SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
- Confidential & proprietary -




Next stage for mobile security
- Confidential & proprietary -



       Comilion founders
The founders of Comilion are top experts in the field of cyber security and leading
large scale technological initiatives from concept to production and business

                Kobi Freedman, CEO
                Kobi has 15 years of experience in the field of IT management & cyber security
                • Co-Founding & managing initiatives in a total budget of 25 M$ Including
                  Comitari technologies (cyber defense company - award winning one of 10 most
                  promising startups by Forbes magazine)
                • A member of Israel Cyber Security advisory forums
                • Bachelor in Industrial Engineering and has a master's degree in Law studies


                Guy Wertheim, CTO
                Guy posses a vast experience in the field of cyber security
                Guy served in the elite technological unit of the Israeli Intelligence corps in various
                R&D & commander positions
                • Guy worked as a consultant in McKinsey &Co.
                • Guy is a Talpiot military academy, graduate with B.Sc. in Physics, Mathematics
                  and Computer Science and has a master’s degree in Computer Science (magna
                  cum laude)
- Confidential & proprietary -



    Our vision & mission

• We want to change the
  way individuals and
  enterprises are evaluating
  the App risk for privacy &
  security.


• We want to offer every
  individual the opportunity
  of enjoying all the best
  which smart mobility can
  offer while maintaining
  safe, private & effective
  experience.
- Confidential & proprietary -



      In a nutshell




The first crowd sourcing platform for
      mobile apps vulnerability
  assessment – a global project                                           PermissionShield - Dynamic
   which aims to create the App                                          Apps Permission Management
 vulnerability index & permissions
               profiling
- Confidential & proprietary -



     Snapshot on the mobile market
    Mobile devices worldwide
            (Billions)                                                             Apps downloads & revenues
                                                                                           (Billions)
                                                                           100
8
6                                                                          50
4                                                                                                                      36.7
                                                                             0         5.2               7.3
2
                                                                                     2010              2011         2014-15
0                                                                                    App revenues              App downloads
    2010     2011       2014   2020                                          Source: Canalys, IDC, Gartner
                                            Windows   others
           enterprise    consumer            Phone      4%
                                              1%



                                              BlackBerry             iOS
                                                 12%                 19%


                                            Symbian
                                              16%


                                                               Android
                                                                49%




                                      Source: Canalys, Worldwide smartphone market, 2011
- Confidential & proprietary -



           Snapshot on the mobile security market
        Mobile security spend                                                                   Number of devices having
              (Billions)                                                                         some security (Millions)


4                                                                                            3000
                                                                                             2000
3
                                                                                             1000
2                                                                                                 0
1                                                                                                          2011           2016
0                                                                                                      protected         unprotected
         2011          2015           2016
                                                                                                  Source: Ericsson, June 2012

            enterprise             consumer
Source: Juniper, Mobile Security Opportunities 2011-2016




                                                                                       Source: Billguard, 2011
- Confidential & proprietary -



        Enterprise mobile security and usability

–   Mobile computing is one of the major
    trends of IT and the first security
    issue - globally
–   53% (and increasing) of employees
    are using their private devices to both
    private and work related tasks
–   20% of the world’s browsing is made                Source: Global tech trends, E&Y 2012

    VIA mobile platforms (estimated to be
    50% in few years)
–   Cyber threats are creating new kind
    of challenges to secure the
    organizational environment

–   Organizational data is massively
    transferring to unmanaged devices
–   There is a crucial need in securing
    organizational data in BYOD
    scenarios

                                                       Source: STKI group 2012
- Confidential & proprietary -

The business challenge
HOW ENTERPRISES DEAL WITH SMART MOBILE ?




                                                             •Device protection, stand alone devices:

                                                             •Passwords
                                                             •AntiVirus
                                                 Evolution   •Encryption




                                                             •Device management
                                                             •MDM (Mobile Data Management)
                                                             •Remote block, wipe, locate
                                                             •Identity & policy management
                                                             •MAM (Mobile App Management)
                                                   Current   •Internal App markets
                                                             •Virtualization




                                                             •BYOD:
                                                             •Immediate device adoption
                                                             •Secured Hybrid environments
                                                             •Less control
                                                Next Stage   •Unmanaged private Apps
- Confidential & proprietary -

        The business challenge
        BYOD & THE APPS PROBLEM



–   In the next 3 years, 1.3 Billon
    employees will have a mobile
    device with work related data on
    it (IDC)
–   All major enterprise software
    vendors are starting to offer
    mobile apps (SAP, Oracle,
    salesforce.com, Microsoft,
    Google apps etc)                                         Work
–   The mixture of work related and                         Related
                                                             Apps
    private apps exposes the data &
    the device to new risk vectors                                            Major
                                                                             Security
–   Comilion is confronting the Apps
    security gap in a new conception                        Private
                                                                               gaps
                                                            Related
                                                             Apps

                                                                                   Apps
                                                                        Browsing            Data
                                                                                   Device
- Confidential & proprietary -

      The business challenge
      BYOD & THE APPS PROBLEM



–   1,000,000,000 (1 Billion) is the
    current estimated amount of apps                                 FAMOUS APPS
–   Every mobile device holds dozens                           COMPROMISING PRIVACY
    of Apps
–   80,000,000 app downloads every
    day
–   Apps are compromising the user’s
    data and privacy – as a common
    practice
–   Almost all Apps (and free Apps the
    most) upload sensitive private data
    as a common practice

–   In a BYOD scenario the problem
    becomes a major corporate’s
    concern
–   The issue becomes much grater in
    cyber related threats                            * WSJ – “WHAT THEY KNOW” DECEMBER 17, 2010
- Confidential & proprietary -



      Comilion – the technology

– securely handle apps behavior &
  data breach in an hybrid (BYOD)
  environment

  •   End-user App for dynamic permission
      management
  •   Recommendation & automatic decision
      making backed by a crowd intelligence
      platform for App behavior and risk analysis
  •   App sensitivity and risk analysis for the
      enterprise customer
  •   Only app which doesn’t require Root
      permissions


– The technology is protected by
  patent requests the company was
  lately filed
- Confidential & proprietary -



            Competition environment
–       Technologies for mobile security and
        usability are evolving in different approaches

                                                                                MAIN ADVANCED BYOD SECURITY/MDM
–       Enterprise:
    •      In the enterprise BYOD – only part of MDM
           suppliers are offering narrow permission
           management
    •      There are few startups having initiatives in few
           approaches towards ‘real’ BYOD
    •      Most security vendors are starting to offer
           mobile security (mainly via M&A)
    •      Comilion’s strategy is based on integrating with
           leading MDM


–       Consumer:
    •      Currently, there are no apps dealing
           comprehensively with the issue
    •      There are few Apps dealing with privacy in an
           ‘un-orthodox’ way
    •      Comilion’s strategy is based on generating
           massive install base & by creating a
           contributors community and aim to align with a
           platform manufacturer
- Confidential & proprietary -



          Strategic roadmap
THE STRATEGIC TARGET:
HAVING PRESENCE ON 10% OF THE WORLD’S MOBILE MARKET IN 3 YEARS (APPROX 200M USERS)
& GENERATING AN AVERAGE INCOME OF 0.5$/USER/YEAR


                       Core technology           Management                Standard MDM             Platform oriented


                                             2
                   1




                                                                       3




                                                                                                4
                       dev                       consule                   integration              App
      TECHNOLOGY




                       Consumer App              Integration               App management           App developers
                                                 with MDM                  features                 integration
                                                                                                    platform
                       Data analysis             Organizational App
                                                                           Full data analysis
                                                                           platform                 Advanced BYOD
                       1st Enterprise Beta       3-4 Enterprise Beta                                features (TBD)




                   IP                        MDM bizDev                   Mass Enterprise       Platform OEM
      BIZDEV




                                                                          marketing             agreement
                   Consumer                  Direct
                   marketing                 enterprise coop              MDM coop              MDM OEM
                                                                          agreement             agreements
      GOAL




                   10K users                 1M users                     10M users             200M users
- Confidential & proprietary -



         Financials

   The company is seeking to raise 1M$                            Projected users & revenues
    which will finance the following                                        (millions)
    milestones:                                         200

                                                        150
        Launching full scope consumer app
         (Android +iOS)                                 100
        Launching initial crowd intelligence
         platform
                                                          50
        R&D for windows mobile app
        Entablish a solid presence in
         consumer sector (for Android)                      0
                                                                       Y1    Y2          Y3        Y4
        3-4 Beta sites for enterprise solution                  Revenues    Consumers        Enterprise
        BizDev for MDM market cooperation
- Confidential & proprietary -




           Kobi Freedman, CEO
           Tel: +972-545-772232
           kobi@Comilion.com

Más contenido relacionado

La actualidad más candente

BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
Purna Bhat
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
Arrow ECS UK
 
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
Lacoon Mobile Security
 
Mobile security
Mobile securityMobile security
Mobile security
home
 

La actualidad más candente (20)

Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
 
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber AttacksTurning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
iOS Threats - Malicious Configuration Profiles, Threat, Detection & MitigationiOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat Report
 
Rapport X force 2014
Rapport X force 2014Rapport X force 2014
Rapport X force 2014
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security Software
 
Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniques
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
 
Mobile security
Mobile securityMobile security
Mobile security
 

Similar a Comilion introduction presentation 26102012 (1)

APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
Masha Geller
 
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
kgbacdd
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
HyTrust
 

Similar a Comilion introduction presentation 26102012 (1) (20)

Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigm
 
Vision mobile beyond_siri
Vision mobile beyond_siriVision mobile beyond_siri
Vision mobile beyond_siri
 
MobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web Browsing
 
Media and the new app economy
Media and the new app economy Media and the new app economy
Media and the new app economy
 
Reshaping Retail with Mobility
Reshaping Retail with MobilityReshaping Retail with Mobility
Reshaping Retail with Mobility
 
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to ProfessionalsICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
 
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
 
Mobile megatrends 2012
Mobile megatrends 2012Mobile megatrends 2012
Mobile megatrends 2012
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentation
 
Waterloo Ideaca Mobility Presentation: May 2012
Waterloo Ideaca Mobility Presentation: May 2012Waterloo Ideaca Mobility Presentation: May 2012
Waterloo Ideaca Mobility Presentation: May 2012
 

Más de AP DealFlow

Hk city i apps for startups-ge2304
Hk city i apps for startups-ge2304Hk city i apps for startups-ge2304
Hk city i apps for startups-ge2304
AP DealFlow
 
Oceanethix strategic plan china owned 2008 to 2030 update 081211
Oceanethix strategic plan china owned 2008 to 2030 update 081211Oceanethix strategic plan china owned 2008 to 2030 update 081211
Oceanethix strategic plan china owned 2008 to 2030 update 081211
AP DealFlow
 
Apstartup crowdfunding ver3
Apstartup crowdfunding ver3 Apstartup crowdfunding ver3
Apstartup crowdfunding ver3
AP DealFlow
 
Social credit system
Social credit systemSocial credit system
Social credit system
AP DealFlow
 
NASC presentation
NASC presentationNASC presentation
NASC presentation
AP DealFlow
 
Apstartup europe expansion ver4
Apstartup europe expansion ver4Apstartup europe expansion ver4
Apstartup europe expansion ver4
AP DealFlow
 
Parliamentary committee250407
Parliamentary committee250407Parliamentary committee250407
Parliamentary committee250407
AP DealFlow
 
Aspirations of China’s “Second-Tier” Cities
Aspirations of China’s  “Second-Tier” CitiesAspirations of China’s  “Second-Tier” Cities
Aspirations of China’s “Second-Tier” Cities
AP DealFlow
 
Apstartup crowdfunding ver2
Apstartup crowdfunding ver2 Apstartup crowdfunding ver2
Apstartup crowdfunding ver2
AP DealFlow
 
Vita genes test brochure
Vita genes test brochureVita genes test brochure
Vita genes test brochure
AP DealFlow
 
Vita genes ppt 20120802
Vita genes ppt 20120802Vita genes ppt 20120802
Vita genes ppt 20120802
AP DealFlow
 
Vitargent introduction20130507
Vitargent introduction20130507Vitargent introduction20130507
Vitargent introduction20130507
AP DealFlow
 
Cocoon case smallsize
Cocoon case smallsizeCocoon case smallsize
Cocoon case smallsize
AP DealFlow
 
Gcp solar introduction v2
Gcp solar   introduction v2Gcp solar   introduction v2
Gcp solar introduction v2
AP DealFlow
 

Más de AP DealFlow (20)

10208308 republic-of-sino-burma
10208308 republic-of-sino-burma10208308 republic-of-sino-burma
10208308 republic-of-sino-burma
 
Social time currency v5
Social time currency v5Social time currency v5
Social time currency v5
 
Social credit system e2 x
Social credit system   e2 xSocial credit system   e2 x
Social credit system e2 x
 
Hk city i apps for startups-ge2304
Hk city i apps for startups-ge2304Hk city i apps for startups-ge2304
Hk city i apps for startups-ge2304
 
Oceanethix strategic plan china owned 2008 to 2030 update 081211
Oceanethix strategic plan china owned 2008 to 2030 update 081211Oceanethix strategic plan china owned 2008 to 2030 update 081211
Oceanethix strategic plan china owned 2008 to 2030 update 081211
 
Apstartup crowdfunding ver3
Apstartup crowdfunding ver3 Apstartup crowdfunding ver3
Apstartup crowdfunding ver3
 
Social credit system
Social credit systemSocial credit system
Social credit system
 
NASC presentation
NASC presentationNASC presentation
NASC presentation
 
Apps for startups concept
Apps for startups conceptApps for startups concept
Apps for startups concept
 
Apstartup europe expansion ver4
Apstartup europe expansion ver4Apstartup europe expansion ver4
Apstartup europe expansion ver4
 
A wee story the golden sea
A wee story  the golden seaA wee story  the golden sea
A wee story the golden sea
 
Parliamentary committee250407
Parliamentary committee250407Parliamentary committee250407
Parliamentary committee250407
 
Aspirations of China’s “Second-Tier” Cities
Aspirations of China’s  “Second-Tier” CitiesAspirations of China’s  “Second-Tier” Cities
Aspirations of China’s “Second-Tier” Cities
 
sparkinoo_elemooni.pptx
sparkinoo_elemooni.pptxsparkinoo_elemooni.pptx
sparkinoo_elemooni.pptx
 
Apstartup crowdfunding ver2
Apstartup crowdfunding ver2 Apstartup crowdfunding ver2
Apstartup crowdfunding ver2
 
Vita genes test brochure
Vita genes test brochureVita genes test brochure
Vita genes test brochure
 
Vita genes ppt 20120802
Vita genes ppt 20120802Vita genes ppt 20120802
Vita genes ppt 20120802
 
Vitargent introduction20130507
Vitargent introduction20130507Vitargent introduction20130507
Vitargent introduction20130507
 
Cocoon case smallsize
Cocoon case smallsizeCocoon case smallsize
Cocoon case smallsize
 
Gcp solar introduction v2
Gcp solar   introduction v2Gcp solar   introduction v2
Gcp solar introduction v2
 

Comilion introduction presentation 26102012 (1)

  • 1. - Confidential & proprietary - Next stage for mobile security
  • 2. - Confidential & proprietary - Comilion founders The founders of Comilion are top experts in the field of cyber security and leading large scale technological initiatives from concept to production and business Kobi Freedman, CEO Kobi has 15 years of experience in the field of IT management & cyber security • Co-Founding & managing initiatives in a total budget of 25 M$ Including Comitari technologies (cyber defense company - award winning one of 10 most promising startups by Forbes magazine) • A member of Israel Cyber Security advisory forums • Bachelor in Industrial Engineering and has a master's degree in Law studies Guy Wertheim, CTO Guy posses a vast experience in the field of cyber security Guy served in the elite technological unit of the Israeli Intelligence corps in various R&D & commander positions • Guy worked as a consultant in McKinsey &Co. • Guy is a Talpiot military academy, graduate with B.Sc. in Physics, Mathematics and Computer Science and has a master’s degree in Computer Science (magna cum laude)
  • 3. - Confidential & proprietary - Our vision & mission • We want to change the way individuals and enterprises are evaluating the App risk for privacy & security. • We want to offer every individual the opportunity of enjoying all the best which smart mobility can offer while maintaining safe, private & effective experience.
  • 4. - Confidential & proprietary - In a nutshell The first crowd sourcing platform for mobile apps vulnerability assessment – a global project PermissionShield - Dynamic which aims to create the App Apps Permission Management vulnerability index & permissions profiling
  • 5. - Confidential & proprietary - Snapshot on the mobile market Mobile devices worldwide (Billions) Apps downloads & revenues (Billions) 100 8 6 50 4 36.7 0 5.2 7.3 2 2010 2011 2014-15 0 App revenues App downloads 2010 2011 2014 2020 Source: Canalys, IDC, Gartner Windows others enterprise consumer Phone 4% 1% BlackBerry iOS 12% 19% Symbian 16% Android 49% Source: Canalys, Worldwide smartphone market, 2011
  • 6. - Confidential & proprietary - Snapshot on the mobile security market Mobile security spend Number of devices having (Billions) some security (Millions) 4 3000 2000 3 1000 2 0 1 2011 2016 0 protected unprotected 2011 2015 2016 Source: Ericsson, June 2012 enterprise consumer Source: Juniper, Mobile Security Opportunities 2011-2016 Source: Billguard, 2011
  • 7. - Confidential & proprietary - Enterprise mobile security and usability – Mobile computing is one of the major trends of IT and the first security issue - globally – 53% (and increasing) of employees are using their private devices to both private and work related tasks – 20% of the world’s browsing is made Source: Global tech trends, E&Y 2012 VIA mobile platforms (estimated to be 50% in few years) – Cyber threats are creating new kind of challenges to secure the organizational environment – Organizational data is massively transferring to unmanaged devices – There is a crucial need in securing organizational data in BYOD scenarios Source: STKI group 2012
  • 8. - Confidential & proprietary - The business challenge HOW ENTERPRISES DEAL WITH SMART MOBILE ? •Device protection, stand alone devices: •Passwords •AntiVirus Evolution •Encryption •Device management •MDM (Mobile Data Management) •Remote block, wipe, locate •Identity & policy management •MAM (Mobile App Management) Current •Internal App markets •Virtualization •BYOD: •Immediate device adoption •Secured Hybrid environments •Less control Next Stage •Unmanaged private Apps
  • 9. - Confidential & proprietary - The business challenge BYOD & THE APPS PROBLEM – In the next 3 years, 1.3 Billon employees will have a mobile device with work related data on it (IDC) – All major enterprise software vendors are starting to offer mobile apps (SAP, Oracle, salesforce.com, Microsoft, Google apps etc) Work – The mixture of work related and Related Apps private apps exposes the data & the device to new risk vectors Major Security – Comilion is confronting the Apps security gap in a new conception Private gaps Related Apps Apps Browsing Data Device
  • 10. - Confidential & proprietary - The business challenge BYOD & THE APPS PROBLEM – 1,000,000,000 (1 Billion) is the current estimated amount of apps FAMOUS APPS – Every mobile device holds dozens COMPROMISING PRIVACY of Apps – 80,000,000 app downloads every day – Apps are compromising the user’s data and privacy – as a common practice – Almost all Apps (and free Apps the most) upload sensitive private data as a common practice – In a BYOD scenario the problem becomes a major corporate’s concern – The issue becomes much grater in cyber related threats * WSJ – “WHAT THEY KNOW” DECEMBER 17, 2010
  • 11. - Confidential & proprietary - Comilion – the technology – securely handle apps behavior & data breach in an hybrid (BYOD) environment • End-user App for dynamic permission management • Recommendation & automatic decision making backed by a crowd intelligence platform for App behavior and risk analysis • App sensitivity and risk analysis for the enterprise customer • Only app which doesn’t require Root permissions – The technology is protected by patent requests the company was lately filed
  • 12. - Confidential & proprietary - Competition environment – Technologies for mobile security and usability are evolving in different approaches MAIN ADVANCED BYOD SECURITY/MDM – Enterprise: • In the enterprise BYOD – only part of MDM suppliers are offering narrow permission management • There are few startups having initiatives in few approaches towards ‘real’ BYOD • Most security vendors are starting to offer mobile security (mainly via M&A) • Comilion’s strategy is based on integrating with leading MDM – Consumer: • Currently, there are no apps dealing comprehensively with the issue • There are few Apps dealing with privacy in an ‘un-orthodox’ way • Comilion’s strategy is based on generating massive install base & by creating a contributors community and aim to align with a platform manufacturer
  • 13. - Confidential & proprietary - Strategic roadmap THE STRATEGIC TARGET: HAVING PRESENCE ON 10% OF THE WORLD’S MOBILE MARKET IN 3 YEARS (APPROX 200M USERS) & GENERATING AN AVERAGE INCOME OF 0.5$/USER/YEAR Core technology Management Standard MDM Platform oriented 2 1 3 4 dev consule integration App TECHNOLOGY Consumer App Integration App management App developers with MDM features integration platform Data analysis Organizational App Full data analysis platform Advanced BYOD 1st Enterprise Beta 3-4 Enterprise Beta features (TBD) IP MDM bizDev Mass Enterprise Platform OEM BIZDEV marketing agreement Consumer Direct marketing enterprise coop MDM coop MDM OEM agreement agreements GOAL 10K users 1M users 10M users 200M users
  • 14. - Confidential & proprietary - Financials  The company is seeking to raise 1M$ Projected users & revenues which will finance the following (millions) milestones: 200 150  Launching full scope consumer app (Android +iOS) 100  Launching initial crowd intelligence platform 50  R&D for windows mobile app  Entablish a solid presence in consumer sector (for Android) 0 Y1 Y2 Y3 Y4  3-4 Beta sites for enterprise solution Revenues Consumers Enterprise  BizDev for MDM market cooperation
  • 15. - Confidential & proprietary - Kobi Freedman, CEO Tel: +972-545-772232 kobi@Comilion.com