Vision Meeting
June 9th 2020
Our mission is to visualize the world’s data and make it universally understandable
Today, We're going to align the Vision
Virtual Intelligence for Big Data & IoT
The Market
Enterprises are engaging in Cyberwafare
There is an invisible war that is being battled everyday
There is a cyber attack every 39 seconds
In 2018 hackers stole half a billion personal records
Source : cybintsolutions.com
The average cost of a data breach in 2020 will exceed $150 million
Approximately $170 Billion is expected to be spent globally on cybersecurity by 2021
Source : cybintsolutions.com
By 2020 there will be roughly 200 billion connected devices
43% of cyber attacks target small businesses
Source : cybintsolutions.com
43% of cyber attacks target small businesses
Source : www.fundera.com
60% of those go out of business after a Cyberattack
Source : www.fundera.com.com
Cybersecurity Market Size
2019 = $124 billion
2022 = $170.4 billion
Growing 12-15% YoY
3.5 Million
Cybersecurity Job Openings by 2021
So why are the current Solutions Failing?
Security Operations Centers
A Security Operations Center is a dedicated site where enterprise information systems (web sites, applications, databases, data centers and servers, networks, desktops and other endpoints) are monitored, assessed, and defended.
Security Operations Centers
1/1000 companies have a SOC
Average Cost of a SOC is $2.5M (CapEx)
Scaling depends on availble physical office space
(52% of Fortune 500 have a SOC)
Who works in the Security Operations Center?
Roles in SOC
Text
Security Analyst
(FrontLine Soldiers)
Security analysts are typically the first responders to incidents. They are the soldiers on the front lines fighting against cyber attacks and analyzing threats.
Text
Security Engineers
(Engineers & Architects)
Security engineers are responsible for maintaining tools, recommending new tools, and updating systems
Work with development operations teams to ensure that systems are up to date
Security Manager
(The Boss)
A security manager is responsible for overseeing operations as a whole. They are in charge of managing team members and coordinating with security engineers.
They serve as the direct boss to all members of the SOC team.
CISO
(The Executive)
The chief information security officer (CISO) is responsible for defining and outlining the organization’s security operations.
Typically, a CISO reports directly to the CEO and has direct contact with all of upper management.
Current Tools being used in a SOC
1)
2)
3)
Internet of things (IoT)
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
Physical SOCs
Physical Operations Centers are too expensive
Lack of talent
Legacy tools cant handle the volume of data
Analysts need to be on-premise in physical SOC
We are going to provide a simplified solution for the IoT security & managment problems for SOCs
Using AI and Mixed Reality
Virtual Command 3D
3Data Operations Center
June 10th 2019
3Data Analytics
Virtual Command
How can we simplify the communication of our offering?
What if we could turn frontline analysts into Superheros?
Meet Apollo
Your AI Security Assistant
Virtual assistant which uses voice response technology to better manage network and cybersecurity events
Codename: Apollo
Prediction, Prevention, Detection, Response, Monitoring.
Machine learning for Network Protection
Machine learning for User Behavior
Machine learning for Object Detection
ML for Network Protection
Machine learning for User Behavior
Machine learning for Object Recognition
Run correlations across the physical and the Digital
Go to Market
Apollo Engine
3D Floor Plans
Network Topology
MV Cameras
Cisco Meraki Example
Integrate with Additional Vendors
Virtual Intelligence for Big Data & IoT
Wallon
Tyler
Aaron
Greg
Sean
CTO
VP of Sales
Zach
Alex
COMMUNICATIONS CHANNELS