SlideShare a Scribd company logo
1 of 15
Panic Button on a Smartphone
1
Security
the way it should be
Problem
2
Personal safety threats happen, when we are not
expecting that.
To get help you have to call 112 or 911 and explain
who are you, where are you and what happened.
But the offender may not want to give you that
chance…
There are so many cases, when you would like to
make a discreet call for help, than to provoke
offender.
Or to give him a chance to escape justice.
Solution
3
A Panic Button on a Smartphone
You can make a discreet call for help without
taking your phone out of a pocket.
Our system will locate your position via GPS and
send the nearest patrol to you.
The patrol will find you (by your GPS coordinates
and photo), protect you and resolve the situation.
Already Working
in the capital of Ukraine, Kiev!
Why Now
4
How it was
Years ago, maintenance of a public order was
carried out by guards.
They were patrolling the streets and the
squares. They could protect someone only if
they had seen a crime or if they heard
"Guards!".
Now, the police also provides protection by
patrolling, but cars and radio sets were added.
5
How it has to be
Now, almost everyone has a smartphone with an
Internet access and a built-in GPS-module.
It allows a person in emergency to call for help
directly at his GPS coordinates.
Before the crime could be committed.
No need to explain who have called and where to
go.
Due to social instability in Europe, this service has
become really well-timed.
Why Now
Market Size
6
TAM, SAM and SOM
TAM – about 2 billion people use
smartphones at the moment
SAM – about 54% of the population lives
in cities: 1.08 billion people
SOM – presumably 50% of the population
willing to buy our product:
540 million people
The Customer
7
Anyone With a Smartphone
The statistics of an advertising campaign in
Ukraine (5 months) shows that our audience is
70% men and 30% women.
The age of the majority of people who are
interested in our service is 25-44 years (67%).
Competition
8
9
Product line-up
The software suite consists of 3 parts:
1.Server part
2.Application for a patrol
3.Application for a client
The application for a client allows you to make a call to
your coordinates by pressing multiple times the “ON” button.
The server part oversees the movement of patrols and
finds the nearest to you. Further process is controlled by the
dispatcher.
The application for a patrol shows the client’s location on
a map, photo, etc.
Product
10
Development roadmap
1.The application for the iPhone and other
software improvements
2.Signing the contracts with security
organizations (private and/or state)
3.Entering the EU market (advertising and legal
issues)
4.Entering new markets when new contracts
are signed
Product
11
Sources of income: 1) Subscription fee
2) Partners in regions
1) Subscription fee: Monthly: $ 4
For a call: $ 10
2) Affiliate Program: First payment: ~ $ 15,000
50% of the monthly fee
We have the ones who wish!
Business Model
six months
year
= 96 000 $/Month
= 480 000 $/Month
Expected income :
Investment
12
Currently we are raising $ 200k in exchange for
10% equity
They are needed for:
1. Entering the market of one of the EU countries
2. Continue development
13
We've launched
our service in
Ukraine in the
last year for
beta-testing and
business model
validation.
Statistics20 000
14
Founders & Management
Andrew Oles
CEO
25 years of management
experience in
different companies
Pavel Oles
CTO
Owns a few profitable
projects in the
IT industry
Core Team
en.kds-ua.com
15
When the wind of change
is blowing,
some build walls,
others - windmills.
Chinese Proverb

More Related Content

Similar to CDS presentation v9

Phone keeper presentation,Arion
Phone keeper presentation,ArionPhone keeper presentation,Arion
Phone keeper presentation,ArionCharlie Hardy
 
Phone keeper presentation
Phone keeper presentationPhone keeper presentation
Phone keeper presentationCharlie Hardy
 
Activity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTActivity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTrahulmonikasharma
 
Verfied Response Is Your Business Protected 071712
Verfied Response Is Your Business Protected 071712Verfied Response Is Your Business Protected 071712
Verfied Response Is Your Business Protected 071712angeloslideshare
 
KPN M2M MySafeGuard sales presentation November 2013
KPN M2M MySafeGuard sales presentation November  2013KPN M2M MySafeGuard sales presentation November  2013
KPN M2M MySafeGuard sales presentation November 2013KPN IoT
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensicsi4box Anon
 
For the safer world
For the safer worldFor the safer world
For the safer worldTony TRAN
 
A new system to detect coronavirus social distance violation
A new system to detect coronavirus social distance violation A new system to detect coronavirus social distance violation
A new system to detect coronavirus social distance violation IJECEIAES
 
Phone keeper presentation
Phone keeper presentationPhone keeper presentation
Phone keeper presentationCharlie Hardy
 
Savdhaan (Women Security App)
Savdhaan (Women Security App)Savdhaan (Women Security App)
Savdhaan (Women Security App)Poojaagrawal130
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
An Improved Personal Security System
An Improved Personal Security SystemAn Improved Personal Security System
An Improved Personal Security SystemIJERA Editor
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 
Safety seminar for_realtors
Safety seminar for_realtorsSafety seminar for_realtors
Safety seminar for_realtorsFrancois
 
Safety seminar for REALTORS
Safety seminar for REALTORSSafety seminar for REALTORS
Safety seminar for REALTORSFrancois
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safetyiosrjce
 
Mobile Security Sticks and Carrots
Mobile Security Sticks and CarrotsMobile Security Sticks and Carrots
Mobile Security Sticks and CarrotsCraig Heath
 

Similar to CDS presentation v9 (20)

Phone keeper presentation,Arion
Phone keeper presentation,ArionPhone keeper presentation,Arion
Phone keeper presentation,Arion
 
Phone keeper presentation
Phone keeper presentationPhone keeper presentation
Phone keeper presentation
 
Activity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTActivity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOT
 
Verfied Response Is Your Business Protected 071712
Verfied Response Is Your Business Protected 071712Verfied Response Is Your Business Protected 071712
Verfied Response Is Your Business Protected 071712
 
KPN M2M MySafeGuard sales presentation November 2013
KPN M2M MySafeGuard sales presentation November  2013KPN M2M MySafeGuard sales presentation November  2013
KPN M2M MySafeGuard sales presentation November 2013
 
Pros and cons of today
Pros and cons of todayPros and cons of today
Pros and cons of today
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
 
For the safer world
For the safer worldFor the safer world
For the safer world
 
A new system to detect coronavirus social distance violation
A new system to detect coronavirus social distance violation A new system to detect coronavirus social distance violation
A new system to detect coronavirus social distance violation
 
Phone keeper presentation
Phone keeper presentationPhone keeper presentation
Phone keeper presentation
 
Savdhaan (Women Security App)
Savdhaan (Women Security App)Savdhaan (Women Security App)
Savdhaan (Women Security App)
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
An Improved Personal Security System
An Improved Personal Security SystemAn Improved Personal Security System
An Improved Personal Security System
 
Sentinel introduction
Sentinel introductionSentinel introduction
Sentinel introduction
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Safety seminar for_realtors
Safety seminar for_realtorsSafety seminar for_realtors
Safety seminar for_realtors
 
Safety seminar for REALTORS
Safety seminar for REALTORSSafety seminar for REALTORS
Safety seminar for REALTORS
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safety
 
A017340104
A017340104A017340104
A017340104
 
Mobile Security Sticks and Carrots
Mobile Security Sticks and CarrotsMobile Security Sticks and Carrots
Mobile Security Sticks and Carrots
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

CDS presentation v9

  • 1. Panic Button on a Smartphone 1 Security the way it should be
  • 2. Problem 2 Personal safety threats happen, when we are not expecting that. To get help you have to call 112 or 911 and explain who are you, where are you and what happened. But the offender may not want to give you that chance… There are so many cases, when you would like to make a discreet call for help, than to provoke offender. Or to give him a chance to escape justice.
  • 3. Solution 3 A Panic Button on a Smartphone You can make a discreet call for help without taking your phone out of a pocket. Our system will locate your position via GPS and send the nearest patrol to you. The patrol will find you (by your GPS coordinates and photo), protect you and resolve the situation. Already Working in the capital of Ukraine, Kiev!
  • 4. Why Now 4 How it was Years ago, maintenance of a public order was carried out by guards. They were patrolling the streets and the squares. They could protect someone only if they had seen a crime or if they heard "Guards!". Now, the police also provides protection by patrolling, but cars and radio sets were added.
  • 5. 5 How it has to be Now, almost everyone has a smartphone with an Internet access and a built-in GPS-module. It allows a person in emergency to call for help directly at his GPS coordinates. Before the crime could be committed. No need to explain who have called and where to go. Due to social instability in Europe, this service has become really well-timed. Why Now
  • 6. Market Size 6 TAM, SAM and SOM TAM – about 2 billion people use smartphones at the moment SAM – about 54% of the population lives in cities: 1.08 billion people SOM – presumably 50% of the population willing to buy our product: 540 million people
  • 7. The Customer 7 Anyone With a Smartphone The statistics of an advertising campaign in Ukraine (5 months) shows that our audience is 70% men and 30% women. The age of the majority of people who are interested in our service is 25-44 years (67%).
  • 9. 9 Product line-up The software suite consists of 3 parts: 1.Server part 2.Application for a patrol 3.Application for a client The application for a client allows you to make a call to your coordinates by pressing multiple times the “ON” button. The server part oversees the movement of patrols and finds the nearest to you. Further process is controlled by the dispatcher. The application for a patrol shows the client’s location on a map, photo, etc. Product
  • 10. 10 Development roadmap 1.The application for the iPhone and other software improvements 2.Signing the contracts with security organizations (private and/or state) 3.Entering the EU market (advertising and legal issues) 4.Entering new markets when new contracts are signed Product
  • 11. 11 Sources of income: 1) Subscription fee 2) Partners in regions 1) Subscription fee: Monthly: $ 4 For a call: $ 10 2) Affiliate Program: First payment: ~ $ 15,000 50% of the monthly fee We have the ones who wish! Business Model six months year = 96 000 $/Month = 480 000 $/Month Expected income :
  • 12. Investment 12 Currently we are raising $ 200k in exchange for 10% equity They are needed for: 1. Entering the market of one of the EU countries 2. Continue development
  • 13. 13 We've launched our service in Ukraine in the last year for beta-testing and business model validation. Statistics20 000
  • 14. 14 Founders & Management Andrew Oles CEO 25 years of management experience in different companies Pavel Oles CTO Owns a few profitable projects in the IT industry Core Team en.kds-ua.com
  • 15. 15 When the wind of change is blowing, some build walls, others - windmills. Chinese Proverb