1
Wedge Networks
Real-time threat detection
and prevention
for connected autonomous
systems.
INVESTOR PRESENTATION
WHAT WE DO
2
 Real-time solutions for
imperceivable latency
 Autonomous Detection & Prevention
 Embedded Advanced Security for 5G
enabled Networking @ the “Far
Edge”
Threat Detection
Threat Prevention
THE OPPORTUNITY
3
1. Connected Vehicles (CV and CAV)
2. Traffic Management (ITS)
3. Critical Infrastructure/Smart Grids
4. Environmental Monitoring
5. Smart Buildings/Homes
6. Smart Cities
7. Supply Chain Management/Warehousing
8. Industrial, Agriculture and Commercial Management
Source: TechTarget.com, March 30, 2022
Connected and Autonomous Systems
Top 8 Applications and Examples of Connected Systems
Image: ieee.org
6
WHY NOW? The Future is today.
They’re Here!
Connected Autonomous Vehicles (CAV) and Intelligent Transportation Systems (ITS)
© Wedge Networks, Inc., CONFIDENTIAL -5-
→ Integration with BlackBerry IVYTM
• BlackBerry & L-SPARK - the forefront of innovation in connected vehicle technology
• Participate in BlackBerry IVYTM ecosystem
• Next gen CAV use cases leveraging in-vehicle data to improve driver and passenger
experiences
Intelligent Traffic Systems:
→ EU and Canada consortium for CAV and Smart Transportation Safety Services
• 5G-enabled time-critical road safety
• Wedge is Chair of Canadian Cluster and leads cybersecurity efforts
• Making transportation and mobility smarter, more secure, safer and greener
Connected Autonomous Vehicles:
→ Mobility Xlab - Sweden based collaboration hub founded in 2017 to create and develop
innovations with future mobility
• CEVT, Ericsson, Polestar, Veoneer, Volvo Cars, Volvo Group and Zenseact
• Co-create solutions for safe and secure mobility
• CAV’s require real-time security to ensure safety
OUR ADVANTAGE
CAV & ITS First Mover Advantage - Key partners
Why Real-time Threat Prevention is
Critical
6
PROBLEM
Connected
Vehicles
In-Vehicle
Threats
External
Threats
• Large expanding attack surface extending to the “Far Edge”
• Increased attacks against connected systems: 400,000+ new malware/day in 2021
 CAV travelling @ 100KM/hr - 1second delayed response = 28m in unintended distance
MARKET OPPORTUNITY
800M+
7
connected light vehicles
from 2020 to 2035
Mobility Xlab + Wedge
BlackBerry IVY + Wedge
Advanced real-time security
required standard feature of CAV
embedded software
Electrification | Connectivity
Automation
OEMs must include real-time and
network threat detection and prevention
capabilities in their vehicles
$1 per vehicle per month
licensing could be worth ARR:
$5.7B
8
Critical infrastructure protection (CIP)
Worth $154.59 Billion by 2027 | 6.2% CAGR
Source: Fortune Business Insights, July 7, 2022
Large industrial infrastructures - requiring internet connectivity for automated
operations, administration and remote monitoring:
• Smart Cities
• Defense
• Transportation
• Energy systems
• Healthcare
ADDITIONAL USE CASE - Market Opportunity
• Finance
• Telecommunications
• Manufacturing
• Water Systems
• Many more and growing …
Strategic Partnerships & Managed Service Providers (MSPs)
• $200K contracted MRR/bookings; NTM
forecasting $200K to $300K MRR growth
• Target - $1.0M MRR in 24 months
Validated Go-2-Market Strategy
 Patented high performance engines
Provides deep visibility into all network traffic types and enables real-time threat prevention
 Patented machine learning process
Enables automated detection and prevention including never-before-seen threats
 CANLite anomaly detection algorithm
Delivers 99.9% threat detection accuracy with 50% less computing resources, for on device
real-time threat detection and prevention designed for CAV and ITS
 Crowdsourced orchestrated threat intelligence
Enables complete and up-to-date threat identification, exchange and enrichment
 Products are ‘software-defined’
Facilitates integration with software and hardware platforms and new operating environments
from cloud to 5G enabled network edge – including BlackBerry IVY/Zenseact.
10
COMPETITIVE ADVANTAGES
23
Thank you!

Real-time threat detection and prevention for connected autonomous systems

  • 1.
    1 Wedge Networks Real-time threatdetection and prevention for connected autonomous systems. INVESTOR PRESENTATION
  • 2.
    WHAT WE DO 2 Real-time solutions for imperceivable latency  Autonomous Detection & Prevention  Embedded Advanced Security for 5G enabled Networking @ the “Far Edge” Threat Detection Threat Prevention
  • 3.
    THE OPPORTUNITY 3 1. ConnectedVehicles (CV and CAV) 2. Traffic Management (ITS) 3. Critical Infrastructure/Smart Grids 4. Environmental Monitoring 5. Smart Buildings/Homes 6. Smart Cities 7. Supply Chain Management/Warehousing 8. Industrial, Agriculture and Commercial Management Source: TechTarget.com, March 30, 2022 Connected and Autonomous Systems Top 8 Applications and Examples of Connected Systems Image: ieee.org
  • 4.
    6 WHY NOW? TheFuture is today. They’re Here! Connected Autonomous Vehicles (CAV) and Intelligent Transportation Systems (ITS)
  • 5.
    © Wedge Networks,Inc., CONFIDENTIAL -5- → Integration with BlackBerry IVYTM • BlackBerry & L-SPARK - the forefront of innovation in connected vehicle technology • Participate in BlackBerry IVYTM ecosystem • Next gen CAV use cases leveraging in-vehicle data to improve driver and passenger experiences Intelligent Traffic Systems: → EU and Canada consortium for CAV and Smart Transportation Safety Services • 5G-enabled time-critical road safety • Wedge is Chair of Canadian Cluster and leads cybersecurity efforts • Making transportation and mobility smarter, more secure, safer and greener Connected Autonomous Vehicles: → Mobility Xlab - Sweden based collaboration hub founded in 2017 to create and develop innovations with future mobility • CEVT, Ericsson, Polestar, Veoneer, Volvo Cars, Volvo Group and Zenseact • Co-create solutions for safe and secure mobility • CAV’s require real-time security to ensure safety OUR ADVANTAGE CAV & ITS First Mover Advantage - Key partners
  • 6.
    Why Real-time ThreatPrevention is Critical 6 PROBLEM Connected Vehicles In-Vehicle Threats External Threats • Large expanding attack surface extending to the “Far Edge” • Increased attacks against connected systems: 400,000+ new malware/day in 2021  CAV travelling @ 100KM/hr - 1second delayed response = 28m in unintended distance
  • 7.
    MARKET OPPORTUNITY 800M+ 7 connected lightvehicles from 2020 to 2035 Mobility Xlab + Wedge BlackBerry IVY + Wedge Advanced real-time security required standard feature of CAV embedded software Electrification | Connectivity Automation OEMs must include real-time and network threat detection and prevention capabilities in their vehicles $1 per vehicle per month licensing could be worth ARR: $5.7B
  • 8.
    8 Critical infrastructure protection(CIP) Worth $154.59 Billion by 2027 | 6.2% CAGR Source: Fortune Business Insights, July 7, 2022 Large industrial infrastructures - requiring internet connectivity for automated operations, administration and remote monitoring: • Smart Cities • Defense • Transportation • Energy systems • Healthcare ADDITIONAL USE CASE - Market Opportunity • Finance • Telecommunications • Manufacturing • Water Systems • Many more and growing …
  • 9.
    Strategic Partnerships &Managed Service Providers (MSPs) • $200K contracted MRR/bookings; NTM forecasting $200K to $300K MRR growth • Target - $1.0M MRR in 24 months Validated Go-2-Market Strategy
  • 10.
     Patented highperformance engines Provides deep visibility into all network traffic types and enables real-time threat prevention  Patented machine learning process Enables automated detection and prevention including never-before-seen threats  CANLite anomaly detection algorithm Delivers 99.9% threat detection accuracy with 50% less computing resources, for on device real-time threat detection and prevention designed for CAV and ITS  Crowdsourced orchestrated threat intelligence Enables complete and up-to-date threat identification, exchange and enrichment  Products are ‘software-defined’ Facilitates integration with software and hardware platforms and new operating environments from cloud to 5G enabled network edge – including BlackBerry IVY/Zenseact. 10 COMPETITIVE ADVANTAGES
  • 11.

Editor's Notes

  • #6 Read the header Smart City is a network of computers. Each computer can be attacked Goes beyond information security, but to : Equipment safety – light bulb Human safety – autonomous driving cars Why do we have safety issues? It is because in smart city security goes beyond IT to OT