SlideShare a Scribd company logo
1 of 14
Trusted Communications    for Business Robert Bernardi CEO & Chairman, rbernardi@gigatrust.com  O-(703) 467-3741  C-(703) 609-2234
Corporate Assets  ,[object Object]
Content is Mobile…  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
… And it Comes in Many Forms… ,[object Object],[object Object],[object Object],[object Object],[object Object]
Network & Point Security  The Easy 20% ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is GigaTrust Rights Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The RMS Security Platform  Trusted Authentication Trusted Application Trusted User Operating System Microsoft Windows 2000/XP/Vista Microsoft Apps. Office 2003/2007; MOSS Microsoft AD Intra-company
GigaTrust Extensions to RMS GigaTrust Applications Office 2000/XP/03/07, MOSS Protector, web server, non-Office content –PDF/CAD & image files, customizable viewer, RMS enable file shares, Blackberry client GigaTrust Identity Management Service authenticate, provision, activate users across business partner network and supply chain Trusted Authentication Trusted Application Trusted User Operating System Microsoft Windows 2000/XP/Vista Microsoft Apps. Office 2003/2007; MOSS Microsoft AD Intra-company GigaTrust  Non-Windows platform (RIM)
GigaTrust Product Demo
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],GigaTrust Business Model
Current Customers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pilots & Pipeline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Active Partners
Management Name Title Experience Robert Bernardi Chairman, President & CEO 20 years experience working as high-tech entrepreneur. Founder and CEO of 4 high tech start-up ventures and public companies.  Prior background at MCI, Booz Allen and Mitre. Robert Kellogg VP, Engineering 20 years experience in software design and development at Treev, PRC and Unisys.  Harry Piccariello Chief Marketing Officer 20 years marketing experience with 10 years in the security and DRM business at Content Guard and Cloakware Lesley Harris VP, Federal Sales 25 years experience at Lenovo America and IBM in business development, marketing and sales. Brad Gandee VP, Commercial Sales & Product Mktg. 30 years experience with product marketing with 12 years of digital media security at Content Guard. Darryl Worsham VP, Business Development 30 years experience sales and marketing  and business development. CEO  of ERM technology company.

More Related Content

What's hot

Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...CloudEntr
 
Hybrid identity by Sandeep Kumar Seeram
Hybrid identity by Sandeep Kumar Seeram Hybrid identity by Sandeep Kumar Seeram
Hybrid identity by Sandeep Kumar Seeram Sandeep Kumar Seeram
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 
U&ME_Plus_Corporate_Brochure_Online
U&ME_Plus_Corporate_Brochure_OnlineU&ME_Plus_Corporate_Brochure_Online
U&ME_Plus_Corporate_Brochure_OnlineHamid Rashid
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode
 
2015 Global Identity and Access Management (IAM) Market Leadership Award
2015 Global Identity and Access Management (IAM) Market Leadership Award2015 Global Identity and Access Management (IAM) Market Leadership Award
2015 Global Identity and Access Management (IAM) Market Leadership AwardPeter Tutty
 
Identity and Access Management Tools
Identity and Access Management ToolsIdentity and Access Management Tools
Identity and Access Management Toolsijtsrd
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAForgeRock
 
BlackBerry Access
BlackBerry AccessBlackBerry Access
BlackBerry AccessBlackBerry
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Put your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirstPut your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirstEd Brill
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyDavid J Rosenthal
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities ForgeRock
 
IRM: Using Identity to Empower CIOs Everywhere
IRM: Using Identity to Empower CIOs EverywhereIRM: Using Identity to Empower CIOs Everywhere
IRM: Using Identity to Empower CIOs EverywhereForgeRock
 

What's hot (20)

IAM Tools
IAM ToolsIAM Tools
IAM Tools
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
 
Hybrid identity by Sandeep Kumar Seeram
Hybrid identity by Sandeep Kumar Seeram Hybrid identity by Sandeep Kumar Seeram
Hybrid identity by Sandeep Kumar Seeram
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
U&ME_Plus_Corporate_Brochure_Online
U&ME_Plus_Corporate_Brochure_OnlineU&ME_Plus_Corporate_Brochure_Online
U&ME_Plus_Corporate_Brochure_Online
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solution
 
2015 Global Identity and Access Management (IAM) Market Leadership Award
2015 Global Identity and Access Management (IAM) Market Leadership Award2015 Global Identity and Access Management (IAM) Market Leadership Award
2015 Global Identity and Access Management (IAM) Market Leadership Award
 
Identity and Access Management Tools
Identity and Access Management ToolsIdentity and Access Management Tools
Identity and Access Management Tools
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMA
 
BlackBerry Access
BlackBerry AccessBlackBerry Access
BlackBerry Access
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Put your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirstPut your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirst
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
IRM: Using Identity to Empower CIOs Everywhere
IRM: Using Identity to Empower CIOs EverywhereIRM: Using Identity to Empower CIOs Everywhere
IRM: Using Identity to Empower CIOs Everywhere
 

Similar to GigaTrust Investor Presentation 2010

Nexsign Biometric Authentication
Nexsign Biometric AuthenticationNexsign Biometric Authentication
Nexsign Biometric AuthenticationSamsung SDS America
 
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the ITCIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the ITDenodo
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionFolio3 Software
 
About : Radius knowledge Labs
About : Radius knowledge LabsAbout : Radius knowledge Labs
About : Radius knowledge Labslabradius
 
Cloud without Compromise
Cloud without CompromiseCloud without Compromise
Cloud without CompromiseArrow ECS UK
 
The Value Of Business Information March 2010
The Value Of Business Information   March 2010The Value Of Business Information   March 2010
The Value Of Business Information March 2010GarySmith2000
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with WatsonSylvia Low
 
Degnan Presentation Portfolio 2012
Degnan Presentation Portfolio 2012Degnan Presentation Portfolio 2012
Degnan Presentation Portfolio 2012bdegnan2
 
Jun 25 webcast maximizing insight with big data analytics
Jun 25 webcast   maximizing insight with big data analyticsJun 25 webcast   maximizing insight with big data analytics
Jun 25 webcast maximizing insight with big data analyticsCasey Lucas
 
11 IT Management Predictions for 2011
11 IT Management Predictions for 201111 IT Management Predictions for 2011
11 IT Management Predictions for 2011Nathan Burke
 
Dr Christoph Nieuwoudt- AI in Financial Services
Dr Christoph Nieuwoudt- AI in Financial ServicesDr Christoph Nieuwoudt- AI in Financial Services
Dr Christoph Nieuwoudt- AI in Financial Servicesitnewsafrica
 
Corporate Presentation Manam Infotech
Corporate Presentation Manam InfotechCorporate Presentation Manam Infotech
Corporate Presentation Manam InfotechManam Infotech
 
Réinventez le Data Management avec la Data Virtualization de Denodo
Réinventez le Data Management avec la Data Virtualization de DenodoRéinventez le Data Management avec la Data Virtualization de Denodo
Réinventez le Data Management avec la Data Virtualization de DenodoDenodo
 
IBM Smarter Collaboration
IBM Smarter CollaborationIBM Smarter Collaboration
IBM Smarter CollaborationVincent Perrin
 
Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Steven Williams
 
IntelliMedia Netwoks Services
IntelliMedia Netwoks ServicesIntelliMedia Netwoks Services
IntelliMedia Netwoks ServicesRaj Shah
 
Enterprise Data Management: Managing your Business’s Entire Data Lifecycle
Enterprise Data Management: Managing your Business’s Entire Data LifecycleEnterprise Data Management: Managing your Business’s Entire Data Lifecycle
Enterprise Data Management: Managing your Business’s Entire Data LifecycleNIXUnited
 

Similar to GigaTrust Investor Presentation 2010 (20)

Nexsign Biometric Authentication
Nexsign Biometric AuthenticationNexsign Biometric Authentication
Nexsign Biometric Authentication
 
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the ITCIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
 
Parnets 2018 inductions
Parnets 2018 inductions Parnets 2018 inductions
Parnets 2018 inductions
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 
About : Radius knowledge Labs
About : Radius knowledge LabsAbout : Radius knowledge Labs
About : Radius knowledge Labs
 
Cloud without Compromise
Cloud without CompromiseCloud without Compromise
Cloud without Compromise
 
The Value Of Business Information March 2010
The Value Of Business Information   March 2010The Value Of Business Information   March 2010
The Value Of Business Information March 2010
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
Degnan Presentation Portfolio 2012
Degnan Presentation Portfolio 2012Degnan Presentation Portfolio 2012
Degnan Presentation Portfolio 2012
 
Jun 25 webcast maximizing insight with big data analytics
Jun 25 webcast   maximizing insight with big data analyticsJun 25 webcast   maximizing insight with big data analytics
Jun 25 webcast maximizing insight with big data analytics
 
11 IT Management Predictions for 2011
11 IT Management Predictions for 201111 IT Management Predictions for 2011
11 IT Management Predictions for 2011
 
Dr Christoph Nieuwoudt- AI in Financial Services
Dr Christoph Nieuwoudt- AI in Financial ServicesDr Christoph Nieuwoudt- AI in Financial Services
Dr Christoph Nieuwoudt- AI in Financial Services
 
shchyrinprom2009
shchyrinprom2009shchyrinprom2009
shchyrinprom2009
 
Corporate Presentation Manam Infotech
Corporate Presentation Manam InfotechCorporate Presentation Manam Infotech
Corporate Presentation Manam Infotech
 
Réinventez le Data Management avec la Data Virtualization de Denodo
Réinventez le Data Management avec la Data Virtualization de DenodoRéinventez le Data Management avec la Data Virtualization de Denodo
Réinventez le Data Management avec la Data Virtualization de Denodo
 
IBM Smarter Collaboration
IBM Smarter CollaborationIBM Smarter Collaboration
IBM Smarter Collaboration
 
Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
IntelliMedia Netwoks Services
IntelliMedia Netwoks ServicesIntelliMedia Netwoks Services
IntelliMedia Netwoks Services
 
Enterprise Data Management: Managing your Business’s Entire Data Lifecycle
Enterprise Data Management: Managing your Business’s Entire Data LifecycleEnterprise Data Management: Managing your Business’s Entire Data Lifecycle
Enterprise Data Management: Managing your Business’s Entire Data Lifecycle
 

GigaTrust Investor Presentation 2010

  • 1. Trusted Communications for Business Robert Bernardi CEO & Chairman, rbernardi@gigatrust.com O-(703) 467-3741 C-(703) 609-2234
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. The RMS Security Platform Trusted Authentication Trusted Application Trusted User Operating System Microsoft Windows 2000/XP/Vista Microsoft Apps. Office 2003/2007; MOSS Microsoft AD Intra-company
  • 8. GigaTrust Extensions to RMS GigaTrust Applications Office 2000/XP/03/07, MOSS Protector, web server, non-Office content –PDF/CAD & image files, customizable viewer, RMS enable file shares, Blackberry client GigaTrust Identity Management Service authenticate, provision, activate users across business partner network and supply chain Trusted Authentication Trusted Application Trusted User Operating System Microsoft Windows 2000/XP/Vista Microsoft Apps. Office 2003/2007; MOSS Microsoft AD Intra-company GigaTrust Non-Windows platform (RIM)
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Management Name Title Experience Robert Bernardi Chairman, President & CEO 20 years experience working as high-tech entrepreneur. Founder and CEO of 4 high tech start-up ventures and public companies. Prior background at MCI, Booz Allen and Mitre. Robert Kellogg VP, Engineering 20 years experience in software design and development at Treev, PRC and Unisys. Harry Piccariello Chief Marketing Officer 20 years marketing experience with 10 years in the security and DRM business at Content Guard and Cloakware Lesley Harris VP, Federal Sales 25 years experience at Lenovo America and IBM in business development, marketing and sales. Brad Gandee VP, Commercial Sales & Product Mktg. 30 years experience with product marketing with 12 years of digital media security at Content Guard. Darryl Worsham VP, Business Development 30 years experience sales and marketing and business development. CEO of ERM technology company.

Editor's Notes

  1. Notes pages include
  2. Includes: Outlook and desktop plug-ins Complete management of authentications and license clearing GigaTrust for Web Servers software (priced separately) for web sites, line of business applications and portals Users Management Console Policy templates for company or individual usage
  3. Because partners are going to be key to enterprise adoption of this technology, our team has cultivated a series of relationships with key partners in the Microsoft community. Many of these partnerships are a result of long-term relationships established by members of the GigaTrust management team.
  4. The management teams is well rounded, experienced and well suited to building the business at hand.