SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
JCJ Business
JCJ
Proprietary & Confidential
Corporate Overview
• JCJ provides solutions to governments,
service provider sand enterprises seeking to achieve
full control of Skype within their networks.
• JCJ was founded in April, 2010.
– Offices located in the U.S and Canada
– $800K initial angel investment
– Headcount – 8 employees and contractors
• JCJ solutions protected by patents:
– Skype detection and blocking
– Skype traffic analysis
– Skype Legal Intercept
– Defensive capabilities that protect customer networks and assets from Skype based attacks and
exploits
– Offensive capabilities based on Skype infrastructure
– Intelligence collection using Skype infrastructure
• Only available from JCJ
• Deployed within US government and overseas in telecom infrastructure supporting 30+
million people
2
What is Skype?
Network of 800 million users and 30% of global telco traffic
3
SuperNode
SuperNode
SuperNode
Relay
RelayRelay
Vulnerabilities to Networks
• P2P - Decentralized & distributed
• Bypasses firewalls, IPS and NAT
• Unmanageable
• Untraceable
• Undetectable
• Exposes organizations to significant risk
Benefits to Skype User
• Highly secure proprietary encrypted signalling
• Highly secure proprietary encrypted media (voice,
video, IM, files)
• Extremely cost effective
• Best in class obfuscation and anti-debugging
protection
Client
Client
Skype Global Market
• 800+ million registered users, 45 million concurrent users on-line
• Strong move to wireless space via smartphones.
• Moving to consumer products such as TV sets.
• Tight integration with Microsoft products
• Integration with Facebook (1 billion users).
• Corporate security managers see Skype as a potential threat.
• Skype for iPhone and Android represent a threat to telecoms
4
Challenges of Skype
• Security and Compliance
– Enables untraceable transfer of information from/to enterprises using Skype
file transfer, IM, voice and video channels (source code, client information,
trade secrets, etc.)
• Telco's revenues
– Skype heavily impacting voice revenue due to usage of data components of
the calling plans
• Network enumeration and reconnaissance
– Allows to obtain external/internal IP addresses of devices behind firewalls/NAT
– Enhances attacker ability to perform targeted attacks on targets
• Cyber attacks
– Ideal platform for launching sophisticated attacks (bypasses security
infrastructure)
• Legal Intercept
– Fully encrypted communication
• Network Resources
– Unauthorized utilization of computing and network resources
– Skype video calls can reach a peak at 500 kbit/s per user, taxing the
enterprise infrastructure
5
JCJ Value Proposition
• Manage and control unwanted/unauthorized communications within, as well as, to and
from the network through visibility to Skype.
• Provide Skype reporting, tracking, and historical communications records for applications
like Skype, across the network, ensuring compliance with internal security practices and
industry requirements.
• Provides Skype blocking capabilities in conjunction with 3rd party firewalls,
IPS, etc.
• Enables telcos to control and manage Skype traffic
• Provides Skype Legal Intercept (LI) capabilities
• Enable the organizations to rapidly respond to, and defend against,
Skype born cyber attacks.
• Enables implementation of unique offensive capabilities based on
Skype infrastructure
• Reclaim enterprise assets and reduce expenses associated with them by managing
resources hijacked by Skype applications
JCJ Products and Solutions
7
• Detection Engine™ provides 100% reliable detection of Skype
traffic:
• Collection of information about Skype users, calls, sessions and other
information related Skype usage
• Very high performance (proven in production) - 10 and 20 Gbit/s
• Network connectivity – in-line or network tap
• Provides Skype blocking capabilities in conjunction with 3rd party
firewalls, IPS, etc.
• Implementation – Stand-alone product or OEM
• Analytical Engine™ works in concert with Detection Engines and
provides:
• Skype usage statistics reports
• maps of Skype network providing comprehensive view of
infrastructure, clients, relays and other resources used by Skype
• Centralized management for Detection Engines infrastructure
JCJ Products and Solutions
8
• Skype LI™ uses the infrastructure provided by Detection
Engine™ and Analytical Engine to collect content of the
communication carried over Skype voice, video and IM
channels.
• Skype DLP™ provides protection against data leakage
utilizing Skype infrastructure.
• Specialized capabilities available to government customers
JCJ Technology Stack
JCJ Products Roadmap
10
 Enhancements to Existing Solutions and Products:
 10Gbit/sec Skype media type identification
 Skype conferencing and call out handling
 Support for Skype/Facebook
 Integration with firewalls using OpenFlow
 GUI enhancements
 New Product Functionality
 RipTide Data Leakage Protection
 Expanded support for mobile devices
 Enhanced LI
 Skype Blocking Solutions
JCJ Customers
11
• Oversea Service Provider
 Skype Legal Intercept Solution
 30+ million people
 24x10 Gbit/s pipes
 14 Detection Engines
 1 Analytical Engine
 LI module
 Several more deployment expected next year
• US Government Agency
 Specialized capabilities
Potential License Sales Revenue
12
• Average large deal size (24x10 Gbit/s pipes)
 Software/Appliances - $4,175,000
 Implementation – $20,000
 Average Sale – $4,195,000
 Support @20%/year - $835,000
• Average medium deal size (8x10 Gbit/s pipes)
 Software/Appliances - $1,925,000
 Implementation – $10,000
 Average Sale – $1,925,000
 Support @20%/year - $385,000
• Average small size deal (1x10 Gbit/s pipe)
 Software/Appliances - $1,250,000
 Implementation – $10,000
 Average Sale – $1,260,000
 Support @20%/year - $252,000
Market Analysis
13
• Market segments:
• Government agencies globally
• Service Providers globally
• Enterprises North America and Europe
• Market Segment – JCJ Solutions
• Government agencies globally – Skype LI, special cyber capabilities
• Service Providers - Skype detection and management
• Enterprises – Skype detection and management including Data Leakage Protection (DLP)
• Market Segments – TAM, 2013
• Governments - 90 countries ~ $400M
• Service Providers – top 100 ~ $200M
• Fortune 500 and Europe 500 - ~ $100M
• TAM - ~$700M
• Market share targets:
• 2013 – 1% of the total market
• 2014 – 4% of the total market
• 2015 - 8% of the total market
Government
Service Providers
Fortune 500 and Europe
500
Competition
14
Existing solutions use statistical and behavioral analysis
to identify and/or block Skype:
 High false/positive
 Outdated
 No Skype control, statistics, content, etc.
 No LI capabilities
No Direct Competition – Technology Is Only Available From JCJ
JCJ IP
15
• Complete, in-depth knowledge of Skype protocols,
applications and network topology built over the
last 3 years
• Products and Solutions
• Research team
• Two non-provisional patents pending (09/2011) –
 “Method and Detection System for Detecting Encrypted Peer-to-peer (EP2P) Sessions Associated With a
Particular EP2P Network”
 “Method and Discovery System for Discovering Encrypted Peer-to-peer (EP2P) Nodes Associated With a
Particular EP2P Network”
• Two provisional patents –
 “Systems And Methods For Implementing Lawful Interception On Encrypted and/or Obfuscated P2P
Communication Network”
 “Systems and Methods for Preventing And Blocking Network Security Attacks Executed Through Encrypted
and/or Obfuscated P2P Communication Networks”

Weitere ähnliche Inhalte

Was ist angesagt?

Tech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentationTech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentationJisc
 
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications DataAlex G. Lee, Ph.D. Esq. CLP
 
Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...
Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...
Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...APNIC
 
PhNOG Regional Conference 2018: Strengthening Internet infrastructure in the ...
PhNOG Regional Conference 2018: Strengthening Internet infrastructure in the ...PhNOG Regional Conference 2018: Strengthening Internet infrastructure in the ...
PhNOG Regional Conference 2018: Strengthening Internet infrastructure in the ...APNIC
 
Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24APNIC
 
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRTMMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRTAPNIC
 
PacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities Update
PacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities UpdatePacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities Update
PacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities UpdateAPNIC
 
Vertu's Digital Transformation
Vertu's Digital TransformationVertu's Digital Transformation
Vertu's Digital TransformationRobert Charlton
 
APNIC Update, NPNOG 0.5
APNIC Update, NPNOG 0.5APNIC Update, NPNOG 0.5
APNIC Update, NPNOG 0.5APNIC
 
IANA Transition Update, August 2016
IANA Transition Update, August 2016IANA Transition Update, August 2016
IANA Transition Update, August 2016APNIC
 
IANA: Who, What, Why?
IANA: Who, What, Why?IANA: Who, What, Why?
IANA: Who, What, Why?APNIC
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOGSiena Perry
 
Drilling down into networks from the APNIC data
Drilling down into networks from the APNIC dataDrilling down into networks from the APNIC data
Drilling down into networks from the APNIC dataAPNIC
 
A Secure & Reliable Wi-Fi Experience at The Federal Court of Malaysia
A Secure & Reliable Wi-Fi Experience at The Federal Court of MalaysiaA Secure & Reliable Wi-Fi Experience at The Federal Court of Malaysia
A Secure & Reliable Wi-Fi Experience at The Federal Court of Malaysia4ipnet
 
UN INCB: RIRs and LEAs
UN INCB: RIRs and LEAsUN INCB: RIRs and LEAs
UN INCB: RIRs and LEAsAPNIC
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Burton Lee
 
Whois - Addressing the Asia Pacifc
Whois - Addressing the Asia PacifcWhois - Addressing the Asia Pacifc
Whois - Addressing the Asia PacifcAPNIC
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056mashiur
 
How APNIC can support law enforcement agencies in cybercrime investigtaion
How APNIC can support law enforcement agencies in cybercrime investigtaionHow APNIC can support law enforcement agencies in cybercrime investigtaion
How APNIC can support law enforcement agencies in cybercrime investigtaionAPNIC
 

Was ist angesagt? (20)

Tech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentationTech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentation
 
Forti wifi
Forti wifiForti wifi
Forti wifi
 
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
 
Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...
Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...
Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...
 
PhNOG Regional Conference 2018: Strengthening Internet infrastructure in the ...
PhNOG Regional Conference 2018: Strengthening Internet infrastructure in the ...PhNOG Regional Conference 2018: Strengthening Internet infrastructure in the ...
PhNOG Regional Conference 2018: Strengthening Internet infrastructure in the ...
 
Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24
 
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRTMMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
 
PacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities Update
PacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities UpdatePacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities Update
PacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities Update
 
Vertu's Digital Transformation
Vertu's Digital TransformationVertu's Digital Transformation
Vertu's Digital Transformation
 
APNIC Update, NPNOG 0.5
APNIC Update, NPNOG 0.5APNIC Update, NPNOG 0.5
APNIC Update, NPNOG 0.5
 
IANA Transition Update, August 2016
IANA Transition Update, August 2016IANA Transition Update, August 2016
IANA Transition Update, August 2016
 
IANA: Who, What, Why?
IANA: Who, What, Why?IANA: Who, What, Why?
IANA: Who, What, Why?
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOG
 
Drilling down into networks from the APNIC data
Drilling down into networks from the APNIC dataDrilling down into networks from the APNIC data
Drilling down into networks from the APNIC data
 
A Secure & Reliable Wi-Fi Experience at The Federal Court of Malaysia
A Secure & Reliable Wi-Fi Experience at The Federal Court of MalaysiaA Secure & Reliable Wi-Fi Experience at The Federal Court of Malaysia
A Secure & Reliable Wi-Fi Experience at The Federal Court of Malaysia
 
UN INCB: RIRs and LEAs
UN INCB: RIRs and LEAsUN INCB: RIRs and LEAs
UN INCB: RIRs and LEAs
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
 
Whois - Addressing the Asia Pacifc
Whois - Addressing the Asia PacifcWhois - Addressing the Asia Pacifc
Whois - Addressing the Asia Pacifc
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
How APNIC can support law enforcement agencies in cybercrime investigtaion
How APNIC can support law enforcement agencies in cybercrime investigtaionHow APNIC can support law enforcement agencies in cybercrime investigtaion
How APNIC can support law enforcement agencies in cybercrime investigtaion
 

Ähnlich wie Jcj corporate blind overview november 19 2012 1-1

Pc tech pitch deck
Pc tech pitch deckPc tech pitch deck
Pc tech pitch deckJune Barrett
 
Ether2 "The Net...fixed" (or "how to close the digital divide")
Ether2 "The Net...fixed" (or "how to close the digital divide")Ether2 "The Net...fixed" (or "how to close the digital divide")
Ether2 "The Net...fixed" (or "how to close the digital divide")Jonathan Gael
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC ProjectERPScan
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
IT and OT Convergence
IT and OT ConvergenceIT and OT Convergence
IT and OT ConvergenceOpsRamp
 
CambridgeIP: Marketing Your Technology in the Credit Crunch
CambridgeIP: Marketing Your Technology in the Credit CrunchCambridgeIP: Marketing Your Technology in the Credit Crunch
CambridgeIP: Marketing Your Technology in the Credit CrunchCambridgeIP Ltd
 
PCTech Pitch Deck
PCTech Pitch DeckPCTech Pitch Deck
PCTech Pitch DeckDon Russell
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution Naved Ahmed
 
SIPfoundry CoLab 2013 - Specific customer case studies for sipXecs and ROI an...
SIPfoundry CoLab 2013 - Specific customer case studies for sipXecs and ROI an...SIPfoundry CoLab 2013 - Specific customer case studies for sipXecs and ROI an...
SIPfoundry CoLab 2013 - Specific customer case studies for sipXecs and ROI an...SIPfoundry
 
IOT_module_3.pdf
IOT_module_3.pdfIOT_module_3.pdf
IOT_module_3.pdfAmitH42
 
Final Presentation
Final PresentationFinal Presentation
Final Presentationchris odle
 
Telecom italia oss transformation roadmap marco daccò venice 2010
Telecom italia  oss transformation roadmap   marco daccò venice 2010Telecom italia  oss transformation roadmap   marco daccò venice 2010
Telecom italia oss transformation roadmap marco daccò venice 2010Marco Daccò
 
CIC _ 2.0 ver 1.06-AI
CIC _ 2.0 ver 1.06-AICIC _ 2.0 ver 1.06-AI
CIC _ 2.0 ver 1.06-AIAhmed Ismail
 
Skylads - Big Data for Telcos
Skylads - Big Data for TelcosSkylads - Big Data for Telcos
Skylads - Big Data for TelcosXavier Litt
 
Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...Bosnia Agile
 

Ähnlich wie Jcj corporate blind overview november 19 2012 1-1 (20)

Decision group company_profile_2017
Decision group company_profile_2017Decision group company_profile_2017
Decision group company_profile_2017
 
Pc tech pitch deck
Pc tech pitch deckPc tech pitch deck
Pc tech pitch deck
 
Ether2 "The Net...fixed" (or "how to close the digital divide")
Ether2 "The Net...fixed" (or "how to close the digital divide")Ether2 "The Net...fixed" (or "how to close the digital divide")
Ether2 "The Net...fixed" (or "how to close the digital divide")
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
IT and OT Convergence
IT and OT ConvergenceIT and OT Convergence
IT and OT Convergence
 
CambridgeIP: Marketing Your Technology in the Credit Crunch
CambridgeIP: Marketing Your Technology in the Credit CrunchCambridgeIP: Marketing Your Technology in the Credit Crunch
CambridgeIP: Marketing Your Technology in the Credit Crunch
 
PCTech Pitch Deck
PCTech Pitch DeckPCTech Pitch Deck
PCTech Pitch Deck
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
SIPfoundry CoLab 2013 - Specific customer case studies for sipXecs and ROI an...
SIPfoundry CoLab 2013 - Specific customer case studies for sipXecs and ROI an...SIPfoundry CoLab 2013 - Specific customer case studies for sipXecs and ROI an...
SIPfoundry CoLab 2013 - Specific customer case studies for sipXecs and ROI an...
 
IOT_module_3.pdf
IOT_module_3.pdfIOT_module_3.pdf
IOT_module_3.pdf
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Telecom italia oss transformation roadmap marco daccò venice 2010
Telecom italia  oss transformation roadmap   marco daccò venice 2010Telecom italia  oss transformation roadmap   marco daccò venice 2010
Telecom italia oss transformation roadmap marco daccò venice 2010
 
CIC _ 2.0 ver 1.06-AI
CIC _ 2.0 ver 1.06-AICIC _ 2.0 ver 1.06-AI
CIC _ 2.0 ver 1.06-AI
 
Skylads - Big Data for Telcos
Skylads - Big Data for TelcosSkylads - Big Data for Telcos
Skylads - Big Data for Telcos
 
Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
EasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng OeiEasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng Oei
 

Kürzlich hochgeladen

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Kürzlich hochgeladen (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Jcj corporate blind overview november 19 2012 1-1

  • 2. Corporate Overview • JCJ provides solutions to governments, service provider sand enterprises seeking to achieve full control of Skype within their networks. • JCJ was founded in April, 2010. – Offices located in the U.S and Canada – $800K initial angel investment – Headcount – 8 employees and contractors • JCJ solutions protected by patents: – Skype detection and blocking – Skype traffic analysis – Skype Legal Intercept – Defensive capabilities that protect customer networks and assets from Skype based attacks and exploits – Offensive capabilities based on Skype infrastructure – Intelligence collection using Skype infrastructure • Only available from JCJ • Deployed within US government and overseas in telecom infrastructure supporting 30+ million people 2
  • 3. What is Skype? Network of 800 million users and 30% of global telco traffic 3 SuperNode SuperNode SuperNode Relay RelayRelay Vulnerabilities to Networks • P2P - Decentralized & distributed • Bypasses firewalls, IPS and NAT • Unmanageable • Untraceable • Undetectable • Exposes organizations to significant risk Benefits to Skype User • Highly secure proprietary encrypted signalling • Highly secure proprietary encrypted media (voice, video, IM, files) • Extremely cost effective • Best in class obfuscation and anti-debugging protection Client Client
  • 4. Skype Global Market • 800+ million registered users, 45 million concurrent users on-line • Strong move to wireless space via smartphones. • Moving to consumer products such as TV sets. • Tight integration with Microsoft products • Integration with Facebook (1 billion users). • Corporate security managers see Skype as a potential threat. • Skype for iPhone and Android represent a threat to telecoms 4
  • 5. Challenges of Skype • Security and Compliance – Enables untraceable transfer of information from/to enterprises using Skype file transfer, IM, voice and video channels (source code, client information, trade secrets, etc.) • Telco's revenues – Skype heavily impacting voice revenue due to usage of data components of the calling plans • Network enumeration and reconnaissance – Allows to obtain external/internal IP addresses of devices behind firewalls/NAT – Enhances attacker ability to perform targeted attacks on targets • Cyber attacks – Ideal platform for launching sophisticated attacks (bypasses security infrastructure) • Legal Intercept – Fully encrypted communication • Network Resources – Unauthorized utilization of computing and network resources – Skype video calls can reach a peak at 500 kbit/s per user, taxing the enterprise infrastructure 5
  • 6. JCJ Value Proposition • Manage and control unwanted/unauthorized communications within, as well as, to and from the network through visibility to Skype. • Provide Skype reporting, tracking, and historical communications records for applications like Skype, across the network, ensuring compliance with internal security practices and industry requirements. • Provides Skype blocking capabilities in conjunction with 3rd party firewalls, IPS, etc. • Enables telcos to control and manage Skype traffic • Provides Skype Legal Intercept (LI) capabilities • Enable the organizations to rapidly respond to, and defend against, Skype born cyber attacks. • Enables implementation of unique offensive capabilities based on Skype infrastructure • Reclaim enterprise assets and reduce expenses associated with them by managing resources hijacked by Skype applications
  • 7. JCJ Products and Solutions 7 • Detection Engine™ provides 100% reliable detection of Skype traffic: • Collection of information about Skype users, calls, sessions and other information related Skype usage • Very high performance (proven in production) - 10 and 20 Gbit/s • Network connectivity – in-line or network tap • Provides Skype blocking capabilities in conjunction with 3rd party firewalls, IPS, etc. • Implementation – Stand-alone product or OEM • Analytical Engine™ works in concert with Detection Engines and provides: • Skype usage statistics reports • maps of Skype network providing comprehensive view of infrastructure, clients, relays and other resources used by Skype • Centralized management for Detection Engines infrastructure
  • 8. JCJ Products and Solutions 8 • Skype LI™ uses the infrastructure provided by Detection Engine™ and Analytical Engine to collect content of the communication carried over Skype voice, video and IM channels. • Skype DLP™ provides protection against data leakage utilizing Skype infrastructure. • Specialized capabilities available to government customers
  • 10. JCJ Products Roadmap 10  Enhancements to Existing Solutions and Products:  10Gbit/sec Skype media type identification  Skype conferencing and call out handling  Support for Skype/Facebook  Integration with firewalls using OpenFlow  GUI enhancements  New Product Functionality  RipTide Data Leakage Protection  Expanded support for mobile devices  Enhanced LI  Skype Blocking Solutions
  • 11. JCJ Customers 11 • Oversea Service Provider  Skype Legal Intercept Solution  30+ million people  24x10 Gbit/s pipes  14 Detection Engines  1 Analytical Engine  LI module  Several more deployment expected next year • US Government Agency  Specialized capabilities
  • 12. Potential License Sales Revenue 12 • Average large deal size (24x10 Gbit/s pipes)  Software/Appliances - $4,175,000  Implementation – $20,000  Average Sale – $4,195,000  Support @20%/year - $835,000 • Average medium deal size (8x10 Gbit/s pipes)  Software/Appliances - $1,925,000  Implementation – $10,000  Average Sale – $1,925,000  Support @20%/year - $385,000 • Average small size deal (1x10 Gbit/s pipe)  Software/Appliances - $1,250,000  Implementation – $10,000  Average Sale – $1,260,000  Support @20%/year - $252,000
  • 13. Market Analysis 13 • Market segments: • Government agencies globally • Service Providers globally • Enterprises North America and Europe • Market Segment – JCJ Solutions • Government agencies globally – Skype LI, special cyber capabilities • Service Providers - Skype detection and management • Enterprises – Skype detection and management including Data Leakage Protection (DLP) • Market Segments – TAM, 2013 • Governments - 90 countries ~ $400M • Service Providers – top 100 ~ $200M • Fortune 500 and Europe 500 - ~ $100M • TAM - ~$700M • Market share targets: • 2013 – 1% of the total market • 2014 – 4% of the total market • 2015 - 8% of the total market Government Service Providers Fortune 500 and Europe 500
  • 14. Competition 14 Existing solutions use statistical and behavioral analysis to identify and/or block Skype:  High false/positive  Outdated  No Skype control, statistics, content, etc.  No LI capabilities No Direct Competition – Technology Is Only Available From JCJ
  • 15. JCJ IP 15 • Complete, in-depth knowledge of Skype protocols, applications and network topology built over the last 3 years • Products and Solutions • Research team • Two non-provisional patents pending (09/2011) –  “Method and Detection System for Detecting Encrypted Peer-to-peer (EP2P) Sessions Associated With a Particular EP2P Network”  “Method and Discovery System for Discovering Encrypted Peer-to-peer (EP2P) Nodes Associated With a Particular EP2P Network” • Two provisional patents –  “Systems And Methods For Implementing Lawful Interception On Encrypted and/or Obfuscated P2P Communication Network”  “Systems and Methods for Preventing And Blocking Network Security Attacks Executed Through Encrypted and/or Obfuscated P2P Communication Networks”