Rama Mail Mission Statement
Rama Mail has the potential and intention, based on its patented platform, completely to stop phishing the costliest and most dangerous portal to malware, the biggest unplugged hole in cybersecurity. Thereby:
• Saving the world from the scourge of phishing;
• Creating a large and very profitable company; and,
• Using the core technologies of Rama Mail to stop many other Internet hackings and scams.
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
Rama Mail the only solution that COMPLETELY prevents phishing
1. RAMA MAIL
Cyber secure Blockchain Solution
I’m the true
sender of that
Email massage
NO
Phishing
Spoofing
Malware
Theft of
Content
2. FORWARD LOOKING STATEMENT
Certain information set forth in this presentation contains “forward-looking information”, including “future oriented
financial information” and “financial outlook”, under applicable securities laws (collectively referred to herein as
forward-looking statements). Except for statements of historical fact, information contained herein constitutes
forward-looking statements and includes, but is not limited to, the (i) projected financial performance of the
Company; (ii) completion of, and the use of proceeds from, the sale of the shares being offered hereunder; (iii)
the expected development of the Company’s business, projects and joint ventures; (iv) execution of the Company’s
vision and growth strategy, including with respect to future M&A activity and global growth; (v) sources and
availability of third-party financing for the Company’s projects; (vi) completion of the Company’s projects that are
currently underway, in development or otherwise under consideration; (vi) renewal of the Company’s current
customer, supplier and other material agreements; and (vii) future liquidity, working capital, and capital
requirements. Forward-looking statements are provided to allow potential investors the opportunity to understand
management’s beliefs and opinions in respect of the future so that they may use such beliefs and opinions as one
factor in evaluating an investment.
These statements are not guarantees of future performance and undue reliance should not be placed on them. Such
forward-looking statements necessarily involve known and unknown risks and uncertainties, which may cause actual
performance and financial results in future periods to differ materially from any projections of future performance
or result expressed or implied by such forward-looking statements.
Although forward-looking statements contained in this presentation are based upon what management of the
Company believes are reasonable assumptions, there can be no assurance that forward-looking statements will
prove to be accurate, as actual results and future events could differ materially from those anticipated in such
statements. The Company undertakes no obligation to update forward-looking statements if circumstances or
management’s estimates or opinions should change except as required by applicable securities laws. The reader is
cautioned not to place undue reliance on forward-looking statements.
3. MISSION STATEMENT
Rama Mail has the potential and intention, based on its patented platform, completely to
stop phishing the costliest and most dangerous portal to malware, the biggest unplugged
hole in cybersecurity. Thereby:
- Saving the world from the scourge of phishing;
- Creating a large and very profitable company; and,
- Using the core technologies of Rama Mail to stop many other Internet hackings and scams.
4. OUTLINE
• The Team
• Phishing and Spoofing Statistics
• Market and Competitive Analysis
• RAMAMAIL Innovative Solution Overview
• RAMAMAIL Prospective Discussion
5. Howard D. Sterling – New York Site CEO
An investment banker, attorney and consultant for high-tech and health-tech, especially
Israeli, companies and invented the concept for Rama Mail and was a co-founder of Alpha
Tau Medical, most effective against solid tumors with no side effects.
Dr. Raphael Ben-Ami – Israel Site CTO
Cloud NFV/SDN and ICT transformation for tier one carriers. Planning, Design, Optimization
and Deployment. NYU and Hebrew University Graduate in mathematics and computer
science. Over ten of research studies with AT&T Bell-Laboratories. Lecturer in NYU Courant
Institute, Tel-Aviv University, and Hebrew University
Dr. Gleuto Serafim – Australian Site COO
Over thirty years in IT systems software and infrastructure architecture. Experienced on the
strategic path for the use of digital technology in vertical solutions such as Digital Banking,
Life Cycle Management, Smart Payments, Risk, and Blockchain, with focus on Cyber Security,
Compliance and Governance on Shared Cryptography and Distributed Frameworks.
Yehuda Leib Munz - Australian Site CIO
Over twenty years of experience as Information Systems Solutions: Technology
Management, ICT Strategy Digital Transformation and Adoption, designing, monitoring and
governing implementation and operations., Cybersecurity and data management,
Transactional security, Wealth management, Payments and distributed ledger (Blockchain),
and custodial systems integration to financial institutions and utilities.
6. EMAIL MESSAGES ATTACKS
What is the primary targeting method of advanced
security attacks?
Email Messages
What is the number one delivery vehicle for malware
attachment?
Email Messages
7. PHISHING AND SPOOFING (PAS) STATISTICS
Cybercrime is growing ever more pervasive - and costly
Annual cost of cybercrime will rise form $3T to $6 Trillion in 2021 (Source: FBI Cybercrime)
Cerdit/Debit
Card for Online
Use
Cerdit/Debit
Card for Online
Use - Clone to
Plastic
Bank Account
Log-In Username
and Password
Existing Paypal
Account
$5
$10
$25
$1
CYBERCRIME PRICE LIST EXAMPLE
8. PHISHING AND SPOOFING (PAS) STATISTICS
Enterprise Attacks Users cannot identifiy
PaS Messages
PaS messages that get
opened
90%
97%
30%
Source: https://phishme.com/ransomware-delivered-97-phishing-emails-end-q3-
2016-supporting-booming-cybercrime-industry/
9. OUTLINE
• The Team
• Phishing and Spoofing Statistics
• Market and Competitive Analysis
• RAMAMAIL Innovative Solution Overview
• RAMAMAIL Prospective Discussion
10. MARKET ANALYSIS - STAGNATION
• Spam blocking system (block messages and
suspicious senders):
• Symantec Messsagelabs
• Microsoft
• Mimecast
• Google Postini
• SpamTitan
• Spamina
• iCritical
• All these systems use some form of heuristics
and rating in their calculation and, a
combination on internal and public databases
for known spammers and threats
• Cisco
• McAfee
• Proofpoint
• Baracuda
• Fusemail
11. EMAIL SECURITY COMPETITIVE ANALYSIS
No feasible solution for phishing and
spoofing
Vendor offers brute force scheme to
scan all emails
Not full proof
Phishing email manage to overcome all scan
efforts
Trusting email data to the cloud
Limited privacy to email content
Leaders
Mimecast
McAfee
Symantec
Cisco
Google
Websense
Proofpoint
Microsoft
12. Vendor Strength Cost Weakness RM Differentiation
MimeCast - Check standard email data points
(headers) on its gateways,
- Message pattern for heuristics
matching
- Integration with other web clients and
message providers, such as Google
Apps.
Starting
from
$1,200
pa.
- Costly for single user or SMBs.
- Relies on same existing technology
used for the last 10 years.
- Requires large data-sets to be
effective.
- End-point DBs are not advance as
Microsoft or Symantec or
SpamTitan.
- No content protection.
Low cost per unit.
Innovative method to
individually sign
messages and
protect content
simultaneously
Microsoft - Exchange Online Protection (EOP),
email filtering component of Office
365, full anti-spoof protection for all
of its customers.
- Now MS uses “Exact Domain Spear
Phishing Protection (Business Email
Compromise) with no SPF, DKIM and
DMARC records published.
- First, search for spoof patterns
- Second, looks for published
authentication records
- Third, looks for sender reputation
- Furth, looks for sender data on local
configuration, internal/public DBs.
Free for
Office 365
and
Exchange
Online
subscribers
- Microsoft Outlook (the provider
own client) has features to
flag/quarantine (red) messages
that reach a high score in the tests
above.
- The client cannot guarantee if a
message is a spoof or not. (event
when sender is also using the same
client.
- SPF, DKIM, and DMARC are very
complex to configure and maintain
- No content protection.
Where the sender
chooses to always
sign their emails by
using biometric
sample, even a
trojan infected client
software will not be
able to spoof the
message without the
RM recipient being
able to identify this.
RM eliminates email
spoofing from self.
13. Vendor Strength Cost Weakness RM Differentiation
Symantec
Corp. -
Email
Security
cloud
- Server and client solution, relies on
heuristics, and its own large
cumulative data set (intelligence
gathering).
- Implemented machine learning to
derive knowledge from vast data
sets, and the common data points
such as message pattern,
authentication (SPF, DKM, DMARC)
and known data matching
- Claims to be able to process
dozens of additional data points
(referring to links, pre and post
delivery, delivery trail, timing of
delivery, location, etc).
Can only be
purchased through
partnerships, which
cost of value
services to the
licensing. Partner
organisations are
then responsible for
deployment and
configuration.
Complex solutions,
geared towards
larger organisations.
- Costly and complex
- Does not provide for self-
configuration out-of-the-box.
- Limited resilience for partial
spoofing (content protection).
- Limited content protection
Cost effective.
Requires simple
configuration (or
auto/self-
configuration) for
and enterprise,
services provider or
for single user.
Protects against full
spoofing equals as
partial spoofing
(whole message, or
just parts of the
content/attachments)
SpamTitan - Easy configuration for cloud
service
Cost effective
stating at $15 per
user pa.
- Very limited anti-phishing
and anti-spoofing
- Limits on products vs pricing
model
- Full features will require
large number of licensing
commitment.
Excellent anti-
phishing, anti-
spoofing and content
protection. Easiest
configuration in
large or small scales
14. Acquisition Email
Security
Policy
Manag
Phishing and
Spoofing
Services
Costs
Strength Weaknesses
Symantec LiveOffice
2012
Yes Yes Scan Email High
Capacity heuristic
High Strong
Capabilities
Acquired product
integration challenge
McAfee
(Intel 2011)
MX Login
2009
Yes Yes Scan Email High
Capacity heuristic
High Strong
Capabilities
Bundled Suites Offering
Mimecast No Yes Yes Scan Email High
Capacity heuristic
High Strong
Innovative
Privacy - Trusting data to
Cloud
Cisco IronPort
2007
Yes Yes Scan Email High
Capacity heuristic
High Strong
support
Not core business
Cloud Privacy Issues
Limited solution
Google Postini
2007
Yes Yes Scan Email High
Capacity heuristic
High Suited for
heterogeneous
environment
Privacy - Trusting data to
Cloud – limited support –
discontinue Postini
Microsoft FrontBridge
2005
Yes Yes Scan Email High
Capacity heuristic
High Strong Support Bundled Suites Offering
Proofpoint No Yes Yes Scan Email High
Capacity heuristic
Fair For MME and
SME
Dependent on 3ed party
integration
Websense No Yes Yes Scan Email High
Capacity heuristic
Fair Leader and
innovative
Dependent on 3ed party
integration
Baracuda No Yes Yes Scan Email High
Capacity heuristic
High Complex filtering
Pipeline
Highly effective
Fuesmail MXSweep
2016
Yes Yes Scan Email High
Capacity heuristic
Fair Depends on
customer input
Privacy - Trusting data to
Cloud
15. DIFFERENTIATION – RAMA MAIL VS. MARKET LEADERS
- Authenticity - SPF (Sender Policy Framework) a
DNS list of servers that are allowed to send mail
for a specific domain
- Integrity - DKIM (DomainKeys Identified Mail)
verifies massages' content are trustworthy. A
stand’ public/private key signature. sender signs
the mail messages with the private key, DKIM
signature is verified by receiver
- Reporting - DMARC (Domain-based Message
Authentication, Reporting and Conformance)
empowers SPF and DKIM by stating a clear policy
which should be used about both the
aforementioned tools
- Authenticity: Generate users’ SBS reference model on BCL
- Integrity
1. EEC or ESP generates SBS reference model, from the SBS token which is
registered in SES
2. When email is sent, it generates a compressed custom TAG and adds to email
header (includes SBS reference model + checksum of the email content + TS)
3. Deposits a cryptographic hash of the current BVS reference + sender’s email
address + TS + checksum of the email content on the BCL
4. If there is no TAG on email, WARNING ALERT message is displayed with the
email
5. EEC and the ESP receives the message and uncompressed the custom TAG from
the email header
6. It runs a checksum of the email content and verifies against the stored checksum
information on the tag, if no match, email gets quarantined
7. EEC or ESP runs cryptographic hash (SBS reference model from TAG + the
sender’s email address + timestamp + checksum of the email content from the TAG)
8. Verifies the existence of the cryptographic hash result on the BCL
9. If no match is found, email gets quarantined
Reporting – Building SDN Measures
16. RAMA MAIL REFERENCE ARCHITECTURE
Sending
Email Client (EC)
Recipient
Email Client (EC)
Sending
Email System
Provider (ESP)
Recipient
Email System
Provider (ESP)
Sending
Secure Email
System (SES)
Recipient
Secure Email
System (SES)
Network
100 105
110
120
130
150
160
140
SDN
SDNSDN
SDN
170
17. RAMAMAIL APPLICANT IDENTITY MANAGEMENT
Applicant
Registration
Small Biometric Sample (SBS)
Sample hash placed on Blockchain Leger
Multi factor verification certifiers
hash placed on Blockchain Leger
Permit/Deny
Registration Algorithm
19. OUTLINE
• The Team
• Phishing and Spoofing Statistics
• Market and Competitive Analysis
• RAMAMAIL Innovative Solution Overview
• RAMAMAIL Prospective Discussion
20. IP CTRL FRM
IP CTRL FRM
IP CTRL FRM
IP CTRL FRM
SDN CTRL
CTRL
CTRL
CTRL
Email
Originator
Email
Recipient
Email
Sending
System
Email
Receiving
System
Email
Relay
System
Email
Relay
System
Email Handling System
Rama
Mail
System
Rama
Mail
System
Rama Mail System
Distributed Ledger Technology
SDN NETWORK CONTROL