INTERIM REPORT Q1 2016 SSH COMMUNICATIONS SECURITY 21.4.2016. 21 April 2016 SSH Communications Security

Similar documents
SSH COMMUNICATIONS SECURITY CORPORATION FINANCIAL STATEMENT RELEASE, JANUARY 1 MARCH 31, 2016

Crypto as Global Business

Tieto Corporation. Lasse Heinonen CFO Tanja Lounevirta Head of Investor Relations 27 October 2014

CareGiver Remote Support Information Technology FAQ

Finnair Group Financial year January 1-December 31, 2001

How Managed Services Has Changed Remote Infrastructure Management. Presented by: Bill Whitney March 26, 2008

dbaccess European TMT Conference

SSH COMMUNICATIONS SECURITY CORPORATION INTERIM REPORT RELEASE, JANUARY 1 SEPTEMBER 30, 2015

Finnair Q1 result info

1 January December 2004

SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio

Finnair Q2 result info

Cloud VPN & The Role of the Service Provider in Disrupting the VPN Market

AUTOMATING AUDITS AND ENSURING CONTINUOUS COMPLIANCE WITH ALGOSEC

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access

Global Mobile Identity and Access Management Market

The Pitfalls of Encrypted Networks in Banking Operations Compliance Success in two industry cases

Tieto Corporation. 26 October Tanja Lounevirta Head of IR

How does a venture capitalist appraise investment opportunities?

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

ReadyNAS Remote White Paper. NETGEAR May 2010

Netcomm NB604N. Modem Configuration Guide. Netcomm NB604N. Configuring in Layer2 PPPoE for Windows XP and 2000 IMPORTANT MESSAGE

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

SaaS / Managed Services Market trends and adoption challenges

Frost & Sullivan. Publisher Sample

1 The intersection of IAM and the cloud

Cybersecurity Strategic Consulting

PREVENTING DATA LOSS THROUGH PRIVILEGED ACCESS CHANNELS

Target Security Breach

Network and Security Controls

How To Get A Cloud Service For A Small Business

The Shift to Wireless Data Communication

What are our operational and strategic plans for the years up to 2018? And what financial targets are they based on?

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Secure Shell User Keys and Access Control in PCI-DSS Compliance Environments

Annual Results Press Conference Analyst Presentation Datwyler Group. 4 March 2016

SAST, DAST and Vulnerability Assessments, = 4

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

Security issues in M2M envinronments when dealing with encrypted communication channels (such as SSH) Raoul Chiesa President, Security Brokers

Security. TestOut Modules

Best Practices for PCI DSS V3.0 Network Security Compliance

Securely Access and Manage Firewall- Protected Equipment From Anywhere

FULL SPEED AHEAD THE IXIA CHANNEL XCELERATE PROGRAM LATIN AMERICA

NAS 224 Remote Access Manual Configuration

Setting Up Scan to SMB on TaskALFA series MFP s.

8 Best Practices for IT Security Compliance

Stabilus at a glance. April 2014

Four Top Emagined Security Services

Microsoft Corporation- Financial and Strategic Analysis Review

DATA CENTER NETWORKING MARKET

Eyes on IZON: Surveilling IP Camera Security

Using IPsec VPN to provide communication between offices

Identity Relationship and Access Management for the Extended Enterprise

Evaluating Managed File Transfer Solutions

T-Systems: Operate Complex IT Landscapes Efficiently with SAP Landscape Virtualization Management

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

BOŚ S.A. GROUP Q3 2012

FortyCloud Installation Guide. Installing FortyCloud Gateways Using AMIs (AWS Billing)

For personal use only GALE PACIFIC LIMITED

VPN Lesson 2: VPN Implementation. Summary

Fiskars Group Q4 and FY Helsinki, February 9, 2016

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

Waves of adoption for NFV

Mobile Advertising Market - India

AN4108 Application note

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Secure & Unified Identity

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

Key opportunities in evolving Product Engineering Services market. Antti Vasara

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

Cisco Cloud Security Interoperability with Microsoft Office 365

SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER

GHEM Secure Access Control

Computer Crime & Security Survey

Dell s Transformation Final Assignment CNAS

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD

Enterprise Acquisition of Cloud Computing Services

NCSU SSO. Case Study

SafeEnterprise SSL igate Managing Central Access to Resources with VPX Technology

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

ObserveIT User Activity Monitoring

Undergraduate Academic Affairs \ Student Affairs IT Services. VPN and Remote Desktop Access from a Windows 7 PC

Interim Report, H1 2015/16. Illustration: BROEN, shopping centre Esbjerg, Denmark

Entarian ForestSafe version 4.1

2014 Annual General Meeting

AIMING AT THE BEST PRACTICE OF BANK MANAGEMENT -LAUNCH OF A NEW MEDIUM-TERM MANAGEMENT PLAN, REFORM OF THE MANAGEMENT SYSTEM, CHIBA BANK NEWS

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

SSH ANNUAL REPORT SECURING THE PATH to your information assets

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow

The Evolution of Traditional Telecoms to IP Communications

INTERIM REPORT

Need for Archival Solution

Office 365. Service Overview with a focus on Identity Federation and Directory Synchronization. Jono Luk, Program Manager jluk@microsoft.

IT/ITES - hosting & managed services

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Transcription:

INTERIM REPORT Q1 2016 SSH COMMUNICATIONS SECURITY 21.4.2016 1

DISCLAIMER The content in this report is provided by SSH Communications Security Corporation ("SSH") for your personal information only. And does not constitute an offer or invitation to purchase any securities. Nor does it provide any form of advice (investment. tax. legal) amounting to investment advice. Or make any recommendations regarding particular investments or products. SSH does not provide investment advice or recommendations to buy or sell its shares or the shares of others. If you are interested in investing in SSH, please contact your financial adviser for further details and information. Past performance of SSH shares is not indicative of future results. 2

CONTENTS 1 2 3 The Business We Are In Q1/16 Highlights / Financial Performance Going Forward 3

THE BUSINESS WE ARE IN CYBERSECURITY PRODUCTS FOR SERVERS & CRITICAL DATA Identity & Access Management SSH key management Encryption Monitoring 3 rd party access Secure system administration Secure data transfers Firewalls FOR LARGE CUSTOMERS Banks & insurance Retail Telecom Health care & pharmaceuticals Government Data centers & high-tech >90% to international markets PATENT LICENSING We also hold some essential & implementation patents that we license to other vendors 4

GLOBAL FOOTPRINT Helsinki, Finland (HQ) Boston, USA United Kingdom Germany Tokyo, Japan Hong Kong Singapore 90% of sales outside Finland SSH Office SSH Competence Center 5

SSH KEY MANAGEMENT THE NEGLECTED PART OF IAM The SSH protocol is extremely widely used: all data centers, all unix/linux servers, routers, telecom equipment SSH keys grant access comparable to usernames and passwords, but are typically used for automation and systems management Large enterprises often have millions of SSH keys on their systems more than 5x the number of passwords Traditional identity and access management (IAM) deals mostly with users and passwords, ignoring SSH keys (80% of credentials) Enterprises must solve the problem, it is too critical for security The problem affects nearly every Fortune 500 and most other top 10 000 enterprises Market in early stage, probably under 1% of potential need addressed 6

IDENTITY & ACCESS MANAGEMENT REALITY Traditional: Users, passwords, two-fator authentication Billions spent on these projects by enterprises 20% Of credentials Hidden until recently: SSH key based access Largely used for automation Neglected, not addressed by existing solutions; hidden in system administrator realm Absolutely critical, grants high level access 80% Of credentials 7

STRATEGY WIN THE SSH KEY MANAGEMENT MARKET Technology, IPR, leading products Reference customers, experience Financials, then others Market creation: IT auditors, consulting houses COMPLEMENT WITH ADDITIONAL PRODUCTS Become more strategic vendor to customers & governments CryptoAuditor another spearhead Firewall expands offering to government, telecom PARTNER Expand market reach Partner with consulting companies Partner with various other technology vendors Stay in our focus area, build a business for the consulting companies to support us 8

SSH COMMUNICATIONS SECURITY - OFFERING TECTIA SSH UNIVERSAL SSH KEY MANAGER CRYPTOAUDITOR Secure system administration and file transfers Used by more than half of top 10 global banks Mostly ongoing maintenance revenue Managing access to information systems using SSH keys Leads competition by 12-24 months Major customers: leading banks, credit card companies, clearing houses, technology companies Monitoring system administration, 3 rd party access and file transfers Provides visibility into encrypted traffic across firewall FIREWALL High performance firewall for critical applications in governments, telcos, etc 9 21 April 2016 INTERNAL SSH Communications Security

CONTENTS 1 2 3 The Business We Are In Q1/16 Highlights / Financial Performance Going Forward 10

1Q16 VERY SLOW BUT OUTLOOK GOOD Key financials 1Q15 2Q15 3Q15 4Q15 1Q16 Sales M 6,8 4,2 3,6 4,2 2,6 OPEX M 3,8 4,1 3,8 4,9 4,8 EBIT M -0,4-1,6-1,0-1,3-2,2 % EBIT % -5,4-41,6-27,6-29,5-84,0 Personnel eop 95 111 109 109 112 Sales by region (M ) Comments 1Q sales decline by -61% new SSH key management customers: 2 new banks, US government organization and a cybersecurity company. But initial deals were small and others did not close in 1Q. 1Q previous year had exceptionally high service saless Investments for future growth continued Many sales cases ongoing

B/S: ALLOWS INVESTING IN GROWTH 2013 2014 2015 1Q2016 B/S M 13,5 17,5 21,8 17,1 Cash and cash equivalents Cash flow from operations M 6,0 6,1 11,3 8,5 M 0,4 1,8 0,3-1,2 ROE % 2 4-40 -26 Equity ratio % 77 63 67 68 Gearing % -80-77 -99-99 Good cash position remaining In 1Q, cash flow from operations -1.2M, total cash flow -2,8M Profit/loss per share EUR -0,00-0,00-0,15-0,09 Equity per share EUR 0,24 0,25 0,36 0,27

CONTENTS 1 2 3 The Business We Are In Q1/16 Highlights / Financial Performance Going Forward 13

Our base EVOLUTION OF TRUSTED ACCESS OUR DIRECTION Industrialized Internet Automated access Remote admin 3 rd party monitoring Cloud Transformation Managed Services Government business Interactive access Automated access Passwordless access Legacy Infrastructure Finance SSH protocol Remote Access Management Encryption Authentication (Key based, Mobile) Health Check, Auditing Services 14

CONCRETE ACTIONS Maintain thought leadership in segment Work with channel partners (OEM, MSPs, integrators) to scale sales Educate auditors and regulators: create urgency an force action Customers of SSH cybersecurity solutions Use patents to slow competition Become more strategic Improve execution 15

GOING FORWARD Focus on trusted access to critical information systems and data Win SSH key management market Make us more strategic to customers Obtain revenue from patent portfolio Continuously improve operations In 2016, SSH Communications Security estimates significant revenue growth from 2015. 16