SlideShare a Scribd company logo
1 of 33
Download to read offline
NVIS
We cloak your private
network from
vulnerabilities
Invisible Internet™
Preface
Hackers can't hack what they can't see. Our invisibility cloak represents a whole new
paradigm to infrastructure protection beyond Zero Trust by taking remote communications
"off the grid" while preserving the existing infrastructure and development investments.
NVIS is military-grade security built by the team that created a best-in-class unhackable
solution approved for DoD-wide use and for Coalition forces.
NVIS is revolutionary in the security and privacy space to benefit B2B or B2G greatly,
especially in the global threat climate.
2
3
Connect to anyone in the world,
securely without restrictions
Un
3
NVIS Can’t be
• Hacked
• Sniffed
• Traced
• Blocked
• Censored
Cost Effective: Take advantage of existing networks or
public infrastructure
Phil Smith
Founder / CTO
• Founder/creator and
chief architect
• Expertise in security,
networking, ISP and
blockchain.
• Over 30 years in lead
roles at NASA, HP,
Cisco, Lawrence
Livermore National
Lab
Marilyn Hernandez
Co-Founder
• Investor relations,
Business Development.
Sales and Marketing,
Strategist. Researcher,
Realtor, Counselor,
• BA Administration of
Justice
Salman Rizvi
CEO – (CMO/CRO)
• 22+ years Leadership of
Enterprise Transformation for
the top Fortune 50-500 and
organizations worldwide
• Founded 2 companies
• SaaS pipelines, CIO. EVP &
Strategic Advisor
SVP Sales & Marketing
• 15+ years of experience
in Sales, Marketing,
Strategy
• Founded 3 companies
• 5 years of consulting for
tech startups
• Mentor for tech founders
at Stanford and Skolkovo
Jed Reitler Rob Langhorne
CISO
• Former CEO of CloudLogix,
Cranite architect, Apple lead
• Analytical, highly adaptable
professional
• Extensive experience leading
ground-breaking development
in mobile computing and
security.
Who We Are
4
Dr. Taher Elgamal
CTO / Security, Salesforce
• Dr. Elgamal is world renown in the
industry as the inventor of Secure
Sockets Layer (SSL), a protocol
developed by Netscape for
transmitting private documents via
the Internet. Dr. Elgamal also wrote
the SSL patent and promoted SSL
and has a lifetime achievement
award from RSA.
John Vigouroux
Chief Entrepeneur & Innovation
Officer, Averett University
• CEO & Co-Founder at WeRAI
• Former CEO Nex Cubed
• CEO of Cranite Systems
• CEO of M86 Security, (acquired by
Trustwave) joined as an advisor.
Partner Business
Development, Verizon
• Formerly Worldwide Sales
and Business
Development Leader
Cisco Systems
• Director Smart Grid
Strategic Alliances, GE
Digital Energy
Manoj Bhatia Gregory F. Ryan
President, Ryan Advisory Services
• Providing Business Consulting
• Management Consulting
• Finance Consulting
• Marketing Consulting
• Pricing Strategy
• Advertising
• Project Management
Our Advisors
5
The Core Problem
6
VISIBILITY IS THE PROBLEM
Internet is OPEN which meeans VULNERABLE BY DESIGN:
● Geolocation
● Routes are traceable
● Lookup by name (DNS)
● IP address is public
● TCP ports well known / discoverable
● Open Protocols yield Connectivity but NO SECURITY
6
Result: Global Cost of Cybercrime 10.5 Trillion dollars Annually*
* Projected by CyberSecurity Ventures, 2021
Single Point of Failure Slow Performance Lack Scalability
High TCO Lack of Privacy Highly Vulnerable
Problems
7
Decentralized High Performance Infinite Scalability
Easy to Deploy Encrypted End-to-End Invisible
Solutions
8
Innovation: Layer 2 Full Stack Security
• A Software-Only Architecture
• Layer2 Encryption
• Layer 2 encrypts ALL traffic including
source, destination and data payload
so the full stack is secured.
• Only software based Layer 2 product
obtaining FIPS certification
• No IP routing (hops) needed boosting
performance by removing overhead
and propagation delays.
• Protects against the following
• Access Point / MAC address spoofing
• Dictionary attacks
• Man-in-the-middle
• DDOS attacks
• ARP connection/redirection
• Protocol hacks – ALL OF THEM
# ISO/OSI Model Example
7 Application HTTP, FTP
6 Presentation SSL, TLS
5 Session NetBIOS, PPTP
4 Transport TCP, UDP
3 Network IP, ICMP
2 Data Link
NVIS over
Ethernet, WiFi,
WiMAX, LTE
1 Physical
Copper Wires,
Optical Fibers,
Air
9
Innovation: Peer-to-Peer Path Invisibility
Perimeter Path and Payload Encryption
Turns This Into This
10
11
Innovation: Mirrored Segments
Patent Pending: A
Multiverse of
Internets, 2019,
A. Smith EFS ID
3483382
Virtual Private IPs
behaves like Public
IPs – no gateways or
routing needed.
Multiple overlays can
segment networks
by security context.
Product Description
◼ 100% software agents – no
hardware needed **
◼ All major platforms for end-users
◼ AWS and Azure Cloud Supported
◼ Web Subscription and Billing
System
** ARM router available for Kiosk. legacy systems
or IoT connectivity
Admin Web UI
12
1
2
3
Admin Web UI
Build a network as easy as 1-2-3
TODO
13
One click auto provisioning
System Level View - Zero Trust
14
“ VPN Hacks Are a Slow-Motion Disaster
Hackers have had a field day with virtual private networks —
especially during the remote-work pandemic era.
15
The Market
1994
Foundation for
VPN
SSL & IPsec
2000
Corporations
that have
remote offices
VPN for business
2019
$23Bn global
market value
VPN growth &
market hacks
1996
Beginning of VPN
technology
PPTP
2010
Start of wider
adoption
VPN popularity
2020
Remote Work
revolution
COVID
Why Now – Existing Security is Flawed
16
Remote Access VPN, Intranet
VPN, Extranet VPN, Others,
Application: Personal VPN
Users, Corporate VPN Users
North America Site-to-
Site, Remote Access
Business Market
Market size was valued
at USD 8.41 Billion in
2020 and is projected to
reach USD 37.23 Billion
by 2028, growing at a
CAGR of 35.25 %
Service Addressable
Market
Total Addressable Market Service Obtainable Market
$8B
$4B
$1B
SAM
TAM SOM
The Market
17
18
94%
companies are
concerned about the
security of corporate
data exposed via home-
based devices
74%
expect more use of BYOD,
and an increased need for
device authorization
40%
expect half of their
workforce will work
remotely at least twice a
week
Securing the Hybrid Workplace in 2022
*https://connect.teradici.com/security-report
Zero Trust Adoption Report, conducted by
Cybersecurity Insiders, found that 15 percent of
organizations have already enacted ZTNA
while more than half (59%) plan to
implement ZTNA over the course of the next
12 months
3/10
are protected against VPN
attacks which cybercriminals
are now taking advantage of
to impact business operations
19
Business Model
20
Disruptive, SaaS and Headless
NVIS
Security
Simplicity
Competitive Position
21
▪ Zero Trust / MFA
▪ Software Defined Perimeter
▪ Invisible to any outside attack
▪ Layer 2 Networking
▪ End-to-End Encryption
▪ Peer-to-Peer Architecture
▪ High Performance & Scalable
▪ Configure & Deploy in Seconds
▪ Private Static IPs over Internet
▪ Untraceable & Unblockable
▪ Multiplatform Support
▪ Enterprise Grade/SMB Priced
▪ No Tracking or Data Selling
▪ No Split Tunneling Required
▪ No Special OS Required
▪ No Special Hardware Required
▪ No Network Expertise Required
▪ No Security Expertise Required
Differentiators
22
Customer Acquisition Strategy
Launch Scale
-$5,000,000
$0
$5,000,000
$10,000,000
$15,000,000
$20,000,000
Year 1 Year 2 Year 3
Revenue Profit Expenses
Financial Projections
Revenue estimate in first 3 years after funding
KEY ANALYSIS
• $16M Revenue in
3yrs
• $7.7M Profit in 3yrs
• Positive Cash Flow in
6 months
• Break Even in
18 months
• Average Sale per B2B
Client $627 annually
• Enterprise up to
$600K each
23
To hit fast growth, we will allocate the money to:
Core development - 32%
Operational - 22%
Marketing & Sales - 39%
Legal and compliance - 7%
$2 Million
in Seed
Investment
The Ask
Break Even
Goal
18 months
SAFE note
$8 Million
Pre-Money
• Network equipment manufacturers (Cisco, Juniper)
• Cloud providers (AWS, Microsoft, Google, IBM)
• Security or VPN companies
• Banks (or interbank service providers)
• Platform tech companies (Google, Microsoft, etc.)
• Telco or utility companies (or inter-company communication providers)
• Facebook or other social media giant (with current emphasis on privacy)
Exit Strategy
24
Phil Smith
Founder | NVIS Inc.
phil@nvis.me
1.408.400.3256
Thank You 25
Slides
26
Backup
GO TO MARKET: USE OF FUNDS
•
Core Development 32%
• Product ready 3.5 Mo from T0
• Operational 22%
• Corporate, Legal & GA 7%
• Sales and Marketing 39%
Headcount EOY
T0 = 23 T1 = 69 T2 = 120
27
28
Roadmap
Monthly Annually**
Business Bundles #Nodes* (up to) $6/Node $5/Node
5-Pack 5 $ 30 300
10-Pack 10 $ 60 600
25-Pack 25 $ 150 1500
Enterprise Bundles $11/Node $10/Node
50-Pack 50 $ 550 6000
100-Pack 100 $ 1,100 12000
250-Pack 250 $ 2,750 30000
250+ Unlimited Custom Custom
* Node = Clients, Endpoints, Gateways
** Annually = 12 Month Pre-paid subscription
SaaS Subscription
29
Features, Security & Cost Comparison
30
Bundle NVIS TORguard OpenVPN Perimeter 81
Starter $25 $69 $41 $40
Standard $50 $110 $58 $80
Medium $100 $169 $117 $200
Enterprise $500 Custom $175 $400
Enterprise+ $1,000 Custom $233 $800
Enterprise++ $2,500 Custom $467 $2,000
**Subscription charges per client per month basis.
Traction
31
◼ MVP test network over 1 year continuous operation
with invisible blockchain nodes intercommunicating
in Paris, Amsterdam, US, Canada, Tokyo and
Singapore.
◼ Verified connections from Beijing, Moscow, Saudi
Arabia and other locations where Internet and VPNs
are censored or blocked
◼ MOU with HowDoo.io, social media
◼ MOU with FYRM, a penetration test and security
company to validate NVIS
◼ Core technology tested by Miercom Labs. Ranked
most secure, invulnerable to attacks, where Ipsec
and SSL VPNs all fail.
Partners and Resources
32
Amazon Cisco HP
Vultr Hosting McAfee Upserve
CloudDNS
32
Legacy Customers
33
Lawrence Livermore
National Laboratory
U.S. Army Inspector
General School

More Related Content

What's hot

Brocade Executive Leadership Presentation - Lloyd Carney
Brocade Executive Leadership Presentation - Lloyd CarneyBrocade Executive Leadership Presentation - Lloyd Carney
Brocade Executive Leadership Presentation - Lloyd Carneyscoopnewsgroup
 
Cloudflare Partner Program 2020
Cloudflare Partner Program 2020Cloudflare Partner Program 2020
Cloudflare Partner Program 2020Dan Hollinger
 
Alpha & Omega Presentation
Alpha & Omega PresentationAlpha & Omega Presentation
Alpha & Omega PresentationDarryl Santa
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security PresentationIdeba
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Cloudflare
 
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechMT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechDell EMC World
 
Combining Man & Machine: A Glimpse into the Future - David Meyer
Combining Man & Machine:  A Glimpse into the Future - David MeyerCombining Man & Machine:  A Glimpse into the Future - David Meyer
Combining Man & Machine: A Glimpse into the Future - David Meyerscoopnewsgroup
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityPriyanka Aash
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Securitypatmisasi
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddcCSA Argentina
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramNetIQ
 
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...Rea & Associates
 
Consultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresasConsultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresasFernando Misato
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesIvanti
 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysisCarlo Dapino
 
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...Cristian Garcia G.
 

What's hot (20)

Brocade Executive Leadership Presentation - Lloyd Carney
Brocade Executive Leadership Presentation - Lloyd CarneyBrocade Executive Leadership Presentation - Lloyd Carney
Brocade Executive Leadership Presentation - Lloyd Carney
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
 
Cloudflare Partner Program 2020
Cloudflare Partner Program 2020Cloudflare Partner Program 2020
Cloudflare Partner Program 2020
 
Alpha & Omega Presentation
Alpha & Omega PresentationAlpha & Omega Presentation
Alpha & Omega Presentation
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechMT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
 
Combining Man & Machine: A Glimpse into the Future - David Meyer
Combining Man & Machine:  A Glimpse into the Future - David MeyerCombining Man & Machine:  A Glimpse into the Future - David Meyer
Combining Man & Machine: A Glimpse into the Future - David Meyer
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
 
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
 
Consultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresasConsultcorp - Antivirus Corporativo para empresas
Consultcorp - Antivirus Corporativo para empresas
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysis
 
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
 

Similar to NVIS-Pitch Deck version 6 - 2022 MAR.pdf

TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?SaraPia5
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes WebinarThousandEyes
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCCloudflare
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitiveCisco Canada
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudZscaler
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSMAU
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Denodo
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?michaelbasoah
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarThousandEyes
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
The evolving CIO|CISO relationship
The evolving CIO|CISO relationship  The evolving CIO|CISO relationship
The evolving CIO|CISO relationship Zscaler
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsDevOps.com
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Miriade Spa
 

Similar to NVIS-Pitch Deck version 6 - 2022 MAR.pdf (20)

TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitive
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
The evolving CIO|CISO relationship
The evolving CIO|CISO relationship  The evolving CIO|CISO relationship
The evolving CIO|CISO relationship
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
 

Recently uploaded

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goasexy call girls service in goa
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 

Recently uploaded (20)

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 

NVIS-Pitch Deck version 6 - 2022 MAR.pdf

  • 1. NVIS We cloak your private network from vulnerabilities Invisible Internet™
  • 2. Preface Hackers can't hack what they can't see. Our invisibility cloak represents a whole new paradigm to infrastructure protection beyond Zero Trust by taking remote communications "off the grid" while preserving the existing infrastructure and development investments. NVIS is military-grade security built by the team that created a best-in-class unhackable solution approved for DoD-wide use and for Coalition forces. NVIS is revolutionary in the security and privacy space to benefit B2B or B2G greatly, especially in the global threat climate. 2
  • 3. 3 Connect to anyone in the world, securely without restrictions Un 3 NVIS Can’t be • Hacked • Sniffed • Traced • Blocked • Censored Cost Effective: Take advantage of existing networks or public infrastructure
  • 4. Phil Smith Founder / CTO • Founder/creator and chief architect • Expertise in security, networking, ISP and blockchain. • Over 30 years in lead roles at NASA, HP, Cisco, Lawrence Livermore National Lab Marilyn Hernandez Co-Founder • Investor relations, Business Development. Sales and Marketing, Strategist. Researcher, Realtor, Counselor, • BA Administration of Justice Salman Rizvi CEO – (CMO/CRO) • 22+ years Leadership of Enterprise Transformation for the top Fortune 50-500 and organizations worldwide • Founded 2 companies • SaaS pipelines, CIO. EVP & Strategic Advisor SVP Sales & Marketing • 15+ years of experience in Sales, Marketing, Strategy • Founded 3 companies • 5 years of consulting for tech startups • Mentor for tech founders at Stanford and Skolkovo Jed Reitler Rob Langhorne CISO • Former CEO of CloudLogix, Cranite architect, Apple lead • Analytical, highly adaptable professional • Extensive experience leading ground-breaking development in mobile computing and security. Who We Are 4
  • 5. Dr. Taher Elgamal CTO / Security, Salesforce • Dr. Elgamal is world renown in the industry as the inventor of Secure Sockets Layer (SSL), a protocol developed by Netscape for transmitting private documents via the Internet. Dr. Elgamal also wrote the SSL patent and promoted SSL and has a lifetime achievement award from RSA. John Vigouroux Chief Entrepeneur & Innovation Officer, Averett University • CEO & Co-Founder at WeRAI • Former CEO Nex Cubed • CEO of Cranite Systems • CEO of M86 Security, (acquired by Trustwave) joined as an advisor. Partner Business Development, Verizon • Formerly Worldwide Sales and Business Development Leader Cisco Systems • Director Smart Grid Strategic Alliances, GE Digital Energy Manoj Bhatia Gregory F. Ryan President, Ryan Advisory Services • Providing Business Consulting • Management Consulting • Finance Consulting • Marketing Consulting • Pricing Strategy • Advertising • Project Management Our Advisors 5
  • 6. The Core Problem 6 VISIBILITY IS THE PROBLEM Internet is OPEN which meeans VULNERABLE BY DESIGN: ● Geolocation ● Routes are traceable ● Lookup by name (DNS) ● IP address is public ● TCP ports well known / discoverable ● Open Protocols yield Connectivity but NO SECURITY 6 Result: Global Cost of Cybercrime 10.5 Trillion dollars Annually* * Projected by CyberSecurity Ventures, 2021
  • 7. Single Point of Failure Slow Performance Lack Scalability High TCO Lack of Privacy Highly Vulnerable Problems 7
  • 8. Decentralized High Performance Infinite Scalability Easy to Deploy Encrypted End-to-End Invisible Solutions 8
  • 9. Innovation: Layer 2 Full Stack Security • A Software-Only Architecture • Layer2 Encryption • Layer 2 encrypts ALL traffic including source, destination and data payload so the full stack is secured. • Only software based Layer 2 product obtaining FIPS certification • No IP routing (hops) needed boosting performance by removing overhead and propagation delays. • Protects against the following • Access Point / MAC address spoofing • Dictionary attacks • Man-in-the-middle • DDOS attacks • ARP connection/redirection • Protocol hacks – ALL OF THEM # ISO/OSI Model Example 7 Application HTTP, FTP 6 Presentation SSL, TLS 5 Session NetBIOS, PPTP 4 Transport TCP, UDP 3 Network IP, ICMP 2 Data Link NVIS over Ethernet, WiFi, WiMAX, LTE 1 Physical Copper Wires, Optical Fibers, Air 9
  • 10. Innovation: Peer-to-Peer Path Invisibility Perimeter Path and Payload Encryption Turns This Into This 10
  • 11. 11 Innovation: Mirrored Segments Patent Pending: A Multiverse of Internets, 2019, A. Smith EFS ID 3483382 Virtual Private IPs behaves like Public IPs – no gateways or routing needed. Multiple overlays can segment networks by security context.
  • 12. Product Description ◼ 100% software agents – no hardware needed ** ◼ All major platforms for end-users ◼ AWS and Azure Cloud Supported ◼ Web Subscription and Billing System ** ARM router available for Kiosk. legacy systems or IoT connectivity Admin Web UI 12
  • 13. 1 2 3 Admin Web UI Build a network as easy as 1-2-3 TODO 13 One click auto provisioning
  • 14. System Level View - Zero Trust 14
  • 15. “ VPN Hacks Are a Slow-Motion Disaster Hackers have had a field day with virtual private networks — especially during the remote-work pandemic era. 15 The Market
  • 16. 1994 Foundation for VPN SSL & IPsec 2000 Corporations that have remote offices VPN for business 2019 $23Bn global market value VPN growth & market hacks 1996 Beginning of VPN technology PPTP 2010 Start of wider adoption VPN popularity 2020 Remote Work revolution COVID Why Now – Existing Security is Flawed 16
  • 17. Remote Access VPN, Intranet VPN, Extranet VPN, Others, Application: Personal VPN Users, Corporate VPN Users North America Site-to- Site, Remote Access Business Market Market size was valued at USD 8.41 Billion in 2020 and is projected to reach USD 37.23 Billion by 2028, growing at a CAGR of 35.25 % Service Addressable Market Total Addressable Market Service Obtainable Market $8B $4B $1B SAM TAM SOM The Market 17
  • 18. 18 94% companies are concerned about the security of corporate data exposed via home- based devices 74% expect more use of BYOD, and an increased need for device authorization 40% expect half of their workforce will work remotely at least twice a week Securing the Hybrid Workplace in 2022 *https://connect.teradici.com/security-report Zero Trust Adoption Report, conducted by Cybersecurity Insiders, found that 15 percent of organizations have already enacted ZTNA while more than half (59%) plan to implement ZTNA over the course of the next 12 months 3/10 are protected against VPN attacks which cybercriminals are now taking advantage of to impact business operations
  • 21. NVIS Security Simplicity Competitive Position 21 ▪ Zero Trust / MFA ▪ Software Defined Perimeter ▪ Invisible to any outside attack ▪ Layer 2 Networking ▪ End-to-End Encryption ▪ Peer-to-Peer Architecture ▪ High Performance & Scalable ▪ Configure & Deploy in Seconds ▪ Private Static IPs over Internet ▪ Untraceable & Unblockable ▪ Multiplatform Support ▪ Enterprise Grade/SMB Priced ▪ No Tracking or Data Selling ▪ No Split Tunneling Required ▪ No Special OS Required ▪ No Special Hardware Required ▪ No Network Expertise Required ▪ No Security Expertise Required Differentiators
  • 23. -$5,000,000 $0 $5,000,000 $10,000,000 $15,000,000 $20,000,000 Year 1 Year 2 Year 3 Revenue Profit Expenses Financial Projections Revenue estimate in first 3 years after funding KEY ANALYSIS • $16M Revenue in 3yrs • $7.7M Profit in 3yrs • Positive Cash Flow in 6 months • Break Even in 18 months • Average Sale per B2B Client $627 annually • Enterprise up to $600K each 23
  • 24. To hit fast growth, we will allocate the money to: Core development - 32% Operational - 22% Marketing & Sales - 39% Legal and compliance - 7% $2 Million in Seed Investment The Ask Break Even Goal 18 months SAFE note $8 Million Pre-Money • Network equipment manufacturers (Cisco, Juniper) • Cloud providers (AWS, Microsoft, Google, IBM) • Security or VPN companies • Banks (or interbank service providers) • Platform tech companies (Google, Microsoft, etc.) • Telco or utility companies (or inter-company communication providers) • Facebook or other social media giant (with current emphasis on privacy) Exit Strategy 24
  • 25. Phil Smith Founder | NVIS Inc. phil@nvis.me 1.408.400.3256 Thank You 25
  • 27. GO TO MARKET: USE OF FUNDS • Core Development 32% • Product ready 3.5 Mo from T0 • Operational 22% • Corporate, Legal & GA 7% • Sales and Marketing 39% Headcount EOY T0 = 23 T1 = 69 T2 = 120 27
  • 29. Monthly Annually** Business Bundles #Nodes* (up to) $6/Node $5/Node 5-Pack 5 $ 30 300 10-Pack 10 $ 60 600 25-Pack 25 $ 150 1500 Enterprise Bundles $11/Node $10/Node 50-Pack 50 $ 550 6000 100-Pack 100 $ 1,100 12000 250-Pack 250 $ 2,750 30000 250+ Unlimited Custom Custom * Node = Clients, Endpoints, Gateways ** Annually = 12 Month Pre-paid subscription SaaS Subscription 29
  • 30. Features, Security & Cost Comparison 30 Bundle NVIS TORguard OpenVPN Perimeter 81 Starter $25 $69 $41 $40 Standard $50 $110 $58 $80 Medium $100 $169 $117 $200 Enterprise $500 Custom $175 $400 Enterprise+ $1,000 Custom $233 $800 Enterprise++ $2,500 Custom $467 $2,000 **Subscription charges per client per month basis.
  • 31. Traction 31 ◼ MVP test network over 1 year continuous operation with invisible blockchain nodes intercommunicating in Paris, Amsterdam, US, Canada, Tokyo and Singapore. ◼ Verified connections from Beijing, Moscow, Saudi Arabia and other locations where Internet and VPNs are censored or blocked ◼ MOU with HowDoo.io, social media ◼ MOU with FYRM, a penetration test and security company to validate NVIS ◼ Core technology tested by Miercom Labs. Ranked most secure, invulnerable to attacks, where Ipsec and SSL VPNs all fail.
  • 32. Partners and Resources 32 Amazon Cisco HP Vultr Hosting McAfee Upserve CloudDNS 32
  • 33. Legacy Customers 33 Lawrence Livermore National Laboratory U.S. Army Inspector General School