SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
SIX: WIHN
March 2017
DISCLAIMER
This communication expressly or implicitly contains certain forward-looking statements concerning WISeKey
International Holding Ltd and its business. Such statements involve certain known and unknown risks, uncertainties
and other factors, which could cause the actual results, financial condition, performance or achievements of
WISeKey International Holding Ltd to be materially different from any future results, performance or achievements
expressed or implied by such forward-looking statements. WISeKey International Holding Ltd is providing this
communication as of this date and does not undertake to update any forward-looking statements contained herein
as a result of new information, future events or otherwise.
This press release does not constitute an offer to sell, or a solicitation of an offer to buy, any securities, and it does
not constitute an offering prospectus within the meaning of article 652a or article 1156 of the Swiss Code of
Obligations or a listing prospectus within the meaning of the listing rules of the SIX Swiss Exchange. Investors must
rely on their own evaluation of WISeKey and its securities, including the merits and risks involved. Nothing
contained herein is, or shall be relied on as, a promise or representation as to the future performance of WISeKey.
2
 Scalable Security
• As Customers need « some » security, sometimes difficult to specify, WISeKey proposes 3 levels of security to match
different needs, with easy migration:
i. Digital Certificate directly implemented in the IoT device,
ii. Digital Security protected through WISeKey’s software,
iii. Digital Certificate protected through hardware (VaultIC)
• Need and push for highest security as hackers always attack at the weakest entry point (e.g. DDoS attacks)
 Enhanced Security
• End-to-end solution eliminates potential security risks/ holes that are inevitably generated during integration of
various and new technologies
• Use of state of the art tamper resistant component to secure assets in IoT devices
• WISeKey’s solution is based on market standards – not a proprietary or exotic solution that does
not withstand governmental regulations
 Easy Integration of security into IoT platform and in IoT devices
• Certificate management and Certificate authority solutions can be hosted by WISeKey or at
customer premises
 Device life cycle management
• PKI and CMS allow to manage IoT devices securely even if the device is located in a non-secure
environment
• IoT device configuration and software upgrade are the most important part in the CMS cycle as
these should not be managed by third party providers
 Cost effective solution
• No margin stacking from different vendors thanks to end-to-end solution
 Long life time solid partner
• Swiss neutrality and privacy laws allow operations without geo-political or governmental constraints to ensure sovereignty and independency
• WISeKey is the trusted operator of the OISTE Global Root, the only root outside of NATO countries making the RoT operational without using any WISeKey
software
• Provides unique PKI cryptography suitable for large-scale enterprises
WISeKey’s “Chip-to-Cloud” solutions addresses directly system integrators, a efficient way to address the market versus addressing device makers
WISEKEY PROVIDES A UNIQUE CYBERSECURITY PROPOSITION
3
 Cybersecurity company offering digital security by deploying large
scale Internet of Things (“IoT”) digital identity ecosystems
 Authenticates and secures devices, websites, people, and documents
for enterprises and government agencies
 Technology allows to connect People-to-Machines and Machine-to-
Machines, creating new opportunities to:
 Improve peoples life, existing businesses and processes in
general
 Optimize processes, resources and end-user experience
 Reduce risk toward end-users and businesses
 Companies and customers can realize value if they can certify that
they are receiving authenticated and secure device data
Vision Company Overview
WORLD’S ONLY IOT PLAYER OFFERING AN END-TO-END CYBERSECURITY PLATFORM
Business Model – Secure communication between Devices Clients
4
THREAT LANDSCAPE OF CYBERSECURITY IS MORE CHALLENGING THAN EVER
Consumers need reassurance
they are safe online
Targeted attacks on the rise Data is the new perimeter
Organizations do not have
enough time or resources
PRIVACY PRODUCTIVITYTHEFT SAFETY
Control
garage
door
locking
Fraud
Paymen
t
Hacking
Unlock
remotely
Spying
Infotainment
system
Malware attacked
Pacemaker
malfunction
Activate
alarm sensor
Shut down
factory
Attacks
(Motivations: Political, Monetary, Terrorism…)
Steal
Company
know-how
Reduce
energy
supply
Stop alarm
sensor
Turn off engine
Private
Health
data
5
Motivators Impact
THE MAIN ACTORS OF THE THREAT LANDSCAPE
Threat vectors
Governments
Cyber criminals
Cyber terrorists
Hacktivists
 Global competition
 National security
 Fraud
 Illicit profit
 Fraud
 Identity theft
 Political
 Ideological
 Disenfranchised
 Malicious havoc
 Political cause
 Ideological
 Targeted, long-term cyber
campaigns
 Insider
 Third party services provider
 Individual identity theft
 Data breaches and intellectual
property theft
 Third party services provider
 Target organizations
 Insider
 Third party services provider
 Loss of IP
 Infrastructure attacks
 Monetary loss
 Regulatory
 Loss of identity/ IP
 Infrastructure attacks
 Privacy
 Regulatory
 Loss of IP
 Infrastructure attacks
 Monetary loss
 Regulatory
 Disruptions of operations
 Public relations
 Regulatory
 Monetary loss
Linesareblurrybetweendifferentthreats
 Opportunistic vulnerabilities
 Insider
 Third party services provider
6
THE WISEKEY TEAM – ESTABLISHED AND HIGHLY QUALIFIED
Board of Directors
Juan Hernandez Zavas
 Member of the Board
 Audit Committee, Strategy
Committee
Carlos Creus Moreira
 Chairman of the Board
 Strategy Committee
Philippe Doubre
 Member of the Board
 Nomination and
Compensation Committee
Peter Ward
 Member of the Board
 Strategy Committee
Dr. Franz Humer
 Vice-Chairman of the Board
 Strategy, Nomination and
Compensation Committee
Maryla Shingler Bobbio
 Member of the Board
 Audit Committee,
Nomination and
Compensation Committee
Thomas J. Egger
 Member of the Board
 Audit Committee
Dourgam Kummer
 Member of the Board
 Nomination and
Compensation Committee
Management Team
Bernand Vian
Semiconductor General Manager
 More than 25 years of experience in the
Secure Semiconductor Industry
 Started his career at Gemplus with
multiple positions in sales and marketing,
and opened Gemplus’ San Francisco office
 Joined INSIDE Contactless in 2002, and
positioned INSIDE as a leader of NFC
payment chip supplier in the US
Carlos Moreira
Chief Executive Officer
 Recognized early stage pioneer in the field
of digital identity
 Adjunct Professor of the Graduate School
of (RMIT) from 1995 to 1999
 Head of the Trade Efficiency Lab at the
Graduate School of Engineering at RMIT
 Founded the Geneva-based online data
security firm WISeKey SA in 1999
Peter Ward
Chief Financial Officer
 Chartered management accountant
 Significant international experience in the
IT, FMCG, medical equipment, plastics and
Biotech industries
 Joined WISeKey SA in 2008 as finance
director and has been Chief Financial
Officer and a member of the Board since
2012
7
WISEKEY ON ITS TRANSFORMATION PATH
2003:
First ever binding
Internet vote in the
Canton of Geneva using
biometric enabled public
key infrastructure
2006:
Launch of CertifyID
product for digital
certification and identity
management
2008:
Citizen Services Platform in
partnership with Microsoft
for confirming citizen
access to government
services and validity of
citizen electronic
2011:
WISeID and WISfans
mobile products for
securing social media
applications and for
effective data protection
1999:
Incorporation of WISeKey
SA by Carlos Moreira
2005:
WISeKey to provide
Security products for
computers and digital
video broadcasting
2007:
Secure registration and
access control of online
offerings,
dematerialization and
secure electronic
document
dematerialization
2010:
WISeID and WISfans
mobile products for
securing social media
applications and for
effective data protection
2016:
WISeKey International
Holding listed on the
SIX Swiss Exchange
2016:
Integration of INSIDE
secure VAULT IC and
Incorporation of
WISeKey SAARC, a JV
between Indian
Potash Limited and
WISeKey
2017:
Envisaged
acquisition of
QuoVadis to enable
further growth in
the B2B sector
2014:
WISeAuthentic for the
security of luxury goods,
artwork,
pharmaceuticals, spare
parts and VIP social
networking
8
HOLISTIC APPROACH AMONG COMPETITORS
Company Description
Independent
Trust Model
SSL for
Web
Personal
Identities1
Corporate
Solutions
IoT
Strategy2
Mobile
Strategy
WISeKey
Provides secure digital identity for people,
objects and social content. Focus on added value
and mobile strategy
√ √ √ √ √ √
Entrust
(now Datacard)
First company to provide PKI corporate solutions.
Lack of strong orientation to open environments
prevented growth
X √ √ √ X √3
RSA
(now EMC2)
Former leader in PKI technologies, based its
control of the market on patents, not longer
required
X X X √ X X
CyberTrust
(now Verizon)
Heritage of the “Internet bubble”, this company
derives of a holding created by the Irish company
Baltimore Technologies
X √ X √ √3 X
IdenTrust
(now HiD
Global)
Founded by financial institutions such as
Citigroup, ABN AMRO and others, was a first
attempt for a PKI hierarchy for banks
X X X √ X X
Verisign
(now Symantec)
PKI branch of Symantec. Leader on SSL
certificates4. Absorbed several companies in the
sector during the last years
X √ √ √ √ X
(1) Referring to high assurance, qualified certificates
(2) Internet of Things, certificates for objects
(3) Partial solution, only for device/object management
(4) SSL business is threatened by the new Mozilla’s initiative to provide these certificates for free. This endangers companies depending on this product
9
 WISeKey is the only European company to secure its Root of
Trust and not selling it since its inception
 WISeKey created the OISTE Foundation to control the Root
Certification Authority and the Trust Model
 WISeKey is the trusted operator of the OISTE Global Root
 OISTE provides Common Root for Certification Authorities
worldwide that want to adhere to the OISTE Trust Model
 Swiss Neutrality, Security, and privacy laws allow operation
without geo-political or governmental constraints
Swiss Root Key ensuring political neutrality WISeKey‘s OISTE Foundation
 The authentication service is based on public-
key cryptography
 Technology has been used for more than 20
years and is guaranteed by NSA
 Certificates Issued under a Swiss RoT owned
by a Non Profit Foundation named OISTE
NON US CRYPTOGRAPHIC ROOTKEY ENSURING GEOPOLITICAL ADVANTAGE
WK
Global
Root
WK
IoT Root
Partner
Root
Partner
General
SubCA
Partner
IoT
SubCA
ProtectionTransactionValueadded
 Integrated with identification &
authentication techniques
 Point of sale using a portable application on
smartphones or tablets
 Trusted Ecosystem entirely reliable
 Digital Vault App
 Cloud Services
 Secure Services
 Owners Exclusive Club
 Payment services
10
PRIORITIZING THE INTERNET OF THINGS
11
WORLDWIDE CYBERSECURITY FACTS AND SPENDINGS
USD 1bn was
stolen in 2 years
from 100 banks in 30
countries through
SOCIAL
ENGINEERING
59% of
employees
Steal proprietary
corporate data when
they quit or are fired
MyDoom
USD 38.5bn
The most expensive
computer virus of all
time
Hacktivism
is the main
motivation that
drives cyber attacks
USD 400bn
Cost of cyber attacks
to businesses -
(direct damage, plus
disruptions)
53% Board
of Directors
of Swiss companies see
cybersecurity as a
technical issue
Social
engineering
Cyber criminals
favorite way to
manipulate victims
176%
Increase in the
number of
cyber attacks
with an
average of 138
successful
attacks per
week
68% of
funds
lost as a result
of a cyber
attack were
declared
unrecoverable
Iranian hackers infiltrated the
computer systems of various
government related organizations
in the UAE – (Dez-14)
157,000 customers had personal
details stolen, including 15,600
bank account numbers – (Oct-15)
Hackers broke into Sony’s network
and exposed 47,000 corporate
documents, including private,
internal emails – (Nov-14)
Biggest U.S. bank experienced a
data breach affecting 76 millions
households and 7 million small
business – (Aug-14)
5.6 million fingerprints and other
personal data were stolen from
OPM; among largest breaches of
government data in U.S. history –
(Jun-15)
Self-replicating virus infected as
many as 30,000 computers of the
world’s larges oil producer, Saudi
Aramco – (Aug-12)
60
95
2015A 2020E
46
75
2015A 2020E
10.4%
CAGR
In USD bn In USD bn
9.5%
CAGR
Selected Enterprise Breaches Selected Governmental Breaches
Enterprise Cybersecurity Market Government Cybersecurity Market
12
WISEKEY’S IOT BUSINESS MODEL FROM CHIP TO END USERApplicationsSystemintegrationSilicon
End-user applications
Cloud services
Servers/
infrastructure
Devices
Software/ algorithms
Processing Chips
Connectivity chips
Embedded) sensors
WISeKey’s end-to-end business model
Core semiconductor business
Neutral cryptographic rootkey
Middleware & Personalization
Embedded Firmware
Digital Certificate
Root of Trust Services
Content management system
High Potential
Strong position
Just Established
Market entry
Not interested
Not interested
WISeKey
WISeKey’s positioning in Cybersecurity offerings
13
• Holistic approach among Competitors • Competitors in each vertical
CREATING THE FIRST EVER FULL INTEGRATED TRUSTED IOT PLATFORM
Root of Trust
Secure Identity
Digital Signature
Internet of Things
Semiconductors
Blockchain
Artificial Intelligence
WISEKEY’S TWO FOLDED BUSINESS MODEL
WISeKey RoT in Switzerland secures the INTERNET in the respective country
WISeKey Joint Ventures in every country with local company
WISeKey Partner
root key for every
country
Direct WIHN model
through vertical
platform
Cooperation to
secure countries via
controlled JVs
2
1
Synergies between the two
business avenues
WISeKey creates a new Internet / IoT ecosystem in each country
 Myriad of monetization opportunities
 Risk free for WIHN  no direct investment as the country
companies are set up as Joint Ventures funded by local companies
 Implementation delegated to country’s federal government and
business elite which are highly incentivized to deliver
 WISeKey to ensure at all times control / consolidation
 The business partner to generate business opportunities in the
respective country
14
WISEKEY’S MAIN IOT PRODUCT – SMART NFC CHIP
Margin Potential
 WISeKey has established itself a dominant position in “Smart NFC Chip Cybersecurity Solutions” that has become THE MARKET STANDARD
 WISeKey has the potential to replace Gemalto as the provider for smart RFID solutions => this is a great volume but a low margin business – However, “Smart NFC” can also
be “high margin business”, e.g. in Payment Solutions or Authentication of Product Forgeries or Secure Corporate Communication
 The offering of WISeKey has incredible synergetic, complementary potential in the entire field of IOT Automotive and IoT PKI / Smart Cities / Utilities, but also – although
more competitive – in Enterprise Solutions and Payment Systems as it can then cover all transition verticals with a fully trusted offering (NCF, Fixed Line Internet and
Mobile Internet)
Payment Solutions
Low Margin Product
Authentification
IoT / PKI
High Margin Products
Authentification
Sector
Degree of
Specialization
Existing B2B Clients
Meta Data
Potential
Difficulty in Chip
Volume
Fertilizer, OTC Pharma


BVLGARI, Hublot



Luxury Goods, Watches, Liquor,
Pharma


BVLGARI, Hublot, LVMH



Automotive, Utilities, Public
Infrastructure


Government of India
 - 

 - 
Financial Services


MasterCard



15
 WISeTrust IoT provides end-to-end scalable security in the IoT
chain, based on PKI technology to protect the Data at rest or
in transit
i. IoT devices authentication
ii. Secure communication between IoT devices and
distant servers
iii. Device and data integrity check
Securing IoT data in operation IoT device life cycle management
 WISeTrust IoT provides solutions to better manage the devices
life cycle
i. Device configuration
ii. Software upgrade late in the manufacturing
process
iii. operated in a secure or non-secure environment
 Reduces the risk of generating
weaknesses that may appear when
combining solutions from different
vendors
 No margin stacking from different vendors
WISETRUST IOT IN DETAIL
WISeKey provides a
Digital Certificate to
each IoT device
WISeKey provides a
Digital Certificate
Management System
(CMS)
WISeKey IoT Security Framework implements the chip in IoT devices while managing the content and data
16
A RANGE OF USE CASES WITH VARYING NEEDS AND TAILORED SOLUTIONS
Industrial/ Automotive Smart CitiesAuthenticationIT infrastructure Smart home/ wearables
 IT Companies ‘Going
Out’
CustomersNeeds
 Large scale
manufacturers
 Automotive Industry
 IoT wearables
 Home electronical
appliances
 E-Commerce
 Luxury Goods
 Pharma Industry
 IoT companies that
deploy their products in
cities
 Solve the security
concerns from foreign
governments
 Secure networks
 Encryption technologies
 Routers and modems
need to be secured
 Creating an identity of
all connected devices or
persons
 Implementing ID
management solution
 Secured traceability into
the production
and distribution chain
 Health monitoring and
measurement
 Secured E-transactions
 Protection against fraud
and abuse
 Protection against
counterfeiting
 Secured traceability into
the production
and distribution chain
 Protection against
warranty fraud
 Infrastructure control
such as water supply
management
 Lighting and waste
management
 Security (video
surveillance, fire alarms)
 Pollution sensors
WISeKey provides secure
communication network with
digital identification and
authentication
Combination of established
Root of Trust and NFC
technologies, consumers are
able to securely use intelligent
devices
NFC enabled phone connects
with device and verifies the
devices identity and
authenticity
Providing smart cities with a
scalable and easily
manageable object identity
management and
security solution
Root of Trust Services
CertifyID Services
WISeKeyProducts
17
 WISeKey’s Managed Cryptographic Root of Trust secure devices
leveraging SAP HANA® Cloud Platform for the Internet of Things
 VaultIC embedded in semiconductor firm ware
 The Revenue Model linked to this partnership is two folded:
I. Enterprise licensing model based on the project volume
II. For SAP customers monthly fees will be added to include the
use of WISeKey’s technology
Key Strategy: Collaboration to Help Secure IoT Edge Devices Bringing payments to luxury brand watches and wearables
 Bring payments to any consumer gadget, accessory or wearable
– from fitness bands to refrigerators
 The revenue model from the MasterCard partnership will
consist of the following:
I. Upfront NRE (Non-Recurring Engineering) fee for the set-up
of the wearable payment infrastructure for each brand
II. The sale of chips for the wearable device
III. Recurring fees for the programming, provisioning,
activation and service of the wearable device
PARTNERSHIPS AND THEIR MONETARIZATION
 CenturyLink to resell WISeKey’s cybersecurity solutions to
businesses
 WISeKey’s cybersecurity solutions complement CenturyLink’s
Managed Security Services Suite
 The revenue we generate from our relationship with
CenturyLink will consists of the following:
I. WISeKey technology and ICs that CenturyLink resells to its
customers
II. CenturyLink’s purchase and use of WISeKey technology and
ICs for its internal IOT projects
Providing cybersecurity solutions Bringing Innovation and Security to IoT across the Globe
 Providing smart cities with a scalable, easily manageable object
identity management
 The Managed WISeKey Root of Trust (RoT) serves as a common
trust anchor, which is recognized by operating systems (OS) and
applications
 The Revenue Model for Microsoft is equivalent to the options
described for SAP
18
WISEKEY’S TWO FOLDED BUSINESS MODEL
WISeKey RoT in Switzerland secures the INTERNET in the respective country
WISeKey Joint Ventures in every country with local company
WISeKey Partner
root key for every
country
Direct WIHN model
through vertical
platform
Cooperation to
secure countries via
controlled JVs
2
1
Synergies between the two
business avenues
WISeKey creates a new Internet / IoT ecosystem in each country
 Myriad of monetization opportunities
 Risk free for WIHN  no direct investment as the country
companies are set up as Joint Ventures funded by local companies
 Implementation delegated to country’s federal government and
business elite which are highly incentivized to deliver
 WISeKey to ensure at all times control / consolidation
 The business partner to generate business opportunities in the
respective country
19
 WISeKey International Holding AG and several influencers from the politic and the Indian economy incorporated WISeKey SAARC in the U.K.
 IPL was the first Business Partner, who acquired a 10% stake of WISeKey India for USD1.5m – the following project was implemented by IPL
to generate revenue of around USD150m with a EBITDA of USD100m :
I. Annually 400 million fertilizer bags distributed in India, current market value USD20m
II. 140m Farmers purchase a handset for USD1.0 (subsidized by the IPL)
III. Cost per device USD0.4
IV. EBITDA per device USD0.6  EBITDA margin 60%
 More Business Partners will be acquired
 Earnings will be distributed over annual dividends to the Business Partners and WISeKey SAARC
The strategic rational behind the JV India
JOINT VENTURE IN INDIA AS AN EXAMPLE OF SIGNIFICANT REVENUE GROWTH
WISeKey International Holding AG
51% 49%
90%
Project
Business Partners
“IPL”
10%
WISeKey India
Influencers from
politics and local
economy
WISeKey SAARC
consolidates
20
 Product identification: Leverage a unique identifier for each item produced and sold, in a format that can be machine-readable during both the
production phases and by the end customer, without requiring an specialized reading device
 Product tracking: Enable mechanism to follow up products from the production stage up to the sale and utilization by the end customer
 Feed the company: CRM with data generated during the whole process, answering questions like who and where a product was sold, and who was
the end customer that consumed it and where
 Enable new marketing capabilities by moving closer to the end customer and establishing direct communication channels with these
 Explore solutions for anti-counterfeiting, enabling customers that they are purchasing genuine products
IPL desires to improve the sales intelligence by implementing technology that enables different benefits
BUSINESS PROBLEM OF IPL WITH A TAILORED SOLUTION PROVIDED BY WISEKEY
 QR-Code solution: Numeric identifier, encoded as a easy-to-read
QR code using a feature phone and embedded in the logo of IPL,
like the sample below
 NFC Tag: Numeric identifier, encoded in an NFC chip, readable with
any compatible smartphone. This is initially proposed to be put in a
limited sample of bags for a “proof of value ” and extend the
project based in this experience
Benefits for IPL
 CRM enrichment tool
 Product tracking during the full life-cycle
 New possibilities for on-line transactions
including digital signatures
 Digital identities for products, dealers
and customers
Proposed and tailored solution for IPL  IPL affixes a unique ID to each product or production lot. Options:
I. QR Code printed in the bag
II. NFC Tag attached to the bag
 In both cases, the Identifier is either included in the bag beforehand or
affixed during the packaging
Production  Dealers download the IPL App in their smartphone and register an
"official dealer" account and read the tags when a product is received
and sold to the end customer
 The App sends all tracking data (product ID, time/date, geo-localization)
to IPL central systems, to feed the business intelligence systems
 End customers are encouraged (i.e. by offering promotions) to
download and use the App, creating a “customer" account and read the
product tags once they reach the final destination and use the product.
 The App sends all gathered information to the IPL back office, to feed
the CRM systems with customer data and purchase habits
DistributionCustomer
21
RECENT ACQUISITIONS OVERVIEW – INSIDE SECURECompanyoverviewSemiconductor
 INSIDE Secure provides embedded security solutions worldwide
 The company offers: secure microcontrollers, such as contact, contactless, and
dual-interface products for developing secure applications
 VAULTiTRUST, a trusted security personalization and provisioning service for
Internet of Thing hardware and software security solutions
 Digital rights management solutions to license, protect, and monetize digital
entertainment content and services
 Its products have applications in the fields of mobile security and secure
transactions
 The group has a current market capitalization of € 32.7m and employs around
300 full time employees
 INSIDE Secure was founded in 1995 and is headquartered in Meyreuil, France
Application specific standard chips designed
to secure various systems against
counterfeiting, cloning or identity theft
Smart cards solutions foster the migration
from magnrtstripe cards toward contactless
and/or contact technologies for payment
A trusted personalization and provisioning
Services to lower adoption barrier to best-in-
class security for IoT
Authentication Tokens
Logical / Physical Access Control eGov ID/ eHealth ID
Payment Cards
PayTV Conditional Access
Network Security/ Smart
Metering
Brand Protection
22
 Cloud-based Infrastructure-as-a-Service that enables
organizations to issue, renew, and revoke digital certificates
 2016B mPKI revenue (% of certificate revenue): 35%
 Percentage of recurring: 80%
Managed Public Key Infrastructure (mPKI) Digital Signing (sign)
 Electronic signatures and time stamp solutions used by
individuals and corporations to produce legally bound
documents
 2016B signing revenue (% of certificate revenue):
20%
 Percentage of recurring: 100%
QUOVADIS COMPLEMENTING THE MPKI OFFERING
 Certificate Authority that issues digital0
certificates that can be used to power strong
authentication, encryption and digital signing applications
 2016B SSL revenue (% of certificate revenue): 30%
 Percentage of recurring: 100%
Digital Certificates (SSL) Digital Identification (eIDs)
 Certificates that are enclosed as part of
individual electronic ID cards or devices and
used to authenticate and / or secure access to
government or regulated services
 2016B eID revenue (% of certificate revenue): 15%
 Percentage of recurring: 80%
mPKI Signing
eIDs
SSL
WISeKey IoT Security Framework implements the chip in IoT devices while managing the content and data
23
IoT and
Semiconductor
Clients worldwide
>400
Revenue in FY2017
USD35m
PERFECTLY INTEGRATING QUOVADIS AND VAULTIC
Cross Selling to Joint Ventures in respective Countries
mPKI and
Digital Signing
Clients worldwide
>3,000
Revenue in FY2017
USD20m
Root of Trust & CMS Services
Secured clients for new business areas
TANGIBLE NEAR TERM GROWTH OPPORTUNITIES
Revenue synergies between QuoVadis, VaultIC and WISeKey due to up and cross selling in
Switzerland, Germany, Belgium, France and Netherlands
1
Joint Venture China to launch the WISeKey products and services in a geopolitical highly
important region especially for multinational businesses entering the IoT space
5
Joint Venture Saudi Arabia to launch the WISeKey products and services in the
Middle East and North Africa region
4
Establish Suisse ID and e-Voting business in Switzerland as basis for Swiss IoT secure
infrastructure environment
3
Due to the acquisition of QuoVadis, WISeKey can now deploy QuoVadis mPKI technology in
jurisdictions such as India, Argentina and China
2
Unique technology to secure ecosystems for multinational business in headquartered in the
jurisdictions of the Joint Ventures
6
WISeKey is now the only IoT player offering an end-to-end trusted neutral cybersecurity platform7
24
CONTACTS
Direct Contact
Carlos Moreira
Founder CEO
+ 41 22 594 30 00
cmoreira@wisekey.com
Corporate Finance Advisor:
Thomas Bieri
Managing Partner
+ 41 44 575 20 01
bieri@acxit.com
Investor Relations:
Natalia Loboda
Head Investor Relations
+ 41 79 961 67 87
nloboda@wisekey.com
25

Mais conteúdo relacionado

Mais procurados

Company Profile 2016_1
Company Profile 2016_1Company Profile 2016_1
Company Profile 2016_1
Tarek Mekkawy
 
Dictao Company Brochure
Dictao Company BrochureDictao Company Brochure
Dictao Company Brochure
Dictao
 
Cyber supply chain risk management ASDE
Cyber supply chain risk management   ASDECyber supply chain risk management   ASDE
Cyber supply chain risk management ASDE
Engineers Australia
 
Construction Project Collaboration 030210
Construction Project Collaboration 030210Construction Project Collaboration 030210
Construction Project Collaboration 030210
Alasdair Kilgour
 

Mais procurados (20)

The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
 
Cloud and compliance REX
Cloud and compliance REXCloud and compliance REX
Cloud and compliance REX
 
DSS Company Presentation November 2015
DSS Company Presentation November 2015DSS Company Presentation November 2015
DSS Company Presentation November 2015
 
Banking the Unbanked
Banking the UnbankedBanking the Unbanked
Banking the Unbanked
 
PCI Compliance for Dummies
PCI Compliance for DummiesPCI Compliance for Dummies
PCI Compliance for Dummies
 
Panda Security: Protecting the digital life of our clients
Panda Security: Protecting the digital life of our clientsPanda Security: Protecting the digital life of our clients
Panda Security: Protecting the digital life of our clients
 
Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3
 
Company Profile 2016_1
Company Profile 2016_1Company Profile 2016_1
Company Profile 2016_1
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
 
The Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityThe Proactive Approach to Cyber Security
The Proactive Approach to Cyber Security
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016
 
Dictao Company Brochure
Dictao Company BrochureDictao Company Brochure
Dictao Company Brochure
 
Cyber supply chain risk management ASDE
Cyber supply chain risk management   ASDECyber supply chain risk management   ASDE
Cyber supply chain risk management ASDE
 
proposal on assessment of qualified signature creation devices compliant with...
proposal on assessment of qualified signature creation devices compliant with...proposal on assessment of qualified signature creation devices compliant with...
proposal on assessment of qualified signature creation devices compliant with...
 
Apr 28-2015 vasco investor presentation
Apr 28-2015 vasco investor presentationApr 28-2015 vasco investor presentation
Apr 28-2015 vasco investor presentation
 
Panda Security Corporate Presentation
Panda Security Corporate PresentationPanda Security Corporate Presentation
Panda Security Corporate Presentation
 
Construction Project Collaboration 030210
Construction Project Collaboration 030210Construction Project Collaboration 030210
Construction Project Collaboration 030210
 

Semelhante a WISekey presentation

TFS Brochure 4_Financial
TFS Brochure 4_FinancialTFS Brochure 4_Financial
TFS Brochure 4_Financial
Anthony Whittle
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
Alix Murphy
 

Semelhante a WISekey presentation (20)

Cybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data SecurityCybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data Security
 
10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf
 
TFS Brochure 4_Financial
TFS Brochure 4_FinancialTFS Brochure 4_Financial
TFS Brochure 4_Financial
 
The Digital Innovation Award - bolttech
The Digital Innovation Award - bolttechThe Digital Innovation Award - bolttech
The Digital Innovation Award - bolttech
 
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
 
Identikey
IdentikeyIdentikey
Identikey
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with Smartphones
 
The 10 most trusted authentication solution providers 2018
The 10 most trusted authentication solution providers 2018The 10 most trusted authentication solution providers 2018
The 10 most trusted authentication solution providers 2018
 
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) PresentationNXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
The 10 most trusted biometric companies
The 10 most trusted biometric companiesThe 10 most trusted biometric companies
The 10 most trusted biometric companies
 
IOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdfIOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdf
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
biid - NOAH17 London
biid - NOAH17 Londonbiid - NOAH17 London
biid - NOAH17 London
 
The 10 most influential leaders in security, 2021
The 10 most influential leaders in security, 2021The 10 most influential leaders in security, 2021
The 10 most influential leaders in security, 2021
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
alltech profile
alltech profilealltech profile
alltech profile
 
It solutions and consultancy
It solutions and consultancyIt solutions and consultancy
It solutions and consultancy
 

Mais de Creus Moreira Carlos

Billionaire hinduja hits lima for more business, less ego bloomberg business
Billionaire hinduja hits lima for more business, less ego   bloomberg businessBillionaire hinduja hits lima for more business, less ego   bloomberg business
Billionaire hinduja hits lima for more business, less ego bloomberg business
Creus Moreira Carlos
 
Copie article tribune_de_genève_11_fév2013
Copie article tribune_de_genève_11_fév2013Copie article tribune_de_genève_11_fév2013
Copie article tribune_de_genève_11_fév2013
Creus Moreira Carlos
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
Creus Moreira Carlos
 

Mais de Creus Moreira Carlos (20)

Wisekey kamp
Wisekey kampWisekey kamp
Wisekey kamp
 
Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin Dimanche Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin Dimanche
 
Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin DimancheInterview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin Dimanche
 
Security aspects on blockchain white paper
Security aspects on blockchain  white paperSecurity aspects on blockchain  white paper
Security aspects on blockchain white paper
 
wisekey history
wisekey historywisekey history
wisekey history
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
Ft ifa football a4 brochure
Ft ifa football a4 brochureFt ifa football a4 brochure
Ft ifa football a4 brochure
 
Vedomostiprl17011021 110921095139-phpapp02
Vedomostiprl17011021 110921095139-phpapp02Vedomostiprl17011021 110921095139-phpapp02
Vedomostiprl17011021 110921095139-phpapp02
 
Billionaire hinduja hits lima for more business, less ego bloomberg business
Billionaire hinduja hits lima for more business, less ego   bloomberg businessBillionaire hinduja hits lima for more business, less ego   bloomberg business
Billionaire hinduja hits lima for more business, less ego bloomberg business
 
3 Swiss companies listed among the World Economic Forum Global Growth Companies
3 Swiss companies listed among the World Economic Forum Global Growth Companies3 Swiss companies listed among the World Economic Forum Global Growth Companies
3 Swiss companies listed among the World Economic Forum Global Growth Companies
 
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
 
Presentation BigTrust at Malaga Valley by Carlos Moreira
Presentation BigTrust at Malaga Valley by Carlos MoreiraPresentation BigTrust at Malaga Valley by Carlos Moreira
Presentation BigTrust at Malaga Valley by Carlos Moreira
 
OISTE.ORG granted by the UN Special consultative status
OISTE.ORG  granted by the UN Special consultative status OISTE.ORG  granted by the UN Special consultative status
OISTE.ORG granted by the UN Special consultative status
 
Copie article tribune_de_genève_11_fév2013
Copie article tribune_de_genève_11_fév2013Copie article tribune_de_genève_11_fév2013
Copie article tribune_de_genève_11_fév2013
 
Wi se key - wisephoneplus (esp)
Wi se key - wisephoneplus (esp)Wi se key - wisephoneplus (esp)
Wi se key - wisephoneplus (esp)
 
Bilan fev 2012 300dpi
Bilan fev 2012 300dpiBilan fev 2012 300dpi
Bilan fev 2012 300dpi
 
Fcb 4
Fcb 4Fcb 4
Fcb 4
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
 
Cleantech switzerland 2010-1
Cleantech switzerland 2010-1Cleantech switzerland 2010-1
Cleantech switzerland 2010-1
 

Último

Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
dlhescort
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 

Último (20)

Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 

WISekey presentation

  • 2. DISCLAIMER This communication expressly or implicitly contains certain forward-looking statements concerning WISeKey International Holding Ltd and its business. Such statements involve certain known and unknown risks, uncertainties and other factors, which could cause the actual results, financial condition, performance or achievements of WISeKey International Holding Ltd to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements. WISeKey International Holding Ltd is providing this communication as of this date and does not undertake to update any forward-looking statements contained herein as a result of new information, future events or otherwise. This press release does not constitute an offer to sell, or a solicitation of an offer to buy, any securities, and it does not constitute an offering prospectus within the meaning of article 652a or article 1156 of the Swiss Code of Obligations or a listing prospectus within the meaning of the listing rules of the SIX Swiss Exchange. Investors must rely on their own evaluation of WISeKey and its securities, including the merits and risks involved. Nothing contained herein is, or shall be relied on as, a promise or representation as to the future performance of WISeKey. 2
  • 3.  Scalable Security • As Customers need « some » security, sometimes difficult to specify, WISeKey proposes 3 levels of security to match different needs, with easy migration: i. Digital Certificate directly implemented in the IoT device, ii. Digital Security protected through WISeKey’s software, iii. Digital Certificate protected through hardware (VaultIC) • Need and push for highest security as hackers always attack at the weakest entry point (e.g. DDoS attacks)  Enhanced Security • End-to-end solution eliminates potential security risks/ holes that are inevitably generated during integration of various and new technologies • Use of state of the art tamper resistant component to secure assets in IoT devices • WISeKey’s solution is based on market standards – not a proprietary or exotic solution that does not withstand governmental regulations  Easy Integration of security into IoT platform and in IoT devices • Certificate management and Certificate authority solutions can be hosted by WISeKey or at customer premises  Device life cycle management • PKI and CMS allow to manage IoT devices securely even if the device is located in a non-secure environment • IoT device configuration and software upgrade are the most important part in the CMS cycle as these should not be managed by third party providers  Cost effective solution • No margin stacking from different vendors thanks to end-to-end solution  Long life time solid partner • Swiss neutrality and privacy laws allow operations without geo-political or governmental constraints to ensure sovereignty and independency • WISeKey is the trusted operator of the OISTE Global Root, the only root outside of NATO countries making the RoT operational without using any WISeKey software • Provides unique PKI cryptography suitable for large-scale enterprises WISeKey’s “Chip-to-Cloud” solutions addresses directly system integrators, a efficient way to address the market versus addressing device makers WISEKEY PROVIDES A UNIQUE CYBERSECURITY PROPOSITION 3
  • 4.  Cybersecurity company offering digital security by deploying large scale Internet of Things (“IoT”) digital identity ecosystems  Authenticates and secures devices, websites, people, and documents for enterprises and government agencies  Technology allows to connect People-to-Machines and Machine-to- Machines, creating new opportunities to:  Improve peoples life, existing businesses and processes in general  Optimize processes, resources and end-user experience  Reduce risk toward end-users and businesses  Companies and customers can realize value if they can certify that they are receiving authenticated and secure device data Vision Company Overview WORLD’S ONLY IOT PLAYER OFFERING AN END-TO-END CYBERSECURITY PLATFORM Business Model – Secure communication between Devices Clients 4
  • 5. THREAT LANDSCAPE OF CYBERSECURITY IS MORE CHALLENGING THAN EVER Consumers need reassurance they are safe online Targeted attacks on the rise Data is the new perimeter Organizations do not have enough time or resources PRIVACY PRODUCTIVITYTHEFT SAFETY Control garage door locking Fraud Paymen t Hacking Unlock remotely Spying Infotainment system Malware attacked Pacemaker malfunction Activate alarm sensor Shut down factory Attacks (Motivations: Political, Monetary, Terrorism…) Steal Company know-how Reduce energy supply Stop alarm sensor Turn off engine Private Health data 5
  • 6. Motivators Impact THE MAIN ACTORS OF THE THREAT LANDSCAPE Threat vectors Governments Cyber criminals Cyber terrorists Hacktivists  Global competition  National security  Fraud  Illicit profit  Fraud  Identity theft  Political  Ideological  Disenfranchised  Malicious havoc  Political cause  Ideological  Targeted, long-term cyber campaigns  Insider  Third party services provider  Individual identity theft  Data breaches and intellectual property theft  Third party services provider  Target organizations  Insider  Third party services provider  Loss of IP  Infrastructure attacks  Monetary loss  Regulatory  Loss of identity/ IP  Infrastructure attacks  Privacy  Regulatory  Loss of IP  Infrastructure attacks  Monetary loss  Regulatory  Disruptions of operations  Public relations  Regulatory  Monetary loss Linesareblurrybetweendifferentthreats  Opportunistic vulnerabilities  Insider  Third party services provider 6
  • 7. THE WISEKEY TEAM – ESTABLISHED AND HIGHLY QUALIFIED Board of Directors Juan Hernandez Zavas  Member of the Board  Audit Committee, Strategy Committee Carlos Creus Moreira  Chairman of the Board  Strategy Committee Philippe Doubre  Member of the Board  Nomination and Compensation Committee Peter Ward  Member of the Board  Strategy Committee Dr. Franz Humer  Vice-Chairman of the Board  Strategy, Nomination and Compensation Committee Maryla Shingler Bobbio  Member of the Board  Audit Committee, Nomination and Compensation Committee Thomas J. Egger  Member of the Board  Audit Committee Dourgam Kummer  Member of the Board  Nomination and Compensation Committee Management Team Bernand Vian Semiconductor General Manager  More than 25 years of experience in the Secure Semiconductor Industry  Started his career at Gemplus with multiple positions in sales and marketing, and opened Gemplus’ San Francisco office  Joined INSIDE Contactless in 2002, and positioned INSIDE as a leader of NFC payment chip supplier in the US Carlos Moreira Chief Executive Officer  Recognized early stage pioneer in the field of digital identity  Adjunct Professor of the Graduate School of (RMIT) from 1995 to 1999  Head of the Trade Efficiency Lab at the Graduate School of Engineering at RMIT  Founded the Geneva-based online data security firm WISeKey SA in 1999 Peter Ward Chief Financial Officer  Chartered management accountant  Significant international experience in the IT, FMCG, medical equipment, plastics and Biotech industries  Joined WISeKey SA in 2008 as finance director and has been Chief Financial Officer and a member of the Board since 2012 7
  • 8. WISEKEY ON ITS TRANSFORMATION PATH 2003: First ever binding Internet vote in the Canton of Geneva using biometric enabled public key infrastructure 2006: Launch of CertifyID product for digital certification and identity management 2008: Citizen Services Platform in partnership with Microsoft for confirming citizen access to government services and validity of citizen electronic 2011: WISeID and WISfans mobile products for securing social media applications and for effective data protection 1999: Incorporation of WISeKey SA by Carlos Moreira 2005: WISeKey to provide Security products for computers and digital video broadcasting 2007: Secure registration and access control of online offerings, dematerialization and secure electronic document dematerialization 2010: WISeID and WISfans mobile products for securing social media applications and for effective data protection 2016: WISeKey International Holding listed on the SIX Swiss Exchange 2016: Integration of INSIDE secure VAULT IC and Incorporation of WISeKey SAARC, a JV between Indian Potash Limited and WISeKey 2017: Envisaged acquisition of QuoVadis to enable further growth in the B2B sector 2014: WISeAuthentic for the security of luxury goods, artwork, pharmaceuticals, spare parts and VIP social networking 8
  • 9. HOLISTIC APPROACH AMONG COMPETITORS Company Description Independent Trust Model SSL for Web Personal Identities1 Corporate Solutions IoT Strategy2 Mobile Strategy WISeKey Provides secure digital identity for people, objects and social content. Focus on added value and mobile strategy √ √ √ √ √ √ Entrust (now Datacard) First company to provide PKI corporate solutions. Lack of strong orientation to open environments prevented growth X √ √ √ X √3 RSA (now EMC2) Former leader in PKI technologies, based its control of the market on patents, not longer required X X X √ X X CyberTrust (now Verizon) Heritage of the “Internet bubble”, this company derives of a holding created by the Irish company Baltimore Technologies X √ X √ √3 X IdenTrust (now HiD Global) Founded by financial institutions such as Citigroup, ABN AMRO and others, was a first attempt for a PKI hierarchy for banks X X X √ X X Verisign (now Symantec) PKI branch of Symantec. Leader on SSL certificates4. Absorbed several companies in the sector during the last years X √ √ √ √ X (1) Referring to high assurance, qualified certificates (2) Internet of Things, certificates for objects (3) Partial solution, only for device/object management (4) SSL business is threatened by the new Mozilla’s initiative to provide these certificates for free. This endangers companies depending on this product 9
  • 10.  WISeKey is the only European company to secure its Root of Trust and not selling it since its inception  WISeKey created the OISTE Foundation to control the Root Certification Authority and the Trust Model  WISeKey is the trusted operator of the OISTE Global Root  OISTE provides Common Root for Certification Authorities worldwide that want to adhere to the OISTE Trust Model  Swiss Neutrality, Security, and privacy laws allow operation without geo-political or governmental constraints Swiss Root Key ensuring political neutrality WISeKey‘s OISTE Foundation  The authentication service is based on public- key cryptography  Technology has been used for more than 20 years and is guaranteed by NSA  Certificates Issued under a Swiss RoT owned by a Non Profit Foundation named OISTE NON US CRYPTOGRAPHIC ROOTKEY ENSURING GEOPOLITICAL ADVANTAGE WK Global Root WK IoT Root Partner Root Partner General SubCA Partner IoT SubCA ProtectionTransactionValueadded  Integrated with identification & authentication techniques  Point of sale using a portable application on smartphones or tablets  Trusted Ecosystem entirely reliable  Digital Vault App  Cloud Services  Secure Services  Owners Exclusive Club  Payment services 10
  • 12. WORLDWIDE CYBERSECURITY FACTS AND SPENDINGS USD 1bn was stolen in 2 years from 100 banks in 30 countries through SOCIAL ENGINEERING 59% of employees Steal proprietary corporate data when they quit or are fired MyDoom USD 38.5bn The most expensive computer virus of all time Hacktivism is the main motivation that drives cyber attacks USD 400bn Cost of cyber attacks to businesses - (direct damage, plus disruptions) 53% Board of Directors of Swiss companies see cybersecurity as a technical issue Social engineering Cyber criminals favorite way to manipulate victims 176% Increase in the number of cyber attacks with an average of 138 successful attacks per week 68% of funds lost as a result of a cyber attack were declared unrecoverable Iranian hackers infiltrated the computer systems of various government related organizations in the UAE – (Dez-14) 157,000 customers had personal details stolen, including 15,600 bank account numbers – (Oct-15) Hackers broke into Sony’s network and exposed 47,000 corporate documents, including private, internal emails – (Nov-14) Biggest U.S. bank experienced a data breach affecting 76 millions households and 7 million small business – (Aug-14) 5.6 million fingerprints and other personal data were stolen from OPM; among largest breaches of government data in U.S. history – (Jun-15) Self-replicating virus infected as many as 30,000 computers of the world’s larges oil producer, Saudi Aramco – (Aug-12) 60 95 2015A 2020E 46 75 2015A 2020E 10.4% CAGR In USD bn In USD bn 9.5% CAGR Selected Enterprise Breaches Selected Governmental Breaches Enterprise Cybersecurity Market Government Cybersecurity Market 12
  • 13. WISEKEY’S IOT BUSINESS MODEL FROM CHIP TO END USERApplicationsSystemintegrationSilicon End-user applications Cloud services Servers/ infrastructure Devices Software/ algorithms Processing Chips Connectivity chips Embedded) sensors WISeKey’s end-to-end business model Core semiconductor business Neutral cryptographic rootkey Middleware & Personalization Embedded Firmware Digital Certificate Root of Trust Services Content management system High Potential Strong position Just Established Market entry Not interested Not interested WISeKey WISeKey’s positioning in Cybersecurity offerings 13
  • 14. • Holistic approach among Competitors • Competitors in each vertical CREATING THE FIRST EVER FULL INTEGRATED TRUSTED IOT PLATFORM Root of Trust Secure Identity Digital Signature Internet of Things Semiconductors Blockchain Artificial Intelligence
  • 15. WISEKEY’S TWO FOLDED BUSINESS MODEL WISeKey RoT in Switzerland secures the INTERNET in the respective country WISeKey Joint Ventures in every country with local company WISeKey Partner root key for every country Direct WIHN model through vertical platform Cooperation to secure countries via controlled JVs 2 1 Synergies between the two business avenues WISeKey creates a new Internet / IoT ecosystem in each country  Myriad of monetization opportunities  Risk free for WIHN  no direct investment as the country companies are set up as Joint Ventures funded by local companies  Implementation delegated to country’s federal government and business elite which are highly incentivized to deliver  WISeKey to ensure at all times control / consolidation  The business partner to generate business opportunities in the respective country 14
  • 16. WISEKEY’S MAIN IOT PRODUCT – SMART NFC CHIP Margin Potential  WISeKey has established itself a dominant position in “Smart NFC Chip Cybersecurity Solutions” that has become THE MARKET STANDARD  WISeKey has the potential to replace Gemalto as the provider for smart RFID solutions => this is a great volume but a low margin business – However, “Smart NFC” can also be “high margin business”, e.g. in Payment Solutions or Authentication of Product Forgeries or Secure Corporate Communication  The offering of WISeKey has incredible synergetic, complementary potential in the entire field of IOT Automotive and IoT PKI / Smart Cities / Utilities, but also – although more competitive – in Enterprise Solutions and Payment Systems as it can then cover all transition verticals with a fully trusted offering (NCF, Fixed Line Internet and Mobile Internet) Payment Solutions Low Margin Product Authentification IoT / PKI High Margin Products Authentification Sector Degree of Specialization Existing B2B Clients Meta Data Potential Difficulty in Chip Volume Fertilizer, OTC Pharma   BVLGARI, Hublot    Luxury Goods, Watches, Liquor, Pharma   BVLGARI, Hublot, LVMH    Automotive, Utilities, Public Infrastructure   Government of India  -    -  Financial Services   MasterCard    15
  • 17.  WISeTrust IoT provides end-to-end scalable security in the IoT chain, based on PKI technology to protect the Data at rest or in transit i. IoT devices authentication ii. Secure communication between IoT devices and distant servers iii. Device and data integrity check Securing IoT data in operation IoT device life cycle management  WISeTrust IoT provides solutions to better manage the devices life cycle i. Device configuration ii. Software upgrade late in the manufacturing process iii. operated in a secure or non-secure environment  Reduces the risk of generating weaknesses that may appear when combining solutions from different vendors  No margin stacking from different vendors WISETRUST IOT IN DETAIL WISeKey provides a Digital Certificate to each IoT device WISeKey provides a Digital Certificate Management System (CMS) WISeKey IoT Security Framework implements the chip in IoT devices while managing the content and data 16
  • 18. A RANGE OF USE CASES WITH VARYING NEEDS AND TAILORED SOLUTIONS Industrial/ Automotive Smart CitiesAuthenticationIT infrastructure Smart home/ wearables  IT Companies ‘Going Out’ CustomersNeeds  Large scale manufacturers  Automotive Industry  IoT wearables  Home electronical appliances  E-Commerce  Luxury Goods  Pharma Industry  IoT companies that deploy their products in cities  Solve the security concerns from foreign governments  Secure networks  Encryption technologies  Routers and modems need to be secured  Creating an identity of all connected devices or persons  Implementing ID management solution  Secured traceability into the production and distribution chain  Health monitoring and measurement  Secured E-transactions  Protection against fraud and abuse  Protection against counterfeiting  Secured traceability into the production and distribution chain  Protection against warranty fraud  Infrastructure control such as water supply management  Lighting and waste management  Security (video surveillance, fire alarms)  Pollution sensors WISeKey provides secure communication network with digital identification and authentication Combination of established Root of Trust and NFC technologies, consumers are able to securely use intelligent devices NFC enabled phone connects with device and verifies the devices identity and authenticity Providing smart cities with a scalable and easily manageable object identity management and security solution Root of Trust Services CertifyID Services WISeKeyProducts 17
  • 19.  WISeKey’s Managed Cryptographic Root of Trust secure devices leveraging SAP HANA® Cloud Platform for the Internet of Things  VaultIC embedded in semiconductor firm ware  The Revenue Model linked to this partnership is two folded: I. Enterprise licensing model based on the project volume II. For SAP customers monthly fees will be added to include the use of WISeKey’s technology Key Strategy: Collaboration to Help Secure IoT Edge Devices Bringing payments to luxury brand watches and wearables  Bring payments to any consumer gadget, accessory or wearable – from fitness bands to refrigerators  The revenue model from the MasterCard partnership will consist of the following: I. Upfront NRE (Non-Recurring Engineering) fee for the set-up of the wearable payment infrastructure for each brand II. The sale of chips for the wearable device III. Recurring fees for the programming, provisioning, activation and service of the wearable device PARTNERSHIPS AND THEIR MONETARIZATION  CenturyLink to resell WISeKey’s cybersecurity solutions to businesses  WISeKey’s cybersecurity solutions complement CenturyLink’s Managed Security Services Suite  The revenue we generate from our relationship with CenturyLink will consists of the following: I. WISeKey technology and ICs that CenturyLink resells to its customers II. CenturyLink’s purchase and use of WISeKey technology and ICs for its internal IOT projects Providing cybersecurity solutions Bringing Innovation and Security to IoT across the Globe  Providing smart cities with a scalable, easily manageable object identity management  The Managed WISeKey Root of Trust (RoT) serves as a common trust anchor, which is recognized by operating systems (OS) and applications  The Revenue Model for Microsoft is equivalent to the options described for SAP 18
  • 20. WISEKEY’S TWO FOLDED BUSINESS MODEL WISeKey RoT in Switzerland secures the INTERNET in the respective country WISeKey Joint Ventures in every country with local company WISeKey Partner root key for every country Direct WIHN model through vertical platform Cooperation to secure countries via controlled JVs 2 1 Synergies between the two business avenues WISeKey creates a new Internet / IoT ecosystem in each country  Myriad of monetization opportunities  Risk free for WIHN  no direct investment as the country companies are set up as Joint Ventures funded by local companies  Implementation delegated to country’s federal government and business elite which are highly incentivized to deliver  WISeKey to ensure at all times control / consolidation  The business partner to generate business opportunities in the respective country 19
  • 21.  WISeKey International Holding AG and several influencers from the politic and the Indian economy incorporated WISeKey SAARC in the U.K.  IPL was the first Business Partner, who acquired a 10% stake of WISeKey India for USD1.5m – the following project was implemented by IPL to generate revenue of around USD150m with a EBITDA of USD100m : I. Annually 400 million fertilizer bags distributed in India, current market value USD20m II. 140m Farmers purchase a handset for USD1.0 (subsidized by the IPL) III. Cost per device USD0.4 IV. EBITDA per device USD0.6  EBITDA margin 60%  More Business Partners will be acquired  Earnings will be distributed over annual dividends to the Business Partners and WISeKey SAARC The strategic rational behind the JV India JOINT VENTURE IN INDIA AS AN EXAMPLE OF SIGNIFICANT REVENUE GROWTH WISeKey International Holding AG 51% 49% 90% Project Business Partners “IPL” 10% WISeKey India Influencers from politics and local economy WISeKey SAARC consolidates 20
  • 22.  Product identification: Leverage a unique identifier for each item produced and sold, in a format that can be machine-readable during both the production phases and by the end customer, without requiring an specialized reading device  Product tracking: Enable mechanism to follow up products from the production stage up to the sale and utilization by the end customer  Feed the company: CRM with data generated during the whole process, answering questions like who and where a product was sold, and who was the end customer that consumed it and where  Enable new marketing capabilities by moving closer to the end customer and establishing direct communication channels with these  Explore solutions for anti-counterfeiting, enabling customers that they are purchasing genuine products IPL desires to improve the sales intelligence by implementing technology that enables different benefits BUSINESS PROBLEM OF IPL WITH A TAILORED SOLUTION PROVIDED BY WISEKEY  QR-Code solution: Numeric identifier, encoded as a easy-to-read QR code using a feature phone and embedded in the logo of IPL, like the sample below  NFC Tag: Numeric identifier, encoded in an NFC chip, readable with any compatible smartphone. This is initially proposed to be put in a limited sample of bags for a “proof of value ” and extend the project based in this experience Benefits for IPL  CRM enrichment tool  Product tracking during the full life-cycle  New possibilities for on-line transactions including digital signatures  Digital identities for products, dealers and customers Proposed and tailored solution for IPL  IPL affixes a unique ID to each product or production lot. Options: I. QR Code printed in the bag II. NFC Tag attached to the bag  In both cases, the Identifier is either included in the bag beforehand or affixed during the packaging Production  Dealers download the IPL App in their smartphone and register an "official dealer" account and read the tags when a product is received and sold to the end customer  The App sends all tracking data (product ID, time/date, geo-localization) to IPL central systems, to feed the business intelligence systems  End customers are encouraged (i.e. by offering promotions) to download and use the App, creating a “customer" account and read the product tags once they reach the final destination and use the product.  The App sends all gathered information to the IPL back office, to feed the CRM systems with customer data and purchase habits DistributionCustomer 21
  • 23. RECENT ACQUISITIONS OVERVIEW – INSIDE SECURECompanyoverviewSemiconductor  INSIDE Secure provides embedded security solutions worldwide  The company offers: secure microcontrollers, such as contact, contactless, and dual-interface products for developing secure applications  VAULTiTRUST, a trusted security personalization and provisioning service for Internet of Thing hardware and software security solutions  Digital rights management solutions to license, protect, and monetize digital entertainment content and services  Its products have applications in the fields of mobile security and secure transactions  The group has a current market capitalization of € 32.7m and employs around 300 full time employees  INSIDE Secure was founded in 1995 and is headquartered in Meyreuil, France Application specific standard chips designed to secure various systems against counterfeiting, cloning or identity theft Smart cards solutions foster the migration from magnrtstripe cards toward contactless and/or contact technologies for payment A trusted personalization and provisioning Services to lower adoption barrier to best-in- class security for IoT Authentication Tokens Logical / Physical Access Control eGov ID/ eHealth ID Payment Cards PayTV Conditional Access Network Security/ Smart Metering Brand Protection 22
  • 24.  Cloud-based Infrastructure-as-a-Service that enables organizations to issue, renew, and revoke digital certificates  2016B mPKI revenue (% of certificate revenue): 35%  Percentage of recurring: 80% Managed Public Key Infrastructure (mPKI) Digital Signing (sign)  Electronic signatures and time stamp solutions used by individuals and corporations to produce legally bound documents  2016B signing revenue (% of certificate revenue): 20%  Percentage of recurring: 100% QUOVADIS COMPLEMENTING THE MPKI OFFERING  Certificate Authority that issues digital0 certificates that can be used to power strong authentication, encryption and digital signing applications  2016B SSL revenue (% of certificate revenue): 30%  Percentage of recurring: 100% Digital Certificates (SSL) Digital Identification (eIDs)  Certificates that are enclosed as part of individual electronic ID cards or devices and used to authenticate and / or secure access to government or regulated services  2016B eID revenue (% of certificate revenue): 15%  Percentage of recurring: 80% mPKI Signing eIDs SSL WISeKey IoT Security Framework implements the chip in IoT devices while managing the content and data 23
  • 25. IoT and Semiconductor Clients worldwide >400 Revenue in FY2017 USD35m PERFECTLY INTEGRATING QUOVADIS AND VAULTIC Cross Selling to Joint Ventures in respective Countries mPKI and Digital Signing Clients worldwide >3,000 Revenue in FY2017 USD20m Root of Trust & CMS Services Secured clients for new business areas
  • 26. TANGIBLE NEAR TERM GROWTH OPPORTUNITIES Revenue synergies between QuoVadis, VaultIC and WISeKey due to up and cross selling in Switzerland, Germany, Belgium, France and Netherlands 1 Joint Venture China to launch the WISeKey products and services in a geopolitical highly important region especially for multinational businesses entering the IoT space 5 Joint Venture Saudi Arabia to launch the WISeKey products and services in the Middle East and North Africa region 4 Establish Suisse ID and e-Voting business in Switzerland as basis for Swiss IoT secure infrastructure environment 3 Due to the acquisition of QuoVadis, WISeKey can now deploy QuoVadis mPKI technology in jurisdictions such as India, Argentina and China 2 Unique technology to secure ecosystems for multinational business in headquartered in the jurisdictions of the Joint Ventures 6 WISeKey is now the only IoT player offering an end-to-end trusted neutral cybersecurity platform7 24
  • 27. CONTACTS Direct Contact Carlos Moreira Founder CEO + 41 22 594 30 00 cmoreira@wisekey.com Corporate Finance Advisor: Thomas Bieri Managing Partner + 41 44 575 20 01 bieri@acxit.com Investor Relations: Natalia Loboda Head Investor Relations + 41 79 961 67 87 nloboda@wisekey.com 25