SlideShare a Scribd company logo
Viscount Systems, Inc.
Investorideas.com
Security Technology Showcase
March 12, 2014
New York Hilton
Safe Harbor Statement
Forward looking statements: This presentation and other statements by Viscount Systems Inc. may contain forward-looking
statements within the meaning of the Private Securities Litigation Reform Act with respect to the outlook for earnings and
revenues, other future financial or business performance, strategies and expectations. Forward-looking statements are
typically identified by words or phrases such as "believe," "expect," "estimate," "position," "assume," "potential," "outlook,"
"continue," "remain," "maintain," and similar expressions, or future or conditional verbs such as "will," "would," "should,"
"could," or similar expressions.
Disclaimer
This document is solely for information purposes and is not to be construed as investment advice or as an offer to sell or
the solicitation of an offer to buy any security in any state. This document and its contents are confidential to the person(s)
to whom it is delivered and should not be copied or distributed, in whole or in part, or its contents disclosed by such
person(s) to any other person. Any party receiving and/or reviewing this material, in consideration therefore, agrees not to
circumvent the business proposals explicitly or implicitly contained herein in any manner, directly or indirectly. Further, any
recipient hereof agrees to maintain all information received in the strictest confidence and shall not disclose to any third
parties any information material to the opportunity contained herein and, upon review hereof, agrees that any unauthorized
disclosure by any party will result in irreparable damage for which monetary damages would be difficult or impossible to
accurately determine. Recipients recognize, and hereby agree, that the proprietary information disclosed herein represents
confidential and valuable proprietary information and, therefore, will not, without express prior written consent, disclose
such information to any person, company, entity or other third party, unless so doing would contravene governing law or
regulations.
This document is an outline of matters for discussion only. This document does not constitute and should not be interpreted
as advice, including legal, tax or accounting advice. This presentation includes statements that represent opinions,
estimates and forecasts, which may not be realized. We believe the information provided herein is reliable, as of the date
hereof, but do not warrant accuracy or completeness. In preparing these materials, we have relied upon and assumed,
without independent verification, the accuracy and completeness of all information available from public and company
sources.
Broker Dealer services are provided through Pickwick Capital Partners, LLC (“Pickwick”), a member of FINRA and SIPC.
Become the Standard Software Platform
to Unify
Cyber Security and Physical Security
Systems
Mission Statement
3
• Public Company (OTC Symbol VSYS)
• Vancouver, Canada HQ, Nevada Corporation, 26 FTEs
• Core business (intercoms and telephone entry business)
established for 12 years.
• Now IT-Based Physical and Cyber Security Software.
• Viscount’s “Freedom” access control software eliminates control
panels and enables IT to control and secure physical security
systems at substantial cost savings & tie to cyber security
• Enables smart phones to replace employee ID cards
Company Profile
4
• Strong IP Portfolio – 8 core patents and 65 Patent Claims Filed Since 12/2010
• Pioneer in Commercializing Browser and Cloud-Based Security Systems
• Diverse Client Base (Energy, University, Banks, Healthcare, Govt, Enterprise)
• Leading Strategic Partners (Microsoft, Schneider, Stanley, Johnson Controls)
• Recently Signed Revenue Share Agreement with Microsoft
• Board of Directors Comprised of Senior Industry Executives and Former
Government Officials (Honeywell, ADT, DHS, State Dept.)
• Company has recently raised cash to build resources to accelerate current
revenue growth and become cash flow positive
Investment Highlights
5
History and Background
• Established Revenue Growth:
•2010-2012: ~$3M per year in annual revenue
•2013: $4M+ in revenue (first full year of new ‘Freedom” SW Sales)
•2014: projecting $7-8M in revenue
• Current Cash Burn ~$60-70K/month (not a capital intensive business)
• Board appointed Dennis Raefield as CEO on February 17, 2014
6
Dennis Raefield Bio
• President, Honeywell access control division, grew $5M to $120M
revenue in 4 years
• CEO of MACE, a publicly traded maker of access control, video, pepper
spray and central station segments
• At Pinkerton as Division CEO, grew access control division from $15M to
$80M in 3 years (organic and rollup)
• Successfully sold $15M, 20 year old access control integration business to
Pinkerton (now Stanley)
• CEO of two global access control manufacturing companies ($43M)
7
• Hackers Penetrate Networks Through Access Control Hardware (Readers,
Access Control Panels)- Back Door Weaknesses
– Target data breach caused by HVAC Contractor password being stolen
– “Stuxnet” Virus Penetrated Industrial Access Control Systems
– Google campus take down through hacking of access control panels
• Existing Access Control Systems are Proprietary and Hardware Centric
– 80% of System Cost in Hardware - Control Panels and Cables - $3,500 per door
– Inherently Unsecure and “Hackable” - Exposed on Board Code and Database
– Lack Compliance with new U.S. Government Standards (HSPD12, FIPS 201)
• The IT Department is the New Gate Keeper for Physical Security Systems
Industry Challenges
9
HLS Deputy Under Secretary Philip Reitinger, National Protection and Programs
Directorate, Before the United States House Committee on Homeland Security
Subcommittee on Cyber Security, Infrastructure Protection, and Security
Technologies, "Examining the Cyber Threat to Critical Infrastructure and the
American Economy" March 16, 2011.
"A real-world threat emerged last year that significantly changed the
landscape of targeted cyber attacks on industrial control systems. Malicious
code, dubbed Stuxnet, was detected in July 2010. DHS analysis concluded that
this highly complex computer worm was the first of its kind, written to
specifically target mission-critical control panel systems running a specific
combination of software and hardware.”
Risks to Industrial Control Systems
10
“Countless servers, access control panels, security cameras, heating
systems, nuclear plants and energy plants are connected to the Internet.
Many use “admin” as their username and “1234” as their password to
access these control systems. It’s a massive security failure”
- CNN, “The Cybercrime Economy” 4/8/13
“Researchers Hack Building Control System at Google”
- Wired.com, 5/6/13
“Vulnerability Lets Hackers Control Building Locks, Electricity, Elevators and
More”
- Wired.com, 2/6/13
Control Panels Create Risk
11
• We have no control panel to be hacked!
• We use the existing hardened IT infrastructure to protect physical access
systems. Use the cyber protections that already exist!
• Viscount’s Freedom Technology Enables IT to Control Physical Security Systems
– Uses Existing IT Software to Authenticate User (Microsoft Active Directory or LDAP)
– Eliminates 50% to 80% of Hardware Requirements, Cost Per Door $500 - $1,000
– Provides Much Higher Levels of Encryption, Cyber Security and Compliance
– Also enables “SaaS” Model Through Cloud Provisioning
• Software Trumps Hardware. Built in flexibility and upgrades
• Integrates Building Control Systems on Common IT Platform
• Large Addressable Markets (TAM Exceeds $100 Billion)
Viscount Solution
12
• Access Control Panel Required
• No Encryption (Not Cyber Secure)
• Firmware Must Match Software
• Labor-Intensive Installation
• Power Intensive
• Very Expensive Expansion
• Eliminates Access Control Panel
• Encryption (Cyber Secure)
• No Firmware to Sync
• Easy installation – New and Retrofit
• Very Low Power – a “Green” Solution
• Expansion and upgrades are Software
Based
Software
Traditional Panel System Freedom
Bridge
Panel
Functionality is
Virtualized in
Server Software
Comparison
13
What Makes Viscount Unique?
• New market entrant offering both desperately needed cyber
features AND competitive price
• Successfully competing against established players: Tyco,
UTC, Honeywell, Schneider Electric
• Competitors have too much invested in legacy
hardware/software to quickly adapt
• We are nimble and responsive, they are large and
bureaucratic and beholden to a huge installed base
• Our competitors are also a potential exit plan
14
• Government: US Department of Homeland Security, US Dept. of Labor, US
Veteran’s Administration, US Social Services Administration
• Petrochemical: Methanex Corporation
• Infrastructure: SEA-TAC Airport
• Law enforcement: Colorado Correctional Facilities
• Education: New Mexico and North Dakota K-12 School Districts
• Healthcare: Sun Healthcare
• Financial: Peoples Bancorp
• Construction: Hundreds of Office Buildings and Hi-Rise Condos
Impressive and Diverse Client Base
15
• November 2013 – Viscount Signs Revenue Share Agreement with Microsoft
• April 2013 - Viscount Becomes Certified Microsoft Technology Partner
– Viscount Technology Deployed in Microsoft Global Security Ops Center in Redmond, WA
– Uses Windows Phone to Open Doors, Control Lights, Raise/Lower Shades
• First Physical Security Technology Certified on Microsoft Cloud (Azure)
• Winner of 2012 Microsoft “Be What’s Next” Award
• Included in Microsoft’s Booth at Last Three Industry Trade Shows
• Leverages Microsoft Active Directory Software Into Physical Security Sector
• Microsoft Showcases Viscount as their Solution for Unified Cyber/Physical
Security Technology
Microsoft
17
• Microsoft
• Stanley Security Solutions
• Johnson Controls
• Schneider Electric
• Ingersoll-Rand
• ADI Distribution (Honeywell)
• Tri-Ed Distribution
Signed Strategic Partnerships
16
• PLC’s (Programmable Logic Controllers)
• Energy/Utilities: SCADA (Supervisory Control And Data Acquisition)
• Physical Security (Card Access, Video)
• HVAC (Heating, Ventilation, Air Conditioning)
• Fire Alarm
• Intrusion Alarm
Collective Market Over $100 Billion
Non-Security Opportunities
18
• 8 Core Patents and 65 Patent Claims Filed Since Dec. 2010
– Unified Physical/Logical Security
– Mobile Security Applications
– IP Edge Security and PLC devices
– Non-Traditional Unified IP Building Platforms
IP - Patents
19
2013 Liberty Product Intro
• Created new product for 2nd tier installers sold through Distribution
• Launched new Product Line called Liberty for the mass market
• Liberty could exceed the market size of Freedom
• Successful rollout in October 2013
• Signed two largest security systems distributors in US market
• Concept to launch of Liberty in 4 months
22
How We Defend Technology
Our competitors can copy us, but…
•It takes significant time, money, a complete change in their culture, different
channel strategy, and writing off millions in R&D investment
•R&D for these firms is set for years in advance. They have little capacity to
start in a new direction
•We have strong IP Patent Protection (patents applied for)
•Cheaper to buy us (to kill us or allow parallel development) than to start from
scratch
•Risk is minimal
27
Exit Scenarios
• Strategic Sale
•Future sale to one of four major players
•We have already been approached by three of our largest competitors
•Future sale to other competitors
•Future sale to Integrators
•Future sale to IT manufacturers
• Financial Sponsors- strategy for large scale growth
• Stock market- remain independent with continued performance and
profitability
29
Thank You
• Thank You for your valuable time
• More information at www.viscount.com
• More investment information from:
•Scott Greiper, Secure Strategy Group, www.securesg.com
29

More Related Content

What's hot

Sample Cloud Security - Enterprise
Sample Cloud Security - EnterpriseSample Cloud Security - Enterprise
Sample Cloud Security - Enterprise
ResearchFox
 
Sample Cloud Security - Manufacturing
Sample Cloud Security - ManufacturingSample Cloud Security - Manufacturing
Sample Cloud Security - Manufacturing
ResearchFox
 
Sample Cloud Security - Healthcare
Sample Cloud Security - HealthcareSample Cloud Security - Healthcare
Sample Cloud Security - Healthcare
ResearchFox
 
Robert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government ContractorsRobert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government Contractors
Government Technology and Services Coalition
 
Sample Cloud Security - Government
Sample Cloud Security - GovernmentSample Cloud Security - Government
Sample Cloud Security - Government
ResearchFox
 
Sample Cloud Security - South America
Sample Cloud Security - South AmericaSample Cloud Security - South America
Sample Cloud Security - South America
ResearchFox
 
Sample Cloud Security - North America
Sample Cloud Security - North AmericaSample Cloud Security - North America
Sample Cloud Security - North America
ResearchFox
 
Sample Cloud Security - APAC
Sample Cloud Security - APACSample Cloud Security - APAC
Sample Cloud Security - APAC
ResearchFox
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
Taiye Lambo
 
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber SurveyKristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Government Technology and Services Coalition
 
Supply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - WhitepaperSupply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - Whitepaper
NIIT Technologies
 
Sample Cloud Security - Europe
Sample Cloud Security - EuropeSample Cloud Security - Europe
Sample Cloud Security - Europe
ResearchFox
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
Satya Harish
 
AML Transaction Monitoring Tuning Webinar
AML Transaction Monitoring Tuning WebinarAML Transaction Monitoring Tuning Webinar
AML Transaction Monitoring Tuning Webinar
Idan Tohami
 
Cyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk ManagementCyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk Management
Mafazo: Digital Solutions
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
Ulf Mattsson
 
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
Enterprise Firewall Market - North America Outlook (2015-19)
Enterprise Firewall Market - North America Outlook (2015-19)Enterprise Firewall Market - North America Outlook (2015-19)
Enterprise Firewall Market - North America Outlook (2015-19)
ResearchFox
 
January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presention
rodrida1
 
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
TrustArc
 

What's hot (20)

Sample Cloud Security - Enterprise
Sample Cloud Security - EnterpriseSample Cloud Security - Enterprise
Sample Cloud Security - Enterprise
 
Sample Cloud Security - Manufacturing
Sample Cloud Security - ManufacturingSample Cloud Security - Manufacturing
Sample Cloud Security - Manufacturing
 
Sample Cloud Security - Healthcare
Sample Cloud Security - HealthcareSample Cloud Security - Healthcare
Sample Cloud Security - Healthcare
 
Robert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government ContractorsRobert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government Contractors
 
Sample Cloud Security - Government
Sample Cloud Security - GovernmentSample Cloud Security - Government
Sample Cloud Security - Government
 
Sample Cloud Security - South America
Sample Cloud Security - South AmericaSample Cloud Security - South America
Sample Cloud Security - South America
 
Sample Cloud Security - North America
Sample Cloud Security - North AmericaSample Cloud Security - North America
Sample Cloud Security - North America
 
Sample Cloud Security - APAC
Sample Cloud Security - APACSample Cloud Security - APAC
Sample Cloud Security - APAC
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber SurveyKristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
 
Supply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - WhitepaperSupply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - Whitepaper
 
Sample Cloud Security - Europe
Sample Cloud Security - EuropeSample Cloud Security - Europe
Sample Cloud Security - Europe
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 
AML Transaction Monitoring Tuning Webinar
AML Transaction Monitoring Tuning WebinarAML Transaction Monitoring Tuning Webinar
AML Transaction Monitoring Tuning Webinar
 
Cyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk ManagementCyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk Management
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
 
Enterprise Firewall Market - North America Outlook (2015-19)
Enterprise Firewall Market - North America Outlook (2015-19)Enterprise Firewall Market - North America Outlook (2015-19)
Enterprise Firewall Market - North America Outlook (2015-19)
 
January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presention
 
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 

Viewers also liked

Research-concept Michele Notari At Phbern Ch
Research-concept Michele Notari At Phbern ChResearch-concept Michele Notari At Phbern Ch
Research-concept Michele Notari At Phbern Ch
Michele Notari
 
Tse This Email Has Been Voted The Best Email Of The Year
Tse  This Email Has Been Voted The Best Email Of The YearTse  This Email Has Been Voted The Best Email Of The Year
Tse This Email Has Been Voted The Best Email Of The Year
cris
 
Mobiles Lernen. Grundlagen, Kontexte und didaktische Optionen.
Mobiles Lernen. Grundlagen, Kontexte und didaktische Optionen.Mobiles Lernen. Grundlagen, Kontexte und didaktische Optionen.
Mobiles Lernen. Grundlagen, Kontexte und didaktische Optionen.
Judith S.
 
40 maneras de_ahorrar_durante_el_evs
40 maneras de_ahorrar_durante_el_evs40 maneras de_ahorrar_durante_el_evs
40 maneras de_ahorrar_durante_el_evs
Red Española de exVoluntarios Europeos
 
Crónica para luzdary
Crónica  para   luzdaryCrónica  para   luzdary
Crónica para luzdary
Alfredo Pedroza
 
Roberto vidal bolaño ceip celeiro
Roberto vidal bolaño ceip celeiroRoberto vidal bolaño ceip celeiro
Roberto vidal bolaño ceip celeiroMarta Pérez Lage
 
Hand Tool Snapshots
Hand Tool SnapshotsHand Tool Snapshots
Hand Tool Snapshots
Rudi Nieuwoudt
 
050825_Address to Insight Asia Conference 2005_Non-Traditional Tools for Unde...
050825_Address to Insight Asia Conference 2005_Non-Traditional Tools for Unde...050825_Address to Insight Asia Conference 2005_Non-Traditional Tools for Unde...
050825_Address to Insight Asia Conference 2005_Non-Traditional Tools for Unde...
Spire Research and Consulting
 
Resume-Bihag
Resume-BihagResume-Bihag
Resume-Bihag
Bihag Trivedi
 
[Scup] Tutorial #6 Usuarios: Cómo buscar usuarios estrategicos en redes soci...
[Scup]  Tutorial #6 Usuarios: Cómo buscar usuarios estrategicos en redes soci...[Scup]  Tutorial #6 Usuarios: Cómo buscar usuarios estrategicos en redes soci...
[Scup] Tutorial #6 Usuarios: Cómo buscar usuarios estrategicos en redes soci...
Scup LATAM
 
Hbsc2203 810809025494 teaching science for lower primary iii
Hbsc2203 810809025494 teaching science for lower primary iiiHbsc2203 810809025494 teaching science for lower primary iii
Hbsc2203 810809025494 teaching science for lower primary iii
KPM
 
Smartbank Powercap Mv Me Ss125
Smartbank Powercap Mv Me Ss125Smartbank Powercap Mv Me Ss125
Smartbank Powercap Mv Me Ss125
frankwusa11
 
Sappada d’estate
Sappada d’estateSappada d’estate
Sappada d’estate
Hotel Cristina
 
Scrum for IT Project Outsourcing
Scrum for IT Project OutsourcingScrum for IT Project Outsourcing
Scrum for IT Project Outsourcing
Masoud Bolhassani
 
Triptico afergodella
Triptico afergodellaTriptico afergodella
Triptico afergodella
Andrés Ignacio Martínez Soto
 
merck Earnings Transcript (
merck Earnings Transcript (merck Earnings Transcript (
merck Earnings Transcript (
finance11
 
Los nuevos retos de la política de rehabilitación urbana en la CAPV
Los nuevos retos de la política de rehabilitación urbana en la CAPVLos nuevos retos de la política de rehabilitación urbana en la CAPV
Los nuevos retos de la política de rehabilitación urbana en la CAPV
EKITEN-Thinking
 
Social Media Marketing: Success Stories & Case Studies
Social Media Marketing: Success Stories & Case Studies Social Media Marketing: Success Stories & Case Studies
Social Media Marketing: Success Stories & Case Studies
Vanessa CEO
 
Material de Estudo - DMKT
Material de Estudo - DMKTMaterial de Estudo - DMKT
Material de Estudo - DMKT
Gabriela Almeida
 
Historia de Las Consolas de Videojuegos
Historia de Las Consolas de Videojuegos Historia de Las Consolas de Videojuegos
Historia de Las Consolas de Videojuegos
Uchiha_G4mer
 

Viewers also liked (20)

Research-concept Michele Notari At Phbern Ch
Research-concept Michele Notari At Phbern ChResearch-concept Michele Notari At Phbern Ch
Research-concept Michele Notari At Phbern Ch
 
Tse This Email Has Been Voted The Best Email Of The Year
Tse  This Email Has Been Voted The Best Email Of The YearTse  This Email Has Been Voted The Best Email Of The Year
Tse This Email Has Been Voted The Best Email Of The Year
 
Mobiles Lernen. Grundlagen, Kontexte und didaktische Optionen.
Mobiles Lernen. Grundlagen, Kontexte und didaktische Optionen.Mobiles Lernen. Grundlagen, Kontexte und didaktische Optionen.
Mobiles Lernen. Grundlagen, Kontexte und didaktische Optionen.
 
40 maneras de_ahorrar_durante_el_evs
40 maneras de_ahorrar_durante_el_evs40 maneras de_ahorrar_durante_el_evs
40 maneras de_ahorrar_durante_el_evs
 
Crónica para luzdary
Crónica  para   luzdaryCrónica  para   luzdary
Crónica para luzdary
 
Roberto vidal bolaño ceip celeiro
Roberto vidal bolaño ceip celeiroRoberto vidal bolaño ceip celeiro
Roberto vidal bolaño ceip celeiro
 
Hand Tool Snapshots
Hand Tool SnapshotsHand Tool Snapshots
Hand Tool Snapshots
 
050825_Address to Insight Asia Conference 2005_Non-Traditional Tools for Unde...
050825_Address to Insight Asia Conference 2005_Non-Traditional Tools for Unde...050825_Address to Insight Asia Conference 2005_Non-Traditional Tools for Unde...
050825_Address to Insight Asia Conference 2005_Non-Traditional Tools for Unde...
 
Resume-Bihag
Resume-BihagResume-Bihag
Resume-Bihag
 
[Scup] Tutorial #6 Usuarios: Cómo buscar usuarios estrategicos en redes soci...
[Scup]  Tutorial #6 Usuarios: Cómo buscar usuarios estrategicos en redes soci...[Scup]  Tutorial #6 Usuarios: Cómo buscar usuarios estrategicos en redes soci...
[Scup] Tutorial #6 Usuarios: Cómo buscar usuarios estrategicos en redes soci...
 
Hbsc2203 810809025494 teaching science for lower primary iii
Hbsc2203 810809025494 teaching science for lower primary iiiHbsc2203 810809025494 teaching science for lower primary iii
Hbsc2203 810809025494 teaching science for lower primary iii
 
Smartbank Powercap Mv Me Ss125
Smartbank Powercap Mv Me Ss125Smartbank Powercap Mv Me Ss125
Smartbank Powercap Mv Me Ss125
 
Sappada d’estate
Sappada d’estateSappada d’estate
Sappada d’estate
 
Scrum for IT Project Outsourcing
Scrum for IT Project OutsourcingScrum for IT Project Outsourcing
Scrum for IT Project Outsourcing
 
Triptico afergodella
Triptico afergodellaTriptico afergodella
Triptico afergodella
 
merck Earnings Transcript (
merck Earnings Transcript (merck Earnings Transcript (
merck Earnings Transcript (
 
Los nuevos retos de la política de rehabilitación urbana en la CAPV
Los nuevos retos de la política de rehabilitación urbana en la CAPVLos nuevos retos de la política de rehabilitación urbana en la CAPV
Los nuevos retos de la política de rehabilitación urbana en la CAPV
 
Social Media Marketing: Success Stories & Case Studies
Social Media Marketing: Success Stories & Case Studies Social Media Marketing: Success Stories & Case Studies
Social Media Marketing: Success Stories & Case Studies
 
Material de Estudo - DMKT
Material de Estudo - DMKTMaterial de Estudo - DMKT
Material de Estudo - DMKT
 
Historia de Las Consolas de Videojuegos
Historia de Las Consolas de Videojuegos Historia de Las Consolas de Videojuegos
Historia de Las Consolas de Videojuegos
 

Similar to Viscount Systems (OTCQB:VSYS) Presentation

Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsVirtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Splunk
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
Joan Weber
 
Equifax
Equifax Equifax
Equifax
nsjsj4
 
SIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeSIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for free
Elasticsearch
 
Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014
Finjan Holdings, Inc.
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
benefitexpress
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
Financial Poise
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
Raffa Learning Community
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
Resilient Systems
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
Patrick Florer
 
Lew Cirne, FS16 Keynote [FutureStack16]
Lew Cirne, FS16 Keynote [FutureStack16] Lew Cirne, FS16 Keynote [FutureStack16]
Lew Cirne, FS16 Keynote [FutureStack16]
New Relic
 
New Relic Infrastructure Intro: Increasing Mean Time Between Loss of Sleep [F...
New Relic Infrastructure Intro: Increasing Mean Time Between Loss of Sleep [F...New Relic Infrastructure Intro: Increasing Mean Time Between Loss of Sleep [F...
New Relic Infrastructure Intro: Increasing Mean Time Between Loss of Sleep [F...
New Relic
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
NetIQ
 
Final Project
Final ProjectFinal Project
Final Project
Pamela R. Gist
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
cliff_rudolph
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
Richard (Dick) Kaufman
 
Washington DC ELEVATE ISV Track
Washington DC ELEVATE ISV Track Washington DC ELEVATE ISV Track
Washington DC ELEVATE ISV Track
Salesforce Partners
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
Raffa Learning Community
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
 

Similar to Viscount Systems (OTCQB:VSYS) Presentation (20)

Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsVirtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
Equifax
Equifax Equifax
Equifax
 
SIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeSIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for free
 
Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Lew Cirne, FS16 Keynote [FutureStack16]
Lew Cirne, FS16 Keynote [FutureStack16] Lew Cirne, FS16 Keynote [FutureStack16]
Lew Cirne, FS16 Keynote [FutureStack16]
 
New Relic Infrastructure Intro: Increasing Mean Time Between Loss of Sleep [F...
New Relic Infrastructure Intro: Increasing Mean Time Between Loss of Sleep [F...New Relic Infrastructure Intro: Increasing Mean Time Between Loss of Sleep [F...
New Relic Infrastructure Intro: Increasing Mean Time Between Loss of Sleep [F...
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Final Project
Final ProjectFinal Project
Final Project
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
 
Washington DC ELEVATE ISV Track
Washington DC ELEVATE ISV Track Washington DC ELEVATE ISV Track
Washington DC ELEVATE ISV Track
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 

More from Investorideas.com

Speaker Scott Greiper, President and Founding Partner, Secure Strategy Group
Speaker Scott Greiper, President and Founding Partner, Secure Strategy GroupSpeaker Scott Greiper, President and Founding Partner, Secure Strategy Group
Speaker Scott Greiper, President and Founding Partner, Secure Strategy Group
Investorideas.com
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Investorideas.com
 
Speaker Scott Sacknoff, President, The Spade Defense Index
Speaker Scott Sacknoff, President, The Spade Defense IndexSpeaker Scott Sacknoff, President, The Spade Defense Index
Speaker Scott Sacknoff, President, The Spade Defense Index
Investorideas.com
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
Investorideas.com
 
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) PresentationNXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
Investorideas.com
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Investorideas.com
 
Facial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsFacial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market Applications
Investorideas.com
 

More from Investorideas.com (7)

Speaker Scott Greiper, President and Founding Partner, Secure Strategy Group
Speaker Scott Greiper, President and Founding Partner, Secure Strategy GroupSpeaker Scott Greiper, President and Founding Partner, Secure Strategy Group
Speaker Scott Greiper, President and Founding Partner, Secure Strategy Group
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
 
Speaker Scott Sacknoff, President, The Spade Defense Index
Speaker Scott Sacknoff, President, The Spade Defense IndexSpeaker Scott Sacknoff, President, The Spade Defense Index
Speaker Scott Sacknoff, President, The Spade Defense Index
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
 
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) PresentationNXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
 
Facial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsFacial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market Applications
 

Recently uploaded

Ellington-IO-Fact-Sheet-Class-A-May-24.pdf
Ellington-IO-Fact-Sheet-Class-A-May-24.pdfEllington-IO-Fact-Sheet-Class-A-May-24.pdf
Ellington-IO-Fact-Sheet-Class-A-May-24.pdf
kboyd6
 
一比一原版(Carleton毕业证)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证)加拿大卡尔顿大学毕业证如何办理
ybjk9iyd
 
Solaris Resources - June 2024 - FINAL-Public.pdf
Solaris Resources - June 2024 - FINAL-Public.pdfSolaris Resources - June 2024 - FINAL-Public.pdf
Solaris Resources - June 2024 - FINAL-Public.pdf
JacquelineWagenaar1
 
AFI Pitch Deck Template for social enterprise.pptx
AFI Pitch Deck Template for social enterprise.pptxAFI Pitch Deck Template for social enterprise.pptx
AFI Pitch Deck Template for social enterprise.pptx
gargdivyansh1234567
 
一比一原版格罗宁根大学毕业证(RUG毕业证书)学历如何办理
一比一原版格罗宁根大学毕业证(RUG毕业证书)学历如何办理一比一原版格罗宁根大学毕业证(RUG毕业证书)学历如何办理
一比一原版格罗宁根大学毕业证(RUG毕业证书)学历如何办理
gyucof
 
Therus network compañía de Liderazgo y banca digital
Therus network  compañía de Liderazgo y banca digitalTherus network  compañía de Liderazgo y banca digital
Therus network compañía de Liderazgo y banca digital
Rafael Mauro Duarte Morel
 
一比一原版(Vancouver毕业证)加拿大温哥华岛大学毕业证如何办理
一比一原版(Vancouver毕业证)加拿大温哥华岛大学毕业证如何办理一比一原版(Vancouver毕业证)加拿大温哥华岛大学毕业证如何办理
一比一原版(Vancouver毕业证)加拿大温哥华岛大学毕业证如何办理
ybjk9iyd
 
Voyager Space_Management Presentation_Final
Voyager Space_Management Presentation_FinalVoyager Space_Management Presentation_Final
Voyager Space_Management Presentation_Final
kboyd6
 
GUIA_LEGAL_CHAPTER_3_CORPORATE REGULATIONS.pdf
GUIA_LEGAL_CHAPTER_3_CORPORATE REGULATIONS.pdfGUIA_LEGAL_CHAPTER_3_CORPORATE REGULATIONS.pdf
GUIA_LEGAL_CHAPTER_3_CORPORATE REGULATIONS.pdf
ProexportColombia1
 
Corporate Presentation Probe June 19, 2024.pdf
Corporate Presentation Probe June 19, 2024.pdfCorporate Presentation Probe June 19, 2024.pdf
Corporate Presentation Probe June 19, 2024.pdf
Probe Gold
 
一比一原版(adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(adelaide毕业证书)阿德莱德大学毕业证如何办理
epeav
 
Collective Mining | Corporate Presentation - June 2024
Collective Mining | Corporate Presentation - June 2024Collective Mining | Corporate Presentation - June 2024
Collective Mining | Corporate Presentation - June 2024
CollectiveMining
 
Call Girls Bangalore 👉 7339748667 👈 With No Advance Payment
Call Girls Bangalore 👉 7339748667 👈 With No Advance PaymentCall Girls Bangalore 👉 7339748667 👈 With No Advance Payment
Call Girls Bangalore 👉 7339748667 👈 With No Advance Payment
prijesh mathew
 
Corporate Presentation Probe June 19, 2024.pdf
Corporate Presentation Probe June 19, 2024.pdfCorporate Presentation Probe June 19, 2024.pdf
Corporate Presentation Probe June 19, 2024.pdf
Probe Gold
 
一比一原版(uvic毕业证书)加拿大维多利亚大学毕业证如何办理
一比一原版(uvic毕业证书)加拿大维多利亚大学毕业证如何办理一比一原版(uvic毕业证书)加拿大维多利亚大学毕业证如何办理
一比一原版(uvic毕业证书)加拿大维多利亚大学毕业证如何办理
ufomhev
 

Recently uploaded (15)

Ellington-IO-Fact-Sheet-Class-A-May-24.pdf
Ellington-IO-Fact-Sheet-Class-A-May-24.pdfEllington-IO-Fact-Sheet-Class-A-May-24.pdf
Ellington-IO-Fact-Sheet-Class-A-May-24.pdf
 
一比一原版(Carleton毕业证)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证)加拿大卡尔顿大学毕业证如何办理
 
Solaris Resources - June 2024 - FINAL-Public.pdf
Solaris Resources - June 2024 - FINAL-Public.pdfSolaris Resources - June 2024 - FINAL-Public.pdf
Solaris Resources - June 2024 - FINAL-Public.pdf
 
AFI Pitch Deck Template for social enterprise.pptx
AFI Pitch Deck Template for social enterprise.pptxAFI Pitch Deck Template for social enterprise.pptx
AFI Pitch Deck Template for social enterprise.pptx
 
一比一原版格罗宁根大学毕业证(RUG毕业证书)学历如何办理
一比一原版格罗宁根大学毕业证(RUG毕业证书)学历如何办理一比一原版格罗宁根大学毕业证(RUG毕业证书)学历如何办理
一比一原版格罗宁根大学毕业证(RUG毕业证书)学历如何办理
 
Therus network compañía de Liderazgo y banca digital
Therus network  compañía de Liderazgo y banca digitalTherus network  compañía de Liderazgo y banca digital
Therus network compañía de Liderazgo y banca digital
 
一比一原版(Vancouver毕业证)加拿大温哥华岛大学毕业证如何办理
一比一原版(Vancouver毕业证)加拿大温哥华岛大学毕业证如何办理一比一原版(Vancouver毕业证)加拿大温哥华岛大学毕业证如何办理
一比一原版(Vancouver毕业证)加拿大温哥华岛大学毕业证如何办理
 
Voyager Space_Management Presentation_Final
Voyager Space_Management Presentation_FinalVoyager Space_Management Presentation_Final
Voyager Space_Management Presentation_Final
 
GUIA_LEGAL_CHAPTER_3_CORPORATE REGULATIONS.pdf
GUIA_LEGAL_CHAPTER_3_CORPORATE REGULATIONS.pdfGUIA_LEGAL_CHAPTER_3_CORPORATE REGULATIONS.pdf
GUIA_LEGAL_CHAPTER_3_CORPORATE REGULATIONS.pdf
 
Corporate Presentation Probe June 19, 2024.pdf
Corporate Presentation Probe June 19, 2024.pdfCorporate Presentation Probe June 19, 2024.pdf
Corporate Presentation Probe June 19, 2024.pdf
 
一比一原版(adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(adelaide毕业证书)阿德莱德大学毕业证如何办理
 
Collective Mining | Corporate Presentation - June 2024
Collective Mining | Corporate Presentation - June 2024Collective Mining | Corporate Presentation - June 2024
Collective Mining | Corporate Presentation - June 2024
 
Call Girls Bangalore 👉 7339748667 👈 With No Advance Payment
Call Girls Bangalore 👉 7339748667 👈 With No Advance PaymentCall Girls Bangalore 👉 7339748667 👈 With No Advance Payment
Call Girls Bangalore 👉 7339748667 👈 With No Advance Payment
 
Corporate Presentation Probe June 19, 2024.pdf
Corporate Presentation Probe June 19, 2024.pdfCorporate Presentation Probe June 19, 2024.pdf
Corporate Presentation Probe June 19, 2024.pdf
 
一比一原版(uvic毕业证书)加拿大维多利亚大学毕业证如何办理
一比一原版(uvic毕业证书)加拿大维多利亚大学毕业证如何办理一比一原版(uvic毕业证书)加拿大维多利亚大学毕业证如何办理
一比一原版(uvic毕业证书)加拿大维多利亚大学毕业证如何办理
 

Viscount Systems (OTCQB:VSYS) Presentation

  • 1. Viscount Systems, Inc. Investorideas.com Security Technology Showcase March 12, 2014 New York Hilton
  • 2. Safe Harbor Statement Forward looking statements: This presentation and other statements by Viscount Systems Inc. may contain forward-looking statements within the meaning of the Private Securities Litigation Reform Act with respect to the outlook for earnings and revenues, other future financial or business performance, strategies and expectations. Forward-looking statements are typically identified by words or phrases such as "believe," "expect," "estimate," "position," "assume," "potential," "outlook," "continue," "remain," "maintain," and similar expressions, or future or conditional verbs such as "will," "would," "should," "could," or similar expressions. Disclaimer This document is solely for information purposes and is not to be construed as investment advice or as an offer to sell or the solicitation of an offer to buy any security in any state. This document and its contents are confidential to the person(s) to whom it is delivered and should not be copied or distributed, in whole or in part, or its contents disclosed by such person(s) to any other person. Any party receiving and/or reviewing this material, in consideration therefore, agrees not to circumvent the business proposals explicitly or implicitly contained herein in any manner, directly or indirectly. Further, any recipient hereof agrees to maintain all information received in the strictest confidence and shall not disclose to any third parties any information material to the opportunity contained herein and, upon review hereof, agrees that any unauthorized disclosure by any party will result in irreparable damage for which monetary damages would be difficult or impossible to accurately determine. Recipients recognize, and hereby agree, that the proprietary information disclosed herein represents confidential and valuable proprietary information and, therefore, will not, without express prior written consent, disclose such information to any person, company, entity or other third party, unless so doing would contravene governing law or regulations. This document is an outline of matters for discussion only. This document does not constitute and should not be interpreted as advice, including legal, tax or accounting advice. This presentation includes statements that represent opinions, estimates and forecasts, which may not be realized. We believe the information provided herein is reliable, as of the date hereof, but do not warrant accuracy or completeness. In preparing these materials, we have relied upon and assumed, without independent verification, the accuracy and completeness of all information available from public and company sources. Broker Dealer services are provided through Pickwick Capital Partners, LLC (“Pickwick”), a member of FINRA and SIPC.
  • 3. Become the Standard Software Platform to Unify Cyber Security and Physical Security Systems Mission Statement 3
  • 4. • Public Company (OTC Symbol VSYS) • Vancouver, Canada HQ, Nevada Corporation, 26 FTEs • Core business (intercoms and telephone entry business) established for 12 years. • Now IT-Based Physical and Cyber Security Software. • Viscount’s “Freedom” access control software eliminates control panels and enables IT to control and secure physical security systems at substantial cost savings & tie to cyber security • Enables smart phones to replace employee ID cards Company Profile 4
  • 5. • Strong IP Portfolio – 8 core patents and 65 Patent Claims Filed Since 12/2010 • Pioneer in Commercializing Browser and Cloud-Based Security Systems • Diverse Client Base (Energy, University, Banks, Healthcare, Govt, Enterprise) • Leading Strategic Partners (Microsoft, Schneider, Stanley, Johnson Controls) • Recently Signed Revenue Share Agreement with Microsoft • Board of Directors Comprised of Senior Industry Executives and Former Government Officials (Honeywell, ADT, DHS, State Dept.) • Company has recently raised cash to build resources to accelerate current revenue growth and become cash flow positive Investment Highlights 5
  • 6. History and Background • Established Revenue Growth: •2010-2012: ~$3M per year in annual revenue •2013: $4M+ in revenue (first full year of new ‘Freedom” SW Sales) •2014: projecting $7-8M in revenue • Current Cash Burn ~$60-70K/month (not a capital intensive business) • Board appointed Dennis Raefield as CEO on February 17, 2014 6
  • 7. Dennis Raefield Bio • President, Honeywell access control division, grew $5M to $120M revenue in 4 years • CEO of MACE, a publicly traded maker of access control, video, pepper spray and central station segments • At Pinkerton as Division CEO, grew access control division from $15M to $80M in 3 years (organic and rollup) • Successfully sold $15M, 20 year old access control integration business to Pinkerton (now Stanley) • CEO of two global access control manufacturing companies ($43M) 7
  • 8. • Hackers Penetrate Networks Through Access Control Hardware (Readers, Access Control Panels)- Back Door Weaknesses – Target data breach caused by HVAC Contractor password being stolen – “Stuxnet” Virus Penetrated Industrial Access Control Systems – Google campus take down through hacking of access control panels • Existing Access Control Systems are Proprietary and Hardware Centric – 80% of System Cost in Hardware - Control Panels and Cables - $3,500 per door – Inherently Unsecure and “Hackable” - Exposed on Board Code and Database – Lack Compliance with new U.S. Government Standards (HSPD12, FIPS 201) • The IT Department is the New Gate Keeper for Physical Security Systems Industry Challenges 9
  • 9. HLS Deputy Under Secretary Philip Reitinger, National Protection and Programs Directorate, Before the United States House Committee on Homeland Security Subcommittee on Cyber Security, Infrastructure Protection, and Security Technologies, "Examining the Cyber Threat to Critical Infrastructure and the American Economy" March 16, 2011. "A real-world threat emerged last year that significantly changed the landscape of targeted cyber attacks on industrial control systems. Malicious code, dubbed Stuxnet, was detected in July 2010. DHS analysis concluded that this highly complex computer worm was the first of its kind, written to specifically target mission-critical control panel systems running a specific combination of software and hardware.” Risks to Industrial Control Systems 10
  • 10. “Countless servers, access control panels, security cameras, heating systems, nuclear plants and energy plants are connected to the Internet. Many use “admin” as their username and “1234” as their password to access these control systems. It’s a massive security failure” - CNN, “The Cybercrime Economy” 4/8/13 “Researchers Hack Building Control System at Google” - Wired.com, 5/6/13 “Vulnerability Lets Hackers Control Building Locks, Electricity, Elevators and More” - Wired.com, 2/6/13 Control Panels Create Risk 11
  • 11. • We have no control panel to be hacked! • We use the existing hardened IT infrastructure to protect physical access systems. Use the cyber protections that already exist! • Viscount’s Freedom Technology Enables IT to Control Physical Security Systems – Uses Existing IT Software to Authenticate User (Microsoft Active Directory or LDAP) – Eliminates 50% to 80% of Hardware Requirements, Cost Per Door $500 - $1,000 – Provides Much Higher Levels of Encryption, Cyber Security and Compliance – Also enables “SaaS” Model Through Cloud Provisioning • Software Trumps Hardware. Built in flexibility and upgrades • Integrates Building Control Systems on Common IT Platform • Large Addressable Markets (TAM Exceeds $100 Billion) Viscount Solution 12
  • 12. • Access Control Panel Required • No Encryption (Not Cyber Secure) • Firmware Must Match Software • Labor-Intensive Installation • Power Intensive • Very Expensive Expansion • Eliminates Access Control Panel • Encryption (Cyber Secure) • No Firmware to Sync • Easy installation – New and Retrofit • Very Low Power – a “Green” Solution • Expansion and upgrades are Software Based Software Traditional Panel System Freedom Bridge Panel Functionality is Virtualized in Server Software Comparison 13
  • 13. What Makes Viscount Unique? • New market entrant offering both desperately needed cyber features AND competitive price • Successfully competing against established players: Tyco, UTC, Honeywell, Schneider Electric • Competitors have too much invested in legacy hardware/software to quickly adapt • We are nimble and responsive, they are large and bureaucratic and beholden to a huge installed base • Our competitors are also a potential exit plan 14
  • 14. • Government: US Department of Homeland Security, US Dept. of Labor, US Veteran’s Administration, US Social Services Administration • Petrochemical: Methanex Corporation • Infrastructure: SEA-TAC Airport • Law enforcement: Colorado Correctional Facilities • Education: New Mexico and North Dakota K-12 School Districts • Healthcare: Sun Healthcare • Financial: Peoples Bancorp • Construction: Hundreds of Office Buildings and Hi-Rise Condos Impressive and Diverse Client Base 15
  • 15. • November 2013 – Viscount Signs Revenue Share Agreement with Microsoft • April 2013 - Viscount Becomes Certified Microsoft Technology Partner – Viscount Technology Deployed in Microsoft Global Security Ops Center in Redmond, WA – Uses Windows Phone to Open Doors, Control Lights, Raise/Lower Shades • First Physical Security Technology Certified on Microsoft Cloud (Azure) • Winner of 2012 Microsoft “Be What’s Next” Award • Included in Microsoft’s Booth at Last Three Industry Trade Shows • Leverages Microsoft Active Directory Software Into Physical Security Sector • Microsoft Showcases Viscount as their Solution for Unified Cyber/Physical Security Technology Microsoft 17
  • 16. • Microsoft • Stanley Security Solutions • Johnson Controls • Schneider Electric • Ingersoll-Rand • ADI Distribution (Honeywell) • Tri-Ed Distribution Signed Strategic Partnerships 16
  • 17. • PLC’s (Programmable Logic Controllers) • Energy/Utilities: SCADA (Supervisory Control And Data Acquisition) • Physical Security (Card Access, Video) • HVAC (Heating, Ventilation, Air Conditioning) • Fire Alarm • Intrusion Alarm Collective Market Over $100 Billion Non-Security Opportunities 18
  • 18. • 8 Core Patents and 65 Patent Claims Filed Since Dec. 2010 – Unified Physical/Logical Security – Mobile Security Applications – IP Edge Security and PLC devices – Non-Traditional Unified IP Building Platforms IP - Patents 19
  • 19. 2013 Liberty Product Intro • Created new product for 2nd tier installers sold through Distribution • Launched new Product Line called Liberty for the mass market • Liberty could exceed the market size of Freedom • Successful rollout in October 2013 • Signed two largest security systems distributors in US market • Concept to launch of Liberty in 4 months 22
  • 20. How We Defend Technology Our competitors can copy us, but… •It takes significant time, money, a complete change in their culture, different channel strategy, and writing off millions in R&D investment •R&D for these firms is set for years in advance. They have little capacity to start in a new direction •We have strong IP Patent Protection (patents applied for) •Cheaper to buy us (to kill us or allow parallel development) than to start from scratch •Risk is minimal 27
  • 21. Exit Scenarios • Strategic Sale •Future sale to one of four major players •We have already been approached by three of our largest competitors •Future sale to other competitors •Future sale to Integrators •Future sale to IT manufacturers • Financial Sponsors- strategy for large scale growth • Stock market- remain independent with continued performance and profitability 29
  • 22. Thank You • Thank You for your valuable time • More information at www.viscount.com • More investment information from: •Scott Greiper, Secure Strategy Group, www.securesg.com 29