SlideShare a Scribd company logo
CloudCop
Intelligent Data Protection… Delivered!
1Confidential – Do not Distribute
2
CloudCop Team:
Together 50 years of experience
Dilip Gudimetla
Security Software Architect.
Senior Manager at Intel Security
16 years of experience
Security products Engineering
Krishnadas M
Network and Security Services Expert.
Delivery Manager at BT.12 years of
experience (includes Cisco and British
Telecom)
Subrat Sarkar
IT Security Expert
9 years of experience (includes leading
projects at Symantec and Mcafee)
Ajay Goel
Managing Partner & Producer
CrestLight ventures
Cloudcop Mentor
Contact us : getcloudcop@gmail.com
3
Enterprise success is built on “Critical Data Protection”
Intellectual
Property
Trade Secrets
Financial
Information
What is critical business data
$418 Billion worth critical data lost in 2013*
Problem we are solving:
Limitations of existing Data Protection solutions
Inefficient (< 55%)
Slow response time
Deployment constraint
Data protection gap
5
Introducing: CloudCop
Bluetooth,
NFC
CD, USB
Drives
Printer
Email
Internet
Storage
Devices
Complete Data Protection as a CLOUD service
Data loss through
connected devices
Data loss through
Network
6
Our Unique Value Proposition
Effectiveness > 90%
Deployable within minutes
Real-time response
Seamless data protection
Highly scalable
7
How we solve this problem
CloudCop agent
CloudCop Server
Gather context & content
Send fingerprint of data
Evaluate sensitivity of data
Indicate the decision
Take action: allow, block
8
CloudCop: Differentiation
Some of our direct competitors
Hardware &
Software based
Proxy based
Competitors - Strengths and Weakness analysis
Market Size
 Data loss prevention market worth billions more by 2018.
 Nearly 50% jump from 2013’s $3.61 billion TO $7.5 billion in 2018
(Source:MarketsandMarkets).
 Customers belong to the following verticals :
Financial
Services
Retail
Healthcare
Technology
12
Go-to-market Strategy
We reach customers through two channels.
CloudCop
System Integrators &
Channel Partners
Service providers –
Internet, Cloud, Security
Medium Enterprises Large Enterprises
13
Where are we on the solution
Solution Demonstration
Solution Development
Technology Validation
Product Launch & Operations
MVP is in progress
14
Patentable Ideas
Unique cloud-based approach
Context & content correlation algorithm
Intelligent caching mechanism
15
How much funding we need
Build MVP
Time: 12 months
Fund: $300,000
First Version
Time: 18 months
Fund: $600,000
Expand Business
Time: 24 months
Fund: $1,500,000
Angel Stage Seed Stage Series A Stage
Plan to reach break-even in 30 months
Exit strategy
 Merger or acquisition
Or
 Investor payout
17
We look forward to partner with you in
building this $100 Million dollar venture
getcloudcop@gmail.com
Thank You
Backup slides
19
Where do we deploy CloudCop
For Large Enterprises For Medium Enterprises
Within
Enterprise’s
private cloud
Within Service
Provider’s cloud
20
Revenue Generation Model
License fee for Large Enterprises
Endpoint Bundles 1- 199 200 - 499 500+
Fees per each endpoint $45 $42 $40
30% revenue share with Service Providers for
services offered to medium size enterprises
21
Growth Strategy
Partner to grow to newer markets & demographic

More Related Content

What's hot

Big Data Analytics for Insurance Business
Big Data Analytics for Insurance BusinessBig Data Analytics for Insurance Business
Big Data Analytics for Insurance Business
PanBI
 
Protecting Sensitive Personal Data in the Enterprise
Protecting Sensitive Personal Data in the EnterpriseProtecting Sensitive Personal Data in the Enterprise
Protecting Sensitive Personal Data in the Enterprise
Tata Consultancy Services
 
CIQ Consumer Lending Presentation 20170621 GLM
CIQ Consumer Lending Presentation 20170621 GLMCIQ Consumer Lending Presentation 20170621 GLM
CIQ Consumer Lending Presentation 20170621 GLM
Gary L. Melling
 
Information Map around the world in 80 clicks
Information Map around the world in 80 clicksInformation Map around the world in 80 clicks
Information Map around the world in 80 clicks
Veritas Technologies LLC
 
Viewpointe cloud belong_info management_slideshare_7-17-17
Viewpointe cloud belong_info management_slideshare_7-17-17Viewpointe cloud belong_info management_slideshare_7-17-17
Viewpointe cloud belong_info management_slideshare_7-17-17
shawmi
 
6 Ways the Cloud Improves Business Efficiency
6 Ways the Cloud Improves Business Efficiency6 Ways the Cloud Improves Business Efficiency
6 Ways the Cloud Improves Business Efficiency
Insight
 
Azure Reserved VM Instances Made Simple
Azure Reserved VM Instances Made SimpleAzure Reserved VM Instances Made Simple
Azure Reserved VM Instances Made Simple
CloudHealth by VMware
 
Making Money in the Cloud
Making Money in the CloudMaking Money in the Cloud
Making Money in the CloudGravitant, Inc.
 
Be Proactive, Not Reactive: Cloud Governance for Fast, Accurate Decision Making
Be Proactive, Not Reactive: Cloud Governance for Fast, Accurate Decision MakingBe Proactive, Not Reactive: Cloud Governance for Fast, Accurate Decision Making
Be Proactive, Not Reactive: Cloud Governance for Fast, Accurate Decision Making
CloudHealth by VMware
 
AWS Got You Worried? Learn How to Get a Grip on Cloud Spend and Sprawl
AWS Got You Worried? Learn How to Get a Grip on Cloud Spend and SprawlAWS Got You Worried? Learn How to Get a Grip on Cloud Spend and Sprawl
AWS Got You Worried? Learn How to Get a Grip on Cloud Spend and Sprawl
Gravitant, Inc.
 
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
Veritas Technologies LLC
 
Building a data platform tnt
Building a data platform tntBuilding a data platform tnt
Building a data platform tnt
BigDataExpo
 
David Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storageDavid Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storage
Veritas Technologies LLC
 
Jason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAJason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEA
Veritas Technologies LLC
 
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Zia Consulting
 
Dynamic Talks: "Data Strategy as a Conduit for Data Maturity and Monetization...
Dynamic Talks: "Data Strategy as a Conduit for Data Maturity and Monetization...Dynamic Talks: "Data Strategy as a Conduit for Data Maturity and Monetization...
Dynamic Talks: "Data Strategy as a Conduit for Data Maturity and Monetization...
Grid Dynamics
 
Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of view
Veritas Technologies LLC
 

What's hot (18)

Big Data Analytics for Insurance Business
Big Data Analytics for Insurance BusinessBig Data Analytics for Insurance Business
Big Data Analytics for Insurance Business
 
Protecting Sensitive Personal Data in the Enterprise
Protecting Sensitive Personal Data in the EnterpriseProtecting Sensitive Personal Data in the Enterprise
Protecting Sensitive Personal Data in the Enterprise
 
CIQ Consumer Lending Presentation 20170621 GLM
CIQ Consumer Lending Presentation 20170621 GLMCIQ Consumer Lending Presentation 20170621 GLM
CIQ Consumer Lending Presentation 20170621 GLM
 
Information Map around the world in 80 clicks
Information Map around the world in 80 clicksInformation Map around the world in 80 clicks
Information Map around the world in 80 clicks
 
Viewpointe cloud belong_info management_slideshare_7-17-17
Viewpointe cloud belong_info management_slideshare_7-17-17Viewpointe cloud belong_info management_slideshare_7-17-17
Viewpointe cloud belong_info management_slideshare_7-17-17
 
6 Ways the Cloud Improves Business Efficiency
6 Ways the Cloud Improves Business Efficiency6 Ways the Cloud Improves Business Efficiency
6 Ways the Cloud Improves Business Efficiency
 
Azure Reserved VM Instances Made Simple
Azure Reserved VM Instances Made SimpleAzure Reserved VM Instances Made Simple
Azure Reserved VM Instances Made Simple
 
Making Money in the Cloud
Making Money in the CloudMaking Money in the Cloud
Making Money in the Cloud
 
Be Proactive, Not Reactive: Cloud Governance for Fast, Accurate Decision Making
Be Proactive, Not Reactive: Cloud Governance for Fast, Accurate Decision MakingBe Proactive, Not Reactive: Cloud Governance for Fast, Accurate Decision Making
Be Proactive, Not Reactive: Cloud Governance for Fast, Accurate Decision Making
 
Making Big Data Work
Making Big Data WorkMaking Big Data Work
Making Big Data Work
 
AWS Got You Worried? Learn How to Get a Grip on Cloud Spend and Sprawl
AWS Got You Worried? Learn How to Get a Grip on Cloud Spend and SprawlAWS Got You Worried? Learn How to Get a Grip on Cloud Spend and Sprawl
AWS Got You Worried? Learn How to Get a Grip on Cloud Spend and Sprawl
 
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
 
Building a data platform tnt
Building a data platform tntBuilding a data platform tnt
Building a data platform tnt
 
David Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storageDavid Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storage
 
Jason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAJason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEA
 
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
 
Dynamic Talks: "Data Strategy as a Conduit for Data Maturity and Monetization...
Dynamic Talks: "Data Strategy as a Conduit for Data Maturity and Monetization...Dynamic Talks: "Data Strategy as a Conduit for Data Maturity and Monetization...
Dynamic Talks: "Data Strategy as a Conduit for Data Maturity and Monetization...
 
Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of view
 

Similar to Cloud cop presentation

Cts Corporate Pitch
Cts Corporate PitchCts Corporate Pitch
Cts Corporate PitchSteve Kaye
 
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdf
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdfSoftware Principles and Project Deadlines Don't have to be Polar Opposites.pdf
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdf
Craig Saunders
 
Bt idc event cloud adoption in ireland
Bt  idc event cloud adoption in irelandBt  idc event cloud adoption in ireland
Bt idc event cloud adoption in ireland
Fiona Sexton
 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
Cloudthat Technologies Private
 
Azure security
Azure securityAzure security
Cloud without Compromise
Cloud without CompromiseCloud without Compromise
Cloud without Compromise
Arrow ECS UK
 
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons LearnedAWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summits
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Digital Guardian
 
Nvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 decNvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 dec
PhilSmith151163
 
Dynamics day 2015 Keynote
Dynamics day 2015 KeynoteDynamics day 2015 Keynote
Dynamics day 2015 Keynote
Intergen
 
Scot-Cloud 2015
Scot-Cloud 2015Scot-Cloud 2015
Scot-Cloud 2015
Ray Bugg
 
The Art of Data Science - event slides
The Art of Data Science - event slidesThe Art of Data Science - event slides
The Art of Data Science - event slides
RedPixie
 
Sun son-uk-ltd investor-pitch-deck-07-22-2015
Sun son-uk-ltd investor-pitch-deck-07-22-2015Sun son-uk-ltd investor-pitch-deck-07-22-2015
Sun son-uk-ltd investor-pitch-deck-07-22-2015
Josh Dathe
 
Cloud webinar final
Cloud webinar finalCloud webinar final
Cloud webinar final
Ness Technologies
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
Cloudflare
 
F_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfF_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdf
josbjs
 
The evolving CIO|CISO relationship
The evolving CIO|CISO relationship  The evolving CIO|CISO relationship
The evolving CIO|CISO relationship
Zscaler
 
Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerinevitablecloud
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
InvestorSymantec
 
Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald Tang
Minh Le
 

Similar to Cloud cop presentation (20)

Cts Corporate Pitch
Cts Corporate PitchCts Corporate Pitch
Cts Corporate Pitch
 
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdf
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdfSoftware Principles and Project Deadlines Don't have to be Polar Opposites.pdf
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdf
 
Bt idc event cloud adoption in ireland
Bt  idc event cloud adoption in irelandBt  idc event cloud adoption in ireland
Bt idc event cloud adoption in ireland
 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
 
Azure security
Azure securityAzure security
Azure security
 
Cloud without Compromise
Cloud without CompromiseCloud without Compromise
Cloud without Compromise
 
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons LearnedAWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
 
Nvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 decNvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 dec
 
Dynamics day 2015 Keynote
Dynamics day 2015 KeynoteDynamics day 2015 Keynote
Dynamics day 2015 Keynote
 
Scot-Cloud 2015
Scot-Cloud 2015Scot-Cloud 2015
Scot-Cloud 2015
 
The Art of Data Science - event slides
The Art of Data Science - event slidesThe Art of Data Science - event slides
The Art of Data Science - event slides
 
Sun son-uk-ltd investor-pitch-deck-07-22-2015
Sun son-uk-ltd investor-pitch-deck-07-22-2015Sun son-uk-ltd investor-pitch-deck-07-22-2015
Sun son-uk-ltd investor-pitch-deck-07-22-2015
 
Cloud webinar final
Cloud webinar finalCloud webinar final
Cloud webinar final
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 
F_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfF_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdf
 
The evolving CIO|CISO relationship
The evolving CIO|CISO relationship  The evolving CIO|CISO relationship
The evolving CIO|CISO relationship
 
Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamer
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
 
Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald Tang
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

Cloud cop presentation

  • 1. CloudCop Intelligent Data Protection… Delivered! 1Confidential – Do not Distribute
  • 2. 2 CloudCop Team: Together 50 years of experience Dilip Gudimetla Security Software Architect. Senior Manager at Intel Security 16 years of experience Security products Engineering Krishnadas M Network and Security Services Expert. Delivery Manager at BT.12 years of experience (includes Cisco and British Telecom) Subrat Sarkar IT Security Expert 9 years of experience (includes leading projects at Symantec and Mcafee) Ajay Goel Managing Partner & Producer CrestLight ventures Cloudcop Mentor Contact us : getcloudcop@gmail.com
  • 3. 3 Enterprise success is built on “Critical Data Protection” Intellectual Property Trade Secrets Financial Information What is critical business data $418 Billion worth critical data lost in 2013*
  • 4. Problem we are solving: Limitations of existing Data Protection solutions Inefficient (< 55%) Slow response time Deployment constraint Data protection gap
  • 5. 5 Introducing: CloudCop Bluetooth, NFC CD, USB Drives Printer Email Internet Storage Devices Complete Data Protection as a CLOUD service Data loss through connected devices Data loss through Network
  • 6. 6 Our Unique Value Proposition Effectiveness > 90% Deployable within minutes Real-time response Seamless data protection Highly scalable
  • 7. 7 How we solve this problem CloudCop agent CloudCop Server Gather context & content Send fingerprint of data Evaluate sensitivity of data Indicate the decision Take action: allow, block
  • 9. Some of our direct competitors Hardware & Software based Proxy based
  • 10. Competitors - Strengths and Weakness analysis
  • 11. Market Size  Data loss prevention market worth billions more by 2018.  Nearly 50% jump from 2013’s $3.61 billion TO $7.5 billion in 2018 (Source:MarketsandMarkets).  Customers belong to the following verticals : Financial Services Retail Healthcare Technology
  • 12. 12 Go-to-market Strategy We reach customers through two channels. CloudCop System Integrators & Channel Partners Service providers – Internet, Cloud, Security Medium Enterprises Large Enterprises
  • 13. 13 Where are we on the solution Solution Demonstration Solution Development Technology Validation Product Launch & Operations MVP is in progress
  • 14. 14 Patentable Ideas Unique cloud-based approach Context & content correlation algorithm Intelligent caching mechanism
  • 15. 15 How much funding we need Build MVP Time: 12 months Fund: $300,000 First Version Time: 18 months Fund: $600,000 Expand Business Time: 24 months Fund: $1,500,000 Angel Stage Seed Stage Series A Stage Plan to reach break-even in 30 months
  • 16. Exit strategy  Merger or acquisition Or  Investor payout
  • 17. 17 We look forward to partner with you in building this $100 Million dollar venture getcloudcop@gmail.com Thank You
  • 19. 19 Where do we deploy CloudCop For Large Enterprises For Medium Enterprises Within Enterprise’s private cloud Within Service Provider’s cloud
  • 20. 20 Revenue Generation Model License fee for Large Enterprises Endpoint Bundles 1- 199 200 - 499 500+ Fees per each endpoint $45 $42 $40 30% revenue share with Service Providers for services offered to medium size enterprises
  • 21. 21 Growth Strategy Partner to grow to newer markets & demographic

Editor's Notes

  1. * Verizon published that Enterprises lost $418 Billion dollar worth critical data in 2013 – this indicates the seriousness of the problem
  2. Gautam