SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
Market 
• Experts credit the increased availability of security 
systems as a contributing factor of this decrease in 
break-ins.
Market
Market 
• Only 7.35% of America’s 132,000,000+ 
homes have a security system. 
• Over 1.85 Million petty thefts occur in vehicles 
each year. 
• By 2015, security will be a 220 Billion dollar 
industry. 
• The “Internet of Things” is a hot trend. People 
are starting to figure out that cloud technology 
can make life much simpler, and are seeking 
out ways to take advantage of it.
• Major players such as ADT and 
AlarmForce dominate the 
market, but are costly and 
inefficient. 
• Startups such as Scout and 
Canary are up and coming. 
Landscape 
• Traditional alarm systems rely on dispatch 
centres that rarely stop or prevent a robbery. 
• They are poorly designed, difficult to manage, 
and impossible to customize.
Google and Nest may move into home 
security by buying out Dropcam
Thank You! 
• Questions? 
• jldavid@gmail.com 
• @jldavid on Twitter

Contenu connexe

Tendances

Capital Consultants Inc Presentation
Capital Consultants Inc PresentationCapital Consultants Inc Presentation
Capital Consultants Inc Presentation
capitalconsultants
 
Arnaud Thiercelin at AI Frontiers : AI in the Sky
Arnaud Thiercelin at AI Frontiers : AI in the SkyArnaud Thiercelin at AI Frontiers : AI in the Sky
Arnaud Thiercelin at AI Frontiers : AI in the Sky
AI Frontiers
 

Tendances (16)

Security Threats in IT Infographic
Security Threats in IT InfographicSecurity Threats in IT Infographic
Security Threats in IT Infographic
 
Evantage Technology Cybersecurity presentation
Evantage Technology Cybersecurity presentation Evantage Technology Cybersecurity presentation
Evantage Technology Cybersecurity presentation
 
3D Printing and Piracy: What lessons can be learned from the piracy of digita...
3D Printing and Piracy: What lessons can be learned from the piracy of digita...3D Printing and Piracy: What lessons can be learned from the piracy of digita...
3D Printing and Piracy: What lessons can be learned from the piracy of digita...
 
Iran's Tech & Investment Scene
Iran's Tech & Investment SceneIran's Tech & Investment Scene
Iran's Tech & Investment Scene
 
Exploring the Opportunities of Internet of Things (IoT)
Exploring the Opportunities of Internet of Things (IoT)Exploring the Opportunities of Internet of Things (IoT)
Exploring the Opportunities of Internet of Things (IoT)
 
Tech4Africa - Internet of Things for Enterprise
Tech4Africa - Internet of Things for EnterpriseTech4Africa - Internet of Things for Enterprise
Tech4Africa - Internet of Things for Enterprise
 
Digital is not social
Digital is not socialDigital is not social
Digital is not social
 
2Go product pitch deck
2Go product pitch deck2Go product pitch deck
2Go product pitch deck
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)
 
Paneldebat: Bring Your Own Device - hvorfor og hvordan?, Martin Vittrup
Paneldebat: Bring Your Own Device - hvorfor og hvordan?, Martin VittrupPaneldebat: Bring Your Own Device - hvorfor og hvordan?, Martin Vittrup
Paneldebat: Bring Your Own Device - hvorfor og hvordan?, Martin Vittrup
 
Idc security graphic
Idc security graphicIdc security graphic
Idc security graphic
 
The Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & TechnologyThe Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & Technology
 
Capital Consultants Inc Presentation
Capital Consultants Inc PresentationCapital Consultants Inc Presentation
Capital Consultants Inc Presentation
 
The Role of Product Managers in Securing the Internet of Things by Daniel Eli...
The Role of Product Managers in Securing the Internet of Things by Daniel Eli...The Role of Product Managers in Securing the Internet of Things by Daniel Eli...
The Role of Product Managers in Securing the Internet of Things by Daniel Eli...
 
Arnaud Thiercelin at AI Frontiers : AI in the Sky
Arnaud Thiercelin at AI Frontiers : AI in the SkyArnaud Thiercelin at AI Frontiers : AI in the Sky
Arnaud Thiercelin at AI Frontiers : AI in the Sky
 

En vedette

iOS Development Workshop
iOS Development WorkshopiOS Development Workshop
iOS Development Workshop
Jean-Luc David
 
NEPHP '13: Pragmatic API Development
NEPHP '13: Pragmatic API DevelopmentNEPHP '13: Pragmatic API Development
NEPHP '13: Pragmatic API Development
Andrew Curioso
 
Venture For Canada - Growing Your Startup
Venture For Canada - Growing Your StartupVenture For Canada - Growing Your Startup
Venture For Canada - Growing Your Startup
Jean-Luc David
 
Introduction to iOS development
Introduction to iOS developmentIntroduction to iOS development
Introduction to iOS development
Jean-Luc David
 
Cakefest 2010: API Development
Cakefest 2010: API DevelopmentCakefest 2010: API Development
Cakefest 2010: API Development
Andrew Curioso
 
NEPHP '12: Create a RESTful API
NEPHP '12: Create a RESTful APINEPHP '12: Create a RESTful API
NEPHP '12: Create a RESTful API
Andrew Curioso
 

En vedette (20)

Introduction to MongoDB
Introduction to MongoDBIntroduction to MongoDB
Introduction to MongoDB
 
iOS Development Workshop
iOS Development WorkshopiOS Development Workshop
iOS Development Workshop
 
NEPHP '13: Pragmatic API Development
NEPHP '13: Pragmatic API DevelopmentNEPHP '13: Pragmatic API Development
NEPHP '13: Pragmatic API Development
 
Intro to HTTP and Node.js
Intro to HTTP and Node.jsIntro to HTTP and Node.js
Intro to HTTP and Node.js
 
Venture For Canada - Growing Your Startup
Venture For Canada - Growing Your StartupVenture For Canada - Growing Your Startup
Venture For Canada - Growing Your Startup
 
Tune hadoop
Tune hadoopTune hadoop
Tune hadoop
 
Building WatchKit Applications
Building WatchKit ApplicationsBuilding WatchKit Applications
Building WatchKit Applications
 
RightCycle
RightCycleRightCycle
RightCycle
 
Introduction to iOS development
Introduction to iOS developmentIntroduction to iOS development
Introduction to iOS development
 
Confoo Developing for Wearables
Confoo   Developing for WearablesConfoo   Developing for Wearables
Confoo Developing for Wearables
 
Writing Mirror API and Native Apps for Google Glass
Writing Mirror API and Native Apps for Google GlassWriting Mirror API and Native Apps for Google Glass
Writing Mirror API and Native Apps for Google Glass
 
Lessons from the Trenches: Building an API-Centric Architecture
Lessons from the Trenches: Building an API-Centric ArchitectureLessons from the Trenches: Building an API-Centric Architecture
Lessons from the Trenches: Building an API-Centric Architecture
 
Venture For Canada - Growth Marketing
Venture For Canada - Growth MarketingVenture For Canada - Growth Marketing
Venture For Canada - Growth Marketing
 
Cakefest 2010: API Development
Cakefest 2010: API DevelopmentCakefest 2010: API Development
Cakefest 2010: API Development
 
Venture For Canada - Growth Hacking
Venture For Canada - Growth HackingVenture For Canada - Growth Hacking
Venture For Canada - Growth Hacking
 
Startup Product Management - Execution
Startup Product Management - ExecutionStartup Product Management - Execution
Startup Product Management - Execution
 
Startup Product Management - Analytics
Startup Product Management - AnalyticsStartup Product Management - Analytics
Startup Product Management - Analytics
 
Code Retreat
Code RetreatCode Retreat
Code Retreat
 
NEPHP '12: Create a RESTful API
NEPHP '12: Create a RESTful APINEPHP '12: Create a RESTful API
NEPHP '12: Create a RESTful API
 
Mike Krieger - A Brief, Rapid History of Scaling Instagram (with a tiny team)
Mike Krieger - A Brief, Rapid History of Scaling Instagram (with a tiny team)Mike Krieger - A Brief, Rapid History of Scaling Instagram (with a tiny team)
Mike Krieger - A Brief, Rapid History of Scaling Instagram (with a tiny team)
 

Similaire à Innovation & Business Acquisitions of Smart Security

20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
CIONET
 

Similaire à Innovation & Business Acquisitions of Smart Security (20)

Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
 
PPT-in-IT-GEE103.pptx
PPT-in-IT-GEE103.pptxPPT-in-IT-GEE103.pptx
PPT-in-IT-GEE103.pptx
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...
 
Sigilo - Cellular Transmitter For Property Security
Sigilo - Cellular Transmitter For Property SecuritySigilo - Cellular Transmitter For Property Security
Sigilo - Cellular Transmitter For Property Security
 
Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass Houses
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy Industry
 
CTPAT and Cybersecurity.
CTPAT and Cybersecurity.  CTPAT and Cybersecurity.
CTPAT and Cybersecurity.
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 
Building the framework for business transformation session sponsored by int...
Building the framework for business transformation   session sponsored by int...Building the framework for business transformation   session sponsored by int...
Building the framework for business transformation session sponsored by int...
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
 
189 Remote Alarm - Simple Disposable Cellphone based
189 Remote Alarm - Simple Disposable Cellphone based189 Remote Alarm - Simple Disposable Cellphone based
189 Remote Alarm - Simple Disposable Cellphone based
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
Privacy and technology
Privacy and technologyPrivacy and technology
Privacy and technology
 
Jim Noble SEASIM Keynote
Jim Noble SEASIM KeynoteJim Noble SEASIM Keynote
Jim Noble SEASIM Keynote
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
 

Plus de Jean-Luc David

Ryerson DMZ iOS Development Workshop
Ryerson DMZ iOS Development WorkshopRyerson DMZ iOS Development Workshop
Ryerson DMZ iOS Development Workshop
Jean-Luc David
 
Rocket Fuel For Your API
Rocket Fuel For Your APIRocket Fuel For Your API
Rocket Fuel For Your API
Jean-Luc David
 
Creating killer location-based mobile apps
Creating killer location-based mobile apps Creating killer location-based mobile apps
Creating killer location-based mobile apps
Jean-Luc David
 

Plus de Jean-Luc David (16)

Implementing Biometric Authentication & Features in iOS Apps
Implementing Biometric Authentication & Features in iOS AppsImplementing Biometric Authentication & Features in iOS Apps
Implementing Biometric Authentication & Features in iOS Apps
 
Add Machine Learning to your iOS 11 App Using Core ML
Add Machine Learning to your iOS 11 App Using Core MLAdd Machine Learning to your iOS 11 App Using Core ML
Add Machine Learning to your iOS 11 App Using Core ML
 
Mobile Portfolio
Mobile PortfolioMobile Portfolio
Mobile Portfolio
 
Startup Product Management - Planning
Startup Product Management - PlanningStartup Product Management - Planning
Startup Product Management - Planning
 
Developing For Wearables - Lessons Learned & Best Practices
Developing For Wearables - Lessons Learned & Best PracticesDeveloping For Wearables - Lessons Learned & Best Practices
Developing For Wearables - Lessons Learned & Best Practices
 
Developing for Wearables
Developing for WearablesDeveloping for Wearables
Developing for Wearables
 
Ryerson DMZ iOS Development Workshop
Ryerson DMZ iOS Development WorkshopRyerson DMZ iOS Development Workshop
Ryerson DMZ iOS Development Workshop
 
Pigeon Presentation at We Are Wearables Toronto
Pigeon Presentation at We Are Wearables TorontoPigeon Presentation at We Are Wearables Toronto
Pigeon Presentation at We Are Wearables Toronto
 
Cardign Post-Mortem
Cardign Post-MortemCardign Post-Mortem
Cardign Post-Mortem
 
Waystation Presentation at Toronto 2013 NASA Hackathon
Waystation Presentation at Toronto 2013 NASA Hackathon Waystation Presentation at Toronto 2013 NASA Hackathon
Waystation Presentation at Toronto 2013 NASA Hackathon
 
Hack Day Manifesto
Hack Day ManifestoHack Day Manifesto
Hack Day Manifesto
 
Actively
ActivelyActively
Actively
 
iOS Coding Best Practices
iOS Coding Best PracticesiOS Coding Best Practices
iOS Coding Best Practices
 
Rocket Fuel For Your API
Rocket Fuel For Your APIRocket Fuel For Your API
Rocket Fuel For Your API
 
Creating killer location-based mobile apps
Creating killer location-based mobile apps Creating killer location-based mobile apps
Creating killer location-based mobile apps
 
The Mobile Ecosystem - APIs & Opportunities
The Mobile Ecosystem - APIs & OpportunitiesThe Mobile Ecosystem - APIs & Opportunities
The Mobile Ecosystem - APIs & Opportunities
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Innovation & Business Acquisitions of Smart Security

  • 1.
  • 2. Market • Experts credit the increased availability of security systems as a contributing factor of this decrease in break-ins.
  • 4. Market • Only 7.35% of America’s 132,000,000+ homes have a security system. • Over 1.85 Million petty thefts occur in vehicles each year. • By 2015, security will be a 220 Billion dollar industry. • The “Internet of Things” is a hot trend. People are starting to figure out that cloud technology can make life much simpler, and are seeking out ways to take advantage of it.
  • 5.
  • 6. • Major players such as ADT and AlarmForce dominate the market, but are costly and inefficient. • Startups such as Scout and Canary are up and coming. Landscape • Traditional alarm systems rely on dispatch centres that rarely stop or prevent a robbery. • They are poorly designed, difficult to manage, and impossible to customize.
  • 7. Google and Nest may move into home security by buying out Dropcam
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Thank You! • Questions? • jldavid@gmail.com • @jldavid on Twitter