SlideShare a Scribd company logo
1 of 17
What we do


 We offer a secure technology solution for
 seamless connectivity and information sharing
 that works for 100% as software without
 dedicated IT or ISP resources to install and
 use
The Problem
• Secure Information and file sharing is a technical
challenge for users, both private and business
• Cost of securely sharing information remains very
high (VPN infrastructure, IT resources)
• Online theft of identity and information is growing
dramatically
Our Solutions
A. Private Internet use. Encrypted & private Internet
     browsing traffic, GeoIP access bypass.
     Our B2C service: www.privacyprotector.eu
C. GatelessVPN and Secure Share. Seamless connectivity
     for users, direct & encrypted file sharing. It is like VPN with
     “dropbox in house” feature, and platform for other services,
     like chat or remote presentations and online collaboration.
D. Public API. Developers can integrate our network
     technology into their apps through free API for added security
     and online collaboration features.
B2C service: 23K users in first 5 months
Where our users are – network reach
Status figures
• C om m e rcial s tart: 1 5.06.201 1
• O u r firs t p aid P lu s u s e rs cam e in th e firs t m onth of th e s e rvice and growing
• 30K re al u s e rs (M arch , 201 2)
Our Solution - Topology




 Typical VPN architecture:
servers, tokens, IT & ISP resources
        IT managed groups
complicated + expensive
Our Solution - USP


  Traditional VPN Network   GatelessVPN Network

                            Nt
                             o okens
                            N cent lserv
                             o ra ers
                            Na s
                             o ccount
                            N IT or ISPserv needed
                             o ,           ices
                            Esyt use f aerae user
                             a o or v g
                            V hig scaa it
                             ery h l bil y
                            V ua env
                             irt l iromentin minut
                                                 es
                            = S avings of time & cos ts
Our newest feature:
“DirectFiles” for secure sharing
• Simple to use like dropbox
• FAST – no cloud, no upload, instant effect
• Convenient – share files/catalogs through
  email, IM
• Scalable – no file size limits, no data quota
• Secure – tough encryption, dynamic paths,
  no listening points
• Private – invitations only access
How DirectFiles works


Folder or file


                                                                        Recipients emails
                                                                        Secure shared document from sender xvz




                                                                    „sender” shared document „xyz.docx” with You.
                                                                    To access document click on link below:
                                                                    http://shortlink.xy

                                                                    Shared by DirectFiles Service
                                                                    Software required:
                 Invite to secure share:    Set password (option)
                                                                    www.company.com/DirectFiles



                                           Invite by email

                                           Copy secure link




                                            Sent files to Your
                                            Facebook Friends!
Quick comparison
Our Business Model
• Software-only business model based on own patentable technology
• Freemium for B2C (users pay for Premium features)
• License for Business: separate traffic (company network only), legacy systems
 integration
B2B & B2B2C:
• Secure Share: simple like dropbox, yet better for business
• Public API for developers
B2C:
• In progress, viral, runs by itself: 12K users in first 3 months.
• Primary goal: build up PrivacyProtector network
Our Target:
• Small and Medium Business, like Google Apps users:
   • “It is not known how many people use the Google Apps platform,
    although a Google blog post in March 2010 claimed that 25 million people
    had switched to Google Apps.” - Wikipedia
• ISP’s, SI companies, developer community
• Individual Internet users
The Competition
B2C: TOR
   •   Open source – no revenue model
   •   Static, can be tracked back
   •   Relies on exit nodes
   •   Static nodes are high risk for legal responsibilities
   •   Exit nodes are natural listening points


B2B: Regular VPN providers:
   • High cost of purchase and maintenance, limited scalability
   • Requires IT support resources
   • Cannot match our pricing (ExpressVPN: 12,95$ vs. 3$ for our RiccoVPN Plus, and we
    have no central gateway infrastructure costs – with the same will support 100x more
    users)
The Team...

Blazej Marciniak - CEO
Blazej is CEO of eMBT and project leader with 15 years of experience in management, primary responsible for
product development strategy and roadmap. Makes things happen.

Marek Ciesla - VP Sales & Marketing
For 15 years associated with the business of IT industry - co-founder and CEO of MIMIGroup & ALLCinema.
Makes things visible.

Tomasz Widerski - CFO
For 12 years associated the IT industry - co-founder and CEO of several special purpose vehicles, including the
development company Araneo (25 developers).  Makes money flow.

Bartosz Warzecha - Senior Developer
Bartek is a Senior Developer at EMBT Ltd. He is responsible for technical background of the project in the whole
Software development life cycle. Creates things that work.

Krzysztof Koszyka - Developer
Krzysztof is the Software Developer at EMBT Sp z o.o., responsible for designing and developing: client applications,
backoffice. Makes thinks look good.
Questions..?
               Contact:

               Blazej Marciniak, CEO
               bm@gatelessvpn.com
               Tel.   +48 123 994 636
                      +48 602 123 636


               eMBT Limited
               Gromadzka 66
               30-719 Krakow
               Poland
               angel.co/embt-limited-1
               www.gatelessvpn.com

More Related Content

Viewers also liked (11)

Newspaper proposal
Newspaper proposalNewspaper proposal
Newspaper proposal
 
Newspaper proposal
Newspaper proposalNewspaper proposal
Newspaper proposal
 
Newspaper proposal
Newspaper proposalNewspaper proposal
Newspaper proposal
 
Timothy&Kim
Timothy&KimTimothy&Kim
Timothy&Kim
 
Newspaper proposal
Newspaper proposalNewspaper proposal
Newspaper proposal
 
chem ppt
chem pptchem ppt
chem ppt
 
India history modified
India history modifiedIndia history modified
India history modified
 
University of benin gra 15082012
University of benin gra 15082012University of benin gra 15082012
University of benin gra 15082012
 
Time plan
Time planTime plan
Time plan
 
Answers to questions
Answers to questionsAnswers to questions
Answers to questions
 
Roles and responsibilities of project stakeholders by pmi
Roles and responsibilities of project stakeholders by pmiRoles and responsibilities of project stakeholders by pmi
Roles and responsibilities of project stakeholders by pmi
 

Similar to GatelessVPN technology pitch

CubeiTz Brochure
CubeiTz BrochureCubeiTz Brochure
CubeiTz Brochure
Ian Ray
 
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2
 
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
Afkham Azeez
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1
changcai
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Denodo
 

Similar to GatelessVPN technology pitch (20)

Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit Encryption
 
CubeiTz Brochure
CubeiTz BrochureCubeiTz Brochure
CubeiTz Brochure
 
CHiWAO_for_All.compressed
CHiWAO_for_All.compressedCHiWAO_for_All.compressed
CHiWAO_for_All.compressed
 
IBM Connections Cloud introduction
IBM Connections Cloud introductionIBM Connections Cloud introduction
IBM Connections Cloud introduction
 
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
 
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
The KeeeX teaser 2015-12-23-lh-xovoz-tonos
The KeeeX teaser 2015-12-23-lh-xovoz-tonosThe KeeeX teaser 2015-12-23-lh-xovoz-tonos
The KeeeX teaser 2015-12-23-lh-xovoz-tonos
 
Media & Entertainment Solutions via Innovative IT
Media & Entertainment Solutions via Innovative ITMedia & Entertainment Solutions via Innovative IT
Media & Entertainment Solutions via Innovative IT
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...
NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...
NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and Secure
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

GatelessVPN technology pitch

  • 1.
  • 2. What we do We offer a secure technology solution for seamless connectivity and information sharing that works for 100% as software without dedicated IT or ISP resources to install and use
  • 3. The Problem • Secure Information and file sharing is a technical challenge for users, both private and business • Cost of securely sharing information remains very high (VPN infrastructure, IT resources) • Online theft of identity and information is growing dramatically
  • 4. Our Solutions A. Private Internet use. Encrypted & private Internet browsing traffic, GeoIP access bypass. Our B2C service: www.privacyprotector.eu C. GatelessVPN and Secure Share. Seamless connectivity for users, direct & encrypted file sharing. It is like VPN with “dropbox in house” feature, and platform for other services, like chat or remote presentations and online collaboration. D. Public API. Developers can integrate our network technology into their apps through free API for added security and online collaboration features.
  • 5. B2C service: 23K users in first 5 months
  • 6. Where our users are – network reach
  • 7. Status figures • C om m e rcial s tart: 1 5.06.201 1 • O u r firs t p aid P lu s u s e rs cam e in th e firs t m onth of th e s e rvice and growing • 30K re al u s e rs (M arch , 201 2)
  • 8. Our Solution - Topology Typical VPN architecture: servers, tokens, IT & ISP resources IT managed groups complicated + expensive
  • 9. Our Solution - USP Traditional VPN Network GatelessVPN Network Nt o okens N cent lserv o ra ers Na s o ccount N IT or ISPserv needed o , ices Esyt use f aerae user a o or v g V hig scaa it ery h l bil y V ua env irt l iromentin minut es = S avings of time & cos ts
  • 10. Our newest feature: “DirectFiles” for secure sharing • Simple to use like dropbox • FAST – no cloud, no upload, instant effect • Convenient – share files/catalogs through email, IM • Scalable – no file size limits, no data quota • Secure – tough encryption, dynamic paths, no listening points • Private – invitations only access
  • 11. How DirectFiles works Folder or file Recipients emails Secure shared document from sender xvz „sender” shared document „xyz.docx” with You. To access document click on link below: http://shortlink.xy Shared by DirectFiles Service Software required: Invite to secure share: Set password (option) www.company.com/DirectFiles Invite by email Copy secure link Sent files to Your Facebook Friends!
  • 13. Our Business Model • Software-only business model based on own patentable technology • Freemium for B2C (users pay for Premium features) • License for Business: separate traffic (company network only), legacy systems integration B2B & B2B2C: • Secure Share: simple like dropbox, yet better for business • Public API for developers B2C: • In progress, viral, runs by itself: 12K users in first 3 months. • Primary goal: build up PrivacyProtector network
  • 14. Our Target: • Small and Medium Business, like Google Apps users: • “It is not known how many people use the Google Apps platform, although a Google blog post in March 2010 claimed that 25 million people had switched to Google Apps.” - Wikipedia • ISP’s, SI companies, developer community • Individual Internet users
  • 15. The Competition B2C: TOR • Open source – no revenue model • Static, can be tracked back • Relies on exit nodes • Static nodes are high risk for legal responsibilities • Exit nodes are natural listening points B2B: Regular VPN providers: • High cost of purchase and maintenance, limited scalability • Requires IT support resources • Cannot match our pricing (ExpressVPN: 12,95$ vs. 3$ for our RiccoVPN Plus, and we have no central gateway infrastructure costs – with the same will support 100x more users)
  • 16. The Team... Blazej Marciniak - CEO Blazej is CEO of eMBT and project leader with 15 years of experience in management, primary responsible for product development strategy and roadmap. Makes things happen. Marek Ciesla - VP Sales & Marketing For 15 years associated with the business of IT industry - co-founder and CEO of MIMIGroup & ALLCinema. Makes things visible. Tomasz Widerski - CFO For 12 years associated the IT industry - co-founder and CEO of several special purpose vehicles, including the development company Araneo (25 developers).  Makes money flow. Bartosz Warzecha - Senior Developer Bartek is a Senior Developer at EMBT Ltd. He is responsible for technical background of the project in the whole Software development life cycle. Creates things that work. Krzysztof Koszyka - Developer Krzysztof is the Software Developer at EMBT Sp z o.o., responsible for designing and developing: client applications, backoffice. Makes thinks look good.
  • 17. Questions..? Contact: Blazej Marciniak, CEO bm@gatelessvpn.com Tel. +48 123 994 636 +48 602 123 636 eMBT Limited Gromadzka 66 30-719 Krakow Poland angel.co/embt-limited-1 www.gatelessvpn.com

Editor's Notes

  1. We can offer to the business and private users unique connectivity services with very high scalability based on P2P network
  2. Companies and individuals needs to set up a private secure network for sharing and collaboration Traditionally it is achieved by software and hardware installed that is maintained by company IT department. This is expensive. Individuals and small companies can not afford VPN infrastructure cost
  3. Companies and individuals needs to set up a private secure network for sharing and collaboration Traditionally it is achieved by software and hardware installed that is maintained by company IT department. This is expensive. Individuals and small companies can not afford VPN infrastructure cost
  4. Scalability tested up to 100k users No central server is required Security checker built in No token or login credentials is required Network autoconfiguration Dynamic traffic management
  5. 5 seconds Global business We are already almoust arount the world
  6. Dynamic traffic, no ability to block
  7. Cloud Based Service is not always best option, with secured powered by PrivacyProtector Network (" friendtofriend " ; " directfile ") application you can share, collaborate and control resources on your PC/MAC/iPhone or Android based Mobile and CE devices without login/password requirements. 
  8. Team is compelete set of skills: We have project manager expert Marketing expert Corporate finance expert Software architect Software developer