SlideShare a Scribd company logo
Index
Date | April 2016
TECTECO Security Systems
Residential solutions
Enterprise solutions
Other applications
Timeline
Is a technology company who has developed and patented an innovative system for
securing wired and wireless local area networks.
With over half the world’s population sharing personal and private data across the Internet ,
the security and confidentiality of the network has become a pivotal function on which the
network of all networks should be based.
Worldwide spending on information security will reach USD 79,000 million in 2015 (Gartner
2014), with a global cost of cybercrime estimated at approximately USD 400,000 million
(McAfee, 2014).
TECTECOs intellectual property is offering new, revolutionary technology that guarantees
the integrity of communications whilst providing maximum security and granularity to local
area networks.
Introduction
TECTECO Security Systems
Date | April 2016
SDHCP UNAS
Built in device - user
authentication
GLOBAL SOLUTION
Network element and method
for improved access to
communications networks
SNAAP
Proactive & reactive security
Secure DHCP service
Team
Date | April 2016
Computer Science engineer, serial
entrepreneur and venture capitalist with more
than 15 years leading development teams and
tech companies.
Miguel Cobián
CEO
Master in Architecture and urbanism, and
bachelor's degree in Philosophical
Anthropology with more than 40 years of
profesional experience. He has been member
of the board at TALGO for more than a
decade.
Luis María de Palacio
Chairman
Entrepreneur and Chief Operations Officer with
more than 20 years of experience in
telecomunications. He has worked for most of
the leader companies in the industry.
Security and telecomunication networks expert
with more than 17 years of experience as
project manager in companies such as HP,
INDRA and Telefónica.
Alfonso Marcos
Operations
José Antonio Enrique
Technology
Electrical engineer with strong knowledge in
telecommunications, electronic, embedded
and computer engineering. He has worked the
past 5 years at companies such as Alcatel-
Lucent or Hitachi Data Systems.
Computer science engineer and masters
degree in telecomunication networks. He has
worked as security and telecomunication
networks expert in HP and Telefónica.
Adrián Moreno
Development
Diego Trapero
Security
Residential Solutions
Date | April 2016
Super secure
Enterprise security at your hands
Super easy
Mobile app configuration
Super powerful
Latest & high end hardware
T1 Home security device
TECTECO's Home Security Device T1-HSD creates the most secure
WIFI network for your home. Our patented (pending) technology
allows us to assure it!
Enterprise WIFI security for everyone
Date | April 2016
Despite of all other WIFI access points, the
T1 is secure out of the box.
The application of the latest technologies
on top of our patented security systems
makes the T1 the only WIFI access point
that cannot be hacked.
Secure
Better than the enterprise
solutions
Friendly and intuitive interface in a well
known environment: your cell phone.
We have rethought the whole relationship
with your access point (if any!) and
created an mobile app that makes you
feel in power.
It is, overall, plug and play. Forget about
the installation and configuration dramas.
Easy to use
For everyone in the family
We have built the best access point with
the latest high end hardware paired with
the best software.
It reaches way beyond any other
domestic access point with transmission
rates that you have never experienced.
And it is designed to protect your IoT
“things” aswell.
Powerfull
A WIFI that actually works
Granular per [device-user] access and
time control.
Protect your childrens web surfing. Control
the time they spend chatting, playing,
surfing or watching videos. It is super easy
to configure and it can apply different rule
sets to different devices and users (i.e. cell
phone versus “homework” pc)
Parental control
Protect all the family
Residential Solutions
T1
Residential Solutions
• Free3scale iMX6 800MHz Dual Core
ARM A9 SoC
• One 802.11AC/B/G/N Compex
WLE900VX 3x3, 2.4Gz
• One 802.11AC/B/G/N Compex
WLE900VX 3x3, 5Gz
• One Dual Band (802.11AC/B/G/N)
2x2. Monitor
• Bluetooth, ZigBee,Z-Wave, Thread
gateways. IoT ready
• Infineon SLB9615 TPM chip onboard
• USB 3.0
• 3,5’’ touch display
It is really powerful aswell
• WPA2 Enterprise EAP-TLS out of the
box authentication
• TECTECOs PKI Certificate
automation
• Segmentation and subneting
• Per [User, Device] authorization
control. UNAS®
• Proactive security.
• SDHCP & Implicit Denegation
• Reactive heuristic security.
SNAAP®
• Two guardian antennas always
looking for rouge APs
Above all, it is secure!
T1
Enterprise Solutions
Date | April 2016
Adaptative
Machine learning
Cooperative
Enterprise switch family
The use of security systems at the layer 2 level of the OSI model
provides the network, as a whole, with the capacity to prevent,
detect, and above all, act, applying effective measures from the
first network segment.
Being able, in this way, to make effective decisions to counteract
attacks (e.g. creation of quarantine sub-networks, automatic shut
down of switch ports, cutting off all communication, amongst
others).
The TECTECO system has been designed to learn so that it can
detect and counteract new attacks, dynamically modifying the
configuration of the network at great speed.
First network segment security
Date | April 2016
Maximum integrity for end-to-end
and human-computer
communications. Preventing DoS,
Man in the Middle, etc. attacks
Integrity
Local and global control of
authentication, preventing identify
thefts
Authentication
Coordination and federation of all
elements that control the network
(switches, firewalls, IDS, etc.) thus,
with the capacity for real action
(currently there is no product on
the market that is capable of doing
this for internal network segments)
Coordination
Dynamic reconfiguration of the
network
An intelligent system that learns
from the attacks becoming
quicker, more accurate and
efficient every time it reacts.
Dynamic
Enterprise Solutions
Tecteco Switch
Other Applications
Date | April 2016
eHealth
Drones / UAVs
Self driving vehicles
eHealth, Drones, self driving
vehicles, etc.
In TECTECO as part of our family of patents, we have placed
particular emphasis on providing a solution to the insecurity that
exists today in controlling and handling Drones (Unmanned Aerial
Vehicles). Likewise, we have included in our patent the use with
self-driving cars since the damage of the current insecurity are
incalculable for both technologies (drones and self-driving cars).
The future of internet must be secured today
Timeline
The best way to predict
the future is to invent it.
Date | April 2016
2014
First Patent submission
June 2015
4 International
Patents filled
June 2016
Final Software &
hardware definition
Proof of concept
March 2015
First prototype
January 2016
01 02 03 04 05Start
Failure is an option here.
If things are not failing,
you are not innovating
enough
Date | April 2016
September 2016
First physical prototype
December 2016
Tecteco’s T1 Beta
September 2017
T1 Delivery
Kickstarter campaign
October 2016
First batch production
June 2017
07 08 09 10 To be continued…
Timeline
06
Date | April 2016
Fall 2016: Kickstarter campaign
Applying our patented technology and
the most advanced enterprise security
techniques and protocols, TECTECO will
deliver by spring 2017 a home and small
office access point and home security
device that will protect all devices, users
(specially minors) and IoT.
Home Security
Device
The most secure WIFI up to
date
Protect employees home network and
enforce company policies remotely to
ensure employees home network is not an
attack vector.
Partnerships with hotel chains, free
hotspots companies, etc. to ensure the
company policies are enforced wherever
the employee has connectivity.
Enterprise Home
Security Device
Centralized protection for
telework employees
Based on the patented family of products
by TECTECO, the design and production of
a family of network switch is proposed.
The use of security systems at the layer 2
level of the OSI model provides the
network, as a whole, with the capacity to
prevent, detect, and above all, act,
applying effective measures from the first
network segment.
Enterprise switch
family
Security begins at the layer
2 level
With an indisputable mean to identify the
human behind a device, TECTECO is
committed to create a standard global
user identification to ensure a protected
and liable access to internet across the
whole world.
Global unique
identification
Our future vision
‘18‘17 ‘20 +
Road Map
ROAD MAP

More Related Content

What's hot

Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
Vasco Veloso
 
IoT security
IoT securityIoT security
IoT security
YashKesharwani2
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Stanford School of Engineering
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
Bryan Len
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IJNSA Journal
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prusty
amarprusty
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
noornabi16
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
Leonardo De Moura Rocha Lima
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 
IoT Security
IoT SecurityIoT Security
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
Edureka!
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
OWASP Delhi
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
Leonardo De Moura Rocha Lima
 
Fixing the Last Missing Piece in Securing IoT
Fixing the Last Missing Piece in Securing IoTFixing the Last Missing Piece in Securing IoT
Fixing the Last Missing Piece in Securing IoT
NUS-ISS
 
Portfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsPortfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsRemo Hardeman
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
Ravindra Dastikop
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
University of Ontario Institute of Technology (UOIT)
 

What's hot (20)

Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
IoT security
IoT securityIoT security
IoT security
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prusty
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
Cyber security
Cyber securityCyber security
Cyber security
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
Fixing the Last Missing Piece in Securing IoT
Fixing the Last Missing Piece in Securing IoTFixing the Last Missing Piece in Securing IoT
Fixing the Last Missing Piece in Securing IoT
 
Portfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsPortfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - Engels
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Nuro Secure Messaging
Nuro Secure MessagingNuro Secure Messaging
Nuro Secure Messaging
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 

Similar to TECTECO V3.20160526.key (2)

IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
ardexateam
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
ssuser57b3e5
 
Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
Cisco Case Studies
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
Ahmed Sallam
 
Abdulrahman AlzaidCell 424-230-4189[email protected]OBJ.docx
Abdulrahman AlzaidCell 424-230-4189[email protected]OBJ.docxAbdulrahman AlzaidCell 424-230-4189[email protected]OBJ.docx
Abdulrahman AlzaidCell 424-230-4189[email protected]OBJ.docx
annetnash8266
 
SPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 FinalSPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 FinalElliot Charles Willcox
 
XMPP a Unified Fabric for Internet Of Things
XMPP a Unified Fabric for Internet Of ThingsXMPP a Unified Fabric for Internet Of Things
XMPP a Unified Fabric for Internet Of ThingsRikard Strid
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
CodeOps Technologies LLP
 
Four Tech Trends for 2017
Four Tech Trends for 2017Four Tech Trends for 2017
Four Tech Trends for 2017
Peter Pajor
 
Nerospec IIoT Company Profile
Nerospec IIoT Company Profile Nerospec IIoT Company Profile
Nerospec IIoT Company Profile
Nerospec
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
GARL
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
ardexateam
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityShane Glenn
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
emmaelice
 
Unify Internet Of Things with Clayster
Unify Internet Of Things with ClaysterUnify Internet Of Things with Clayster
Unify Internet Of Things with Clayster
claysterworld
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Infosectrain3
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
Electric Imp
 

Similar to TECTECO V3.20160526.key (2) (20)

IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Presentation
PresentationPresentation
Presentation
 
Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
 
Abdulrahman AlzaidCell 424-230-4189[email protected]OBJ.docx
Abdulrahman AlzaidCell 424-230-4189[email protected]OBJ.docxAbdulrahman AlzaidCell 424-230-4189[email protected]OBJ.docx
Abdulrahman AlzaidCell 424-230-4189[email protected]OBJ.docx
 
SPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 FinalSPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 Final
 
XMPP a Unified Fabric for Internet Of Things
XMPP a Unified Fabric for Internet Of ThingsXMPP a Unified Fabric for Internet Of Things
XMPP a Unified Fabric for Internet Of Things
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Four Tech Trends for 2017
Four Tech Trends for 2017Four Tech Trends for 2017
Four Tech Trends for 2017
 
Nerospec IIoT Company Profile
Nerospec IIoT Company Profile Nerospec IIoT Company Profile
Nerospec IIoT Company Profile
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
 
Unify Internet Of Things with Clayster
Unify Internet Of Things with ClaysterUnify Internet Of Things with Clayster
Unify Internet Of Things with Clayster
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 

TECTECO V3.20160526.key (2)

  • 1.
  • 2. Index Date | April 2016 TECTECO Security Systems Residential solutions Enterprise solutions Other applications Timeline
  • 3. Is a technology company who has developed and patented an innovative system for securing wired and wireless local area networks. With over half the world’s population sharing personal and private data across the Internet , the security and confidentiality of the network has become a pivotal function on which the network of all networks should be based. Worldwide spending on information security will reach USD 79,000 million in 2015 (Gartner 2014), with a global cost of cybercrime estimated at approximately USD 400,000 million (McAfee, 2014). TECTECOs intellectual property is offering new, revolutionary technology that guarantees the integrity of communications whilst providing maximum security and granularity to local area networks. Introduction TECTECO Security Systems Date | April 2016 SDHCP UNAS Built in device - user authentication GLOBAL SOLUTION Network element and method for improved access to communications networks SNAAP Proactive & reactive security Secure DHCP service
  • 4. Team Date | April 2016 Computer Science engineer, serial entrepreneur and venture capitalist with more than 15 years leading development teams and tech companies. Miguel Cobián CEO Master in Architecture and urbanism, and bachelor's degree in Philosophical Anthropology with more than 40 years of profesional experience. He has been member of the board at TALGO for more than a decade. Luis María de Palacio Chairman Entrepreneur and Chief Operations Officer with more than 20 years of experience in telecomunications. He has worked for most of the leader companies in the industry. Security and telecomunication networks expert with more than 17 years of experience as project manager in companies such as HP, INDRA and Telefónica. Alfonso Marcos Operations José Antonio Enrique Technology Electrical engineer with strong knowledge in telecommunications, electronic, embedded and computer engineering. He has worked the past 5 years at companies such as Alcatel- Lucent or Hitachi Data Systems. Computer science engineer and masters degree in telecomunication networks. He has worked as security and telecomunication networks expert in HP and Telefónica. Adrián Moreno Development Diego Trapero Security
  • 5. Residential Solutions Date | April 2016 Super secure Enterprise security at your hands Super easy Mobile app configuration Super powerful Latest & high end hardware T1 Home security device TECTECO's Home Security Device T1-HSD creates the most secure WIFI network for your home. Our patented (pending) technology allows us to assure it! Enterprise WIFI security for everyone
  • 6. Date | April 2016 Despite of all other WIFI access points, the T1 is secure out of the box. The application of the latest technologies on top of our patented security systems makes the T1 the only WIFI access point that cannot be hacked. Secure Better than the enterprise solutions Friendly and intuitive interface in a well known environment: your cell phone. We have rethought the whole relationship with your access point (if any!) and created an mobile app that makes you feel in power. It is, overall, plug and play. Forget about the installation and configuration dramas. Easy to use For everyone in the family We have built the best access point with the latest high end hardware paired with the best software. It reaches way beyond any other domestic access point with transmission rates that you have never experienced. And it is designed to protect your IoT “things” aswell. Powerfull A WIFI that actually works Granular per [device-user] access and time control. Protect your childrens web surfing. Control the time they spend chatting, playing, surfing or watching videos. It is super easy to configure and it can apply different rule sets to different devices and users (i.e. cell phone versus “homework” pc) Parental control Protect all the family Residential Solutions T1
  • 7. Residential Solutions • Free3scale iMX6 800MHz Dual Core ARM A9 SoC • One 802.11AC/B/G/N Compex WLE900VX 3x3, 2.4Gz • One 802.11AC/B/G/N Compex WLE900VX 3x3, 5Gz • One Dual Band (802.11AC/B/G/N) 2x2. Monitor • Bluetooth, ZigBee,Z-Wave, Thread gateways. IoT ready • Infineon SLB9615 TPM chip onboard • USB 3.0 • 3,5’’ touch display It is really powerful aswell • WPA2 Enterprise EAP-TLS out of the box authentication • TECTECOs PKI Certificate automation • Segmentation and subneting • Per [User, Device] authorization control. UNAS® • Proactive security. • SDHCP & Implicit Denegation • Reactive heuristic security. SNAAP® • Two guardian antennas always looking for rouge APs Above all, it is secure! T1
  • 8. Enterprise Solutions Date | April 2016 Adaptative Machine learning Cooperative Enterprise switch family The use of security systems at the layer 2 level of the OSI model provides the network, as a whole, with the capacity to prevent, detect, and above all, act, applying effective measures from the first network segment. Being able, in this way, to make effective decisions to counteract attacks (e.g. creation of quarantine sub-networks, automatic shut down of switch ports, cutting off all communication, amongst others). The TECTECO system has been designed to learn so that it can detect and counteract new attacks, dynamically modifying the configuration of the network at great speed. First network segment security
  • 9. Date | April 2016 Maximum integrity for end-to-end and human-computer communications. Preventing DoS, Man in the Middle, etc. attacks Integrity Local and global control of authentication, preventing identify thefts Authentication Coordination and federation of all elements that control the network (switches, firewalls, IDS, etc.) thus, with the capacity for real action (currently there is no product on the market that is capable of doing this for internal network segments) Coordination Dynamic reconfiguration of the network An intelligent system that learns from the attacks becoming quicker, more accurate and efficient every time it reacts. Dynamic Enterprise Solutions Tecteco Switch
  • 10. Other Applications Date | April 2016 eHealth Drones / UAVs Self driving vehicles eHealth, Drones, self driving vehicles, etc. In TECTECO as part of our family of patents, we have placed particular emphasis on providing a solution to the insecurity that exists today in controlling and handling Drones (Unmanned Aerial Vehicles). Likewise, we have included in our patent the use with self-driving cars since the damage of the current insecurity are incalculable for both technologies (drones and self-driving cars). The future of internet must be secured today
  • 11. Timeline The best way to predict the future is to invent it. Date | April 2016 2014 First Patent submission June 2015 4 International Patents filled June 2016 Final Software & hardware definition Proof of concept March 2015 First prototype January 2016 01 02 03 04 05Start
  • 12. Failure is an option here. If things are not failing, you are not innovating enough Date | April 2016 September 2016 First physical prototype December 2016 Tecteco’s T1 Beta September 2017 T1 Delivery Kickstarter campaign October 2016 First batch production June 2017 07 08 09 10 To be continued… Timeline 06
  • 13. Date | April 2016 Fall 2016: Kickstarter campaign Applying our patented technology and the most advanced enterprise security techniques and protocols, TECTECO will deliver by spring 2017 a home and small office access point and home security device that will protect all devices, users (specially minors) and IoT. Home Security Device The most secure WIFI up to date Protect employees home network and enforce company policies remotely to ensure employees home network is not an attack vector. Partnerships with hotel chains, free hotspots companies, etc. to ensure the company policies are enforced wherever the employee has connectivity. Enterprise Home Security Device Centralized protection for telework employees Based on the patented family of products by TECTECO, the design and production of a family of network switch is proposed. The use of security systems at the layer 2 level of the OSI model provides the network, as a whole, with the capacity to prevent, detect, and above all, act, applying effective measures from the first network segment. Enterprise switch family Security begins at the layer 2 level With an indisputable mean to identify the human behind a device, TECTECO is committed to create a standard global user identification to ensure a protected and liable access to internet across the whole world. Global unique identification Our future vision ‘18‘17 ‘20 + Road Map ROAD MAP