SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
© 2015 - VASCO Data Security
`
© 2015 - VASCO Data Security CONFIDENTIAL
Forward Looking Statements
Statements made in this presentation that relate to future plans, events or performances are forward-
looking statements within the meaning of Section 21e of the Securities Exchange Act of 1934 and
Section 27A of the Securities Act of 1933. These forward-looking statements (1) are identified by use
of terms and phrases such as “expect”, “believe”, “will”, “anticipate”, “emerging”, “intend”, “plan”,
“could”, “may”, “estimate”, “should”, “objective”, “goal”, “possible”, “potential”, “project” and similar
words and expressions, but such words and phrases are not the exclusive means of identifying them,
and (2) are subject to risks and uncertainties and represent our present expectations or beliefs
concerning future events. VASCO cautions that the forward-looking statements are qualified by
important factors that could cause actual results to differ materially from those in the forward-looking
statements. These risks, uncertainties and other factors that have been described in our Annual
Report on Form 10-K for the year ended December 31, 2013 and include, but are not limited to, (a)
risks of general market conditions, including currency fluctuations and the uncertainties resulting from
turmoil in world economic and financial markets, (b) risks inherent to the computer and network security
industry, including rapidly changing technology, evolving industry standards, increasingly sophisticated
hacking attempts, increasing numbers of patent infringement claims, changes in customer
requirements, price competitive bidding, and changing government regulations, and (c) risks specific to
VASCO, including, demand for our products and services, competition from more established firms and
others, pressures on price levels and our historical dependence on relatively few products, certain
suppliers and certain key customers. Thus, the results that we actually achieve may differ materially
from any anticipated results included in, or implied by these statements. Except for our ongoing
obligations to disclose material information as required by the U.S. federal securities laws, we do not
have any obligations or intention to release publicly any revisions to any forward-looking statements to
reflect events or circumstances in the future or to reflect the occurrence of unanticipated events.
2
© 2015 - VASCO Data Security CONFIDENTIAL
Company Overview
VASCO is a global leader in strong authentication, digital signatures,
and identity management solutions specializing in securing financial
transactions and protecting access to data and applications.
3
© 2015 - VASCO Data Security CONFIDENTIAL
Listed on NASDAQ in 1997
21% Compound Annual Growth Rate in
Revenues from 2004-2014
50 Consecutive Quarters of Profitability
Company Overview
4
© 2015 - VASCO Data Security CONFIDENTIAL
10,000+ Customers in more than 100 Countries,
More than half of the top 100 Global Banks
and 1,700+ Financial Institutions rely on VASCO
More than 200 Million Authenticators Sold
Company Overview
5
© 2015 - VASCO Data Security CONFIDENTIAL
Global Company
VASCO HQ
VASCO Offices
VASCO Sales
6
© 2015 - VASCO Data Security CONFIDENTIAL
Financial Institution Customers
- The world leader in two-factor authentication and
transaction signing for financial institutions.
- More than half of the top 100 global banks rely on
VASCO solutions
- More than 1,700 banking customers
7
© 2015 - VASCO Data Security CONFIDENTIAL
- Frequency and sophistication of attacks has increased
- High-profile breaches have brought security
to the C-level and Board of Directors
- Regulations to protect consumer
transactions and personal privacy
- Mobile is becoming the device of choice
- Increasing demand for transparent security
Key Growth Drivers
8
© 2015 - VASCO Data Security CONFIDENTIAL
"Two out of three attacks focus
on [login] credentials at some
point in the attack."
Verizon Data Breach
Investigations Report
The Role of Authentication
Why Authentication?
• Data breaches are up 49%(1)
• Authentication protects against the newest attacks
• Authentication is easy to implement and use
(1) The Breach Level Index, released February, 2015.
9
© 2015 - VASCO Data Security CONFIDENTIAL
VASCO Innovation Timeline
1988
1st DIGIPASS
“Access Key”
1989
1st DIGIPASS
with Keypad
2002
VACMAN
Controller
2004
DIGIPASS GO 3
1st 1-button token
2005
IDENTIKEY
SERVER
2005
DIGIPASS 810
EMV card reader
2006
DIGIPASS 905
1st connected
Card reader
2007
DIGIPASS 270
1st thin form
Token w/keypad
2008
DP for Mobile
Soft token
for phones
The First 20 Years:
1991
DIGIPASS 550
with e-Signature
10
2011
DIGIPASS 920
Connected reader
for e-Government
© 2015 - VASCO Data Security CONFIDENTIAL
2014
Rabo Scanner
Card reader with
Cronto technology
2014
DIGIPASS for Apps
with Cronto
technology
VASCO Innovation Timeline
2013
DIGIPASS for Apps
SDK for integration
into applications
2012
DIGIPASS 320
1st Authenticator
with WYSIWYS
2013
DIGIPASS 870
1st dual mode
e-Gov’t reader
2015
IDENTIKEY
Risk Manager
Anti-fraud
solution
2013
DIGIPASS 760
1st token with
Cronto technology
11
2014
DIGIPASS Bluetooth
Smart-enabled
Authenticators
2015
DIGIPASS for Apps
with RASP
Application Protection
The Last 3 Years:
© 2015 - VASCO Data Security CONFIDENTIAL
Host System
• VACMAN Controller: All VASCO authentication technologies in a
unified backend platform.
• IDENTIKEY Authentication Server: Centralized server with
complete functionality.
• Cloud Services: Authentication services hosted by VASCO.
Client Authenticators
• DIGIPASS: Industry-leading hardware and software authenticators.
Developer Tools
• DIGIPASS for Apps: Software development kit (SDK) for native
integration of application security.
VASCO Product Offerings
12
© 2015 - VASCO Data Security CONFIDENTIAL
Market Segments
Enterprise Security:
• Remote access
• Employee network access
Application Security:
• Stand-alone application
• SDK for app integration
13
Banking Security:
• Commercial Accounts
• Retail Accounts
• Employee Access
© 2015 - VASCO Data Security CONFIDENTIAL
Key Product Initiatives
Cronto
Technology
New Attack Methods Require Innovative Solutions
14
DIGIPASS
for Apps
DIGIPASS
Bluetooth-
smart
Intelligent
Fraud
Prevention
IDENTIKEY
Risk Manger
© 2015 - VASCO Data Security CONFIDENTIAL
• Next generation HD Color QR Code
• Authentication and signature
capabilities with a high level of user
convenience
• Defeats Man-in-the-Middle attacks
• Fully supported by VACMAN and
IDENTIKEY
• Integrated into DIGIPASS for
Apps/Mobile or as a hardware device
Cronto Visual Authentication
15
DIGIPASS 760
SC Magazine
April, 2015
© 2015 - VASCO Data Security CONFIDENTIAL
Cronto Visual Authentication
How it Works
16
© 2015 - VASCO Data Security CONFIDENTIAL
Cronto Visual Authentication
How it Works
17
© 2015 - VASCO Data Security CONFIDENTIAL
Mobile Application Protection
Growth in the market for mobile Apps
Source: Gartner
Estimated Mobile App Downloads Worldwide (in billions)
18
By 2017, mobile apps will be downloaded more than 268 billion times.
© 2015 - VASCO Data Security CONFIDENTIAL
Mobile Application Protection
19
• Allows any developer to integrate security features
into their application.
• Developers focus
on their application
and outsource the
security to VASCO.
• Comprehensive
library of essential
security functions.
DIGIPASS for Apps/Mobile
SC Magazine
April, 2015
Current and future features
© 2015 - VASCO Data Security CONFIDENTIAL 20
Geolocation
OS Version
JailBreak &
Root Detection
Malware
PIN Activated
ClientScorePolicy
ScoreCalculation
OTPInjection
ClientSideDecisionPolicy
Action 1
Action 2
Action 3
Action 4
Action 5
Action 6
…
1 2
3 4
Action 1
Action 2
Action 3
Action 4
Action 5
Action 6
…
ServerScorePolicy
OTPExtraction
OTPValidation
5 6
ContextPlatformUser
Mobile Application Protection
Intelligent Risk Scoring for Mobile Devices
© 2015 - VASCO Data Security CONFIDENTIAL
• Eliminates the biggest hurdles to cloud adoption
• Boosts customer trust
• Security as a competitive differentiator
• Ease of implementation
• Provides a pay-as-you-grow approach
• Next step in DIGIPASS as a Service
Cloud-based Security for Application Developers
Mobile Application Protection
21
© 2015 - VASCO Data Security CONFIDENTIAL
Bluetooth Smart-enabled
22
Bluetooth Smart enabled Authenticators
connect with almost any mobile user device
• Solves the problem of mobile devices with no USB port
• More convenient with no cables to connect
• Secure Bluetooth Smart-enabled connection
• Works in connected and unconnected mode
© 2015 - VASCO Data Security CONFIDENTIAL
How it works:
IDENTIKEY Risk Manager
Source: Gartner
23
IDENTIKEY
Risk Manger
© 2015 - VASCO Data Security CONFIDENTIAL
• Contextual analysis to apply the appropriate level of security
• Real-time analysis and intelligent decision engine focusing on:
• Web and mobile application login
• Financial transactions via online and mobile channels
• Monitoring non-monetary events such as change of address
• Identification of accounts that demonstrate abnormal characteristics
for the prevention of money laundering.
IDENTIKEY Risk Manager
Risk-Based Authentication and Fraud Prevention
24
© 2015 - VASCO Data Security CONFIDENTIAL
Financial Information
Historical Overview
25
© 2015 - VASCO Data Security CONFIDENTIAL
Revenue and Operating Income
Revenue Operating Income
in millions USD in millions USD
CAGR
(revenue)
2004-2014
21%
26
© 2015 - VASCO Data Security CONFIDENTIAL
Cash Balance and Net Working Capital
Net Cash Balance Net working capital
in millions USDin millions USD
27
© 2015 - VASCO Data Security
© 2015 - VASCO Data Security
Copyright
 2015 VASCO Data Security. All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form or by any means, electronic, mechanical, photocopying,
recording, or otherwise, without the prior written permission of VASCO Data
Security.
Trademarks
VASCO®, VACMAN®, IDENTIKEY®, aXsGUARD®, DIGIPASS®, Cronto®,
DIGIPASS for Apps®, DIGIPASS for Mobile®, MYDIGIPASS ®
MYDIGIPASS.COM® and the ® logo are registered or unregistered
trademarks of VASCO Data Security, Inc. and/or VASCO Data Security
International GmbH in the U.S. and other countries
Copyright & Trademarks
29

Weitere ähnliche Inhalte

Was ist angesagt?

Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationFIDO Alliance
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity ForgeRock
 
Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014Finjan Holdings, Inc.
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014Chin Wan Lim
 
AY - Adaptive Access Control
AY - Adaptive Access ControlAY - Adaptive Access Control
AY - Adaptive Access ControlAdrian Young
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWultra
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersFIDO Alliance
 
Digital authentication
Digital authenticationDigital authentication
Digital authenticationallanh0526
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security SecureAuth
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong AuthenticationFIDO Alliance
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlock Armour
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Alliance
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTForescout Technologies Inc
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...FIDO Alliance
 

Was ist angesagt? (20)

Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
 
Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
AY - Adaptive Access Control
AY - Adaptive Access ControlAY - Adaptive Access Control
AY - Adaptive Access Control
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary Miglicco
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and Consumers
 
Digital authentication
Digital authenticationDigital authentication
Digital authentication
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong Authentication
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud Security
 
Securing Smart Cities
Securing Smart CitiesSecuring Smart Cities
Securing Smart Cities
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming Webinar
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
 

Ähnlich wie VASCO Investor Presentation - July 29, 2015

January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presentionrodrida1
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesUbisecure
 
Intro To Observability-March-2023.pdf
Intro To Observability-March-2023.pdfIntro To Observability-March-2023.pdf
Intro To Observability-March-2023.pdfPremDomingo
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_enAlix Murphy
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyVASCO Data Security
 
Vasco Investor Presentation 11 2009
Vasco Investor Presentation 11 2009Vasco Investor Presentation 11 2009
Vasco Investor Presentation 11 2009oliverm1
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016InvestorSymantec
 
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 DatadogDDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 DatadogRaviNeppalli
 
Cyber Priority - Judson Walker
Cyber Priority - Judson WalkerCyber Priority - Judson Walker
Cyber Priority - Judson Walkerscoopnewsgroup
 
Iveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor PresentationIveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor PresentationRedChip Companies, Inc.
 
Iveda Investor Presentation
Iveda Investor PresentationIveda Investor Presentation
Iveda Investor Presentationivedasolutions
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015Cyren, Inc
 
Security Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteSecurity Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteMobiloitte
 
American Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital TrustAmerican Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital TrustBenjamin Wyrick
 
Washington DC ELEVATE ISV Track
Washington DC ELEVATE ISV Track Washington DC ELEVATE ISV Track
Washington DC ELEVATE ISV Track Salesforce Partners
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCA Technologies
 

Ähnlich wie VASCO Investor Presentation - July 29, 2015 (20)

January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presention
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with Smartphones
 
Intro To Observability-March-2023.pdf
Intro To Observability-March-2023.pdfIntro To Observability-March-2023.pdf
Intro To Observability-March-2023.pdf
 
Identikey
IdentikeyIdentikey
Identikey
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
Vasco Investor Presentation 11 2009
Vasco Investor Presentation 11 2009Vasco Investor Presentation 11 2009
Vasco Investor Presentation 11 2009
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
 
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 DatadogDDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
Cyber Priority - Judson Walker
Cyber Priority - Judson WalkerCyber Priority - Judson Walker
Cyber Priority - Judson Walker
 
Iveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor PresentationIveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor Presentation
 
Iveda Investor Presentation
Iveda Investor PresentationIveda Investor Presentation
Iveda Investor Presentation
 
WISekey presentation
WISekey presentation WISekey presentation
WISekey presentation
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015
 
Security Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteSecurity Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - Mobiloitte
 
American Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital TrustAmerican Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital Trust
 
Washington DC ELEVATE ISV Track
Washington DC ELEVATE ISV Track Washington DC ELEVATE ISV Track
Washington DC ELEVATE ISV Track
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your Customers
 

Kürzlich hochgeladen

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Kürzlich hochgeladen (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

VASCO Investor Presentation - July 29, 2015

  • 1. © 2015 - VASCO Data Security `
  • 2. © 2015 - VASCO Data Security CONFIDENTIAL Forward Looking Statements Statements made in this presentation that relate to future plans, events or performances are forward- looking statements within the meaning of Section 21e of the Securities Exchange Act of 1934 and Section 27A of the Securities Act of 1933. These forward-looking statements (1) are identified by use of terms and phrases such as “expect”, “believe”, “will”, “anticipate”, “emerging”, “intend”, “plan”, “could”, “may”, “estimate”, “should”, “objective”, “goal”, “possible”, “potential”, “project” and similar words and expressions, but such words and phrases are not the exclusive means of identifying them, and (2) are subject to risks and uncertainties and represent our present expectations or beliefs concerning future events. VASCO cautions that the forward-looking statements are qualified by important factors that could cause actual results to differ materially from those in the forward-looking statements. These risks, uncertainties and other factors that have been described in our Annual Report on Form 10-K for the year ended December 31, 2013 and include, but are not limited to, (a) risks of general market conditions, including currency fluctuations and the uncertainties resulting from turmoil in world economic and financial markets, (b) risks inherent to the computer and network security industry, including rapidly changing technology, evolving industry standards, increasingly sophisticated hacking attempts, increasing numbers of patent infringement claims, changes in customer requirements, price competitive bidding, and changing government regulations, and (c) risks specific to VASCO, including, demand for our products and services, competition from more established firms and others, pressures on price levels and our historical dependence on relatively few products, certain suppliers and certain key customers. Thus, the results that we actually achieve may differ materially from any anticipated results included in, or implied by these statements. Except for our ongoing obligations to disclose material information as required by the U.S. federal securities laws, we do not have any obligations or intention to release publicly any revisions to any forward-looking statements to reflect events or circumstances in the future or to reflect the occurrence of unanticipated events. 2
  • 3. © 2015 - VASCO Data Security CONFIDENTIAL Company Overview VASCO is a global leader in strong authentication, digital signatures, and identity management solutions specializing in securing financial transactions and protecting access to data and applications. 3
  • 4. © 2015 - VASCO Data Security CONFIDENTIAL Listed on NASDAQ in 1997 21% Compound Annual Growth Rate in Revenues from 2004-2014 50 Consecutive Quarters of Profitability Company Overview 4
  • 5. © 2015 - VASCO Data Security CONFIDENTIAL 10,000+ Customers in more than 100 Countries, More than half of the top 100 Global Banks and 1,700+ Financial Institutions rely on VASCO More than 200 Million Authenticators Sold Company Overview 5
  • 6. © 2015 - VASCO Data Security CONFIDENTIAL Global Company VASCO HQ VASCO Offices VASCO Sales 6
  • 7. © 2015 - VASCO Data Security CONFIDENTIAL Financial Institution Customers - The world leader in two-factor authentication and transaction signing for financial institutions. - More than half of the top 100 global banks rely on VASCO solutions - More than 1,700 banking customers 7
  • 8. © 2015 - VASCO Data Security CONFIDENTIAL - Frequency and sophistication of attacks has increased - High-profile breaches have brought security to the C-level and Board of Directors - Regulations to protect consumer transactions and personal privacy - Mobile is becoming the device of choice - Increasing demand for transparent security Key Growth Drivers 8
  • 9. © 2015 - VASCO Data Security CONFIDENTIAL "Two out of three attacks focus on [login] credentials at some point in the attack." Verizon Data Breach Investigations Report The Role of Authentication Why Authentication? • Data breaches are up 49%(1) • Authentication protects against the newest attacks • Authentication is easy to implement and use (1) The Breach Level Index, released February, 2015. 9
  • 10. © 2015 - VASCO Data Security CONFIDENTIAL VASCO Innovation Timeline 1988 1st DIGIPASS “Access Key” 1989 1st DIGIPASS with Keypad 2002 VACMAN Controller 2004 DIGIPASS GO 3 1st 1-button token 2005 IDENTIKEY SERVER 2005 DIGIPASS 810 EMV card reader 2006 DIGIPASS 905 1st connected Card reader 2007 DIGIPASS 270 1st thin form Token w/keypad 2008 DP for Mobile Soft token for phones The First 20 Years: 1991 DIGIPASS 550 with e-Signature 10 2011 DIGIPASS 920 Connected reader for e-Government
  • 11. © 2015 - VASCO Data Security CONFIDENTIAL 2014 Rabo Scanner Card reader with Cronto technology 2014 DIGIPASS for Apps with Cronto technology VASCO Innovation Timeline 2013 DIGIPASS for Apps SDK for integration into applications 2012 DIGIPASS 320 1st Authenticator with WYSIWYS 2013 DIGIPASS 870 1st dual mode e-Gov’t reader 2015 IDENTIKEY Risk Manager Anti-fraud solution 2013 DIGIPASS 760 1st token with Cronto technology 11 2014 DIGIPASS Bluetooth Smart-enabled Authenticators 2015 DIGIPASS for Apps with RASP Application Protection The Last 3 Years:
  • 12. © 2015 - VASCO Data Security CONFIDENTIAL Host System • VACMAN Controller: All VASCO authentication technologies in a unified backend platform. • IDENTIKEY Authentication Server: Centralized server with complete functionality. • Cloud Services: Authentication services hosted by VASCO. Client Authenticators • DIGIPASS: Industry-leading hardware and software authenticators. Developer Tools • DIGIPASS for Apps: Software development kit (SDK) for native integration of application security. VASCO Product Offerings 12
  • 13. © 2015 - VASCO Data Security CONFIDENTIAL Market Segments Enterprise Security: • Remote access • Employee network access Application Security: • Stand-alone application • SDK for app integration 13 Banking Security: • Commercial Accounts • Retail Accounts • Employee Access
  • 14. © 2015 - VASCO Data Security CONFIDENTIAL Key Product Initiatives Cronto Technology New Attack Methods Require Innovative Solutions 14 DIGIPASS for Apps DIGIPASS Bluetooth- smart Intelligent Fraud Prevention IDENTIKEY Risk Manger
  • 15. © 2015 - VASCO Data Security CONFIDENTIAL • Next generation HD Color QR Code • Authentication and signature capabilities with a high level of user convenience • Defeats Man-in-the-Middle attacks • Fully supported by VACMAN and IDENTIKEY • Integrated into DIGIPASS for Apps/Mobile or as a hardware device Cronto Visual Authentication 15 DIGIPASS 760 SC Magazine April, 2015
  • 16. © 2015 - VASCO Data Security CONFIDENTIAL Cronto Visual Authentication How it Works 16
  • 17. © 2015 - VASCO Data Security CONFIDENTIAL Cronto Visual Authentication How it Works 17
  • 18. © 2015 - VASCO Data Security CONFIDENTIAL Mobile Application Protection Growth in the market for mobile Apps Source: Gartner Estimated Mobile App Downloads Worldwide (in billions) 18 By 2017, mobile apps will be downloaded more than 268 billion times.
  • 19. © 2015 - VASCO Data Security CONFIDENTIAL Mobile Application Protection 19 • Allows any developer to integrate security features into their application. • Developers focus on their application and outsource the security to VASCO. • Comprehensive library of essential security functions. DIGIPASS for Apps/Mobile SC Magazine April, 2015 Current and future features
  • 20. © 2015 - VASCO Data Security CONFIDENTIAL 20 Geolocation OS Version JailBreak & Root Detection Malware PIN Activated ClientScorePolicy ScoreCalculation OTPInjection ClientSideDecisionPolicy Action 1 Action 2 Action 3 Action 4 Action 5 Action 6 … 1 2 3 4 Action 1 Action 2 Action 3 Action 4 Action 5 Action 6 … ServerScorePolicy OTPExtraction OTPValidation 5 6 ContextPlatformUser Mobile Application Protection Intelligent Risk Scoring for Mobile Devices
  • 21. © 2015 - VASCO Data Security CONFIDENTIAL • Eliminates the biggest hurdles to cloud adoption • Boosts customer trust • Security as a competitive differentiator • Ease of implementation • Provides a pay-as-you-grow approach • Next step in DIGIPASS as a Service Cloud-based Security for Application Developers Mobile Application Protection 21
  • 22. © 2015 - VASCO Data Security CONFIDENTIAL Bluetooth Smart-enabled 22 Bluetooth Smart enabled Authenticators connect with almost any mobile user device • Solves the problem of mobile devices with no USB port • More convenient with no cables to connect • Secure Bluetooth Smart-enabled connection • Works in connected and unconnected mode
  • 23. © 2015 - VASCO Data Security CONFIDENTIAL How it works: IDENTIKEY Risk Manager Source: Gartner 23 IDENTIKEY Risk Manger
  • 24. © 2015 - VASCO Data Security CONFIDENTIAL • Contextual analysis to apply the appropriate level of security • Real-time analysis and intelligent decision engine focusing on: • Web and mobile application login • Financial transactions via online and mobile channels • Monitoring non-monetary events such as change of address • Identification of accounts that demonstrate abnormal characteristics for the prevention of money laundering. IDENTIKEY Risk Manager Risk-Based Authentication and Fraud Prevention 24
  • 25. © 2015 - VASCO Data Security CONFIDENTIAL Financial Information Historical Overview 25
  • 26. © 2015 - VASCO Data Security CONFIDENTIAL Revenue and Operating Income Revenue Operating Income in millions USD in millions USD CAGR (revenue) 2004-2014 21% 26
  • 27. © 2015 - VASCO Data Security CONFIDENTIAL Cash Balance and Net Working Capital Net Cash Balance Net working capital in millions USDin millions USD 27
  • 28. © 2015 - VASCO Data Security
  • 29. © 2015 - VASCO Data Security Copyright  2015 VASCO Data Security. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of VASCO Data Security. Trademarks VASCO®, VACMAN®, IDENTIKEY®, aXsGUARD®, DIGIPASS®, Cronto®, DIGIPASS for Apps®, DIGIPASS for Mobile®, MYDIGIPASS ® MYDIGIPASS.COM® and the ® logo are registered or unregistered trademarks of VASCO Data Security, Inc. and/or VASCO Data Security International GmbH in the U.S. and other countries Copyright & Trademarks 29