SlideShare a Scribd company logo
1 of 33
Rev : 28/11/2019
Safer
Together.
VC deck v3.1
Open Source Collaborative Security engine
Dynamic
CrowdSec
Smart Money Round
deck v1
18/06/2020
Why
“Cyber defense collaboration is the space race of
our generation.”
Williams
David
By 2021, the estimated cost of Cyber criminality
is $6 trillion (Cybersecurity ventures)
Hackers attack occur every 39
seconds. (University of Maryland)
In 2018 hackers stole half a billion personal
records (Cybersecurity ventures)
The average cost of a data
breach is $150 M. (Juniper)
Cybersecurity: not (only) a problem of means
3
(800 K records, 57 000
users)
($117 million settlement)
(7.5 million accounts stolen) (2.2 bn records)
(117 million of email/pass)
(83 million of accounts) (57 million of accounts) ($162 million cost)
($171 million global cost)
($500 million robbed) ($252 million
cost)
These companies had amongst the largest security budgets on
earth, yet this did not prevent cyber criminals to succeed.
We need another approach
The others
Not solved, for a reason
Time between intrusion and detection,
0day and patch, safe and … sorry.
Apps require ports opened to
everyone on the firewall, which just
let everything … pass.
Hackers use stolen servers, free open
source tools and their time. They don’t even
need 1% of your budget to attack you.
Time
Unfiltered
ports
Money
Shadow IT (Cloud / SaaS) & Covid19’s
“Work at home” policy created an uneven
security level across the perimeter. CTOs
have no idea where are their assets and
how they are cared for.
4
Perimeter
The next generation solution
5
Real Time
Behavior
assessment
Reputation
assessment
Decoupled
detection &
remediation
Crowd intel
sharing
We use this, because it’s free, real time,
fed by community and gives traffic
insights.
Our parents used this.
The Waze of firewalls
6
The team
“Best ideas can fail, best teams don’t”
Low fixed cost, IT spendings scale as we grow,
most of computing power used client-side
Open Source allow community
to partake in the effort
No sales, only marketing and
durable communication
An experimented team
6 persons, 5 on unemployment money, few
permanent positions on long term
8
Philippe
Humeau
CEO
Leadership
Strategy
Networks
Experience
Marketing
Vision
Means
Business
Accountable for
Laurent
Soubrevilla
COO
Forecast
Tactician
Experience
Polyvalent
Cash efficient
Accountable for
Delivery
Planning
Execution
Thibault
Koechlin
CTO
Defensive Security
Open source savvy
Mentoring
Lead Dev
Offensive security
Security
Architecture
Stability
Accountable for
A seasoned founders triumvirate
25 years 12 years
(The team will introduce itself)
Behavior & Reputation based
security network
Like Waze, more users means better precision
Open Source will help enlarge our crowd
Previous IP reputation systems (partially) failed
because they were not crowd based
CrowdSec analyses behavior, not IP:port
10
Legitimate traffic
Bruteforce
Port scan
Web crawlers
Exploits
XSS/SQLi
...
Internet
10.0.0.0/24
12.33.42.155
80/TCP
53/UDP
22/TCP
123.42.56.218
21/TCP
Firewall CrowdSec
11
CrowdSec automates your security
Logs
BAD IP
Community
SIEM Party
Collect data
where you
want...
Ours Yours
Community
Behavior scenarii
detect hack
attempts
React the way
you want, where
you want
Block Captcha
Limit rights
or speed
2FA/MFA
Share your
sightings and get
informed
BAD IP
1 2 3 4
12
Detect & enforce
Logs Logs Logs
Internet
Cloudified, SaaS & Hosted On Premise
Information System
BAD IP
BAD IP
One stone, ten birds
13
?
Aggressive traffic is
qualified, discarded
& notified to our
database
Security made simple: just click
14
Our Hub: one place to find all you need
One click to
enable a scenario
Filtering the noise: the Consensus
15
Predictive.Alg
Honeypot
Crowd
Sec
TR1 TR1 TR1 TR1 TR2 TR2 TR2
Canaries
Crowd
Sec
Crowd
Sec
Monetization
”If it’s free, you are the product”
Andrew Lewis
Open Source + Free + useful = Crowd
With thousands of machines reporting the aggressions they face in
real time ...
… our IP reputation database is the most
accurate and real time ever made.
17
1st packet sent by a new IP, is
screened by our API (on or offline)
API replies “Pass” or “Act”
Unknown IPs
make queries
1|
2|
3|
?
?
IP
API: Monetizing the Network effect
Our API can be leveraged anywhere
18
Daemons
Appliances
HTTP
servers
Apps,
codelets, tools
Languages &
frameworks
And let you choose response to enforce
But we offer way more to premiums
19
Open Source Component (autoban bad behavior) yes optional optional
Sharing signals with community yes optional optional
Dashboard Local & Online Customizable includes compliance
Extended Consensus including 3rd party blacklists Community Crowdsec Crowdsec
Extended remediations (Captcha / 2FA / MFA / Throttle)
Activity Typology Filtering (AS, bot, threat type/level, …)
Support 1 day best effort 24x5, chat/mail 24x7 phone
Features
Blacklists received
[Phase 2] Artificial Intelligence based filtering
yes
no
Local
Community
Community
Centralized mgmt (Group policies & filtering profiles)
Self monitoring of your IPs & am I under attack
Private consensus (with/between your machine)
Cold log online analyzes / forensic as a service
no
no
Online
Crowdsec
24x7 chat/mail
API Access 200 K queries included
Free Watcher Premium Enterprise API access
(Customizable) (Customizable) (Customizable)
The Market
“Sound strategy starts with having the right goal”
Michael Porter
Jeremy King,
(President - Benchmark Executive
Search)
“From our optics, if you define cyber as data
collection, storage, security, analysis, threat
intelligence, operations and dissemination, then
the $1 trillion market forecast from Cybersecurity
Ventures barely scratches the surface”
Why now?
21
Size matters
Free
Accuracy comes from
the number. A small, self
financed network cannot
match the efficiency of
large scale distributed
effort, Open source is the
answer here.
Versatility Community
Most of previous
attempts focused on
Email, domains &
geolocation, mainly to
fight spam. API 1st is a
game changer, let the
user decides where,
when, what.
API-First Open Source
Attempts: Symantec, Talos (Cisco), Gossip, Repuscore, IP group REP
Fail2ban paved the way.
In order to get known
beyond just mail admins
and reach a larger crowd,
let the community know
you are free, reputable
and easy to use.
Aka: What previous IP reputation systems missed
?
Aka: Why it doesn’t exist already ?
There is no “Waze of Security”
22
HIPS/EDR/Tools
Bot
mitigation
IP Reputation Threat intel CDN/SeCDN
None is crowd based
None is Open source
None is free
Clients Data SRC Competitors Partners Clients
IT engineers on
an infrastructure
Sysadmins
on servers
DevOPS in
their
deployment
environment
Developers
through a
Library or
direct API call
Local admins
on LAN server
& workstation
Anyone can set it up
24
Next 6 months: go-to Community
Personas
Techs
SRE
DevOPS Developers CISO
SecOPS/MSSP
Vectors
37%
80% 37%
96% 30%
Millions
70%
How to reach 3.5% conversion rate
25
Get known from targets
(with the OS tool, eye candy radar &
content marketing)
Easy conversion
(WW PSP, VAT & taxes handling,
support, mail reminders)
Smart retention
(Constantly offer more
features for the price)
Easy deployment for all
Communication
Ignite the need
Frictionless premium
Always offer more
Onboard easily
(with assisted setup, Hub, premade
configs, support)
Strong premium incentive
(Offer premium trial, show benefits
with smart marketing automation)
Open source: a way to become viral
26
Open Source
1| Free (to use, copy, modify)
2| Free of charge
3|
4|Can be embedded No use case limit
5| Must name author
6|
Core
MIT licence. As free as it
can be. Core
contributors abandon
rights
Configurations
stays their authors
properties
Connectors stay
their authors
properties
Open Source is a symbiotic Ecosystem
27
Kind & benevolent feedbacks
Viral spreading visibility
Potential coders reinforcement
Community Scenarii
Community Connectors
And mainly SIGNALS
A free, supported product
Expertise (through scenarii)
Marketplace (to monetize yours)
Auditability, means trust
Safe from potential corp issues
Safe from model/licence change
(we) Give (we) Receive
Equity story
“Money is usually attracted, not pursued.”
Jim Rohn
Our previous cyber security corp
was sold in 2016 for tens of millions
We created several
Open source products before
Decentralized as of day 1, not
affected by Covid crisis.
Cloud born & based, no dependency on soft or
hardware supply chain nor managed services
29
Smart & Seeders money will be used to:
Build our
community
Strengthen
the SaaS
Preparing the SaaS and start to
monetize is key for A serie.
Adoption rate is our sole KPI during
this phase. We need a community.
Ramp up the signal
collection
The larger the collection network,
the larger the network value & effect
A
We look for ~300 000 € in this Smart Money round
May
2020
12 months agenda
30
June
2020
December
2020
June
2022
1st Open
source release
Smart Money
round
API MVP +
Seeding Round
Predictive consensus
January
2020
Incorporation
March
2021
A serie +
Premium
offers sales
Successes that leveraged similar pillars
31
Crowd based
Open source
Freemium SAAS
Nginx, Openstack, Elastic Search
Zappier, Dropbox, Algolia
Waze, Airbnb, Duolingo
BORN TO BE The leader
of dynamic firewalling
At a glance
32
We look
for
0.3 M€
● Open Source editor
● Security, Deep Tech
● SaaS, Low Touch
● Collaborative, NG Firewall
● A global security network
Thank
you
CEO -
philippe@crowdsec.net
COO -
laurent@crowdsec.net
Only the crowd can defeat
mass scale hacking...

More Related Content

Similar to CrowdSec - Smart Money Round deck

Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...Black Duck by Synopsys
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersFeisal Nanji
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalShallu Behar-Sheehan FCIM
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersKaseya
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKKatie Nickels
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfpreetichaubey4
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...lior mazor
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For ActionBarry Greene
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack MethodologiesGeeks Anonymes
 
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoBSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoKatie Nickels
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Akamai 2018 Spring state of the Internet security report
Akamai 2018 Spring state of the Internet security reportAkamai 2018 Spring state of the Internet security report
Akamai 2018 Spring state of the Internet security reportYuriy Yuzifovich
 

Similar to CrowdSec - Smart Money Round deck (20)

Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and Hackers
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
The artificial reality of cyber defense
The artificial reality of cyber defenseThe artificial reality of cyber defense
The artificial reality of cyber defense
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CK
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For Action
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising Deck
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoBSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Akamai 2018 Spring state of the Internet security report
Akamai 2018 Spring state of the Internet security reportAkamai 2018 Spring state of the Internet security report
Akamai 2018 Spring state of the Internet security report
 

Recently uploaded

Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCRsoniya singh
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...lizamodels9
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756dollysharma2066
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiMalviyaNagarCallGirl
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...Khaled Al Awadi
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 

Recently uploaded (20)

Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 

CrowdSec - Smart Money Round deck

  • 1. Rev : 28/11/2019 Safer Together. VC deck v3.1 Open Source Collaborative Security engine Dynamic CrowdSec Smart Money Round deck v1 18/06/2020
  • 2. Why “Cyber defense collaboration is the space race of our generation.” Williams David By 2021, the estimated cost of Cyber criminality is $6 trillion (Cybersecurity ventures) Hackers attack occur every 39 seconds. (University of Maryland) In 2018 hackers stole half a billion personal records (Cybersecurity ventures) The average cost of a data breach is $150 M. (Juniper)
  • 3. Cybersecurity: not (only) a problem of means 3 (800 K records, 57 000 users) ($117 million settlement) (7.5 million accounts stolen) (2.2 bn records) (117 million of email/pass) (83 million of accounts) (57 million of accounts) ($162 million cost) ($171 million global cost) ($500 million robbed) ($252 million cost) These companies had amongst the largest security budgets on earth, yet this did not prevent cyber criminals to succeed. We need another approach The others
  • 4. Not solved, for a reason Time between intrusion and detection, 0day and patch, safe and … sorry. Apps require ports opened to everyone on the firewall, which just let everything … pass. Hackers use stolen servers, free open source tools and their time. They don’t even need 1% of your budget to attack you. Time Unfiltered ports Money Shadow IT (Cloud / SaaS) & Covid19’s “Work at home” policy created an uneven security level across the perimeter. CTOs have no idea where are their assets and how they are cared for. 4 Perimeter
  • 5. The next generation solution 5 Real Time Behavior assessment Reputation assessment Decoupled detection & remediation Crowd intel sharing
  • 6. We use this, because it’s free, real time, fed by community and gives traffic insights. Our parents used this. The Waze of firewalls 6
  • 7. The team “Best ideas can fail, best teams don’t” Low fixed cost, IT spendings scale as we grow, most of computing power used client-side Open Source allow community to partake in the effort No sales, only marketing and durable communication An experimented team 6 persons, 5 on unemployment money, few permanent positions on long term
  • 8. 8 Philippe Humeau CEO Leadership Strategy Networks Experience Marketing Vision Means Business Accountable for Laurent Soubrevilla COO Forecast Tactician Experience Polyvalent Cash efficient Accountable for Delivery Planning Execution Thibault Koechlin CTO Defensive Security Open source savvy Mentoring Lead Dev Offensive security Security Architecture Stability Accountable for A seasoned founders triumvirate 25 years 12 years (The team will introduce itself)
  • 9. Behavior & Reputation based security network Like Waze, more users means better precision Open Source will help enlarge our crowd Previous IP reputation systems (partially) failed because they were not crowd based
  • 10. CrowdSec analyses behavior, not IP:port 10 Legitimate traffic Bruteforce Port scan Web crawlers Exploits XSS/SQLi ... Internet 10.0.0.0/24 12.33.42.155 80/TCP 53/UDP 22/TCP 123.42.56.218 21/TCP Firewall CrowdSec
  • 11. 11 CrowdSec automates your security Logs BAD IP Community SIEM Party Collect data where you want... Ours Yours Community Behavior scenarii detect hack attempts React the way you want, where you want Block Captcha Limit rights or speed 2FA/MFA Share your sightings and get informed BAD IP 1 2 3 4
  • 12. 12 Detect & enforce Logs Logs Logs Internet Cloudified, SaaS & Hosted On Premise Information System BAD IP BAD IP
  • 13. One stone, ten birds 13 ? Aggressive traffic is qualified, discarded & notified to our database
  • 14. Security made simple: just click 14 Our Hub: one place to find all you need One click to enable a scenario
  • 15. Filtering the noise: the Consensus 15 Predictive.Alg Honeypot Crowd Sec TR1 TR1 TR1 TR1 TR2 TR2 TR2 Canaries Crowd Sec Crowd Sec
  • 16. Monetization ”If it’s free, you are the product” Andrew Lewis Open Source + Free + useful = Crowd With thousands of machines reporting the aggressions they face in real time ... … our IP reputation database is the most accurate and real time ever made.
  • 17. 17 1st packet sent by a new IP, is screened by our API (on or offline) API replies “Pass” or “Act” Unknown IPs make queries 1| 2| 3| ? ? IP API: Monetizing the Network effect
  • 18. Our API can be leveraged anywhere 18 Daemons Appliances HTTP servers Apps, codelets, tools Languages & frameworks And let you choose response to enforce
  • 19. But we offer way more to premiums 19 Open Source Component (autoban bad behavior) yes optional optional Sharing signals with community yes optional optional Dashboard Local & Online Customizable includes compliance Extended Consensus including 3rd party blacklists Community Crowdsec Crowdsec Extended remediations (Captcha / 2FA / MFA / Throttle) Activity Typology Filtering (AS, bot, threat type/level, …) Support 1 day best effort 24x5, chat/mail 24x7 phone Features Blacklists received [Phase 2] Artificial Intelligence based filtering yes no Local Community Community Centralized mgmt (Group policies & filtering profiles) Self monitoring of your IPs & am I under attack Private consensus (with/between your machine) Cold log online analyzes / forensic as a service no no Online Crowdsec 24x7 chat/mail API Access 200 K queries included Free Watcher Premium Enterprise API access (Customizable) (Customizable) (Customizable)
  • 20. The Market “Sound strategy starts with having the right goal” Michael Porter Jeremy King, (President - Benchmark Executive Search) “From our optics, if you define cyber as data collection, storage, security, analysis, threat intelligence, operations and dissemination, then the $1 trillion market forecast from Cybersecurity Ventures barely scratches the surface”
  • 21. Why now? 21 Size matters Free Accuracy comes from the number. A small, self financed network cannot match the efficiency of large scale distributed effort, Open source is the answer here. Versatility Community Most of previous attempts focused on Email, domains & geolocation, mainly to fight spam. API 1st is a game changer, let the user decides where, when, what. API-First Open Source Attempts: Symantec, Talos (Cisco), Gossip, Repuscore, IP group REP Fail2ban paved the way. In order to get known beyond just mail admins and reach a larger crowd, let the community know you are free, reputable and easy to use. Aka: What previous IP reputation systems missed ? Aka: Why it doesn’t exist already ?
  • 22. There is no “Waze of Security” 22 HIPS/EDR/Tools Bot mitigation IP Reputation Threat intel CDN/SeCDN None is crowd based None is Open source None is free Clients Data SRC Competitors Partners Clients
  • 23. IT engineers on an infrastructure Sysadmins on servers DevOPS in their deployment environment Developers through a Library or direct API call Local admins on LAN server & workstation Anyone can set it up
  • 24. 24 Next 6 months: go-to Community Personas Techs SRE DevOPS Developers CISO SecOPS/MSSP Vectors 37% 80% 37% 96% 30% Millions 70%
  • 25. How to reach 3.5% conversion rate 25 Get known from targets (with the OS tool, eye candy radar & content marketing) Easy conversion (WW PSP, VAT & taxes handling, support, mail reminders) Smart retention (Constantly offer more features for the price) Easy deployment for all Communication Ignite the need Frictionless premium Always offer more Onboard easily (with assisted setup, Hub, premade configs, support) Strong premium incentive (Offer premium trial, show benefits with smart marketing automation)
  • 26. Open source: a way to become viral 26 Open Source 1| Free (to use, copy, modify) 2| Free of charge 3| 4|Can be embedded No use case limit 5| Must name author 6| Core MIT licence. As free as it can be. Core contributors abandon rights Configurations stays their authors properties Connectors stay their authors properties
  • 27. Open Source is a symbiotic Ecosystem 27 Kind & benevolent feedbacks Viral spreading visibility Potential coders reinforcement Community Scenarii Community Connectors And mainly SIGNALS A free, supported product Expertise (through scenarii) Marketplace (to monetize yours) Auditability, means trust Safe from potential corp issues Safe from model/licence change (we) Give (we) Receive
  • 28. Equity story “Money is usually attracted, not pursued.” Jim Rohn Our previous cyber security corp was sold in 2016 for tens of millions We created several Open source products before Decentralized as of day 1, not affected by Covid crisis. Cloud born & based, no dependency on soft or hardware supply chain nor managed services
  • 29. 29 Smart & Seeders money will be used to: Build our community Strengthen the SaaS Preparing the SaaS and start to monetize is key for A serie. Adoption rate is our sole KPI during this phase. We need a community. Ramp up the signal collection The larger the collection network, the larger the network value & effect A We look for ~300 000 € in this Smart Money round
  • 30. May 2020 12 months agenda 30 June 2020 December 2020 June 2022 1st Open source release Smart Money round API MVP + Seeding Round Predictive consensus January 2020 Incorporation March 2021 A serie + Premium offers sales
  • 31. Successes that leveraged similar pillars 31 Crowd based Open source Freemium SAAS Nginx, Openstack, Elastic Search Zappier, Dropbox, Algolia Waze, Airbnb, Duolingo
  • 32. BORN TO BE The leader of dynamic firewalling At a glance 32 We look for 0.3 M€ ● Open Source editor ● Security, Deep Tech ● SaaS, Low Touch ● Collaborative, NG Firewall ● A global security network
  • 33. Thank you CEO - philippe@crowdsec.net COO - laurent@crowdsec.net Only the crowd can defeat mass scale hacking...