Your SlideShare is downloading. ×
Protect Yourself from
   Cyber‐Criminality

Presented by Thomas Martinuzzo
Project Leader, Sciences and Engineering
thomas...
Overview

Licensing Opportunity in Multiple Fields of Use

Technology: 
 • Ready to market 
 • Real‐time Detection of Know...
Case Study


      “…TJX announced the loss of more than 45 
      million credit and debit card numbers that were 
      ...
Market
World Data Leakage and Information Loss Prevention
 • $191,9 Millions in 2007
 • $2.1 Billions in 2014

Market Segm...
Needs for Anti‐Data Loss Protection


  Demand for very High Speed Internet



   Comply with Recently Adopted Legislation...
Competitive Technologies

Detect Patterns
 • Rebuild the transmitting file
 • Comparison with the data base of protected f...
Solutions

Pre‐Treatment:
  • Data Base of “Imprints”

We Detect Imprints

Value Proposition: 
 • No need to rebuild the t...
Real‐Time Detection of Known Files


     Thomas Martinuzzo
thomas.martinuzzo@univalor.ca
        Booth # 402
Upcoming SlideShare
Loading in...5
×

Protect Yourself From Cyber Criminality

519

Published on

World Best Technology Showcase 2009

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
519
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Protect Yourself From Cyber Criminality"

  1. 1. Protect Yourself from Cyber‐Criminality Presented by Thomas Martinuzzo Project Leader, Sciences and Engineering thomas.martinuzzo@univalor.ca
  2. 2. Overview Licensing Opportunity in Multiple Fields of Use Technology:  • Ready to market  • Real‐time Detection of Known Files (10Gbits and more) Market : $2.1b by 2014 (CAGR: 41.1%, 2008‐2014) Inventor: Pr. Jean‐Pierre David, École Polytechnique de Montreal Intellectual Property: US Patent Application + Trade Secret
  3. 3. Case Study “…TJX announced the loss of more than 45  million credit and debit card numbers that were  stolen from its IT systems over an 18‐month  period …” “…IPLocks, a compliance and database security  company, released a report in May 07 estimating  that the TJX breach will eventually cost the  company $100 per lost record, or a total of $4.5  billion” Cost = Negative Public Exposure + Brand Name Damage + …    Source: informationweek.com, 2007
  4. 4. Market World Data Leakage and Information Loss Prevention • $191,9 Millions in 2007 • $2.1 Billions in 2014 Market Segments • Finances and Banking (34%) • Healthcare (30%) • Manufacturing (14%) • Other (Government, Entertainment, Technology) (22%) Potential Partners:
  5. 5. Needs for Anti‐Data Loss Protection Demand for very High Speed Internet Comply with Recently Adopted Legislations Ex: The SB 1386 law requires anyone doing business in California to notify anyone whose personal information has been obtained by an unauthorized party.
  6. 6. Competitive Technologies Detect Patterns • Rebuild the transmitting file • Comparison with the data base of protected files Problem: • Do not work at very high speed
  7. 7. Solutions Pre‐Treatment: • Data Base of “Imprints” We Detect Imprints Value Proposition:  • No need to rebuild the transmitting  files • Works with all kinds of files • Works at 10Gbit/s and more
  8. 8. Real‐Time Detection of Known Files Thomas Martinuzzo thomas.martinuzzo@univalor.ca Booth # 402

×