SlideShare a Scribd company logo
Red HeRRing 100
            Pr ese ntAtIon




   © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
mission
Protect the worlD’s Pc fIles
     « Driving two Blue Ocean Strategy components »


         1
   The simultaneous                                                         Not to out-perform
                                                                                                     2
pursuit of differentiation                                                   the competition
     and low cost                                                      (DLP, ERM, IRM, Encryption)
                                                                        but capture a new market
                                                                          space thereby making
                                                                        the competition irrelevant
                                                                              to our mission




               © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
company oveRview
Next GeNeratioN Security Software compaNy
                      •
               privately held
                      •
      headquartered iN New york, Ny
                      •
         officeS iN Ny aNd loNdoN
                      •
         early cuStomerS iNclude:




        © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
indoRse management team



Rob maRano         nick paleRmo                        daniel poHl                               casey laRose          cHRis wHidden
 founDer & ceo      coo fInAnce                      vP s/w engIneerIng                               vP of sAles        vP of ProDuct
                    & oPerAtIons                                                                                          mAnAgement
  Experienced                                           Created & sold                         Security Technology
 Entrepreneur &       Ex-CEO                        RailSaver to Wandrian                      Enterprise Sales Star    “Make it happen”
Computer Science    Amalgamated                                                                                           Tech Wizard
 thought leader      Bank of NY




                        © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
pRoblem statement
« Regulated & Confidential Data in Files Is Getting Lost and Stolen »
                                                                      •   privately held
                                                                      •   cuStomer iNformatioN
                                                                      •   employee iNformatioN
                                                                      •   BuSiNeSS iNformatioN
                                                                      •   fiNaNcialS


    security                                                          •   trade SecretS


      risk!
                                                                      •   iNtellectual property
                                                                      •   m&a
                                                                      •   techNoloGy iNfraStructure

                                                                      • iNterNal SaleS/marketiNG
                                                                      • pr
                                                                      • paid reSearch




                  © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
indoRse solution


  next generation software
 that protects and secures
a file not at the Device level
  but in the File itself and
provides intelligence on who
   has accessed the file.




                        © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
maRket oppoRtunity

        1.2billion                                       PCs sending files




        500million                                                     Office installed




        585million                                                      files created yearly by the Fortune 50




         millions created
         These are hard to protect
                                                                                               yearly and growing...




  © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
How is indoRse unique?
                    • we are file protectioN Smes

                    • Next generation solution protects
                         hard to assure files, e.g., PDF,
                         CAD, and images.

                    • Our software traces document use
                         within and outside of your network
                         and reports back to you

                    • Our solution requires no software
                         or agents installed on the User’s PC




    © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
indoRse softwaRe pRoducts
                      • fiNd aNd taG
                           Discovers, Tags sensitive documents

                      • moNitor aNd track
                           Monitors and detects access, use, misuse,
                           inside or outside your network

                      • protect aNd coNtrol
                           Dynamically, automatically applies the
                           right policy at the right time
                           Unique visible or invisible Watermark

                      • coSt-effective file trackiNG
                           Track anywhere, anytime, with no endpoint software
                           needed. Real-time risk radar. Leverages open
                           standards; takes advantage of the Cloud




      © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
key benefits foR customeRs
                                                   • Avoid Business Impact of
                                                        Data Loss or Theft

                                                   • Improves Audit and Compliance
                                                        Capability

                                                   • No Desktop Agents means lower
                                                        cost to implement and operate

                                                   • Transparent to End Users means
                                                        rapid deployment

                                                   • Technology Neutral, Supports
                                                        Open Standards




      © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
in doRse call-Home
                                                                                               tm




   demonstRation




  © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
indoRse call-Home
                                              • Avoid Business Impact of
                                                   Data Loss or Theft
                                              • InDorse Call-Home tracks and re-
                                                   ports document location and usage
                                                   across any IP network
                                              • Runs as SaaS or on-premise
                                              • Tracks granular file activities
                                                   > File opens by location
                                                   > Real-time file usage tracking

                                                   > Portal based dashboard reporting



                                              • Can be integrated into other front or
                                                   back end systems via InDorse API




 © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
tRack unautHoRized
 document access

                                                                               unauthorized
                                                                                    user
                                                                                  acquires
                                                                                    file




  © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
tRack unautHoRized
                    document access
                                                                                                             unauthorized
                                                                                                               user
                                                                                                             opens file




 User’s password
must be entered
to open file
each time. This
password must
either be given
or acquired.




                     © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
tRack unautHoRized
      document access

                                                                                            unauthorized
                                                                                               user
                                                                                              opens
                                                                                             call-Home
                                                                                                file




Print
functionality
disabled.




                © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
tRack unautHoRized
                document access

unauthorized
  user
 opens
call-Home                               uSaGe iNveNtory > real-time
   file
                     time                subscRibeR                             file                          action                location

                     16:30                      subApp                    research.pdf                    sent Dl link         sub.app.work.com

                     17:00                       uid_1                    research.pdf                    Downloaded               Pc1.work.com

                     18:00                       uid_1                    research.pdf                        opened               Pc1.work.com

                     20:00                       uid_1                    research.pdf                        opened               dhcp1.isp1.net

                     23:32                       uid_1                    research.pdf                        opened           hoax.cyberia.net




                                                                                                                  reports the
                                                                                                                encoded file was
                                                                                                                    opened
                                                                                                                  at location.




                 © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
indoRse call-Home
                                                                    REPORTINg ExAMPLE
CaLL-hOme                                                                                                         tOp 10 By FILe name                                                                                                                                                              Ip aDDReSS / DOmaInS
file Name                   opeNS                                                                                 ip addreSS                                                                 clieNt Name                                                                                           domaiNS           opeNS
health & safety notice        1,549                                                                               65.212.19.8                                                                            Brown 82                                                                                  Brown.com              246
evacuation Procedure            846                                                                               16.433.12.1                                                                           creech 76                                                                                  hestletine.com         128
clinical trail h1n1             762                                                                               10.192.01.246                                                                        Partner 168                                                                                 nhs.gov.uK             126
Annual earnings release         542                                                                               69.999.97.333                                                                     Adv Agency 67                                                                                  mYlocal.gov.com         92
Product X-02 launch             321                                                                               75.337.19.28                                                                           Peers 59                                                                                  usA3.net                88
new Price list                   92                                                                               85.18.926.14                                                                        smartco 27                                                                                   smartco                 72
harassment Policy                15                                                                               59.221.28.7                                                                              terra 15                                                                                Astra                   11
new hire manual                  10                                                                               173.84.19.2                                                                             Astra 14                                                                                 AirlineX.com             9
Bid Proposal for client A         8                                                                               28.129.151.3                                                                           realtor 8                                                                                 Portal.com               8
Bid Proposal for client B         2                                                                                                                                                                                                                                                                carrier-Z.com            2

                                                    50


                                                    40
                                   document opens




                                                    30


                                                    20


                                                    10


                                                     0
                                                               m                      m                      m                      m                      m                      m                      m                      m                      m                      m                      m
                                                          0a                     0a                     0a                     0a                     0a                     0a                     0a                     0a                     0a                     0a                     0a
                                                       0:0                    0:0                    0:0                    0:0                    0:0                    0:0                    0:0                    0:0                    0:0                    0:0                    0:0
                                             1      2:0                   12:0                   12:0                   12:0                   12:0                   12:0                   12:0                   12:0                   12:0                   12:0                   12:0
                                         009                          009                    009                    009                    009                    009                    009                    009                    009                    009                    009
                                2/2                                4/2                    6/2                    8/2                 10/
                                                                                                                                        2
                                                                                                                                                            12/
                                                                                                                                                               2
                                                                                                                                                                                   14/
                                                                                                                                                                                      2
                                                                                                                                                                                                          16/
                                                                                                                                                                                                             2
                                                                                                                                                                                                                                 18/
                                                                                                                                                                                                                                    2
                                                                                                                                                                                                                                                        20/
                                                                                                                                                                                                                                                           2
                                                                                                                                                                                                                                                                               22/
                                                                                                                                                                                                                                                                                  2
                             12/                             12/                    12/                    12/                    12/                    12/                    12/                    12/                    12/                    12/                    12/
                                                                                                                                                   document opens




                                                               © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
tHank you!
                         roBert maraNo
                              CEO
                  rob.marano@indorse-tech.com
                        +1.646.495.0966




© InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng

More Related Content

What's hot

Dragonsden 2012
Dragonsden 2012Dragonsden 2012
Dragonsden 2012
Samuel Mann
 
Resources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationResources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationOregon Law Practice Management
 
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...Black Duck by Synopsys
 
2013 14 Interactive Guide to Integrated Anti-Counterfeiting Solutions
2013 14 Interactive Guide to Integrated Anti-Counterfeiting Solutions2013 14 Interactive Guide to Integrated Anti-Counterfeiting Solutions
2013 14 Interactive Guide to Integrated Anti-Counterfeiting Solutions
ACED Security
 
Secure Mde Brochure Doc
Secure Mde Brochure DocSecure Mde Brochure Doc
Secure Mde Brochure Docsuzette1
 
Bcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidisBcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidiszakmackraken
 
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise SecurityCIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CloudIDSummit
 
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)Intrusion Detection System (IDS)
Intrusion Detection System (IDS)
HCL Technologies
 
CEBIT 2013 - Workshop Presentation
CEBIT 2013 - Workshop PresentationCEBIT 2013 - Workshop Presentation
CEBIT 2013 - Workshop Presentation
TI Safe
 
2012 phind corp english
2012 phind corp english2012 phind corp english
2012 phind corp englishChia-Yu Kuo
 
Nuance Biometrics Institute Presentation 27th June 2012
Nuance Biometrics Institute Presentation 27th June 2012Nuance Biometrics Institute Presentation 27th June 2012
Nuance Biometrics Institute Presentation 27th June 2012
Seb Reeve
 
Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Seema Sheth-Voss
 

What's hot (13)

Dragonsden 2012
Dragonsden 2012Dragonsden 2012
Dragonsden 2012
 
Resources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationResources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client Information
 
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...
 
2013 14 Interactive Guide to Integrated Anti-Counterfeiting Solutions
2013 14 Interactive Guide to Integrated Anti-Counterfeiting Solutions2013 14 Interactive Guide to Integrated Anti-Counterfeiting Solutions
2013 14 Interactive Guide to Integrated Anti-Counterfeiting Solutions
 
Secure Mde Brochure Doc
Secure Mde Brochure DocSecure Mde Brochure Doc
Secure Mde Brochure Doc
 
Bcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidisBcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidis
 
Online DFS
Online DFSOnline DFS
Online DFS
 
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise SecurityCIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
 
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)Intrusion Detection System (IDS)
Intrusion Detection System (IDS)
 
CEBIT 2013 - Workshop Presentation
CEBIT 2013 - Workshop PresentationCEBIT 2013 - Workshop Presentation
CEBIT 2013 - Workshop Presentation
 
2012 phind corp english
2012 phind corp english2012 phind corp english
2012 phind corp english
 
Nuance Biometrics Institute Presentation 27th June 2012
Nuance Biometrics Institute Presentation 27th June 2012Nuance Biometrics Institute Presentation 27th June 2012
Nuance Biometrics Institute Presentation 27th June 2012
 
Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012
 

Viewers also liked

Dummy's guide to Virtual Reality - Top 5 basic things you should know about VR
Dummy's guide to Virtual Reality - Top 5 basic things you should know about VRDummy's guide to Virtual Reality - Top 5 basic things you should know about VR
Dummy's guide to Virtual Reality - Top 5 basic things you should know about VR
Victoria Robertson
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
Steffi Keran Rani J
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual Reality
Steffi Keran Rani J
 
Introduction to Virtual Reality lecture 2015
Introduction to Virtual Reality lecture 2015Introduction to Virtual Reality lecture 2015
Introduction to Virtual Reality lecture 2015
Mikhail Fominykh
 
Virtual Reality in Belgium
Virtual Reality in BelgiumVirtual Reality in Belgium
Virtual Reality in Belgium
Software in Brussels
 
Introducing virtual reality
Introducing  virtual  realityIntroducing  virtual  reality
Introducing virtual realitySagar Suvarnakar
 
Virtual reality
Virtual realityVirtual reality
Virtual reality
martinasthubert
 
Virtual reality Presentation
Virtual reality PresentationVirtual reality Presentation
Virtual reality PresentationAnand Akshay
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual Reality
100614065martins
 
Virtual Reality-Seminar presentation
Virtual Reality-Seminar  presentationVirtual Reality-Seminar  presentation
Virtual Reality-Seminar presentation
Shreyansh Vijay Singh
 

Viewers also liked (10)

Dummy's guide to Virtual Reality - Top 5 basic things you should know about VR
Dummy's guide to Virtual Reality - Top 5 basic things you should know about VRDummy's guide to Virtual Reality - Top 5 basic things you should know about VR
Dummy's guide to Virtual Reality - Top 5 basic things you should know about VR
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual Reality
 
Introduction to Virtual Reality lecture 2015
Introduction to Virtual Reality lecture 2015Introduction to Virtual Reality lecture 2015
Introduction to Virtual Reality lecture 2015
 
Virtual Reality in Belgium
Virtual Reality in BelgiumVirtual Reality in Belgium
Virtual Reality in Belgium
 
Introducing virtual reality
Introducing  virtual  realityIntroducing  virtual  reality
Introducing virtual reality
 
Virtual reality
Virtual realityVirtual reality
Virtual reality
 
Virtual reality Presentation
Virtual reality PresentationVirtual reality Presentation
Virtual reality Presentation
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual Reality
 
Virtual Reality-Seminar presentation
Virtual Reality-Seminar  presentationVirtual Reality-Seminar  presentation
Virtual Reality-Seminar presentation
 

Similar to InDorse Tech Red Herring 100 Presentation Final

InfoSecurity Magazine - Data Loss Prevention
InfoSecurity Magazine - Data Loss PreventionInfoSecurity Magazine - Data Loss Prevention
InfoSecurity Magazine - Data Loss Prevention
Simon Perry
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
Jason Clark
 
Information Security - The Missing Elements
Information Security - The Missing ElementsInformation Security - The Missing Elements
Information Security - The Missing Elements
ahmed_vr
 
Numerals In Legal Or Financial Documents
Numerals In Legal Or Financial DocumentsNumerals In Legal Or Financial Documents
Numerals In Legal Or Financial Documentslegalinfo
 
Legal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu FentawLegal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu Fentawlegalservices
 
Glonetex ATM & Kiosk Self Service
Glonetex ATM & Kiosk Self ServiceGlonetex ATM & Kiosk Self Service
Glonetex ATM & Kiosk Self Service
Carleton Bedell
 
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic AnalysisGigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Grant Swanson
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify PillarEd Wong
 
How We Can Help
How We Can HelpHow We Can Help
How We Can Help
David Rice
 
On Demand BI
On Demand BIOn Demand BI
On Demand BI
Darren Cunningham
 
Waterfall Security Solutions Overview Q1 2012
Waterfall Security Solutions   Overview Q1 2012Waterfall Security Solutions   Overview Q1 2012
Waterfall Security Solutions Overview Q1 2012henkpieper
 
HP Storage Works -Clemes Esser
HP Storage Works -Clemes EsserHP Storage Works -Clemes Esser
HP Storage Works -Clemes EsserHPDutchWorld
 
The Magic of Symbiotic Security
The Magic of Symbiotic SecurityThe Magic of Symbiotic Security
The Magic of Symbiotic Security
Denim Group
 
RW Keynote IDM2009
RW Keynote IDM2009RW Keynote IDM2009
RW Keynote IDM2009
racingsnake
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security SuiteCharles McNeil
 
EJGates infotech Private Limited- Profile
EJGates infotech Private Limited- ProfileEJGates infotech Private Limited- Profile
EJGates infotech Private Limited- Profile
Vipin Kumar
 
MDM - Oracle Site Hub 101
MDM - Oracle Site Hub 101MDM - Oracle Site Hub 101
MDM - Oracle Site Hub 101
Rhapsody Technologies, Inc.
 
Sql injection to enterprise Owned - K.K. Mookhey
Sql injection to enterprise Owned  - K.K. Mookhey Sql injection to enterprise Owned  - K.K. Mookhey
Sql injection to enterprise Owned - K.K. Mookhey OWASP-Qatar Chapter
 
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim MayValue Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
GovCloud Network
 
Enterprise Apps Future State
Enterprise Apps Future StateEnterprise Apps Future State
Enterprise Apps Future StateBruce MacVarish
 

Similar to InDorse Tech Red Herring 100 Presentation Final (20)

InfoSecurity Magazine - Data Loss Prevention
InfoSecurity Magazine - Data Loss PreventionInfoSecurity Magazine - Data Loss Prevention
InfoSecurity Magazine - Data Loss Prevention
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Information Security - The Missing Elements
Information Security - The Missing ElementsInformation Security - The Missing Elements
Information Security - The Missing Elements
 
Numerals In Legal Or Financial Documents
Numerals In Legal Or Financial DocumentsNumerals In Legal Or Financial Documents
Numerals In Legal Or Financial Documents
 
Legal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu FentawLegal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu Fentaw
 
Glonetex ATM & Kiosk Self Service
Glonetex ATM & Kiosk Self ServiceGlonetex ATM & Kiosk Self Service
Glonetex ATM & Kiosk Self Service
 
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic AnalysisGigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify Pillar
 
How We Can Help
How We Can HelpHow We Can Help
How We Can Help
 
On Demand BI
On Demand BIOn Demand BI
On Demand BI
 
Waterfall Security Solutions Overview Q1 2012
Waterfall Security Solutions   Overview Q1 2012Waterfall Security Solutions   Overview Q1 2012
Waterfall Security Solutions Overview Q1 2012
 
HP Storage Works -Clemes Esser
HP Storage Works -Clemes EsserHP Storage Works -Clemes Esser
HP Storage Works -Clemes Esser
 
The Magic of Symbiotic Security
The Magic of Symbiotic SecurityThe Magic of Symbiotic Security
The Magic of Symbiotic Security
 
RW Keynote IDM2009
RW Keynote IDM2009RW Keynote IDM2009
RW Keynote IDM2009
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security Suite
 
EJGates infotech Private Limited- Profile
EJGates infotech Private Limited- ProfileEJGates infotech Private Limited- Profile
EJGates infotech Private Limited- Profile
 
MDM - Oracle Site Hub 101
MDM - Oracle Site Hub 101MDM - Oracle Site Hub 101
MDM - Oracle Site Hub 101
 
Sql injection to enterprise Owned - K.K. Mookhey
Sql injection to enterprise Owned  - K.K. Mookhey Sql injection to enterprise Owned  - K.K. Mookhey
Sql injection to enterprise Owned - K.K. Mookhey
 
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim MayValue Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
 
Enterprise Apps Future State
Enterprise Apps Future StateEnterprise Apps Future State
Enterprise Apps Future State
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

InDorse Tech Red Herring 100 Presentation Final

  • 1. Red HeRRing 100 Pr ese ntAtIon © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 2. mission Protect the worlD’s Pc fIles « Driving two Blue Ocean Strategy components » 1 The simultaneous Not to out-perform 2 pursuit of differentiation the competition and low cost (DLP, ERM, IRM, Encryption) but capture a new market space thereby making the competition irrelevant to our mission © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 3. company oveRview Next GeNeratioN Security Software compaNy • privately held • headquartered iN New york, Ny • officeS iN Ny aNd loNdoN • early cuStomerS iNclude: © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 4. indoRse management team Rob maRano nick paleRmo daniel poHl casey laRose cHRis wHidden founDer & ceo coo fInAnce vP s/w engIneerIng vP of sAles vP of ProDuct & oPerAtIons mAnAgement Experienced Created & sold Security Technology Entrepreneur & Ex-CEO RailSaver to Wandrian Enterprise Sales Star “Make it happen” Computer Science Amalgamated Tech Wizard thought leader Bank of NY © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 5. pRoblem statement « Regulated & Confidential Data in Files Is Getting Lost and Stolen » • privately held • cuStomer iNformatioN • employee iNformatioN • BuSiNeSS iNformatioN • fiNaNcialS security • trade SecretS risk! • iNtellectual property • m&a • techNoloGy iNfraStructure • iNterNal SaleS/marketiNG • pr • paid reSearch © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 6. indoRse solution next generation software that protects and secures a file not at the Device level but in the File itself and provides intelligence on who has accessed the file. © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 7. maRket oppoRtunity 1.2billion PCs sending files 500million Office installed 585million files created yearly by the Fortune 50 millions created These are hard to protect yearly and growing... © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 8. How is indoRse unique? • we are file protectioN Smes • Next generation solution protects hard to assure files, e.g., PDF, CAD, and images. • Our software traces document use within and outside of your network and reports back to you • Our solution requires no software or agents installed on the User’s PC © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 9. indoRse softwaRe pRoducts • fiNd aNd taG Discovers, Tags sensitive documents • moNitor aNd track Monitors and detects access, use, misuse, inside or outside your network • protect aNd coNtrol Dynamically, automatically applies the right policy at the right time Unique visible or invisible Watermark • coSt-effective file trackiNG Track anywhere, anytime, with no endpoint software needed. Real-time risk radar. Leverages open standards; takes advantage of the Cloud © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 10. key benefits foR customeRs • Avoid Business Impact of Data Loss or Theft • Improves Audit and Compliance Capability • No Desktop Agents means lower cost to implement and operate • Transparent to End Users means rapid deployment • Technology Neutral, Supports Open Standards © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 11. in doRse call-Home tm demonstRation © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 12. indoRse call-Home • Avoid Business Impact of Data Loss or Theft • InDorse Call-Home tracks and re- ports document location and usage across any IP network • Runs as SaaS or on-premise • Tracks granular file activities > File opens by location > Real-time file usage tracking > Portal based dashboard reporting • Can be integrated into other front or back end systems via InDorse API © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 13. tRack unautHoRized document access unauthorized user acquires file © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 14. tRack unautHoRized document access unauthorized user opens file User’s password must be entered to open file each time. This password must either be given or acquired. © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 15. tRack unautHoRized document access unauthorized user opens call-Home file Print functionality disabled. © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 16. tRack unautHoRized document access unauthorized user opens call-Home uSaGe iNveNtory > real-time file time subscRibeR file action location 16:30 subApp research.pdf sent Dl link sub.app.work.com 17:00 uid_1 research.pdf Downloaded Pc1.work.com 18:00 uid_1 research.pdf opened Pc1.work.com 20:00 uid_1 research.pdf opened dhcp1.isp1.net 23:32 uid_1 research.pdf opened hoax.cyberia.net reports the encoded file was opened at location. © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 17. indoRse call-Home REPORTINg ExAMPLE CaLL-hOme tOp 10 By FILe name Ip aDDReSS / DOmaInS file Name opeNS ip addreSS clieNt Name domaiNS opeNS health & safety notice 1,549 65.212.19.8 Brown 82 Brown.com 246 evacuation Procedure 846 16.433.12.1 creech 76 hestletine.com 128 clinical trail h1n1 762 10.192.01.246 Partner 168 nhs.gov.uK 126 Annual earnings release 542 69.999.97.333 Adv Agency 67 mYlocal.gov.com 92 Product X-02 launch 321 75.337.19.28 Peers 59 usA3.net 88 new Price list 92 85.18.926.14 smartco 27 smartco 72 harassment Policy 15 59.221.28.7 terra 15 Astra 11 new hire manual 10 173.84.19.2 Astra 14 AirlineX.com 9 Bid Proposal for client A 8 28.129.151.3 realtor 8 Portal.com 8 Bid Proposal for client B 2 carrier-Z.com 2 50 40 document opens 30 20 10 0 m m m m m m m m m m m 0a 0a 0a 0a 0a 0a 0a 0a 0a 0a 0a 0:0 0:0 0:0 0:0 0:0 0:0 0:0 0:0 0:0 0:0 0:0 1 2:0 12:0 12:0 12:0 12:0 12:0 12:0 12:0 12:0 12:0 12:0 009 009 009 009 009 009 009 009 009 009 009 2/2 4/2 6/2 8/2 10/ 2 12/ 2 14/ 2 16/ 2 18/ 2 20/ 2 22/ 2 12/ 12/ 12/ 12/ 12/ 12/ 12/ 12/ 12/ 12/ 12/ document opens © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng
  • 18. tHank you! roBert maraNo CEO rob.marano@indorse-tech.com +1.646.495.0966 © InDorse technologIes, Inc. 2006-2010. All rIghts reserveD. InternAtIonAl PAtents PenDIng