SecurDigital Presentation V7
Upcoming SlideShare
Loading in...5
×
 

SecurDigital Presentation V7

on

  • 491 views

SecurDigital Privacy Edition

SecurDigital Privacy Edition

Statistics

Views

Total Views
491
Views on SlideShare
490
Embed Views
1

Actions

Likes
0
Downloads
8
Comments
0

1 Embed 1

http://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

SecurDigital Presentation V7 SecurDigital Presentation V7 Presentation Transcript

  • Secur communications for all The Genesis Key, Inc. Presentation for Consumers November, 2009 The Genesis Key, Inc. Confidential
  • SecurDigital, Inc. ”SecurDigital has upped the ante considerably here. In a sudden leap, this innovative new product has shaken off the complexity of unified communications and has taken the lead in terms of ease of use, security and interoperability. Starting with simple encryption techniques in a Java-based application, SecurDigital has introduced SecurVoice© Privacy Edition, a next-gen secure digital data transmission solution, which takes the focus away from hardware or firmware centric smartphone offerings and provides a Solution that is application platform, operating system, device and carrier independent. SecurVoice delivers encrypted voice, data or video transmission from any device to any device(s), with selectable encryption algorithms - allowing any companies to literally deploy “Secur Communications”. Bruce F. Magown, CEO SecurDigital, Inc. The Genesis Key, Inc. Confidential
  • Do I need Security for my Cell phone? • Would you mind if you knew someone was listening to all of your calls on your home phone? • Did you know that your cell can be turned on in the off position and the microphone will pick up your private conversations at home? • Did you know that your phone is sending its signal numbers out to wireless towers 24/7? • Did you know the only way to shut down your cell phone is to pull out the battery? • Did you know that our government listens to every cell conversation on Route #95? • Did you know that if you put your bank or credit card number into your cell that it stays there forever? All information the phone receives s put on record. There is no way to dump that info. • If you are leading a Company or responsible for other peoples money that information buck stops with you, for you to be a secure source. • Did you know that even the Bluetooth ear bud could be listened to with a scanner? Imagine someone standing in the street with a hidden scanner and transmitter you are most intimate calls can and are being routed to the internet, especially You- Tube. • Did you know that most of the world is building their infrastructure on Maxi WiFi because it is less expensive and less time consuming to bury land cables? These citizens use their Phone for paying utilities and other bills over their cell phone. • Ask a young computer engineer still in college what does he do all his work on, a lap top or a cell phone, they will tell you that lap tops are from the stone age. They have phones that are more portable, less expensive and handle all pictures, and recordings, documents, letters and forms all installed in the cell phone…You need to see the world is changing in front of your eyes. • That person that says he does not see the need for personal cell security does not understand the world he is living in today… The Genesis Key, Inc. Confidential
  • Disclaimer This presentation serves marketing purposes only. This presentation is made by The Genesis Key, Inc. (the "Company") solely for use at the road show presentation held in connection with the offering of shares of the Company and is strictly confidential. It is furnished to you solely for your information and may not be copied, distributed or otherwise made available to any other person by any recipient. Neither this presentation nor any copy of it may be taken or transmitted outside the United States or distributed outside the United States. Any failure to comply with this restriction may constitute a violation of the U.S. securities laws. The distribution of this document in other jurisdictions may also be restricted by law, and persons into whose possession this presentation comes should inform themselves about, and observe, any such restrictions. The facts and information contained herein are as up to date as is reasonably possible and are subject to revision in the future. None of the Company, Vantage Investment Group, Inc. or any of their parents or subsidiaries or any of such person's directors, officers, employees or advisors nor any other person makes any representation or warranty, express or implied as to, and no reliance should be placed on, the accuracy or completeness of the information contained in this presentation. None of the Company, Vantage Investment Group, Inc. or any of their parents or subsidiaries or any of their directors, officers, employees and advisors nor any other person shall have any liability whatsoever for any loss howsoever arising, directly or indirectly, from any use of this presentation. The same applies to information contained in other material made available at the presentation. While all reasonable care has been taken to ensure the facts stated herein are accurate and that the opinions contained herein are fair and reasonable, this document is selective in nature and is intended to provide an introduction to, and overview of, the business of the Company. Where any information and statistics are quoted from any external source, such information or statistics should not be interpreted as having been adopted or endorsed by the Company as being accurate. This presentation contains forward-looking statements relating to the business, financial performance and results of the Company and/or the industry in which the Company operates. These statements generally are identified by words such as "believes," "expects," "predicts," "intends," "projects," "plans," "estimates," "aims," "foresees," "anticipates,“ "targets," and similar expressions. The forward-looking statements, including but not limited to assumptions, opinions and views of the Company or information from third party sources, contained in this presentation are based on current plans, estimates, assumptions and projections and involve uncertainties and risks. Various factors could cause actual future results, performance or events to differ materially from those described in these statements. None of the Company or Vantage Investment Group, Inc. guarantees that the assumptions underlying such forward-looking statements are free from errors nor do they accept any responsibility for the future accuracy of the opinions expressed in this presentation. No obligation is assumed to update any forward-looking statements. By accepting this presentation you acknowledge that you will be solely responsible for your own assessment of the market and of the market position of the Company and that you will conduct your own analysis and be solely responsible for forming your own view of the potential future performance of the Company's business. This presentation does not constitute an offer or invitation to subscribe for, or purchase, any shares or other securities of the Company and neither this presentation nor anything contained herein shall form the basis of, or be relied on in connection with, any offer or commitment whatsoever in any jurisdiction in which such solicitation, offer or sale would be unlawful, nor shall part, or all, of these materials form the basis of, or be relied on in connection with, any contract or investment decision in relation to any securities. In particular, this presentation is not an offer for sale of securities in the United States. Securities may not be offered or sold in the United States absent registration or an exemption from registration under the U.S. Securities Act of 1933, as amended. Neither the Company nor any selling shareholder intends to register any securities of the Company outside the United States or to conduct a public offering of securities in any jurisdiction other than the United States. This presentation speaks as of September 14, 2009. Neither the delivery of this presentation nor any further discussions of the Company with any of the recipients shall, under any circumstances, create any implication that there has been no change in the affairs of the Company since such date. The Genesis Key, Inc. Confidential
  • Agenda » Introduction » Management Team » Opportunity » Solution » Competition » Pricing Model » Summary The Genesis Key, Inc. Confidential
  • Introduction » The Genesis Key, Inc., incorporated on October 7, 2008, in Dover, Delaware as a ”C” corporation. The Executive Team has been working together on security solutions for four (4) years prior to SecurVoice© being developed as a need for one of those projects championed by Steve I. Cooper, former CIO for White House and DHS, and now CIO of the FAA. » SecurVoice© target markets include; Banking, Financial Services and Brokerage Institutions, Attorney/Client privileged communications, the World Health Organization and HIPPA regulations for voice and data electronic transmission of patients health records between Hospitals, Doctors, Nurses and other long term Health providers, and now by law, the health monitoring systems needing secure communications to comply with Federal Regulations and Emergency Manager’s crisis coordination between all State and Local Police and Fire Departments. The company licenses using a SaaS or Enterprise software model with types for commercial or government. » Sales of cell phones are on pace to reach a billion annually by the end of the decade, when nearly 40 percent of the world's population will own a mobile handset, according to a Gartner report. Asian countries will continue to play a major role in increasing the number of cell phones in circulation to 2.6 billion by 2009, the research firm estimated in the report. Currently, 25 percent of all cell phones are sold in Asian countries; by decade's end, that number will be one in three. » Consumers today are unaware of threats to them as they use their smartphones. Personal conversations, data, banking and health information; all are available to undesirables if the consumer is not protected. » Genesis Key is making secure communications technology available at a retail price point that is device, carrier, operating system and application platform independent to the general marketplace. Note: This is unique in the world today. The Genesis Key, Inc. Confidential
  • Management Team » The Genesis Key management and Advisors are comprised of experienced entrepreneurs and business professionals from the consumer, finance, technology, government and secure homeland industries. The management team possesses a breadth of functional experience in software product development, system and network integration, the marketing of emerging products, technologies, strategic partnering and corporate finance. Management and Board Advisors Bruce Magown, Founder, CEO, Treasurer Steven Cooper is a partner and founding member of Strativest, LLC. He previously held key, senior level technical and managerial information Mr. Magown is CEO of The Genesis Key, Inc., a multi-tenant technology positions in both the private and public sectors. . integration platform for SaaS application which provides complete In addition to 20 years experience in the private sector, Mr. Cooper integration Solutions – as a Service (www.interweave.biz). served at the highest levels of the United States Government. In InterWeave integrates CRM, Finance, ERP, eCommerce, 2002, he was appointed as a special assistant to the President and Subscription-based billing and Telephony applications with Web served as the senior director for information integration in the White Services Databases, etc., for customers in configurable form. House Office of Homeland Security. This was followed in 2003 by his Additionally, Mr. Magown served as the Vice President of the appointment as the first chief information officer at the newly formed Strategic Alliance of Sun/Netscape and built Netscape Professional Department of Homeland Security. In this position, Mr. Cooper had Services to over $200m in four years. responsibility for all information technology assets supporting 190,000 Steve Garrett, Founder, Chairman of the Board, Secretary personnel and 22 agencies. . Mr. Garrett founded The Genesis Key, Inc. while working to solve Norman Byers – Mr. Byers is the managing partner and a founding communication challenges for another business of his: PGC member of Strativest, LLC. He formerly headed Byers Consulting, a Consortium (www.phoenixgenesiscorp.com). He brings over 40 Northern Virginia based consulting firm advising companies accessing years of deep business experience and being CEO of public federal, state and local markets. Mr. Byers has extensive international companies. He has been involved in directing leading edge business experience, having founded joint ventures in Asia and the technology Start-up Companies; providing Executive and Financial Middle East and establishing numerous strategic partnerships Guidance, Marketing, and Sales Management, Corporate Strategic throughout Europe, South America, Asia and the Middle East. Planning, Systems Organization, Security and Efficiency. James McKay - Deputy Chief Financial Officer of the Justice Dept. & first Inspector General of the ICC Clifford Bragdon - Dean of Florida Institute of Technology and Chairman of the Board of the Global Center of Preparedness USAF Major General Eric Rosborg – Chief, Office of Defense Cooperation Turkey, U.S. European Command, Ankara, Turkey, retired. Managed all aspects of security assistance and security cooperation programs necessary to sustain the military-to-military relationship between the United States and Turkey. The Genesis Key, Inc. Confidential
  • Opportunity » Smartphones are enjoying brisker than expected growth, according to a new report from Gartner. The firm's recently released "mobile terminals" market study projects that shipments of mobile phones in general will surpass 1 billion units in 2009, and that "Smartphones" will reach the 200 million mark one year earlier, in 2008. Gartner has boosted its previous projection for mobile phone sales in 2005 "significantly" to 779 million units, according to Ben Wood, Research Vice President of Gartner for Mobile Terminals, a 16 percent increase over 2004. Among other projections, the report says that more than 100 million 3G phones will be sold in 2006, and that the Indian market to overtake the Chinese market in terms of annual sales in 2009. As for the entire Asia/Pacific segment of the mobile phone market, it represents 25 percent of the worldwide market today, Gartner says, predicting that this will increase to 33 percent by 2009. "The world's appetite for mobile phones has exceeded even the most optimistic expectations," said Wood. "Mobile phones could go on to be the most common consumer electronics devices on the planet." Gartner estimates there will be 2.6 billion mobile phones in use by the end of 2009. Smartphones fastest growing category "Smartphone sales broke all records in the first quarter of 2005 and we expect them to double year on year to 2006," says Roberta Cozza, principal analyst at Gartner. And a deeper analysis of the forecast, she explains, "shows that Smartphones are the fastest growing category of device.“ According to Gartner, Windows Mobile Smartphones almost doubled their market share in Q1 2005 over Q1 2004, although that share is a minority one. Upwards of 76 percent of Smartphones run the Symbian OS, according to Gartner, with Linux a distant second at around 14 percent, and Palm OS and Windows Mobile in a virtual tie with 4.6 and 4.5 percent, respectively. Operating System Adoption The Genesis Key, Inc. Confidential
  • Solution Overview SecurVoice© is ultra-strong encryption software. The internal software on your cell phone converts your voice in real-time into encrypted data which is then sent over your carriers infrastructure to the SecurVoice© Enterprise Server where it is de-crypted. It is then re-encrypted and sent over your carrier’s infrastructure the receiving cell phone where it is de-crypted and is converted back to voice. SecurVoice© also features a dual-layered encryption schema which provides full protection against covert listening devices. You may select different encryption algorithms. For example, your outbound conversation may be AES 128 encryption, while your callers inbound conversation may be elliptical curve; making listening to your conversation impossible The Genesis Key, Inc. Confidential
  • Solution Detail » SecurVoice© Privacy Edition is a completely new wireless communication solution and architecture which provides secure communications interoperability with any cell, satellite, walkie-talkie, or VoIP phone system. You can download the 38k Java app from our secure locations world-wide and follow the simple instructions to install. How it Works Solution Overview Key Features The Java app communicates directly ONE-TOUCH SWITCHING • HIPPA compliant privacy-grade strong encryption with our SecurVoice© Enterprise Server BETWEEN PRIVACY AND key (AES (128) asymmetric encryption) plus application as a hosted option or may STANDARD COMMUNICATIONS additional encryption combinations to provide a be resident on your servers. very unique Solution WMS AND VOIP SECURE Additionally, we provide internet virus • Data is encrypted when it leaves the sending COMMUNICATION OPTION device and is de-encrypted by the server. It is then and hacker protection with a firewall INTUITIVE, USER-FRIENDLY re-encrypted (with possible other encryption from CyberSoft. INTERFACE selection) and sent to the receiving device and The solution is operating system, decrypted application platform, device and carrier AVAILABLE TO PURCHASE AND • Software only Solution. No additional hardware independent. DOWNLOAD ONLINE required SOFTWARE BASED SOLUTION – • Implemented on regular smart phones and GSM NOT HARDWARE cellular networks with circuit-switched data service • Full duplex communications • Superior audio quality and ultra low latency • Resides on regular cell phones. Neither the encryption process nor the device is perceived by third parties • The user may update the cell phone firmware or operating system. The cell phone keeps all its original features. The Genesis Key, Inc. Confidential
  • Solution Interoperability Complete Inter-operability. Device, Carrier, Application Platform & Operating System Independent The Genesis Key, Inc. Confidential
  • Competition » In our competitive market research, we have not found any comparative for “software only” secure communications solutions for data, voice and video. Potential competitors are typically in either “Hardware Specific” or “Firmware Specific” categories. http://www.koolspan.com/ Commercial type on hardware system The KoolSpan solution is available today in an Ethernet-based network appliance and client-side Smart Card that plugs into a USB port. Along with streamlined device integration capabilities, KoolSpan delivers a security architecture greatly reducing the effort required for user/network security administration. KoolSpan also is highly suitable for a large range of OEM and embedded systems supporting critical enterprise voice, wireless and data networking applications. http://www.cellcrypt.com/?gclid=CLzViqvJu5YCFQOcFQodXWyeKw Commercial type on hardware system Secure calls can be completed from one mobile device to another mobile device, between a mobile and a landline, or from landline to landline. The architecture requires all secure calls to be routed through a Cellcrypt Switch, which can be publicly or privately hosted. The calls passing through the switch are not decrypted, ensuring complete privacy. http://www.snapdefense.com/pages.php?module=15&cat=12&incat=0 Snapcell is a patented micro-adapter used for secure point-to-point cellular communications over any GSM frequency (850/900/1800/1900). Snapcell is compatible with popular Ericsson T-Series phones including T28, V800, K500i, T637 and several others. Attach Snapcell onto the handset and enjoy military-strength security at toll-voice quality! http://www.sigillu.com/index.html We are pleased to announce the 3rd generation of our secure phones, with improved audio quality, enhanced ultra low latency, and support for the most modern Nokia™ phones. http://www.gdc4s.com/content/detail.cfm?item=97aef0a4-96e4-4ab2-b33b-eb832c4bb4c2 The Sectéra® Wireless GSM® Phone provides end-to-end high assurance secure voice and data communications for commercial GSM wireless networks operating in the 900/1800/1900 MHz bandwidths worldwide. The Sectéra Secure Wireless Phone also can be used as a regular wireless phone, both domestically and abroad, and can exchange secure voice and data communications with the Sectéra Wireline Terminal connected to an analog desktop phone. GSM (Global System for Mobile Communications) is a leading, worldwide, wireless telecommunications technology. The National Security Agency (NSA) has certified the secure phone’s ability to protect information classified Top Secret and below using Type 1 encryption algorithms available to authorized U.S. Government personnel. Note: This primary advantage SecurVoice© has over these Solutions is secure communications interoperability. The Genesis Key, Inc. Confidential
  • Pricing Model The Genesis Key, Inc. Confidential
  • Contact Us For further information regarding SecurVoice©, please contact: The Genesis Key, Inc. 355 I Street SW, Suite #401 Washington, DC 20024 203.912.5532 / 202.701.4900 www.genesis-key.com www.securdigital.com sales@genesis-key.com The Genesis Key, Inc. Confidential