SlideShare a Scribd company logo
1 of 27
October, 2015
Investor Presentation
1
Statements made in this presentation that relate to future plans, events or performances are forward-looking statements within
the meaning of Section 21e of the Securities Exchange Act of 1934 and Section 27A of the Securities Act of 1933. These forward-
looking statements (1) are identified by use of terms and phrases such as “expect”, “believe”, “will”, “anticipate”, “emerging”,
“intend”, “plan”, “could”, “may”, “estimate”, “should”, “objective”, “goal”, “possible”, “potential”, “project” and similar words
and expressions, but such words and phrases are not the exclusive means of identifying them, and (2) are subject to risks
and uncertainties and represent our present expectations or beliefs concerning future events. VASCO cautions that the forward-
looking statements are qualified by important factors that could cause actual results to differ materially from those in the forward-
looking statements. These risks, uncertainties and other factors that have been described in our Annual Report on Form 10-K
for the year ended December 31, 2013 and include, but are not limited to, (a) risks of general market conditions, including currency
fluctuations and the uncertainties resulting from turmoil in world economic and financial markets, (b) risks inherent
to the computer and network security industry, including rapidly changing technology, evolving industry standards, increasingly
sophisticated hacking attempts, increasing numbers of patent infringement claims, changes in customer requirements, price
competitive bidding, and changing government regulations, and (c) risks specific to VASCO, including, demand for our products
and services, competition from more established firms and others, pressures on price levels and our historical dependence
on relatively few products, certain suppliers and certain key customers. Thus, the results that we actually achieve may differ
materially from any anticipated results included in, or implied by these statements. Except for our ongoing obligations to disclose
material information as required by the U.S. federal securities laws, we do not have any obligations or intention to release publicly
any revisions to any forward-looking statements to reflect events or circumstances in the future or to reflect the occurrence
of unanticipated events.
Forward Looking Statements
2
Listed on NASDAQ in 1997
Company Highlights
21% Compound Annual
Growth Rate in Revenue
from 2004-2014
51 Consecutive Quarters
of Profitability
3
Company Highlights
More than half
of the top
100Global Banks
Financial Institutions
rely on VASCO
1.7K+
More than
200MAuthenticators sold
10K+Customers in more
than 100 countries
Global Company
383 employees
Local people/markets
Local expertise and support
VASCO HQ
VASCO Offices
VASCO Sales
4
5
The Critical Role of Authentication
(1) The Breach Level Index, released February, 2015.
Authentication is the first line of defense
Data breaches are up 49%(1)
Authentication protects against the newest attacks
Authentication is easy to implement and use
Two out of three attacks focus on [login] credentials at some point in the attack.
Verizon Data Breach Investigations Report
1. The frequency and sophistication
of hacking attacks has increased.
2. High-profile breaches have brought security
to the C-Level and Board of Directors.
3. Regulations to protect consumer
transactions and personal privacy.
4. Mobile phones have become the device
of choice for consumer banking.
5. Increasing demand for frictionless,
transparent security.
Key Growth Drivers
6
Application Security:
Stand-alone application
SDK for app integration
Market Segments
7
Banking Security:
Commercial Accounts
Retail Accounts
Employee Access
Enterprise Security:
Remote access
Employee network access
A world leader in two-factor authentication
and transaction signing for financial institutions
More than half of the top 100 global banks rely
on VASCO solutions to prevent fraud
More than 1,700 banking customers
Financial Institution Customers
8
9
Authentication and fraud prevention for multi-channel applications
Product Strategy
Multi-Factor
Authentication
Mobile Application
Security
Risk
Management
VASCO Strategy: Leverage new technology to deliver higher levels of security
and fraud prevention that are frictionless and transparent to the end user.
10
The First 20 Years:
VASCO Innovation Timeline
1989
1st DIGIPASS
with Keypad
1988
1st DIGIPASS
“Access Key”
1991
DIGIPASS 550
with e-Signature
2002
VACMAN
Controller
2004
DIGIPASS GO 3
1st 1-button token
2005
IDENTIKEY
SERVER
2005
DIGIPASS 810
EMV card reader
2007
DIGIPASS 270
1st thin form
Token w/keypad
2008
DP for Mobile
Soft token
for phones
2006
DIGIPASS 905
1st connected
Card reader
11
The Last 3 Years:
VASCO Innovation Timeline
2013
DIGIPASS for Apps
SDK for integration
into applications
2013
DIGIPASS 760
1st token with
Cronto technology
2014
Rabo Scanner
1st Card reader with
Cronto technology
2014
DIGIPASS for Apps
1st with Cronto
technology
2014
DIGIPASS Bluetooth
1st Smart-enabled
Authenticators
2015
IDENTIKEY
Risk Manager
Anti-fraud solution
2015
DIGIPASS for Apps
with RASP
Application Protection
2011
DIGIPASS 920
1st Connected reader
for e-Government
12
Developer Tools
DIGIPASS for Apps: Software
development kit (SDK) for
native integration of
application security
VASCO Product Offerings
Host System
VACMAN Controller: All VASCO
authentication technologies in a
unified backend platform
IDENTIKEY Authentication
Server: Centralized server with
complete functionality
Cloud Services: Authentication
services hosted by VASCO
Client Authenticators
DIGIPASS: Industry-leading
hardware and software
authenticators
13
New Attack Methods Require Innovative Solutions
Key Product Initiatives for 2015 and 2016
Intelligent Fraud
Prevention
IDENTIKEY Risk Manger
DIGIPASS
for Apps
Cronto
Technology
DIGIPASS
Bluetooth-smart
DIGIPASS 760 / 780 / 880
Next generation HD Color QR Code
Authentication and signature capabilities with a high
level of user convenience
Defeats Man-in-the-Middle attacks
Fully supported by VACMAN and IDENTIKEY
Integrated into DIGIPASS for Apps/Mobile or
available as a hardware device
14
Cronto Visual Authentication
April 2015
The most advanced protection against the most sophisticated attacks
15
How It Works
Cronto Visual Authentication
CLICK
Bank generates the Cronto visual cryptogram and the Customer takes a photo of the computer screen
using the CrontoSign client.1
16
How It Works
Cronto Visual Authentication
CHECK
Customer checks payment details on the phone comparing to the web page and enters the
authorization code if details are correct.2
17
By 2017, more than a quarter-trillion mobile apps will be downloaded each year
DIGIPASS for Apps - Mobile Application Protection
Source: Gartner
DIGIPASS for Apps/Mobile
Mobile Application Protection – Beyond Authentication
18
Current and future features
Allows any developer to integrate
security features into their application
Developers focus on their application
and outsource the security to VASCO
Comprehensive library of essential
security functions
18
Geolocation
OS Version
JailBreak &
Rootkit
Malware
PIN Activated
Behavior
Analysis
Biometric
ClientScorePolicy
ScoreCalculation
OTPInjection
ClientSideDecisionPolicy
Action 1
Action 2
Action 3
Action 4
Action 5
Action 6
…
Defined by the customer when
customizing the application, delivered
within the App or with an external XML
Define by customer when customizing
the application, delivered within the
App or with an external XML
1 2
3 4
Action 1
Action 2
Action 3
Action 4
Action 5
Action 6
…
ServerScorePolicy
OTPExtraction
OTPValidation
5 6
ContextPlatformUser
DIGIPASS for Apps – Authentication with Risk Scoring
19
20
Bluetooth Smart enabled Authenticators connect with almost any mobile user device
Solves the problem of mobile devices with no USB port
More convenient with no cables to connect
Bluetooth Smart-enabled Authenticators
Contextual analysis to apply the appropriate level of security
Real-time analysis and intelligent decision engine focusing on:
• Web and mobile application login
• Financial transactions via online and mobile channels
• Monitoring non-monetary events such as change of address
• Identification of accounts that demonstrate abnormal
characteristics for the prevention of money laundering
Risk-Based Authentication and Fraud Prevention
IDENTIKEY Risk Manager
21
How IDENTIKEY Risk Manager Works
Information
Contextual
Decision Policy
User
requests
an action
Intelligent
Risk
Decision
Allow
Deny
Require
more info
JailBreak &
Root Detection
• Step-up authentication
• Transaction verification
Allow
with fine-
grain audit
Biometrics
PIN
Activated
OS Version
Geolocation
22
FINANCIAL INFORMATION
Historical Overview
23
Revenue and Operating Income
24
29.9
54.6
76.1
120.0
133.0
101.7
108.0
168.1
154.0 155.0
201.5
139.1
190.6
5.6
11.0
18.9
30.1 28.1
12.6 12.4
24.8 21.0
13.7
38.1
25.4
45.3
2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 Q3 YTD 2014 Q3 YTD 2015
Revenue Operating Income
(in millions USD)
CAGR
(revenue)
2004-2014
21%
Cash Balance and Net Working Capital
25
12.6
38.8
57.7
67.6
85.5 84.5
106.5
98.6
137.4
184.0
22.1
52.4
75.9
87.6
96.9
108.6
129.5 124.5
161.0
204.8
2006 2007 2008 2009 2010 2011 2012 2013 2014 Q3 2015
Net Cash Balance Net Working Capital
(in millions USD)
26
Copyright
2015 VASCO Data Security. All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission
of VASCO Data Security.
Trademarks
VASCO®, VACMAN®, IDENTIKEY®, aXsGUARD®, DIGIPASS®, Cronto®, DIGIPASS for Apps®, DIGIPASS
for Mobile®, MYDIGIPASS® MYDIGIPASS.COM® and the ® logo are registered or unregistered trademarks
of VASCO Data Security, Inc. and/or VASCO Data Security International GmbH in the U.S. and other countries.
Copyright & Trademarks

More Related Content

What's hot

COMSovereign Investor Presentation Deck December 2020
COMSovereign Investor Presentation Deck December 2020COMSovereign Investor Presentation Deck December 2020
COMSovereign Investor Presentation Deck December 2020RedChip Companies, Inc.
 
Micrso Strategy Advanced Guide
Micrso Strategy Advanced GuideMicrso Strategy Advanced Guide
Micrso Strategy Advanced Guidedivjeev
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...TransUnion
 
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionCurrent Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionFIDO Alliance
 
Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsCognizant
 
The Consumerization of Authentication with iovation
The Consumerization of Authentication with iovationThe Consumerization of Authentication with iovation
The Consumerization of Authentication with iovationTransUnion
 
COMSovereign Investor Presentation Deck March 2021
COMSovereign Investor Presentation Deck March 2021COMSovereign Investor Presentation Deck March 2021
COMSovereign Investor Presentation Deck March 2021RedChip Companies, Inc.
 
COMSovereign Investor Presentation Deck Feb 2021
COMSovereign Investor Presentation Deck Feb 2021COMSovereign Investor Presentation Deck Feb 2021
COMSovereign Investor Presentation Deck Feb 2021RedChip Companies, Inc.
 
IRJET - BI: Blockchain in Insurance
IRJET -  	  BI: Blockchain in InsuranceIRJET -  	  BI: Blockchain in Insurance
IRJET - BI: Blockchain in InsuranceIRJET Journal
 
The When, Why and How of Mobile Fraud Prevention
The When, Why and How of Mobile Fraud Prevention The When, Why and How of Mobile Fraud Prevention
The When, Why and How of Mobile Fraud Prevention TransUnion
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment AuthenticationFIDO Alliance
 
IDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentIDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentBee_Ware
 

What's hot (15)

COMSovereign Investor Presentation Deck December 2020
COMSovereign Investor Presentation Deck December 2020COMSovereign Investor Presentation Deck December 2020
COMSovereign Investor Presentation Deck December 2020
 
Micrso Strategy Advanced Guide
Micrso Strategy Advanced GuideMicrso Strategy Advanced Guide
Micrso Strategy Advanced Guide
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionCurrent Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
 
Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, Solutions
 
The Consumerization of Authentication with iovation
The Consumerization of Authentication with iovationThe Consumerization of Authentication with iovation
The Consumerization of Authentication with iovation
 
COMSovereign Investor Presentation Deck March 2021
COMSovereign Investor Presentation Deck March 2021COMSovereign Investor Presentation Deck March 2021
COMSovereign Investor Presentation Deck March 2021
 
COMSovereign Investor Presentation Deck Feb 2021
COMSovereign Investor Presentation Deck Feb 2021COMSovereign Investor Presentation Deck Feb 2021
COMSovereign Investor Presentation Deck Feb 2021
 
Case Study: Wilo bank
Case Study: Wilo bankCase Study: Wilo bank
Case Study: Wilo bank
 
Case Study: Falabella
Case Study: FalabellaCase Study: Falabella
Case Study: Falabella
 
IRJET - BI: Blockchain in Insurance
IRJET -  	  BI: Blockchain in InsuranceIRJET -  	  BI: Blockchain in Insurance
IRJET - BI: Blockchain in Insurance
 
The When, Why and How of Mobile Fraud Prevention
The When, Why and How of Mobile Fraud Prevention The When, Why and How of Mobile Fraud Prevention
The When, Why and How of Mobile Fraud Prevention
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment Authentication
 
IDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentIDC - Security : From Pain To Empowerment
IDC - Security : From Pain To Empowerment
 

Similar to October 2015 Vasco investor presention

Apr 28-2015 vasco investor presentation
Apr 28-2015 vasco investor presentationApr 28-2015 vasco investor presentation
Apr 28-2015 vasco investor presentationVASCO Data Security
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015Cyren, Inc
 
Vasco Investor Presentation 11 2009
Vasco Investor Presentation 11 2009Vasco Investor Presentation 11 2009
Vasco Investor Presentation 11 2009oliverm1
 
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 DatadogDDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 DatadogRaviNeppalli
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesUbisecure
 
Intro To Observability-March-2023.pdf
Intro To Observability-March-2023.pdfIntro To Observability-March-2023.pdf
Intro To Observability-March-2023.pdfPremDomingo
 
Monitor multi-cloud deployments with Elastic Observability
Monitor multi-cloud deployments with Elastic ObservabilityMonitor multi-cloud deployments with Elastic Observability
Monitor multi-cloud deployments with Elastic ObservabilityElasticsearch
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016InvestorSymantec
 
Payment Security Market by Product Type, Distribution Channel, End User 2024-...
Payment Security Market by Product Type, Distribution Channel, End User 2024-...Payment Security Market by Product Type, Distribution Channel, End User 2024-...
Payment Security Market by Product Type, Distribution Channel, End User 2024-...IMARC Group
 
Chapter 7 regulatory technology
Chapter 7   regulatory technologyChapter 7   regulatory technology
Chapter 7 regulatory technologyQuan Risk
 
M&A doc strategies of Avaloq acquisition
M&A doc strategies of Avaloq acquisitionM&A doc strategies of Avaloq acquisition
M&A doc strategies of Avaloq acquisitionVKVirata1
 
Symantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationSymantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationInvestorSymantec
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety
 
Identity Verification Market Analysis.pdf
Identity Verification Market Analysis.pdfIdentity Verification Market Analysis.pdf
Identity Verification Market Analysis.pdfsagarsingh443888
 
BFSI Security Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
BFSI Security Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...BFSI Security Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
BFSI Security Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...IMARC Group
 
Chapter 12 regulatory technology for aml compliance
Chapter 12   regulatory technology for aml complianceChapter 12   regulatory technology for aml compliance
Chapter 12 regulatory technology for aml complianceQuan Risk
 
Financial results and Earnings Announcements - Q1 FY 22
Financial results and Earnings Announcements - Q1 FY 22   Financial results and Earnings Announcements - Q1 FY 22
Financial results and Earnings Announcements - Q1 FY 22 Intellect Design Arena .
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyVASCO Data Security
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_enAlix Murphy
 

Similar to October 2015 Vasco investor presention (20)

Apr 28-2015 vasco investor presentation
Apr 28-2015 vasco investor presentationApr 28-2015 vasco investor presentation
Apr 28-2015 vasco investor presentation
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015
 
Vasco Investor Presentation 11 2009
Vasco Investor Presentation 11 2009Vasco Investor Presentation 11 2009
Vasco Investor Presentation 11 2009
 
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 DatadogDDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with Smartphones
 
Intro To Observability-March-2023.pdf
Intro To Observability-March-2023.pdfIntro To Observability-March-2023.pdf
Intro To Observability-March-2023.pdf
 
Monitor multi-cloud deployments with Elastic Observability
Monitor multi-cloud deployments with Elastic ObservabilityMonitor multi-cloud deployments with Elastic Observability
Monitor multi-cloud deployments with Elastic Observability
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
 
Payment Security Market by Product Type, Distribution Channel, End User 2024-...
Payment Security Market by Product Type, Distribution Channel, End User 2024-...Payment Security Market by Product Type, Distribution Channel, End User 2024-...
Payment Security Market by Product Type, Distribution Channel, End User 2024-...
 
Chapter 7 regulatory technology
Chapter 7   regulatory technologyChapter 7   regulatory technology
Chapter 7 regulatory technology
 
M&A doc strategies of Avaloq acquisition
M&A doc strategies of Avaloq acquisitionM&A doc strategies of Avaloq acquisition
M&A doc strategies of Avaloq acquisition
 
Symantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationSymantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentation
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
Identity Verification Market Analysis.pdf
Identity Verification Market Analysis.pdfIdentity Verification Market Analysis.pdf
Identity Verification Market Analysis.pdf
 
BFSI Security Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
BFSI Security Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...BFSI Security Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
BFSI Security Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
 
Chapter 12 regulatory technology for aml compliance
Chapter 12   regulatory technology for aml complianceChapter 12   regulatory technology for aml compliance
Chapter 12 regulatory technology for aml compliance
 
Financial results and Earnings Announcements - Q1 FY 22
Financial results and Earnings Announcements - Q1 FY 22   Financial results and Earnings Announcements - Q1 FY 22
Financial results and Earnings Announcements - Q1 FY 22
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 

Recently uploaded

The Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanityThe Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanityJohanAspro
 
WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024Hector Del Castillo, CPM, CPMM
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfProbe Gold
 
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024Osisko Gold Royalties Ltd
 
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书Fir La
 
slideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfslideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfsansanir
 
Basic Accountants in|TaxlinkConcept.pdf
Basic  Accountants in|TaxlinkConcept.pdfBasic  Accountants in|TaxlinkConcept.pdf
Basic Accountants in|TaxlinkConcept.pdftaxlinkcpa
 
如何办理东俄勒冈大学毕业证(文凭)EOU学位证书
如何办理东俄勒冈大学毕业证(文凭)EOU学位证书如何办理东俄勒冈大学毕业证(文凭)EOU学位证书
如何办理东俄勒冈大学毕业证(文凭)EOU学位证书Fir La
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfProbe Gold
 
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 60009654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000Sapana Sha
 
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书Fir La
 
The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...
The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...
The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...Kumaran637735
 
Q1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfQ1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfProbe Gold
 
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCRSapana Sha
 
the 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdfthe 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdfFrancenel Paul
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024CollectiveMining1
 

Recently uploaded (20)

The Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanityThe Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanity
 
WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdf
 
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024
 
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
 
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书
 
slideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfslideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdf
 
Basic Accountants in|TaxlinkConcept.pdf
Basic  Accountants in|TaxlinkConcept.pdfBasic  Accountants in|TaxlinkConcept.pdf
Basic Accountants in|TaxlinkConcept.pdf
 
如何办理东俄勒冈大学毕业证(文凭)EOU学位证书
如何办理东俄勒冈大学毕业证(文凭)EOU学位证书如何办理东俄勒冈大学毕业证(文凭)EOU学位证书
如何办理东俄勒冈大学毕业证(文凭)EOU学位证书
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdf
 
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCRCall Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
 
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 60009654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
 
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Serviceyoung call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
 
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
 
Model Call Girl in Uttam Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Uttam Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Uttam Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Uttam Nagar Delhi reach out to us at 🔝9953056974🔝
 
The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...
The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...
The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...
 
Q1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfQ1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdf
 
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
 
the 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdfthe 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdf
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024
 

October 2015 Vasco investor presention

  • 2. 1 Statements made in this presentation that relate to future plans, events or performances are forward-looking statements within the meaning of Section 21e of the Securities Exchange Act of 1934 and Section 27A of the Securities Act of 1933. These forward- looking statements (1) are identified by use of terms and phrases such as “expect”, “believe”, “will”, “anticipate”, “emerging”, “intend”, “plan”, “could”, “may”, “estimate”, “should”, “objective”, “goal”, “possible”, “potential”, “project” and similar words and expressions, but such words and phrases are not the exclusive means of identifying them, and (2) are subject to risks and uncertainties and represent our present expectations or beliefs concerning future events. VASCO cautions that the forward- looking statements are qualified by important factors that could cause actual results to differ materially from those in the forward- looking statements. These risks, uncertainties and other factors that have been described in our Annual Report on Form 10-K for the year ended December 31, 2013 and include, but are not limited to, (a) risks of general market conditions, including currency fluctuations and the uncertainties resulting from turmoil in world economic and financial markets, (b) risks inherent to the computer and network security industry, including rapidly changing technology, evolving industry standards, increasingly sophisticated hacking attempts, increasing numbers of patent infringement claims, changes in customer requirements, price competitive bidding, and changing government regulations, and (c) risks specific to VASCO, including, demand for our products and services, competition from more established firms and others, pressures on price levels and our historical dependence on relatively few products, certain suppliers and certain key customers. Thus, the results that we actually achieve may differ materially from any anticipated results included in, or implied by these statements. Except for our ongoing obligations to disclose material information as required by the U.S. federal securities laws, we do not have any obligations or intention to release publicly any revisions to any forward-looking statements to reflect events or circumstances in the future or to reflect the occurrence of unanticipated events. Forward Looking Statements
  • 3. 2 Listed on NASDAQ in 1997 Company Highlights 21% Compound Annual Growth Rate in Revenue from 2004-2014 51 Consecutive Quarters of Profitability
  • 4. 3 Company Highlights More than half of the top 100Global Banks Financial Institutions rely on VASCO 1.7K+ More than 200MAuthenticators sold 10K+Customers in more than 100 countries
  • 5. Global Company 383 employees Local people/markets Local expertise and support VASCO HQ VASCO Offices VASCO Sales 4
  • 6. 5 The Critical Role of Authentication (1) The Breach Level Index, released February, 2015. Authentication is the first line of defense Data breaches are up 49%(1) Authentication protects against the newest attacks Authentication is easy to implement and use Two out of three attacks focus on [login] credentials at some point in the attack. Verizon Data Breach Investigations Report
  • 7. 1. The frequency and sophistication of hacking attacks has increased. 2. High-profile breaches have brought security to the C-Level and Board of Directors. 3. Regulations to protect consumer transactions and personal privacy. 4. Mobile phones have become the device of choice for consumer banking. 5. Increasing demand for frictionless, transparent security. Key Growth Drivers 6
  • 8. Application Security: Stand-alone application SDK for app integration Market Segments 7 Banking Security: Commercial Accounts Retail Accounts Employee Access Enterprise Security: Remote access Employee network access
  • 9. A world leader in two-factor authentication and transaction signing for financial institutions More than half of the top 100 global banks rely on VASCO solutions to prevent fraud More than 1,700 banking customers Financial Institution Customers 8
  • 10. 9 Authentication and fraud prevention for multi-channel applications Product Strategy Multi-Factor Authentication Mobile Application Security Risk Management VASCO Strategy: Leverage new technology to deliver higher levels of security and fraud prevention that are frictionless and transparent to the end user.
  • 11. 10 The First 20 Years: VASCO Innovation Timeline 1989 1st DIGIPASS with Keypad 1988 1st DIGIPASS “Access Key” 1991 DIGIPASS 550 with e-Signature 2002 VACMAN Controller 2004 DIGIPASS GO 3 1st 1-button token 2005 IDENTIKEY SERVER 2005 DIGIPASS 810 EMV card reader 2007 DIGIPASS 270 1st thin form Token w/keypad 2008 DP for Mobile Soft token for phones 2006 DIGIPASS 905 1st connected Card reader
  • 12. 11 The Last 3 Years: VASCO Innovation Timeline 2013 DIGIPASS for Apps SDK for integration into applications 2013 DIGIPASS 760 1st token with Cronto technology 2014 Rabo Scanner 1st Card reader with Cronto technology 2014 DIGIPASS for Apps 1st with Cronto technology 2014 DIGIPASS Bluetooth 1st Smart-enabled Authenticators 2015 IDENTIKEY Risk Manager Anti-fraud solution 2015 DIGIPASS for Apps with RASP Application Protection 2011 DIGIPASS 920 1st Connected reader for e-Government
  • 13. 12 Developer Tools DIGIPASS for Apps: Software development kit (SDK) for native integration of application security VASCO Product Offerings Host System VACMAN Controller: All VASCO authentication technologies in a unified backend platform IDENTIKEY Authentication Server: Centralized server with complete functionality Cloud Services: Authentication services hosted by VASCO Client Authenticators DIGIPASS: Industry-leading hardware and software authenticators
  • 14. 13 New Attack Methods Require Innovative Solutions Key Product Initiatives for 2015 and 2016 Intelligent Fraud Prevention IDENTIKEY Risk Manger DIGIPASS for Apps Cronto Technology DIGIPASS Bluetooth-smart
  • 15. DIGIPASS 760 / 780 / 880 Next generation HD Color QR Code Authentication and signature capabilities with a high level of user convenience Defeats Man-in-the-Middle attacks Fully supported by VACMAN and IDENTIKEY Integrated into DIGIPASS for Apps/Mobile or available as a hardware device 14 Cronto Visual Authentication April 2015 The most advanced protection against the most sophisticated attacks
  • 16. 15 How It Works Cronto Visual Authentication CLICK Bank generates the Cronto visual cryptogram and the Customer takes a photo of the computer screen using the CrontoSign client.1
  • 17. 16 How It Works Cronto Visual Authentication CHECK Customer checks payment details on the phone comparing to the web page and enters the authorization code if details are correct.2
  • 18. 17 By 2017, more than a quarter-trillion mobile apps will be downloaded each year DIGIPASS for Apps - Mobile Application Protection Source: Gartner
  • 19. DIGIPASS for Apps/Mobile Mobile Application Protection – Beyond Authentication 18 Current and future features Allows any developer to integrate security features into their application Developers focus on their application and outsource the security to VASCO Comprehensive library of essential security functions 18
  • 20. Geolocation OS Version JailBreak & Rootkit Malware PIN Activated Behavior Analysis Biometric ClientScorePolicy ScoreCalculation OTPInjection ClientSideDecisionPolicy Action 1 Action 2 Action 3 Action 4 Action 5 Action 6 … Defined by the customer when customizing the application, delivered within the App or with an external XML Define by customer when customizing the application, delivered within the App or with an external XML 1 2 3 4 Action 1 Action 2 Action 3 Action 4 Action 5 Action 6 … ServerScorePolicy OTPExtraction OTPValidation 5 6 ContextPlatformUser DIGIPASS for Apps – Authentication with Risk Scoring 19
  • 21. 20 Bluetooth Smart enabled Authenticators connect with almost any mobile user device Solves the problem of mobile devices with no USB port More convenient with no cables to connect Bluetooth Smart-enabled Authenticators
  • 22. Contextual analysis to apply the appropriate level of security Real-time analysis and intelligent decision engine focusing on: • Web and mobile application login • Financial transactions via online and mobile channels • Monitoring non-monetary events such as change of address • Identification of accounts that demonstrate abnormal characteristics for the prevention of money laundering Risk-Based Authentication and Fraud Prevention IDENTIKEY Risk Manager 21
  • 23. How IDENTIKEY Risk Manager Works Information Contextual Decision Policy User requests an action Intelligent Risk Decision Allow Deny Require more info JailBreak & Root Detection • Step-up authentication • Transaction verification Allow with fine- grain audit Biometrics PIN Activated OS Version Geolocation 22
  • 25. Revenue and Operating Income 24 29.9 54.6 76.1 120.0 133.0 101.7 108.0 168.1 154.0 155.0 201.5 139.1 190.6 5.6 11.0 18.9 30.1 28.1 12.6 12.4 24.8 21.0 13.7 38.1 25.4 45.3 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 Q3 YTD 2014 Q3 YTD 2015 Revenue Operating Income (in millions USD) CAGR (revenue) 2004-2014 21%
  • 26. Cash Balance and Net Working Capital 25 12.6 38.8 57.7 67.6 85.5 84.5 106.5 98.6 137.4 184.0 22.1 52.4 75.9 87.6 96.9 108.6 129.5 124.5 161.0 204.8 2006 2007 2008 2009 2010 2011 2012 2013 2014 Q3 2015 Net Cash Balance Net Working Capital (in millions USD)
  • 27. 26 Copyright 2015 VASCO Data Security. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of VASCO Data Security. Trademarks VASCO®, VACMAN®, IDENTIKEY®, aXsGUARD®, DIGIPASS®, Cronto®, DIGIPASS for Apps®, DIGIPASS for Mobile®, MYDIGIPASS® MYDIGIPASS.COM® and the ® logo are registered or unregistered trademarks of VASCO Data Security, Inc. and/or VASCO Data Security International GmbH in the U.S. and other countries. Copyright & Trademarks