SlideShare a Scribd company logo
1 of 20
USB Defender
Overview Presentation
March 2018
 With the announcement of "BadUSB" in 2014, the world learned that billions of
our trusted USB devices are vulnerable to reprogramming.
 BadUSB and USB Trojan attack platforms place the malware in the device’s
USB controller code, where it is invisible to virus protection software.
 The mission of USB Defender is to eliminate the USB security threats that
cannot be stopped by virus scanning software in a way that is compatible with
USB's "plug-and-play" design philosophy.
 We will deliver USB Defender technology in three product forms: chips, single
port dongle, and multiport USB hubs.
 The core element of USB Defender is protected under a 2014 patent.
Motivation
Everyone Knows there is an Issue
Scott Adam’s Dilbert
 Problem #1 USB devices can be reprogrammed.
 BadUSB is “undetectable and unfixable” – Forbes
 Problem #2 A reprogrammed USB device can compromise your computer.
 USB drives can be reprogrammed to silently infect computers – PC World
 The convenience of USB Plug-and-Play made it vulnerable from the start.
 USB Devices are computers that self-identify, can lie, and can change their identity over time.
 Problem #3 “off the shelf” USB virus creation platforms are available.
 Hak5’s Bash Bunny and Rubber Ducky
The Problem
No known protection strategy.
 Market Size: $4.9 Billion:
 Estimates based on 2 Billion Personal Computers in use (2015)
Forrester Research
 1.2 Billion Hub Market (3% of PCs, using a $20 price)
 1.2 Billion Dongle Market (6% of PC users using a $10 price)
 2.5 Billon PC / USB Docking station market (1% of PCs, using a $125 price)
Opportunity
 Adapt-IP:
 Founded October 2009
 Objective:
 Use HW High Level Synthesis design to create new products
 Initial Product Focus: USB, 802.11ah, H.265 video encoding
 USB Defender:
 Spun out as separate company Oct 2015
 Created as pure play that focused on USB security
 Strategy: effective monetization of USB Defender value
Company History
 Staffing
 All original designers are still involved
 Technology:
 USB 2.0, USB 3.0, USB Defender
 Prototype:
 FPGA-based 3 Port USB 2.0 USB Defender Hub
Company Status
 Straff Wentworth, Founder and CEO
 VP of USB Products at Adapt-IP and VP of Engineering PublishOne.
 Director of Core IRIX for SGI and Cray Research Teams.
 Mike Kentley, CTO
 USB Domain expert.
 Michael McNamara, Founder and Investor
 Executive team member of three successful high tech exits, including
IPO (Verisity Ltd)
 CEO of Adapt-IP.
 John Sanguinetti, Chairman
 Founder of two successful startups, investor in dozens more.
Team
Team Link
USB Defender
* An all hardware / no-CPU USB firewall
* Deep packet inspection at speed
* Allow or disallow any operation
* Same production costs
* Better protection than USB-C Authentication
Productization Options
 Secure Hub
 Secure KVM switch
 Secure Dongle
Our Solution
USB Defender Product Family
Defended port
Extension port
Defended port
Defended port
USB Ports
protected with
USB Defender
Video: DemoVideo: The USB Security Threat
 Push hard on web presence (LinkedIn, Facebook, YouTube, Google)
 Focus on the Consumer Market:
 They do not have IT security administrators to protect them.
 They understand that USB has security threats and are wanting a solution.
 USB defender provides a simple UX. It just works.
 There are protected ports and extension ports.
 Use Kickstarter to promote company and USB Defender concept.
 Partner with an existing consumer brand.
 Work with USB manufacturers to create effective giveaway programs.
Marketing Strategy
Sample
Giveaway for Kingston
The back side will have
information about
USB Defender
USB Defender Prototype
 USB Defender Technology:
 USB 2.0, USB 3.0
 PHY: ULPI, UTMI
 USB Defender Prototype:
 Xilinx Artix7 75T, 25K LUTs used
 USB 2.0, ULPI (Microchip USB3340)
 Hub: up port USB-C,
3 Type-A down ports
 Board Powered via USB or 5V supply
 Board Dimensions: 3.15 in x 2.1 in
 Primary Product Features:
 Protection from BadUSB Virus – USB devices are protected from reprogramming
 Protection from USB Trojan Virus -- Dedicated ports or dynamic ports
 Dedicated ports for keyboard, mouse, and mass storage; or
 Ports accept keyboard, mouse, and mass storage, but once device is accepted it cannot change.
 Optional Product Features:
 Protection from hijacked keyboard or mouse
 Bluetooth enabled proximity detection
 Protection from alternate system boot
 Trojan Boot and boot from memory stick blocked
 Protection from autorun of programs
 Prevent autorun.inf
Demo of USB Defender
USB Defender
Technology Productization Options
USB Defender Hub
USB Defender
email us: info@usb-defender.com
Learn More
Protecting you from USB based attacks
USB Defender
A bit more detail
 USB Trojan attacks can only be stopped by active monitoring.
 USB Defender is an all hardware solution:
 It allows the data I/O to operate at speed. It cannot be hacked.
 USB defender provides a simple User Experience (UX).
 USB virus protection software is very complex to use.
 USB Defender provides a simple UX. Plug it in and you are protected.
 A software solution cannot provide a uniform USB protection experience across:
 PC / Workstations, Hubs, and Docking Stations.
 USB Defender can provide a uniform USB protection experience.
 USB Defender protects your devices when plugged into a foreign system:
 USB sticks can be protected by a USB Dongle.
Why is USB Defender
the right USB choice?
USB Security
without USB Defender
 USB Common Criteria
 Mitigates USB Trojan attacks via tamper resistance, lab testing, and certification
 FIPS 140-2 Level 2+
 Mitigates USB Trojan attacks via tamper resistance and validation in NTIS labs
 USB Type-C Authentication
 Mitigates USB Trojan attacks via tamper resistance and secure validation
 USB device management software
 Mitigates USB Trojan attacks by limiting:
 Which workstations (USB ports) can connect to USB devices
 Which devices (manufacturer, product ID) are allowed to connect
Overview of USB Trojan
Mitigation Methods
 Security standards were in place before 2014 that would have prevented BadUSB
 2001 – FIPS 140-2 Level 2
 2007 -- USB Common Criteria Published (est)
 2010 – NSA – enterprise network USB memory stick detection & management (opensource)
 2012 -- Semantic & IronKey – Enterprise management of USB device access
 But USB security standards were not adopted by USB manufacturers
 Increased complexity and costs limited market adoption of security standards
 We estimate that security complying devices represent less than 1% of the market
BadUSB
should have been a non-event
 USB Type-C Power Cable issues are being resolved without Type-C Authentication
 In 2015 and 2016 the market experienced numerous bad power cable issues.
 Amazon and others took action.
 They now sell only USB-IF certified cables -- which do not include Type-C Authentication
 The market has accepted the USB-IF logo as trustworthy indicator
 If the market is satisfied with the safety of regular USB-IF certified cables,
will consumers really pay more for cables with Type-C Authentication?
 History has shown that consumers value price over security
 Type-C Authenticated cables and devices will be more expensive.
 Conclusion / USB Type-C Authentication Market Adoption Projection
 Type-C Authentication will have a market adoption profile similar to other USB Security standards.
 An aggressive estimate is that Type-C Authentication will capture 3% of the USB device market.
Will USB Type-C Authentication solve things?
We think not

More Related Content

Similar to USB Defender Overview

Wireless usb chetan_20_oct
Wireless usb chetan_20_octWireless usb chetan_20_oct
Wireless usb chetan_20_octcs_7100
 
Portable storage device management
Portable storage device managementPortable storage device management
Portable storage device managementcseij
 
Wireless USB report
Wireless USB reportWireless USB report
Wireless USB reportAnkit Joshi
 
Training Guide Idea Pad V2
Training Guide   Idea Pad V2Training Guide   Idea Pad V2
Training Guide Idea Pad V2lunarfall
 
Fortune Marketing Private Limited, Delhi, Keyboard
Fortune Marketing Private Limited, Delhi, Keyboard Fortune Marketing Private Limited, Delhi, Keyboard
Fortune Marketing Private Limited, Delhi, Keyboard IndiaMART InterMESH Limited
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systemsDivya Raval
 
Usb information
Usb informationUsb information
Usb informationsikharam99
 
Lenovo Consumer MSI
Lenovo Consumer MSILenovo Consumer MSI
Lenovo Consumer MSIguest9f2a14
 
celular Intrínsecamente Seguro : ADVANTAGE 1.0 ZONA 1
celular Intrínsecamente Seguro : ADVANTAGE 1.0 ZONA 1celular Intrínsecamente Seguro : ADVANTAGE 1.0 ZONA 1
celular Intrínsecamente Seguro : ADVANTAGE 1.0 ZONA 1MECATRONICS SOLUTIONS SAC
 
Windows Operating System
Windows Operating SystemWindows Operating System
Windows Operating SystemTarun Nayak
 
USB Hacking - LearnDay@Xoxzo #11
USB Hacking -  LearnDay@Xoxzo #11USB Hacking -  LearnDay@Xoxzo #11
USB Hacking - LearnDay@Xoxzo #11Xoxzo Inc.
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingBrent Muir
 
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Lietuvos kompiuterininkų sąjunga
 

Similar to USB Defender Overview (20)

Wireless usb chetan_20_oct
Wireless usb chetan_20_octWireless usb chetan_20_oct
Wireless usb chetan_20_oct
 
Portable storage device management
Portable storage device managementPortable storage device management
Portable storage device management
 
Wireless USB report
Wireless USB reportWireless USB report
Wireless USB report
 
Training Guide Idea Pad V2
Training Guide   Idea Pad V2Training Guide   Idea Pad V2
Training Guide Idea Pad V2
 
Fortune Marketing Private Limited, Delhi, Keyboard
Fortune Marketing Private Limited, Delhi, Keyboard Fortune Marketing Private Limited, Delhi, Keyboard
Fortune Marketing Private Limited, Delhi, Keyboard
 
USB 3.0
USB 3.0USB 3.0
USB 3.0
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
 
Usb
UsbUsb
Usb
 
Usb information
Usb informationUsb information
Usb information
 
Lenovo Consumer
Lenovo ConsumerLenovo Consumer
Lenovo Consumer
 
Lenovo Consumer MSI
Lenovo Consumer MSILenovo Consumer MSI
Lenovo Consumer MSI
 
celular Intrínsecamente Seguro : ADVANTAGE 1.0 ZONA 1
celular Intrínsecamente Seguro : ADVANTAGE 1.0 ZONA 1celular Intrínsecamente Seguro : ADVANTAGE 1.0 ZONA 1
celular Intrínsecamente Seguro : ADVANTAGE 1.0 ZONA 1
 
Lenovo S10-3
Lenovo S10-3Lenovo S10-3
Lenovo S10-3
 
Secudrive
SecudriveSecudrive
Secudrive
 
Windows Operating System
Windows Operating SystemWindows Operating System
Windows Operating System
 
Beagle board101 esc-boston-2009b
Beagle board101 esc-boston-2009bBeagle board101 esc-boston-2009b
Beagle board101 esc-boston-2009b
 
USB Hacking - LearnDay@Xoxzo #11
USB Hacking -  LearnDay@Xoxzo #11USB Hacking -  LearnDay@Xoxzo #11
USB Hacking - LearnDay@Xoxzo #11
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
 
Wireless usb
Wireless usbWireless usb
Wireless usb
 
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
 

Recently uploaded

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Recently uploaded (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

USB Defender Overview

  • 2.  With the announcement of "BadUSB" in 2014, the world learned that billions of our trusted USB devices are vulnerable to reprogramming.  BadUSB and USB Trojan attack platforms place the malware in the device’s USB controller code, where it is invisible to virus protection software.  The mission of USB Defender is to eliminate the USB security threats that cannot be stopped by virus scanning software in a way that is compatible with USB's "plug-and-play" design philosophy.  We will deliver USB Defender technology in three product forms: chips, single port dongle, and multiport USB hubs.  The core element of USB Defender is protected under a 2014 patent. Motivation
  • 3. Everyone Knows there is an Issue Scott Adam’s Dilbert
  • 4.  Problem #1 USB devices can be reprogrammed.  BadUSB is “undetectable and unfixable” – Forbes  Problem #2 A reprogrammed USB device can compromise your computer.  USB drives can be reprogrammed to silently infect computers – PC World  The convenience of USB Plug-and-Play made it vulnerable from the start.  USB Devices are computers that self-identify, can lie, and can change their identity over time.  Problem #3 “off the shelf” USB virus creation platforms are available.  Hak5’s Bash Bunny and Rubber Ducky The Problem No known protection strategy.
  • 5.  Market Size: $4.9 Billion:  Estimates based on 2 Billion Personal Computers in use (2015) Forrester Research  1.2 Billion Hub Market (3% of PCs, using a $20 price)  1.2 Billion Dongle Market (6% of PC users using a $10 price)  2.5 Billon PC / USB Docking station market (1% of PCs, using a $125 price) Opportunity
  • 6.  Adapt-IP:  Founded October 2009  Objective:  Use HW High Level Synthesis design to create new products  Initial Product Focus: USB, 802.11ah, H.265 video encoding  USB Defender:  Spun out as separate company Oct 2015  Created as pure play that focused on USB security  Strategy: effective monetization of USB Defender value Company History
  • 7.  Staffing  All original designers are still involved  Technology:  USB 2.0, USB 3.0, USB Defender  Prototype:  FPGA-based 3 Port USB 2.0 USB Defender Hub Company Status
  • 8.  Straff Wentworth, Founder and CEO  VP of USB Products at Adapt-IP and VP of Engineering PublishOne.  Director of Core IRIX for SGI and Cray Research Teams.  Mike Kentley, CTO  USB Domain expert.  Michael McNamara, Founder and Investor  Executive team member of three successful high tech exits, including IPO (Verisity Ltd)  CEO of Adapt-IP.  John Sanguinetti, Chairman  Founder of two successful startups, investor in dozens more. Team Team Link
  • 9. USB Defender * An all hardware / no-CPU USB firewall * Deep packet inspection at speed * Allow or disallow any operation * Same production costs * Better protection than USB-C Authentication Productization Options  Secure Hub  Secure KVM switch  Secure Dongle Our Solution USB Defender Product Family Defended port Extension port Defended port Defended port USB Ports protected with USB Defender Video: DemoVideo: The USB Security Threat
  • 10.  Push hard on web presence (LinkedIn, Facebook, YouTube, Google)  Focus on the Consumer Market:  They do not have IT security administrators to protect them.  They understand that USB has security threats and are wanting a solution.  USB defender provides a simple UX. It just works.  There are protected ports and extension ports.  Use Kickstarter to promote company and USB Defender concept.  Partner with an existing consumer brand.  Work with USB manufacturers to create effective giveaway programs. Marketing Strategy
  • 11. Sample Giveaway for Kingston The back side will have information about USB Defender
  • 12. USB Defender Prototype  USB Defender Technology:  USB 2.0, USB 3.0  PHY: ULPI, UTMI  USB Defender Prototype:  Xilinx Artix7 75T, 25K LUTs used  USB 2.0, ULPI (Microchip USB3340)  Hub: up port USB-C, 3 Type-A down ports  Board Powered via USB or 5V supply  Board Dimensions: 3.15 in x 2.1 in
  • 13.  Primary Product Features:  Protection from BadUSB Virus – USB devices are protected from reprogramming  Protection from USB Trojan Virus -- Dedicated ports or dynamic ports  Dedicated ports for keyboard, mouse, and mass storage; or  Ports accept keyboard, mouse, and mass storage, but once device is accepted it cannot change.  Optional Product Features:  Protection from hijacked keyboard or mouse  Bluetooth enabled proximity detection  Protection from alternate system boot  Trojan Boot and boot from memory stick blocked  Protection from autorun of programs  Prevent autorun.inf Demo of USB Defender USB Defender Technology Productization Options USB Defender Hub
  • 14. USB Defender email us: info@usb-defender.com Learn More Protecting you from USB based attacks
  • 15. USB Defender A bit more detail
  • 16.  USB Trojan attacks can only be stopped by active monitoring.  USB Defender is an all hardware solution:  It allows the data I/O to operate at speed. It cannot be hacked.  USB defender provides a simple User Experience (UX).  USB virus protection software is very complex to use.  USB Defender provides a simple UX. Plug it in and you are protected.  A software solution cannot provide a uniform USB protection experience across:  PC / Workstations, Hubs, and Docking Stations.  USB Defender can provide a uniform USB protection experience.  USB Defender protects your devices when plugged into a foreign system:  USB sticks can be protected by a USB Dongle. Why is USB Defender the right USB choice?
  • 18.  USB Common Criteria  Mitigates USB Trojan attacks via tamper resistance, lab testing, and certification  FIPS 140-2 Level 2+  Mitigates USB Trojan attacks via tamper resistance and validation in NTIS labs  USB Type-C Authentication  Mitigates USB Trojan attacks via tamper resistance and secure validation  USB device management software  Mitigates USB Trojan attacks by limiting:  Which workstations (USB ports) can connect to USB devices  Which devices (manufacturer, product ID) are allowed to connect Overview of USB Trojan Mitigation Methods
  • 19.  Security standards were in place before 2014 that would have prevented BadUSB  2001 – FIPS 140-2 Level 2  2007 -- USB Common Criteria Published (est)  2010 – NSA – enterprise network USB memory stick detection & management (opensource)  2012 -- Semantic & IronKey – Enterprise management of USB device access  But USB security standards were not adopted by USB manufacturers  Increased complexity and costs limited market adoption of security standards  We estimate that security complying devices represent less than 1% of the market BadUSB should have been a non-event
  • 20.  USB Type-C Power Cable issues are being resolved without Type-C Authentication  In 2015 and 2016 the market experienced numerous bad power cable issues.  Amazon and others took action.  They now sell only USB-IF certified cables -- which do not include Type-C Authentication  The market has accepted the USB-IF logo as trustworthy indicator  If the market is satisfied with the safety of regular USB-IF certified cables, will consumers really pay more for cables with Type-C Authentication?  History has shown that consumers value price over security  Type-C Authenticated cables and devices will be more expensive.  Conclusion / USB Type-C Authentication Market Adoption Projection  Type-C Authentication will have a market adoption profile similar to other USB Security standards.  An aggressive estimate is that Type-C Authentication will capture 3% of the USB device market. Will USB Type-C Authentication solve things? We think not