Who we are Irish (EU) Based Developers of leading edge Encrypted USB Storage solutions Market focussed Business requirement driven Leading security levels AES 256 Best value for the best performance Based on extensive market knowledge and experience OUR PEDIGREE A BRAND OF RENAISSANCE CONTINGENCY SERVICES LTD®® AN IRISH DATA SECURITY BUSINESS SINCE 1987 WITH • • • • • LONG ESTABLISHED DATA SECURITY SOLUTIONS SUPPLIER 1987 CLEAR UNDERSTANDING OF THE MARKET CLEAR UNDERSTANDING OF THE LIMITATIONS OF EXISTING PLAYERS CLEAR UNDERSTANDING AS TO WHY TAKE UP COULD BE MUCH IMPROVED WE KNOW THE LIMITATIONS OF ALL COMPETITION WHICH IS HOLDING THE MARKET BACK WHY ARE WE HERE BECAUSE THERE IS A PROBLEM WITH EVERY PROBLEM THERE IS AN OPPORTUNITY!!!! What is the problem ? • DATA ITS CONFIDENTIALITY AND INTEGRITY ITS SECURITY!!!!!!!!! COMPLIANCE AND REGULATIONS Laws, regulations good practice and commercial and other pressures mean you must worry about it and not just worry about YOU MUST DO SOMETHING Who’s data is it Who is responsible to protect it Who is liable if there is an issue In the cloud On back up devices On the move ON USB DEVICES A RECENT INTERNATIONAL HEADLINE, THE EUROPEAN COURT OF JUSTICE RULED INVALID A FIFTEEN-YEAR OLD DATA TRANSFER PACT BETWEEN THE UNITED STATES AND EUROPE. WHEN FORMER NATIONAL SECURITY AGENCY (NSA) CONTRACTOR EDWARD SNOWDEN EXPOSED THE EXTENT OF THE NSA'S INTERNATIONAL DATA SURVEILLANCE, HE CREATED A RIPPLE EFFECT. THE RESULT? PUBLIC ANXIETY AROUND DATA PRIVACY HAS BECOME CEMENTED IN INTERNATIONAL LAW. WHAT DOES THIS MEAN FOR IT SERVICE AND SOLUTIONS PROVIDERS IN THE U.S. AND U.K.? WE CAN'T DEFINITIVELY SAY, BUT HERE'S A CLOSER LOOK AT THE SITUATION... “Without any concrete guidelines, it’s too early to assess the full impact of this ruling. We are carefully monitoring the situation. As rulemaking proceeds, we will be assessing what, if any actions may be required by Continuum or its partners to ensure compliance with European regulations.” ~Rob Autor, Senior VP of Global Service Delivery at Continuum ~ Social and browsing data are not the only examples of "personal data" as defined by the EU... TO PROTECT THE PRIVACY OF CITIZENS, BUSINESSES NEED TO OBTAIN CONSENT FROM THOSE EUROPEAN RESIDENTS WHOSE PERSONAL DATA THEY WANT TO TRACK. WITH NEW CHANGES TO THE SINGLE EU DIGITAL STANDARD, ALL DATA THAT IDENTIFIES AN INDIVIDUAL, WHETHER DIRECTLY OR INDIRECTLY, WILL NOW BE PERSONAL DATA. THIS INCLUDES IP ADDRESSES AND PSEUDONYMS. DOES THAT THEN MEAN THAT THIS DATA CAN ONLY BE STORED AND ACCESSED WITHIN THE CONFINES OF THE 28 EU MEMBER STATES? Client data Customer data Customer lists Price lists Patient data Financial data Credit card data Any other data you can think of ??????? Ex-Employees are a Data Security Menace The 2014 Intermedia (business applications cloud-hosting vendor) SMB ROGUE ACCESS STUDY was released in August 2014. This report should shock smaller businesses into realizing that they need to protect their leads databases, financial information and social reputation from human error as well as from malicious activity. BASED ON A SURVEY OF KNOWLEDGE-WORKERS PERFORMED BY OSTERMAN RESEARCH, THE REPORT QUANTIFIES THE STAGGERING SCOPE OF THE “ROGUE ACCESS” PROBLEM AND PRESENTS A WAKE-UP CALL FOR EVERY BUSINESS — REGARDLESS OF SIZE BEFORE AN EMPLOYEE LEAVES HE/SHE WILL PROBABLY TAKE WHATEVER DATA THEY WANT BUT FOLLOWING THAT YOU NEED TO MANAGE THAT. More than a third of organisations have had a device lost or stolen in the past six months. What's more, many of these devices are not protected by even basic security measures, according to research from data security firm Imation. The study of UK and German workers, carried out by market research firm Vanson Bourne, shows the risks of remote working to an organisation. Some 44% of organisations said a member of their senior management has lost a mobile device in the last year, while another 39% of senior management had a device stolen. More than half (54%) of organisations reported that a non-senior management employee had lost a device and a further 49% said they'd had a device stolen in the past 12 months. The vast majority of these devices (93%) contained work related data, such as confidential emails (49%), confidential files or documents (38%), customer data (24%) and financial data (15%). More data breaches caused by lost devices than malware or hacking, Trend Micro says Device loss In addition to this black-market pricing data, Trend Micro explored the causes of data theft. And they came up with a surprise. Hacking or malware are not the leading causes of breaches. Trend Micro says it is device loss that's the problem. It's "sensitive information stored on employees' laptops, mobile devices, and thumb drives," the report says. The numbers Device loss accounts for 41% of breaches, compared with 25% that derived from hacking and malware. Rounding out the numbers are 12% for insider leaks, 17% from unintended disclosure, 1% from payment card fraud, and 3% unknown breach causes. • Social experiment: 200 USB flash drives left in public locations Posted on 28 October 2015. Nearly one in five people who found a random USB stick in a public setting proceeded to use the drive in ways that posed cybersecurity risks to their personal devices and information and potentially, that of their employer, a recent experiment conducted on behalf of CompTIA revealed. With the cybersecurity threat landscape facing companies growing increasingly complex, employees who practice unsafe cybersecurity habits put both themselves and their employer at risk. WHICH ONE IS ENCRYPTED??? HOW CAN YOU KNOW??? • Business • Professionals • Students/home users – not low end consumable • The “MAC TYPE” marketplace WHO HAVE WE SOLD TO? • Process has been a phased launch in a few test markets before launching to significant European markets • Initial launch in Ireland – B2B • Launched in Eastern Europe • Launching in UK • For sale through TRADE ONLY COMPETITIVE LANDSCAPE • • Main UK competitors: • iStorage • IronKey – soon to be Kingston Others • Kanguru • Sentenial GLOBAL SALES STRATEGY • Through partners only • Objective is to leave money in the channel • Deal Reg for larger opportunities • Not over distribute • Offer alternative to other brands with better performance and a price advantage • Continually develop the range • Work with partners to develop the market and not over distribute the market WHAT THE MARKET NEEDED • • • • • • • • A Product to work in all environments; MAC, Windows, Linux etc. Simple and deployable Always encrypted Designed so the “User” can handle it Range of capacities Cost effective Speed Hardware Encrypted – i.e. always encrypted The Solution A RANGE OF PRODUCTS MEETING THE CRITERIA ABOVE FLASH mSata Flash/M Sata/HDD ClearCrypt is a range of 256 bit encrypted Storage devices designed to be robust, secure and cost effective. HDD FLASH Capacities 8 Gb, 16 Gb and 32 Gb Model Material Colour Interface ClearCrypt Stainless Steel Black USB 3.0 port (backup to USB 2.0, USB 1.1) Transfer rate USB 3.0 up to 5.0 Gbs USB 2.0 up to 480Mbps System Requirement USB 3.0; Windows 2000/XP/Vista/ PC 7/8/10 USB 2.0; Windows 2000/XP/Vista/ 7/8/10 System Requirement USB 3.0; MAC OS 10.6 or higher MAC USB 2.0; MAC OS 10.2 or higher Power Supply Li-ion Battery Size 80x24x8 mm mSata Model ClearCrypt Material Colour High Quality Aluminium Black Interface USB 3.0 port (backup to USB 2.0, USB 1.1) Transfer rate USB 3.0 up to 5.0 Gbs USB 2.0 up to 480Mbps System Requirement PC USB 3.0; Windows 2000/XP/Vista/ 7/8/10 USB 2.0; Windows 2000/XP/Vista/ 7/8/10 System Requirement MAC USB 3.0; MAC OS 10.6 or higher USB 2.0; MAC OS 10.2 or higher Power Supply USB bus power 5v/900mA Size 97 x 42 x 12 mm Capacities 128 Gb, 256 Gb and 512 Gb HDD Model Material Colour Interface Transfer rate System Requirement PC System Requirement MAC Power Supply Size Capacities 500 Gb, 1 Tb and 2Tb ClearCrypt High Quality Aluminium Black USB 3.0 port (backup to USB 2.0, USB 1.1) USB 3.0 up to 5.0 Gbs USB 2.0 up to 480Mbps USB 3.0; Windows 2000/XP/Vista/ 7/8/10 USB 2.0; Windows 2000/XP/Vista/ 7/8/10 USB 3.0; MAC OS 10.6 or higher USB 2.0; MAC OS 10.2 or higher USB bus power 5v/900mA 126 x 76 x 16 mm ClearCrypt is a range of 256 bit encrypted Storage devices designed to be robust, secure and cost effective. Smooth design perfect for travel •Full Capacity Range •Real-time AES256bit encryption •Software free •Aluminium Casing •True Hardware Encryption •Super Speed USB3.0 •On-board keypad USB3.0 super speed with a transfer rate up to 5.0Gpbs, 10x faster than traditional USB 2.0 drives The ClearCrypt range offer industry leading encryption and also a range to suit all needs and requirements ROAD MAP • Additional Products to be launched mid 2016 • Details available under NDA Full Channel Program Managed Margins Very competitively priced NOT Over distributed Profit for you and security for your customer Available through partners Solve client problems Make good margins Align yourself with the ultimate in value and security THE KEY TO SECURITY AND PROFITABILITY DON’T BELIEVE ME – BELIEVE HIM!!