For personal use only

Similar documents
For personal use only

MANALTO INVESTOR OVERVIEW

NSW Government Digital Information Security Policy

Coverage Without Compromise. Proactive Investors Australia

Investment Technology - How to Compete With the Competition

How To Merge With Anittel

Creative + Proprietary Social Ad Networks reshaping Marketing Economics!! The transformation of the Ad Agency to data driven campaigns and creative!!

Game-Changing Industry Leadership

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM

Onthehouse MD and CRO on growth outlook for Consumer Online division

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

FRR Corporation Limited. Investor Presentation

NSW Government Digital Information Security Policy

For personal use only

Cloud Computing in a Government Context

Privacy, the Cloud and Data Breaches

Ubiquitous secure file sharing on any device

Cloud Computing Security Considerations

Data Management Session: Privacy, the Cloud and Data Breaches

Assessing the strength of your security operating model

wellcom RESULTS FOR THE HALF YEAR ENDING 31 DECEMBER 2014

Building Insurance Solutions

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

the challenge our mission our advisors

INTELLECTUAL ASSET MANAGEMENT DATA SECURITY IN THE CLOUD. Protecting the assets that protect your business

MarketsandMarkets. Publisher Sample

For personal use only

wellcom RESULTS FOR THE HALF YEAR ENDING 31 DECEMBER 2015

RELEASE. Nokia and Microsoft announce plans for a broad strategic partnership to build a

New Security Features

Half Year Results David Tudehope and Stuart Pauly 24 February 2016

5 Steps to Building a Successful Channel Program in the Cloud. Ron Huddleston SVP, ISV Alliances

APPLICATION FOR ELECTRICITY RETAILER AUTHORISATION

Cyber security Building confidence in your digital future

Investor Presentation

Nokia Conference Call 2Q 2012 Financial Results July 2009

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

Council of Financial Regulators: Review of Financial Market Infrastructure Regulation

Transforming business travel

For personal use only CREATE, SUPPLY AND SUPPORT

Technology to Power the Next Cloud. Presented by: Eric Kelly, CEO and Chairman 27 th Annual Roth Conference Presentation March 2015

CCH Workflow Solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Acquisitions to accelerate expansion in US payments market. 1 July 2014

Verifone Reports Results for the Second Quarter of Fiscal 2016

Scale Your Payroll Business Today

Update following the publication of the Bank of England Stress Test. 16 December 2014

Mint Wireless Limited (ASX:MNW) Company update September 2013

For personal use only

Acquisition of Decimal

Microsoft Solutions and Applications

Tabcorp Holdings Limited (ABN ) Tabcorp Holdings Limited (ABN )

Symptoms of Cloud Network Marketing Solutions

EMC AND VIRTUSTREAM MAY 26, Copyright 2015 EMC Corporation. All rights reserved.

Defending the Internet of Things

INVESTOR PRESENTATION NYSE:IDN. October 28, 2015

Rodman & Renshaw September 9, 2015 NASDAQ: FNJN

Separating Security and Information Management into Two Industry-Leading Technology Companies

INFORMATION TECHNOLOGY SECURITY STANDARDS

FMCS SECURE HOSTING GUIDE

For personal use only

Protective Marking Standard Implementation Guide for the Australian Government

First semester 2014 earnings

Deliver Secure, User-Friendly Access to Mobile Business Apps

Microsoft Pty Ltd. Australian Financial System Inquiry: Response to request for further submissions

February, 2016 NASDAQ: FNJN

Developing an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh

Additional Security Considerations and Controls for Virtual Private Networks

Compliance Guide: ASD ISM OVERVIEW

Property is at the core of everything we do

DOWNTIME BREACHES DATA LOSS. SYMANTEC TECHNICAL SERVICES HELP YOU AVOID THEM.

New Security Features

Cybersecurity. Franck Greverie. Analyst Day Paris, 28 May 2015

4 STEPS TOWARDS BUILDING THE ULTIMATE ENTERPRISE CLOUD PLATFORM

Certification Report

We are Globalscape A Leader in Secure Information Exchange Globalscape

How To Get A Cloud Service For A Small Business

Concept report: The Australian Personal Loans Market - Targeting the high value personal loan customer

The Information Security Specialists

The DC Experience EXPERIENCE

Fujitsu Australia and New Zealand provides cost-effective and flexible cloud services with CA Technologies solutions

Investor Presentation. December 2011

Company Overview. The AirWatch Story. What We Do. Company Mission. Company Footprint air-watch.

Pace Equity Limited Advising on Company Sales, Acquisitions, Fundraising & Growth since Cyber Security Market Trends 2015

StatPro Proactive Investors One2One Forum December 2010

Secure Data Transmission Solutions for the Management and Control of Big Data

2013 Frost & Sullivan Asia Pacific ICT Awards Network Security Vendor of the Year

Western Australian Auditor General s Report. Information Systems Audit Report

How To Support Bring Your Own Device (Byod)

PCI DSS Overview and Solutions. Anwar McEntee

The Fastest Path to the Cloud Building Your SaaS Company on Force.com

BYOD: Maintaining Corporate Policies in an Untethered World. Monday, March 11, :30-3:15 p.m.

UBIQUITY, INC. FORM 8-K. (Current report filing) Filed 08/12/14 for the Period Ending 07/18/14

2011 Gartner Research Publication: ICT Services

Is Your Identity Management Program Protecting Your Federal Systems?

Protecting Malaysia in the Connected world

Australasian Information Security Evaluation Program

AGM Presentation 27 November 2015

Virtutone Networks Inc. TSXV: VFX

Transcription:

Covata Limited Investor presentation November 2014

Investment case Significant time and resources spent developing the Covata Platform which has a number of significant competitive advantages in the IT security market place Significant market opportunity: The IT security market is estimated to be valued at US $68 billion and is expected to continue to grow strongly High barriers to entry: Unique IP portfolio with patent protection and certifications in place Covata has spent in excess of A$30m over 6 years to develop an enterprise ready solution Equivalent accreditation / certifications can take up to 24 months to obtain There is no market competitor that offers a similar solution that can be integrated as easily into existing infrastructure Commercialisation strategy and global partnerships in place Strong Board and Management team 2

Industry overview The IT security market is estimated to be valued at US$68 billion and is expected to continue to grow strongly Protecting and securing data and proprietary information is of high importance to government and enterprise Prevalence of information in digital form Increasing distribution / exchange of information using unsecure mediums The International Data Corporation in 2013 estimated spending in cloud computing will reach US$107 billion globally and AU $2.7 billion in Australia, by 2017 Global cloud based security market is predicted to grow to US$4.1 billion by 2017 as reported by Gartner There are a number of key trends identified in the IT security market including: Increased adoption by government and business to use cloud as a cost effective means of storing information Growing demand for flexibility and customisation in IT security solutions Employees using personal devices (BYOD) to access information on an organisation s network or cloud CLOUD COMPUTING MARKET ($ billion) CLOUD SECURITY SPENDING (US$ billion) 120 100 80 60 40 47 107 3.0 2.5 2.0 1.5 1.0 1.1 2.7 2.1 2.6 3.2 ~14% average annual growth 3.7 4.1 20 0.5 0 2013 2017 0.0 2013 2017 Global (US$) Australia (A$) 2013 2014 2015 2016 2017 3

Traditional approach to data security Data security traditionally focuses on the network or perimeter level NETWORK / PERIMETER SECURITY (TRADITIONAL APPROACH) Security at the network or perimeter level leaves individual data files unsecure All data can be accessed once the perimeter is breached Network is hackable from outside organisations Potential for documents to be leaked from inside an organisation Can require costly hardware solutions Difficult to control the security and integrity of data when sharing files outside of an organisation Data can be compromised once shared via email or uploaded to and accessed from an unsafe cloud storage site 4

Covata Technology: Covata has developed a disruptive approach to IT security Enterprise solution to manage data security at the object level as opposed to securing data at the network or perimeter level Patented technology which incorporates three core principles: (1) strong encryption (2) rights management (defining what you can or can t do with the data) (3) audit (visibility into who did what with the data) Flexible integration into existing enterprise infrastructure High security certifications have been obtained for versions of the software Significant market opportunity with strong barriers to entry no known market competitor offering a similar solution Commercialisation strategy is progressed - reseller and product development agreement with NSC Global and is in various stages of negotiations with a number of potential OEM providers 5

Certifications Covata Platform has been awarded a number of prestigious IT certifications Independent certifications provide customers with assurance that technology is of a high standard Versions of the Covata Platform have been independently certified by US and Australian organisations Provides government, system integrators, resellers and OEM partners with an assurance that the Covata Platform: Provides a high level of security protection Can be integrated to comply with strict government security regulations if required Hold a number of registered patents in key jurisdictions including the US, Australia, New Zealand and Singapore SECURITY CERTIFICATES Certificate 1980 FIPS 140-2 Level, Design Assurance Level 3 Certifies highest level of protection, complying with strict Government security regulations Assurance for US and Canadian Government customers, system integrators and resellers FIPS-197 Advanced Encryption Standards 256 Security certification sufficient to protect classified information in US Government Supersedes protection at SECRET level Common Criteria EAL 4+ Indicates particular versions of the software were independently verified against international standards DSD Cryptographic Evaluation Assures data security is upheld during the transfer of classified information over unclassified networks Certification is relied on by Australian and New Zealand Government agencies Source: Certificate websites 6

Enterprise application First product for commercialisation is Safe Share Enterprises typically have a number of different security platforms for different applications (eg. email and mobile devices are likely to have different security overlays) SAFE SHARE PRODUCT OVERVIEW The Covata Platform can be integrated to connect into existing systems within an enterprise Significant cost efficiencies and business process benefits Covata has developed a commercial cloud based Enterprise File Sharing and Synchronisation product called Safe Share Purposefully built for enterprise users Demonstrates the application of the Covata Platform and assists with the advancement of its commercialisation strategy Safe Share is compatible across many electronic devices and can be accessed via a web browser (Internet), Windows and ios applications Safe Share can be tailored to suit specific enterprise needs 7

Safe Share, an enterprise-focused solution 8

Commercialisation strategy Three key commercialisation channels Channel Description Current customer / partner and target markets Reseller partners and distribution Covata has developed a strategy of utilising a network of trusted partners and distributors for specific regions / client groups Utilises reseller trusted relationships while minimising number of required sales staff Direct sales Direct sales to certain customer segments including Government and Defence Agencies Strong reputation in the intelligence community Original Equipment Manufacturers (OEMs) OEM clients would embed the Covata Platform within their existing software ecosystem Provide scalability and attractive margins Currently in various stages of negotiations with a number of potential global OEM partners 1 1. Discussions remain preliminary, incomplete and confidential 9

Strong Board and Management Team BOARD OF DIRECTORS EXECUTIVE MANAGEMENT Charles Archer Executive Chairman Trent Telford Founder, CEO and Executive Director Phillip Dunkelberger Non-Executive Director Over 28 years experience as Assistant Director of the FBI as head of the Criminal Justice Information Services Division Testified before multiple Senate and House committees on advancing technology for Criminal Justice Founded company in October 2007 Experienced company Director and CEO and founder of one of Australia s first mobile marketing technology companies with STW Group President and CEO of Nok Nok Labs, Inc, a leader in strong authentication solutions Co-Founder and CEO of PGP Corporation (acquired by Symantec in 2010) Trent Telford Founder, CEO and Executive Director Nick Chiarelli Chief Financial Officer Vic Winkler Chief Technology Officer Founded company in October 2007 Experienced company Director and CEO and founder of one of Australia s first mobile marketing technology companies with STW Group 15 years financial / accounting experience in Sydney and London Managed Covata s finance function for 4 years Over 30 years experience in information and cyber security, cloud security, and systems and applications development Previously security architect for Booz Allan Hamilton and Lead Cloud Technologist at Sun Microsystems Joseph Miller Non-Executive Director Philip King Non-Executive Director Managing Director of Europlay Capital Advisors, LLC ( ECA ), an Los Angeles based boutique merchant bank and financial advisory firm ECA services and invests in technology, media, telecom etc. Over 30 years experience in financial services, payments and IT Co-founded Asia Principal Capital Limited in Brunei and Singapore 10

In summary Covata is well positioned to grow globally, underpinned by Significant market opportunity: The IT security market is estimated to be valued at US $68 billion and is expected to continue to grow strongly High barriers to entry: Unique IP portfolio with patent protection and certifications in place Covata has spent in excess of A$30m over 6 years to develop an enterprise ready solution Equivalent accreditation / certifications can take up to 24 months to obtain There is no market competitor that offers a similar solution that can be integrated as easily into existing infrastructure Commercialisation strategy and global partnerships in place Strong Board and Management team 11

Q&A

Disclaimer Some of the information contained in this presentation contains forward-looking statements which may not directly or exclusively relate to historical facts. These forward-looking statements reflect Covata Limited s current intentions, plans, expectations, assumptions and beliefs about future events and are subject to risks, uncertainties and other factors, many of which are outside the control of Covata Limited. Important factors that could cause actual results to differ materially from the expectations expressed or implied in the forward-looking statements include known and unknown risks. Because actual results could differ materially from Covata Limited s current intentions, plans, expectations, assumptions and beliefs about the future, you are urged to view all forward-looking statements contained herein with caution. 13

Covata Limited Investor presentation November 2014