SlideShare a Scribd company logo
1 of 30
© 2014 - VASCO Data Security
`
© 2014 - VASCO Data Security CONFIDENTIAL
Forward Looking Statements
Statements made in this presentation that relate to future plans, events or performances are forward-
looking statements within the meaning of Section 21e of the Securities Exchange Act of 1934 and
Section 27A of the Securities Act of 1933. These forward-looking statements (1) are identified by use
of terms and phrases such as “expect”, “believe”, “will”, “anticipate”, “emerging”, “intend”, “plan”,
“could”, “may”, “estimate”, “should”, “objective”, “goal”, “possible”, “potential”, “project” and similar
words and expressions, but such words and phrases are not the exclusive means of identifying them,
and (2) are subject to risks and uncertainties and represent our present expectations or beliefs
concerning future events. VASCO cautions that the forward-looking statements are qualified by
important factors that could cause actual results to differ materially from those in the forward-looking
statements. These risks, uncertainties and other factors that have been described in our Annual
Report on Form 10-K for the year ended December 31, 2013 and include, but are not limited to, (a)
risks of general market conditions, including currency fluctuations and the uncertainties resulting from
turmoil in world economic and financial markets, (b) risks inherent to the computer and network security
industry, including rapidly changing technology, evolving industry standards, increasingly sophisticated
hacking attempts, increasing numbers of patent infringement claims, changes in customer
requirements, price competitive bidding, and changing government regulations, and (c) risks specific to
VASCO, including, demand for our products and services, competition from more established firms and
others, pressures on price levels and our historical dependence on relatively few products, certain
suppliers and certain key customers. Thus, the results that we actually achieve may differ materially
from any anticipated results included in, or implied by these statements. Except for our ongoing
obligations to disclose material information as required by the U.S. federal securities laws, we do not
have any obligations or intention to release publicly any revisions to any forward-looking statements to
reflect events or circumstances in the future or to reflect the occurrence of unanticipated events.
2
© 2014 - VASCO Data Security CONFIDENTIAL
Company Overview
VASCO is a global leader in strong authentication, digital signatures,
and identity management solutions specializing in securing financial
transactions and protecting access to data and applications.
3
© 2014 - VASCO Data Security CONFIDENTIAL
Listed on NASDAQ in 1997
21% Compound Annual Growth Rate in
Revenues from 2004-2014
49 Consecutive Quarters of Profitability
Company Overview
4
© 2014 - VASCO Data Security CONFIDENTIAL
10,000+ Customers in more than 100 Countries,
More than half of the Top 100 Global Banks
and 1,700+ Financial Institutions rely on VASCO
More than 200 Million Authenticators Sold
Company Overview
5
© 2014 - VASCO Data Security CONFIDENTIAL
Global Company
VASCO HQ
VASCO Offices
VASCO Sales Presence
6
© 2014 - VASCO Data Security CONFIDENTIAL
Financial Institution Customers
VASCO is the world leader in providing two-factor
authentication and digital signature solutions to
financial institutions. More than half of the
Top 100 Global Banks rely on VASCO solutions.
7
© 2014 - VASCO Data Security CONFIDENTIAL
Frequency and sophistication of attacks has increased
High-profile breaches have brought security
to the C-level and Board of Directors
Global Regulations to protect consumer
transactions and personal privacy
Mobile is becoming the device of choice
There is a greater need to enhance security
while improving convenience for users
Key Growth Drivers
8
© 2014 - VASCO Data Security CONFIDENTIAL
"Two out of three attacks focus on [login] credentials at some
point in the attack. Trying to get valid credentials is part of many
styles of attacks and patterns"
- Jay Jacobs, senior analyst with Verizon
Authentication & Digital Signature Platform
Why Authentication
• Data breaches are up 49%(1)
• Protects against the newest attacks
• Easy to implement and use
(1) The Breach Level Index, released February, 2015.
9
© 2014 - VASCO Data Security CONFIDENTIAL
Technology and Products
1988
1st DIGIPASS
“Access Key”
1989
1st DIGIPASS
with Keypad
2002
VACMAN
Controller
2004
DIGIPASS GO 3
1st 1-button token
2005
IDENTIKEY
SERVER
2005
DIGIPASS 810
EMV card reader
2006
DIGIPASS 905
1st connected
Card reader
2007
DIGIPASS 270
1st thin form
Token w/keypad
2008
DP for Mobile
Soft token
for phones
VASCO Solution Timeline
1991
DIGIPASS 550
with e-Signature
10
© 2014 - VASCO Data Security CONFIDENTIAL
2014
Rabo Scanner
Card reader with
CrontoSIgn technology
2014
DIGIPASS for Apps
with CrontoSIgn
technology
Technology and Products
2013
DIGIPASS for Apps
SDK for integration
into applications
VASCO Solution Timeline
2011
DIGIPASS 920
Connected reader
for e-Government
2013
DIGIPASS 870
1st dual mode
e-Gov’t reader
2015
Risk IDS
1st RBA with
Intelligent engine
2013
DIGIPASS 760
1st token with
Cronto technology
11
2014
DIGIPASS Bluetooth
Smart-enabled
Authenticators
© 2014 - VASCO Data Security CONFIDENTIAL
Host System
• VACMAN Controller: Combines all VASCO authentication
technologies into a unified backend platform.
• IDENTIKEY Authentication & Federation Servers: Off-
the-shelf centralized servers that with complete functionality.
• Cloud Services: Authentication and digital signature
services for web and mobile application developers run on
VASCO’s servers.
Client Authenticators
• DIGIPASS: Industry-leading number of hardware and
software authentication and signature (electronic and digital)
solutions available to customers.
• Embedded & OEM Solutions: DIGIPASS integrated into
client devices such as Intel’s Identity Protection Technology.
VASCO’s Product Offerings
12
© 2014 - VASCO Data Security CONFIDENTIAL
On-Premise Business Model
Banking:
• Corporate Accounts
• Consumer Accounts
• Internet and Mobile
Applications
Enterprise Security:
• Remote access
• Application Security for
B-to-B and B-to-C
• Employee network access
13
© 2014 - VASCO Data Security CONFIDENTIAL
Cloud-Based Business Model
A cloud-based expansion of VASCO’s traditional
on-premise solution.
“By 2017, more than 50% of enterprises
will choose cloud-based services as the
delivery option for new or refreshed
user authentication implementations,
up from less than 10% today.” - Gartner
Cloud advantages:
• Easy to implement
• Unlimited scalability
• Low implementation cost
• Operating vs. Capital expense
• Rapid deployment
14
© 2014 - VASCO Data Security CONFIDENTIAL
• Strong Authentication in the cloud
• Allows customers to reduce implementation time and cost
• Provides strong authentication protection without
requiring a high level of expertise on staff
• Host system software maintained on VASCO servers:
• Business-to-Business (B2B)
• Business-to-Employee (B2E)
• Business-to-Consumer (B2C)
• Recurring revenue paid by the customer
DIGIPASS as a Service
DIGIPASS as a Service
15
© 2014 - VASCO Data Security CONFIDENTIAL
Key Product Initiatives
DIGIPASS
760
New Attack Methods Require Innovative Solutions
16
DIGIPASS
for Apps
DIGIPASS
Bluetooth
Risk-Based
Authentication
© 2014 - VASCO Data Security CONFIDENTIAL
• Developed by Cambridge University PhD’s
• Acquired by VASCO in May 2013
• Next generation HD Color QR Code
with expanded data capacity
• Combines authentication and
signature capabilities with a high level
of user convenience
• Defeats Man-in-the-Middle attacks
• Fully supported by VACMAN and IDENTIKEY
• Works from a mobile device or DIGIPASS 760
Cronto Visual Image Authentication
DIGIPASS 760
17
© 2014 - VASCO Data Security CONFIDENTIAL
Cronto Visual Image Authentication
How it Works – Scan to Sign
18
© 2014 - VASCO Data Security CONFIDENTIAL
• Incorporates security directly into the application
DIGIPASS for APPS
DIGIPASS for APPS
• Native integration
of two-factor
authentication
• Developers focus
on their application
and outsource the
security to VASCO
Source: Gartner
Global App Downloads Passed 100 Billion Last Year
Estimated mobile app downloads worldwide (in billions)
19
© 2014 - VASCO Data Security CONFIDENTIAL
DIGIPASS for APPS
A Library of Advanced Security Applications
20
All of the necessary building
blocks to secure applications at
every level, from provisioning to
the human interface.
© 2014 - VASCO Data Security CONFIDENTIAL 21
Geolocation
OS Version
JailBreak &
Root Detection
Malware
PIN Activated
Behavior
Analysis
Biometric
ClientScorePolicy
ScoreCalculation
OTPInjection
ClientSideDecisionPolicy
Action 1
Action 2
Action 3
Action 4
Action 5
Action 6
…
1 2
3 4
Action 1
Action 2
Action 3
Action 4
Action 5
Action 6
…
ServerScorePolicy
OTPExtraction
OTPValidation
5 6
ContextPlatformUser
DIGIPASS for APPS
Intelligent Risk Scoring for Mobile Devices
© 2014 - VASCO Data Security CONFIDENTIAL
• Eliminates the biggest hurdles to cloud adoption
• Boosts customer trust
• Security as a competitive differentiator
• Ease of implementation
• Provides a pay-as-you-grow approach
• Next step in DIGIPASS as a Service
Cloud-based Security for Application Developers
DIGIPASS for APPS
22
© 2014 - VASCO Data Security CONFIDENTIAL
Bluetooth Smart-enabled
23
Bluetooth Smart Enables Authentication
with almost any User Device
• Solves the problem of mobile devices with no USB port
• More convenient with no cables to connect
• Secure Bluetooth Smart-enabled connection
• Works in connected and unconnected mode
© 2014 - VASCO Data Security CONFIDENTIAL
Risk-Based
Authentication
How it works:
Risk IDS
Source: Gartner
24
© 2014 - VASCO Data Security CONFIDENTIAL
• Contextual analysis to apply the appropriate level of security
• Real-time analysis and intelligent decision engine focusing on:
• Web and mobile application login
• Financial transactions via online and mobile channels
• Monitoring non-monetary events such as change of address
• Identification of accounts that demonstrate abnormal characteristics
for the prevention of money laundering.
Risk IDS
Risk-Based Authentication
25
© 2014 - VASCO Data Security CONFIDENTIAL
Financials
Historical Overview
26
© 2014 - VASCO Data Security CONFIDENTIAL
Revenue and Operating Income
Revenue Operating Income
in millions USD in millions USD
CAGR
(revenue)
2004-2014
21%
27
© 2014 - VASCO Data Security CONFIDENTIAL
Cash Balance and Net Working Capital
Net Cash Balance Net working capital
in millions USDin millions USD
28
© 2014 - VASCO Data Security
© 2014 - VASCO Data Security
Copyright
 2014 VASCO Data Security. All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form or by any means, electronic, mechanical, photocopying,
recording, or otherwise, without the prior written permission of VASCO Data
Security.
Trademarks
VASCO®, VACMAN®, IDENTIKEY®, aXsGUARD®, DIGIPASS® Cronto®
MYDIGIPASS.COM® and the ® logo are registered or unregistered
trademarks of VASCO Data Security, Inc. and/or VASCO Data Security
International GmbH in the U.S. and other countries
Copyright & Trademarks
30

More Related Content

What's hot

Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020DevOps.com
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story BookSmart Defend UK
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityOnward Security
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security SecureAuth
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...NetMotion Wireless
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWultra
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...CSA Argentina
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddcCSA Argentina
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 
2010 magic quadrant utm final 2
2010 magic quadrant utm final 22010 magic quadrant utm final 2
2010 magic quadrant utm final 2Yustinus Malawau
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationFIDO Alliance
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsMuhammad FAHAD
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardCisco Security
 
Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3Javier Gonzalez
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020State of the OpenCloud Report 2020
State of the OpenCloud Report 2020Dharmesh Thakker
 
An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14Javier Gonzalez
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
 

What's hot (20)

Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
2010 magic quadrant utm final 2
2010 magic quadrant utm final 22010 magic quadrant utm final 2
2010 magic quadrant utm final 2
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020State of the OpenCloud Report 2020
State of the OpenCloud Report 2020
 
An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 

Similar to Apr 28-2015 vasco investor presentation

October 2015 Vasco investor presention
October 2015 Vasco investor presentionOctober 2015 Vasco investor presention
October 2015 Vasco investor presentionrodrida1
 
September 2015 vasco investor presention final
September 2015 vasco investor presention finalSeptember 2015 vasco investor presention final
September 2015 vasco investor presention finalrodrida1
 
Vasco Investor Presentation 11 2009
Vasco Investor Presentation 11 2009Vasco Investor Presentation 11 2009
Vasco Investor Presentation 11 2009oliverm1
 
Sierra Wireless Corporate Overview - November 2014
Sierra Wireless Corporate Overview - November 2014Sierra Wireless Corporate Overview - November 2014
Sierra Wireless Corporate Overview - November 2014Sierra Wireless
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Technologies
 
Iveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor PresentationIveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor PresentationRedChip Companies, Inc.
 
Iveda Investor Presentation
Iveda Investor PresentationIveda Investor Presentation
Iveda Investor Presentationivedasolutions
 
Sierra Wireless Corporate Overview - August 2014
Sierra Wireless Corporate Overview - August 2014Sierra Wireless Corporate Overview - August 2014
Sierra Wireless Corporate Overview - August 2014Sierra Wireless
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesNowSecure
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application EconomyCA Technologies
 
Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015RAVI PRAKASH
 
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 DatadogDDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 DatadogRaviNeppalli
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesUbisecure
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewAbhishek Sood
 
Cyber Priority - Judson Walker
Cyber Priority - Judson WalkerCyber Priority - Judson Walker
Cyber Priority - Judson Walkerscoopnewsgroup
 
Iveda Investor Presentation
Iveda Investor PresentationIveda Investor Presentation
Iveda Investor Presentationivedasolutions
 
Iveda Investor Presentation
Iveda Investor PresentationIveda Investor Presentation
Iveda Investor Presentationivedasolutions
 
Iveda General Investor Presentation
Iveda General Investor PresentationIveda General Investor Presentation
Iveda General Investor Presentationivedasolutions
 

Similar to Apr 28-2015 vasco investor presentation (20)

October 2015 Vasco investor presention
October 2015 Vasco investor presentionOctober 2015 Vasco investor presention
October 2015 Vasco investor presention
 
September 2015 vasco investor presention final
September 2015 vasco investor presention finalSeptember 2015 vasco investor presention final
September 2015 vasco investor presention final
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
Identikey
IdentikeyIdentikey
Identikey
 
Vasco Investor Presentation 11 2009
Vasco Investor Presentation 11 2009Vasco Investor Presentation 11 2009
Vasco Investor Presentation 11 2009
 
Sierra Wireless Corporate Overview - November 2014
Sierra Wireless Corporate Overview - November 2014Sierra Wireless Corporate Overview - November 2014
Sierra Wireless Corporate Overview - November 2014
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
Iveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor PresentationIveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor Presentation
 
Iveda Investor Presentation
Iveda Investor PresentationIveda Investor Presentation
Iveda Investor Presentation
 
Sierra Wireless Corporate Overview - August 2014
Sierra Wireless Corporate Overview - August 2014Sierra Wireless Corporate Overview - August 2014
Sierra Wireless Corporate Overview - August 2014
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 
Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015
 
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 DatadogDDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with Smartphones
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Cyber Priority - Judson Walker
Cyber Priority - Judson WalkerCyber Priority - Judson Walker
Cyber Priority - Judson Walker
 
Iveda Investor Presentation
Iveda Investor PresentationIveda Investor Presentation
Iveda Investor Presentation
 
Iveda Investor Presentation
Iveda Investor PresentationIveda Investor Presentation
Iveda Investor Presentation
 
Iveda General Investor Presentation
Iveda General Investor PresentationIveda General Investor Presentation
Iveda General Investor Presentation
 

Recently uploaded

Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCAMILRI
 
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样sovco
 
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your AreaGorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Areameghakumariji156
 
Corporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdfCorporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdfProbe Gold
 
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...Klinik kandungan
 
Terna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results PresentationTerna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results PresentationTerna SpA
 
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call GirlsPremium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girlsmeghakumariji156
 
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024Osisko Gold Royalties Ltd
 
The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationThe Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationLeonardo
 
AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024gstubel
 
Teekay Corporation Q1-24 Earnings Results
Teekay Corporation Q1-24 Earnings ResultsTeekay Corporation Q1-24 Earnings Results
Teekay Corporation Q1-24 Earnings ResultsTeekay Corporation
 
一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证
一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证
一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证xzxvi5zp
 
Dubai Call Girls/// Hot Afternoon O525547819 Call Girls In Dubai
Dubai Call Girls/// Hot Afternoon O525547819 Call Girls In DubaiDubai Call Girls/// Hot Afternoon O525547819 Call Girls In Dubai
Dubai Call Girls/// Hot Afternoon O525547819 Call Girls In Dubaikojalkojal131
 
Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024Philip Rabenok
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCAMILRI
 
countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024Kweku Zurek
 
Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024KDDI
 

Recently uploaded (20)

SME IPO Opportunity and Trends of May 2024
SME IPO Opportunity and Trends of May 2024SME IPO Opportunity and Trends of May 2024
SME IPO Opportunity and Trends of May 2024
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdf
 
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
 
ITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdf
ITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdfITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdf
ITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdf
 
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your AreaGorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
 
Corporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdfCorporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdf
 
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
 
Terna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results PresentationTerna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results Presentation
 
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call GirlsPremium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
Premium Call Girls In Kapurthala} 9332606886❤️VVIP Sonya Call Girls
 
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
 
Osisko Gold Royalties Ltd - Q1 2024 Results
Osisko Gold Royalties Ltd - Q1 2024 ResultsOsisko Gold Royalties Ltd - Q1 2024 Results
Osisko Gold Royalties Ltd - Q1 2024 Results
 
The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationThe Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results Presentation
 
AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024
 
Teekay Corporation Q1-24 Earnings Results
Teekay Corporation Q1-24 Earnings ResultsTeekay Corporation Q1-24 Earnings Results
Teekay Corporation Q1-24 Earnings Results
 
一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证
一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证
一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证
 
Dubai Call Girls/// Hot Afternoon O525547819 Call Girls In Dubai
Dubai Call Girls/// Hot Afternoon O525547819 Call Girls In DubaiDubai Call Girls/// Hot Afternoon O525547819 Call Girls In Dubai
Dubai Call Girls/// Hot Afternoon O525547819 Call Girls In Dubai
 
Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdf
 
countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024
 
Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024
 

Apr 28-2015 vasco investor presentation

  • 1. © 2014 - VASCO Data Security `
  • 2. © 2014 - VASCO Data Security CONFIDENTIAL Forward Looking Statements Statements made in this presentation that relate to future plans, events or performances are forward- looking statements within the meaning of Section 21e of the Securities Exchange Act of 1934 and Section 27A of the Securities Act of 1933. These forward-looking statements (1) are identified by use of terms and phrases such as “expect”, “believe”, “will”, “anticipate”, “emerging”, “intend”, “plan”, “could”, “may”, “estimate”, “should”, “objective”, “goal”, “possible”, “potential”, “project” and similar words and expressions, but such words and phrases are not the exclusive means of identifying them, and (2) are subject to risks and uncertainties and represent our present expectations or beliefs concerning future events. VASCO cautions that the forward-looking statements are qualified by important factors that could cause actual results to differ materially from those in the forward-looking statements. These risks, uncertainties and other factors that have been described in our Annual Report on Form 10-K for the year ended December 31, 2013 and include, but are not limited to, (a) risks of general market conditions, including currency fluctuations and the uncertainties resulting from turmoil in world economic and financial markets, (b) risks inherent to the computer and network security industry, including rapidly changing technology, evolving industry standards, increasingly sophisticated hacking attempts, increasing numbers of patent infringement claims, changes in customer requirements, price competitive bidding, and changing government regulations, and (c) risks specific to VASCO, including, demand for our products and services, competition from more established firms and others, pressures on price levels and our historical dependence on relatively few products, certain suppliers and certain key customers. Thus, the results that we actually achieve may differ materially from any anticipated results included in, or implied by these statements. Except for our ongoing obligations to disclose material information as required by the U.S. federal securities laws, we do not have any obligations or intention to release publicly any revisions to any forward-looking statements to reflect events or circumstances in the future or to reflect the occurrence of unanticipated events. 2
  • 3. © 2014 - VASCO Data Security CONFIDENTIAL Company Overview VASCO is a global leader in strong authentication, digital signatures, and identity management solutions specializing in securing financial transactions and protecting access to data and applications. 3
  • 4. © 2014 - VASCO Data Security CONFIDENTIAL Listed on NASDAQ in 1997 21% Compound Annual Growth Rate in Revenues from 2004-2014 49 Consecutive Quarters of Profitability Company Overview 4
  • 5. © 2014 - VASCO Data Security CONFIDENTIAL 10,000+ Customers in more than 100 Countries, More than half of the Top 100 Global Banks and 1,700+ Financial Institutions rely on VASCO More than 200 Million Authenticators Sold Company Overview 5
  • 6. © 2014 - VASCO Data Security CONFIDENTIAL Global Company VASCO HQ VASCO Offices VASCO Sales Presence 6
  • 7. © 2014 - VASCO Data Security CONFIDENTIAL Financial Institution Customers VASCO is the world leader in providing two-factor authentication and digital signature solutions to financial institutions. More than half of the Top 100 Global Banks rely on VASCO solutions. 7
  • 8. © 2014 - VASCO Data Security CONFIDENTIAL Frequency and sophistication of attacks has increased High-profile breaches have brought security to the C-level and Board of Directors Global Regulations to protect consumer transactions and personal privacy Mobile is becoming the device of choice There is a greater need to enhance security while improving convenience for users Key Growth Drivers 8
  • 9. © 2014 - VASCO Data Security CONFIDENTIAL "Two out of three attacks focus on [login] credentials at some point in the attack. Trying to get valid credentials is part of many styles of attacks and patterns" - Jay Jacobs, senior analyst with Verizon Authentication & Digital Signature Platform Why Authentication • Data breaches are up 49%(1) • Protects against the newest attacks • Easy to implement and use (1) The Breach Level Index, released February, 2015. 9
  • 10. © 2014 - VASCO Data Security CONFIDENTIAL Technology and Products 1988 1st DIGIPASS “Access Key” 1989 1st DIGIPASS with Keypad 2002 VACMAN Controller 2004 DIGIPASS GO 3 1st 1-button token 2005 IDENTIKEY SERVER 2005 DIGIPASS 810 EMV card reader 2006 DIGIPASS 905 1st connected Card reader 2007 DIGIPASS 270 1st thin form Token w/keypad 2008 DP for Mobile Soft token for phones VASCO Solution Timeline 1991 DIGIPASS 550 with e-Signature 10
  • 11. © 2014 - VASCO Data Security CONFIDENTIAL 2014 Rabo Scanner Card reader with CrontoSIgn technology 2014 DIGIPASS for Apps with CrontoSIgn technology Technology and Products 2013 DIGIPASS for Apps SDK for integration into applications VASCO Solution Timeline 2011 DIGIPASS 920 Connected reader for e-Government 2013 DIGIPASS 870 1st dual mode e-Gov’t reader 2015 Risk IDS 1st RBA with Intelligent engine 2013 DIGIPASS 760 1st token with Cronto technology 11 2014 DIGIPASS Bluetooth Smart-enabled Authenticators
  • 12. © 2014 - VASCO Data Security CONFIDENTIAL Host System • VACMAN Controller: Combines all VASCO authentication technologies into a unified backend platform. • IDENTIKEY Authentication & Federation Servers: Off- the-shelf centralized servers that with complete functionality. • Cloud Services: Authentication and digital signature services for web and mobile application developers run on VASCO’s servers. Client Authenticators • DIGIPASS: Industry-leading number of hardware and software authentication and signature (electronic and digital) solutions available to customers. • Embedded & OEM Solutions: DIGIPASS integrated into client devices such as Intel’s Identity Protection Technology. VASCO’s Product Offerings 12
  • 13. © 2014 - VASCO Data Security CONFIDENTIAL On-Premise Business Model Banking: • Corporate Accounts • Consumer Accounts • Internet and Mobile Applications Enterprise Security: • Remote access • Application Security for B-to-B and B-to-C • Employee network access 13
  • 14. © 2014 - VASCO Data Security CONFIDENTIAL Cloud-Based Business Model A cloud-based expansion of VASCO’s traditional on-premise solution. “By 2017, more than 50% of enterprises will choose cloud-based services as the delivery option for new or refreshed user authentication implementations, up from less than 10% today.” - Gartner Cloud advantages: • Easy to implement • Unlimited scalability • Low implementation cost • Operating vs. Capital expense • Rapid deployment 14
  • 15. © 2014 - VASCO Data Security CONFIDENTIAL • Strong Authentication in the cloud • Allows customers to reduce implementation time and cost • Provides strong authentication protection without requiring a high level of expertise on staff • Host system software maintained on VASCO servers: • Business-to-Business (B2B) • Business-to-Employee (B2E) • Business-to-Consumer (B2C) • Recurring revenue paid by the customer DIGIPASS as a Service DIGIPASS as a Service 15
  • 16. © 2014 - VASCO Data Security CONFIDENTIAL Key Product Initiatives DIGIPASS 760 New Attack Methods Require Innovative Solutions 16 DIGIPASS for Apps DIGIPASS Bluetooth Risk-Based Authentication
  • 17. © 2014 - VASCO Data Security CONFIDENTIAL • Developed by Cambridge University PhD’s • Acquired by VASCO in May 2013 • Next generation HD Color QR Code with expanded data capacity • Combines authentication and signature capabilities with a high level of user convenience • Defeats Man-in-the-Middle attacks • Fully supported by VACMAN and IDENTIKEY • Works from a mobile device or DIGIPASS 760 Cronto Visual Image Authentication DIGIPASS 760 17
  • 18. © 2014 - VASCO Data Security CONFIDENTIAL Cronto Visual Image Authentication How it Works – Scan to Sign 18
  • 19. © 2014 - VASCO Data Security CONFIDENTIAL • Incorporates security directly into the application DIGIPASS for APPS DIGIPASS for APPS • Native integration of two-factor authentication • Developers focus on their application and outsource the security to VASCO Source: Gartner Global App Downloads Passed 100 Billion Last Year Estimated mobile app downloads worldwide (in billions) 19
  • 20. © 2014 - VASCO Data Security CONFIDENTIAL DIGIPASS for APPS A Library of Advanced Security Applications 20 All of the necessary building blocks to secure applications at every level, from provisioning to the human interface.
  • 21. © 2014 - VASCO Data Security CONFIDENTIAL 21 Geolocation OS Version JailBreak & Root Detection Malware PIN Activated Behavior Analysis Biometric ClientScorePolicy ScoreCalculation OTPInjection ClientSideDecisionPolicy Action 1 Action 2 Action 3 Action 4 Action 5 Action 6 … 1 2 3 4 Action 1 Action 2 Action 3 Action 4 Action 5 Action 6 … ServerScorePolicy OTPExtraction OTPValidation 5 6 ContextPlatformUser DIGIPASS for APPS Intelligent Risk Scoring for Mobile Devices
  • 22. © 2014 - VASCO Data Security CONFIDENTIAL • Eliminates the biggest hurdles to cloud adoption • Boosts customer trust • Security as a competitive differentiator • Ease of implementation • Provides a pay-as-you-grow approach • Next step in DIGIPASS as a Service Cloud-based Security for Application Developers DIGIPASS for APPS 22
  • 23. © 2014 - VASCO Data Security CONFIDENTIAL Bluetooth Smart-enabled 23 Bluetooth Smart Enables Authentication with almost any User Device • Solves the problem of mobile devices with no USB port • More convenient with no cables to connect • Secure Bluetooth Smart-enabled connection • Works in connected and unconnected mode
  • 24. © 2014 - VASCO Data Security CONFIDENTIAL Risk-Based Authentication How it works: Risk IDS Source: Gartner 24
  • 25. © 2014 - VASCO Data Security CONFIDENTIAL • Contextual analysis to apply the appropriate level of security • Real-time analysis and intelligent decision engine focusing on: • Web and mobile application login • Financial transactions via online and mobile channels • Monitoring non-monetary events such as change of address • Identification of accounts that demonstrate abnormal characteristics for the prevention of money laundering. Risk IDS Risk-Based Authentication 25
  • 26. © 2014 - VASCO Data Security CONFIDENTIAL Financials Historical Overview 26
  • 27. © 2014 - VASCO Data Security CONFIDENTIAL Revenue and Operating Income Revenue Operating Income in millions USD in millions USD CAGR (revenue) 2004-2014 21% 27
  • 28. © 2014 - VASCO Data Security CONFIDENTIAL Cash Balance and Net Working Capital Net Cash Balance Net working capital in millions USDin millions USD 28
  • 29. © 2014 - VASCO Data Security
  • 30. © 2014 - VASCO Data Security Copyright  2014 VASCO Data Security. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of VASCO Data Security. Trademarks VASCO®, VACMAN®, IDENTIKEY®, aXsGUARD®, DIGIPASS® Cronto® MYDIGIPASS.COM® and the ® logo are registered or unregistered trademarks of VASCO Data Security, Inc. and/or VASCO Data Security International GmbH in the U.S. and other countries Copyright & Trademarks 30