Roland J. Bopp / March 16, 2016 - Deutsche Messe...
Transcript of Roland J. Bopp / March 16, 2016 - Deutsche Messe...
1
AGENDA
Roland J. Bopp / March 16, 2016www.securecommobile.com
INTRODUCTION
OUR LEADERSHIP
CURRENT AND FUTURE SENIOR MANAGEMENT
MARKET SIZE AND MARKET DEVELOPMENT
OVERALL COMPETITIVE LANDSCAPE
SECURECOM MOBILE’S SOLUTION
SECURECOM MOBILE’S SECURE MESSAGING SOLUTION
SECURECOM MOBILE’S SECURE E-MAIL SOLUTION
CONCLUSIONS AND COLLABORATIONS WITH FUTURE MARKET PARTICIPANTS
INTRODUCTION
Roland J. Bopp / March 16, 2016www.securecommobile.com
2
Digitalization TodayWe live in Exponential Times
Expansive Embracement of PCs- among organizations and families across the world has redefined
communication
The Expansion of Mobile Usage- combined with widespread embracement of cloud, social media
and internet has resulted in extremely massive data generation
and consumption
Exponential and Uncontrolled Data- creation comes with numerous disturbing threats: cyber-attacks,
commercial espionage, data misuse and loss of data
Every Human
- being is affected by the same pattern of threats: violation of
privacy
The OpportunityUrgent Need for Full Security
Encryption and Security: the hottest spaces in Technology- Revenues are growing exponentially, more than $1 billion in financing
during past 2 years and expectations/forecast are extremely positive
Data Breaches and Privacy Violations at disturbing levels- USA’s NSA and UK’s GCHQ violation of every individual communication
combined with the growing number of data breaches affecting sensitive
personal data
Exponential market growth trends in encryption industry - the software encryption market reached $1.85 billion in revenues last year
and is forecasted to total $4.82 billion in 2020
Fundamental rights of mankind at jeopardy-we believe private lives should remain private, thus we are offering a fully
secure solution for everyone
:
via :
MARKET SIZE AND MARKET DEVELOPMENT
Roland J. Bopp / March 16, 2016www.securecommobile.com
GLOBAL MARKET
The global Encryption market represents $1.85 billion in revenues and is expected to grow at a
CAGR of 21.1% to reach $4.92 billion in 2020 (Research and Markets, Technavio 2015)
INTERNET USERS
There are currently around 3.2 billion internet users worldwide (ITU 2015)
2
EMAIL USERS
2.6 billion people use email around the globe and it is expected to reach 2.9 billion by 2019
(Radicati Group 2015)
MOBILE DEVICES
3.6 billion unique users that are currently using mobile devices (GSMA 2015)
4
TEXT MESSAGING
Recent studies suggest that 91% of Mobile activities is Text Messaging and 69% of Tablet activities is
Emails
GROWTH RATE
The industry is growing at an extremely high pace and countries like China, India, Russia and Korea
represent a valuable potential for initial user base creation
2
1
3
4
5
6
Trends in Encryption Strategy
Source: Ponemon Institute, 2015
:
via :
LESSONS LEARNED FROM ENCRYPTION SO FAR
The content of communications must be encrypted at the sender’s device and decrypted at the recipient’s device.
All secret key material involved in encryption and authentication of messages must be held exclusively only by the parties to the communication.
No third party may be permitted to update or modify any software that at any time has access to plaintext or secret
key material without informed user consent.
The system cannot have an all or nothing approach to key compromise.
As much as possible, nobody should be asked to blindly trust anybody else.
Roland J. Bopp / March 16, 2016www.securecommobile.com
:
via :
SECURE MESSAGING AND VOICE
SECURE EMAIL (Coming Soon)
Our Security Solutions
Enter Password
Roland J. Bopp / March 16, 2016www.securecommobile.com
:
via :
Message
Created
Encrypted
Message
Full Local
EncryptionServer
Encrypted
Message
Receiver
Decrypts
Message
Received
10
Open Source Code
Full End-to-End Encryption
No Storage/Possession of
encryption keys
No Possibility to Access Encryption Keys
Communication Data and Encryption Keys
destroyed after every exchange
Roland J. Bopp / March 16, 2016www.securecommobile.com
SECURECOM TECHNOLOGY – HOW IT WORKS
Our Advantages
:
via :
SECURE MESSAGING SOLUTION
Coming Soon
Available Now2. SecurePair Voice
1. SecurePair Messaging
END-TO-END PRIVACY FOR TEXT MESSAGES AND ATTACHMENTS ONLY the sender and recipient can access the messages Supports group messaging Supports a wide variety of Android devices, including tablets
without telephony support
PRIVATE MOBILE-TO-MOBILE PHONE CALLS ONLY the caller and recipient can hear the conversation Simplified user registration process automatically registers
phone on Securecom Mobile servers and searches phone book for already registered users
Dialing process is exactly the same as “standard” calls
SecureCom Products
Roland J. Bopp / March 16, 2016www.securecommobile.com
:
via :
SECURE E-MAIL SOLUTION
SecureCom Products
Fully Encrypted Secure Email (coming soon)
Open-Source Code: everyone can verify the technology
No Traditional Email Protocols: text messaging protocols instead
No Storage nor Possession of Encryption Keys: just routing the message
Full End-to-End encryption: uses a permanently installed application on user’s device in
order to store Encryption Keys
Guarantees Full Protection and Control over email communication data
Only Sender and Recipient can access their data
SecureCom Mobile cannot access the keys, even if we want to !!!
Works like any other Traditional Email Interfaces (Outlook, Gmail, Yahoo, etc.)
Roland J. Bopp / March 16, 2016www.securecommobile.com
:
via :
CONCLUSIONS AND COLLABORATION OPPORTUNITIES
Roland J. Bopp / March 16, 2016www.securecommobile.com
Enter Password
• SecureCom technology offers fully encrypted and uncompromized communication solutionFull Encryption
•Through our Open-Source code we invite every professional of the field to verify and to challenge our technology. We would like to provide our customers with a simple way to
prove our dedication to complete security.
Complete Transparency
•Throughout our services, our users will be guaranteed with not only fully encrypted and transparent solution, but
especially with complete freedom and control over their communication data. They are the only owners of their data!
Total Control
•Ultimately, our solutions would function with the same flexibility and user frendiness then any other traditional
Texting, Calling or Emailing softwareEase of Use
We are looking forward to working with you !Thank you for your attention!
OUR LEADERSHIP
Roland J. Bopp / March 16, 2016www.securecommobile.com
Roland J. Bopp
CEO, Presidentand Director
Executive Vice President at Mannesmann Wireless Operations
Chairman, President and CEO of Deutsche Telekom Americas
CEO of Billing Services Group
Every Industrycomes down to : TIMING
TremendeousOpportunity and Urgent needs for Security
«Security and Encryption
Industry todayoffer the samepotential as the Mobile Industry
in the 90’s»
CURRENT AND FUTURE MANAGEMENT
Roland J. Bopp / March 16, 2016www.securecommobile.com
Hagen Hultzsch
Chairman of the Board of Directors
Management Board at Deutsche Telekom
Chief Information Officer at Volkswagen
Werner Dittmann
Advisory Board, Technology
Project Manager And Consultant for Silent
Circle
Head of System Engineering at Nokia
Head of System Architecture & Design at
Siemens AG
Gary Bartholomew
Created, built and exited over 12 technology
companies, 5 of which were public (in more than $1.5 billion market cap from
concept to exit)
Currently working conjunctly with Waterloo’s University
Research Center out in Canada
Access to Waterloo’sResearch Center and
Resources
OFFICES - NORTH AMERICA: Suite 702– 595 Howe Street, Vancouver, BC, V6C 2T5Telephone: +1 604 484 8989
CORPORATE OFFICERS:Roland J. Bopp. CEO and PresidentSean Comeau, CTOPeter Wilson, DirectorRyan Cheung, CFO
TRANSFER AGENT:TMX Equity FinancialPhone: 604-484-8989 – Email: [email protected]
ADDRESSCORPORATE INFORMATION
Private Lives are Private
SHARES OUTSTANDING:
25,172,240
EXCHANGES:Canadian Stock ExchangeFrankfurt Stock ExchangeU.S. OTC Market
SYMBOLS:SCE – CNSXS6UN – FSXSCQBF – OTC
AUDITORS:Charlton & CompanyVancouver BC Canada
Roland J. Bopp / March 16, 2016www.securecommobile.com
CORPORATE INFORMATION
SAFE HARBOR
FORWARD LOOKING STATEMENTS
Certain statements contained in this presentation constitute forward-looking statements. The use of any of the words “anticipate,” “believe,” “continue,” “could,” “estimate,” “expect,” “intend,” “may,” “will,” “plans,” “project,” “should,” “target” and similar expressions are intended to identify forward-looking statements. Such statements represent the Company’s internal projections, estimates or beliefs concerning, among other things, an outlook on revenues or other expectations, beliefs, plans, objectives, assumptions, intentions or statements about future events or performance. These statements involve known and unknown risks, uncertainties and other factors that may cause actual results or events to differ materially from those anticipated in such forward-looking statements. The Company believes the expectations reflected in those forward-looking statements are reasonable but no assurance can be given that these expectations will prove to be correct and such forward-looking statements included in, or incorporated by reference into, this presentation should not be unduly relied upon. These statements speak only as of the date of this presentation.
Forward-looking statements included in this presentation include, but are not limited to, statements with respect to: how revenues are generated and sources of revenues; key features of the Company’s software technology and process; addition functionality to be added to the Company application; the focus of capital expenditures; expansion of Company’s services into other countries and platforms; and future growth opportunities and strategies. Some of the risks and other factors which could cause results to differ materially from those expressed in the forward-looking statements contained in this presentation include, but are not limited to: general economic conditions in Canada and globally; potential delays or changes in plans with respect to deployment of services or capital expenditures; possibility that government policies or laws may change; a new and uncertain market for the Company’s products, product development, technological advancement; expectations regarding the timing for availability of the Company's products and acceptance of its products by the market; expectations regarding the progress and the successful and timely completion of the various stages of the licensing process; the Company's plans to market, sell and distribute its products; the Company's dependence on expanding its customer base availability of sufficient financial resources to pay for the development and costs of Company’s services and products; ability to locate satisfactory industry partners; competition for, among other things, capital and skilled personnel; competition in our target markets; potential capital needs; management of future growth and expansion; the development, implementation and execution of Company’s strategic vision; risk of third-party claims of infringement; legal and/or regulatory risks relating to Company’s business and strategic acquisitions; protection of proprietary information; the success of Company’s brand development efforts; risks associated with strategic alliances; reliance on distribution channels; product concentration; our ability to hire and retain qualified employees and key management personnel.
Readers are cautioned that the foregoing lists of factors are not exhaustive. These forward-looking statements are made as of the date of this presentation and Company disclaims any intent or obligation to update publicly any forward-looking statements, whether as a result of new information, future events or results or otherwise, other than as required by applicable securities laws.
PRESENTATION DISCLAIMER
This presentation is not an offer to sell or a solicitation of an offer to purchase securities by SecureCom Mobile Inc. (the “Company”). Any such offer or solicitation, if any, will only be made by means of offering documents (e.g., prospectus, offeringmemorandum, subscription agreement and or similar documents) and only in jurisdictions where permitted by law.
The attached material is provided for informational purposes only as of the date hereof, is not complete, and may not contain certain material information about Company, including important disclosures and risk factors associated with an investment in Company. This information does not take into account the particular investment objectives or financial circumstances of any specific person who may receive it. Before making any investment, prospective investors should thoroughly and carefully review any offering documents with their financial, legal and tax advisors to determine whether an investment is suitable for them.
Securities of the Company are a highly speculative investment and are not intended as a complete investment program. They are designed only for sophisticated persons who can bear the economic risk of the loss of their investment in Company and who have limited need for liquidity in their investment. There can be no assurance that Company will achieve its objectives.
Certain information contained herein has been provided by third-party sources and has not been independently audited or verified, by the Company. No representation or warranty, express or implied, is made by the Company as to the accuracy or completeness of the information contained in this document, and nothing contained in this document is, or shall be relied upon as, a promise or representation by the Company.
Any securities described herein have not been, and will not be, registered under the U.S. Securities Act of 1933, as amended (the “U.S. Securities Act”) and may not be offered or sold in the United States except in transactions exempt from, or not subject to, registration under the US Securities Act and applicable United States state securities laws.
THIS PRESENTATION MAY NOT BE REPRODUCED OR DISTRIBUTED BY THE RECIPIENT.
Roland J. Bopp / March 16, 2016www.securecommobile.com