of 16

Existence Technologies (pitch deck)

No Web Browser = No Access Point For A Breach The fundamental problem creating the “perfect storm” for data breaches is that public portals (web browsers) are the access point for delivering secure activities (email, ecommerce, online banking, etc.). Utilizing literal physical presence identification, our patented technology provides secure portal access to an organization’s secure community, to ONLY individuals the organization has independently permitted to be authorized users, WITHOUT USING WEB BROWSERS.
12 views16 pages
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Documenttranscript
  • 1. 1 Existence Technologies A PATENTED AND PROVEN SOLUTION THAT PREVENTS DATA BREACHES.
  • 2. Business Concept 2 Existence IS the Solution Our technology provides secure portal access to an organization’s secure community to ONLY individuals the organization has independently authorized, WITHOUT USING INTERNET BROWSERS. Our patented technology has been: Successfully deployed by the United States Department of Defense. Positively reviewed by Rutgers University’s Police Institute. Existence Technologies delivers a patented, deployed and proven solution to prevent data breaches.
  • 3. The Problem 3 The fundamental problem is that public websites are the access point for delivering secure activities. More than 90% of data breaches stem from email phishing scams. “Phishing” filters are NOT effective in preventing breaches. 60% of small companies suffering a cyber attack are out of business within 6 months. Web Brower Activity Exposes Data Identity Verification Robert Herjavec, CEO of Herjavec Group (12:30 mark to 15:25 mark in linked video)
  • 4. The Solution 4 Existence IS the Solution Our Solution consists of : The creation and delivery of Private Internet Dimensions for clients. Hardened, Self-Contained & Serialized CyberID Tokens. First Level OFFSITE Token Authentication. Two United States and International Patents U.S. Patent No. 8,074,261 and U.S. Patent No. 8,484,701 Our patented technology provides secure portal access to an organization’s secure community to ONLY individuals the organization has independently permitted to be authorized users, WITHOUT USING INTERNET BROWSERS.
  • 5. 5 The Solution Existence Email Our Existence Email solution DOES provide a method to differentiate “Secure” communication from public communication. HOW IT WORKS 1. Client provides an unused IP address to a server or cloud location. 2. Stand up Existence Email Server. 3. Distribute tokens to authorized individuals (i.e. employees, clients, etc.). 4. An Authentication Server is located at Existence Technologies. I. Existence Technologies server will identify submitted token connection requests as either “lost token” or “valid token”. 1. “Lost Token” = token will self destruct. 2. “Valid Token” = receives a connection to our client’s secure environment. Connected individual must provide login credentials to complete access.
  • 6. Market Summary 6 Existence IS the Solution Today there are over 3.9 billion email users globally. Business email inboxes are 25% of all email inboxes. Approximately 975 million business email inboxes are currently in use worldwide. THIS IS OUR TARGET MARKET. Nearly 90% of successful hacks and data breaches stem from email phishing scams. THIS IS WHERE OUR EXISTENCE EMAIL STOPS BREACHES.
  • 7. Current Solutions “non-effectiveness” 7  Multi-Factor (two-factor) Authentication (Multi-STEP IS NOT Multi-Factor) Security experts have demonstrated automated phishing attacks that can cut through existing Multi-Factor Authentication products. https://www.makeuseof.com/tag/top-5-websites-to-learn-how-to-hack- like-a-pro/ https://vimeo.com/212463675  Biometric Authentication Biometric information is data. As such it can be and has been stolen. In 2015 over 5.6 million individuals' fingerprints were stolen from the U.S. Office of Personnel Management breaches. https://www.opm.gov/cybersecurity/cybersecurity-incidents
  • 8. 8 “Competition” What is their non-data factor?  Many companies claim to offer 2 factor authentication solutions. (They use 2 or more data inputs, NOT 2 variables) (Multi Step IS NOT Multi Factor) What is their non-data factor?  Some high-profile companies claiming to offer 2 factors are RSA SecurID, CA Strong Authentication, Okta Verify, Quest Software’s Defender, SafeNet Authentication Service and Symantec Validation & ID Protection Service.  Competitors’ Critical Weaknesses: 1) Each one uses a browser that is corrupt and spies (data mining), which permits “public” access. 2) Each of their solutions retains public access. 3) Each of their solutions uses indirect assertion. 4) Each their solutions uses ONLY 1 variable (data).
  • 9. Competitive Advantage We own the ONLY method for directly asserting identity. 9 Existence IS the Solution No Web Browser = No Access for Breach (all other firms use browsers) 2 Patents in the United States & 11 other Countries Experienced Management Team Cooper & Dunham, LLP .
  • 10. 10 The Team Chris Murphy Founder, Chief Technology Officer and EVP of Research & Development Lance Strother President & Chief Operating Officer Tim Harper Chief Financial Officer IDENTITY PROTECTED VP of Sales, Marketing and Business Development
  • 11. Board of Directors 11 Richard Anderson / County Manager @ Fulton County (Atlanta) Georgia Chief Operations Officer @ United States Federal Reserve Vice Chairman @ Bellsouth President of Global Business Group @ AT&T Gary Fields / Field Day, Inc (real estate development & construction) Dr. Timothy S. Todd, Dean / Murray State University Arthur J. Bauernfiend College of Business Sheri H. Simon, CPA / Simon & Company, CPAs Paul C. Stewart / Director of Technology @ Space Dynamics Laboratory Commanding Officer & Director (retired) @ U.S. Naval Research Laboratory
  • 12. Financial Plan 12 Existence IS the Solution Our “Authentication as a Service” product earns $4 per month, per token for our company. Out clients (IT Consulting Companies, Insurance Companies, etc. ) will retail our product to their customers for $8-$10 per month. We will sell our CyberID tokens initially for $55 per token. Our cost to manufacture the tokens is $20 per token. Existence Technologies revenue model is based on Revenue from CyberID token sales. Monthly licensing fee for the use of our Existence Technology authentication service. REVENUE MODEL
  • 13. Financial Plan 13Year 1 2 3 4 5 SALES PROJECTIONS Number of Units 10,000 120,000 600,000 1,200,000 3,000,000 Total Deployed tokens 10,000 130,000 730,000 1,930,000 4,930,000 REVENUE Tokens $550,000 $6,600,000 $33,000,000 $66,000,000 $165,000,000 Activation Fee $80,000 $960,000 $4,800,000 $9,600,000 $24,000,000 Authentication as a Service $80,000 $3,600,000 $21,840,000 $69,960,000 $170,640,000 Existence Email $499,500 $5,994,000 $29,970,000 $59,940,000 $149,850,000 Gross Income $1,209,500 $17,154,000 $89,610,000 $205,500,000 $509,490,000 EXPENSES Cost of Goods Token Production $180,000 $2,394,000 $11,970,000 $23,940,000 $59,850,000 Personnel Admin/sales/support $790,000 $3,300,000 $5,400,000 $12,000,000 $18,000,000 Est Employment Tax 10% Salary $79,000 $330,000 $540,000 $1,200,000 $1,800,000 Non Personnel Office Rent $18,000 $60,000 $120,000 $300,000 $600,000 Advertising / Marketing $850,000 $6,000,000 $12,000,000 $36,000,000 $60,000,000 Patent Royalty Fee $57,950 $959,400 $5,181,000 $12,990,000 $32,049,000 Data Lines $1,620 $12,000 $60,000 $120,000 $300,000 Professional Services- legal $60,000 $60,000 $120,000 $300,000 $600,000 Patent Maintenance $16,000 $16,000 $16,000 $16,000 $16,000 Travel $240,000 $380,000 $600,000 $1,200,000 $1,800,000 GROSS EXPENSES $2,292,570 $13,511,400 $36,007,000 $88,066,000 $175,015,000 Net Income (EBITA) ($1,083,070) $3,642,600 $53,603,000 $117,434,000 $334,475,000 Existence Technologies Financial Projection Summary for First 5 years
  • 14. Goals and Objectives 14 Short Term Objectives (90 days to 180 days). 1) Obtain funding to manufacture tokens and hire staff. 2) Initiate pre-sale of authentication services and marketing plan. 3) Deliver tokens and activate initial users. (Certified Public Accounting firm in Louisville, Ky currently awaiting delivery of 300 tokens). 2 Year Objective  A minimum of 120,000 of our CyberID tokens in use. 3 Year Objective  Begin Phase II, roll out Existence Pay. Long Term, 5 Year Objective A minimum of 4,900,000 of our CyberID tokens in use.
  • 15. Resource Requirements 15 Existence IS the Solution Use of Capital Technology (servers, software, computers) = $120,000 Product (tokens) = $200,000 Marketing, PR, Advertising = $570,000 Personnel (IT Staff and Sales Team) = $1,110,000 Delivery to Commercial Markets requires capital funding of $2,000,000.
  • 16. 16 Existence IS The Solution Existence Technologies 601 Cleveland Street, Suite 250 Clearwater, FL 33755 Phone (727) 947-3768 Web Address www.existencetechnologies.com
  • We Need Your Support
    Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

    Thanks to everyone for your continued support.

    No, Thanks
    SAVE OUR EARTH

    We need your sign to support Project to invent "SMART AND CONTROLLABLE REFLECTIVE BALLOONS" to cover the Sun and Save Our Earth.

    More details...

    Sign Now!

    We are very appreciated for your Prompt Action!

    x