SlideShare a Scribd company logo
1 of 33
Download to read offline
NVIS
We cloak your private
network from
vulnerabilities
Invisible Internetโ„ข
Preface
Hackers can't hack what they can't see. Our invisibility cloak represents a whole new
paradigm to infrastructure protection beyond Zero Trust by taking remote communications
"off the grid" while preserving the existing infrastructure and development investments.
NVIS is military-grade security built by the team that created a best-in-class unhackable
solution approved for DoD-wide use and for Coalition forces.
NVIS is revolutionary in the security and privacy space to benefit B2B or B2G greatly,
especially in the global threat climate.
2
3
Connect to anyone in the world,
securely without restrictions
Un
3
NVIS Canโ€™t be
โ€ข Hacked
โ€ข Sniffed
โ€ข Traced
โ€ข Blocked
โ€ข Censored
Cost Effective: Take advantage of existing networks or
public infrastructure
Phil Smith
Founder / CTO
โ€ข Founder/creator and
chief architect
โ€ข Expertise in security,
networking, ISP and
blockchain.
โ€ข Over 30 years in lead
roles at NASA, HP,
Cisco, Lawrence
Livermore National
Lab
Marilyn Hernandez
Co-Founder
โ€ข Investor relations,
Business Development.
Sales and Marketing,
Strategist. Researcher,
Realtor, Counselor,
โ€ข BA Administration of
Justice
Salman Rizvi
CEO โ€“ (CMO/CRO)
โ€ข 22+ years Leadership of
Enterprise Transformation for
the top Fortune 50-500 and
organizations worldwide
โ€ข Founded 2 companies
โ€ข SaaS pipelines, CIO. EVP &
Strategic Advisor
SVP Sales & Marketing
โ€ข 15+ years of experience
in Sales, Marketing,
Strategy
โ€ข Founded 3 companies
โ€ข 5 years of consulting for
tech startups
โ€ข Mentor for tech founders
at Stanford and Skolkovo
Jed Reitler Rob Langhorne
CISO
โ€ข Former CEO of CloudLogix,
Cranite architect, Apple lead
โ€ข Analytical, highly adaptable
professional
โ€ข Extensive experience leading
ground-breaking development
in mobile computing and
security.
Who We Are
4
Dr. Taher Elgamal
CTO / Security, Salesforce
โ€ข Dr. Elgamal is world renown in the
industry as the inventor of Secure
Sockets Layer (SSL), a protocol
developed by Netscape for
transmitting private documents via
the Internet. Dr. Elgamal also wrote
the SSL patent and promoted SSL
and has a lifetime achievement
award from RSA.
John Vigouroux
Chief Entrepeneur & Innovation
Officer, Averett University
โ€ข CEO & Co-Founder at WeRAI
โ€ข Former CEO Nex Cubed
โ€ข CEO of Cranite Systems
โ€ข CEO of M86 Security, (acquired by
Trustwave) joined as an advisor.
Partner Business
Development, Verizon
โ€ข Formerly Worldwide Sales
and Business
Development Leader
Cisco Systems
โ€ข Director Smart Grid
Strategic Alliances, GE
Digital Energy
Manoj Bhatia Gregory F. Ryan
President, Ryan Advisory Services
โ€ข Providing Business Consulting
โ€ข Management Consulting
โ€ข Finance Consulting
โ€ข Marketing Consulting
โ€ข Pricing Strategy
โ€ข Advertising
โ€ข Project Management
Our Advisors
5
The Core Problem
6
VISIBILITY IS THE PROBLEM
Internet is OPEN which meeans VULNERABLE BY DESIGN:
โ— Geolocation
โ— Routes are traceable
โ— Lookup by name (DNS)
โ— IP address is public
โ— TCP ports well known / discoverable
โ— Open Protocols yield Connectivity but NO SECURITY
6
Result: Global Cost of Cybercrime 10.5 Trillion dollars Annually*
* Projected by CyberSecurity Ventures, 2021
Single Point of Failure Slow Performance Lack Scalability
High TCO Lack of Privacy Highly Vulnerable
Problems
7
Decentralized High Performance Infinite Scalability
Easy to Deploy Encrypted End-to-End Invisible
Solutions
8
Innovation: Layer 2 Full Stack Security
โ€ข A Software-Only Architecture
โ€ข Layer2 Encryption
โ€ข Layer 2 encrypts ALL traffic including
source, destination and data payload
so the full stack is secured.
โ€ข Only software based Layer 2 product
obtaining FIPS certification
โ€ข No IP routing (hops) needed boosting
performance by removing overhead
and propagation delays.
โ€ข Protects against the following
โ€ข Access Point / MAC address spoofing
โ€ข Dictionary attacks
โ€ข Man-in-the-middle
โ€ข DDOS attacks
โ€ข ARP connection/redirection
โ€ข Protocol hacks โ€“ ALL OF THEM
# ISO/OSI Model Example
7 Application HTTP, FTP
6 Presentation SSL, TLS
5 Session NetBIOS, PPTP
4 Transport TCP, UDP
3 Network IP, ICMP
2 Data Link
NVIS over
Ethernet, WiFi,
WiMAX, LTE
1 Physical
Copper Wires,
Optical Fibers,
Air
9
Innovation: Peer-to-Peer Path Invisibility
Perimeter Path and Payload Encryption
Turns This Into This
10
11
Innovation: Mirrored Segments
Patent Pending: A
Multiverse of
Internets, 2019,
A. Smith EFS ID
3483382
Virtual Private IPs
behaves like Public
IPs โ€“ no gateways or
routing needed.
Multiple overlays can
segment networks
by security context.
Product Description
โ—ผ 100% software agents โ€“ no
hardware needed **
โ—ผ All major platforms for end-users
โ—ผ AWS and Azure Cloud Supported
โ—ผ Web Subscription and Billing
System
** ARM router available for Kiosk. legacy systems
or IoT connectivity
Admin Web UI
12
1
2
3
Admin Web UI
Build a network as easy as 1-2-3
TODO
13
One click auto provisioning
System Level View - Zero Trust
14
โ€œ VPN Hacks Are a Slow-Motion Disaster
Hackers have had a field day with virtual private networks โ€”
especially during the remote-work pandemic era.
15
The Market
1994
Foundation for
VPN
SSL & IPsec
2000
Corporations
that have
remote offices
VPN for business
2019
$23Bn global
market value
VPN growth &
market hacks
1996
Beginning of VPN
technology
PPTP
2010
Start of wider
adoption
VPN popularity
2020
Remote Work
revolution
COVID
Why Now โ€“ Existing Security is Flawed
16
Remote Access VPN, Intranet
VPN, Extranet VPN, Others,
Application: Personal VPN
Users, Corporate VPN Users
North America Site-to-
Site, Remote Access
Business Market
Market size was valued
at USD 8.41 Billion in
2020 and is projected to
reach USD 37.23 Billion
by 2028, growing at a
CAGR of 35.25 %
Service Addressable
Market
Total Addressable Market Service Obtainable Market
$8B
$4B
$1B
SAM
TAM SOM
The Market
17
18
94%
companies are
concerned about the
security of corporate
data exposed via home-
based devices
74%
expect more use of BYOD,
and an increased need for
device authorization
40%
expect half of their
workforce will work
remotely at least twice a
week
Securing the Hybrid Workplace in 2022
*https://connect.teradici.com/security-report
Zero Trust Adoption Report, conducted by
Cybersecurity Insiders, found that 15 percent of
organizations have already enacted ZTNA
while more than half (59%) plan to
implement ZTNA over the course of the next
12 months
3/10
are protected against VPN
attacks which cybercriminals
are now taking advantage of
to impact business operations
19
Business Model
20
Disruptive, SaaS and Headless
NVIS
Security
Simplicity
Competitive Position
21
โ–ช Zero Trust / MFA
โ–ช Software Defined Perimeter
โ–ช Invisible to any outside attack
โ–ช Layer 2 Networking
โ–ช End-to-End Encryption
โ–ช Peer-to-Peer Architecture
โ–ช High Performance & Scalable
โ–ช Configure & Deploy in Seconds
โ–ช Private Static IPs over Internet
โ–ช Untraceable & Unblockable
โ–ช Multiplatform Support
โ–ช Enterprise Grade/SMB Priced
โ–ช No Tracking or Data Selling
โ–ช No Split Tunneling Required
โ–ช No Special OS Required
โ–ช No Special Hardware Required
โ–ช No Network Expertise Required
โ–ช No Security Expertise Required
Differentiators
22
Customer Acquisition Strategy
Launch Scale
-$5,000,000
$0
$5,000,000
$10,000,000
$15,000,000
$20,000,000
Year 1 Year 2 Year 3
Revenue Profit Expenses
Financial Projections
Revenue estimate in first 3 years after funding
KEY ANALYSIS
โ€ข $16M Revenue in
3yrs
โ€ข $7.7M Profit in 3yrs
โ€ข Positive Cash Flow in
6 months
โ€ข Break Even in
18 months
โ€ข Average Sale per B2B
Client $627 annually
โ€ข Enterprise up to
$600K each
23
To hit fast growth, we will allocate the money to:
Core development - 32%
Operational - 22%
Marketing & Sales - 39%
Legal and compliance - 7%
$2 Million
in Seed
Investment
The Ask
Break Even
Goal
18 months
SAFE note
$8 Million
Pre-Money
โ€ข Network equipment manufacturers (Cisco, Juniper)
โ€ข Cloud providers (AWS, Microsoft, Google, IBM)
โ€ข Security or VPN companies
โ€ข Banks (or interbank service providers)
โ€ข Platform tech companies (Google, Microsoft, etc.)
โ€ข Telco or utility companies (or inter-company communication providers)
โ€ข Facebook or other social media giant (with current emphasis on privacy)
Exit Strategy
24
Phil Smith
Founder | NVIS Inc.
phil@nvis.me
1.408.400.3256
Thank You 25
Slides
26
Backup
GO TO MARKET: USE OF FUNDS
โ€ข
Core Development 32%
โ€ข Product ready 3.5 Mo from T0
โ€ข Operational 22%
โ€ข Corporate, Legal & GA 7%
โ€ข Sales and Marketing 39%
Headcount EOY
T0 = 23 T1 = 69 T2 = 120
27
28
Roadmap
Monthly Annually**
Business Bundles #Nodes* (up to) $6/Node $5/Node
5-Pack 5 $ 30 300
10-Pack 10 $ 60 600
25-Pack 25 $ 150 1500
Enterprise Bundles $11/Node $10/Node
50-Pack 50 $ 550 6000
100-Pack 100 $ 1,100 12000
250-Pack 250 $ 2,750 30000
250+ Unlimited Custom Custom
* Node = Clients, Endpoints, Gateways
** Annually = 12 Month Pre-paid subscription
SaaS Subscription
29
Features, Security & Cost Comparison
30
Bundle NVIS TORguard OpenVPN Perimeter 81
Starter $25 $69 $41 $40
Standard $50 $110 $58 $80
Medium $100 $169 $117 $200
Enterprise $500 Custom $175 $400
Enterprise+ $1,000 Custom $233 $800
Enterprise++ $2,500 Custom $467 $2,000
**Subscription charges per client per month basis.
Traction
31
โ—ผ MVP test network over 1 year continuous operation
with invisible blockchain nodes intercommunicating
in Paris, Amsterdam, US, Canada, Tokyo and
Singapore.
โ—ผ Verified connections from Beijing, Moscow, Saudi
Arabia and other locations where Internet and VPNs
are censored or blocked
โ—ผ MOU with HowDoo.io, social media
โ—ผ MOU with FYRM, a penetration test and security
company to validate NVIS
โ—ผ Core technology tested by Miercom Labs. Ranked
most secure, invulnerable to attacks, where Ipsec
and SSL VPNs all fail.
Partners and Resources
32
Amazon Cisco HP
Vultr Hosting McAfee Upserve
CloudDNS
32
Legacy Customers
33
Lawrence Livermore
National Laboratory
U.S. Army Inspector
General School

More Related Content

What's hot

Brocade Executive Leadership Presentation - Lloyd Carney
Brocade Executive Leadership Presentation - Lloyd CarneyBrocade Executive Leadership Presentation - Lloyd Carney
Brocade Executive Leadership Presentation - Lloyd Carneyscoopnewsgroup
ย 
Cloudflare Partner Program 2020
Cloudflare Partner Program 2020Cloudflare Partner Program 2020
Cloudflare Partner Program 2020Dan Hollinger
ย 
Alpha & Omega Presentation
Alpha & Omega PresentationAlpha & Omega Presentation
Alpha & Omega PresentationDarryl Santa
ย 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security PresentationIdeba
ย 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Cloudflare
ย 
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechMT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechDell EMC World
ย 
Combining Man & Machine: A Glimpse into the Future - David Meyer
Combining Man & Machine:  A Glimpse into the Future - David MeyerCombining Man & Machine:  A Glimpse into the Future - David Meyer
Combining Man & Machine: A Glimpse into the Future - David Meyerscoopnewsgroup
ย 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityPriyanka Aash
ย 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Securitypatmisasi
ย 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddcCSA Argentina
ย 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
ย 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
ย 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
ย 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramNetIQ
ย 
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...Rea & Associates
ย 
Consultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresasConsultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresasFernando Misato
ย 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesIvanti
ย 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysisCarlo Dapino
ย 
BUSCAS UNA SEGURIDAD INTEGRADA Y DINรMICA? ; INTELIGENCIA Y COLABORACIร“N LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINรMICA?  ; INTELIGENCIA Y COLABORACIร“N LA ...BUSCAS UNA SEGURIDAD INTEGRADA Y DINรMICA?  ; INTELIGENCIA Y COLABORACIร“N LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINรMICA? ; INTELIGENCIA Y COLABORACIร“N LA ...Cristian Garcia G.
ย 

What's hot (20)

Brocade Executive Leadership Presentation - Lloyd Carney
Brocade Executive Leadership Presentation - Lloyd CarneyBrocade Executive Leadership Presentation - Lloyd Carney
Brocade Executive Leadership Presentation - Lloyd Carney
ย 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
ย 
Cloudflare Partner Program 2020
Cloudflare Partner Program 2020Cloudflare Partner Program 2020
Cloudflare Partner Program 2020
ย 
Alpha & Omega Presentation
Alpha & Omega PresentationAlpha & Omega Presentation
Alpha & Omega Presentation
ย 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
ย 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
ย 
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechMT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
ย 
Combining Man & Machine: A Glimpse into the Future - David Meyer
Combining Man & Machine:  A Glimpse into the Future - David MeyerCombining Man & Machine:  A Glimpse into the Future - David Meyer
Combining Man & Machine: A Glimpse into the Future - David Meyer
ย 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
ย 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
ย 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
ย 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
ย 
Security in the News
Security in the NewsSecurity in the News
Security in the News
ย 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
ย 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
ย 
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
ย 
Consultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresasConsultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresas
ย 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
ย 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysis
ย 
BUSCAS UNA SEGURIDAD INTEGRADA Y DINรMICA? ; INTELIGENCIA Y COLABORACIร“N LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINรMICA?  ; INTELIGENCIA Y COLABORACIร“N LA ...BUSCAS UNA SEGURIDAD INTEGRADA Y DINรMICA?  ; INTELIGENCIA Y COLABORACIร“N LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINรMICA? ; INTELIGENCIA Y COLABORACIร“N LA ...
ย 

Similar to NVIS-Pitch Deck version 6 - 2022 MAR.pdf

TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?SaraPia5
ย 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO
ย 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes WebinarThousandEyes
ย 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
ย 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
ย 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCCloudflare
ย 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitiveCisco Canada
ย 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudZscaler
ย 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSMAU
ย 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
ย 
Cryptographie avancรฉe et Logical Data Fabric : Accรฉlรฉrez le partage et la mig...
Cryptographie avancรฉe et Logical Data Fabric : Accรฉlรฉrez le partage et la mig...Cryptographie avancรฉe et Logical Data Fabric : Accรฉlรฉrez le partage et la mig...
Cryptographie avancรฉe et Logical Data Fabric : Accรฉlรฉrez le partage et la mig...Denodo
ย 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
ย 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
ย 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?michaelbasoah
ย 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarThousandEyes
ย 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
ย 
The evolving CIO|CISO relationship
The evolving CIO|CISO relationship  The evolving CIO|CISO relationship
The evolving CIO|CISO relationship Zscaler
ย 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsDevOps.com
ย 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Miriade Spa
ย 

Similar to NVIS-Pitch Deck version 6 - 2022 MAR.pdf (20)

TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
ย 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
ย 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
ย 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
ย 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
ย 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
ย 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitive
ย 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
ย 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
ย 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
ย 
Cryptographie avancรฉe et Logical Data Fabric : Accรฉlรฉrez le partage et la mig...
Cryptographie avancรฉe et Logical Data Fabric : Accรฉlรฉrez le partage et la mig...Cryptographie avancรฉe et Logical Data Fabric : Accรฉlรฉrez le partage et la mig...
Cryptographie avancรฉe et Logical Data Fabric : Accรฉlรฉrez le partage et la mig...
ย 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
ย 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
ย 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
ย 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
ย 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
ย 
The evolving CIO|CISO relationship
The evolving CIO|CISO relationship  The evolving CIO|CISO relationship
The evolving CIO|CISO relationship
ย 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
ย 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
ย 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
ย 

Recently uploaded

"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
ย 
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
ย 
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
ย 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
ย 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...SUHANI PANDEY
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
ย 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
ย 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
ย 
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...SUHANI PANDEY
ย 

Recently uploaded (20)

"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
ย 
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
ย 
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
ย 
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
ย 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
ย 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
ย 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
ย 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
ย 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
ย 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
ย 
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
ย 

NVIS-Pitch Deck version 6 - 2022 MAR.pdf

  • 1. NVIS We cloak your private network from vulnerabilities Invisible Internetโ„ข
  • 2. Preface Hackers can't hack what they can't see. Our invisibility cloak represents a whole new paradigm to infrastructure protection beyond Zero Trust by taking remote communications "off the grid" while preserving the existing infrastructure and development investments. NVIS is military-grade security built by the team that created a best-in-class unhackable solution approved for DoD-wide use and for Coalition forces. NVIS is revolutionary in the security and privacy space to benefit B2B or B2G greatly, especially in the global threat climate. 2
  • 3. 3 Connect to anyone in the world, securely without restrictions Un 3 NVIS Canโ€™t be โ€ข Hacked โ€ข Sniffed โ€ข Traced โ€ข Blocked โ€ข Censored Cost Effective: Take advantage of existing networks or public infrastructure
  • 4. Phil Smith Founder / CTO โ€ข Founder/creator and chief architect โ€ข Expertise in security, networking, ISP and blockchain. โ€ข Over 30 years in lead roles at NASA, HP, Cisco, Lawrence Livermore National Lab Marilyn Hernandez Co-Founder โ€ข Investor relations, Business Development. Sales and Marketing, Strategist. Researcher, Realtor, Counselor, โ€ข BA Administration of Justice Salman Rizvi CEO โ€“ (CMO/CRO) โ€ข 22+ years Leadership of Enterprise Transformation for the top Fortune 50-500 and organizations worldwide โ€ข Founded 2 companies โ€ข SaaS pipelines, CIO. EVP & Strategic Advisor SVP Sales & Marketing โ€ข 15+ years of experience in Sales, Marketing, Strategy โ€ข Founded 3 companies โ€ข 5 years of consulting for tech startups โ€ข Mentor for tech founders at Stanford and Skolkovo Jed Reitler Rob Langhorne CISO โ€ข Former CEO of CloudLogix, Cranite architect, Apple lead โ€ข Analytical, highly adaptable professional โ€ข Extensive experience leading ground-breaking development in mobile computing and security. Who We Are 4
  • 5. Dr. Taher Elgamal CTO / Security, Salesforce โ€ข Dr. Elgamal is world renown in the industry as the inventor of Secure Sockets Layer (SSL), a protocol developed by Netscape for transmitting private documents via the Internet. Dr. Elgamal also wrote the SSL patent and promoted SSL and has a lifetime achievement award from RSA. John Vigouroux Chief Entrepeneur & Innovation Officer, Averett University โ€ข CEO & Co-Founder at WeRAI โ€ข Former CEO Nex Cubed โ€ข CEO of Cranite Systems โ€ข CEO of M86 Security, (acquired by Trustwave) joined as an advisor. Partner Business Development, Verizon โ€ข Formerly Worldwide Sales and Business Development Leader Cisco Systems โ€ข Director Smart Grid Strategic Alliances, GE Digital Energy Manoj Bhatia Gregory F. Ryan President, Ryan Advisory Services โ€ข Providing Business Consulting โ€ข Management Consulting โ€ข Finance Consulting โ€ข Marketing Consulting โ€ข Pricing Strategy โ€ข Advertising โ€ข Project Management Our Advisors 5
  • 6. The Core Problem 6 VISIBILITY IS THE PROBLEM Internet is OPEN which meeans VULNERABLE BY DESIGN: โ— Geolocation โ— Routes are traceable โ— Lookup by name (DNS) โ— IP address is public โ— TCP ports well known / discoverable โ— Open Protocols yield Connectivity but NO SECURITY 6 Result: Global Cost of Cybercrime 10.5 Trillion dollars Annually* * Projected by CyberSecurity Ventures, 2021
  • 7. Single Point of Failure Slow Performance Lack Scalability High TCO Lack of Privacy Highly Vulnerable Problems 7
  • 8. Decentralized High Performance Infinite Scalability Easy to Deploy Encrypted End-to-End Invisible Solutions 8
  • 9. Innovation: Layer 2 Full Stack Security โ€ข A Software-Only Architecture โ€ข Layer2 Encryption โ€ข Layer 2 encrypts ALL traffic including source, destination and data payload so the full stack is secured. โ€ข Only software based Layer 2 product obtaining FIPS certification โ€ข No IP routing (hops) needed boosting performance by removing overhead and propagation delays. โ€ข Protects against the following โ€ข Access Point / MAC address spoofing โ€ข Dictionary attacks โ€ข Man-in-the-middle โ€ข DDOS attacks โ€ข ARP connection/redirection โ€ข Protocol hacks โ€“ ALL OF THEM # ISO/OSI Model Example 7 Application HTTP, FTP 6 Presentation SSL, TLS 5 Session NetBIOS, PPTP 4 Transport TCP, UDP 3 Network IP, ICMP 2 Data Link NVIS over Ethernet, WiFi, WiMAX, LTE 1 Physical Copper Wires, Optical Fibers, Air 9
  • 10. Innovation: Peer-to-Peer Path Invisibility Perimeter Path and Payload Encryption Turns This Into This 10
  • 11. 11 Innovation: Mirrored Segments Patent Pending: A Multiverse of Internets, 2019, A. Smith EFS ID 3483382 Virtual Private IPs behaves like Public IPs โ€“ no gateways or routing needed. Multiple overlays can segment networks by security context.
  • 12. Product Description โ—ผ 100% software agents โ€“ no hardware needed ** โ—ผ All major platforms for end-users โ—ผ AWS and Azure Cloud Supported โ—ผ Web Subscription and Billing System ** ARM router available for Kiosk. legacy systems or IoT connectivity Admin Web UI 12
  • 13. 1 2 3 Admin Web UI Build a network as easy as 1-2-3 TODO 13 One click auto provisioning
  • 14. System Level View - Zero Trust 14
  • 15. โ€œ VPN Hacks Are a Slow-Motion Disaster Hackers have had a field day with virtual private networks โ€” especially during the remote-work pandemic era. 15 The Market
  • 16. 1994 Foundation for VPN SSL & IPsec 2000 Corporations that have remote offices VPN for business 2019 $23Bn global market value VPN growth & market hacks 1996 Beginning of VPN technology PPTP 2010 Start of wider adoption VPN popularity 2020 Remote Work revolution COVID Why Now โ€“ Existing Security is Flawed 16
  • 17. Remote Access VPN, Intranet VPN, Extranet VPN, Others, Application: Personal VPN Users, Corporate VPN Users North America Site-to- Site, Remote Access Business Market Market size was valued at USD 8.41 Billion in 2020 and is projected to reach USD 37.23 Billion by 2028, growing at a CAGR of 35.25 % Service Addressable Market Total Addressable Market Service Obtainable Market $8B $4B $1B SAM TAM SOM The Market 17
  • 18. 18 94% companies are concerned about the security of corporate data exposed via home- based devices 74% expect more use of BYOD, and an increased need for device authorization 40% expect half of their workforce will work remotely at least twice a week Securing the Hybrid Workplace in 2022 *https://connect.teradici.com/security-report Zero Trust Adoption Report, conducted by Cybersecurity Insiders, found that 15 percent of organizations have already enacted ZTNA while more than half (59%) plan to implement ZTNA over the course of the next 12 months 3/10 are protected against VPN attacks which cybercriminals are now taking advantage of to impact business operations
  • 21. NVIS Security Simplicity Competitive Position 21 โ–ช Zero Trust / MFA โ–ช Software Defined Perimeter โ–ช Invisible to any outside attack โ–ช Layer 2 Networking โ–ช End-to-End Encryption โ–ช Peer-to-Peer Architecture โ–ช High Performance & Scalable โ–ช Configure & Deploy in Seconds โ–ช Private Static IPs over Internet โ–ช Untraceable & Unblockable โ–ช Multiplatform Support โ–ช Enterprise Grade/SMB Priced โ–ช No Tracking or Data Selling โ–ช No Split Tunneling Required โ–ช No Special OS Required โ–ช No Special Hardware Required โ–ช No Network Expertise Required โ–ช No Security Expertise Required Differentiators
  • 23. -$5,000,000 $0 $5,000,000 $10,000,000 $15,000,000 $20,000,000 Year 1 Year 2 Year 3 Revenue Profit Expenses Financial Projections Revenue estimate in first 3 years after funding KEY ANALYSIS โ€ข $16M Revenue in 3yrs โ€ข $7.7M Profit in 3yrs โ€ข Positive Cash Flow in 6 months โ€ข Break Even in 18 months โ€ข Average Sale per B2B Client $627 annually โ€ข Enterprise up to $600K each 23
  • 24. To hit fast growth, we will allocate the money to: Core development - 32% Operational - 22% Marketing & Sales - 39% Legal and compliance - 7% $2 Million in Seed Investment The Ask Break Even Goal 18 months SAFE note $8 Million Pre-Money โ€ข Network equipment manufacturers (Cisco, Juniper) โ€ข Cloud providers (AWS, Microsoft, Google, IBM) โ€ข Security or VPN companies โ€ข Banks (or interbank service providers) โ€ข Platform tech companies (Google, Microsoft, etc.) โ€ข Telco or utility companies (or inter-company communication providers) โ€ข Facebook or other social media giant (with current emphasis on privacy) Exit Strategy 24
  • 25. Phil Smith Founder | NVIS Inc. phil@nvis.me 1.408.400.3256 Thank You 25
  • 27. GO TO MARKET: USE OF FUNDS โ€ข Core Development 32% โ€ข Product ready 3.5 Mo from T0 โ€ข Operational 22% โ€ข Corporate, Legal & GA 7% โ€ข Sales and Marketing 39% Headcount EOY T0 = 23 T1 = 69 T2 = 120 27
  • 29. Monthly Annually** Business Bundles #Nodes* (up to) $6/Node $5/Node 5-Pack 5 $ 30 300 10-Pack 10 $ 60 600 25-Pack 25 $ 150 1500 Enterprise Bundles $11/Node $10/Node 50-Pack 50 $ 550 6000 100-Pack 100 $ 1,100 12000 250-Pack 250 $ 2,750 30000 250+ Unlimited Custom Custom * Node = Clients, Endpoints, Gateways ** Annually = 12 Month Pre-paid subscription SaaS Subscription 29
  • 30. Features, Security & Cost Comparison 30 Bundle NVIS TORguard OpenVPN Perimeter 81 Starter $25 $69 $41 $40 Standard $50 $110 $58 $80 Medium $100 $169 $117 $200 Enterprise $500 Custom $175 $400 Enterprise+ $1,000 Custom $233 $800 Enterprise++ $2,500 Custom $467 $2,000 **Subscription charges per client per month basis.
  • 31. Traction 31 โ—ผ MVP test network over 1 year continuous operation with invisible blockchain nodes intercommunicating in Paris, Amsterdam, US, Canada, Tokyo and Singapore. โ—ผ Verified connections from Beijing, Moscow, Saudi Arabia and other locations where Internet and VPNs are censored or blocked โ—ผ MOU with HowDoo.io, social media โ—ผ MOU with FYRM, a penetration test and security company to validate NVIS โ—ผ Core technology tested by Miercom Labs. Ranked most secure, invulnerable to attacks, where Ipsec and SSL VPNs all fail.
  • 32. Partners and Resources 32 Amazon Cisco HP Vultr Hosting McAfee Upserve CloudDNS 32
  • 33. Legacy Customers 33 Lawrence Livermore National Laboratory U.S. Army Inspector General School