1. Sid Yenamandra
CEO & Co-Founder
sid@entreda.com
PREDICTIVE CYBERSECURITY RISK
MITIGATION SOFTWARE FOR
REGULATED ENTERPRISES
2. Seasoned leadership team
Management Team, Board Members & Investors
Sid Yenamandra
Co-founder and CEO
• Advisor, Memoir Systems (Cisco); VP
Product at Plato Networks
(Netlogic/Broadcom)
• Sr. Director of NSA funded crypto-
acceleration project
• Co-founder of multiple start-up’s
• BS EECS, UC Berkeley
Farshad Ghaffari
Co-founder, Engineering Ops
• Application Engineering, Broadcom
supporting Cisco, Netgear and 2Wire
• Network Stack Development at Sun
Microsystems
• BS EECS, UC Berkeley
Shirish Phatak
Architect
• Co-founder, Talon Storage
• CTO of Wide Area File Services at
Packeteer
Co-founder at Tacit Networks (Packeteer)
• MS IIT, MPhil Rutgers
Jay Sethuram
Chairman, Entreda
• Co-founder Fiberlane, Cerent (Cisco)
• Co-founder, StratumOne (Cisco)
• Founding Director, APIgee
• LP in multiple venture funds
Ajay Goel
Strategy and Business Development
• Managing Director for Symantec
Corporation for India and SAARC countries
• Senior Vice President (Cisco Systems, India
and SAARC)
• Country Director (Sun Microsystems)
Jens Horstmann
Partner Crestlight Ventures
• Inventor of Redbox Technology
• Founder & CEO DVDplay (NCR)
• Advisor to multiple start-up’s
• LP Founder’s Fund
2
3. Corporate highlights
• Silicon-valley based Start-up
• Cybersecurity risk management software
• 1st market: Financial services (Broker-Dealers)
• VC funded – Crestlight VC & angel investors
• Global Team - 30 Employees, HQ San Mateo CA
• Multiple patents filed, 1 granted to date
• Unify for Financial Services launch - Q4CY14
• Signed-up 10K+ business users over 30 months
• Achieved Operational B/E in Q4, 2016
• Revenue mix - 50%/50% SMB/Enterprise
• 300% Y-o-Y growth for last 2 years
• Listed in FINRA’s compliance vendor directory
Company
Background
Corporate
Milestones
3
4. Premier customer partnerships in financial services in place
B-D wide mandate to use
our software
2 of 5 largest branch offices use
our software
Shortlisted as a compliance
resource provider
Partnership to offer our
software to 100K+ RIA firms
Partnership to offer our
software to 5K+ RIA firms
Partnership to offer our software
to 80K+ RIA firms
7th
largest US Insurance
Company owns 4 B-Ds
#1
Independent Broker
Dealer in the U.S.
4
5. Our breakthrough:
Pro-active risk mitigation for users, devices & networks
Today
Manual and Siloed
Automated
Integrated
IT Service Delivery
and Support
IT Governance, Risk
and Compliance
ITSoftwareManagement
User
Authentication
Log
Analysis
VPN
Remote
Desktop
Anti-virus MDM
Patch
Management
Firewall/IDS
Asset
Tracking
Password
Manager
Incident
Reporting
Data-DrivenWorkflow-based
Cyber
Risk
Score:
690
5
6. Automated cybersecurity policy enforcement
with integrated remediation applications
User installs light-weight
Entreda agent software
on all devices including
mobile devices.
Active
Monitoring Agent
Multi-user
Console
GRC integrated
with IT Software
24x7 Compliance
Reports
Compliance analytics
integrated with applications enables
intuitive and
automated user experience.
Single pane-of-glass
management for cybersecurity
policy enforcement with
real-time analytics.
Easy to understand alerts and
reports inline with
SEC & FINRA regulatory policy
guidelines.
• Behavioral scoring
• Contextual Remediations
• Real-time notifications
Secure Remote
Desktop
User
Management
Auto
VPN
File sharing
Policy Engine
SMRH:434326567.4 -1-
[FORM OF] INFORMATION SECURITY POLICY
[Tip: This Information Security Policy is only a form and must be customized to your business. Please
see the disclaimers below.]
Purpose. The purpose of this Information Security Policy (this “Policy”) is to comply with all applicable
laws and regulations designed to protect the nonpublic personal information (the “Private Information”)
of the customers (the “Customers”) advised by [insert Firm Name] (“Firm”, “we”, “us” or “our”) who
are natural persons, as well as natural persons consisting of our employees and service providers with
whom Firm does business (each, a “Protected Person”). The Information Security Policy is designed to
accomplish the following: (a) to ensure the security and confidentiality of Private Information in a manner
consistent with industry standards and as required by applicable state and federal law; (b) to protect
against any anticipated threats or hazards to the security or integrity of the Private Information; and (c) to
protect against unauthorized access to or use of the Private Information that could result in substantial risk
of harm or inconvenience to any Protected Person.
Compliance Officer. ____________________ is our Information Security Policy “Compliance Officer.”
It is [his][her] responsibility to implement, maintain, administer and coordinate the effectiveness of the
Information Security Policy. Any questions or comments regarding this Policy should be directed to the
Compliance Officer. Following the resignation or removal of the current Compliance Officer, the Firm
shall as soon as reasonably practicable appoint another person as the new Compliance Officer. [Tip:
Generally, the Compliance Officer is an employee of the Firm. In certain instances, the Compliance
Officer may be from a third party vendor that provides certain outsourced services to the Firm.]
Risk Assessment. As of the adoption of this Policy, we have identified the following potential risks to the
security, confidentiality and integrity of Private Information that could result in the unauthorized
disclosure, misuse, alteration, or other compromise of such information: [Tip: The Firm should run an
initial risk assessment with Entreda’s assistance at the beginning of the relationship with Entreda to
analyze the risks that the Firm has. The below is a sample set of risks that a Firm may have and may not
represent all the risks of a particular firm.]
• Unauthorized access to documents containing Private Information by our personnel, service
providers, Protected Persons or third parties;
• Inappropriate use or disclosure of Private Information by personnel, service providers, Protected
Persons or third parties who are authorized to have access to Private Information;
• General security risks posed to our information technology system, including the theft of
computers or other equipment permitting access to Private Information, the loss of Private
Information due to electrical outages or other computer system failures, and the introduction of
viruses into our information technology system; and
• The loss of documents containing Private Information through unanticipated physical hazards
such as fire, earthquakes, floods or other natural disasters.
The Compliance Officer shall periodically re-assess the reasonably foreseeable risks to the security,
confidentiality and integrity of Private Information. Such assessment will include analysis of, among
other things, (i) the effectiveness of personnel training and management with regard to the treatment and
handling of Private Information, (ii) the reliability and suitability of our information technology systems
in light of the objectives of this Policy, including network software design, as well as information
processing, storage, transmission and disposal, and (iii) the ability to detect, prevent and respond to
attacks, intrusions or other system failures.
Limiting Private Information. The Firm will generally limit the amount of Private Information collected
to that reasonably necessary to accomplish the legitimate purpose for which it is collected. [Option 1:
Weekly reports Cyber security
Policy
6
7. Cybersecurity Risk Mitigation with Predictive Analytics
7
Risk Heuristics
3rd Party threat databases, customers
IT Governance, Risk and
Compliance controls
GRC Frameworks – HIPAA, SEC, FINRA
Cybersecurity Applications
SIEM Anti-virus Firewall
Networks
Devices
Users
Enterprise
Device
Data
User
Behavior
Network
Data
Predictive
Scoring
Policy
Engine
Decision
Engine
Pattern
log
Remediation
Services
Alerts and
Notifications
Cybersecurity R
isk Score
690
8. Our unique and sustainable advantage …
Team expertise
with heterogeneous
platforms and devices
Technology Patents
filed on analytics and service
provisioning framework
Partnerships
with B-D, RIA, MF
and custodial platforms
Cybersecurity Risk Mitigation Software
Data-driven architecture
• Analytics-first approach
• Predictive modeling and ML
Hybrid cloud policy orchestration
• Monitoring, remediation and reporting for cloud
and/or on-premise infrastructure
Built-in remediation apps
• Custom developed thin applications
• Scalability with 3rd Party API integrations
8