SlideShare a Scribd company logo
Data protection has never been
more relevant than in today’s
data-driven world
#privacymatters
39%of
companies
globally
experienced a
data breach in
20181 - and seems
to be rising at an
exponential rate2
At least
20%
in revenue
loss3
Stock
underperformance of
up to 15.6%
after 3 years5
Expected Loss of
at least
7.8% of revenue
and up to
€7.8 million in fines
and up to
6.1%in stocks after 3 years
What happens if you do not protect data
&
{ }&
Fines up to
4%
of global
revenue4
Data Protection
Security Privacy
Can protect data from
breaches, but there is still a
chance it will get breached.
Even if security is breached, it still can protect data
while providing accurate information.
Limited access behind lock
and key because very
limited number of people
are entrusted with the key.
Anyone can access the protected data =>
Finding better business solutions faster for data-
holding company by enabling more cooperation
and competition for best analytics solutions
Privacy is better value prop for business and markets
Why Privacy instead of Security?
A real life example
• A Car Rental company is trying to privatize its data so that
when they give this data to an Analytics company, it would
not leak the privacy of an individual customer. However, the
Analytics company wants to learn accurate patterns from the
Car Rental company’s client base to provide more business
value to the Car Rental company.
• Car Rental company had categorical (label) data about its clients
rentals.
• It wanted to focus on which cars to buy more and who to market to in
order to increase profit.
Let us take this to be the Car Rental company’s data*
MVP Demo
Ford
Honda
Cadillac
Note: Solution is NOT
restricted to only 2
numerical attributes.
This example is used to
easily understand our
product.
In general, current MVP
can operate over an
unrestricted number of
both categorical and
numerical attributes with
categorical outputs.
Obfuscated data
Data is noised up in
input attributes and
output labels.
MVP Demo
Obfuscated Data
MVP Demo
Since obfuscated points can be linked to
individuals in the original data that are
identifiable from a group or in a certain region…
Original Data
Suppressed data (shown in orange)
MVP Demo
…we suppress them
(not show them).
Returned Data
MVP Demo
We operate with
categorical input
attributes in a similar
way.
Returned Data
Comparison
As you can tell…
• Vulnerable parts of the original data cannot be reverse engineered
• Any individual changes to the original dataset will not affect any statistics
of the returned data
Original Data
WHAT OTHER PRIVACY COMPANIES DO
Start – Original Data
Obfuscation
Count of label/
Most prevalent label
End – Aggregated Result
Some Limited Information Query
− Not much information
Scenario A:
WHAT OTHER PRIVACY COMPANIES DO
Start – Original Data
Obfuscation
Count of label/
Most prevalent label
End – Aggregated Result
Some Limited Information Query
− Not much informationScenario B:
WHAT WE DO
Start – Original Data
Obfuscation
Suppress
privacy-
violating
obfuscated
data
End – Privatized Dataset Result − Provides depth of info
Disruptive Impacts
• Compared to what other data privatization methods do, we
allow any data analyst to receive the entire data so that they
can analyze it however they want to.
• Companies can reduce overhead costs by safely outsourcing
the data analysis without restricting how the data is analyzed
or without giving up too much accuracy in the results.
Milestones
March 2019 Started business and acquire startup advisor
April 2019 Invited by SV Sandhill Road investors regarding potential
May 2019 Trial version released
Let’s build a better protected tomorrow!
Email: banerjeearjun73@gmail.com
LinkedIn: https://www.linkedin.com/in/arjunbanerjee77/
Residence: Bay Area, CA, USA

More Related Content

Similar to Privatex Software

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
Jean-Michel Franco
 
Protect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in TaxProtect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in Tax
Capgemini
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface look
Deloitte Canada
 
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Dataconomy Media
 
Big Data - from hype to reality
Big Data - from hype to realityBig Data - from hype to reality
Big Data - from hype to reality
vrbenjamins
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
IBM Security
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdf
LaLaBlaGhvgT
 
Why 4Segment
Why 4SegmentWhy 4Segment
Why 4Segment
Mark T. LeVell
 
Why 4Segments
Why 4SegmentsWhy 4Segments
Why 4Segments
4Thought Marketing
 
James foulkes, director and co founder, kingpin
James foulkes, director and co founder, kingpinJames foulkes, director and co founder, kingpin
James foulkes, director and co founder, kingpin
B2B Marketing
 
Big Data Monetisation
Big Data MonetisationBig Data Monetisation
Big Data Monetisation
PSD Group Ltd
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
Human Capital Department
 
How To Harness First-Party Data & Win In A Cookieless Future
How To Harness First-Party Data & Win In A Cookieless FutureHow To Harness First-Party Data & Win In A Cookieless Future
How To Harness First-Party Data & Win In A Cookieless Future
Search Engine Journal
 
SPSS Solutions
SPSS SolutionsSPSS Solutions
SPSS Solutions
Phi Jack
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
Jim Kaplan CIA CFE
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
Search Engine Journal
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
Sarah Fane
 

Similar to Privatex Software (20)

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
 
Protect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in TaxProtect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in Tax
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface look
 
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
 
Big Data - from hype to reality
Big Data - from hype to realityBig Data - from hype to reality
Big Data - from hype to reality
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdf
 
Why 4Segment
Why 4SegmentWhy 4Segment
Why 4Segment
 
Why 4Segments
Why 4SegmentsWhy 4Segments
Why 4Segments
 
James foulkes, director and co founder, kingpin
James foulkes, director and co founder, kingpinJames foulkes, director and co founder, kingpin
James foulkes, director and co founder, kingpin
 
Big Data Monetisation
Big Data MonetisationBig Data Monetisation
Big Data Monetisation
 
Andy fisher
Andy fisherAndy fisher
Andy fisher
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
 
How To Harness First-Party Data & Win In A Cookieless Future
How To Harness First-Party Data & Win In A Cookieless FutureHow To Harness First-Party Data & Win In A Cookieless Future
How To Harness First-Party Data & Win In A Cookieless Future
 
SPSS Solutions
SPSS SolutionsSPSS Solutions
SPSS Solutions
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 

Recently uploaded

TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 

Recently uploaded (20)

TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 

Privatex Software

  • 1. Data protection has never been more relevant than in today’s data-driven world #privacymatters
  • 2. 39%of companies globally experienced a data breach in 20181 - and seems to be rising at an exponential rate2 At least 20% in revenue loss3 Stock underperformance of up to 15.6% after 3 years5 Expected Loss of at least 7.8% of revenue and up to €7.8 million in fines and up to 6.1%in stocks after 3 years What happens if you do not protect data & { }& Fines up to 4% of global revenue4
  • 3. Data Protection Security Privacy Can protect data from breaches, but there is still a chance it will get breached. Even if security is breached, it still can protect data while providing accurate information. Limited access behind lock and key because very limited number of people are entrusted with the key. Anyone can access the protected data => Finding better business solutions faster for data- holding company by enabling more cooperation and competition for best analytics solutions Privacy is better value prop for business and markets Why Privacy instead of Security?
  • 4. A real life example • A Car Rental company is trying to privatize its data so that when they give this data to an Analytics company, it would not leak the privacy of an individual customer. However, the Analytics company wants to learn accurate patterns from the Car Rental company’s client base to provide more business value to the Car Rental company. • Car Rental company had categorical (label) data about its clients rentals. • It wanted to focus on which cars to buy more and who to market to in order to increase profit.
  • 5. Let us take this to be the Car Rental company’s data* MVP Demo Ford Honda Cadillac Note: Solution is NOT restricted to only 2 numerical attributes. This example is used to easily understand our product. In general, current MVP can operate over an unrestricted number of both categorical and numerical attributes with categorical outputs.
  • 6. Obfuscated data Data is noised up in input attributes and output labels. MVP Demo
  • 7. Obfuscated Data MVP Demo Since obfuscated points can be linked to individuals in the original data that are identifiable from a group or in a certain region… Original Data
  • 8. Suppressed data (shown in orange) MVP Demo …we suppress them (not show them).
  • 9. Returned Data MVP Demo We operate with categorical input attributes in a similar way.
  • 10. Returned Data Comparison As you can tell… • Vulnerable parts of the original data cannot be reverse engineered • Any individual changes to the original dataset will not affect any statistics of the returned data Original Data
  • 11. WHAT OTHER PRIVACY COMPANIES DO Start – Original Data Obfuscation Count of label/ Most prevalent label End – Aggregated Result Some Limited Information Query − Not much information Scenario A:
  • 12. WHAT OTHER PRIVACY COMPANIES DO Start – Original Data Obfuscation Count of label/ Most prevalent label End – Aggregated Result Some Limited Information Query − Not much informationScenario B:
  • 13. WHAT WE DO Start – Original Data Obfuscation Suppress privacy- violating obfuscated data End – Privatized Dataset Result − Provides depth of info
  • 14. Disruptive Impacts • Compared to what other data privatization methods do, we allow any data analyst to receive the entire data so that they can analyze it however they want to. • Companies can reduce overhead costs by safely outsourcing the data analysis without restricting how the data is analyzed or without giving up too much accuracy in the results.
  • 15. Milestones March 2019 Started business and acquire startup advisor April 2019 Invited by SV Sandhill Road investors regarding potential May 2019 Trial version released
  • 16. Let’s build a better protected tomorrow! Email: banerjeearjun73@gmail.com LinkedIn: https://www.linkedin.com/in/arjunbanerjee77/ Residence: Bay Area, CA, USA