Quarterly presentation Q Aug 2017

Similar documents
Quarterly presentation 30 November 2017

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED

OpenText Buys Guidance Software

Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16%

Interim Report Q2/2016 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware

Smart Payments. Generating a seamless experience in a digital world.

Managed Services Rely on us to manage your business services

FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates

A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY. Samu Konttinen, CEO Interim Results Q1 2017

Tech Data s Acquisition of Avnet Technology Solutions

Symantec and its partner community are securing the cloud generation, together

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

IDEX company presentation. January 2009

INVESTOR UPDATE SSH COMMUNICATIONS SECURITY Kaisa Olkkonen, CEO

Investor Presentation. February 2016

Micro Focus Partner Program. For Resellers

Revenues % % Gross operating margin % %

1-TIER AUTHORIZED INFORMATICA RESELLER (AIR)

Telio Holding ASA Q4 06 presentation

Cyber Security in Smart Commercial Buildings 2017 to 2021

The Power of Partnership

Acquisition of Fellesdata AS

F-Secure Corporation - Interim report Q2 2011

FileMaker Business Alliance. Program Guide

Asher Gahadoushi President. Robert Mykland Technology Advisor- Inventor

Identity and Authentication PKI Portfolio

Microsoft 365 Business FAQs

F-Secure Corporation Interim report Q4 2012

Make security part of your client systems refresh

Guide Series. How to upgrade to Microsoft Windows 10? Guide Series

Investor Overview 2018

Highlights 2014 Year of Ramp-Up

Interoute Acquisition Summary. February 26, 2018

DRAFT FOR DISCUSSION Crackle Russia Business Plan

Three Verticals, One Data Backup Solution: A Revolutionary Unified Approach to Data Protection

For personal use only

ASX IPO NOW LIVE. Key Points

Telio Holding ASA Q1 07 presentation. Oslo, May 4th, 2007

NCC Group plc. NCC Group plc Interim Results

MILITARY ANTI-TAMPERING SOLUTIONS USING PROGRAMMABLE LOGIC

SGS CYBER SECURITY GROWTH OPPORTUNITIES

How icims Supports. Your Readiness for the European Union General Data Protection Regulation

EB, Elektrobit Corporation Interim Report 2Q CEO Jukka Harju August 8, 2012

October 16, Q Investor Presentation Svenn-Tore Larsen, CEO Pål Elstad, CFO

F-SECURE FOR 30 YEARS FRONTRUNNER IN CYBER SECURITY. Samu Konttinen, CEO, F-Secure

Busting the top 5 myths of cloud-based authentication

Largest Latin American IT Services provider and an undisputed leader in systems integration, support and IT Outsourcing

I.T. Review & Recommendations

An insight into the IDP Group from Gemalto. Thorsten Krüger Sales Director DACH & CEE

Red Hat Acquisition of Qumranet Adds next generation virtualization capabilities. September 4, 2008

AIC (Advanced Industrial Computer) Inc. Company Profile stock code:3693

HALF YEAR RESULTS For the six months ended 31 December 2016

Security-as-a-Service: The Future of Security Management

University of Sunderland Business Assurance PCI Security Policy

PKI Credentialing Handbook

PERFORMANCE TECHNOLOGIES A.E. July 2016

Your network s path to its fiber future. Grow confidently with fiber solutions from an experienced partner

Conference call April 26, :00 / Helsinki 08:00 / New York 1 Nokia 2016 Q1 2018

Country Focus: USA +2.2% $43 5.7% Trillion 21.7% of the total global GDP 1 Government Spending on Infrastructure. 80% of GDP. 3% of GDP.

2-TIER AUTHORIZED INFORMATICA RESELLER PROGRAM GUIDE

2017 Q4 Earnings Conference Call

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise

Creating Trust in a Highly Mobile World

EBOOK The General Data Protection Regulation. What is it? Why was it created? How can organisations prepare for it?

Conference call July 26, :00 / Helsinki 08:00 / New York 1 Nokia 2016 Q2 2018

Accelerate Your Cloud Journey

How will cyber risk management affect tomorrow's business?

Singtel Investor Day Bill Chang, CEO, Group Enterprise and Country Chief Officer Singapore 13 June 2018

Patrick van der Griendt Atos International GSI SAP SAP HANA

Connecting Business Opportunities in A Better Way

Mobile World Congress Claudine Mangano Director, Global Communications Intel Corporation

We are Digital Transformakers

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

WELCOME TO F-SECURE S ANNUAL GENERAL MEETING

Total Cost of Ownership: Benefits of the OpenText Cloud

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

Natural Security Alliance

BIG DATA INDUSTRY PAPER

Telio Holding ASA Q3 07 presentation. Eirik Lunde, CEO Oslo, 8 November, 2007

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

Nokia Conference Call 1Q 2012 Financial Results

Enviro Technology Services Ltd Data Protection Policy

Certicom Security for Government Suppliers developing products to meet the US Government FIPS security requirement

TechValidate Survey Report: SaaS Application Trends and Challenges

Fiscal 2018 year end financial review and update. TSX-V: TMG November 2018

28 th Annual Roth Conference. March 14, 2016

COLUMBUS. Business Solutions. Cloud Unified Communications & Interoperability. Javier Pereira Director of Product Development November 2011

Conference call February 2, :00 / Helsinki 08:00 / New York 1 Nokia Q4 and FY 2016

Comodo HackerGuardian PCI Approved Scanning Vendor

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Why Use Cisco Network Storage Systems for Your Business

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

Microsoft Refurbisher Programs. Program Overview for MAR & RRP

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

Case No IV/M Schneider / AEG. REGULATION (EEC)No 4064/89 MERGER PROCEDURE. Article 6(1)(b) NON-OPPOSITION Date: 01/08/1994

Securing BYOD With Network Access Control, a Case Study

Google Inc net consolidated revenues: 27.2 billion euro

Investor conference 2017 Hong Kong

Annual General Meeting. A pioneer in technologies for Digital Radio and Smart Audio devices 9 th May 2017

Transcription:

Quarterly presentation Q2 2017 30 Aug 2017

Hiddn leading on technology since 1998 More than NOK 200m invested in R&D since 1998 Since 1998, more than NOK 200m has been invested in developing Hiddn's intellectual property. This investment has put the company in a unique position as no other company can provide the the market with similar products when it comes to safety Funded by demanding security and defence clients A significant part of Hiddn's R&D funding has been provided by institutions with strict safety requirements. Hiddn has obtained a unique position with national security agencies and defence clients in several European countries and in the US Hiddn s products provide unparalelled safety Repeat orders from customers show that many of these institutions and organisations still rely on and trust Hiddn products to secure and safeguard their data, proving that Hiddn still provides a unique and preferred product ~5000 units sold 1998 High Density Devices is founded 2002 $10m from the US DoD 2005 First product FIPS 140-2 lv. 3 certified 2007 First product NSM approved 2013 NBV contract signed 2016 SafeDisk NBV approved for level Confidential 2017 Hiddn IPO

Highlights in second quarter & subsequent events New CEO and new Board of Directors Strategy to also focus on the corporate and enterprise market Signed agreement to develop an ASIC-based crypto platform for Hiddn s products New USB hard drive (KryptoDisk) has passed final testing by NEMKO and will now become available for commercial sale Received a new patent to use smart phones as a platform for key handling and key transfer Sales channel expanded through acquisition of Finn Clausen Sikkerhetssystemer AS

Hiddn - market standard encryption, unique key handling Most companies utilise encryption for safety Google, Apple, Microsoft etc. use encryption algorithms for safety An encryption algorithm is a set of processes performed on data to hide it from unauthorised readers A unique key is used to "instruct" the encryption algorithm, and this key must be kept secret and safe Encryption algorithm (e.g. AES-256*) Unencrypted «Plaintext» We will close a $10bn deal tomorrow morning Encryption key Encrypted «Ciphertext» A45fd d!45c &dfxx4f33df 5»6&ed0dE 62{+\20%fdd dv$4sx/}ff31 Hiddn's technology keeps the encryption key safe Uses market standard AES-256 encryption Stores key separately when the device is off Transfers the key safely to the device upon use Keeps the key hidden whilst in use Hiddn implements AES with strong 256-bit encryption keys All products are FIPS-certified for proper implementation Hiddn uses tamper-proof smart cards for key storage This means the key can't be stolen whilst the device is off Hiddn s own IP enables safe key transfer from the smart card Two-factor authentication incl. a PIN-code adds extra security The key is used by a separate chip and is deleted on power-off This means the key can't be stolen whilst the device is in use Software encryption Low safety Often embedded in operating system Mass-market offering Hardware encryption Medium safety Stand-alone or embedded in device Corporate & enterprise markets Hiddn's technology Top-tier safety Stand-alone or embedded in device Historically used by government/military The key is stored on the computer, and is exposed whilst the device is in use The algorithm runs on the computer's operating system (e.g. Windows or Mac OS), borrowing computing power The key is stored on the computer, but is hidden whilst the device is in use The algorithm runs on dedicated hardware LEVEL OF SAFETY The key is stored on a separate smart card or other secure external token, and is hidden whilst the device is in use The algorithm runs on dedicated hardware *Advanced Encryption Standard with 256-bit encryption key length

Hiddn s position in the encryption landscape Hiddn s market position Current products in the Hiddn product portfolio Hiddn cocrypt/ USB disk Hiddn SafeDisk/ RAID Bootable USB hard drive cocrypt USB memory stick Level of safety Embedded Stand-alone SafeDisk laptop hard drive RAID server encryption Circle size indicates market presence Level of device integration Device protection Data-at-rest protection Embedded hard drives USB storage devices Software encryption solutions * Self-encrypting drives

From bespoke products to volume solutions BESPOKE SOLUTIONS MTM SOLUTIONS RETAIL SOLUTIONS VOLUME POTENTIAL Military & Government Corporate & Enterprise Military & Government Corporate & Enterprise Military & Government Corporate & Enterprise Retail customers Retail customers Retail customers UNIT COST MEMORY CHIP ASSEMBLY MEMORY CHIP ASSEMBLY CRYPTOCHIP (CORE IP) CRYPTOCHIP (CORE IP) CRYPTOCHIP (CORE IP) Bespoke products Low volume per order External components limiting margin potential Made-to-measure products Partnerships driving volumes Reduced external component unit cost OEM products Global PC/device market Pure sale of core IP 1998-2017 2017 - Onwards

Target markets are experiencing strong growth Total annual IT security spending at USD 86 bn in 2017 IT security spending Total endpoint security spending Data loss prevention spending At least USD 4.3 bn directly relevant to Hiddn's current product portfolio With the move to cloud computing, spending on endpoint security and data loss protection is rapidly growing both in enterprise and consumer segments Hiddn's business plan involves expanding Hiddn's offering along new dimensions, granting access to new IT security segments Three factors driving endpoint security spending USD bn USD bn USD bn 10,3% 7,8% 27 1,4 117 1,2 11,6% 100 1,0 86 10 2017 2019 2021 2015 2024 2017 2019 2021 Annual spending figures, Gartner Annual spending figures, Grand View Research Annual spending figures, Gartner IT security segments by annual spend** The move to cloud servers drives endpoint security need GDPR turns encryption into a must-have for corporates Encryption alternatives to major OS providers increasingly HW-based McKinsey estimates 71% of large enterprises will shift to off-premises cloud solutions by 2018, from 24% in 2015* Less control over servers and bring your own device -policies increases focus on securing endpoint devices EU s GDPR directive, active from May 2018, fines corporates for loss of individual's data with the higher of 4% of annual turnover or 20m Loss of just one single laptop may trigger a massive corporate fine Encryption specifically named as an eligible preventive measure Major OS providers (Microsoft, Apple) embed encryption tools in their software, squeezing out smaller software encryption players Customers seeking alternatives or supplements to BitLocker and FileVault will increasingly need to find this in hardware encryption 2017, USD bn Consulting IT Outsourcing Implementation Firewalls Others 15,5 9,3 16,6 22,6 18,1 1 3,3 Data loss prevention Endpoint protection platforms (enterprise only) * IT as a service: From build to consume; McKinsey, Sep. 16 ** Forecast Analysis: Information Security, Worldwide; Gartner, Jun. 17

Financials first half 2017 Revenues and operating expenses H1 2017 Half-yearly revenues NOK million 3,2 1,2 2,0 Finn Clausen Sikkerhetssystemer Hiddn Solutions Half-yearly Opex NOK million R&D Payroll 24,5 4,2 9,7 6,3 4,3 Other opex One-time expenses R&D and recruitment driving costs Revenues of 3,2 million Revenues from Finn Clausen Sikkerhetssystemer from June 1st affecting revenue figures positively Payroll & management-for-hire expenses of 9,7 million Payroll expenses have increased due to new hires in the R&D team, and temporary hiring of central staff functions R&D expenses of 4,2 million R&D spending has been accelerated in 2017, and is primarily comprised of R&D consultancy fees and equipment for Hiddn's in-house research lab Other operating expenses of 6,3 million Other operating expenses have risen as a consequence of becoming a listed company, as well as a G&A increase stemming from organisational growth One-time expenses of 4,3 million One-time expenses include legal fees, listing fees, M&A fees etc. from the listing of Hiddn on the Oslo Stock Exchange