SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Pro-active behavior-based antivirus
system of new generation - Smart UAC



                            IT
Project description
•   The presence of anti-virus technologies responsive to new threats is a critical factor in
    the defense and sovereignty of the state. Traditional antivirus systems do not manage
    to update the databases in time, because thousands of new threats appear every day.
•   Moreover, such software entrusts a decision-making process entirely to the user – the
    weakest part in the security system.
•   The project Smart UAC is aimed to provide users with an antivirus solution that finally
    is able to prevent virus epidemic, without waiting for database updates, and not
    putting the responsibility of decision-making on the user.
•   Smart UAC is antivirus system of new generation, which combines the best aspects of
    existing methods: behavior-based analysis and traces-based analysis.
Proven advantages of the
    technology over main competitors
•   Due to the tests conducted in Security Stronghold laboratory by our virus analysts,
    researches of users’ focus groups and online users testing we can say that the main
    advantage of Smart UAC is the level of protection, the ability to fight against
    unknown threats and to prevent virus epidemics in a short time (due to behavioral
    techniques and instantly transmission of information about the threat to their
    copies worldwide).
•   Another advantage is complex product offer: antivirus, cyber threats protection,
    protection against Trojans, content filtering and graphical analysis.
Expected advantages of the
    technology over main competitors
•   It takes the user’s psychology into account.
•   It is able to educate itself through the user’s choices.
•   Less involvement of the user into the process leads to the automatic scanning of
    the intercepted processes with the use of the large database of already known
    threats.
Current R&D Status
•   Beta version of the software with basic functionality (antivirus, cyber threats
    protection, protection against Trojans) is ready and tested by 5K users.
•   The Company is developing decision making and content filtering modules. The
    software is constantly being improved.
•   In the near future: full completion of the functional of anti-virus system; release of
    Pro, Enterprise and Free versions; active patenting; carrying out the expanded
    advertising campaign; active sales.
•   Has got 2 patents (probabilistic antivirus analysis of objects), 1 patent
    application filed (the extraction device of the stable vectors of features).
•   Innovations are also protected in the know-how mode.
The Market
•   Antivirus market (estimated at $17B) is very competitive. More than thousand
    companies produce antivirus solutions for the wide range of different consumers.
    40% of the market consist of free security related products.
•   The world antivirus market grows at the rate of 10-15% a year. The Russian market
    grows 25% every year. Due to relatively unused potential of the large working
    applications and increase in the complexity of hackers attacks there is a wide
    range of opportunities for the involvement in this market in a medium and long-
    term perspective.
•   Popular traditional antiviruses are: Kaspersky Internet Security, Norton Antivirus,
    Avast Pro Antivirus, McAfee Antivirus and Eset Nod32 Antivirus   .
Project details
Team/Company
•   The team of 16 is led by Konstantin Artemyev, CEO. 8-years’ experience. Graduate of
    Astrakhan State Technical Univ. (ASTU), Automated Process Control System (APCS).
    Valeriy Laptev, Business Dev. 20-years’ experience at ASTU. PhD, associate prof. of
    Automated systems of information control and processing chair.
•   The company is focused on protecting computers from malicious programs like
    viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online
    threats. Its products are intended both for home and corporate users
•   Since May, 2009 Security Stronghold company is the official partner of Intel®
    corporation
Team/Company
• Experience of projects’ implementation – 12 products in the sphere of the
  information security, having over 1,6 million installations worldwide
Project manager
•   Konstantin Artemyev – the sole proprietor, the head of team
    and the general director of Security Stronghold Company.
    Experience of business activity - 8 years.
•   Scientific activity: winner of the competition "Conference of
    Young Scientists on Information Search", Taganrog 2008;
    author of several scientific publications.
•   Role in team: CEO, marketing, advertizing, communications
    with partners, system architecture, design of technologies
    and processes, subsystems of artificial intelligence, the
    general project management.
Investment Opportunity
•   Seeking $1.55M structured as $1.2M of equity investment, $.33M Skolkovo grant
    and $.02M other funds to complete collective intelligence functionality; to release
    alpha, beta and commercial version of the product (with integrated e-commerce
    eSellerate and Avangate systems); to begin sales.
Contacts
  Konstantin Artemyev, CEO
      +7 (903)347-4476
KonstantinArtemev@gmail.com
 www.securitystronghold.com

Weitere ähnliche Inhalte

Was ist angesagt?

IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
360 BSI
 
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
360 BSI
 
RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2
Ron Miller
 

Was ist angesagt? (20)

Monitoring the Data Center
Monitoring the Data CenterMonitoring the Data Center
Monitoring the Data Center
 
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
 
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
 
RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2
 
Tech r35
Tech r35Tech r35
Tech r35
 
Mini IT Security Assessment
Mini IT Security AssessmentMini IT Security Assessment
Mini IT Security Assessment
 
Challenges of Vulnerability Management
 Challenges of Vulnerability Management Challenges of Vulnerability Management
Challenges of Vulnerability Management
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security Management
 
CO$T BENEFIT OF MSSP
CO$T BENEFIT OF MSSPCO$T BENEFIT OF MSSP
CO$T BENEFIT OF MSSP
 
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of Globalization
 
Cybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionCybersecurity Framework - Introduction
Cybersecurity Framework - Introduction
 
What You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationWhat You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network Segmentation
 
Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking: Banishing FUD With Structure and NumbersApplication Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Fundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityFundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurity
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
How to Secure Your Clinical Network
How to Secure Your Clinical NetworkHow to Secure Your Clinical Network
How to Secure Your Clinical Network
 

Andere mochten auch (7)

Diari del 10 d'abril de 2013
Diari del 10 d'abril de 2013Diari del 10 d'abril de 2013
Diari del 10 d'abril de 2013
 
(G)een brainstorm in een glas water
(G)een brainstorm in een glas water(G)een brainstorm in een glas water
(G)een brainstorm in een glas water
 
ιστοσελιδεσ με ενδιαφερον
ιστοσελιδεσ με ενδιαφερονιστοσελιδεσ με ενδιαφερον
ιστοσελιδεσ με ενδιαφερον
 
Enuresis
EnuresisEnuresis
Enuresis
 
JBS Engineering, Howrah, Babbitt Metal Bearing
JBS Engineering, Howrah, Babbitt Metal BearingJBS Engineering, Howrah, Babbitt Metal Bearing
JBS Engineering, Howrah, Babbitt Metal Bearing
 
Anna olga
Anna olgaAnna olga
Anna olga
 
Los recursos marinos presentación
Los recursos marinos   presentaciónLos recursos marinos   presentación
Los recursos marinos presentación
 

Ähnlich wie Security stronghold presentation smart uac

Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentation
Darshan Khant
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
Turvallisuus2013
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
tswong
 
Anti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsAnti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documents
UltraUploader
 

Ähnlich wie Security stronghold presentation smart uac (20)

TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentation
 
Highlights from the TechSoup Catalog [webinar slides]
Highlights from the TechSoup Catalog [webinar slides]Highlights from the TechSoup Catalog [webinar slides]
Highlights from the TechSoup Catalog [webinar slides]
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Boosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeBoosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk Imperative
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake final
 
Lastline Case Study
Lastline Case StudyLastline Case Study
Lastline Case Study
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
Knowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrixKnowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrix
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
 
Anti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsAnti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documents
 

Mehr von w_harker

Securitystronghold presentation-antivirus
Securitystronghold presentation-antivirusSecuritystronghold presentation-antivirus
Securitystronghold presentation-antivirus
w_harker
 
Security stronghold antivirus
Security stronghold antivirusSecurity stronghold antivirus
Security stronghold antivirus
w_harker
 
E trike project
E trike projectE trike project
E trike project
w_harker
 
E trike project
E trike projectE trike project
E trike project
w_harker
 

Mehr von w_harker (6)

Securitystronghold presentation-antivirus
Securitystronghold presentation-antivirusSecuritystronghold presentation-antivirus
Securitystronghold presentation-antivirus
 
Security stronghold antivirus
Security stronghold antivirusSecurity stronghold antivirus
Security stronghold antivirus
 
E trike project eng
E trike project engE trike project eng
E trike project eng
 
E trike project
E trike projectE trike project
E trike project
 
E trike project
E trike projectE trike project
E trike project
 
презентация Smart uac
презентация Smart uacпрезентация Smart uac
презентация Smart uac
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Security stronghold presentation smart uac

  • 1. Pro-active behavior-based antivirus system of new generation - Smart UAC IT
  • 2. Project description • The presence of anti-virus technologies responsive to new threats is a critical factor in the defense and sovereignty of the state. Traditional antivirus systems do not manage to update the databases in time, because thousands of new threats appear every day. • Moreover, such software entrusts a decision-making process entirely to the user – the weakest part in the security system. • The project Smart UAC is aimed to provide users with an antivirus solution that finally is able to prevent virus epidemic, without waiting for database updates, and not putting the responsibility of decision-making on the user. • Smart UAC is antivirus system of new generation, which combines the best aspects of existing methods: behavior-based analysis and traces-based analysis.
  • 3. Proven advantages of the technology over main competitors • Due to the tests conducted in Security Stronghold laboratory by our virus analysts, researches of users’ focus groups and online users testing we can say that the main advantage of Smart UAC is the level of protection, the ability to fight against unknown threats and to prevent virus epidemics in a short time (due to behavioral techniques and instantly transmission of information about the threat to their copies worldwide). • Another advantage is complex product offer: antivirus, cyber threats protection, protection against Trojans, content filtering and graphical analysis.
  • 4. Expected advantages of the technology over main competitors • It takes the user’s psychology into account. • It is able to educate itself through the user’s choices. • Less involvement of the user into the process leads to the automatic scanning of the intercepted processes with the use of the large database of already known threats.
  • 5. Current R&D Status • Beta version of the software with basic functionality (antivirus, cyber threats protection, protection against Trojans) is ready and tested by 5K users. • The Company is developing decision making and content filtering modules. The software is constantly being improved. • In the near future: full completion of the functional of anti-virus system; release of Pro, Enterprise and Free versions; active patenting; carrying out the expanded advertising campaign; active sales. • Has got 2 patents (probabilistic antivirus analysis of objects), 1 patent application filed (the extraction device of the stable vectors of features). • Innovations are also protected in the know-how mode.
  • 6. The Market • Antivirus market (estimated at $17B) is very competitive. More than thousand companies produce antivirus solutions for the wide range of different consumers. 40% of the market consist of free security related products. • The world antivirus market grows at the rate of 10-15% a year. The Russian market grows 25% every year. Due to relatively unused potential of the large working applications and increase in the complexity of hackers attacks there is a wide range of opportunities for the involvement in this market in a medium and long- term perspective. • Popular traditional antiviruses are: Kaspersky Internet Security, Norton Antivirus, Avast Pro Antivirus, McAfee Antivirus and Eset Nod32 Antivirus .
  • 8. Team/Company • The team of 16 is led by Konstantin Artemyev, CEO. 8-years’ experience. Graduate of Astrakhan State Technical Univ. (ASTU), Automated Process Control System (APCS). Valeriy Laptev, Business Dev. 20-years’ experience at ASTU. PhD, associate prof. of Automated systems of information control and processing chair. • The company is focused on protecting computers from malicious programs like viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online threats. Its products are intended both for home and corporate users • Since May, 2009 Security Stronghold company is the official partner of Intel® corporation
  • 9. Team/Company • Experience of projects’ implementation – 12 products in the sphere of the information security, having over 1,6 million installations worldwide
  • 10. Project manager • Konstantin Artemyev – the sole proprietor, the head of team and the general director of Security Stronghold Company. Experience of business activity - 8 years. • Scientific activity: winner of the competition "Conference of Young Scientists on Information Search", Taganrog 2008; author of several scientific publications. • Role in team: CEO, marketing, advertizing, communications with partners, system architecture, design of technologies and processes, subsystems of artificial intelligence, the general project management.
  • 11. Investment Opportunity • Seeking $1.55M structured as $1.2M of equity investment, $.33M Skolkovo grant and $.02M other funds to complete collective intelligence functionality; to release alpha, beta and commercial version of the product (with integrated e-commerce eSellerate and Avangate systems); to begin sales.
  • 12. Contacts Konstantin Artemyev, CEO +7 (903)347-4476 KonstantinArtemev@gmail.com www.securitystronghold.com