SlideShare une entreprise Scribd logo
1  sur  27
Company & Product Overview
Vision To be a leading provider of content filtering and security solutions that give users a safe, productive, and secure Web experience. Devices could include PC’s, tablets, smartphones, WiFi devices, routers, gaming consoles, etc. 2
Tactics Developing a mobile client filtering solution that is scalable, cross-platform, and device-independent. Updating current product lines and accelerating growth thru improved routes to market. Considering complementary adjacencies through acquisition or license agreement. 3
Company Overview Founded : 2002  Status : Privately held Headquarters : Salt Lake City, Utah 50% Avg. Annual Growth Rate, 2005-10 Target Markets : SMB, home, govt, educ Penetration : over 750,000 users in 157 countries 4
Milestones 2002	Company Founded 2004	ContentProtect Pro launched for SMB’s 		SVP/COO hired 		Software-as-a-Service licensing began 2007	Net Nanny brand acquisition, LookSmart Ltd. 		CP Security Appliance launched 2008	Net Nanny for Mac launched 		Net Nanny 5.6 launched / PC Mag Editor’s Choice 		new VP Development hired 2009	Net Nanny for Mobile launched 		Net Nanny 6.0 launched / PC Mag Editor’s Choice 2010	Net Nanny 6.5 launched / PC Mag Editor’s Choice		new CEO and Management Consultants hired 		NN for Android to be launched 5
Executive Team Brent Bishop| Chairman of the Board ,[object Object]
 Co-founder of Franklin Quest and Greenbacks/All A DollarRuss Warner| President and CEO ,[object Object]
 Worked for Altiris, SageCreek Partners, Novell, Alianza, and WordPerfectScott Cleghorn| Sr. VP and COO ,[object Object]
 Worked for GTE, Verizon and QwestLouie DiCristofano| VP of Engineering ,[object Object]
 Worked for Novell supervising 60+ developers and engineersDoug Anderson| Director, Marketing and Product Management ,[object Object],Brian Schumann | Director of Channel Sales ,[object Object]
 Work for 8e6 Technologies, M86 Security and Lightspeed SystemsGreg Butterfield | SageCreek Partners ,[object Object]
  $1.2B acquisition of Altiris by Symantec & $1.8B acquisition of Omniture by Adobe.6
Value Proposition Safety and appropriate use are primary goals for consumers. Curb cyberslacking - increase productivity by limiting employee web site roaming.  Security is improved by reducing malware, commonly found on inappropriate Web sites.   Liability is decreased on company-owned assets because inappropriate materials will not be viewed or shared. 7
Solutions Net Nanny PC – parental controls Net Nanny Mac – parental controls Net Nanny Mobile – parental controls ContentProtect Professional – endpoint employer controls via SaaS ContentProtect Security Appliance – secure web gateway 8
Solutions Future ,[object Object]
Net Nanny for OEM’s and ISV’s: SDK9
New Architecture (Fish) Security Suites Routers & WiFi Hotspots Gateway Appliances Smart Phones Netbooks & Tablets Personal Computer – Windows, Mac, Linux Web Filter Instant Msg Social Net Data Forensics Blog Mgmt Image Filter DLP App Mgmt Other Software Developer Kit  db Policy Management Reporting Engine Management Console CWI Engine Data Capture/Analysis 10
Market Opportunity Secure Web Gateway ,[object Object]
Content security software & appliance market to hit $3.8 billion in 2014.
Worldwide content security software & appliance revenue grew 2.5% between 4Q09 and 1Q10 to $640 million.Mobile Security ,[object Object]
The mobile security client software segment is forecast to grow at a 50% CAGR from 2009 to 2014.
No mobile security suite vendors offer content filtering.
T-Mobile, Sprint, & France Telecom have contacted us about content filtering.Smartphones ,[object Object]
Global smartphone market is 260 M units in 2010 and 300 M in 2011.
Smartphone shipments surpass desktops + laptops in 2012.
Smartphone shipments surpass feature phones in 2011.
85% of U.S. teens have cell phones.Sources: Gartner, Infonetics, ABI Research; NPD, Top Ten Reviews, Morgan Stanley, Cox. 11

Contenu connexe

Tendances

The Mobile Internet Revolution by M-STAT
The Mobile Internet Revolution by M-STATThe Mobile Internet Revolution by M-STAT
The Mobile Internet Revolution by M-STAT
M-STAT
 
CIM mobile marketing overview May 2012
CIM mobile marketing overview May 2012CIM mobile marketing overview May 2012
CIM mobile marketing overview May 2012
Jason Cross
 
Hot house istrategy_presentation_february_2012_original-1
Hot house istrategy_presentation_february_2012_original-1Hot house istrategy_presentation_february_2012_original-1
Hot house istrategy_presentation_february_2012_original-1
iStrategy
 
Blackberry - Scenario Analysis
Blackberry - Scenario AnalysisBlackberry - Scenario Analysis
Blackberry - Scenario Analysis
Murali Erraguntala
 
Blackberry Scenario Analysis Presentation
Blackberry Scenario Analysis PresentationBlackberry Scenario Analysis Presentation
Blackberry Scenario Analysis Presentation
Murali Erraguntala
 
Mobile Security Report 2009
Mobile Security Report 2009Mobile Security Report 2009
Mobile Security Report 2009
findram
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
SelectedPresentations
 
When is an app not an app
When is an app not an appWhen is an app not an app
When is an app not an app
Jason Cross
 
Roadshow asia nick lane content services & apps
Roadshow asia nick lane content services & appsRoadshow asia nick lane content services & apps
Roadshow asia nick lane content services & apps
mobilesquared Ltd
 

Tendances (20)

The Mobile Internet Revolution by M-STAT
The Mobile Internet Revolution by M-STATThe Mobile Internet Revolution by M-STAT
The Mobile Internet Revolution by M-STAT
 
Smartphone and their market
Smartphone and their marketSmartphone and their market
Smartphone and their market
 
Microsoft-Skype
Microsoft-SkypeMicrosoft-Skype
Microsoft-Skype
 
Case Study "Research in Motion"
Case Study "Research in Motion"Case Study "Research in Motion"
Case Study "Research in Motion"
 
CIM mobile marketing overview May 2012
CIM mobile marketing overview May 2012CIM mobile marketing overview May 2012
CIM mobile marketing overview May 2012
 
4 rim
4 rim4 rim
4 rim
 
Microsoft and Skype
Microsoft and Skype Microsoft and Skype
Microsoft and Skype
 
Are you Smart Phone savvy?
Are you Smart Phone savvy?Are you Smart Phone savvy?
Are you Smart Phone savvy?
 
Mobile Monday Boston - Compelling Mobile Business Models
Mobile Monday Boston - Compelling Mobile Business ModelsMobile Monday Boston - Compelling Mobile Business Models
Mobile Monday Boston - Compelling Mobile Business Models
 
Hot house istrategy_presentation_february_2012_original-1
Hot house istrategy_presentation_february_2012_original-1Hot house istrategy_presentation_february_2012_original-1
Hot house istrategy_presentation_february_2012_original-1
 
Blackberry - Scenario Analysis
Blackberry - Scenario AnalysisBlackberry - Scenario Analysis
Blackberry - Scenario Analysis
 
Blackberry Scenario Analysis Presentation
Blackberry Scenario Analysis PresentationBlackberry Scenario Analysis Presentation
Blackberry Scenario Analysis Presentation
 
Mobile Security Report 2009
Mobile Security Report 2009Mobile Security Report 2009
Mobile Security Report 2009
 
White Paper - Android Security
White Paper - Android SecurityWhite Paper - Android Security
White Paper - Android Security
 
Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
Mobilize With Cs Cs
Mobilize With Cs CsMobilize With Cs Cs
Mobilize With Cs Cs
 
When is an app not an app
When is an app not an appWhen is an app not an app
When is an app not an app
 
Van wyk hothouse mobile 2012 sydney
Van wyk hothouse mobile 2012 sydneyVan wyk hothouse mobile 2012 sydney
Van wyk hothouse mobile 2012 sydney
 
Roadshow asia nick lane content services & apps
Roadshow asia nick lane content services & appsRoadshow asia nick lane content services & apps
Roadshow asia nick lane content services & apps
 

Similaire à Content Watch - Company & Product Overview (Eng)

Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
itnewsafrica
 
iISP - v1.0 - Seed Funding - 2013.03.17 - External, General
iISP - v1.0 - Seed Funding - 2013.03.17 - External, GeneraliISP - v1.0 - Seed Funding - 2013.03.17 - External, General
iISP - v1.0 - Seed Funding - 2013.03.17 - External, General
Jieh Tan
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
Arrow ECS UK
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
Warba Insurance Co Kuwait
 
Opportunities with mobile applications from Wireless Expertise
Opportunities with mobile applications from Wireless ExpertiseOpportunities with mobile applications from Wireless Expertise
Opportunities with mobile applications from Wireless Expertise
Anuj R KHANNA
 
15 company that can be next infosys
15 company that can be  next infosys15 company that can be  next infosys
15 company that can be next infosys
JIMS Rohini Sector 5
 

Similaire à Content Watch - Company & Product Overview (Eng) (20)

Marketing Plan For an Android App
Marketing Plan For an Android AppMarketing Plan For an Android App
Marketing Plan For an Android App
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
 
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
 
The Mobile Shift: How Mobile is Changing Consumer Behavior
The Mobile Shift: How Mobile is Changing Consumer BehaviorThe Mobile Shift: How Mobile is Changing Consumer Behavior
The Mobile Shift: How Mobile is Changing Consumer Behavior
 
CES 2009 Innovations
CES 2009 InnovationsCES 2009 Innovations
CES 2009 Innovations
 
iISP - v1.0 - Seed Funding - 2013.03.17 - External, General
iISP - v1.0 - Seed Funding - 2013.03.17 - External, GeneraliISP - v1.0 - Seed Funding - 2013.03.17 - External, General
iISP - v1.0 - Seed Funding - 2013.03.17 - External, General
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
www.E3innov.com
www.E3innov.com  www.E3innov.com
www.E3innov.com
 
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
 
Sitecore mobile whitepaperManaging the Mobile Rush: Smart Strategies for Mult...
Sitecore mobile whitepaperManaging the Mobile Rush: Smart Strategies for Mult...Sitecore mobile whitepaperManaging the Mobile Rush: Smart Strategies for Mult...
Sitecore mobile whitepaperManaging the Mobile Rush: Smart Strategies for Mult...
 
Managing the Mobile Rush: Smart Strategies for Multi‐channel Publishing
Managing the Mobile Rush: Smart Strategies for Multi‐channel PublishingManaging the Mobile Rush: Smart Strategies for Multi‐channel Publishing
Managing the Mobile Rush: Smart Strategies for Multi‐channel Publishing
 
The Mobile Shift
The Mobile ShiftThe Mobile Shift
The Mobile Shift
 
About Motwin
About MotwinAbout Motwin
About Motwin
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
Opportunities with mobile applications from Wireless Expertise
Opportunities with mobile applications from Wireless ExpertiseOpportunities with mobile applications from Wireless Expertise
Opportunities with mobile applications from Wireless Expertise
 
15 company that can be next infosys
15 company that can be  next infosys15 company that can be  next infosys
15 company that can be next infosys
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile Devices
 
AG mobile strategy webinar oct2011 c silva
AG mobile strategy webinar oct2011 c silvaAG mobile strategy webinar oct2011 c silva
AG mobile strategy webinar oct2011 c silva
 

Plus de INSPIRIT BRASIL

Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
INSPIRIT BRASIL
 
New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)
INSPIRIT BRASIL
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
INSPIRIT BRASIL
 

Plus de INSPIRIT BRASIL (20)

Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- Datasheet
 
INSPIRIT nova institucional
INSPIRIT nova institucionalINSPIRIT nova institucional
INSPIRIT nova institucional
 
Projeto Zoo INSPIRIT
Projeto Zoo INSPIRITProjeto Zoo INSPIRIT
Projeto Zoo INSPIRIT
 
XCS - Watchguard
XCS - WatchguardXCS - Watchguard
XCS - Watchguard
 
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
 
Resultados da pesquisa INSPIRIT realizada no CNASI 2011
Resultados da pesquisa INSPIRIT realizada no CNASI 2011Resultados da pesquisa INSPIRIT realizada no CNASI 2011
Resultados da pesquisa INSPIRIT realizada no CNASI 2011
 
IT360 - Muito além do HelpDesk simples
IT360 - Muito além do HelpDesk simplesIT360 - Muito além do HelpDesk simples
IT360 - Muito além do HelpDesk simples
 
New-Desktop Central para IT Managers
New-Desktop Central para IT ManagersNew-Desktop Central para IT Managers
New-Desktop Central para IT Managers
 
New institucional inspirit (esp)
New institucional inspirit (esp)New institucional inspirit (esp)
New institucional inspirit (esp)
 
New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
 
M86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayM86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web Gateway
 
Trustwave - Segurança 360
Trustwave - Segurança 360Trustwave - Segurança 360
Trustwave - Segurança 360
 
NOVA - Apresentação Institucional INSPIRIT
NOVA - Apresentação Institucional INSPIRITNOVA - Apresentação Institucional INSPIRIT
NOVA - Apresentação Institucional INSPIRIT
 
Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)
 
Overview -IT360 ManageEngine
Overview -IT360 ManageEngineOverview -IT360 ManageEngine
Overview -IT360 ManageEngine
 
Estudo Gartner - IT360 ManageEngine
Estudo Gartner -  IT360 ManageEngineEstudo Gartner -  IT360 ManageEngine
Estudo Gartner - IT360 ManageEngine
 
Forrester - Wave Community
Forrester  - Wave CommunityForrester  - Wave Community
Forrester - Wave Community
 
Coletânea de Cases - RIVERBED
Coletânea de Cases - RIVERBEDColetânea de Cases - RIVERBED
Coletânea de Cases - RIVERBED
 
INSPIRIT- Riverbed- Data protection and Disaster Recovery
INSPIRIT-  Riverbed- Data protection and Disaster RecoveryINSPIRIT-  Riverbed- Data protection and Disaster Recovery
INSPIRIT- Riverbed- Data protection and Disaster Recovery
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Content Watch - Company & Product Overview (Eng)

  • 1. Company & Product Overview
  • 2. Vision To be a leading provider of content filtering and security solutions that give users a safe, productive, and secure Web experience. Devices could include PC’s, tablets, smartphones, WiFi devices, routers, gaming consoles, etc. 2
  • 3. Tactics Developing a mobile client filtering solution that is scalable, cross-platform, and device-independent. Updating current product lines and accelerating growth thru improved routes to market. Considering complementary adjacencies through acquisition or license agreement. 3
  • 4. Company Overview Founded : 2002 Status : Privately held Headquarters : Salt Lake City, Utah 50% Avg. Annual Growth Rate, 2005-10 Target Markets : SMB, home, govt, educ Penetration : over 750,000 users in 157 countries 4
  • 5. Milestones 2002 Company Founded 2004 ContentProtect Pro launched for SMB’s SVP/COO hired Software-as-a-Service licensing began 2007 Net Nanny brand acquisition, LookSmart Ltd. CP Security Appliance launched 2008 Net Nanny for Mac launched Net Nanny 5.6 launched / PC Mag Editor’s Choice new VP Development hired 2009 Net Nanny for Mobile launched Net Nanny 6.0 launched / PC Mag Editor’s Choice 2010 Net Nanny 6.5 launched / PC Mag Editor’s Choice new CEO and Management Consultants hired NN for Android to be launched 5
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. $1.2B acquisition of Altiris by Symantec & $1.8B acquisition of Omniture by Adobe.6
  • 13. Value Proposition Safety and appropriate use are primary goals for consumers. Curb cyberslacking - increase productivity by limiting employee web site roaming. Security is improved by reducing malware, commonly found on inappropriate Web sites. Liability is decreased on company-owned assets because inappropriate materials will not be viewed or shared. 7
  • 14. Solutions Net Nanny PC – parental controls Net Nanny Mac – parental controls Net Nanny Mobile – parental controls ContentProtect Professional – endpoint employer controls via SaaS ContentProtect Security Appliance – secure web gateway 8
  • 15.
  • 16. Net Nanny for OEM’s and ISV’s: SDK9
  • 17. New Architecture (Fish) Security Suites Routers & WiFi Hotspots Gateway Appliances Smart Phones Netbooks & Tablets Personal Computer – Windows, Mac, Linux Web Filter Instant Msg Social Net Data Forensics Blog Mgmt Image Filter DLP App Mgmt Other Software Developer Kit db Policy Management Reporting Engine Management Console CWI Engine Data Capture/Analysis 10
  • 18.
  • 19. Content security software & appliance market to hit $3.8 billion in 2014.
  • 20.
  • 21. The mobile security client software segment is forecast to grow at a 50% CAGR from 2009 to 2014.
  • 22. No mobile security suite vendors offer content filtering.
  • 23.
  • 24. Global smartphone market is 260 M units in 2010 and 300 M in 2011.
  • 25. Smartphone shipments surpass desktops + laptops in 2012.
  • 26. Smartphone shipments surpass feature phones in 2011.
  • 27. 85% of U.S. teens have cell phones.Sources: Gartner, Infonetics, ABI Research; NPD, Top Ten Reviews, Morgan Stanley, Cox. 11
  • 28.
  • 29. N.A. smartphone market share increased 7x over the last 12 months.
  • 30. Accounts for 9.6% of all worldwide smartphone sales in Q1 of 2010, up from only 1.6% during the same quarter of 2009.
  • 31.
  • 32. Sold 3M iPadsin 80 days.12
  • 33.
  • 34. With Children ages 3-17 37 million (32%)
  • 35.
  • 36. There will be 10X as many devices in play by 2015-2020: smartphone, iPad, tablet, computers, Kindle, gaming console, car electronics, HD TV, and more. 13
  • 37.
  • 38. Online video poses problem for SMB’s and schools with bandwidth constraints.
  • 39. 40 percent of Internet use in the workplace is not business-related. Source: IDC, Secure Content Management Report
  • 40. At home, the average child’s first exposure to porn is 11 yrs. Source: internetfilterreview.com 14
  • 41. Success - Net Nanny PC Magazine Editors’ Choice for the past 3 Years #1 Rated – Top Ten Reviews for 6 years Computer Shopper Editor’s Choice in 2009 Top Ten reviews and 5 other leading rating services #1 rank Featured on Oprah (twice in 2009) Wall Street Journal Online Technology Buyer’s Guide TTNET, a subsidiary of Turk Telecom with 220K in subscribers Languages: English, Spanish, Japanese, and Turkish 15
  • 42. Retail Pricing Net Nanny $39.99 for an Annual License $59.98 for 3-Seat Pack Volume and Education Discounts ContentProtect Pro $39.99 per Annual License 3 Seat Minimum Volume and Education Discounts 16
  • 43. Success Story Profile 9,000 students / 3,000 PC’s Problem 1- Excessive bandwidth consumption by students 2- Slow applications 3- Applications not prioritized Requirements 1- Bandwidth shaping 2- Application control 3- Wireless control for students Solution CP 550, upgrade to CP 1000 Competition St. Bernard, Barracuda, and many others Profile Fortune 500 with HQ in New Jersey Problem 1- Customer-facing demo laptops were exposed to inappropriate web content 2- Employees unproductive due to web surfing 3- Potential liability for inappropriate use Requirements 1- Global, web-based control 2- No dedicated server 3- Did not want appliance Solution 8,500 licenses ContentProtect Pro Competition Symantec, CyberPatrol, Cyber Sitter 17
  • 45. Routes to Market Today Net Nanny PC ISP Retail Internet Marketing Distributor Acceptance OEM Time 19
  • 46. Routes to Market Today CP Pro and Appliance VAR MSP Regional VAR Lg. Acct VAR Internet Marketing Distributor Acceptance Time 20
  • 47. Routes to Market Future Mobile (smartphone/tablet) Acceptance Wireless Expense Mgt Wireless Distributor ISV OEM Carrier Time Wireless Retailer 21
  • 48.
  • 49. Net Nanny Mac: Intego, K9, SafeEyes
  • 51. ContentProtect Pro: WebRoot, Sophos, Cyber Patrol, SafeEyes
  • 52. Secure Web Gateway: Cymphonix, Sonic Wall, Websense, St. Bernard22
  • 53.
  • 55. Mobile Parental Monitoring (SMS/IM): SMobile23
  • 56.
  • 57. SMobile : WinMobile, Symbian, Android, & RIM
  • 58. Kaspersky, BullGuard, Norton, Trend, McAfee : WinMobile & Symbian
  • 60. Mobile Lifecycle Management: Air-Watch, B2M Solutions24
  • 61.
  • 62. Web page content is not static – it changes constantly
  • 63.
  • 64.
  • 65. All pages (URLs) are analyzed, not just the Domains
  • 66.
  • 67. Performance equal to or better than remote lists
  • 68.
  • 69. CW - Periodic updates via definition updates – small, silentNo list licensing fees 26
  • 70. Contact Bob Orosco Office: 805 824 0377 Mobile: 805 200 7079 São Paulo 011 3020 6310 Email: rorosco@tarasco.com leads@inspirit.com.br comercial@inspirit.com.br 27