SlideShare a Scribd company logo
1 of 12
Download to read offline
(c) 2012 Coranti, Inc. All Rights Reserved.
Confidential.
1
CORANTI(DEVELOPS(MULTI1ENGINE(
COMPUTER(SECURITY(SOFTWARE(
The$need$for$layered$
defense$technology$
will$increasingly$
become$more$
important$(Frost$&$
Sullivan$2011)$ Confidential Information(C) 2015 CORANTI, INC. ALL RIGHTS
RESERVED. CONFIDENTIAL.
2
The(Origins(
Experienced$management$team,$expert$engineers((
•  Coran?(was(founded(in(2009(by(European(experts(in(
security(soMware(and(digital(media(soMware.((
•  The(core(engineering(team(has(been(working(
together(since(2006(with(an(impressive(track(record(
in(security(technology.(
(c) 2015 Coranti, Inc. All Rights Reserved.
Confidential.
3
Market(
(c) 2015 Coranti, Inc. All Rights Reserved.
Confidential.
4
Core(technology(pillars(
SelfCaware$
! $underlying$technology$
probes$$incomparably$
wider$and$deeper$into$$
realCDme$operaDng$
system$events$$
! foundaDon$for$a$next%
genera)on+early+
intrusion+warning+
system.$
Diversity$
! system$architecture$allows$
mulDple$anDCmalware$scan$
engines$to$run$in$parallel$
! virtually$no$performance$
degradaDon$or$compaDbility$
issues$
! realCDme$and$onCdemand$$+
5(
(c) 2015 Coranti, Inc. All Rights Reserved.
Confidential.
Technology(benefits(
MulDCengine$approach$$
! increases$the$detecDon$of$
known$malware$$
! includes$different$sandboxes,$
emulators$and$other$highly$
advanced$"zeroCday$aKack"$
methods.$
Scalable$and$portable$
! by$design$
! PreCdesDned$for$full$cloudC
based$protecDon$$
! Perfect$for$lightCweight$clients$
(Windows,$Linux,$Mac,$Android)$
6(
(c) 2015 Coranti, Inc. All Rights Reserved.
Confidential.
Product(Line1up((
CoranD$MulDCEngine$
AnDVirus$&$AnDSpyware$
!  Consumer(and(SoHo(endpoint(
security(soMware(for(Windows((
!  4(parallel(an?1malware(
engines(
!  real1?me(and(on1demand(
protec?on)(
!  Support(for(both(321bit(and(
641bit(Windows(desktop(and(
server(plaZorms(
(c) 2015 Coranti, Inc. All Rights Reserved.
Confidential.
7
!  Best1of1breed(detec?on(and(
disinfec?on((
!  Leading(Virus(Bulle?n’s(RAP(
charts((
since(12/2010.((
!  Unrivalled(compa?bility(with(
3rd(party(security(soMware(
solu?ons(
!  Launched(6/2010(
Coran?(Mul?1Engine(
An?Virus(&(An?Spyware(
(c) 2015 Coranti, Inc. All Rights Reserved.
Confidential.
8
Independent$
tesDng,$
WorldCClass$
Performance$
“[…](excellent(detec?on(level,(which(proved(
splendid(across(the(board,(with(one(of(the(
highest(scores(we’ve(seen(yet”(
(John(Hawes,(Virus(Bulle?n,(08/2010)(
(
“As(predicted,(detec?on(rates(were(
stratospheric”((John(Hawes,(VB,(04/2011).(
(
(c) 2015 Coranti, Inc. All Rights Reserved.
Confidential.
9
Original(Roadmap(…(
•  Business(SKU(feat.(Powerful(Remote(Management(Console(
(RMC)(
•  Firewall:(321bit(and(641bit(Firewall(drivers(
•  Secure(Internet(transac?ons(and(Browser(Session(
Protec?on(module("(protects(against(Iden?ty(TheM,(An?1
banking(Trojan,(etc.((
•  Preven?on(Systems((HIPS):state1of1the1art(behavioural(
analyzer(technology(
•  Backend(system(scaling(
•  Cloud1based(scanning(
•  Android,(Linux,(Mac(OS(X(ports(
(c) 2015 Coranti, Inc. All Rights Reserved.
Confidential.
10
Outlook(
!  Sustainable(compe??ve(advantage:(Only(a(mul?1
layered,(diversified,(scalable(security(solu?on(can(
offer(resilient(protec?on.((
!  Current(an?1malware(product(is(just(one$of$many$
possible(prac?cal(applica?ons(of(Coran?’s(
technology.(
!  Coran?’s(underlying(technology(can(be(used(for(
virtually(all$types$of$security$applicaDons$
!  PreCdesDned(for(cloud$and$mobile$deployment!
(c) 2015 Coranti, Inc. All Rights Reserved.
Confidential.
11
M&A Contact:
Charly Lippoth, Co-founder
clippoth@gmail.com
(c) 2015 Coranti, Inc. All Rights Reserved.
Confidential.
12

More Related Content

Similar to Coranti 2015-12 IP Sale

SAMBA - Luka Pavol - 12.3.2014
SAMBA - Luka Pavol - 12.3.2014SAMBA - Luka Pavol - 12.3.2014
SAMBA - Luka Pavol - 12.3.2014
Anton Bittner
 
Raul Siles - iOS: Regreso al futuro [Rooted CON 2014]
Raul Siles - iOS: Regreso al futuro [Rooted CON 2014]Raul Siles - iOS: Regreso al futuro [Rooted CON 2014]
Raul Siles - iOS: Regreso al futuro [Rooted CON 2014]
RootedCON
 

Similar to Coranti 2015-12 IP Sale (20)

The State of Open Source Security Vulnerabilities in 2020
The State of Open Source Security Vulnerabilities in 2020The State of Open Source Security Vulnerabilities in 2020
The State of Open Source Security Vulnerabilities in 2020
 
ifda financial attacks - Conférence ECW 2018 Rennes
   ifda financial attacks - Conférence ECW 2018 Rennes   ifda financial attacks - Conférence ECW 2018 Rennes
ifda financial attacks - Conférence ECW 2018 Rennes
 
The security phoenix - from the ashes of DEV-OPS Appsec California 2020
The security phoenix - from the ashes of DEV-OPS Appsec California 2020The security phoenix - from the ashes of DEV-OPS Appsec California 2020
The security phoenix - from the ashes of DEV-OPS Appsec California 2020
 
eDiscovery IS Data Security
eDiscovery IS Data SecurityeDiscovery IS Data Security
eDiscovery IS Data Security
 
The leadership in the new digital age carved by the fourth industrial revolu...
The leadership in the new digital age carved by  the fourth industrial revolu...The leadership in the new digital age carved by  the fourth industrial revolu...
The leadership in the new digital age carved by the fourth industrial revolu...
 
SAMBA - Luka Pavol - 12.3.2014
SAMBA - Luka Pavol - 12.3.2014SAMBA - Luka Pavol - 12.3.2014
SAMBA - Luka Pavol - 12.3.2014
 
CEBIT 2013 - Workshop Presentation
CEBIT 2013 - Workshop PresentationCEBIT 2013 - Workshop Presentation
CEBIT 2013 - Workshop Presentation
 
CIO Updates October 8, 2014
CIO Updates October 8, 2014CIO Updates October 8, 2014
CIO Updates October 8, 2014
 
2014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp02
2014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp022014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp02
2014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp02
 
CTIA Keynote - Jeff Lawson - Twilio - Ways of the Software People or the Way ...
CTIA Keynote - Jeff Lawson - Twilio - Ways of the Software People or the Way ...CTIA Keynote - Jeff Lawson - Twilio - Ways of the Software People or the Way ...
CTIA Keynote - Jeff Lawson - Twilio - Ways of the Software People or the Way ...
 
Intel introduction for Apidays Mediterranea
Intel introduction for Apidays MediterraneaIntel introduction for Apidays Mediterranea
Intel introduction for Apidays Mediterranea
 
Raul Siles - iOS: Regreso al futuro [Rooted CON 2014]
Raul Siles - iOS: Regreso al futuro [Rooted CON 2014]Raul Siles - iOS: Regreso al futuro [Rooted CON 2014]
Raul Siles - iOS: Regreso al futuro [Rooted CON 2014]
 
Joseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco LiveJoseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco Live
 
Kush stats alpha
Kush stats alpha Kush stats alpha
Kush stats alpha
 
Managing the Cyberthreat Landscape
Managing the Cyberthreat LandscapeManaging the Cyberthreat Landscape
Managing the Cyberthreat Landscape
 
Iincore labs portfolio
Iincore labs portfolioIincore labs portfolio
Iincore labs portfolio
 
ERAI Risk Mitigation Tools to Address Today’s Complex Global Marketplace - Sn...
ERAI Risk Mitigation Tools to Address Today’s Complex Global Marketplace - Sn...ERAI Risk Mitigation Tools to Address Today’s Complex Global Marketplace - Sn...
ERAI Risk Mitigation Tools to Address Today’s Complex Global Marketplace - Sn...
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall Webinar
 
Webinar: How To Build A Bot With Cisco Spark And Built.io Flow
Webinar: How To Build A Bot With Cisco Spark And Built.io FlowWebinar: How To Build A Bot With Cisco Spark And Built.io Flow
Webinar: How To Build A Bot With Cisco Spark And Built.io Flow
 
Smart TV Security - #1984 in 21st century -
Smart TV Security - #1984 in 21st century -Smart TV Security - #1984 in 21st century -
Smart TV Security - #1984 in 21st century -
 

Coranti 2015-12 IP Sale