SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
JCJ Business
JCJ
Proprietary & Confidential
Corporate Overview
• JCJ provides solutions to governments,
service provider sand enterprises seeking to achieve
full control of Skype within their networks.
• JCJ was founded in April, 2010.
– Offices located in the U.S and Canada
– $800K initial angel investment
– Headcount – 8 employees and contractors
• JCJ solutions protected by patents:
– Skype detection and blocking
– Skype traffic analysis
– Skype Legal Intercept
– Defensive capabilities that protect customer networks and assets from Skype based attacks and
exploits
– Offensive capabilities based on Skype infrastructure
– Intelligence collection using Skype infrastructure
• Only available from JCJ
• Deployed within US government and overseas in telecom infrastructure supporting 30+
million people
2
What is Skype?
Network of 800 million users and 30% of global telco traffic
3
SuperNode
SuperNode
SuperNode
Relay
RelayRelay
Vulnerabilities to Networks
• P2P - Decentralized & distributed
• Bypasses firewalls, IPS and NAT
• Unmanageable
• Untraceable
• Undetectable
• Exposes organizations to significant risk
Benefits to Skype User
• Highly secure proprietary encrypted signalling
• Highly secure proprietary encrypted media (voice,
video, IM, files)
• Extremely cost effective
• Best in class obfuscation and anti-debugging
protection
Client
Client
Skype Global Market
• 800+ million registered users, 45 million concurrent users on-line
• Strong move to wireless space via smartphones.
• Moving to consumer products such as TV sets.
• Tight integration with Microsoft products
• Integration with Facebook (1 billion users).
• Corporate security managers see Skype as a potential threat.
• Skype for iPhone and Android represent a threat to telecoms
4
Challenges of Skype
• Security and Compliance
– Enables untraceable transfer of information from/to enterprises using Skype
file transfer, IM, voice and video channels (source code, client information,
trade secrets, etc.)
• Telco's revenues
– Skype heavily impacting voice revenue due to usage of data components of
the calling plans
• Network enumeration and reconnaissance
– Allows to obtain external/internal IP addresses of devices behind firewalls/NAT
– Enhances attacker ability to perform targeted attacks on targets
• Cyber attacks
– Ideal platform for launching sophisticated attacks (bypasses security
infrastructure)
• Legal Intercept
– Fully encrypted communication
• Network Resources
– Unauthorized utilization of computing and network resources
– Skype video calls can reach a peak at 500 kbit/s per user, taxing the
enterprise infrastructure
5
JCJ Value Proposition
• Manage and control unwanted/unauthorized communications within, as well as, to and
from the network through visibility to Skype.
• Provide Skype reporting, tracking, and historical communications records for applications
like Skype, across the network, ensuring compliance with internal security practices and
industry requirements.
• Provides Skype blocking capabilities in conjunction with 3rd party firewalls,
IPS, etc.
• Enables telcos to control and manage Skype traffic
• Provides Skype Legal Intercept (LI) capabilities
• Enable the organizations to rapidly respond to, and defend against,
Skype born cyber attacks.
• Enables implementation of unique offensive capabilities based on
Skype infrastructure
• Reclaim enterprise assets and reduce expenses associated with them by managing
resources hijacked by Skype applications
JCJ Products and Solutions
7
• Detection Engine™ provides 100% reliable detection of Skype
traffic:
• Collection of information about Skype users, calls, sessions and other
information related Skype usage
• Very high performance (proven in production) - 10 and 20 Gbit/s
• Network connectivity – in-line or network tap
• Provides Skype blocking capabilities in conjunction with 3rd party
firewalls, IPS, etc.
• Implementation – Stand-alone product or OEM
• Analytical Engine™ works in concert with Detection Engines and
provides:
• Skype usage statistics reports
• maps of Skype network providing comprehensive view of
infrastructure, clients, relays and other resources used by Skype
• Centralized management for Detection Engines infrastructure
JCJ Products and Solutions
8
• Skype LI™ uses the infrastructure provided by Detection
Engine™ and Analytical Engine to collect content of the
communication carried over Skype voice, video and IM
channels.
• Skype DLP™ provides protection against data leakage
utilizing Skype infrastructure.
• Specialized capabilities available to government customers
JCJ Technology Stack
JCJ Products Roadmap
10
 Enhancements to Existing Solutions and Products:
 10Gbit/sec Skype media type identification
 Skype conferencing and call out handling
 Support for Skype/Facebook
 Integration with firewalls using OpenFlow
 GUI enhancements
 New Product Functionality
 RipTide Data Leakage Protection
 Expanded support for mobile devices
 Enhanced LI
 Skype Blocking Solutions
JCJ Customers
11
• Oversea Service Provider
 Skype Legal Intercept Solution
 30+ million people
 24x10 Gbit/s pipes
 14 Detection Engines
 1 Analytical Engine
 LI module
 Several more deployment expected next year
• US Government Agency
 Specialized capabilities
Potential License Sales Revenue
12
• Average large deal size (24x10 Gbit/s pipes)
 Software/Appliances - $4,175,000
 Implementation – $20,000
 Average Sale – $4,195,000
 Support @20%/year - $835,000
• Average medium deal size (8x10 Gbit/s pipes)
 Software/Appliances - $1,925,000
 Implementation – $10,000
 Average Sale – $1,925,000
 Support @20%/year - $385,000
• Average small size deal (1x10 Gbit/s pipe)
 Software/Appliances - $1,250,000
 Implementation – $10,000
 Average Sale – $1,260,000
 Support @20%/year - $252,000
Market Analysis
13
• Market segments:
• Government agencies globally
• Service Providers globally
• Enterprises North America and Europe
• Market Segment – JCJ Solutions
• Government agencies globally – Skype LI, special cyber capabilities
• Service Providers - Skype detection and management
• Enterprises – Skype detection and management including Data Leakage Protection (DLP)
• Market Segments – TAM, 2013
• Governments - 90 countries ~ $400M
• Service Providers – top 100 ~ $200M
• Fortune 500 and Europe 500 - ~ $100M
• TAM - ~$700M
• Market share targets:
• 2013 – 1% of the total market
• 2014 – 4% of the total market
• 2015 - 8% of the total market
Government
Service Providers
Fortune 500 and Europe
500
Competition
14
Existing solutions use statistical and behavioral analysis
to identify and/or block Skype:
 High false/positive
 Outdated
 No Skype control, statistics, content, etc.
 No LI capabilities
No Direct Competition – Technology Is Only Available From JCJ
JCJ IP
15
• Complete, in-depth knowledge of Skype protocols,
applications and network topology built over the
last 3 years
• Products and Solutions
• Research team
• Two non-provisional patents pending (09/2011) –
 “Method and Detection System for Detecting Encrypted Peer-to-peer (EP2P) Sessions Associated With a
Particular EP2P Network”
 “Method and Discovery System for Discovering Encrypted Peer-to-peer (EP2P) Nodes Associated With a
Particular EP2P Network”
• Two provisional patents –
 “Systems And Methods For Implementing Lawful Interception On Encrypted and/or Obfuscated P2P
Communication Network”
 “Systems and Methods for Preventing And Blocking Network Security Attacks Executed Through Encrypted
and/or Obfuscated P2P Communication Networks”

Mais conteúdo relacionado

Mais procurados

Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
mashiur
 

Mais procurados (20)

Tech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentationTech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentation
 
Forti wifi
Forti wifiForti wifi
Forti wifi
 
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
 
Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...
Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...
Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...
 
PhNOG Regional Conference 2018: Strengthening Internet infrastructure in the ...
PhNOG Regional Conference 2018: Strengthening Internet infrastructure in the ...PhNOG Regional Conference 2018: Strengthening Internet infrastructure in the ...
PhNOG Regional Conference 2018: Strengthening Internet infrastructure in the ...
 
Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24
 
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRTMMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
 
PacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities Update
PacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities UpdatePacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities Update
PacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities Update
 
Vertu's Digital Transformation
Vertu's Digital TransformationVertu's Digital Transformation
Vertu's Digital Transformation
 
APNIC Update, NPNOG 0.5
APNIC Update, NPNOG 0.5APNIC Update, NPNOG 0.5
APNIC Update, NPNOG 0.5
 
IANA Transition Update, August 2016
IANA Transition Update, August 2016IANA Transition Update, August 2016
IANA Transition Update, August 2016
 
IANA: Who, What, Why?
IANA: Who, What, Why?IANA: Who, What, Why?
IANA: Who, What, Why?
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOG
 
Drilling down into networks from the APNIC data
Drilling down into networks from the APNIC dataDrilling down into networks from the APNIC data
Drilling down into networks from the APNIC data
 
A Secure & Reliable Wi-Fi Experience at The Federal Court of Malaysia
A Secure & Reliable Wi-Fi Experience at The Federal Court of MalaysiaA Secure & Reliable Wi-Fi Experience at The Federal Court of Malaysia
A Secure & Reliable Wi-Fi Experience at The Federal Court of Malaysia
 
UN INCB: RIRs and LEAs
UN INCB: RIRs and LEAsUN INCB: RIRs and LEAs
UN INCB: RIRs and LEAs
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
 
Whois - Addressing the Asia Pacifc
Whois - Addressing the Asia PacifcWhois - Addressing the Asia Pacifc
Whois - Addressing the Asia Pacifc
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
How APNIC can support law enforcement agencies in cybercrime investigtaion
How APNIC can support law enforcement agencies in cybercrime investigtaionHow APNIC can support law enforcement agencies in cybercrime investigtaion
How APNIC can support law enforcement agencies in cybercrime investigtaion
 

Semelhante a Jcj corporate blind overview november 19 2012 1-1

EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
ERPScan
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
Anton Lishchuk
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
chris odle
 
CIC _ 2.0 ver 1.06-AI
CIC _ 2.0 ver 1.06-AICIC _ 2.0 ver 1.06-AI
CIC _ 2.0 ver 1.06-AI
Ahmed Ismail
 

Semelhante a Jcj corporate blind overview november 19 2012 1-1 (20)

Decision group company_profile_2017
Decision group company_profile_2017Decision group company_profile_2017
Decision group company_profile_2017
 
Pc tech pitch deck
Pc tech pitch deckPc tech pitch deck
Pc tech pitch deck
 
Ether2 "The Net...fixed" (or "how to close the digital divide")
Ether2 "The Net...fixed" (or "how to close the digital divide")Ether2 "The Net...fixed" (or "how to close the digital divide")
Ether2 "The Net...fixed" (or "how to close the digital divide")
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
IT and OT Convergence
IT and OT ConvergenceIT and OT Convergence
IT and OT Convergence
 
CambridgeIP: Marketing Your Technology in the Credit Crunch
CambridgeIP: Marketing Your Technology in the Credit CrunchCambridgeIP: Marketing Your Technology in the Credit Crunch
CambridgeIP: Marketing Your Technology in the Credit Crunch
 
PCTech Pitch Deck
PCTech Pitch DeckPCTech Pitch Deck
PCTech Pitch Deck
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
SIPfoundry CoLab 2013 - Specific customer case studies for sipXecs and ROI an...
SIPfoundry CoLab 2013 - Specific customer case studies for sipXecs and ROI an...SIPfoundry CoLab 2013 - Specific customer case studies for sipXecs and ROI an...
SIPfoundry CoLab 2013 - Specific customer case studies for sipXecs and ROI an...
 
IOT_module_3.pdf
IOT_module_3.pdfIOT_module_3.pdf
IOT_module_3.pdf
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Telecom italia oss transformation roadmap marco daccò venice 2010
Telecom italia  oss transformation roadmap   marco daccò venice 2010Telecom italia  oss transformation roadmap   marco daccò venice 2010
Telecom italia oss transformation roadmap marco daccò venice 2010
 
CIC _ 2.0 ver 1.06-AI
CIC _ 2.0 ver 1.06-AICIC _ 2.0 ver 1.06-AI
CIC _ 2.0 ver 1.06-AI
 
Skylads - Big Data for Telcos
Skylads - Big Data for TelcosSkylads - Big Data for Telcos
Skylads - Big Data for Telcos
 
Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
EasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng OeiEasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng Oei
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Jcj corporate blind overview november 19 2012 1-1

  • 2. Corporate Overview • JCJ provides solutions to governments, service provider sand enterprises seeking to achieve full control of Skype within their networks. • JCJ was founded in April, 2010. – Offices located in the U.S and Canada – $800K initial angel investment – Headcount – 8 employees and contractors • JCJ solutions protected by patents: – Skype detection and blocking – Skype traffic analysis – Skype Legal Intercept – Defensive capabilities that protect customer networks and assets from Skype based attacks and exploits – Offensive capabilities based on Skype infrastructure – Intelligence collection using Skype infrastructure • Only available from JCJ • Deployed within US government and overseas in telecom infrastructure supporting 30+ million people 2
  • 3. What is Skype? Network of 800 million users and 30% of global telco traffic 3 SuperNode SuperNode SuperNode Relay RelayRelay Vulnerabilities to Networks • P2P - Decentralized & distributed • Bypasses firewalls, IPS and NAT • Unmanageable • Untraceable • Undetectable • Exposes organizations to significant risk Benefits to Skype User • Highly secure proprietary encrypted signalling • Highly secure proprietary encrypted media (voice, video, IM, files) • Extremely cost effective • Best in class obfuscation and anti-debugging protection Client Client
  • 4. Skype Global Market • 800+ million registered users, 45 million concurrent users on-line • Strong move to wireless space via smartphones. • Moving to consumer products such as TV sets. • Tight integration with Microsoft products • Integration with Facebook (1 billion users). • Corporate security managers see Skype as a potential threat. • Skype for iPhone and Android represent a threat to telecoms 4
  • 5. Challenges of Skype • Security and Compliance – Enables untraceable transfer of information from/to enterprises using Skype file transfer, IM, voice and video channels (source code, client information, trade secrets, etc.) • Telco's revenues – Skype heavily impacting voice revenue due to usage of data components of the calling plans • Network enumeration and reconnaissance – Allows to obtain external/internal IP addresses of devices behind firewalls/NAT – Enhances attacker ability to perform targeted attacks on targets • Cyber attacks – Ideal platform for launching sophisticated attacks (bypasses security infrastructure) • Legal Intercept – Fully encrypted communication • Network Resources – Unauthorized utilization of computing and network resources – Skype video calls can reach a peak at 500 kbit/s per user, taxing the enterprise infrastructure 5
  • 6. JCJ Value Proposition • Manage and control unwanted/unauthorized communications within, as well as, to and from the network through visibility to Skype. • Provide Skype reporting, tracking, and historical communications records for applications like Skype, across the network, ensuring compliance with internal security practices and industry requirements. • Provides Skype blocking capabilities in conjunction with 3rd party firewalls, IPS, etc. • Enables telcos to control and manage Skype traffic • Provides Skype Legal Intercept (LI) capabilities • Enable the organizations to rapidly respond to, and defend against, Skype born cyber attacks. • Enables implementation of unique offensive capabilities based on Skype infrastructure • Reclaim enterprise assets and reduce expenses associated with them by managing resources hijacked by Skype applications
  • 7. JCJ Products and Solutions 7 • Detection Engine™ provides 100% reliable detection of Skype traffic: • Collection of information about Skype users, calls, sessions and other information related Skype usage • Very high performance (proven in production) - 10 and 20 Gbit/s • Network connectivity – in-line or network tap • Provides Skype blocking capabilities in conjunction with 3rd party firewalls, IPS, etc. • Implementation – Stand-alone product or OEM • Analytical Engine™ works in concert with Detection Engines and provides: • Skype usage statistics reports • maps of Skype network providing comprehensive view of infrastructure, clients, relays and other resources used by Skype • Centralized management for Detection Engines infrastructure
  • 8. JCJ Products and Solutions 8 • Skype LI™ uses the infrastructure provided by Detection Engine™ and Analytical Engine to collect content of the communication carried over Skype voice, video and IM channels. • Skype DLP™ provides protection against data leakage utilizing Skype infrastructure. • Specialized capabilities available to government customers
  • 10. JCJ Products Roadmap 10  Enhancements to Existing Solutions and Products:  10Gbit/sec Skype media type identification  Skype conferencing and call out handling  Support for Skype/Facebook  Integration with firewalls using OpenFlow  GUI enhancements  New Product Functionality  RipTide Data Leakage Protection  Expanded support for mobile devices  Enhanced LI  Skype Blocking Solutions
  • 11. JCJ Customers 11 • Oversea Service Provider  Skype Legal Intercept Solution  30+ million people  24x10 Gbit/s pipes  14 Detection Engines  1 Analytical Engine  LI module  Several more deployment expected next year • US Government Agency  Specialized capabilities
  • 12. Potential License Sales Revenue 12 • Average large deal size (24x10 Gbit/s pipes)  Software/Appliances - $4,175,000  Implementation – $20,000  Average Sale – $4,195,000  Support @20%/year - $835,000 • Average medium deal size (8x10 Gbit/s pipes)  Software/Appliances - $1,925,000  Implementation – $10,000  Average Sale – $1,925,000  Support @20%/year - $385,000 • Average small size deal (1x10 Gbit/s pipe)  Software/Appliances - $1,250,000  Implementation – $10,000  Average Sale – $1,260,000  Support @20%/year - $252,000
  • 13. Market Analysis 13 • Market segments: • Government agencies globally • Service Providers globally • Enterprises North America and Europe • Market Segment – JCJ Solutions • Government agencies globally – Skype LI, special cyber capabilities • Service Providers - Skype detection and management • Enterprises – Skype detection and management including Data Leakage Protection (DLP) • Market Segments – TAM, 2013 • Governments - 90 countries ~ $400M • Service Providers – top 100 ~ $200M • Fortune 500 and Europe 500 - ~ $100M • TAM - ~$700M • Market share targets: • 2013 – 1% of the total market • 2014 – 4% of the total market • 2015 - 8% of the total market Government Service Providers Fortune 500 and Europe 500
  • 14. Competition 14 Existing solutions use statistical and behavioral analysis to identify and/or block Skype:  High false/positive  Outdated  No Skype control, statistics, content, etc.  No LI capabilities No Direct Competition – Technology Is Only Available From JCJ
  • 15. JCJ IP 15 • Complete, in-depth knowledge of Skype protocols, applications and network topology built over the last 3 years • Products and Solutions • Research team • Two non-provisional patents pending (09/2011) –  “Method and Detection System for Detecting Encrypted Peer-to-peer (EP2P) Sessions Associated With a Particular EP2P Network”  “Method and Discovery System for Discovering Encrypted Peer-to-peer (EP2P) Nodes Associated With a Particular EP2P Network” • Two provisional patents –  “Systems And Methods For Implementing Lawful Interception On Encrypted and/or Obfuscated P2P Communication Network”  “Systems and Methods for Preventing And Blocking Network Security Attacks Executed Through Encrypted and/or Obfuscated P2P Communication Networks”