SlideShare a Scribd company logo
© 2011. Copyright GuardTime. All Rights Reserved.
Raul.Vahisalu@GuardTime.com
  General Manager Estonia
        21.03.2012
GuardTime
Proof of time, origin and integrity for the world’s electronic data
   Founded in Estonia in 2006
   IP of Estonian scientists Ahto Buldas and Märt Saarepera
   Accredited timestamping service provider in EU since 2007
   Financed by ASI, Brother, Singaporean Government and Hong
   Kong based Horizons Ventures




                                                                      © 2011. Copyright GuardTime. All Rights Reserved.
   Subsidiary offices in Singapore, Hong Kong, Tokyo, Beijing, San
   Diego
Hash Functions
 GuardTime’s technology is based on cryptographic hash functions
                                                                HASH VALUE

                                   HASH                        AXSJ76SNWCRVRVL
   INPUT DATA                                                  FFAONRDNZG4VUS
                                 FUNCTION                      U2HAS7DJWZR2U


                                ONE-WAY ONLY




                                                                                 © 2011. Copyright GuardTime. All Rights Reserved.
                            REVERSE CALCULATION NOT POSSIBLE




                                                                                 3
When trust is not enough
      4




                           © 2011. Copyright GuardTime. All Rights Reserved.
When trust is not enough
                                                                               TIME




      5




                           © 2011. Copyright GuardTime. All Rights Reserved.
Keyless Signatures: How It Works




     Enable any            Sign the event                     Signatures are
                                                Receive a
      system or            logs, backups,                     mathematically




                                                                                 © 2011. Copyright GuardTime. All Rights Reserved.
                                              signature for
   environment to          archives, other                     verifiable for
                                             each data item
     use Keyless              data and                         the life of the
                                                 signed
     Signatures             applications                            data


When trust is not enough                                                         6
When trust is not enough
      7




                           © 2011. Copyright GuardTime. All Rights Reserved.
Prove This Didn’t Happen
       Does your proof require that someone trust you?
                           • ‘Cleaning up’ the application and system logs
           Accidental
                           • ‘Fixing’ the backups and archives
           (admin)         • Checking in untested applications
                           • Removing application and system log entries
           Intentional
                           • Changing database records
           (admin)         • Adjusting application and system configurations




                                                                                 © 2011. Copyright GuardTime. All Rights Reserved.
                           • Removing log entries
           Malicious
                           • Changing database records
           (hacker)        • Inserting new code into the operating environment

When trust is not enough                                                         8
Use Case: Auditable Scan-To-Server
       Signing capabilities are embedded directly into the multi-functional printer
       Documents are signed after scanned and converted to PDF
       The signature is embedded within the PDF
       Signed PDF documents are stored on the server
       Recipients of the documents
       can verify the signature of the
       documents from within the
       scanned PDF




                                                                                      © 2011. Copyright GuardTime. All Rights Reserved.
       Provides proof of origin (e.g.
       which scanner), time and
       content for the stored
       documents
When trust is not enough                                                              9
International team
       Business is done by people! Our group CEO flight mileage last year - 250000
       0900-1700 Tallinn time +9h/-8h
       ~10 different nationalities
       Negotiation and communication style
       Work ethic, command of languages
       Politics, religion, women, alcohol




                                                                                      © 2011. Copyright GuardTime. All Rights Reserved.
When trust is not enough                                                             10
Research & development
       R&D is in Tallinn, Estonia
       Top of the technology pyramid
       Serendipity-led R&D
       Can innovation be outsourced?
       What is innovation?
       Accountability to investors




                                        © 2011. Copyright GuardTime. All Rights Reserved.
       Test-site Estonia




When trust is not enough               11
Sales
       What do you sell?
             Business model, Pilot, Service (consumer, infrastructure), Product, Disruptive change, Fear
       Naive, Pragmatic, Strategic
       IP
       Obstacles
             Not invented here
             Nice to have but not compulsory (through legislation)




                                                                                                            © 2011. Copyright GuardTime. All Rights Reserved.
             Too new, too disruptive for me
       Technology push v. Market pull
       „GuardTime is not a technology problem, its a marketing problem“

When trust is not enough                                                                                   12
Business model
       GuardTime is sold as a monthly subscription service based on volume
       (Transactions/Second) shared with partners and downstream channel
       Estonia as a test site for the world
       Cooperation agreement with the Estonian Government for a service free of
       charge
       In Estonia - National Archive, RIK, MKM, Levira, SEB, Elion...




                                                                                   © 2011. Copyright GuardTime. All Rights Reserved.
When trust is not enough                                                          13
Orwell 1984
       Big Brother
       Doublethink
       Thoughtcrime
       Newspeak




                            © 2011. Copyright GuardTime. All Rights Reserved.
       Memory hole


When trust is not enough   14
© 2011. Copyright GuardTime. All Rights Reserved.
           When trust is not enough



         Thank You!
Email: raul.vahisalu@guardtime.com

More Related Content

Viewers also liked

telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutions
Fakher Oueslati
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...
Martin Ruubel
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 

Viewers also liked (11)

telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutions
 
How Can Internet Help The Banking Sector
How Can Internet Help The Banking SectorHow Can Internet Help The Banking Sector
How Can Internet Help The Banking Sector
 
KIWI.KI - The secure infrastructure for a keyless life
KIWI.KI - The secure infrastructure for a keyless lifeKIWI.KI - The secure infrastructure for a keyless life
KIWI.KI - The secure infrastructure for a keyless life
 
Proov
ProovProov
Proov
 
EBAN Statistics 2014 - summary
EBAN Statistics 2014 - summaryEBAN Statistics 2014 - summary
EBAN Statistics 2014 - summary
 
Ksi
KsiKsi
Ksi
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Blockchain: Real World Use Cases
Blockchain: Real World Use CasesBlockchain: Real World Use Cases
Blockchain: Real World Use Cases
 
Blockchain in 2016 - Advanced Distributed Ledger Technologies
Blockchain in 2016 - Advanced Distributed Ledger TechnologiesBlockchain in 2016 - Advanced Distributed Ledger Technologies
Blockchain in 2016 - Advanced Distributed Ledger Technologies
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 

Similar to Guard time connect_estonia 21.03.2012

SplunkLive! Toronto - Ceryx
SplunkLive! Toronto - CeryxSplunkLive! Toronto - Ceryx
SplunkLive! Toronto - Ceryx
Splunk
 
Splunk at Expedia - Gartner Symposium
Splunk at Expedia - Gartner SymposiumSplunk at Expedia - Gartner Symposium
Splunk at Expedia - Gartner Symposium
Eddie Satterly
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
Shafaq Abdullah
 
Intel IT annual report
Intel IT annual report Intel IT annual report
Intel IT annual report
Low Hong Chuan
 
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundoPowered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
GeneXus
 
SplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - InteracSplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - Interac
Splunk
 

Similar to Guard time connect_estonia 21.03.2012 (20)

CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
 
토드(Toad) 신제품 및 크로스 플랫폼 전략(1)
토드(Toad) 신제품 및 크로스 플랫폼 전략(1)토드(Toad) 신제품 및 크로스 플랫폼 전략(1)
토드(Toad) 신제품 및 크로스 플랫폼 전략(1)
 
SplunkLive! Toronto - Ceryx
SplunkLive! Toronto - CeryxSplunkLive! Toronto - Ceryx
SplunkLive! Toronto - Ceryx
 
SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value
SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value
SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value
 
Splunk at Expedia - Gartner Symposium
Splunk at Expedia - Gartner SymposiumSplunk at Expedia - Gartner Symposium
Splunk at Expedia - Gartner Symposium
 
Intersect
IntersectIntersect
Intersect
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
 
Oaux wearables uob_rh.klm
Oaux wearables uob_rh.klmOaux wearables uob_rh.klm
Oaux wearables uob_rh.klm
 
Oracle Cloud Café IOT 12 avril 2016
Oracle Cloud Café IOT 12 avril 2016Oracle Cloud Café IOT 12 avril 2016
Oracle Cloud Café IOT 12 avril 2016
 
Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016
 
Tw Technology Radar Qtb Sep11
Tw Technology Radar Qtb Sep11Tw Technology Radar Qtb Sep11
Tw Technology Radar Qtb Sep11
 
Intel IT annual report
Intel IT annual report Intel IT annual report
Intel IT annual report
 
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundoPowered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
 
Project Controls Expo, 13th Nov 2013 - "A new visual way to engage executive ...
Project Controls Expo, 13th Nov 2013 - "A new visual way to engage executive ...Project Controls Expo, 13th Nov 2013 - "A new visual way to engage executive ...
Project Controls Expo, 13th Nov 2013 - "A new visual way to engage executive ...
 
Neuron Intellectual Property Management Presentation - October 2011
Neuron Intellectual Property Management Presentation - October 2011Neuron Intellectual Property Management Presentation - October 2011
Neuron Intellectual Property Management Presentation - October 2011
 
One Lead Web Demo
One Lead Web DemoOne Lead Web Demo
One Lead Web Demo
 
Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_t
 
eFolder Corporate Overview
eFolder Corporate OvervieweFolder Corporate Overview
eFolder Corporate Overview
 
SplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - InteracSplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - Interac
 

More from connectestonia

More from connectestonia (9)

Pooltõed patendikaitsel (Mart Enn Koppel)
Pooltõed patendikaitsel (Mart Enn Koppel)Pooltõed patendikaitsel (Mart Enn Koppel)
Pooltõed patendikaitsel (Mart Enn Koppel)
 
Arvutirakendusleiutised ja patenditrollid (Jaak Ostrat)
Arvutirakendusleiutised ja patenditrollid (Jaak Ostrat)Arvutirakendusleiutised ja patenditrollid (Jaak Ostrat)
Arvutirakendusleiutised ja patenditrollid (Jaak Ostrat)
 
Taming the Dragon- Secrets of Due Diligence (Nelson Gray)
Taming the Dragon- Secrets of Due Diligence (Nelson Gray)Taming the Dragon- Secrets of Due Diligence (Nelson Gray)
Taming the Dragon- Secrets of Due Diligence (Nelson Gray)
 
Financial Support to Enterprises – Tools Provided by Public Sector (Andrus Tr...
Financial Support to Enterprises – Tools Provided by Public Sector (Andrus Tr...Financial Support to Enterprises – Tools Provided by Public Sector (Andrus Tr...
Financial Support to Enterprises – Tools Provided by Public Sector (Andrus Tr...
 
Understanding and Making the Most of Business Angels (Alan Barell)
Understanding and Making the Most of Business Angels (Alan Barell) Understanding and Making the Most of Business Angels (Alan Barell)
Understanding and Making the Most of Business Angels (Alan Barell)
 
Perspectives for Venture Capital in Baltics and Russia (Allan Martinson)
Perspectives for Venture Capital in Baltics and Russia (Allan Martinson)Perspectives for Venture Capital in Baltics and Russia (Allan Martinson)
Perspectives for Venture Capital in Baltics and Russia (Allan Martinson)
 
The Art of Raising Money (Peter Kelly)
The Art of Raising Money (Peter Kelly)The Art of Raising Money (Peter Kelly)
The Art of Raising Money (Peter Kelly)
 
Äriühingute omandamise ja võõrandamise põhitõed. Peeter Kutman, Connect Eston...
Äriühingute omandamise ja võõrandamise põhitõed. Peeter Kutman, Connect Eston...Äriühingute omandamise ja võõrandamise põhitõed. Peeter Kutman, Connect Eston...
Äriühingute omandamise ja võõrandamise põhitõed. Peeter Kutman, Connect Eston...
 
Finantsaruandluse siseelu. Audiitori kogemuslik vaade, Connect. Veiko Hintsov...
Finantsaruandluse siseelu. Audiitori kogemuslik vaade, Connect. Veiko Hintsov...Finantsaruandluse siseelu. Audiitori kogemuslik vaade, Connect. Veiko Hintsov...
Finantsaruandluse siseelu. Audiitori kogemuslik vaade, Connect. Veiko Hintsov...
 

Recently uploaded

Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot ReportFuture of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Dubai Multi Commodity Centre
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
Khaled Al Awadi
 

Recently uploaded (20)

Luxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
Luxury Artificial Plants Dubai | Plants in KSA, UAE | ShajaraLuxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
Luxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
 
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptxUnveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
 
The Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdfThe Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdf
 
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to Know
 
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot ReportFuture of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
 
sales plan presentation by mckinsey alum
sales plan presentation by mckinsey alumsales plan presentation by mckinsey alum
sales plan presentation by mckinsey alum
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
 
Understanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and EmployeesUnderstanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and Employees
 
Did Paul Haggis Ever Win an Oscar for Best Filmmaker
Did Paul Haggis Ever Win an Oscar for Best FilmmakerDid Paul Haggis Ever Win an Oscar for Best Filmmaker
Did Paul Haggis Ever Win an Oscar for Best Filmmaker
 
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
 
Salesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical Trials
Salesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical TrialsSalesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical Trials
Salesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical Trials
 
FEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service Lightning
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024
 
Falcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small BusinessesFalcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small Businesses
 
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdfMatt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
 
Potato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdfPotato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdf
 
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
 
LinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxLinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptx
 

Guard time connect_estonia 21.03.2012

  • 1. © 2011. Copyright GuardTime. All Rights Reserved. Raul.Vahisalu@GuardTime.com General Manager Estonia 21.03.2012
  • 2. GuardTime Proof of time, origin and integrity for the world’s electronic data Founded in Estonia in 2006 IP of Estonian scientists Ahto Buldas and Märt Saarepera Accredited timestamping service provider in EU since 2007 Financed by ASI, Brother, Singaporean Government and Hong Kong based Horizons Ventures © 2011. Copyright GuardTime. All Rights Reserved. Subsidiary offices in Singapore, Hong Kong, Tokyo, Beijing, San Diego
  • 3. Hash Functions GuardTime’s technology is based on cryptographic hash functions HASH VALUE HASH AXSJ76SNWCRVRVL INPUT DATA FFAONRDNZG4VUS FUNCTION U2HAS7DJWZR2U ONE-WAY ONLY © 2011. Copyright GuardTime. All Rights Reserved. REVERSE CALCULATION NOT POSSIBLE 3
  • 4. When trust is not enough 4 © 2011. Copyright GuardTime. All Rights Reserved.
  • 5. When trust is not enough TIME 5 © 2011. Copyright GuardTime. All Rights Reserved.
  • 6. Keyless Signatures: How It Works Enable any Sign the event Signatures are Receive a system or logs, backups, mathematically © 2011. Copyright GuardTime. All Rights Reserved. signature for environment to archives, other verifiable for each data item use Keyless data and the life of the signed Signatures applications data When trust is not enough 6
  • 7. When trust is not enough 7 © 2011. Copyright GuardTime. All Rights Reserved.
  • 8. Prove This Didn’t Happen Does your proof require that someone trust you? • ‘Cleaning up’ the application and system logs Accidental • ‘Fixing’ the backups and archives (admin) • Checking in untested applications • Removing application and system log entries Intentional • Changing database records (admin) • Adjusting application and system configurations © 2011. Copyright GuardTime. All Rights Reserved. • Removing log entries Malicious • Changing database records (hacker) • Inserting new code into the operating environment When trust is not enough 8
  • 9. Use Case: Auditable Scan-To-Server Signing capabilities are embedded directly into the multi-functional printer Documents are signed after scanned and converted to PDF The signature is embedded within the PDF Signed PDF documents are stored on the server Recipients of the documents can verify the signature of the documents from within the scanned PDF © 2011. Copyright GuardTime. All Rights Reserved. Provides proof of origin (e.g. which scanner), time and content for the stored documents When trust is not enough 9
  • 10. International team Business is done by people! Our group CEO flight mileage last year - 250000 0900-1700 Tallinn time +9h/-8h ~10 different nationalities Negotiation and communication style Work ethic, command of languages Politics, religion, women, alcohol © 2011. Copyright GuardTime. All Rights Reserved. When trust is not enough 10
  • 11. Research & development R&D is in Tallinn, Estonia Top of the technology pyramid Serendipity-led R&D Can innovation be outsourced? What is innovation? Accountability to investors © 2011. Copyright GuardTime. All Rights Reserved. Test-site Estonia When trust is not enough 11
  • 12. Sales What do you sell? Business model, Pilot, Service (consumer, infrastructure), Product, Disruptive change, Fear Naive, Pragmatic, Strategic IP Obstacles Not invented here Nice to have but not compulsory (through legislation) © 2011. Copyright GuardTime. All Rights Reserved. Too new, too disruptive for me Technology push v. Market pull „GuardTime is not a technology problem, its a marketing problem“ When trust is not enough 12
  • 13. Business model GuardTime is sold as a monthly subscription service based on volume (Transactions/Second) shared with partners and downstream channel Estonia as a test site for the world Cooperation agreement with the Estonian Government for a service free of charge In Estonia - National Archive, RIK, MKM, Levira, SEB, Elion... © 2011. Copyright GuardTime. All Rights Reserved. When trust is not enough 13
  • 14. Orwell 1984 Big Brother Doublethink Thoughtcrime Newspeak © 2011. Copyright GuardTime. All Rights Reserved. Memory hole When trust is not enough 14
  • 15. © 2011. Copyright GuardTime. All Rights Reserved. When trust is not enough Thank You! Email: raul.vahisalu@guardtime.com

Editor's Notes

  1. Endast rääkida
  2. Financing process, 8mUSD in 2010
  3. Ämbrite viisi teed joonudKazakhstan v. Saudi power games, äri teha endasugustegaMentaalne kaugus, ei usu ärisse kus ise kohal ei oleKiirus, vaeva nägemineFacilitors, facilitating
  4. Mida teeme? – eriliste toodete müük, eriprojektid, milles puudub konkurents