SlideShare a Scribd company logo
1 of 17
1©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.
INVESTOR PRESENTATION
January 2015
NASDAQ: CYRN
2
Safe Harbor and Forward Looking Statements
This presentation contains forward-looking statements, including projections about our business, within the meaning of
Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. For example, statements in
the future tense, and statements including words such as "expect," "plan," "estimate," "anticipate," or "believe" are forward-
looking statements. These statements are based on information available to us at the time of the presentation; we assume no
obligation to update any of them. The statements in this presentation are not guarantees of future performance and actual
results could differ materially from our current expectations as a result of numerous factors, including business conditions and
growth or deterioration in the Internet market, commerce and the general economy, both domestic as well as international;
fewer than expected new-partner relationships; competitive factors, including pricing pressures; technological developments,
and products offered by competitors; the ability of our OEM partners to successfully penetrate markets with products
integrated with CYREN technology; a slower than expected acceptance rate for our newer product offerings; availability of
qualified staff; and technological difficulties and resource constraints encountered in developing new products, as well as those
risks described in the text of this presentation and the company's Annual Reports on Form 20-F and reports on Form 6-K, which
are available through www.sec.gov.
© 2015 CYREN. All rights reserved. CYREN, Recurrent Pattern Detection, RPD, Zero-Hour and GlobalView are trademarks, and
Authentium, Command Antivirus and Command AntiMalware are registered trademarks of CYREN. U.S. Patent No. 6,330,590
is owned by CYREN. All other marks are the property of their respective companies.
3
CYREN Snapshot
 U.S. Headquarters / / Offices in
Europe, Middle East and APAC
 200 employees
 Worldwide direct sales and channel
distribution
 19 data centers worldwide / / fault-
tolerant network
 24x7x365 support
 GlobalView™ Cloud Platform
processing 12 billion transactions
per day from 550+ million endpoints
 200+ global partners in 190
countries
Company Facts Revenue
$3.9
$7.2
$11.3
$14.1 $15.2
$18.2
$23.0$24.1
$32.8
2005 2006 2007 2008 2009 2010 2011 2012 2013
($ in millions)
Revenue (Non-GAAP)(1)
Representative Global Partners
Source: Company filings.
(1) The difference between non-GAAP and GAAP revenue is derived from the fact that
deferred revenues consolidated from acquired companies are recorded based on fair
value rather than book value for GAAP purpose.
44
Business Overview
CYREN brings the next generation of
cloud-based security technology and services
to global businesses by leveraging its
real-time global threat data.
5
Today’s Security Landscape Challenge
There are only two kinds of companies. Those who know they have been breached and those who don’t.
IT Security Challenges
 Increasing use of cloud-based apps
reduces IT visibility and control of
enterprise data.
 25% of all corporate data traffic will flow
directly from mobile devices to the cloud
by 2018.
 Mobile breaches will shift to tablets and
smartphones from workstations by 2017.
The need for genuine threat intelligence and reputation scoring
that is cloud-focused, mobile-oriented has never been greater.
(1) Source: Gartner The Growing Importance of Cloud Access Security Brokers (May 2012)
6
30.
2%
37.
1%
32.
7%
40.
1%
31.1%
28.
8%
Shift to the Cloud
Messaging Security(1)
Mobile and
Roaming Users
Enterprise
Messaging
Cloud-Based
Security
Web Browsing
2013: $800 million 2017: $1 billion
(1) Source: Gartner Cloud-Based Security Services Market, Worldwide 2014
Web Security(1)
Email and web filtering have experienced
more rapid adoption of cloud-based solutions
relative to other security solutions
40.
7%
41.
0%
18.
4%
41.
7%
35.
1%
23.
3%
2013: $390 million 2017: $810 million
2013-2017 CAGR of 7.1% for SaaS Platform
2013-2017 CAGR of 21.2% for SaaS Platform
Software SaaS
Enterprise
7
CYREN GlobalView™ Cloud Platform Solutions
Global threat analysis, behavioral, and dynamic reputation scoring is only available via tools that use the Cloud.
Cloud-driven security solution enabling true
full content inspection, including SSL traffic
to better protect employees from rapidly
evolving cyber threats
Cyber security products and solutions
responsive to advanced malware and other
cyber attacks targeting the data center that
routinely bypass conventional signature-
based defenses
Use cloud-based solutions to arm your organization with the intelligence needed to prevent and handle breaches.
Cyber Threat Protection
WebSecurity
8
Secure browsing from any device, anywhere
 A total solution for roaming users, smartphones and tablets – including BYOD
 An intuitive customer experience – easy to set up and manage
HOW IT WORKSBENEFITS
 Partners build their own
value-added services
 Supports any sales
ecosystem
 Leverages CYREN’s
leading detection for
superior protection
 Low-cost robust cloud
infrastructure
WebSecurity
9
 Capture and interrogate all things internet and
classify by reputation
 Block the delivery of zero-day malware
 Contain infections by blocking communication
to Command and Control
 Block exfiltration of data performed via HTTP/S
communication
OUTBOUND THREATS Botnet C&C Traffic, Malicious URL / IP, Spam
Virus, Adware, Spyware, Malicious Scripts, Emails  INBOUND THREATS
Threat
Prevention
Threat
Detection
Threat
Containment
Incident
Response
Advanced threat protection and analytics secures corporate assets
Cyber Threat Protection
10
Go-To-Market Strategy
Highly efficient, multi-pronged go-to-market strategy across solutions and target customers
Distributors / VARsVendors / OEMs ISPs / Telcos Direct Sales
 Global Team
‒ Americas
‒ EMEA
‒ APAC
 Inside Sales
‒ Lead generation
‒ Follow the sun
 Market focus
‒ Large enterprises
‒ SMEs
 Delivering embedded
and platform solutions
 Sales overlay model
 Market focus
‒ Large enterprises
‒ SMEs
‒ SMBs
 Delivering embedded
solution
 Market focus
‒ SMEs
‒ SMBs
‒ Consumer
 Delivering embedded
and platform solutions
 Market focus
‒ Large enterprises
‒ SMEs
‒ SMBs
‒ Consumer
11
Vendor Landscape
1212
Financial Overview
Protect your company’s most
critical information assets on any device,
any location, all the time
13
Financial Highlights
Upside Opportunity with
Platform Business
Highly
Predictable
Business
Model
Profitable
Embedded
Business
Impressive
Gross
Margins
Solid
Historical
Revenue
Growth
 Eight consecutive years of consistent non-GAAP revenue
growth, representing a 30.5% CAGR for the period
 Solid balance sheet with $13.1 million in cash (Sept 30, 2014)
 Embedded global OEM customers delivers stable revenue base
 Subscription model produces highly visible revenue
 Embedded business delivers >80% gross margins
 Strong cash / margin generation from incremental revenue due
to scalable business model
 R&D for new solutions is largely funded from cash flows of
embedded business
 Powerful solutions utilizing proprietary embedded data assets
and scalable infrastructure are well positioned for considerable
market adoption
14
Revenue (Non-GAAP)(1)
Source: Company filings.
(1) The difference between non-GAAP and GAAP revenue is derived from the fact that deferred revenues consolidated
from acquired companies are recorded based on fair value rather than book value for GAAP purpose.
$7.9 $8.1 $8.0 $8.2 $8.1 $8.3
$7.8
1Q13A 2Q13A 3Q13A 4Q13A 1Q14A 2Q14A 3Q14A
$3.9
$7.2
$11.3
$14.1
$15.2
$18.2
$23.0
$24.1
$32.8
2005 2006 2007 2008 2009 2010 2011 2012 2013
($ in millions)($ in millions)
15
Balance Sheet Highlights
Balance Sheet Item June 30, 2014 September 30, 2014
Cash $3,104 $13,094
Current Assets $9,397 $18,596
Credit Line $5,301 $5,347
Deferred Revenue $5,738 $5,646
Current Liabilities $16,993 $16,434
Shareholder’s Equity $24,988 $33,430
Shares Outstanding 26,589 31,364
All numbers in thousands (1,000s)
16
Investment Highlights
Large TAM with
Strong
Tailwinds
Unique Data
Asset
Compelling
Business
Model
Proven, Scaled
Platform
Significant
Upside
Opportunity
 $35 billion total addressable market in 2018(1)
 Major shift in IT, as cloud and mobile expand, opening significant opportunity
for emerging vendors
 Proprietary detection technology
 Scalable cloud-based global infrastructure
 Over 12 billion transactions per day, analyzed in real-time
 200+ global partners; leveraging traffic data from numerous notable security
providers
 Recurring revenue business model
 Gross margins of approximately 75%
 Solid balance sheet with $13.1 million in cash (Sept 30, 2014)
 Significant growth opportunity in platform solutions: WebSecurity and APT
 Profitable embedded business funding emerging solutions
(1) Source: Gartner Information Security, Worldwide Forecast, 2012-2018 (3Q14 Update)
17©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.
Thank you.
www.cyren.com

More Related Content

What's hot

Buy Recommendation for Palo Alto Networks
Buy Recommendation for Palo Alto NetworksBuy Recommendation for Palo Alto Networks
Buy Recommendation for Palo Alto NetworksZsofia Szurovszki
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Jeremiah Grossman
 
The CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market ReviewThe CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market Reviewresultsig
 
WhiteHat Security 8th Website Security Statistics Report
WhiteHat Security 8th Website Security Statistics ReportWhiteHat Security 8th Website Security Statistics Report
WhiteHat Security 8th Website Security Statistics ReportJeremiah Grossman
 
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Kevin Duffey
 
Symantec Corporate Presentation
Symantec Corporate PresentationSymantec Corporate Presentation
Symantec Corporate PresentationInvestorSymantec
 
Nemaura Medical Presentation September 2020
Nemaura Medical Presentation September 2020Nemaura Medical Presentation September 2020
Nemaura Medical Presentation September 2020RedChip Companies, Inc.
 
2020 Accel Euroscape: Decacorn Unleashed
2020 Accel Euroscape: Decacorn Unleashed2020 Accel Euroscape: Decacorn Unleashed
2020 Accel Euroscape: Decacorn UnleashedPhilippe Botteri
 
End Point Security Market Middle East, Middle East Cyber Security industry re...
End Point Security Market Middle East, Middle East Cyber Security industry re...End Point Security Market Middle East, Middle East Cyber Security industry re...
End Point Security Market Middle East, Middle East Cyber Security industry re...Ashish Chauhan
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence reportSimon Clements FIRP DipRP
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
5 Quest Fake News Survey Results June 2020
5 Quest Fake News Survey Results June 20205 Quest Fake News Survey Results June 2020
5 Quest Fake News Survey Results June 2020ZIGRAM
 
Cyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial ServicesCyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial ServicesKevin Duffey
 
2019 Accel Euroscape: The Rise of Europe
2019 Accel Euroscape: The Rise of Europe2019 Accel Euroscape: The Rise of Europe
2019 Accel Euroscape: The Rise of EuropePhilippe Botteri
 
Digital Marketing and Publishing Services in Nigeria
Digital Marketing and Publishing Services in NigeriaDigital Marketing and Publishing Services in Nigeria
Digital Marketing and Publishing Services in NigeriaGbenga Adeleke
 

What's hot (20)

Flcr investor deck august 2018_final
Flcr investor deck august 2018_finalFlcr investor deck august 2018_final
Flcr investor deck august 2018_final
 
Buy Recommendation for Palo Alto Networks
Buy Recommendation for Palo Alto NetworksBuy Recommendation for Palo Alto Networks
Buy Recommendation for Palo Alto Networks
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016
 
The CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market ReviewThe CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market Review
 
WhiteHat Security 8th Website Security Statistics Report
WhiteHat Security 8th Website Security Statistics ReportWhiteHat Security 8th Website Security Statistics Report
WhiteHat Security 8th Website Security Statistics Report
 
Draganfly Deck September 2021
Draganfly Deck September 2021Draganfly Deck September 2021
Draganfly Deck September 2021
 
Bessemer's State of the Cloud 2021
Bessemer's State of the Cloud 2021Bessemer's State of the Cloud 2021
Bessemer's State of the Cloud 2021
 
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
 
Symantec Corporate Presentation
Symantec Corporate PresentationSymantec Corporate Presentation
Symantec Corporate Presentation
 
Nemaura Medical Presentation September 2020
Nemaura Medical Presentation September 2020Nemaura Medical Presentation September 2020
Nemaura Medical Presentation September 2020
 
2020 Accel Euroscape: Decacorn Unleashed
2020 Accel Euroscape: Decacorn Unleashed2020 Accel Euroscape: Decacorn Unleashed
2020 Accel Euroscape: Decacorn Unleashed
 
End Point Security Market Middle East, Middle East Cyber Security industry re...
End Point Security Market Middle East, Middle East Cyber Security industry re...End Point Security Market Middle East, Middle East Cyber Security industry re...
End Point Security Market Middle East, Middle East Cyber Security industry re...
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
5 Quest Fake News Survey Results June 2020
5 Quest Fake News Survey Results June 20205 Quest Fake News Survey Results June 2020
5 Quest Fake News Survey Results June 2020
 
Cyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial ServicesCyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial Services
 
Bessemer's 2016 State of the Cloud
Bessemer's 2016 State of the Cloud Bessemer's 2016 State of the Cloud
Bessemer's 2016 State of the Cloud
 
Draganfly Deck October 2021
Draganfly Deck October 2021Draganfly Deck October 2021
Draganfly Deck October 2021
 
2019 Accel Euroscape: The Rise of Europe
2019 Accel Euroscape: The Rise of Europe2019 Accel Euroscape: The Rise of Europe
2019 Accel Euroscape: The Rise of Europe
 
Digital Marketing and Publishing Services in Nigeria
Digital Marketing and Publishing Services in NigeriaDigital Marketing and Publishing Services in Nigeria
Digital Marketing and Publishing Services in Nigeria
 

Viewers also liked

IDO Security Investor Presentation
IDO Security Investor PresentationIDO Security Investor Presentation
IDO Security Investor PresentationIDO SECURITY, INC.
 
How to make an investor pitch deck that really works
How to make an investor pitch deck that really worksHow to make an investor pitch deck that really works
How to make an investor pitch deck that really worksDeck Rooster
 
Celp investor presentation march 2017 final
Celp investor presentation march 2017 finalCelp investor presentation march 2017 final
Celp investor presentation march 2017 finalCypressEnergy
 
Pitch Deck Templates for Startups
Pitch Deck Templates for StartupsPitch Deck Templates for Startups
Pitch Deck Templates for StartupsNextView Ventures
 
Investor Presentation Template
Investor Presentation TemplateInvestor Presentation Template
Investor Presentation TemplateShai Goldman
 
The investor presentation we used to raise 2 million dollars
The investor presentation we used to raise 2 million dollarsThe investor presentation we used to raise 2 million dollars
The investor presentation we used to raise 2 million dollarsMikael Cho
 
The slide deck we used to raise half a million dollars
The slide deck we used to raise half a million dollarsThe slide deck we used to raise half a million dollars
The slide deck we used to raise half a million dollarsBuffer
 

Viewers also liked (8)

IDO Security Investor Presentation
IDO Security Investor PresentationIDO Security Investor Presentation
IDO Security Investor Presentation
 
How to make an investor pitch deck that really works
How to make an investor pitch deck that really worksHow to make an investor pitch deck that really works
How to make an investor pitch deck that really works
 
Celp investor presentation march 2017 final
Celp investor presentation march 2017 finalCelp investor presentation march 2017 final
Celp investor presentation march 2017 final
 
Pitch Deck Templates for Startups
Pitch Deck Templates for StartupsPitch Deck Templates for Startups
Pitch Deck Templates for Startups
 
Investor Presentation Template
Investor Presentation TemplateInvestor Presentation Template
Investor Presentation Template
 
Build a Better Entrepreneur Pitch Deck
Build a Better Entrepreneur Pitch DeckBuild a Better Entrepreneur Pitch Deck
Build a Better Entrepreneur Pitch Deck
 
The investor presentation we used to raise 2 million dollars
The investor presentation we used to raise 2 million dollarsThe investor presentation we used to raise 2 million dollars
The investor presentation we used to raise 2 million dollars
 
The slide deck we used to raise half a million dollars
The slide deck we used to raise half a million dollarsThe slide deck we used to raise half a million dollars
The slide deck we used to raise half a million dollars
 

Similar to CYREN Investor Presentation - January, 2015

DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 DatadogDDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 DatadogRaviNeppalli
 
September 2015 vasco investor presention final
September 2015 vasco investor presention finalSeptember 2015 vasco investor presention final
September 2015 vasco investor presention finalrodrida1
 
October 2015 Vasco investor presention
October 2015 Vasco investor presentionOctober 2015 Vasco investor presention
October 2015 Vasco investor presentionrodrida1
 
Rocket Internet Overview 2014
Rocket Internet Overview 2014Rocket Internet Overview 2014
Rocket Internet Overview 2014Joerg Strotmann
 
Dnpi ir deck 9 15-10
Dnpi ir deck 9 15-10Dnpi ir deck 9 15-10
Dnpi ir deck 9 15-10EHodges
 
DecisionPoint Systems, Inc. (OTCBB:DNPI) Corporate Presentation
DecisionPoint Systems, Inc. (OTCBB:DNPI) Corporate PresentationDecisionPoint Systems, Inc. (OTCBB:DNPI) Corporate Presentation
DecisionPoint Systems, Inc. (OTCBB:DNPI) Corporate PresentationEHodges
 
DecisionPoint Systems, Inc. (DNPI) Corporate Presentation
DecisionPoint Systems, Inc. (DNPI) Corporate PresentationDecisionPoint Systems, Inc. (DNPI) Corporate Presentation
DecisionPoint Systems, Inc. (DNPI) Corporate PresentationEHodges
 
Euclideon ils
Euclideon ilsEuclideon ils
Euclideon ilsDaleWood9
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016InvestorSymantec
 
Symantec investor presentation march 2016
Symantec investor presentation march 2016Symantec investor presentation march 2016
Symantec investor presentation march 2016InvestorSymantec
 
Symantec investor presentation march 2016
Symantec investor presentation march 2016 Symantec investor presentation march 2016
Symantec investor presentation march 2016 InvestorSymantec
 
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020State of the OpenCloud Report 2020
State of the OpenCloud Report 2020Dharmesh Thakker
 
State of the OpenCloud 2020
State of the OpenCloud 2020State of the OpenCloud 2020
State of the OpenCloud 2020Battery Ventures
 
Battery Ventures State of the OpenCloud Report 2022
Battery Ventures State of the OpenCloud Report 2022Battery Ventures State of the OpenCloud Report 2022
Battery Ventures State of the OpenCloud Report 2022Battery Ventures
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Burton Lee
 
Symantec corporate presentation 3 28-14
Symantec corporate presentation 3 28-14Symantec corporate presentation 3 28-14
Symantec corporate presentation 3 28-14InvestorSymantec
 
Live ramp analystdaypresotemplate-fina_lv3
Live ramp analystdaypresotemplate-fina_lv3Live ramp analystdaypresotemplate-fina_lv3
Live ramp analystdaypresotemplate-fina_lv3acxiom2016ir
 
SOBRSafe (OTC: SOBR) Investor Presentation June, 2020
SOBRSafe (OTC: SOBR) Investor Presentation June, 2020SOBRSafe (OTC: SOBR) Investor Presentation June, 2020
SOBRSafe (OTC: SOBR) Investor Presentation June, 2020RedChip Companies, Inc.
 

Similar to CYREN Investor Presentation - January, 2015 (20)

DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 DatadogDDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
 
September 2015 vasco investor presention final
September 2015 vasco investor presention finalSeptember 2015 vasco investor presention final
September 2015 vasco investor presention final
 
October 2015 Vasco investor presention
October 2015 Vasco investor presentionOctober 2015 Vasco investor presention
October 2015 Vasco investor presention
 
Rocket Internet Overview 2014
Rocket Internet Overview 2014Rocket Internet Overview 2014
Rocket Internet Overview 2014
 
Learning from Industry Cloud Leaders
Learning from Industry Cloud LeadersLearning from Industry Cloud Leaders
Learning from Industry Cloud Leaders
 
Dnpi ir deck 9 15-10
Dnpi ir deck 9 15-10Dnpi ir deck 9 15-10
Dnpi ir deck 9 15-10
 
DecisionPoint Systems, Inc. (OTCBB:DNPI) Corporate Presentation
DecisionPoint Systems, Inc. (OTCBB:DNPI) Corporate PresentationDecisionPoint Systems, Inc. (OTCBB:DNPI) Corporate Presentation
DecisionPoint Systems, Inc. (OTCBB:DNPI) Corporate Presentation
 
DecisionPoint Systems, Inc. (DNPI) Corporate Presentation
DecisionPoint Systems, Inc. (DNPI) Corporate PresentationDecisionPoint Systems, Inc. (DNPI) Corporate Presentation
DecisionPoint Systems, Inc. (DNPI) Corporate Presentation
 
Euclideon ils
Euclideon ilsEuclideon ils
Euclideon ils
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
 
Application Software - M&A Summary
Application Software - M&A SummaryApplication Software - M&A Summary
Application Software - M&A Summary
 
Symantec investor presentation march 2016
Symantec investor presentation march 2016Symantec investor presentation march 2016
Symantec investor presentation march 2016
 
Symantec investor presentation march 2016
Symantec investor presentation march 2016 Symantec investor presentation march 2016
Symantec investor presentation march 2016
 
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020State of the OpenCloud Report 2020
State of the OpenCloud Report 2020
 
State of the OpenCloud 2020
State of the OpenCloud 2020State of the OpenCloud 2020
State of the OpenCloud 2020
 
Battery Ventures State of the OpenCloud Report 2022
Battery Ventures State of the OpenCloud Report 2022Battery Ventures State of the OpenCloud Report 2022
Battery Ventures State of the OpenCloud Report 2022
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
 
Symantec corporate presentation 3 28-14
Symantec corporate presentation 3 28-14Symantec corporate presentation 3 28-14
Symantec corporate presentation 3 28-14
 
Live ramp analystdaypresotemplate-fina_lv3
Live ramp analystdaypresotemplate-fina_lv3Live ramp analystdaypresotemplate-fina_lv3
Live ramp analystdaypresotemplate-fina_lv3
 
SOBRSafe (OTC: SOBR) Investor Presentation June, 2020
SOBRSafe (OTC: SOBR) Investor Presentation June, 2020SOBRSafe (OTC: SOBR) Investor Presentation June, 2020
SOBRSafe (OTC: SOBR) Investor Presentation June, 2020
 

More from Cyren, Inc

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowCyren, Inc
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportCyren, Inc
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareCyren, Inc
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksCyren, Inc
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingCyren, Inc
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyCyren, Inc
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatCyren, Inc
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeCyren, Inc
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteCyren, Inc
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksCyren, Inc
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportCyren, Inc
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportCyren, Inc
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareCyren, Inc
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportCyren, Inc
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 PresentationCyren, Inc
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookCyren, Inc
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 

More from Cyren, Inc (20)

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to know
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomware
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array works
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking survey
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threat
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrime
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsolete
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 

Recently uploaded

Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsar
Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In AmritsarCall Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsar
Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsaronly4webmaster01
 
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our EscortsVIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 
Sustainability Leadership, April 26 2024
Sustainability Leadership, April 26 2024Sustainability Leadership, April 26 2024
Sustainability Leadership, April 26 2024TeckResourcesLtd
 
Nicola Mining Inc. Corporate Presentation April 2024
Nicola Mining Inc. Corporate Presentation April 2024Nicola Mining Inc. Corporate Presentation April 2024
Nicola Mining Inc. Corporate Presentation April 2024nicola_mining
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Abids high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Abids high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Abids high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Abids high-profile Call Girladitipandeya
 
Cyberagent_For New Investors_EN_240424.pdf
Cyberagent_For New Investors_EN_240424.pdfCyberagent_For New Investors_EN_240424.pdf
Cyberagent_For New Investors_EN_240424.pdfCyberAgent, Inc.
 
High Profile Call Girls Kolkata Gayatri 🤌 8250192130 🚀 Vip Call Girls Kolkata
High Profile Call Girls Kolkata Gayatri 🤌  8250192130 🚀 Vip Call Girls KolkataHigh Profile Call Girls Kolkata Gayatri 🤌  8250192130 🚀 Vip Call Girls Kolkata
High Profile Call Girls Kolkata Gayatri 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual serviceanilsa9823
 
Call Girl Kolkata Sia 🤌 8250192130 🚀 Vip Call Girls Kolkata
Call Girl Kolkata Sia 🤌  8250192130 🚀 Vip Call Girls KolkataCall Girl Kolkata Sia 🤌  8250192130 🚀 Vip Call Girls Kolkata
Call Girl Kolkata Sia 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Miyapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Miyapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Miyapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Miyapur high-profile Call Girladitipandeya
 
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书Fir La
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...aditipandeya
 

Recently uploaded (20)

Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsar
Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In AmritsarCall Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsar
Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsar
 
Call Girls 🫤 Mukherjee Nagar ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ...
Call Girls 🫤 Mukherjee Nagar ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ...Call Girls 🫤 Mukherjee Nagar ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ...
Call Girls 🫤 Mukherjee Nagar ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ...
 
Call Girls Service Green Park @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Green Park @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Green Park @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Green Park @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our EscortsVIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
 
Sustainability Leadership, April 26 2024
Sustainability Leadership, April 26 2024Sustainability Leadership, April 26 2024
Sustainability Leadership, April 26 2024
 
Vip Call Girls Vasant Kunj ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Vasant Kunj ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Vasant Kunj ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Vasant Kunj ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Nicola Mining Inc. Corporate Presentation April 2024
Nicola Mining Inc. Corporate Presentation April 2024Nicola Mining Inc. Corporate Presentation April 2024
Nicola Mining Inc. Corporate Presentation April 2024
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Abids high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Abids high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Abids high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Abids high-profile Call Girl
 
Call Girls In South Delhi 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Delhi 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Delhi 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Delhi 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Cyberagent_For New Investors_EN_240424.pdf
Cyberagent_For New Investors_EN_240424.pdfCyberagent_For New Investors_EN_240424.pdf
Cyberagent_For New Investors_EN_240424.pdf
 
High Profile Call Girls Kolkata Gayatri 🤌 8250192130 🚀 Vip Call Girls Kolkata
High Profile Call Girls Kolkata Gayatri 🤌  8250192130 🚀 Vip Call Girls KolkataHigh Profile Call Girls Kolkata Gayatri 🤌  8250192130 🚀 Vip Call Girls Kolkata
High Profile Call Girls Kolkata Gayatri 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
 
Call Girl Kolkata Sia 🤌 8250192130 🚀 Vip Call Girls Kolkata
Call Girl Kolkata Sia 🤌  8250192130 🚀 Vip Call Girls KolkataCall Girl Kolkata Sia 🤌  8250192130 🚀 Vip Call Girls Kolkata
Call Girl Kolkata Sia 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls 🫤 Mahipalpur ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ENJOY
Call Girls 🫤 Mahipalpur ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ENJOYCall Girls 🫤 Mahipalpur ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ENJOY
Call Girls 🫤 Mahipalpur ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ENJOY
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Miyapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Miyapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Miyapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Miyapur high-profile Call Girl
 
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...
 
Model Call Girl in Udyog Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Udyog Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Udyog Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Udyog Vihar Delhi reach out to us at 🔝9953056974🔝
 
Russian Call Girls Rohini Sector 22 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 22 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Rohini Sector 22 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 22 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
 
Call Girls In Vasant Kunj 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Vasant Kunj 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Vasant Kunj 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Vasant Kunj 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 

CYREN Investor Presentation - January, 2015

  • 1. 1©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. INVESTOR PRESENTATION January 2015 NASDAQ: CYRN
  • 2. 2 Safe Harbor and Forward Looking Statements This presentation contains forward-looking statements, including projections about our business, within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. For example, statements in the future tense, and statements including words such as "expect," "plan," "estimate," "anticipate," or "believe" are forward- looking statements. These statements are based on information available to us at the time of the presentation; we assume no obligation to update any of them. The statements in this presentation are not guarantees of future performance and actual results could differ materially from our current expectations as a result of numerous factors, including business conditions and growth or deterioration in the Internet market, commerce and the general economy, both domestic as well as international; fewer than expected new-partner relationships; competitive factors, including pricing pressures; technological developments, and products offered by competitors; the ability of our OEM partners to successfully penetrate markets with products integrated with CYREN technology; a slower than expected acceptance rate for our newer product offerings; availability of qualified staff; and technological difficulties and resource constraints encountered in developing new products, as well as those risks described in the text of this presentation and the company's Annual Reports on Form 20-F and reports on Form 6-K, which are available through www.sec.gov. © 2015 CYREN. All rights reserved. CYREN, Recurrent Pattern Detection, RPD, Zero-Hour and GlobalView are trademarks, and Authentium, Command Antivirus and Command AntiMalware are registered trademarks of CYREN. U.S. Patent No. 6,330,590 is owned by CYREN. All other marks are the property of their respective companies.
  • 3. 3 CYREN Snapshot  U.S. Headquarters / / Offices in Europe, Middle East and APAC  200 employees  Worldwide direct sales and channel distribution  19 data centers worldwide / / fault- tolerant network  24x7x365 support  GlobalView™ Cloud Platform processing 12 billion transactions per day from 550+ million endpoints  200+ global partners in 190 countries Company Facts Revenue $3.9 $7.2 $11.3 $14.1 $15.2 $18.2 $23.0$24.1 $32.8 2005 2006 2007 2008 2009 2010 2011 2012 2013 ($ in millions) Revenue (Non-GAAP)(1) Representative Global Partners Source: Company filings. (1) The difference between non-GAAP and GAAP revenue is derived from the fact that deferred revenues consolidated from acquired companies are recorded based on fair value rather than book value for GAAP purpose.
  • 4. 44 Business Overview CYREN brings the next generation of cloud-based security technology and services to global businesses by leveraging its real-time global threat data.
  • 5. 5 Today’s Security Landscape Challenge There are only two kinds of companies. Those who know they have been breached and those who don’t. IT Security Challenges  Increasing use of cloud-based apps reduces IT visibility and control of enterprise data.  25% of all corporate data traffic will flow directly from mobile devices to the cloud by 2018.  Mobile breaches will shift to tablets and smartphones from workstations by 2017. The need for genuine threat intelligence and reputation scoring that is cloud-focused, mobile-oriented has never been greater. (1) Source: Gartner The Growing Importance of Cloud Access Security Brokers (May 2012)
  • 6. 6 30. 2% 37. 1% 32. 7% 40. 1% 31.1% 28. 8% Shift to the Cloud Messaging Security(1) Mobile and Roaming Users Enterprise Messaging Cloud-Based Security Web Browsing 2013: $800 million 2017: $1 billion (1) Source: Gartner Cloud-Based Security Services Market, Worldwide 2014 Web Security(1) Email and web filtering have experienced more rapid adoption of cloud-based solutions relative to other security solutions 40. 7% 41. 0% 18. 4% 41. 7% 35. 1% 23. 3% 2013: $390 million 2017: $810 million 2013-2017 CAGR of 7.1% for SaaS Platform 2013-2017 CAGR of 21.2% for SaaS Platform Software SaaS Enterprise
  • 7. 7 CYREN GlobalView™ Cloud Platform Solutions Global threat analysis, behavioral, and dynamic reputation scoring is only available via tools that use the Cloud. Cloud-driven security solution enabling true full content inspection, including SSL traffic to better protect employees from rapidly evolving cyber threats Cyber security products and solutions responsive to advanced malware and other cyber attacks targeting the data center that routinely bypass conventional signature- based defenses Use cloud-based solutions to arm your organization with the intelligence needed to prevent and handle breaches. Cyber Threat Protection WebSecurity
  • 8. 8 Secure browsing from any device, anywhere  A total solution for roaming users, smartphones and tablets – including BYOD  An intuitive customer experience – easy to set up and manage HOW IT WORKSBENEFITS  Partners build their own value-added services  Supports any sales ecosystem  Leverages CYREN’s leading detection for superior protection  Low-cost robust cloud infrastructure WebSecurity
  • 9. 9  Capture and interrogate all things internet and classify by reputation  Block the delivery of zero-day malware  Contain infections by blocking communication to Command and Control  Block exfiltration of data performed via HTTP/S communication OUTBOUND THREATS Botnet C&C Traffic, Malicious URL / IP, Spam Virus, Adware, Spyware, Malicious Scripts, Emails  INBOUND THREATS Threat Prevention Threat Detection Threat Containment Incident Response Advanced threat protection and analytics secures corporate assets Cyber Threat Protection
  • 10. 10 Go-To-Market Strategy Highly efficient, multi-pronged go-to-market strategy across solutions and target customers Distributors / VARsVendors / OEMs ISPs / Telcos Direct Sales  Global Team ‒ Americas ‒ EMEA ‒ APAC  Inside Sales ‒ Lead generation ‒ Follow the sun  Market focus ‒ Large enterprises ‒ SMEs  Delivering embedded and platform solutions  Sales overlay model  Market focus ‒ Large enterprises ‒ SMEs ‒ SMBs  Delivering embedded solution  Market focus ‒ SMEs ‒ SMBs ‒ Consumer  Delivering embedded and platform solutions  Market focus ‒ Large enterprises ‒ SMEs ‒ SMBs ‒ Consumer
  • 12. 1212 Financial Overview Protect your company’s most critical information assets on any device, any location, all the time
  • 13. 13 Financial Highlights Upside Opportunity with Platform Business Highly Predictable Business Model Profitable Embedded Business Impressive Gross Margins Solid Historical Revenue Growth  Eight consecutive years of consistent non-GAAP revenue growth, representing a 30.5% CAGR for the period  Solid balance sheet with $13.1 million in cash (Sept 30, 2014)  Embedded global OEM customers delivers stable revenue base  Subscription model produces highly visible revenue  Embedded business delivers >80% gross margins  Strong cash / margin generation from incremental revenue due to scalable business model  R&D for new solutions is largely funded from cash flows of embedded business  Powerful solutions utilizing proprietary embedded data assets and scalable infrastructure are well positioned for considerable market adoption
  • 14. 14 Revenue (Non-GAAP)(1) Source: Company filings. (1) The difference between non-GAAP and GAAP revenue is derived from the fact that deferred revenues consolidated from acquired companies are recorded based on fair value rather than book value for GAAP purpose. $7.9 $8.1 $8.0 $8.2 $8.1 $8.3 $7.8 1Q13A 2Q13A 3Q13A 4Q13A 1Q14A 2Q14A 3Q14A $3.9 $7.2 $11.3 $14.1 $15.2 $18.2 $23.0 $24.1 $32.8 2005 2006 2007 2008 2009 2010 2011 2012 2013 ($ in millions)($ in millions)
  • 15. 15 Balance Sheet Highlights Balance Sheet Item June 30, 2014 September 30, 2014 Cash $3,104 $13,094 Current Assets $9,397 $18,596 Credit Line $5,301 $5,347 Deferred Revenue $5,738 $5,646 Current Liabilities $16,993 $16,434 Shareholder’s Equity $24,988 $33,430 Shares Outstanding 26,589 31,364 All numbers in thousands (1,000s)
  • 16. 16 Investment Highlights Large TAM with Strong Tailwinds Unique Data Asset Compelling Business Model Proven, Scaled Platform Significant Upside Opportunity  $35 billion total addressable market in 2018(1)  Major shift in IT, as cloud and mobile expand, opening significant opportunity for emerging vendors  Proprietary detection technology  Scalable cloud-based global infrastructure  Over 12 billion transactions per day, analyzed in real-time  200+ global partners; leveraging traffic data from numerous notable security providers  Recurring revenue business model  Gross margins of approximately 75%  Solid balance sheet with $13.1 million in cash (Sept 30, 2014)  Significant growth opportunity in platform solutions: WebSecurity and APT  Profitable embedded business funding emerging solutions (1) Source: Gartner Information Security, Worldwide Forecast, 2012-2018 (3Q14 Update)
  • 17. 17©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. Thank you. www.cyren.com