Vision Meeting

June 9th 2020

Our mission is to visualize the world’s data and make it universally understandable

Today, We're going to align the Vision

Virtual Intelligence for Big Data & IoT

The Market

Enterprises are engaging in Cyberwafare

 

There is an invisible war that is being battled everyday

There is a cyber attack every 39 seconds

In 2018 hackers stole half a billion personal records

Source : cybintsolutions.com

The average cost of a data breach in 2020 will exceed $150 million

 Approximately $170 Billion is expected to be spent globally on cybersecurity by 2021

Source : cybintsolutions.com

By 2020 there will be roughly 200 billion connected devices

43% of cyber attacks target small businesses

Source : cybintsolutions.com

43% of cyber attacks target small businesses

Source : www.fundera.com

60% of those go out of business after a Cyberattack

Source : www.fundera.com.com

Cybersecurity Market Size

2019 = $124 billion

2022 = $170.4 billion

Growing 12-15% YoY

3.5 Million

 

Cybersecurity Job Openings by 2021

So why are the current Solutions Failing?

 

Security Operations Centers

 

A Security Operations Center is a dedicated site where enterprise information systems (web sites, applications, databases, data centers and servers, networks, desktops and other endpoints) are monitored, assessed, and defended.

 

Security Operations Centers

1/1000 companies have a SOC

Average Cost of a SOC is $2.5M (CapEx)

Scaling depends on availble physical office space

(52% of Fortune 500 have a SOC)

Who works in the Security Operations Center?

  1. 1. Security  Analyst
  2.  
  3. 2. Security Engineer
  4.  
  5. 3. Security Manager
  6.  
  7. 4. Chief Information Security Officer

Roles in SOC

Text

 Security  Analyst

(FrontLine Soldiers)

  •  

Security analysts are typically the first responders to incidents. They are the soldiers on the front lines fighting against cyber attacks and analyzing threats.

 

  •  

Text

 Security  Engineers

(Engineers & Architects)

 

Security engineers are responsible for maintaining tools, recommending new tools, and updating systems

Work with development operations teams to ensure that systems are up to date

  •  

 Security  Manager

(The Boss)

  •  

A security manager is responsible for overseeing operations as a whole. They are in charge of managing team members and coordinating with security engineers.

They serve as the direct boss to all members of the SOC team.

  •  

CISO

(The Executive)

  •  

The chief information security officer (CISO) is responsible for defining and outlining the organization’s security operations.

Typically, a CISO reports directly to the CEO and has direct contact with all of upper management.

 

  •  

Current Tools being used in a SOC

  •  

1)

2)

3)

Internet of things (IoT)

The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

Physical SOCs

Physical Operations Centers are too expensive

 

Lack of talent

 

Legacy tools cant handle the volume of data

 

Analysts need to be on-premise in physical SOC

We are going to provide a simplified solution for the IoT security & managment problems for SOCs

Using AI and Mixed Reality

Virtual Command 3D

  • Building schematics
  • Weather conditions
  • Live video feeds
  • Data analytics
  • Maps
  • Fast Communication
  • Multiplatform support

3Data Operations Center

June 10th 2019

3Data Analytics

Virtual Command

  • 3D Graph showing real-time network traffic flow
     
  • Machine Learning that scores potential threats based on Anomaly

 

  • Drill down to further inspect

 

  • Easy and Fast to communicate remotely

How can we simplify the communication of our offering?

What if we could turn frontline analysts into Superheros?

Meet Apollo

Your AI Security Assistant 

Virtual assistant which uses voice response technology to better manage network and cybersecurity events

Codename: Apollo

Prediction, Prevention,  Detection, Response, Monitoring.

Machine learning for Network Protection

Machine learning for User Behavior

Machine learning for Object Detection

  • Regression to predict the network packet parameters and compare them with the normal ones; (Historical data Analysis)
  •  
  • Classification to identify different classes of network attacks such as scanning and spoofing;
  •  
  • Clustering for forensic analysis.

ML for Network Protection

  • Regression to detect anomalies in User actions (e.g., login in unusual time);
  •  
  • Classification to group different users for peer-group analysis;
  •  
  • Clustering to separate groups of users and detect outliers.
  •  
  •  

Machine learning for User Behavior

  • Object detection is the process of finding instances of objects in images
  •  
  • Object detection is a subset of object recognition, where the object is not only identified but also located in an image

Machine learning for Object Recognition

Run correlations across the physical and the Digital

Go to Market

Apollo Engine
 

3D Floor Plans

Network Topology

MV Cameras

Cisco Meraki Example

Integrate with Additional Vendors

Virtual Intelligence for Big Data & IoT

Wallon

Tyler

Aaron

Greg

Sean

CTO

VP of Sales

Zach

Alex

COMMUNICATIONS CHANNELS