SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
SQR Systems
CDE Open Call
Dr. Nithin Thomas
CEO
Nithin.thomas@sqrsystems.com
The proposal
High bandwidth
connections
Low bandwidth
connections
Locks down the data,
preventing it from
being modified
High bandwidth
connections
Low bandwidth
connections
Allows the data to be
optimised in
encrypted form
Decrypted
data
exposed to
cyberattack
Software to securely transmit high quality video data in encrypted form over disadvantaged
networks
Traditional encryption SQR encryption
Every user gets the best possible video for their link but the network never generates any
decrypted content
The outcome
Encryption
Technology
Compression
Technology
Compliant
with
Standards
Open
Architecture
&
Compatible
Data kept secure throughout
delivery process, removing
opportunity for cyber-attack.
Optimal use of bandwidth to
ensure best user experience.
Easy integration with other
software & hardware
(inclusive of commercial
platforms)
Maximum interoperability
with other systems
C O M B I N E D
COMMERCIAL IN CONFIDENCE
Applications
• C4ISR
• Tactical comms
• Dismounted soldier
• Protection of CNI
• Satcoms
The experience
• Funding to develop technology from an early level of
maturity
• Fully funded projects are valuable for start-ups
• Ownership of IP is a favourable term that allows companies
to exploit the technology
• Working at unclassified level allows maximum flexibility for
deploying the technology in commercial applications
• External Investment still required to sustain cash flow due to
milestone payments
• Follow on funding may not come through at the right time
• Exploitation path not always clear
The outcomes
Winner of the Shell Innovation Award
2012
Winner of the Global Security
Challenge 2013
Winner of Shell LiveWire Grand Ideas
2011
Winner of Cambridge Wireless
Discovering Startups 2013
Finalist of SmartUK 2014
 Technology
 Unique integrated encryption & compression
software
 Secure and unbroken wireless communication
even during poor connectivity
 Open architecture enabling easy integration with
other software & hardware.
 Verticals
 Defence & Aerospace (D&A)
 Technology Media Telecom (TMT)
 A broad range including Critical Infrastructure
Protection (CIP) & Healthcare
 Customers
 UK and US government agencies
 Global cyber security solutions providers
 Private sector clients
 Team
 R&D focused – 4 x PhDs
 Track record of delivering projects to
performance, time and cost
Involved in research programmes with the
UK and US governments for military and
commercial applications
Recognised by the Royal Society (the pre-
eminent scientific body in the UK) in its
work on cyber security research (to be
published summer 2014)
22 May 2014: Guest briefing at CDE Innovation Network -  SQR Systems
22 May 2014: Guest briefing at CDE Innovation Network -  SQR Systems

Contenu connexe

Plus de Defence and Security Accelerator

Plus de Defence and Security Accelerator (20)

27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator
 
Improving crowd resilience themed competition slides
Improving crowd resilience themed competition slidesImproving crowd resilience themed competition slides
Improving crowd resilience themed competition slides
 
Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1
 
CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2
 
CDE themed comp - synbio part 1
CDE themed comp  - synbio part 1CDE themed comp  - synbio part 1
CDE themed comp - synbio part 1
 
Beyond battery power: future autonomy
Beyond battery power: future autonomy Beyond battery power: future autonomy
Beyond battery power: future autonomy
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...
 
Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2
 
Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1
 
Beyond battery power - how the competition will work
Beyond battery power - how the competition will workBeyond battery power - how the competition will work
Beyond battery power - how the competition will work
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
 
CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1
 
CDE competition briefing - FASS technology challenge 2
CDE competition briefing - FASS technology challenge 2CDE competition briefing - FASS technology challenge 2
CDE competition briefing - FASS technology challenge 2
 
Tips on how to submit a great proposal to the Centre for Defence Enterprise
Tips on how to submit a great proposal to the Centre for Defence EnterpriseTips on how to submit a great proposal to the Centre for Defence Enterprise
Tips on how to submit a great proposal to the Centre for Defence Enterprise
 
An introduction to CDE, as delivered at the Innovation Networking Event
An introduction to CDE, as delivered at the Innovation Networking EventAn introduction to CDE, as delivered at the Innovation Networking Event
An introduction to CDE, as delivered at the Innovation Networking Event
 
An explanation on how the CDE competition works.
An explanation on how the CDE competition works.An explanation on how the CDE competition works.
An explanation on how the CDE competition works.
 
An overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience CentreAn overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience Centre
 
CDE competition: Future Aviation Security Solutions challenge
CDE competition: Future Aviation Security Solutions challengeCDE competition: Future Aviation Security Solutions challenge
CDE competition: Future Aviation Security Solutions challenge
 
CDE - Innovation Network Event - 17 Nov 2016
CDE - Innovation Network Event - 17 Nov 2016CDE - Innovation Network Event - 17 Nov 2016
CDE - Innovation Network Event - 17 Nov 2016
 
many drones make light work themed competition 22 September 2016
many drones make light work themed competition 22 September 2016many drones make light work themed competition 22 September 2016
many drones make light work themed competition 22 September 2016
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

22 May 2014: Guest briefing at CDE Innovation Network - SQR Systems

  • 1. SQR Systems CDE Open Call Dr. Nithin Thomas CEO Nithin.thomas@sqrsystems.com
  • 2. The proposal High bandwidth connections Low bandwidth connections Locks down the data, preventing it from being modified High bandwidth connections Low bandwidth connections Allows the data to be optimised in encrypted form Decrypted data exposed to cyberattack Software to securely transmit high quality video data in encrypted form over disadvantaged networks Traditional encryption SQR encryption Every user gets the best possible video for their link but the network never generates any decrypted content
  • 3. The outcome Encryption Technology Compression Technology Compliant with Standards Open Architecture & Compatible Data kept secure throughout delivery process, removing opportunity for cyber-attack. Optimal use of bandwidth to ensure best user experience. Easy integration with other software & hardware (inclusive of commercial platforms) Maximum interoperability with other systems C O M B I N E D COMMERCIAL IN CONFIDENCE
  • 4. Applications • C4ISR • Tactical comms • Dismounted soldier • Protection of CNI • Satcoms
  • 5. The experience • Funding to develop technology from an early level of maturity • Fully funded projects are valuable for start-ups • Ownership of IP is a favourable term that allows companies to exploit the technology • Working at unclassified level allows maximum flexibility for deploying the technology in commercial applications • External Investment still required to sustain cash flow due to milestone payments • Follow on funding may not come through at the right time • Exploitation path not always clear
  • 6. The outcomes Winner of the Shell Innovation Award 2012 Winner of the Global Security Challenge 2013 Winner of Shell LiveWire Grand Ideas 2011 Winner of Cambridge Wireless Discovering Startups 2013 Finalist of SmartUK 2014  Technology  Unique integrated encryption & compression software  Secure and unbroken wireless communication even during poor connectivity  Open architecture enabling easy integration with other software & hardware.  Verticals  Defence & Aerospace (D&A)  Technology Media Telecom (TMT)  A broad range including Critical Infrastructure Protection (CIP) & Healthcare  Customers  UK and US government agencies  Global cyber security solutions providers  Private sector clients  Team  R&D focused – 4 x PhDs  Track record of delivering projects to performance, time and cost Involved in research programmes with the UK and US governments for military and commercial applications Recognised by the Royal Society (the pre- eminent scientific body in the UK) in its work on cyber security research (to be published summer 2014)