SlideShare a Scribd company logo
1 of 33
Download to read offline
On line brochure
What makes SpriteGuard Unique?
“There is no ready designed system to prevent from fraudulent usage of wireless communication or to protect data and
functions with wirelessly communicating computers and other entities”.
Wireless security
From Wikipedia
TOM Ltd have now designed and patented a system to prevent this fraudulent usage of wireless communication.
The SpriteGuard system by TOM Ltd is a completely independent WiFi security product that scans and detects all
wireless hotspots within the surrounding area and those devices (mobile, laptop etc.) connected to them. If a device
accidentally connects to a fraudulent hotspot (previously agreed with facility manager via a whitelist/blacklist).
SpriteGuard then uniquely stops the connection, thus preventing any fraud or hack being carried out.
SpriteGuard is the only system that sits alongside the existing WiFi environment,
silently guarding all devices.
The Wi-Fi environment
Wi-Fi networks continue to proliferate around the world and the growth in open
access free public WiFi has been phenomenal…
An estimated432 million
public WiFi hotspots by
2020
http://www.fiercewireless.com/wireless/public-
wi-fi-hotspots-to-grow-to-432m
About 800 million new WiFi
enabled devices are
manufactured every year
So what’s the danger, are we all vulnerable to hacking?
1) Security
The problem – danger!
Global security giants
Symantec: - recognise the
dangers of open WiFi access
in their 2017 WiFi risk
report!
https://www.symantec.com/content/dam/symant
ec/docs/reports/2017-norton-wifi-risk-report-
global-results-summary-en.pdf
In today's connected world, it is now widely recognised by
security industry leaders that the threat to the public from open
access WiFi hotspots is both present and very real!
The problem – danger! (cont’d)
Just how easy is it for any of us to get hacked when using open
access WiFi?
There are dozens of online tutorials showing hackers how to compromise public Wi-Fi, some of
them with millions of views. The most common method of attack is known as “Man in the Middle.”
In this simple technique, traffic is intercepted between a user’s device and the destination by
making the victim’s device think the hacker’s machine is the access point to the internet. A similar,
albeit more sinister, method is called the“Evil Twin.” Here’s how it works: You log on to the free
Wi-Fi in your hotel room, thinking you ’re joining the hotel’s network. But somewhere nearby, a
hacker is boosting a stronger Wi-Fi signal off of theirlaptop, tricking you into using it by labeling it
with the hotel’s name. Trying to save a few bucks, and recognizing the name of the hotel, you
innocently connect to the hacker’s network. As you surf the web or do your online banking, all
your activity is being monitored by this stranger.
The problem – danger! – the hotel case study!
Seven minutes. That's how long it takes to microwave a small frozen pizza. It's the
length of Led Zeppelin's No Quarter, give or take a second. And it's also the maximum
amount of time that the majority of hotel guests can go without connecting to Wi-Fi.
Source:Jelisa Castrodale, Special for USA TODAY
The problem – the hotel case study – a sample attack!
A typical Wi-Fi attack (Hotel example)
The SG devices scan the whole Wi-Fi environment for available hot spots
SG identifying problem – the hotel case study a sample attack cont’d
SG dealing with the problem – the hotel case study a sample attack
cont’d
SpriteGuard automatically takes appropriate security actions
SpriteGuard
now
legitimately
disconnects
the guest
from
connecting
to the spoof
hotspot.
Problem solved – the hotel case study a sample attack (cont’d)
The SpriteGuard solution has now carried out a defence of the WiFi environment
the SpriteGuard solution
The below describes how SpriteGuard differs from a well known existing offering summarising the problem and solution.
PROBLEM: “Evil Twin” – 80% of all known WiFi Attacks
Scenario 1. “Evil Twin” with the same name:
• Existing Market Solution - Protects “ONLY” the known client (devices)
• SpriteGuard - Protects “ALL” the clients (devices) without previous knowledge
Scenario 2. “Evil Twin” with similar name:
• Existing Market Solution - Does not protect against this attack.
• SpriteGuard - Protects “ALL” clients (devices)
WHY use SpriteGuard?
• Existing Market Solution is an Enterprise offering trying to address a limited security solution
for open access WiFi and requires proprietary equipment.
• SpriteGuard is for open WiFi hotspots, independent of the existing proprietary equipment,
plug & play, no infrastructure change needed.
the SpriteGuard solution – diagram (fig 1)
Existing market solution
SpriteGuardTM solution
the SpriteGuard solution – diagram (fig 2)
Existing market solution
SpriteGuardTM solution
SG – the complete WiFi security solution! – applies to any
environment offering free public WiFi access
Proprietary and Confidential
In addition SpriteGuard also …………
2) Analytics
SpriteGuardTM Analytics – The Virtual Client
What does the SG-VC do?
The SpriteGuardTM virtual client (SG-VC) enables an
organisation to assess the quality of experience of
clients devices in the Wi-Fi network. Importantly all
measurements are made and reported in real-time,
unlike other approaches that produce estimates of the
Wi-Fi performance based upon the client performing
the test, then sending it to a third party that can be
days or even weeks old, and hence of little use. For
example. www.hotelwifitest.com
Proprietary and Confidential
SG-VC operates by providing an on-demand
monitoring of specific access points in the Wi-Fi
infrastructure. All reports are fed to an end user
dashboard providing up-to-date performance and
activity about a customer’s Wi-Fi network. This helps
the organisation to ensure optimal access point
usage, and above all, to proactively ensure their
clients’ Wi-Fi experience is at its optimal best at all
times.
The SG-VC provides a unique solution for remotely testing
a Wi-Fi network by operating alongside the existing Wi-Fi
infrastructure. It can operate independently of the
existing Wi-Fi infrastructure, and so does not incur any
additional costs to the Wi-Fi network. Moreover it does
not store any client data, ensuring complete privacy for
the clients.
SpriteGuardTM Analytics – The Virtual Client
What does the SG-VC do?
SG-VC performs tests to evaluate the performance of
the Wi-Fi network. These tests are evaluated using a
range of typical network applications and protocols
such as FTP, TCP, UDP, SSL, HTTP(S), Dropbox sync and
video streaming, to replicate a real WiFi user client.
For every test SG-VC reports to the SpriteGuardTM
management console (SG-MC) information such as:
The average download and upload rates;
The time taken to perform a “ping” to/from the SG-VC
and a remote location, and also between the SG-VC
and the local WiFi AP;
The time taken to complete each of the tests;
The measured signal strength from the WiFi AP to the
SG-VC. The SG-MC can be accessed by the host
organisation via a range of interfaces, e.g. secure web
browsers, tablets and PCs.
Proprietary and Confidential
Channel Monitoring
One of the Major contributors to slow WiFi connections is congestion on WiFi Channels. As SpriteGuard is independently
scanning all Access Points in the Local Environment and not just in the network, it can advise in real time ho many Access
Points are connected to each Channel and therefore allow the Provider the ability to Change their Access Points to a less
congested Channel.
SpriteGuardTM Analytics – The Virtual Client - benefits
Proprietary and Confidential
Benefits of adopting SG-VC
The deployment of such a powerful test and
performance monitoring tool allows the providers of
free/guest Wi-Fi to ensure continuous performance
monitoring of the access point in terms of user
experience. This can be particularly crucial when clients
promote access to WI-FI hotspots (open access
networks) that continually underperform and cause
frustration for users, to such an extent that brand
damage can be incurred and significant loss of business
can ensue.
The SG–VC offering will considerably enhance the
ability to ensure that security, user experience,
retention of clients and increased business revenues
are aligned seamlessly within an all-encompassing
performance testing tool unique to the market. It will
also significantly reduce the number of non-essential
maintenance call-outs to customer’s premises.
The installation of SpriteGuardTM ensures the guest a
safe and quality WiFi experience from as little as $20 per
week!
3) The
Dashboard
SpriteGuardTM Analytics – The Dashboard
Proprietary and Confidential
The SG Dashboard – a
world of data:
The SG cloud based management
console is the vehicle with which
SpriteGuard delivers all security and
user information to the providers of
the guest / free Wi-Fi.
4) Market
Validation
SpriteGuardTM Market validation
Rich data analytics via SpriteGuard Cloud Based
Dashboard
• With an estimated 420 million free WiFi hotspots
becoming available by 2020 it is no longer realistic to
place the responsibility of personal data security
wholly at the feet of the consumer, whilst connected
to open access WiFi within a Hotel, Rail Station,
Airport, Hospital, Coffee shop, Retail spaces, in fact
anywhere were the built space offering free WiFi
connection to the public. In our opinion it is the
providers of guest WiFi access that should be
protecting the whole of the WiFi space, both within
and out of their premises.
Proprietary and Confidential
Client increased sales & loyalty
• For businesses such as hotels, restaurants etc.
SpriteGuard helps the consumer facing organization to
increase market share by taking a leading role in
protecting their clients through the deployment of
SpriteGuard in order to protect the WiFi environment
– for example by displaying the “protected by
SpriteGuard” logo they are giving a surety to their
clients that they take the security of guest WiFi
provision seriously and care about guest data
integrity.
• So why the market need – increased customer loyalty,
protection of brand reputation, increased footfall,
compliance with regulatory bodies, and keeping up to
date with the change in data privacy laws
sourcehttp://www.bbc.co.uk/news/business-40857219.
SpriteGuardTM Market validation
Consumer Influence
• With an estimated 420 million free WiFi hotspots
becoming available by 2020 it is no longer realistic to
place the responsibility of personal data security
wholly at the feet of the consumer, whilst connected
to open access WiFi within a Hotel, Rail Station,
Airport, Hospital, Coffee shop, Retail spaces, in fact
anywhere were the built space offering free WiFi
connection to the public. In our opinion it is the
providers of guest WiFi access that should be
protecting the whole of the WiFi space, both within
and out of their premises.
Proprietary and Confidential
Client increased sales & loyalty
• For businesses such as hotels, restaurants etc.
SpriteGuard helps the consumer facing organization to
increase market share by taking a leading role in
protecting their clients through the deployment of
SpriteGuard in order to protect the WiFi environment
– for example by displaying the “protected by
SpriteGuard” logo they are giving a surety to their
clients that they take the security of guest WiFi
provision seriously and care about guest data
integrity.
• So why the market need – increased customer loyalty,
protection of brand reputation, increased footfall,
compliance with regulatory bodies, and keeping up to
date with the change in data privacy laws
sourcehttp://www.bbc.co.uk/news/business-40857219.
5) The team
Experienced Leadership Team – Executive Board
Prof Alan Marshall
CEO
• Head of Department of Electrical Engineering &
Electronics at University of Liverpool
• Previously chair of Telecommunications Engineering &
Networks at Queen’s University Belfast
• Extensive industry experience in Telecommunications
and Defense sectors (e.g. Nortel, STC, Ferranti, QinetiQ)
• Widely published author on wireless network
technologies and wireless security
Proprietary and Confidential
Julian Watts
Commercial Director
• Successfully built and exited a previous business noted
in the Sunday Times fast track 100
• Experience in start up strategy and deployment
• Over twenty years within a sales and commercial
environment, taking a start up from zero to over 30
million in revenues.
Valerio Selis
CTO
• Currently completing PhD in Electrical and Electronic
Engineering
• Researcher at Liverpool University into the areas of
wireless network security, wireless LANs, wireless
personal area networks, mobile ad hoc networks
David Ashmore
Director
• A multi-lingual, international Director, currently at
Fourteen IP. Previously an MD having had full P&L
responsibility over 20 years for different engineering
projects and companies, ranging from mechanical and
process companies to hi-tech electronics,
telecommunications and software companies.
• A positive, 'can do' attitude; a Sales and Marketing led
approach in delivering business to business contracts
with better than budgeted results.
• Extensive experience in start-ups and spearheading new
business areas. Wide international experience including
residence in Germany and S Africa. Former research
assistant at Queen’s University Belfast specializing in
Development of protocol stacks/architectures
• Experience in WiMAX MAC layer threat modeling
Jim Doherty
Financial Consultant
• Commercially experienced finance professional having
worked in both small and large organizations.
• Typically working with small undercapitalized
businesses with real growth potential, then bring
commercial and financial skills to the table to model
the business and secure growth capital.
• Specialties: Business modelling, front line funds
negotiating, cash management, strategic financial
planning.
Experienced Leadership Team – The developers
Proprietary and Confidential
Bob Ham
Senior Embedded Software Developer
• A talented software developer with 15 years industry
experience in areas including lab robot control (GSK),
healthcare monitoring equipment (GE Healthcare)
and automotive entertainment systems (Jaguar Land
Rover).
• Active in the open source and free software
communities.
• MSc from Liverpool John Moores University.
Mark McKinlay
Senior Web Developer/Dev-Ops
• A web Developer with experience working with
Large Multi-national Clients including Virgin Money
London Marathon, Hallmark and Fairfax.
• Experience working on Projects from Simple
Websites to multiple server Systems with
redundancy.
• Specialties: Server Management and deployment,
Python Development, Django/Django-CMS
development.
5) Summary
What to Remember!
The Space
• Cyber security – open access guest public Wi-Fi
The Technology
• Cutting edge
• Differentiated
• University developed
• Game changing
• Disruptive
The Business Model
• Recurring revenue licensing model
The Team
• Experts in their fields
• Passionate!
Proprietary and Confidential
SpriteGuardTM is the Wi-Fi security solution that prevents hacker attacks, it is also a
full analytics solution for performance measurement of existing Wi-Fi infrastructure,
PCI compliance, Penetration Testing and Virtual Client capabilities
6) Company
information
Contact Information
Company: Traffic Observation via Management, Limited
(a.k.a. TOM Ltd.)
Flagship Product: SpriteGuardTM
Address: Suite S15 Liverpool Science Park
Innovation Centre 1
131 Mount Pleasant
Liverpool
L3 5TF
United Kingdom
Contact: Jim Doherty
+44 (0) 151 230 2161 (Direct)
+44 (0) 7469 925948 (UK mobile)
james.Doherty@spriteguard.com
Julian Watts
+44 (0) 151 230 2160 (Direct)
+44 (0) 7442 498752 (UK mobile)
julian.watts@spriteguard.com
Website: www.spriteguard.com
Proprietary and Confidential
7) In the news
Wi-Fi security issues in the news
https://www.clickorlando.com/news/investigators/travel-warning-do-not-use-public-wifi-in-airports-hotels
https://www.khaleejtimes.com/news/why-you-should-be-careful-using-public-wi-fi
http://www.ibtimes.com/free-wi-fi-spots-people-cant-help-logging-even-if-its-dangerous-2574916
http://www.fox32chicago.com/news/local/269871032-story
https://www.itwire.com/home-it/79174-australians-acting-unsafely-with-public-wi-fi-security-wake-up.html
http://www.moneycontrol.com//news/technology/beware-of-free-wifi-at-coffee-shops-railway-stations-96-people-risk-giving-up-
personal-info-while-using-public-wifi-symantec-2329783.html/news/technology/beware-of-free-wifi-at-coffee-shops-railway-
stations-96-people-risk-giving-up-personal-info-while-using-public-wifi-symantec-2329783.html
http://www.independent.co.uk/life-style/gadgets-and-tech/news/wifi-hotpots-coffee-shop-dangerous-security-risk-report-
a7750091.html
http://www.bbc.co.uk/news/av/uk-40686763/young-children-groomed-on-live-streaming-app-periscope
https://medium.com/matter/heres-why-public-wifi-is-a-public-health-hazard-dd5b8dcb55e6
http://www.ibtimes.co.uk/prisoners-caught-using-wi-fi-oap-neighbours-watch-porn-1632778
http://www.bbc.co.uk/news/technology-26469598
http://www.lawtechnologytoday.org/2016/01/risks-unsecured-wifi-hotspots/
https://www.linkedin.com/in/kivatinos/detail/treasury/summary/?entityUrn=urn%3Ali%3Afs_treasuryMedia%3A(ACoAAADFPykBpgXs3j
R8XjodyunDgsrcV9vqNh8%2C50874442)
http://globalnews.ca/news/3647564/free-wifi-security-canadians/
Proprietary and Confidential

More Related Content

What's hot

160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architectureLan & Wan Solutions
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksIcomm Technologies
 
(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero Trust(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero TrustPriyanka Aash
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGAAndris Soroka
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTForescout Technologies Inc
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? Forescout Technologies Inc
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTPositiveTechnologies
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report PresentationSophos
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Zoe Gilbert
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottwebinos project
 
Beacon Security
Beacon SecurityBeacon Security
Beacon Securitykontakt.io
 
Financial Districs Wi Fi Scan
Financial Districs Wi Fi ScanFinancial Districs Wi Fi Scan
Financial Districs Wi Fi ScanAirTight Networks
 
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereForescout Technologies Inc
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker dsIvanti
 

What's hot (20)

160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero Trust(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero Trust
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGA
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
Check Point Consolidation
Check Point ConsolidationCheck Point Consolidation
Check Point Consolidation
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System?
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allott
 
Beacon Security
Beacon SecurityBeacon Security
Beacon Security
 
Financial Districs Wi Fi Scan
Financial Districs Wi Fi ScanFinancial Districs Wi Fi Scan
Financial Districs Wi Fi Scan
 
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 

Similar to Sprite guard on line brochure

CS155 Computer And Network Security.docx
CS155 Computer And Network Security.docxCS155 Computer And Network Security.docx
CS155 Computer And Network Security.docxwrite31
 
WiFi Hotspot
WiFi HotspotWiFi Hotspot
WiFi HotspotWispot
 
FreeG WiFi PPT for Hotels
FreeG WiFi PPT for HotelsFreeG WiFi PPT for Hotels
FreeG WiFi PPT for HotelsShailendra Jain
 
Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud DatasheetMani Rai
 
SUNDRAY Gigabit Series Wireless Access Controller
SUNDRAY Gigabit Series Wireless Access ControllerSUNDRAY Gigabit Series Wireless Access Controller
SUNDRAY Gigabit Series Wireless Access ControllerSunardi Fatan
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)Ryan Orsi
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET Journal
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOWJoshua Sibaja
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities DeckPete Wassell
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
Wireless security camera
Wireless security cameraWireless security camera
Wireless security cameraAasheesh Tandon
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWKapil Kanugo
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyVASCO Data Security
 
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VA
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VACase StudyAutomotive - SSLVPN case study DIGIPASS BY VA
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VAMaximaSheffield592
 
Hotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and ChallengesHotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and ChallengesDr. Mazlan Abbas
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinarZscaler
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfSetiya Nugroho
 
IRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized UsersIRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized UsersIRJET Journal
 

Similar to Sprite guard on line brochure (20)

AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
CS155 Computer And Network Security.docx
CS155 Computer And Network Security.docxCS155 Computer And Network Security.docx
CS155 Computer And Network Security.docx
 
WiFi Hotspot
WiFi HotspotWiFi Hotspot
WiFi Hotspot
 
FreeG WiFi PPT for Hotels
FreeG WiFi PPT for HotelsFreeG WiFi PPT for Hotels
FreeG WiFi PPT for Hotels
 
Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud Datasheet
 
SUNDRAY Gigabit Series Wireless Access Controller
SUNDRAY Gigabit Series Wireless Access ControllerSUNDRAY Gigabit Series Wireless Access Controller
SUNDRAY Gigabit Series Wireless Access Controller
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate Environment
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Wireless security camera
Wireless security cameraWireless security camera
Wireless security camera
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VA
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VACase StudyAutomotive - SSLVPN case study DIGIPASS BY VA
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VA
 
Hotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and ChallengesHotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and Challenges
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
 
IRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized UsersIRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized Users
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Sprite guard on line brochure

  • 2. What makes SpriteGuard Unique? “There is no ready designed system to prevent from fraudulent usage of wireless communication or to protect data and functions with wirelessly communicating computers and other entities”. Wireless security From Wikipedia TOM Ltd have now designed and patented a system to prevent this fraudulent usage of wireless communication. The SpriteGuard system by TOM Ltd is a completely independent WiFi security product that scans and detects all wireless hotspots within the surrounding area and those devices (mobile, laptop etc.) connected to them. If a device accidentally connects to a fraudulent hotspot (previously agreed with facility manager via a whitelist/blacklist). SpriteGuard then uniquely stops the connection, thus preventing any fraud or hack being carried out. SpriteGuard is the only system that sits alongside the existing WiFi environment, silently guarding all devices.
  • 3. The Wi-Fi environment Wi-Fi networks continue to proliferate around the world and the growth in open access free public WiFi has been phenomenal… An estimated432 million public WiFi hotspots by 2020 http://www.fiercewireless.com/wireless/public- wi-fi-hotspots-to-grow-to-432m About 800 million new WiFi enabled devices are manufactured every year So what’s the danger, are we all vulnerable to hacking?
  • 5. The problem – danger! Global security giants Symantec: - recognise the dangers of open WiFi access in their 2017 WiFi risk report! https://www.symantec.com/content/dam/symant ec/docs/reports/2017-norton-wifi-risk-report- global-results-summary-en.pdf In today's connected world, it is now widely recognised by security industry leaders that the threat to the public from open access WiFi hotspots is both present and very real!
  • 6. The problem – danger! (cont’d) Just how easy is it for any of us to get hacked when using open access WiFi? There are dozens of online tutorials showing hackers how to compromise public Wi-Fi, some of them with millions of views. The most common method of attack is known as “Man in the Middle.” In this simple technique, traffic is intercepted between a user’s device and the destination by making the victim’s device think the hacker’s machine is the access point to the internet. A similar, albeit more sinister, method is called the“Evil Twin.” Here’s how it works: You log on to the free Wi-Fi in your hotel room, thinking you ’re joining the hotel’s network. But somewhere nearby, a hacker is boosting a stronger Wi-Fi signal off of theirlaptop, tricking you into using it by labeling it with the hotel’s name. Trying to save a few bucks, and recognizing the name of the hotel, you innocently connect to the hacker’s network. As you surf the web or do your online banking, all your activity is being monitored by this stranger.
  • 7. The problem – danger! – the hotel case study! Seven minutes. That's how long it takes to microwave a small frozen pizza. It's the length of Led Zeppelin's No Quarter, give or take a second. And it's also the maximum amount of time that the majority of hotel guests can go without connecting to Wi-Fi. Source:Jelisa Castrodale, Special for USA TODAY
  • 8. The problem – the hotel case study – a sample attack! A typical Wi-Fi attack (Hotel example)
  • 9. The SG devices scan the whole Wi-Fi environment for available hot spots SG identifying problem – the hotel case study a sample attack cont’d
  • 10. SG dealing with the problem – the hotel case study a sample attack cont’d SpriteGuard automatically takes appropriate security actions SpriteGuard now legitimately disconnects the guest from connecting to the spoof hotspot.
  • 11. Problem solved – the hotel case study a sample attack (cont’d) The SpriteGuard solution has now carried out a defence of the WiFi environment
  • 12. the SpriteGuard solution The below describes how SpriteGuard differs from a well known existing offering summarising the problem and solution. PROBLEM: “Evil Twin” – 80% of all known WiFi Attacks Scenario 1. “Evil Twin” with the same name: • Existing Market Solution - Protects “ONLY” the known client (devices) • SpriteGuard - Protects “ALL” the clients (devices) without previous knowledge Scenario 2. “Evil Twin” with similar name: • Existing Market Solution - Does not protect against this attack. • SpriteGuard - Protects “ALL” clients (devices) WHY use SpriteGuard? • Existing Market Solution is an Enterprise offering trying to address a limited security solution for open access WiFi and requires proprietary equipment. • SpriteGuard is for open WiFi hotspots, independent of the existing proprietary equipment, plug & play, no infrastructure change needed.
  • 13. the SpriteGuard solution – diagram (fig 1) Existing market solution SpriteGuardTM solution
  • 14. the SpriteGuard solution – diagram (fig 2) Existing market solution SpriteGuardTM solution
  • 15. SG – the complete WiFi security solution! – applies to any environment offering free public WiFi access Proprietary and Confidential In addition SpriteGuard also …………
  • 17. SpriteGuardTM Analytics – The Virtual Client What does the SG-VC do? The SpriteGuardTM virtual client (SG-VC) enables an organisation to assess the quality of experience of clients devices in the Wi-Fi network. Importantly all measurements are made and reported in real-time, unlike other approaches that produce estimates of the Wi-Fi performance based upon the client performing the test, then sending it to a third party that can be days or even weeks old, and hence of little use. For example. www.hotelwifitest.com Proprietary and Confidential SG-VC operates by providing an on-demand monitoring of specific access points in the Wi-Fi infrastructure. All reports are fed to an end user dashboard providing up-to-date performance and activity about a customer’s Wi-Fi network. This helps the organisation to ensure optimal access point usage, and above all, to proactively ensure their clients’ Wi-Fi experience is at its optimal best at all times. The SG-VC provides a unique solution for remotely testing a Wi-Fi network by operating alongside the existing Wi-Fi infrastructure. It can operate independently of the existing Wi-Fi infrastructure, and so does not incur any additional costs to the Wi-Fi network. Moreover it does not store any client data, ensuring complete privacy for the clients.
  • 18. SpriteGuardTM Analytics – The Virtual Client What does the SG-VC do? SG-VC performs tests to evaluate the performance of the Wi-Fi network. These tests are evaluated using a range of typical network applications and protocols such as FTP, TCP, UDP, SSL, HTTP(S), Dropbox sync and video streaming, to replicate a real WiFi user client. For every test SG-VC reports to the SpriteGuardTM management console (SG-MC) information such as: The average download and upload rates; The time taken to perform a “ping” to/from the SG-VC and a remote location, and also between the SG-VC and the local WiFi AP; The time taken to complete each of the tests; The measured signal strength from the WiFi AP to the SG-VC. The SG-MC can be accessed by the host organisation via a range of interfaces, e.g. secure web browsers, tablets and PCs. Proprietary and Confidential Channel Monitoring One of the Major contributors to slow WiFi connections is congestion on WiFi Channels. As SpriteGuard is independently scanning all Access Points in the Local Environment and not just in the network, it can advise in real time ho many Access Points are connected to each Channel and therefore allow the Provider the ability to Change their Access Points to a less congested Channel.
  • 19. SpriteGuardTM Analytics – The Virtual Client - benefits Proprietary and Confidential Benefits of adopting SG-VC The deployment of such a powerful test and performance monitoring tool allows the providers of free/guest Wi-Fi to ensure continuous performance monitoring of the access point in terms of user experience. This can be particularly crucial when clients promote access to WI-FI hotspots (open access networks) that continually underperform and cause frustration for users, to such an extent that brand damage can be incurred and significant loss of business can ensue. The SG–VC offering will considerably enhance the ability to ensure that security, user experience, retention of clients and increased business revenues are aligned seamlessly within an all-encompassing performance testing tool unique to the market. It will also significantly reduce the number of non-essential maintenance call-outs to customer’s premises. The installation of SpriteGuardTM ensures the guest a safe and quality WiFi experience from as little as $20 per week!
  • 21. SpriteGuardTM Analytics – The Dashboard Proprietary and Confidential The SG Dashboard – a world of data: The SG cloud based management console is the vehicle with which SpriteGuard delivers all security and user information to the providers of the guest / free Wi-Fi.
  • 23. SpriteGuardTM Market validation Rich data analytics via SpriteGuard Cloud Based Dashboard • With an estimated 420 million free WiFi hotspots becoming available by 2020 it is no longer realistic to place the responsibility of personal data security wholly at the feet of the consumer, whilst connected to open access WiFi within a Hotel, Rail Station, Airport, Hospital, Coffee shop, Retail spaces, in fact anywhere were the built space offering free WiFi connection to the public. In our opinion it is the providers of guest WiFi access that should be protecting the whole of the WiFi space, both within and out of their premises. Proprietary and Confidential Client increased sales & loyalty • For businesses such as hotels, restaurants etc. SpriteGuard helps the consumer facing organization to increase market share by taking a leading role in protecting their clients through the deployment of SpriteGuard in order to protect the WiFi environment – for example by displaying the “protected by SpriteGuard” logo they are giving a surety to their clients that they take the security of guest WiFi provision seriously and care about guest data integrity. • So why the market need – increased customer loyalty, protection of brand reputation, increased footfall, compliance with regulatory bodies, and keeping up to date with the change in data privacy laws sourcehttp://www.bbc.co.uk/news/business-40857219.
  • 24. SpriteGuardTM Market validation Consumer Influence • With an estimated 420 million free WiFi hotspots becoming available by 2020 it is no longer realistic to place the responsibility of personal data security wholly at the feet of the consumer, whilst connected to open access WiFi within a Hotel, Rail Station, Airport, Hospital, Coffee shop, Retail spaces, in fact anywhere were the built space offering free WiFi connection to the public. In our opinion it is the providers of guest WiFi access that should be protecting the whole of the WiFi space, both within and out of their premises. Proprietary and Confidential Client increased sales & loyalty • For businesses such as hotels, restaurants etc. SpriteGuard helps the consumer facing organization to increase market share by taking a leading role in protecting their clients through the deployment of SpriteGuard in order to protect the WiFi environment – for example by displaying the “protected by SpriteGuard” logo they are giving a surety to their clients that they take the security of guest WiFi provision seriously and care about guest data integrity. • So why the market need – increased customer loyalty, protection of brand reputation, increased footfall, compliance with regulatory bodies, and keeping up to date with the change in data privacy laws sourcehttp://www.bbc.co.uk/news/business-40857219.
  • 26. Experienced Leadership Team – Executive Board Prof Alan Marshall CEO • Head of Department of Electrical Engineering & Electronics at University of Liverpool • Previously chair of Telecommunications Engineering & Networks at Queen’s University Belfast • Extensive industry experience in Telecommunications and Defense sectors (e.g. Nortel, STC, Ferranti, QinetiQ) • Widely published author on wireless network technologies and wireless security Proprietary and Confidential Julian Watts Commercial Director • Successfully built and exited a previous business noted in the Sunday Times fast track 100 • Experience in start up strategy and deployment • Over twenty years within a sales and commercial environment, taking a start up from zero to over 30 million in revenues. Valerio Selis CTO • Currently completing PhD in Electrical and Electronic Engineering • Researcher at Liverpool University into the areas of wireless network security, wireless LANs, wireless personal area networks, mobile ad hoc networks David Ashmore Director • A multi-lingual, international Director, currently at Fourteen IP. Previously an MD having had full P&L responsibility over 20 years for different engineering projects and companies, ranging from mechanical and process companies to hi-tech electronics, telecommunications and software companies. • A positive, 'can do' attitude; a Sales and Marketing led approach in delivering business to business contracts with better than budgeted results. • Extensive experience in start-ups and spearheading new business areas. Wide international experience including residence in Germany and S Africa. Former research assistant at Queen’s University Belfast specializing in Development of protocol stacks/architectures • Experience in WiMAX MAC layer threat modeling Jim Doherty Financial Consultant • Commercially experienced finance professional having worked in both small and large organizations. • Typically working with small undercapitalized businesses with real growth potential, then bring commercial and financial skills to the table to model the business and secure growth capital. • Specialties: Business modelling, front line funds negotiating, cash management, strategic financial planning.
  • 27. Experienced Leadership Team – The developers Proprietary and Confidential Bob Ham Senior Embedded Software Developer • A talented software developer with 15 years industry experience in areas including lab robot control (GSK), healthcare monitoring equipment (GE Healthcare) and automotive entertainment systems (Jaguar Land Rover). • Active in the open source and free software communities. • MSc from Liverpool John Moores University. Mark McKinlay Senior Web Developer/Dev-Ops • A web Developer with experience working with Large Multi-national Clients including Virgin Money London Marathon, Hallmark and Fairfax. • Experience working on Projects from Simple Websites to multiple server Systems with redundancy. • Specialties: Server Management and deployment, Python Development, Django/Django-CMS development.
  • 29. What to Remember! The Space • Cyber security – open access guest public Wi-Fi The Technology • Cutting edge • Differentiated • University developed • Game changing • Disruptive The Business Model • Recurring revenue licensing model The Team • Experts in their fields • Passionate! Proprietary and Confidential SpriteGuardTM is the Wi-Fi security solution that prevents hacker attacks, it is also a full analytics solution for performance measurement of existing Wi-Fi infrastructure, PCI compliance, Penetration Testing and Virtual Client capabilities
  • 31. Contact Information Company: Traffic Observation via Management, Limited (a.k.a. TOM Ltd.) Flagship Product: SpriteGuardTM Address: Suite S15 Liverpool Science Park Innovation Centre 1 131 Mount Pleasant Liverpool L3 5TF United Kingdom Contact: Jim Doherty +44 (0) 151 230 2161 (Direct) +44 (0) 7469 925948 (UK mobile) james.Doherty@spriteguard.com Julian Watts +44 (0) 151 230 2160 (Direct) +44 (0) 7442 498752 (UK mobile) julian.watts@spriteguard.com Website: www.spriteguard.com Proprietary and Confidential
  • 32. 7) In the news
  • 33. Wi-Fi security issues in the news https://www.clickorlando.com/news/investigators/travel-warning-do-not-use-public-wifi-in-airports-hotels https://www.khaleejtimes.com/news/why-you-should-be-careful-using-public-wi-fi http://www.ibtimes.com/free-wi-fi-spots-people-cant-help-logging-even-if-its-dangerous-2574916 http://www.fox32chicago.com/news/local/269871032-story https://www.itwire.com/home-it/79174-australians-acting-unsafely-with-public-wi-fi-security-wake-up.html http://www.moneycontrol.com//news/technology/beware-of-free-wifi-at-coffee-shops-railway-stations-96-people-risk-giving-up- personal-info-while-using-public-wifi-symantec-2329783.html/news/technology/beware-of-free-wifi-at-coffee-shops-railway- stations-96-people-risk-giving-up-personal-info-while-using-public-wifi-symantec-2329783.html http://www.independent.co.uk/life-style/gadgets-and-tech/news/wifi-hotpots-coffee-shop-dangerous-security-risk-report- a7750091.html http://www.bbc.co.uk/news/av/uk-40686763/young-children-groomed-on-live-streaming-app-periscope https://medium.com/matter/heres-why-public-wifi-is-a-public-health-hazard-dd5b8dcb55e6 http://www.ibtimes.co.uk/prisoners-caught-using-wi-fi-oap-neighbours-watch-porn-1632778 http://www.bbc.co.uk/news/technology-26469598 http://www.lawtechnologytoday.org/2016/01/risks-unsecured-wifi-hotspots/ https://www.linkedin.com/in/kivatinos/detail/treasury/summary/?entityUrn=urn%3Ali%3Afs_treasuryMedia%3A(ACoAAADFPykBpgXs3j R8XjodyunDgsrcV9vqNh8%2C50874442) http://globalnews.ca/news/3647564/free-wifi-security-canadians/ Proprietary and Confidential