SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
JCJ Business
JCJ
Proprietary & Confidential
Corporate Overview
• JCJ provides solutions to governments,
service provider sand enterprises seeking to achieve
full control of Skype within their networks.
• JCJ was founded in April, 2010.
– Offices located in the U.S and Canada
– $800K initial angel investment
– Headcount – 8 employees and contractors
• JCJ solutions protected by patents:
– Skype detection and blocking
– Skype traffic analysis
– Skype Legal Intercept
– Defensive capabilities that protect customer networks and assets from Skype based attacks and
exploits
– Offensive capabilities based on Skype infrastructure
– Intelligence collection using Skype infrastructure
• Only available from JCJ
• Deployed within US government and overseas in telecom infrastructure supporting 30+
million people
2
What is Skype?
Network of 800 million users and 30% of global telco traffic
3
SuperNode
SuperNode
SuperNode
Relay
RelayRelay
Vulnerabilities to Networks
• P2P - Decentralized & distributed
• Bypasses firewalls, IPS and NAT
• Unmanageable
• Untraceable
• Undetectable
• Exposes organizations to significant risk
Benefits to Skype User
• Highly secure proprietary encrypted signalling
• Highly secure proprietary encrypted media (voice,
video, IM, files)
• Extremely cost effective
• Best in class obfuscation and anti-debugging
protection
Client
Client
Skype Global Market
• 800+ million registered users, 45 million concurrent users on-line
• Strong move to wireless space via smartphones.
• Moving to consumer products such as TV sets.
• Tight integration with Microsoft products
• Integration with Facebook (1 billion users).
• Corporate security managers see Skype as a potential threat.
• Skype for iPhone and Android represent a threat to telecoms
4
Challenges of Skype
• Security and Compliance
– Enables untraceable transfer of information from/to enterprises using Skype
file transfer, IM, voice and video channels (source code, client information,
trade secrets, etc.)
• Telco's revenues
– Skype heavily impacting voice revenue due to usage of data components of
the calling plans
• Network enumeration and reconnaissance
– Allows to obtain external/internal IP addresses of devices behind firewalls/NAT
– Enhances attacker ability to perform targeted attacks on targets
• Cyber attacks
– Ideal platform for launching sophisticated attacks (bypasses security
infrastructure)
• Legal Intercept
– Fully encrypted communication
• Network Resources
– Unauthorized utilization of computing and network resources
– Skype video calls can reach a peak at 500 kbit/s per user, taxing the
enterprise infrastructure
5
JCJ Value Proposition
• Manage and control unwanted/unauthorized communications within, as well as, to and
from the network through visibility to Skype.
• Provide Skype reporting, tracking, and historical communications records for applications
like Skype, across the network, ensuring compliance with internal security practices and
industry requirements.
• Provides Skype blocking capabilities in conjunction with 3rd party firewalls,
IPS, etc.
• Enables telcos to control and manage Skype traffic
• Provides Skype Legal Intercept (LI) capabilities
• Enable the organizations to rapidly respond to, and defend against,
Skype born cyber attacks.
• Enables implementation of unique offensive capabilities based on
Skype infrastructure
• Reclaim enterprise assets and reduce expenses associated with them by managing
resources hijacked by Skype applications
JCJ Products and Solutions
7
• Detection Engine™ provides 100% reliable detection of Skype
traffic:
• Collection of information about Skype users, calls, sessions and other
information related Skype usage
• Very high performance (proven in production) - 10 and 20 Gbit/s
• Network connectivity – in-line or network tap
• Provides Skype blocking capabilities in conjunction with 3rd party
firewalls, IPS, etc.
• Implementation – Stand-alone product or OEM
• Analytical Engine™ works in concert with Detection Engines and
provides:
• Skype usage statistics reports
• maps of Skype network providing comprehensive view of
infrastructure, clients, relays and other resources used by Skype
• Centralized management for Detection Engines infrastructure
JCJ Products and Solutions
8
• Skype LI™ uses the infrastructure provided by Detection
Engine™ and Analytical Engine to collect content of the
communication carried over Skype voice, video and IM
channels.
• Skype DLP™ provides protection against data leakage
utilizing Skype infrastructure.
• Specialized capabilities available to government customers
JCJ Technology Stack
JCJ Products Roadmap
10
 Enhancements to Existing Solutions and Products:
 10Gbit/sec Skype media type identification
 Skype conferencing and call out handling
 Support for Skype/Facebook
 Integration with firewalls using OpenFlow
 GUI enhancements
 New Product Functionality
 RipTide Data Leakage Protection
 Expanded support for mobile devices
 Enhanced LI
 Skype Blocking Solutions
JCJ Customers
11
• Oversea Service Provider
 Skype Legal Intercept Solution
 30+ million people
 24x10 Gbit/s pipes
 14 Detection Engines
 1 Analytical Engine
 LI module
 Several more deployment expected next year
• US Government Agency
 Specialized capabilities
Potential License Sales Revenue
12
• Average large deal size (24x10 Gbit/s pipes)
 Software/Appliances - $4,175,000
 Implementation – $20,000
 Average Sale – $4,195,000
 Support @20%/year - $835,000
• Average medium deal size (8x10 Gbit/s pipes)
 Software/Appliances - $1,925,000
 Implementation – $10,000
 Average Sale – $1,925,000
 Support @20%/year - $385,000
• Average small size deal (1x10 Gbit/s pipe)
 Software/Appliances - $1,250,000
 Implementation – $10,000
 Average Sale – $1,260,000
 Support @20%/year - $252,000
Market Analysis
13
• Market segments:
• Government agencies globally
• Service Providers globally
• Enterprises North America and Europe
• Market Segment – JCJ Solutions
• Government agencies globally – Skype LI, special cyber capabilities
• Service Providers - Skype detection and management
• Enterprises – Skype detection and management including Data Leakage Protection (DLP)
• Market Segments – TAM, 2013
• Governments - 90 countries ~ $400M
• Service Providers – top 100 ~ $200M
• Fortune 500 and Europe 500 - ~ $100M
• TAM - ~$700M
• Market share targets:
• 2013 – 1% of the total market
• 2014 – 4% of the total market
• 2015 - 8% of the total market
Government
Service Providers
Fortune 500 and Europe
500
Competition
14
Existing solutions use statistical and behavioral analysis
to identify and/or block Skype:
 High false/positive
 Outdated
 No Skype control, statistics, content, etc.
 No LI capabilities
No Direct Competition – Technology Is Only Available From JCJ
JCJ IP
15
• Complete, in-depth knowledge of Skype protocols,
applications and network topology built over the
last 3 years
• Products and Solutions
• Research team
• Two non-provisional patents pending (09/2011) –
 “Method and Detection System for Detecting Encrypted Peer-to-peer (EP2P) Sessions Associated With a
Particular EP2P Network”
 “Method and Discovery System for Discovering Encrypted Peer-to-peer (EP2P) Nodes Associated With a
Particular EP2P Network”
• Two provisional patents –
 “Systems And Methods For Implementing Lawful Interception On Encrypted and/or Obfuscated P2P
Communication Network”
 “Systems and Methods for Preventing And Blocking Network Security Attacks Executed Through Encrypted
and/or Obfuscated P2P Communication Networks”

Contenu connexe

Tendances

Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
mashiur
 

Tendances (20)

Tech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentationTech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentation
 
Forti wifi
Forti wifiForti wifi
Forti wifi
 
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
4G LTE, 5G M2M IoT, Smartphone NFC Patents for Standards & Applications Data
 
Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...
Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...
Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...
 
PhNOG Regional Conference 2018: Strengthening Internet infrastructure in the ...
PhNOG Regional Conference 2018: Strengthening Internet infrastructure in the ...PhNOG Regional Conference 2018: Strengthening Internet infrastructure in the ...
PhNOG Regional Conference 2018: Strengthening Internet infrastructure in the ...
 
Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24
 
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRTMMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
 
PacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities Update
PacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities UpdatePacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities Update
PacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities Update
 
Vertu's Digital Transformation
Vertu's Digital TransformationVertu's Digital Transformation
Vertu's Digital Transformation
 
APNIC Update, NPNOG 0.5
APNIC Update, NPNOG 0.5APNIC Update, NPNOG 0.5
APNIC Update, NPNOG 0.5
 
IANA Transition Update, August 2016
IANA Transition Update, August 2016IANA Transition Update, August 2016
IANA Transition Update, August 2016
 
IANA: Who, What, Why?
IANA: Who, What, Why?IANA: Who, What, Why?
IANA: Who, What, Why?
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOG
 
Drilling down into networks from the APNIC data
Drilling down into networks from the APNIC dataDrilling down into networks from the APNIC data
Drilling down into networks from the APNIC data
 
A Secure & Reliable Wi-Fi Experience at The Federal Court of Malaysia
A Secure & Reliable Wi-Fi Experience at The Federal Court of MalaysiaA Secure & Reliable Wi-Fi Experience at The Federal Court of Malaysia
A Secure & Reliable Wi-Fi Experience at The Federal Court of Malaysia
 
UN INCB: RIRs and LEAs
UN INCB: RIRs and LEAsUN INCB: RIRs and LEAs
UN INCB: RIRs and LEAs
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
 
Whois - Addressing the Asia Pacifc
Whois - Addressing the Asia PacifcWhois - Addressing the Asia Pacifc
Whois - Addressing the Asia Pacifc
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
How APNIC can support law enforcement agencies in cybercrime investigtaion
How APNIC can support law enforcement agencies in cybercrime investigtaionHow APNIC can support law enforcement agencies in cybercrime investigtaion
How APNIC can support law enforcement agencies in cybercrime investigtaion
 

Similaire à Jcj corporate blind overview november 19 2012 1-1

EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
ERPScan
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
Anton Lishchuk
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
chris odle
 
CIC _ 2.0 ver 1.06-AI
CIC _ 2.0 ver 1.06-AICIC _ 2.0 ver 1.06-AI
CIC _ 2.0 ver 1.06-AI
Ahmed Ismail
 

Similaire à Jcj corporate blind overview november 19 2012 1-1 (20)

Decision group company_profile_2017
Decision group company_profile_2017Decision group company_profile_2017
Decision group company_profile_2017
 
Pc tech pitch deck
Pc tech pitch deckPc tech pitch deck
Pc tech pitch deck
 
Ether2 "The Net...fixed" (or "how to close the digital divide")
Ether2 "The Net...fixed" (or "how to close the digital divide")Ether2 "The Net...fixed" (or "how to close the digital divide")
Ether2 "The Net...fixed" (or "how to close the digital divide")
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
IT and OT Convergence
IT and OT ConvergenceIT and OT Convergence
IT and OT Convergence
 
CambridgeIP: Marketing Your Technology in the Credit Crunch
CambridgeIP: Marketing Your Technology in the Credit CrunchCambridgeIP: Marketing Your Technology in the Credit Crunch
CambridgeIP: Marketing Your Technology in the Credit Crunch
 
PCTech Pitch Deck
PCTech Pitch DeckPCTech Pitch Deck
PCTech Pitch Deck
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
SIPfoundry CoLab 2013 - Specific customer case studies for sipXecs and ROI an...
SIPfoundry CoLab 2013 - Specific customer case studies for sipXecs and ROI an...SIPfoundry CoLab 2013 - Specific customer case studies for sipXecs and ROI an...
SIPfoundry CoLab 2013 - Specific customer case studies for sipXecs and ROI an...
 
IOT_module_3.pdf
IOT_module_3.pdfIOT_module_3.pdf
IOT_module_3.pdf
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Telecom italia oss transformation roadmap marco daccò venice 2010
Telecom italia  oss transformation roadmap   marco daccò venice 2010Telecom italia  oss transformation roadmap   marco daccò venice 2010
Telecom italia oss transformation roadmap marco daccò venice 2010
 
CIC _ 2.0 ver 1.06-AI
CIC _ 2.0 ver 1.06-AICIC _ 2.0 ver 1.06-AI
CIC _ 2.0 ver 1.06-AI
 
Skylads - Big Data for Telcos
Skylads - Big Data for TelcosSkylads - Big Data for Telcos
Skylads - Big Data for Telcos
 
Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
EasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng OeiEasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng Oei
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Jcj corporate blind overview november 19 2012 1-1

  • 2. Corporate Overview • JCJ provides solutions to governments, service provider sand enterprises seeking to achieve full control of Skype within their networks. • JCJ was founded in April, 2010. – Offices located in the U.S and Canada – $800K initial angel investment – Headcount – 8 employees and contractors • JCJ solutions protected by patents: – Skype detection and blocking – Skype traffic analysis – Skype Legal Intercept – Defensive capabilities that protect customer networks and assets from Skype based attacks and exploits – Offensive capabilities based on Skype infrastructure – Intelligence collection using Skype infrastructure • Only available from JCJ • Deployed within US government and overseas in telecom infrastructure supporting 30+ million people 2
  • 3. What is Skype? Network of 800 million users and 30% of global telco traffic 3 SuperNode SuperNode SuperNode Relay RelayRelay Vulnerabilities to Networks • P2P - Decentralized & distributed • Bypasses firewalls, IPS and NAT • Unmanageable • Untraceable • Undetectable • Exposes organizations to significant risk Benefits to Skype User • Highly secure proprietary encrypted signalling • Highly secure proprietary encrypted media (voice, video, IM, files) • Extremely cost effective • Best in class obfuscation and anti-debugging protection Client Client
  • 4. Skype Global Market • 800+ million registered users, 45 million concurrent users on-line • Strong move to wireless space via smartphones. • Moving to consumer products such as TV sets. • Tight integration with Microsoft products • Integration with Facebook (1 billion users). • Corporate security managers see Skype as a potential threat. • Skype for iPhone and Android represent a threat to telecoms 4
  • 5. Challenges of Skype • Security and Compliance – Enables untraceable transfer of information from/to enterprises using Skype file transfer, IM, voice and video channels (source code, client information, trade secrets, etc.) • Telco's revenues – Skype heavily impacting voice revenue due to usage of data components of the calling plans • Network enumeration and reconnaissance – Allows to obtain external/internal IP addresses of devices behind firewalls/NAT – Enhances attacker ability to perform targeted attacks on targets • Cyber attacks – Ideal platform for launching sophisticated attacks (bypasses security infrastructure) • Legal Intercept – Fully encrypted communication • Network Resources – Unauthorized utilization of computing and network resources – Skype video calls can reach a peak at 500 kbit/s per user, taxing the enterprise infrastructure 5
  • 6. JCJ Value Proposition • Manage and control unwanted/unauthorized communications within, as well as, to and from the network through visibility to Skype. • Provide Skype reporting, tracking, and historical communications records for applications like Skype, across the network, ensuring compliance with internal security practices and industry requirements. • Provides Skype blocking capabilities in conjunction with 3rd party firewalls, IPS, etc. • Enables telcos to control and manage Skype traffic • Provides Skype Legal Intercept (LI) capabilities • Enable the organizations to rapidly respond to, and defend against, Skype born cyber attacks. • Enables implementation of unique offensive capabilities based on Skype infrastructure • Reclaim enterprise assets and reduce expenses associated with them by managing resources hijacked by Skype applications
  • 7. JCJ Products and Solutions 7 • Detection Engine™ provides 100% reliable detection of Skype traffic: • Collection of information about Skype users, calls, sessions and other information related Skype usage • Very high performance (proven in production) - 10 and 20 Gbit/s • Network connectivity – in-line or network tap • Provides Skype blocking capabilities in conjunction with 3rd party firewalls, IPS, etc. • Implementation – Stand-alone product or OEM • Analytical Engine™ works in concert with Detection Engines and provides: • Skype usage statistics reports • maps of Skype network providing comprehensive view of infrastructure, clients, relays and other resources used by Skype • Centralized management for Detection Engines infrastructure
  • 8. JCJ Products and Solutions 8 • Skype LI™ uses the infrastructure provided by Detection Engine™ and Analytical Engine to collect content of the communication carried over Skype voice, video and IM channels. • Skype DLP™ provides protection against data leakage utilizing Skype infrastructure. • Specialized capabilities available to government customers
  • 10. JCJ Products Roadmap 10  Enhancements to Existing Solutions and Products:  10Gbit/sec Skype media type identification  Skype conferencing and call out handling  Support for Skype/Facebook  Integration with firewalls using OpenFlow  GUI enhancements  New Product Functionality  RipTide Data Leakage Protection  Expanded support for mobile devices  Enhanced LI  Skype Blocking Solutions
  • 11. JCJ Customers 11 • Oversea Service Provider  Skype Legal Intercept Solution  30+ million people  24x10 Gbit/s pipes  14 Detection Engines  1 Analytical Engine  LI module  Several more deployment expected next year • US Government Agency  Specialized capabilities
  • 12. Potential License Sales Revenue 12 • Average large deal size (24x10 Gbit/s pipes)  Software/Appliances - $4,175,000  Implementation – $20,000  Average Sale – $4,195,000  Support @20%/year - $835,000 • Average medium deal size (8x10 Gbit/s pipes)  Software/Appliances - $1,925,000  Implementation – $10,000  Average Sale – $1,925,000  Support @20%/year - $385,000 • Average small size deal (1x10 Gbit/s pipe)  Software/Appliances - $1,250,000  Implementation – $10,000  Average Sale – $1,260,000  Support @20%/year - $252,000
  • 13. Market Analysis 13 • Market segments: • Government agencies globally • Service Providers globally • Enterprises North America and Europe • Market Segment – JCJ Solutions • Government agencies globally – Skype LI, special cyber capabilities • Service Providers - Skype detection and management • Enterprises – Skype detection and management including Data Leakage Protection (DLP) • Market Segments – TAM, 2013 • Governments - 90 countries ~ $400M • Service Providers – top 100 ~ $200M • Fortune 500 and Europe 500 - ~ $100M • TAM - ~$700M • Market share targets: • 2013 – 1% of the total market • 2014 – 4% of the total market • 2015 - 8% of the total market Government Service Providers Fortune 500 and Europe 500
  • 14. Competition 14 Existing solutions use statistical and behavioral analysis to identify and/or block Skype:  High false/positive  Outdated  No Skype control, statistics, content, etc.  No LI capabilities No Direct Competition – Technology Is Only Available From JCJ
  • 15. JCJ IP 15 • Complete, in-depth knowledge of Skype protocols, applications and network topology built over the last 3 years • Products and Solutions • Research team • Two non-provisional patents pending (09/2011) –  “Method and Detection System for Detecting Encrypted Peer-to-peer (EP2P) Sessions Associated With a Particular EP2P Network”  “Method and Discovery System for Discovering Encrypted Peer-to-peer (EP2P) Nodes Associated With a Particular EP2P Network” • Two provisional patents –  “Systems And Methods For Implementing Lawful Interception On Encrypted and/or Obfuscated P2P Communication Network”  “Systems and Methods for Preventing And Blocking Network Security Attacks Executed Through Encrypted and/or Obfuscated P2P Communication Networks”