metaforic acquisition
play

Metaforic Acquisition Uniquely position INSIDE Secure on Mobile - PowerPoint PPT Presentation

Metaforic Acquisition Uniquely position INSIDE Secure on Mobile Security April 7, 2014 1 1 INVESTORS PRESENTATION SEPTEMBER 2012 Metaforic Acquisition, April 2014 Disclaimer This communication does not constitute an offer to purchase or


  1. Metaforic Acquisition Uniquely position INSIDE Secure on Mobile Security April 7, 2014 1 1 INVESTORS PRESENTATION – SEPTEMBER 2012 Metaforic Acquisition, April 2014

  2. Disclaimer This communication does not constitute an offer to purchase or exchange or the solicitation of an offer to sell or exchange any securities of INSIDE Secure. This communication contains certain statements that are neither reported financial results nor other historical information and other statements concerning INSIDE Secure. These statements may include financial projections and estimates and their underlying assumptions, statements regarding plans, objectives and expectations with respect to future operations, events, products and services and future performance. Forward-looking statements are generally identified by the words "expects", "anticipates", "believes", "intends", "estimates" and similar expressions. These and other information and statements contained in this communication constitute forward- looking statements for purposes of applicable securities laws. Although management of the company believes that the expectations reflected in the forward looking statements are reasonable, investors and security holders are cautioned that forward-looking information and statements are subject to various risks and uncertainties, many of which are difficult to predict and generally beyond the control of the company, that could cause actual results and developments to differ materially from those expressed in, or implied or projected by, the forward-looking information and statements, and the company cannot guarantee future results, levels of activity, performance or achievements. Factors that could cause actual results to differ materially from those estimated by the forward-looking statements contained in this communication include, but are not limited to: trends in semiconductor and wireless communication markets; the company's ability to develop new technology and the effects of competing technologies developed and expected intense competition generally in the companies' main markets; profitability of expansion strategy; challenges to or loss of intellectual property rights; ability to establish and maintain strategic relationships in its major businesses; ability to develop and take advantage of new products and software; future acquisitions and investments; the ability of the company's to integrate acquired businesses, activities and companies according to expectations; the ability of the company to achieve the expected synergies from acquisitions; and changes in global, political, economic, business, competitive, market and regulatory forces. Moreover, neither the company nor any other person assumes responsibility for the accuracy and completeness of such forward-looking statements. The forward-looking statements contained in this communication speak only as of the date of this communication and the company are under no duty, and do not undertake, to update any of the forward-looking statements after this date to conform such statements to actual results, to reflect the occurrence of anticipated results or otherwise except as otherwise required by applicable law or regulations. 2 2 INVESTORS PRESENTATION – SEPTEMBER 2012 Metaforic Acquisition, April 2014

  3. Agenda Transaction Highlights Metaforic Overview lNSIDE Secure: Strategic Focus Q&A 3 3 INVESTORS PRESENTATION – SEPTEMBER 2012 Metaforic Acquisition, April 2014

  4. Metaforic acquisition • Provides access to a key technology for enabling cloud-based mobile payments security with Host Card Emulation (HCE) • Complements existing INSIDE Secure enterprise secure access (VPN) and content protection (DRM) solutions with mobile payments, with cross-selling opportunities • INSIDE paid $11.6 million in cash in consideration for the shares with a potential earn-out of up to US$4.5 million. • A venture capital-backed company, Metaforic has headquarters in Scotland and operations in Silicon Valley (California). • The Supervisory Board of INSIDE Secure has unanimously approved this transaction, aligned with INSIDE Secure’s strategy 4 4 INVESTORS PRESENTATION – SEPTEMBER 2012 Metaforic Acquisition, April 2014

  5. Highly strategic acquisition • Uniquely positions INSIDE Secure as the only company able to provide security solutions for enterprise secure access, digital entertainment and financial services markets: the 3 main market drivers for mobile security; • Extends INSIDE Secure’s lead in providing the most comprehensive system solution (hardware, software and IP) offering in the security industry: • Supports INSIDE Secure’s vision of security convergence roadmap within smartphone and is critical to overcome upcoming architectural and certification discontinuities in mobile security; 5 5 INVESTORS PRESENTATION – SEPTEMBER 2012 Metaforic Acquisition, April 2014

  6. Agenda Transaction Highlights Metaforic Overview lNSIDE Secure: Strategic Focus Q&A 6 6 INVESTORS PRESENTATION – SEPTEMBER 2012 Metaforic Acquisition, April 2014

  7. Metaforic Overview • Leader in security solutions through obfuscation Award winning expertise technologies and encryption-related security software • Provides leading self-defending software security infrastructure • Owns critical technologies to reinforce security of Host Card Emulation (HCE) based mobile payments, wallets and mobile banking applications • A wide range of award-winning software products • Robust IP portfolio, with multiple patents granted & pending, 100+ person-years R&D • Metaforic customers includes e.g. HBO, BBC (for entertainment DRM), Good technology (BYOD enterprise security) , Autodesk in CAM,… • Expert teams in UK and Silicon Valley (California) 7 7 INVESTORS PRESENTATION – SEPTEMBER 2012 Metaforic Acquisition, April 2014

  8. Metaforic’s products Metaforic Metaforic Metaforic Metaforic Core Concealer Authenticator White-Box-Crypto • Turns apps into • Protects application • Creates software-to- • Provide a Software operationally identical, logic from being easily software trust, Cryptographic self-defending versions understood, altered or validating external framework extracted functions, processes • Provides tamper • Protects Data at rest, or servers proofing, tamper • Hampers any hackers Data in transit and policies, with execution attempt to understand • Challenges response Data in use trust and reporting application (Code from Source capabilities Obfuscation and source level) and/or Data • Protects IP • Holds Data within app in protected crypto algorithms 8 8 INVESTORS PRESENTATION – SEPTEMBER 2012 Metaforic Acquisition, April 2014

  9. Key Technology for Cloud-Based/HCE Mobile Payment Host Card Emulation: With Metaforic, INSIDE Secure reinforce security of what is it ? Cloud-Based/HCE Mobile Payment • It allows for contactless payments and other services to be made directly between consumers' banks mobile application and retailers point-of-sale using NFC technology. • It allows the sensitive data used to facilitate transactions to be stored on, and accessed from, cloud servers rather than a mobile device and without the use of a secure element or a SIM card. • Technology backed by Visa and MasterCard in February 2014 Metaforic’s technologies i.e. software obfuscation and White- Box-Crypto are critical to reinforce security of mobile payment application running on the smartphone (Host CPU) 9 9 INVESTORS PRESENTATION – SEPTEMBER 2012 Metaforic Acquisition, April 2014

  10. Metaforic in within INSIDE Secure: Cross selling opportunities • Protecting downloadable DRM clients • Hardened Downloadable VPN on Mobile & Embedded • Protecting data flow through a Codec for DRM • Security Infrastructure for Payment Applications • Security & Cryptography for Android 4.4 HCE NFC payments • Security Infrastructure for BYOD 10 10 INVESTORS PRESENTATION – SEPTEMBER 2012 Metaforic Acquisition, April 2014

  11. INSIDE Most Comprehensive Security System Solution 11 11 INVESTORS PRESENTATION – SEPTEMBER 2012 Metaforic Acquisition, April 2014

  12. Agenda Transaction Highlights Metaforic Overview lNSIDE Secure: Strategic Focus Q&A 12 12 INVESTORS PRESENTATION – SEPTEMBER 2012 Metaforic Acquisition, April 2014

  13. INSIDE Secure’s strategic execution plan over the last 18 months • Acquisition of Metaforic marks another step towards refocus of INSIDE Secure, after strategic shift initiated with the acquisition of ESS • Consistent with INSIDE Secure’s roadmap, to offer a comprehensive range of security solutions, addressing growing market needs Dec.12 Mar.13 Jul.13 Oct.13 March 14 April 14 WW Acquisition ESS integration & Operational INTEL NFC Acquiring Reorganization of ESS Stage 2 Reshaping in two License Metaforic plan launch of reorganization Business announcement plan finalized divisions : Mobile Security Secure Transactions 13 13 INVESTORS PRESENTATION – SEPTEMBER 2012 Metaforic Acquisition, April 2014

Recommend


More recommend