SlideShare a Scribd company logo
What we do


 We offer a secure technology solution for
 seamless connectivity and information sharing
 that works for 100% as software without
 dedicated IT or ISP resources to install and
 use
The Problem
• Secure Information and file sharing is a technical
challenge for users, both private and business
• Cost of securely sharing information remains very
high (VPN infrastructure, IT resources)
• Online theft of identity and information is growing
dramatically
Our Solutions
A. Private Internet use. Encrypted & private Internet
     browsing traffic, GeoIP access bypass.
     Our B2C service: www.privacyprotector.eu
C. GatelessVPN and Secure Share. Seamless connectivity
     for users, direct & encrypted file sharing. It is like VPN with
     “dropbox in house” feature, and platform for other services,
     like chat or remote presentations and online collaboration.
D. Public API. Developers can integrate our network
     technology into their apps through free API for added security
     and online collaboration features.
B2C service: 23K users in first 5 months
Where our users are – network reach
Status figures
• C om m e rcial s tart: 1 5.06.201 1
• O u r firs t p aid P lu s u s e rs cam e in th e firs t m onth of th e s e rvice and growing
• 30K re al u s e rs (M arch , 201 2)
Our Solution - Topology




 Typical VPN architecture:
servers, tokens, IT & ISP resources
        IT managed groups
complicated + expensive
Our Solution - USP


  Traditional VPN Network   GatelessVPN Network

                            Nt
                             o okens
                            N cent lserv
                             o ra ers
                            Na s
                             o ccount
                            N IT or ISPserv needed
                             o ,           ices
                            Esyt use f aerae user
                             a o or v g
                            V hig scaa it
                             ery h l bil y
                            V ua env
                             irt l iromentin minut
                                                 es
                            = S avings of time & cos ts
Our newest feature:
“DirectFiles” for secure sharing
• Simple to use like dropbox
• FAST – no cloud, no upload, instant effect
• Convenient – share files/catalogs through
  email, IM
• Scalable – no file size limits, no data quota
• Secure – tough encryption, dynamic paths,
  no listening points
• Private – invitations only access
How DirectFiles works


Folder or file


                                                                        Recipients emails
                                                                        Secure shared document from sender xvz




                                                                    „sender” shared document „xyz.docx” with You.
                                                                    To access document click on link below:
                                                                    http://shortlink.xy

                                                                    Shared by DirectFiles Service
                                                                    Software required:
                 Invite to secure share:    Set password (option)
                                                                    www.company.com/DirectFiles



                                           Invite by email

                                           Copy secure link




                                            Sent files to Your
                                            Facebook Friends!
Quick comparison
Our Business Model
• Software-only business model based on own patentable technology
• Freemium for B2C (users pay for Premium features)
• License for Business: separate traffic (company network only), legacy systems
 integration
B2B & B2B2C:
• Secure Share: simple like dropbox, yet better for business
• Public API for developers
B2C:
• In progress, viral, runs by itself: 12K users in first 3 months.
• Primary goal: build up PrivacyProtector network
Our Target:
• Small and Medium Business, like Google Apps users:
   • “It is not known how many people use the Google Apps platform,
    although a Google blog post in March 2010 claimed that 25 million people
    had switched to Google Apps.” - Wikipedia
• ISP’s, SI companies, developer community
• Individual Internet users
The Competition
B2C: TOR
   •   Open source – no revenue model
   •   Static, can be tracked back
   •   Relies on exit nodes
   •   Static nodes are high risk for legal responsibilities
   •   Exit nodes are natural listening points


B2B: Regular VPN providers:
   • High cost of purchase and maintenance, limited scalability
   • Requires IT support resources
   • Cannot match our pricing (ExpressVPN: 12,95$ vs. 3$ for our RiccoVPN Plus, and we
    have no central gateway infrastructure costs – with the same will support 100x more
    users)
The Team...

Blazej Marciniak - CEO
Blazej is CEO of eMBT and project leader with 15 years of experience in management, primary responsible for
product development strategy and roadmap. Makes things happen.

Marek Ciesla - VP Sales & Marketing
For 15 years associated with the business of IT industry - co-founder and CEO of MIMIGroup & ALLCinema.
Makes things visible.

Tomasz Widerski - CFO
For 12 years associated the IT industry - co-founder and CEO of several special purpose vehicles, including the
development company Araneo (25 developers).  Makes money flow.

Bartosz Warzecha - Senior Developer
Bartek is a Senior Developer at EMBT Ltd. He is responsible for technical background of the project in the whole
Software development life cycle. Creates things that work.

Krzysztof Koszyka - Developer
Krzysztof is the Software Developer at EMBT Sp z o.o., responsible for designing and developing: client applications,
backoffice. Makes thinks look good.
Questions..?
               Contact:

               Blazej Marciniak, CEO
               bm@gatelessvpn.com
               Tel.   +48 123 994 636
                      +48 602 123 636


               eMBT Limited
               Gromadzka 66
               30-719 Krakow
               Poland
               angel.co/embt-limited-1
               www.gatelessvpn.com

More Related Content

Viewers also liked

Newspaper proposal
Newspaper proposalNewspaper proposal
Newspaper proposalmediawork11
 
Newspaper proposal
Newspaper proposalNewspaper proposal
Newspaper proposalmediawork11
 
Newspaper proposal
Newspaper proposalNewspaper proposal
Newspaper proposalmediawork11
 
Timothy&Kim
Timothy&KimTimothy&Kim
Timothy&Kim
Kim Weemaels
 
Newspaper proposal
Newspaper proposalNewspaper proposal
Newspaper proposalmediawork11
 
chem ppt
chem pptchem ppt
chem ppt
Parth Khatter
 
University of benin gra 15082012
University of benin gra 15082012University of benin gra 15082012
University of benin gra 15082012
Ogundiran Joseph
 
Answers to questions
Answers to questionsAnswers to questions
Answers to questions
Ogundiran Joseph
 
Roles and responsibilities of project stakeholders by pmi
Roles and responsibilities of project stakeholders by pmiRoles and responsibilities of project stakeholders by pmi
Roles and responsibilities of project stakeholders by pmiOgundiran Joseph
 

Viewers also liked (11)

Newspaper proposal
Newspaper proposalNewspaper proposal
Newspaper proposal
 
Newspaper proposal
Newspaper proposalNewspaper proposal
Newspaper proposal
 
Newspaper proposal
Newspaper proposalNewspaper proposal
Newspaper proposal
 
Timothy&Kim
Timothy&KimTimothy&Kim
Timothy&Kim
 
Newspaper proposal
Newspaper proposalNewspaper proposal
Newspaper proposal
 
chem ppt
chem pptchem ppt
chem ppt
 
India history modified
India history modifiedIndia history modified
India history modified
 
University of benin gra 15082012
University of benin gra 15082012University of benin gra 15082012
University of benin gra 15082012
 
Time plan
Time planTime plan
Time plan
 
Answers to questions
Answers to questionsAnswers to questions
Answers to questions
 
Roles and responsibilities of project stakeholders by pmi
Roles and responsibilities of project stakeholders by pmiRoles and responsibilities of project stakeholders by pmi
Roles and responsibilities of project stakeholders by pmi
 

Similar to GatelessVPN technology pitch

Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit Encryption
Ian Ray
 
CubeiTz Brochure
CubeiTz BrochureCubeiTz Brochure
CubeiTz BrochureIan Ray
 
IBM Connections Cloud introduction
IBM Connections Cloud introductionIBM Connections Cloud introduction
IBM Connections Cloud introduction
Maurice Teeuwe
 
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2
 
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration CloudAfkham Azeez
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1changcai
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
Hitachi ID Systems, Inc.
 
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Amazon Web Services
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
Zscaler
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Denodo
 
The KeeeX teaser 2015-12-23-lh-xovoz-tonos
The KeeeX teaser 2015-12-23-lh-xovoz-tonosThe KeeeX teaser 2015-12-23-lh-xovoz-tonos
The KeeeX teaser 2015-12-23-lh-xovoz-tonos
Laurent Henocque
 
Media & Entertainment Solutions via Innovative IT
Media & Entertainment Solutions via Innovative ITMedia & Entertainment Solutions via Innovative IT
Media & Entertainment Solutions via Innovative IT
Botzlab Innovations & Services Pvt Ltd
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Rachel Wandishin
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
AWS Chicago
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...
NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...
NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...
Amazon Web Services
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and Secure
IRJET Journal
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Abhinav Biswas
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
LeMeniz Infotech
 

Similar to GatelessVPN technology pitch (20)

Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit Encryption
 
CubeiTz Brochure
CubeiTz BrochureCubeiTz Brochure
CubeiTz Brochure
 
CHiWAO_for_All.compressed
CHiWAO_for_All.compressedCHiWAO_for_All.compressed
CHiWAO_for_All.compressed
 
IBM Connections Cloud introduction
IBM Connections Cloud introductionIBM Connections Cloud introduction
IBM Connections Cloud introduction
 
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
 
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
The KeeeX teaser 2015-12-23-lh-xovoz-tonos
The KeeeX teaser 2015-12-23-lh-xovoz-tonosThe KeeeX teaser 2015-12-23-lh-xovoz-tonos
The KeeeX teaser 2015-12-23-lh-xovoz-tonos
 
Media & Entertainment Solutions via Innovative IT
Media & Entertainment Solutions via Innovative ITMedia & Entertainment Solutions via Innovative IT
Media & Entertainment Solutions via Innovative IT
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...
NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...
NEW LAUNCH! Amazon FreeRTOS: IoT Operating System for Microcontrollers - IOT2...
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and Secure
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

GatelessVPN technology pitch

  • 1.
  • 2. What we do We offer a secure technology solution for seamless connectivity and information sharing that works for 100% as software without dedicated IT or ISP resources to install and use
  • 3. The Problem • Secure Information and file sharing is a technical challenge for users, both private and business • Cost of securely sharing information remains very high (VPN infrastructure, IT resources) • Online theft of identity and information is growing dramatically
  • 4. Our Solutions A. Private Internet use. Encrypted & private Internet browsing traffic, GeoIP access bypass. Our B2C service: www.privacyprotector.eu C. GatelessVPN and Secure Share. Seamless connectivity for users, direct & encrypted file sharing. It is like VPN with “dropbox in house” feature, and platform for other services, like chat or remote presentations and online collaboration. D. Public API. Developers can integrate our network technology into their apps through free API for added security and online collaboration features.
  • 5. B2C service: 23K users in first 5 months
  • 6. Where our users are – network reach
  • 7. Status figures • C om m e rcial s tart: 1 5.06.201 1 • O u r firs t p aid P lu s u s e rs cam e in th e firs t m onth of th e s e rvice and growing • 30K re al u s e rs (M arch , 201 2)
  • 8. Our Solution - Topology Typical VPN architecture: servers, tokens, IT & ISP resources IT managed groups complicated + expensive
  • 9. Our Solution - USP Traditional VPN Network GatelessVPN Network Nt o okens N cent lserv o ra ers Na s o ccount N IT or ISPserv needed o , ices Esyt use f aerae user a o or v g V hig scaa it ery h l bil y V ua env irt l iromentin minut es = S avings of time & cos ts
  • 10. Our newest feature: “DirectFiles” for secure sharing • Simple to use like dropbox • FAST – no cloud, no upload, instant effect • Convenient – share files/catalogs through email, IM • Scalable – no file size limits, no data quota • Secure – tough encryption, dynamic paths, no listening points • Private – invitations only access
  • 11. How DirectFiles works Folder or file Recipients emails Secure shared document from sender xvz „sender” shared document „xyz.docx” with You. To access document click on link below: http://shortlink.xy Shared by DirectFiles Service Software required: Invite to secure share: Set password (option) www.company.com/DirectFiles Invite by email Copy secure link Sent files to Your Facebook Friends!
  • 13. Our Business Model • Software-only business model based on own patentable technology • Freemium for B2C (users pay for Premium features) • License for Business: separate traffic (company network only), legacy systems integration B2B & B2B2C: • Secure Share: simple like dropbox, yet better for business • Public API for developers B2C: • In progress, viral, runs by itself: 12K users in first 3 months. • Primary goal: build up PrivacyProtector network
  • 14. Our Target: • Small and Medium Business, like Google Apps users: • “It is not known how many people use the Google Apps platform, although a Google blog post in March 2010 claimed that 25 million people had switched to Google Apps.” - Wikipedia • ISP’s, SI companies, developer community • Individual Internet users
  • 15. The Competition B2C: TOR • Open source – no revenue model • Static, can be tracked back • Relies on exit nodes • Static nodes are high risk for legal responsibilities • Exit nodes are natural listening points B2B: Regular VPN providers: • High cost of purchase and maintenance, limited scalability • Requires IT support resources • Cannot match our pricing (ExpressVPN: 12,95$ vs. 3$ for our RiccoVPN Plus, and we have no central gateway infrastructure costs – with the same will support 100x more users)
  • 16. The Team... Blazej Marciniak - CEO Blazej is CEO of eMBT and project leader with 15 years of experience in management, primary responsible for product development strategy and roadmap. Makes things happen. Marek Ciesla - VP Sales & Marketing For 15 years associated with the business of IT industry - co-founder and CEO of MIMIGroup & ALLCinema. Makes things visible. Tomasz Widerski - CFO For 12 years associated the IT industry - co-founder and CEO of several special purpose vehicles, including the development company Araneo (25 developers).  Makes money flow. Bartosz Warzecha - Senior Developer Bartek is a Senior Developer at EMBT Ltd. He is responsible for technical background of the project in the whole Software development life cycle. Creates things that work. Krzysztof Koszyka - Developer Krzysztof is the Software Developer at EMBT Sp z o.o., responsible for designing and developing: client applications, backoffice. Makes thinks look good.
  • 17. Questions..? Contact: Blazej Marciniak, CEO bm@gatelessvpn.com Tel. +48 123 994 636 +48 602 123 636 eMBT Limited Gromadzka 66 30-719 Krakow Poland angel.co/embt-limited-1 www.gatelessvpn.com

Editor's Notes

  1. We can offer to the business and private users unique connectivity services with very high scalability based on P2P network
  2. Companies and individuals needs to set up a private secure network for sharing and collaboration Traditionally it is achieved by software and hardware installed that is maintained by company IT department. This is expensive. Individuals and small companies can not afford VPN infrastructure cost
  3. Companies and individuals needs to set up a private secure network for sharing and collaboration Traditionally it is achieved by software and hardware installed that is maintained by company IT department. This is expensive. Individuals and small companies can not afford VPN infrastructure cost
  4. Scalability tested up to 100k users No central server is required Security checker built in No token or login credentials is required Network autoconfiguration Dynamic traffic management
  5. 5 seconds Global business We are already almoust arount the world
  6. Dynamic traffic, no ability to block
  7. Cloud Based Service is not always best option, with secured powered by PrivacyProtector Network (" friendtofriend " ; " directfile ") application you can share, collaborate and control resources on your PC/MAC/iPhone or Android based Mobile and CE devices without login/password requirements. 
  8. Team is compelete set of skills: We have project manager expert Marketing expert Corporate finance expert Software architect Software developer