SlideShare ist ein Scribd-Unternehmen logo
1 von 17
What we do


 We offer a secure technology solution for
 seamless connectivity and information sharing
 that works for 100% as software without
 dedicated IT or ISP resources to install and
 use
The Problem
• Secure Information and file sharing is a technical
challenge for users, both private and business
• Cost of securely sharing information remains very
high (VPN infrastructure, IT resources)
• Online theft of identity and information is growing
dramatically
Our Solutions
A. Private Internet use. Encrypted & private Internet
     browsing traffic, GeoIP access bypass.
     Our B2C service: www.privacyprotector.eu
C. GatelessVPN and Secure Share. Seamless connectivity
     for users, direct & encrypted file sharing. It is like VPN with
     “dropbox in house” feature, and platform for other services,
     like chat or remote presentations and online collaboration.
D. Public API. Developers can integrate our network
     technology into their apps through free API for added security
     and online collaboration features.
B2C service: 23K users in first 5 months
Where our users are – network reach
Status figures
• C om m e rcial s tart: 1 5.06.201 1
• O u r firs t p aid P lu s u s e rs cam e in th e firs t m onth of th e s e rvice and growing
• 30K re al u s e rs (M arch , 201 2)
Our Solution - Topology




 Typical VPN architecture:
servers, tokens, IT & ISP resources
        IT managed groups
complicated + expensive
Our Solution - USP


  Traditional VPN Network   GatelessVPN Network

                            Nt
                             o okens
                            N cent lserv
                             o ra ers
                            Na s
                             o ccount
                            N IT or ISPserv needed
                             o ,           ices
                            Esyt use f aerae user
                             a o or v g
                            V hig scaa it
                             ery h l bil y
                            V ua env
                             irt l iromentin minut
                                                 es
                            = S avings of time & cos ts
Our newest feature:
“DirectFiles” for secure sharing
• Simple to use like dropbox
• FAST – no cloud, no upload, instant effect
• Convenient – share files/catalogs through
  email, IM
• Scalable – no file size limits, no data quota
• Secure – tough encryption, dynamic paths,
  no listening points
• Private – invitations only access
How DirectFiles works


Folder or file


                                                                        Recipients emails
                                                                        Secure shared document from sender xvz




                                                                    „sender” shared document „xyz.docx” with You.
                                                                    To access document click on link below:
                                                                    http://shortlink.xy

                                                                    Shared by DirectFiles Service
                                                                    Software required:
                 Invite to secure share:    Set password (option)
                                                                    www.company.com/DirectFiles



                                           Invite by email

                                           Copy secure link




                                            Sent files to Your
                                            Facebook Friends!
Quick comparison
Our Business Model
• Software-only business model based on own patentable technology
• Freemium for B2C (users pay for Premium features)
• License for Business: separate traffic (company network only), legacy systems
 integration
B2B & B2B2C:
• Secure Share: simple like dropbox, yet better for business
• Public API for developers
B2C:
• In progress, viral, runs by itself: 12K users in first 3 months.
• Primary goal: build up PrivacyProtector network
Our Target:
• Small and Medium Business, like Google Apps users:
   • “It is not known how many people use the Google Apps platform,
    although a Google blog post in March 2010 claimed that 25 million people
    had switched to Google Apps.” - Wikipedia
• ISP’s, SI companies, developer community
• Individual Internet users
The Competition
B2C: TOR
   •   Open source – no revenue model
   •   Static, can be tracked back
   •   Relies on exit nodes
   •   Static nodes are high risk for legal responsibilities
   •   Exit nodes are natural listening points


B2B: Regular VPN providers:
   • High cost of purchase and maintenance, limited scalability
   • Requires IT support resources
   • Cannot match our pricing (ExpressVPN: 12,95$ vs. 3$ for our RiccoVPN Plus, and we
    have no central gateway infrastructure costs – with the same will support 100x more
    users)
The Team...

Blazej Marciniak - CEO
Blazej is CEO of eMBT and project leader with 15 years of experience in management, primary responsible for
product development strategy and roadmap. Makes things happen.

Marek Ciesla - VP Sales & Marketing
For 15 years associated with the business of IT industry - co-founder and CEO of MIMIGroup & ALLCinema.
Makes things visible.

Tomasz Widerski - CFO
For 12 years associated the IT industry - co-founder and CEO of several special purpose vehicles, including the
development company Araneo (25 developers).  Makes money flow.

Bartosz Warzecha - Senior Developer
Bartek is a Senior Developer at EMBT Ltd. He is responsible for technical background of the project in the whole
Software development life cycle. Creates things that work.

Krzysztof Koszyka - Developer
Krzysztof is the Software Developer at EMBT Sp z o.o., responsible for designing and developing: client applications,
backoffice. Makes thinks look good.
Questions..?
               Contact:

               Blazej Marciniak, CEO
               bm@gatelessvpn.com
               Tel.   +48 123 994 636
                      +48 602 123 636


               eMBT Limited
               Gromadzka 66
               30-719 Krakow
               Poland
               angel.co/embt-limited-1
               www.gatelessvpn.com

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (11)

Newspaper proposal
Newspaper proposalNewspaper proposal
Newspaper proposal
 
Newspaper proposal
Newspaper proposalNewspaper proposal
Newspaper proposal
 
Newspaper proposal
Newspaper proposalNewspaper proposal
Newspaper proposal
 
Timothy&Kim
Timothy&KimTimothy&Kim
Timothy&Kim
 
Newspaper proposal
Newspaper proposalNewspaper proposal
Newspaper proposal
 
chem ppt
chem pptchem ppt
chem ppt
 
India history modified
India history modifiedIndia history modified
India history modified
 
University of benin gra 15082012
University of benin gra 15082012University of benin gra 15082012
University of benin gra 15082012
 
Time plan
Time planTime plan
Time plan
 
Answers to questions
Answers to questionsAnswers to questions
Answers to questions
 
Roles and responsibilities of project stakeholders by pmi
Roles and responsibilities of project stakeholders by pmiRoles and responsibilities of project stakeholders by pmi
Roles and responsibilities of project stakeholders by pmi
 

Ähnlich wie GatelessVPN technology pitch

Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionIan Ray
 
CubeiTz Brochure
CubeiTz BrochureCubeiTz Brochure
CubeiTz BrochureIan Ray
 
IBM Connections Cloud introduction
IBM Connections Cloud introductionIBM Connections Cloud introduction
IBM Connections Cloud introductionMaurice Teeuwe
 
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2
 
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration CloudAfkham Azeez
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1changcai
 
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016Amazon Web Services
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?Zscaler
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Denodo
 
The KeeeX teaser 2015-12-23-lh-xovoz-tonos
The KeeeX teaser 2015-12-23-lh-xovoz-tonosThe KeeeX teaser 2015-12-23-lh-xovoz-tonos
The KeeeX teaser 2015-12-23-lh-xovoz-tonosLaurent Henocque
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...Rachel Wandishin
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE AWS Chicago
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...
NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...
NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...Amazon Web Services
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and SecureIRJET Journal
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionLeMeniz Infotech
 

Ähnlich wie GatelessVPN technology pitch (20)

Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit Encryption
 
CubeiTz Brochure
CubeiTz BrochureCubeiTz Brochure
CubeiTz Brochure
 
CHiWAO_for_All.compressed
CHiWAO_for_All.compressedCHiWAO_for_All.compressed
CHiWAO_for_All.compressed
 
IBM Connections Cloud introduction
IBM Connections Cloud introductionIBM Connections Cloud introduction
IBM Connections Cloud introduction
 
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
 
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
The KeeeX teaser 2015-12-23-lh-xovoz-tonos
The KeeeX teaser 2015-12-23-lh-xovoz-tonosThe KeeeX teaser 2015-12-23-lh-xovoz-tonos
The KeeeX teaser 2015-12-23-lh-xovoz-tonos
 
Media & Entertainment Solutions via Innovative IT
Media & Entertainment Solutions via Innovative ITMedia & Entertainment Solutions via Innovative IT
Media & Entertainment Solutions via Innovative IT
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...
NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...
NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and Secure
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Kürzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

GatelessVPN technology pitch

  • 1.
  • 2. What we do We offer a secure technology solution for seamless connectivity and information sharing that works for 100% as software without dedicated IT or ISP resources to install and use
  • 3. The Problem • Secure Information and file sharing is a technical challenge for users, both private and business • Cost of securely sharing information remains very high (VPN infrastructure, IT resources) • Online theft of identity and information is growing dramatically
  • 4. Our Solutions A. Private Internet use. Encrypted & private Internet browsing traffic, GeoIP access bypass. Our B2C service: www.privacyprotector.eu C. GatelessVPN and Secure Share. Seamless connectivity for users, direct & encrypted file sharing. It is like VPN with “dropbox in house” feature, and platform for other services, like chat or remote presentations and online collaboration. D. Public API. Developers can integrate our network technology into their apps through free API for added security and online collaboration features.
  • 5. B2C service: 23K users in first 5 months
  • 6. Where our users are – network reach
  • 7. Status figures • C om m e rcial s tart: 1 5.06.201 1 • O u r firs t p aid P lu s u s e rs cam e in th e firs t m onth of th e s e rvice and growing • 30K re al u s e rs (M arch , 201 2)
  • 8. Our Solution - Topology Typical VPN architecture: servers, tokens, IT & ISP resources IT managed groups complicated + expensive
  • 9. Our Solution - USP Traditional VPN Network GatelessVPN Network Nt o okens N cent lserv o ra ers Na s o ccount N IT or ISPserv needed o , ices Esyt use f aerae user a o or v g V hig scaa it ery h l bil y V ua env irt l iromentin minut es = S avings of time & cos ts
  • 10. Our newest feature: “DirectFiles” for secure sharing • Simple to use like dropbox • FAST – no cloud, no upload, instant effect • Convenient – share files/catalogs through email, IM • Scalable – no file size limits, no data quota • Secure – tough encryption, dynamic paths, no listening points • Private – invitations only access
  • 11. How DirectFiles works Folder or file Recipients emails Secure shared document from sender xvz „sender” shared document „xyz.docx” with You. To access document click on link below: http://shortlink.xy Shared by DirectFiles Service Software required: Invite to secure share: Set password (option) www.company.com/DirectFiles Invite by email Copy secure link Sent files to Your Facebook Friends!
  • 13. Our Business Model • Software-only business model based on own patentable technology • Freemium for B2C (users pay for Premium features) • License for Business: separate traffic (company network only), legacy systems integration B2B & B2B2C: • Secure Share: simple like dropbox, yet better for business • Public API for developers B2C: • In progress, viral, runs by itself: 12K users in first 3 months. • Primary goal: build up PrivacyProtector network
  • 14. Our Target: • Small and Medium Business, like Google Apps users: • “It is not known how many people use the Google Apps platform, although a Google blog post in March 2010 claimed that 25 million people had switched to Google Apps.” - Wikipedia • ISP’s, SI companies, developer community • Individual Internet users
  • 15. The Competition B2C: TOR • Open source – no revenue model • Static, can be tracked back • Relies on exit nodes • Static nodes are high risk for legal responsibilities • Exit nodes are natural listening points B2B: Regular VPN providers: • High cost of purchase and maintenance, limited scalability • Requires IT support resources • Cannot match our pricing (ExpressVPN: 12,95$ vs. 3$ for our RiccoVPN Plus, and we have no central gateway infrastructure costs – with the same will support 100x more users)
  • 16. The Team... Blazej Marciniak - CEO Blazej is CEO of eMBT and project leader with 15 years of experience in management, primary responsible for product development strategy and roadmap. Makes things happen. Marek Ciesla - VP Sales & Marketing For 15 years associated with the business of IT industry - co-founder and CEO of MIMIGroup & ALLCinema. Makes things visible. Tomasz Widerski - CFO For 12 years associated the IT industry - co-founder and CEO of several special purpose vehicles, including the development company Araneo (25 developers).  Makes money flow. Bartosz Warzecha - Senior Developer Bartek is a Senior Developer at EMBT Ltd. He is responsible for technical background of the project in the whole Software development life cycle. Creates things that work. Krzysztof Koszyka - Developer Krzysztof is the Software Developer at EMBT Sp z o.o., responsible for designing and developing: client applications, backoffice. Makes thinks look good.
  • 17. Questions..? Contact: Blazej Marciniak, CEO bm@gatelessvpn.com Tel. +48 123 994 636 +48 602 123 636 eMBT Limited Gromadzka 66 30-719 Krakow Poland angel.co/embt-limited-1 www.gatelessvpn.com

Hinweis der Redaktion

  1. We can offer to the business and private users unique connectivity services with very high scalability based on P2P network
  2. Companies and individuals needs to set up a private secure network for sharing and collaboration Traditionally it is achieved by software and hardware installed that is maintained by company IT department. This is expensive. Individuals and small companies can not afford VPN infrastructure cost
  3. Companies and individuals needs to set up a private secure network for sharing and collaboration Traditionally it is achieved by software and hardware installed that is maintained by company IT department. This is expensive. Individuals and small companies can not afford VPN infrastructure cost
  4. Scalability tested up to 100k users No central server is required Security checker built in No token or login credentials is required Network autoconfiguration Dynamic traffic management
  5. 5 seconds Global business We are already almoust arount the world
  6. Dynamic traffic, no ability to block
  7. Cloud Based Service is not always best option, with secured powered by PrivacyProtector Network (" friendtofriend " ; " directfile ") application you can share, collaborate and control resources on your PC/MAC/iPhone or Android based Mobile and CE devices without login/password requirements. 
  8. Team is compelete set of skills: We have project manager expert Marketing expert Corporate finance expert Software architect Software developer