SlideShare una empresa de Scribd logo
1 de 15
© 2011. Copyright GuardTime. All Rights Reserved.
Raul.Vahisalu@GuardTime.com
  General Manager Estonia
        21.03.2012
GuardTime
Proof of time, origin and integrity for the world’s electronic data
   Founded in Estonia in 2006
   IP of Estonian scientists Ahto Buldas and Märt Saarepera
   Accredited timestamping service provider in EU since 2007
   Financed by ASI, Brother, Singaporean Government and Hong
   Kong based Horizons Ventures




                                                                      © 2011. Copyright GuardTime. All Rights Reserved.
   Subsidiary offices in Singapore, Hong Kong, Tokyo, Beijing, San
   Diego
Hash Functions
 GuardTime’s technology is based on cryptographic hash functions
                                                                HASH VALUE

                                   HASH                        AXSJ76SNWCRVRVL
   INPUT DATA                                                  FFAONRDNZG4VUS
                                 FUNCTION                      U2HAS7DJWZR2U


                                ONE-WAY ONLY




                                                                                 © 2011. Copyright GuardTime. All Rights Reserved.
                            REVERSE CALCULATION NOT POSSIBLE




                                                                                 3
When trust is not enough
      4




                           © 2011. Copyright GuardTime. All Rights Reserved.
When trust is not enough
                                                                               TIME




      5




                           © 2011. Copyright GuardTime. All Rights Reserved.
Keyless Signatures: How It Works




     Enable any            Sign the event                     Signatures are
                                                Receive a
      system or            logs, backups,                     mathematically




                                                                                 © 2011. Copyright GuardTime. All Rights Reserved.
                                              signature for
   environment to          archives, other                     verifiable for
                                             each data item
     use Keyless              data and                         the life of the
                                                 signed
     Signatures             applications                            data


When trust is not enough                                                         6
When trust is not enough
      7




                           © 2011. Copyright GuardTime. All Rights Reserved.
Prove This Didn’t Happen
       Does your proof require that someone trust you?
                           • ‘Cleaning up’ the application and system logs
           Accidental
                           • ‘Fixing’ the backups and archives
           (admin)         • Checking in untested applications
                           • Removing application and system log entries
           Intentional
                           • Changing database records
           (admin)         • Adjusting application and system configurations




                                                                                 © 2011. Copyright GuardTime. All Rights Reserved.
                           • Removing log entries
           Malicious
                           • Changing database records
           (hacker)        • Inserting new code into the operating environment

When trust is not enough                                                         8
Use Case: Auditable Scan-To-Server
       Signing capabilities are embedded directly into the multi-functional printer
       Documents are signed after scanned and converted to PDF
       The signature is embedded within the PDF
       Signed PDF documents are stored on the server
       Recipients of the documents
       can verify the signature of the
       documents from within the
       scanned PDF




                                                                                      © 2011. Copyright GuardTime. All Rights Reserved.
       Provides proof of origin (e.g.
       which scanner), time and
       content for the stored
       documents
When trust is not enough                                                              9
International team
       Business is done by people! Our group CEO flight mileage last year - 250000
       0900-1700 Tallinn time +9h/-8h
       ~10 different nationalities
       Negotiation and communication style
       Work ethic, command of languages
       Politics, religion, women, alcohol




                                                                                      © 2011. Copyright GuardTime. All Rights Reserved.
When trust is not enough                                                             10
Research & development
       R&D is in Tallinn, Estonia
       Top of the technology pyramid
       Serendipity-led R&D
       Can innovation be outsourced?
       What is innovation?
       Accountability to investors




                                        © 2011. Copyright GuardTime. All Rights Reserved.
       Test-site Estonia




When trust is not enough               11
Sales
       What do you sell?
             Business model, Pilot, Service (consumer, infrastructure), Product, Disruptive change, Fear
       Naive, Pragmatic, Strategic
       IP
       Obstacles
             Not invented here
             Nice to have but not compulsory (through legislation)




                                                                                                            © 2011. Copyright GuardTime. All Rights Reserved.
             Too new, too disruptive for me
       Technology push v. Market pull
       „GuardTime is not a technology problem, its a marketing problem“

When trust is not enough                                                                                   12
Business model
       GuardTime is sold as a monthly subscription service based on volume
       (Transactions/Second) shared with partners and downstream channel
       Estonia as a test site for the world
       Cooperation agreement with the Estonian Government for a service free of
       charge
       In Estonia - National Archive, RIK, MKM, Levira, SEB, Elion...




                                                                                   © 2011. Copyright GuardTime. All Rights Reserved.
When trust is not enough                                                          13
Orwell 1984
       Big Brother
       Doublethink
       Thoughtcrime
       Newspeak




                            © 2011. Copyright GuardTime. All Rights Reserved.
       Memory hole


When trust is not enough   14
© 2011. Copyright GuardTime. All Rights Reserved.
           When trust is not enough



         Thank You!
Email: raul.vahisalu@guardtime.com

Más contenido relacionado

Destacado

telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutions
Fakher Oueslati
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...
Martin Ruubel
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 

Destacado (11)

telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutions
 
How Can Internet Help The Banking Sector
How Can Internet Help The Banking SectorHow Can Internet Help The Banking Sector
How Can Internet Help The Banking Sector
 
KIWI.KI - The secure infrastructure for a keyless life
KIWI.KI - The secure infrastructure for a keyless lifeKIWI.KI - The secure infrastructure for a keyless life
KIWI.KI - The secure infrastructure for a keyless life
 
Proov
ProovProov
Proov
 
EBAN Statistics 2014 - summary
EBAN Statistics 2014 - summaryEBAN Statistics 2014 - summary
EBAN Statistics 2014 - summary
 
Ksi
KsiKsi
Ksi
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Blockchain: Real World Use Cases
Blockchain: Real World Use CasesBlockchain: Real World Use Cases
Blockchain: Real World Use Cases
 
Blockchain in 2016 - Advanced Distributed Ledger Technologies
Blockchain in 2016 - Advanced Distributed Ledger TechnologiesBlockchain in 2016 - Advanced Distributed Ledger Technologies
Blockchain in 2016 - Advanced Distributed Ledger Technologies
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 

Similar a Guard time connect_estonia 21.03.2012

SplunkLive! Toronto - Ceryx
SplunkLive! Toronto - CeryxSplunkLive! Toronto - Ceryx
SplunkLive! Toronto - Ceryx
Splunk
 
Splunk at Expedia - Gartner Symposium
Splunk at Expedia - Gartner SymposiumSplunk at Expedia - Gartner Symposium
Splunk at Expedia - Gartner Symposium
Eddie Satterly
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
Shafaq Abdullah
 
Intel IT annual report
Intel IT annual report Intel IT annual report
Intel IT annual report
Low Hong Chuan
 
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundoPowered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
GeneXus
 
SplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - InteracSplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - Interac
Splunk
 

Similar a Guard time connect_estonia 21.03.2012 (20)

CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
 
토드(Toad) 신제품 및 크로스 플랫폼 전략(1)
토드(Toad) 신제품 및 크로스 플랫폼 전략(1)토드(Toad) 신제품 및 크로스 플랫폼 전략(1)
토드(Toad) 신제품 및 크로스 플랫폼 전략(1)
 
SplunkLive! Toronto - Ceryx
SplunkLive! Toronto - CeryxSplunkLive! Toronto - Ceryx
SplunkLive! Toronto - Ceryx
 
SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value
SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value
SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value
 
Splunk at Expedia - Gartner Symposium
Splunk at Expedia - Gartner SymposiumSplunk at Expedia - Gartner Symposium
Splunk at Expedia - Gartner Symposium
 
Intersect
IntersectIntersect
Intersect
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
 
Oaux wearables uob_rh.klm
Oaux wearables uob_rh.klmOaux wearables uob_rh.klm
Oaux wearables uob_rh.klm
 
Oracle Cloud Café IOT 12 avril 2016
Oracle Cloud Café IOT 12 avril 2016Oracle Cloud Café IOT 12 avril 2016
Oracle Cloud Café IOT 12 avril 2016
 
Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016
 
Tw Technology Radar Qtb Sep11
Tw Technology Radar Qtb Sep11Tw Technology Radar Qtb Sep11
Tw Technology Radar Qtb Sep11
 
Intel IT annual report
Intel IT annual report Intel IT annual report
Intel IT annual report
 
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundoPowered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
 
Project Controls Expo, 13th Nov 2013 - "A new visual way to engage executive ...
Project Controls Expo, 13th Nov 2013 - "A new visual way to engage executive ...Project Controls Expo, 13th Nov 2013 - "A new visual way to engage executive ...
Project Controls Expo, 13th Nov 2013 - "A new visual way to engage executive ...
 
Neuron Intellectual Property Management Presentation - October 2011
Neuron Intellectual Property Management Presentation - October 2011Neuron Intellectual Property Management Presentation - October 2011
Neuron Intellectual Property Management Presentation - October 2011
 
One Lead Web Demo
One Lead Web DemoOne Lead Web Demo
One Lead Web Demo
 
Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_t
 
eFolder Corporate Overview
eFolder Corporate OvervieweFolder Corporate Overview
eFolder Corporate Overview
 
SplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - InteracSplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - Interac
 

Más de connectestonia

Más de connectestonia (9)

Pooltõed patendikaitsel (Mart Enn Koppel)
Pooltõed patendikaitsel (Mart Enn Koppel)Pooltõed patendikaitsel (Mart Enn Koppel)
Pooltõed patendikaitsel (Mart Enn Koppel)
 
Arvutirakendusleiutised ja patenditrollid (Jaak Ostrat)
Arvutirakendusleiutised ja patenditrollid (Jaak Ostrat)Arvutirakendusleiutised ja patenditrollid (Jaak Ostrat)
Arvutirakendusleiutised ja patenditrollid (Jaak Ostrat)
 
Taming the Dragon- Secrets of Due Diligence (Nelson Gray)
Taming the Dragon- Secrets of Due Diligence (Nelson Gray)Taming the Dragon- Secrets of Due Diligence (Nelson Gray)
Taming the Dragon- Secrets of Due Diligence (Nelson Gray)
 
Financial Support to Enterprises – Tools Provided by Public Sector (Andrus Tr...
Financial Support to Enterprises – Tools Provided by Public Sector (Andrus Tr...Financial Support to Enterprises – Tools Provided by Public Sector (Andrus Tr...
Financial Support to Enterprises – Tools Provided by Public Sector (Andrus Tr...
 
Understanding and Making the Most of Business Angels (Alan Barell)
Understanding and Making the Most of Business Angels (Alan Barell) Understanding and Making the Most of Business Angels (Alan Barell)
Understanding and Making the Most of Business Angels (Alan Barell)
 
Perspectives for Venture Capital in Baltics and Russia (Allan Martinson)
Perspectives for Venture Capital in Baltics and Russia (Allan Martinson)Perspectives for Venture Capital in Baltics and Russia (Allan Martinson)
Perspectives for Venture Capital in Baltics and Russia (Allan Martinson)
 
The Art of Raising Money (Peter Kelly)
The Art of Raising Money (Peter Kelly)The Art of Raising Money (Peter Kelly)
The Art of Raising Money (Peter Kelly)
 
Äriühingute omandamise ja võõrandamise põhitõed. Peeter Kutman, Connect Eston...
Äriühingute omandamise ja võõrandamise põhitõed. Peeter Kutman, Connect Eston...Äriühingute omandamise ja võõrandamise põhitõed. Peeter Kutman, Connect Eston...
Äriühingute omandamise ja võõrandamise põhitõed. Peeter Kutman, Connect Eston...
 
Finantsaruandluse siseelu. Audiitori kogemuslik vaade, Connect. Veiko Hintsov...
Finantsaruandluse siseelu. Audiitori kogemuslik vaade, Connect. Veiko Hintsov...Finantsaruandluse siseelu. Audiitori kogemuslik vaade, Connect. Veiko Hintsov...
Finantsaruandluse siseelu. Audiitori kogemuslik vaade, Connect. Veiko Hintsov...
 

Último

Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 

Último (20)

UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 

Guard time connect_estonia 21.03.2012

  • 1. © 2011. Copyright GuardTime. All Rights Reserved. Raul.Vahisalu@GuardTime.com General Manager Estonia 21.03.2012
  • 2. GuardTime Proof of time, origin and integrity for the world’s electronic data Founded in Estonia in 2006 IP of Estonian scientists Ahto Buldas and Märt Saarepera Accredited timestamping service provider in EU since 2007 Financed by ASI, Brother, Singaporean Government and Hong Kong based Horizons Ventures © 2011. Copyright GuardTime. All Rights Reserved. Subsidiary offices in Singapore, Hong Kong, Tokyo, Beijing, San Diego
  • 3. Hash Functions GuardTime’s technology is based on cryptographic hash functions HASH VALUE HASH AXSJ76SNWCRVRVL INPUT DATA FFAONRDNZG4VUS FUNCTION U2HAS7DJWZR2U ONE-WAY ONLY © 2011. Copyright GuardTime. All Rights Reserved. REVERSE CALCULATION NOT POSSIBLE 3
  • 4. When trust is not enough 4 © 2011. Copyright GuardTime. All Rights Reserved.
  • 5. When trust is not enough TIME 5 © 2011. Copyright GuardTime. All Rights Reserved.
  • 6. Keyless Signatures: How It Works Enable any Sign the event Signatures are Receive a system or logs, backups, mathematically © 2011. Copyright GuardTime. All Rights Reserved. signature for environment to archives, other verifiable for each data item use Keyless data and the life of the signed Signatures applications data When trust is not enough 6
  • 7. When trust is not enough 7 © 2011. Copyright GuardTime. All Rights Reserved.
  • 8. Prove This Didn’t Happen Does your proof require that someone trust you? • ‘Cleaning up’ the application and system logs Accidental • ‘Fixing’ the backups and archives (admin) • Checking in untested applications • Removing application and system log entries Intentional • Changing database records (admin) • Adjusting application and system configurations © 2011. Copyright GuardTime. All Rights Reserved. • Removing log entries Malicious • Changing database records (hacker) • Inserting new code into the operating environment When trust is not enough 8
  • 9. Use Case: Auditable Scan-To-Server Signing capabilities are embedded directly into the multi-functional printer Documents are signed after scanned and converted to PDF The signature is embedded within the PDF Signed PDF documents are stored on the server Recipients of the documents can verify the signature of the documents from within the scanned PDF © 2011. Copyright GuardTime. All Rights Reserved. Provides proof of origin (e.g. which scanner), time and content for the stored documents When trust is not enough 9
  • 10. International team Business is done by people! Our group CEO flight mileage last year - 250000 0900-1700 Tallinn time +9h/-8h ~10 different nationalities Negotiation and communication style Work ethic, command of languages Politics, religion, women, alcohol © 2011. Copyright GuardTime. All Rights Reserved. When trust is not enough 10
  • 11. Research & development R&D is in Tallinn, Estonia Top of the technology pyramid Serendipity-led R&D Can innovation be outsourced? What is innovation? Accountability to investors © 2011. Copyright GuardTime. All Rights Reserved. Test-site Estonia When trust is not enough 11
  • 12. Sales What do you sell? Business model, Pilot, Service (consumer, infrastructure), Product, Disruptive change, Fear Naive, Pragmatic, Strategic IP Obstacles Not invented here Nice to have but not compulsory (through legislation) © 2011. Copyright GuardTime. All Rights Reserved. Too new, too disruptive for me Technology push v. Market pull „GuardTime is not a technology problem, its a marketing problem“ When trust is not enough 12
  • 13. Business model GuardTime is sold as a monthly subscription service based on volume (Transactions/Second) shared with partners and downstream channel Estonia as a test site for the world Cooperation agreement with the Estonian Government for a service free of charge In Estonia - National Archive, RIK, MKM, Levira, SEB, Elion... © 2011. Copyright GuardTime. All Rights Reserved. When trust is not enough 13
  • 14. Orwell 1984 Big Brother Doublethink Thoughtcrime Newspeak © 2011. Copyright GuardTime. All Rights Reserved. Memory hole When trust is not enough 14
  • 15. © 2011. Copyright GuardTime. All Rights Reserved. When trust is not enough Thank You! Email: raul.vahisalu@guardtime.com

Notas del editor

  1. Endast rääkida
  2. Financing process, 8mUSD in 2010
  3. Ämbrite viisi teed joonudKazakhstan v. Saudi power games, äri teha endasugustegaMentaalne kaugus, ei usu ärisse kus ise kohal ei oleKiirus, vaeva nägemineFacilitors, facilitating
  4. Mida teeme? – eriliste toodete müük, eriprojektid, milles puudub konkurents