SlideShare a Scribd company logo
1 of 11
Pro-active behavior-based antivirus system of new
             generation - Smart UAC




                                       IT
Project description
•   The presence of anti-virus technologies responsive to new threats is a critical factor in
    the defense and sovereignty of the state. Traditional antivirus systems do not manage
    to update the databases in time, because thousands of new threats appear every day.
•   Moreover, such software entrusts a decision-making process entirely to the user – the
    weakest part in the security system.
•   The project Smart UAC is aimed to provide users with an antivirus solution that finally
    is able to prevent virus epidemic, without waiting for database updates, and not
    putting the responsibility of decision-making on the user.
•   Smart UAC is antivirus system of new generation, which combines the best aspects of
    existing methods: behavior-based analysis and traces-based analysis.
Proven advantages of the
    technology over main competitors
•   Due to the tests conducted in Security Stronghold laboratory by our virus analysts,
    researches of users’ focus groups and online users testing we can say that the main
    advantage of Smart UAC is the level of protection, the ability to fight against
    unknown threats and to prevent virus epidemics in a short time (due to behavioral
    techniques and instantly transmission of information about the threat to their
    copies worldwide).
•   Another advantage is complex product offer: antivirus, cyber threats protection,
    protection against Trojans, content filtering and graphical analysis.
Expected advantages of the
    technology over main competitors
•   It takes the user’s psychology into account.
•   It is able to educate itself through the user’s choices.
•   Less involvement of the user into the process leads to the automatic scanning of
    the intercepted processes with the use of the large database of already known
    threats.
Current R&D Status
•   Beta version of the software with basic functionality (antivirus, cyber threats protection,
    protection against Trojans) is ready and tested by 5K users.
•   The Company is developing decision making and content filtering modules. The software is
    constantly being improved.
•   Feedback from users and from reputable publications has been received.
•   In the near future: full completion of the functional of anti-virus system; release of Pro,
    Enterprise and Free versions; active patenting; carrying out the expanded advertising
    campaign; active sales.
•   Has got 2 patents (probabilistic antivirus analysis of objects), 1 patent
    application filed (the extraction device of the stable vectors of features).
    The company plans patenting abroad in 2013-2014. Innovations are also
    protected in the know-how mode.
The Market
•   Antivirus market (estimated at $17B) is very competitive. More than thousand
    companies produce antivirus solutions for the wide range of different consumers.
    40% of the market consist of free security related products.
•   The world antivirus market grows at the rate of 10-15% a year. The Russian market
    grows 25% every year. Due to relatively unused potential of the large working
    applications and increase in the complexity of hackers attacks there is a wide
    range of opportunities for the involvement in this market in a medium and long-
    term perspective.
•   Popular traditional antiviruses are: Kaspersky Internet Security, Norton Antivirus,
    Avast Pro Antivirus, McAfee Antivirus and Eset Nod32 Antivirus   .
Project details
Team/Company
•   The team of 16 is led by Konstantin Artemyev, CEO. 8-years’ experience. Graduate of
    Astrakhan State Technical Univ. (ASTU), Automated Process Control System (APCS).
    Valeriy Laptev, Business Dev. 20-years’ experience at ASTU. PhD, associate prof. of
    Automated systems of information control and processing chair.
•   The company is focused on protecting computers from malicious programs like
    viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online
    threats. Its products are intended both for home and corporate users.
•   The final product is Antivirus software licenses, SaaS service. The commercialization
    directions are: free download with paid updates; OEM-sales through integrator-
    companies; freemium; offline sales.
•   Since May, 2009 Security Stronghold company is the official partner of Intel®
    corporation
Project manager
•   Konstantin Artemyev – the sole proprietor, the head of team and
    the general director of Security Stronghold Company. Experience of
    business activity - 8 years.
•   Scientific activity: winner of the competition "Conference of Young
    Scientists on Information Search", Taganrog 2008; author of several
    scientific publications.
•   Role in team: CEO, marketing, advertizing, communications with
    partners, system architecture, design of technologies and
    processes, subsystems of artificial intelligence, the general project
    management.
•   The team also includes the Russian and foreign successful
    businessmen, top managers, high quality experts in the field of
    computer technologies.
Investment Opportunity
 Seeking $1.55M structured as $1.2M of equity investment, $.33M Skolkovo grant
  and $.02M other funds to complete collective intelligence functionality; to release
  alpha, beta and commercial version of the product (with integrated e-commerce
  eSellerate and Avangate systems); to begin sales.
Contacts
  Konstantin Artemyev, CEO
      +7 (903)347-4476
KonstantinArtemev@gmail.com
 www.securitystronghold.com

More Related Content

What's hot

Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
rajkumar jonuboyena
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15
Thomas McDonald
 
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
ijtsrd
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 

What's hot (20)

Healthcare application-security-practices-survey-veracode
Healthcare application-security-practices-survey-veracodeHealthcare application-security-practices-survey-veracode
Healthcare application-security-practices-survey-veracode
 
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
 
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
Leaders of Gartner Magic Quadrant 2014 for Secure Web Gateways
Leaders of Gartner Magic Quadrant 2014 for Secure Web GatewaysLeaders of Gartner Magic Quadrant 2014 for Secure Web Gateways
Leaders of Gartner Magic Quadrant 2014 for Secure Web Gateways
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
 
Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking: Banishing FUD With Structure and NumbersApplication Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
 
Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills Audit
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurity
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
 
Assessing Risk: Developing a Client/Server Security Architecture,
 Assessing Risk: Developing a Client/Server Security Architecture,  Assessing Risk: Developing a Client/Server Security Architecture,
Assessing Risk: Developing a Client/Server Security Architecture,
 
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of Globalization
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 

Similar to Security stronghold presentation smart uac

Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentation
Darshan Khant
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
Turvallisuus2013
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
Anti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsAnti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documents
UltraUploader
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
tswong
 

Similar to Security stronghold presentation smart uac (20)

Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentation
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
Highlights from the TechSoup Catalog [webinar slides]
Highlights from the TechSoup Catalog [webinar slides]Highlights from the TechSoup Catalog [webinar slides]
Highlights from the TechSoup Catalog [webinar slides]
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Lastline Case Study
Lastline Case StudyLastline Case Study
Lastline Case Study
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Anti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsAnti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documents
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
Knowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrixKnowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrix
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Boosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeBoosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk Imperative
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake final
 
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
 
G01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protectionG01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protection
 

More from w_harker

Securitystronghold presentation-antivirus
Securitystronghold presentation-antivirusSecuritystronghold presentation-antivirus
Securitystronghold presentation-antivirus
w_harker
 
Security stronghold antivirus
Security stronghold antivirusSecurity stronghold antivirus
Security stronghold antivirus
w_harker
 
E trike project
E trike projectE trike project
E trike project
w_harker
 
E trike project
E trike projectE trike project
E trike project
w_harker
 

More from w_harker (6)

Securitystronghold presentation-antivirus
Securitystronghold presentation-antivirusSecuritystronghold presentation-antivirus
Securitystronghold presentation-antivirus
 
Security stronghold antivirus
Security stronghold antivirusSecurity stronghold antivirus
Security stronghold antivirus
 
E trike project eng
E trike project engE trike project eng
E trike project eng
 
E trike project
E trike projectE trike project
E trike project
 
E trike project
E trike projectE trike project
E trike project
 
презентация Smart uac
презентация Smart uacпрезентация Smart uac
презентация Smart uac
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Security stronghold presentation smart uac

  • 1. Pro-active behavior-based antivirus system of new generation - Smart UAC IT
  • 2. Project description • The presence of anti-virus technologies responsive to new threats is a critical factor in the defense and sovereignty of the state. Traditional antivirus systems do not manage to update the databases in time, because thousands of new threats appear every day. • Moreover, such software entrusts a decision-making process entirely to the user – the weakest part in the security system. • The project Smart UAC is aimed to provide users with an antivirus solution that finally is able to prevent virus epidemic, without waiting for database updates, and not putting the responsibility of decision-making on the user. • Smart UAC is antivirus system of new generation, which combines the best aspects of existing methods: behavior-based analysis and traces-based analysis.
  • 3. Proven advantages of the technology over main competitors • Due to the tests conducted in Security Stronghold laboratory by our virus analysts, researches of users’ focus groups and online users testing we can say that the main advantage of Smart UAC is the level of protection, the ability to fight against unknown threats and to prevent virus epidemics in a short time (due to behavioral techniques and instantly transmission of information about the threat to their copies worldwide). • Another advantage is complex product offer: antivirus, cyber threats protection, protection against Trojans, content filtering and graphical analysis.
  • 4. Expected advantages of the technology over main competitors • It takes the user’s psychology into account. • It is able to educate itself through the user’s choices. • Less involvement of the user into the process leads to the automatic scanning of the intercepted processes with the use of the large database of already known threats.
  • 5. Current R&D Status • Beta version of the software with basic functionality (antivirus, cyber threats protection, protection against Trojans) is ready and tested by 5K users. • The Company is developing decision making and content filtering modules. The software is constantly being improved. • Feedback from users and from reputable publications has been received. • In the near future: full completion of the functional of anti-virus system; release of Pro, Enterprise and Free versions; active patenting; carrying out the expanded advertising campaign; active sales. • Has got 2 patents (probabilistic antivirus analysis of objects), 1 patent application filed (the extraction device of the stable vectors of features). The company plans patenting abroad in 2013-2014. Innovations are also protected in the know-how mode.
  • 6. The Market • Antivirus market (estimated at $17B) is very competitive. More than thousand companies produce antivirus solutions for the wide range of different consumers. 40% of the market consist of free security related products. • The world antivirus market grows at the rate of 10-15% a year. The Russian market grows 25% every year. Due to relatively unused potential of the large working applications and increase in the complexity of hackers attacks there is a wide range of opportunities for the involvement in this market in a medium and long- term perspective. • Popular traditional antiviruses are: Kaspersky Internet Security, Norton Antivirus, Avast Pro Antivirus, McAfee Antivirus and Eset Nod32 Antivirus .
  • 8. Team/Company • The team of 16 is led by Konstantin Artemyev, CEO. 8-years’ experience. Graduate of Astrakhan State Technical Univ. (ASTU), Automated Process Control System (APCS). Valeriy Laptev, Business Dev. 20-years’ experience at ASTU. PhD, associate prof. of Automated systems of information control and processing chair. • The company is focused on protecting computers from malicious programs like viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online threats. Its products are intended both for home and corporate users. • The final product is Antivirus software licenses, SaaS service. The commercialization directions are: free download with paid updates; OEM-sales through integrator- companies; freemium; offline sales. • Since May, 2009 Security Stronghold company is the official partner of Intel® corporation
  • 9. Project manager • Konstantin Artemyev – the sole proprietor, the head of team and the general director of Security Stronghold Company. Experience of business activity - 8 years. • Scientific activity: winner of the competition "Conference of Young Scientists on Information Search", Taganrog 2008; author of several scientific publications. • Role in team: CEO, marketing, advertizing, communications with partners, system architecture, design of technologies and processes, subsystems of artificial intelligence, the general project management. • The team also includes the Russian and foreign successful businessmen, top managers, high quality experts in the field of computer technologies.
  • 10. Investment Opportunity  Seeking $1.55M structured as $1.2M of equity investment, $.33M Skolkovo grant and $.02M other funds to complete collective intelligence functionality; to release alpha, beta and commercial version of the product (with integrated e-commerce eSellerate and Avangate systems); to begin sales.
  • 11. Contacts Konstantin Artemyev, CEO +7 (903)347-4476 KonstantinArtemev@gmail.com www.securitystronghold.com