland 2010-1
Cleantech switzerland 2010-1
 
Carlos Moreira Interview to Vedomosti Russia
Carlos Moreira Interview to Vedomosti RussiaCarlos Moreira Interview to Vedomosti Russia
Carlos Moreira Interview to Vedomosti Russia
 
Vedomosti Coverage Carlos Moreira WISekey
Vedomosti Coverage Carlos Moreira WISekeyVedomosti Coverage Carlos Moreira WISekey
Vedomosti Coverage Carlos Moreira WISekey
 

Recently uploaded

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Recently uploaded (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

ekey+ Presentation

  • 1. The World Internet Security Company WISeKey eKey+ Securing your identity, applications and data for universal access.
  • 2. Data theft loss and mismanagement is costing individuals and enterprises lots of money The World Internet Security Company • Data Loss costs us money – Regulatory penalties – Loss of valuable intellectual property, commercial data – Lost productive time • Identity and data theft – Huge and growing problem – Banks are now rolling out strong authentication • Mobile workers losing productivity – Un-synchronised, unavailable data – My document update is at home!
  • 3. our solution is a tangible device that fuses high security portable identity and data synchronicity The World Internet Security Company Consumer friendly & Water Proof ! an advanced Secure Identity and Online Authentication • secure digital ID authentication & diigtal signature • secure password (SSO) portability. • up to 3-factor strong authentication – Password Personal Portable Security – Match on Device Biometrics Device (PPSD) that Secure Data Storage and Synchronization securely stores and • portable secure storage (Gigabyets) • secure hardened applications synchronises your • synchronization across network devices electronic identity , Multiplicity of Add on Features: • Add-on services via subscriptions • RFID for physical access applications and data. • Post Quantum Cryptography
  • 4. Types of eKey+ The World Internet Security Company
  • 5. eKey+ Models The World Internet Security Company
  • 6. The World Internet Security Company WISeKey Smartcard Kit contains a state- of-the-art digital security system. The Kit includes WISekey technologies for securing websites, a biometric- protected electronic token, smartcard reader and Alinghi. Contains: • 2GB Biometric Token (Level 1 software encryption, fingerprint slide) • Smartcard (RSA 2048 bit, X.509 compatible) • WISekey digital certificate (proof of identity, secure email, site access) • Smartcard Reader (USB)
  • 7. The World Internet Security Company
  • 8. The World Internet Security Company
  • 9. The World Internet Security Company
  • 10. Everyone that needs secure identity, application and data portability The World Internet Security Company Target Market : Everyone that needs Secure Data Portability (USB, et. Al.) (15% CAGR) 172 Mn to 227 Mn units p.a. / € 4 Bn to € 5.6 Bn (50% CAGR) 261 Mn 658 Mn units p.a. / € 8.1 Bn to € 27.3 Bn “Revenue from Universal Serial Bus flash drives will rise by 64 percent in 2005, to $2.4 billion. It will grow at a compound annual rate of 15 percent between 2004 and 2010, fuelled partly by demand for smart USB drives.” - Gartner USB Flash Drive - Units (Millions) Best Selling Brands (Channel Survey) • SanDisk – 37% 250 • Kingston – 25% 200 • HP – 19% 150 • Memorex – 11% 100 50 • PNY – 7% 0 • Tanscend – 4% • Sony – 4% Ref: http://www.pma-show.com/sandisk/003_expands_flash_memory_market.html Kingston HP gain USB Flash Drive market share…
  • 11. USB on Steroids Revenue Potential The World Internet Security Company Conservative Revenue Projection: € 27 Mn in Year 1 € 160 Mn in Year 5 Revenue Projection (€ Mn) ASSUMPTIONS Device Revenue Subs. Revenue MKT SHARE: 0.1 % total USB sales 200.0 MSRP: € 90 150.0 DEVICE COGS: € 40 100.0 SUBS: 50% signup., € 100 p.a. SUBS COGS: 50% SUBS Retention 75% 50.0 0.0 2010 2011 2012 2013 2014 2015
  • 12. Long List Features The World Internet Security Company • Use as a wireless physical access badge. • Securely store and access your data on any PC with a USB port. • Assure secure encrypted access to secured Websites, and online data storage. • Allows execution of applications such as Internet Browsers and Email from onboard storage, and can securely encrypt all application data. • Allows access to be secure by biometrics, PIN, or PIN and Biometrics. • Onboard storage and matching of fingerprint templates guarantees security and privacy. • Secure portable desktop environment: allows for secure mobile computing with standalone portable applications • a hardened browser with a restricted operating environment and secure. • organizations and users that require up to 3-factor strong authentication to satisfy their needs for secure portable storage, identity and user authentication. • It features very secure native hardware based file encryption • Optional biometric match-on-device authentication • It features a rugged waterproof design. • Dev: an easy to use system to add portable applications and secure services. • Dev: Additional online services and subscriptions