SecurDigital Presentation V7

14
The Genesis Key, Inc. Confidential Secur communications for all The Genesis Key, Inc. Presentation for Consumers November, 2009

description

SecurDigital Privacy Edition

Transcript of SecurDigital Presentation V7

Page 1: SecurDigital Presentation V7

The Genesis Key, Inc. Confidential

Secur communications for all

The Genesis Key, Inc.Presentation for Consumers

November, 2009

Page 2: SecurDigital Presentation V7

The Genesis Key, Inc. Confidential

”SecurDigital has upped the ante considerably here. In a sudden leap, this innovative new product has shaken off the complexity of unified communications and has taken the lead in terms of ease of use, security and interoperability. Starting with simple encryption techniques in a Java-based application, SecurDigital has introduced SecurVoice© Privacy Edition, a next-gen secure digital data transmission solution, which takes the focus away from hardware or firmware centric smartphone offerings and provides a Solution that is application platform, operating system, device and carrier independent.

SecurVoice delivers encrypted voice, data or video transmission from any device to any device(s), with selectable encryption algorithms - allowing any companies to literally deploy “Secur Communications”.

Bruce F. Magown, CEOSecurDigital, Inc.

SecurDigital, Inc.

Page 3: SecurDigital Presentation V7

The Genesis Key, Inc. Confidential

Do I need Security for my Cell phone?

• Would you mind if you knew someone was listening to all of your calls on your home phone?

• Did you know that your cell can be turned on in the off position and the microphone will pick up your private conversations at home?

• Did you know that your phone is sending its signal numbers out to wireless towers 24/7?

• Did you know the only way to shut down your cell phone is to pull out the battery?

• Did you know that our government listens to every cell conversation on Route #95?

• Did you know that if you put your bank or credit card number into your cell that it stays there forever? All information the phone receives s put on record. There is no way to dump that info.

• If you are leading a Company or responsible for other peoples money that information buck stops with you, for you to be a secure source.

• Did you know that even the Bluetooth ear bud could be listened to with a scanner? Imagine someone standing in the street with a hidden scanner and transmitter you are most intimate calls can and are being routed to the internet, especially You-Tube.

• Did you know that most of the world is building their infrastructure on Maxi WiFi because it is less expensive and less time consuming to bury land cables? These citizens use their Phone for paying utilities and other bills over their cell phone.

• Ask a young computer engineer still in college what does he do all his work on, a lap top or a cell phone, they will tell you that lap tops are from the stone age. They have phones that are more portable, less expensive and handle all pictures, and recordings, documents, letters and forms all installed in the cell phone…You need to see the world is changing in front of your eyes.

• That person that says he does not see the need for personal cell security does not understand the world he is living in today…

Page 4: SecurDigital Presentation V7

The Genesis Key, Inc. Confidential

This presentation serves marketing purposes only. This presentation is made by The Genesis Key, Inc. (the "Company") solely for use at the road show presentation held in connection with the offering of shares of the Company and is strictly confidential. It is furnished to you solely for your information and may not be copied, distributed or otherwise made available to any other person by any recipient. Neither this presentation nor any copy of it may be taken or transmitted outside the United States or distributed outside the United States. Any failure to comply with this restriction may constitute a violation of the U.S. securities laws. The distribution of this document in other jurisdictions may also be restricted by law, and persons into whose possession this presentation comes should inform themselves about, and observe, any such restrictions. The facts and information contained herein are as up to date as is reasonably possible and are subject to revision in the future. None of the Company, Vantage Investment Group, Inc. or any of their parents or subsidiaries or any of such person's directors, officers, employees or advisors nor any other person makes any representation or warranty, express or implied as to, and no reliance should be placed on, the accuracy or completeness of the information contained in this presentation. None of the Company, Vantage Investment Group, Inc. or any of their parents or subsidiaries or any of their directors, officers, employees and advisors nor any other person shall have any liability whatsoever for any loss howsoever arising, directly or indirectly, from any use of this presentation. The same applies to information contained in other material made available at the presentation. While all reasonable care has been taken to ensure the facts stated herein are accurate and that the opinions contained herein are fair and reasonable, this document is selective in nature and is intended to provide an introduction to, and overview of, the business of the Company. Where any information and statistics are quoted from any external source, such information or statistics should not be interpreted as having been adopted or endorsed by the Company as being accurate.

This presentation contains forward-looking statements relating to the business, financial performance and results of the Company and/or the industry in which the Company operates. These statements generally are identified by words such as "believes," "expects," "predicts," "intends," "projects," "plans," "estimates," "aims," "foresees," "anticipates,“"targets," and similar expressions. The forward-looking statements, including but not limited to assumptions, opinions and views of the Company or information from third party sources, contained in this presentation are based on current plans, estimates, assumptions and projections and involve uncertainties and risks. Various factors could cause actual future results, performance or events to differ materially from those described in these statements. None of the Company or Vantage Investment Group, Inc. guarantees that the assumptions underlying such forward-looking statements are free from errors nor do they accept any responsibility for the future accuracy of the opinions expressed in this presentation. No obligation is assumed to update any forward-looking statements. By accepting this presentation you acknowledge that you will be solely responsible for your own assessment of the market and of the market position of the Company and that you will conduct your own analysis and be solely responsible for forming your own view of the potential future performance of the Company's business. This presentation does not constitute an offer or invitation to subscribe for, or purchase, any shares or other securities of the Company and neither this presentation nor anything contained herein shall form the basis of, or be relied on in connection with, any offer or commitment whatsoever in any jurisdiction in which such solicitation, offer or sale would be unlawful, nor shall part, or all, of these materials form the basis of, or be relied on in connection with, any contract or investment decision in relation to any securities. In particular, this presentation is not an offer for sale of securities in the United States. Securities may not be offered or sold in the United States absent registration or an exemption from registration under the U.S. Securities Act of 1933, as amended. Neither the Company nor any selling shareholder intends to register any securities of the Company outside the United States or to conduct a public offering of securities in any jurisdiction other than the United States. This presentation speaks as of September 14, 2009. Neither the delivery of this presentation nor any further discussions of the Company with any of the recipients shall, under any circumstances, create any implication that there has been no change in the affairs of the Company since such date.

Disclaimer

Page 5: SecurDigital Presentation V7

The Genesis Key, Inc. Confidential

Agenda

» Introduction

» Management Team

» Opportunity

» Solution

» Competition

» Pricing Model

» Summary

Page 6: SecurDigital Presentation V7

The Genesis Key, Inc. Confidential

Introduction

» The Genesis Key, Inc., incorporated on October 7, 2008, in Dover, Delaware as a ”C” corporation. The Executive Team has been working together on security solutions for four (4) years prior to SecurVoice© being developed as a need for one of those projects championed by Steve I. Cooper, former CIO for White House and DHS, and now CIO of the FAA.

» SecurVoice© target markets include; Banking, Financial Services and Brokerage Institutions, Attorney/Client privileged communications, the World Health Organization and HIPPA regulations for voice and data electronic transmission of patients health records between Hospitals, Doctors, Nurses and other long term Health providers, and now by law, the health monitoring systems needing secure communications to comply with Federal Regulations and Emergency Manager’s crisis coordination between all State and Local Police and Fire Departments. The company licenses using a SaaS or Enterprise software model with types for commercial or government.

» Sales of cell phones are on pace to reach a billion annually by the end of the decade, when nearly 40 percent of the world's population will own a mobile handset, according to a Gartner report. Asian countries will continue to play a major role in increasing the number of cell phones in circulation to 2.6 billion by 2009, the research firm estimated in the report. Currently, 25 percent of all cell phones are sold in Asian countries; by decade's end, that number will be one in three.

» Consumers today are unaware of threats to them as they use their smartphones. Personal conversations, data, banking and health information; all are available to undesirables if the consumer is not protected.

» Genesis Key is making secure communications technology available at a retail price point that is device, carrier, operating system and application platform independent to the general marketplace.

Note: This is unique in the world today.

Page 7: SecurDigital Presentation V7

The Genesis Key, Inc. Confidential

Management Team» The Genesis Key management and Advisors are comprised of experienced entrepreneurs and business

professionals from the consumer, finance, technology, government and secure homeland industries. The management team possesses a breadth of functional experience in software product development, system and

network integration, the marketing of emerging products, technologies, strategic partnering and corporate finance.

AdvisorsSteven Cooper is a partner and founding member of Strativest, LLC. He

previously held key, senior level technical and managerial information technology positions in both the private and public sectors. . In addition to 20 years experience in the private sector, Mr. Cooper served at the highest levels of the United States Government. In2002, he was appointed as a special assistant to the President and served as the senior director for information integration in the White House Office of Homeland Security. This was followed in 2003 by his appointment as the first chief information officer at the newly formed Department of Homeland Security. In this position, Mr. Cooper had responsibility for all information technology assets supporting 190,000 personnel and 22 agencies. .

Norman Byers – Mr. Byers is the managing partner and a founding member of Strativest, LLC. He formerly headed Byers Consulting, a Northern Virginia based consulting firm advising companies accessing federal, state and local markets. Mr. Byers has extensive international business experience, having founded joint ventures in Asia and the Middle East and establishing numerous strategic partnerships throughout Europe, South America, Asia and the Middle East.

James McKay - Deputy Chief Financial Officer of the Justice Dept. & first Inspector General of the ICC

Clifford Bragdon - Dean of Florida Institute of Technology and Chairman of the Board of the Global Center of Preparedness

USAF Major General Eric Rosborg – Chief, Office of Defense Cooperation Turkey, U.S. European Command, Ankara, Turkey, retired. Managed all aspects of security assistance and securitycooperation programs necessary to sustain the military-to-military relationship between the United States and Turkey.

Management and Board

Bruce Magown, Founder, CEO, Treasurer

Mr. Magown is CEO of The Genesis Key, Inc., a multi-tenant integration platform for SaaS application which provides complete integration Solutions – as a Service (www.interweave.biz). InterWeave integrates CRM, Finance, ERP, eCommerce, Subscription-based billing and Telephony applications with Web Services Databases, etc., for customers in configurable form. Additionally, Mr. Magown served as the Vice President of the Strategic Alliance of Sun/Netscape and built Netscape Professional Services to over $200m in four years.

Steve Garrett, Founder, Chairman of the Board, Secretary

Mr. Garrett founded The Genesis Key, Inc. while working to solvecommunication challenges for another business of his: PGC Consortium (www.phoenixgenesiscorp.com). He brings over 40 years of deep business experience and being CEO of public companies. He has been involved in directing leading edge technology Start-up Companies; providing Executive and Financial Guidance, Marketing, and Sales Management, Corporate Strategic Planning, Systems Organization, Security and Efficiency.

Page 8: SecurDigital Presentation V7

The Genesis Key, Inc. Confidential

Opportunity

Gartner has boosted its previous projection for mobile phone sales in 2005 "significantly" to 779 million units, according to Ben Wood, Research Vice President of Gartner for Mobile Terminals, a 16 percent increase over 2004. Among other projections, the report says that more than 100 million 3G phones will be sold in 2006, and that the Indian market to overtake the Chinese market in terms of annual sales in 2009. As for the entire Asia/Pacific segment of the mobile phone market, it represents 25 percent of the worldwide market today, Gartner says, predicting that this will increase to 33 percent by 2009.

"The world's appetite for mobile phones has exceeded even the most optimistic expectations," said Wood. "Mobile phones could go on to be the most common consumer electronics devices on the planet." Gartner estimates there will be 2.6 billion mobile phones in use by the end of 2009.

Smartphones fastest growing category

"Smartphone sales broke all records in the first quarter of 2005 and we expect them to double year on year to 2006," says Roberta Cozza, principal analyst at Gartner. And a deeper analysis of the forecast, she explains, "shows that Smartphones are the fastest growing category of device.“

According to Gartner, Windows Mobile Smartphones almost doubled their market share in Q1 2005 over Q1 2004, although that share is a minority one. Upwards of 76 percent of Smartphones run the Symbian OS, according to Gartner, with Linux a distant second at around 14 percent, and Palm OS and Windows Mobile in a virtual tie with 4.6 and 4.5 percent, respectively.

» Smartphones are enjoying brisker than expected growth, according to a new report from Gartner. The firm's recently released "mobile terminals" market study projects that shipments of mobile phones in general will surpass 1 billion units in 2009, and that "Smartphones" will reach the 200 million mark one year earlier, in 2008.

Operating System Adoption

Page 9: SecurDigital Presentation V7

The Genesis Key, Inc. Confidential

Solution Overview

The internal software on your cell phone converts your voice in real-time into encrypted data which is then sent over your carriers infrastructure to the SecurVoice© Enterprise Server where it is de-crypted.

It is then re-encrypted and sent over your carrier’s infrastructure the receiving cell phone where it is de-crypted and is converted back to voice.

SecurVoice© also features a dual-layered encryption schema which provides full protection against covert listening devices. You may select different encryption algorithms.

For example, your outbound conversation may be AES 128 encryption, while your callers inbound conversation may be elliptical curve; making listening to your conversation impossible

SecurVoice© is ultra-strong encryption software.

Page 10: SecurDigital Presentation V7

The Genesis Key, Inc. Confidential

Solution Detail

» SecurVoice© Privacy Edition is a completely new wireless communication solution and architecture which provides secure communications interoperability with any cell, satellite, walkie-talkie, or VoIP phone system. You can download the 38k Java app from our secure locations world-wide and follow the simple instructions to install.

How it Works

The Java app communicates directly with our SecurVoice© Enterprise Server application as a hosted option or may be resident on your servers.

Additionally, we provide internet virus and hacker protection with a firewall from CyberSoft.

The solution is operating system, application platform, device and carrier independent.

Key Features

• HIPPA compliant privacy-grade strong encryption key (AES (128) asymmetric encryption) plus additional encryption combinations to provide a very unique Solution

• Data is encrypted when it leaves the sending device and is de-encrypted by the server. It is then re-encrypted (with possible other encryption selection) and sent to the receiving device and decrypted

• Software only Solution. No additional hardware required

• Implemented on regular smart phones and GSM cellular networks with circuit-switched data service

• Full duplex communications

• Superior audio quality and ultra low latency

• Resides on regular cell phones. Neither the encryption process nor the device is perceived by third parties

• The user may update the cell phone firmware or operating system. The cell phone keeps all its original features.

Solution Overview

ONE-TOUCH SWITCHING BETWEEN PRIVACY AND STANDARD COMMUNICATIONS

WMS AND VOIP SECURE COMMUNICATION OPTION

INTUITIVE, USER-FRIENDLY INTERFACE

AVAILABLE TO PURCHASE AND DOWNLOAD ONLINE

SOFTWARE BASED SOLUTION –NOT HARDWARE

Page 11: SecurDigital Presentation V7

The Genesis Key, Inc. Confidential

Solution Interoperability

Complete Inter-operability. Device, Carrier, Application Platform & Operating System Independent

Page 12: SecurDigital Presentation V7

The Genesis Key, Inc. Confidential

Competition

» In our competitive market research, we have not found any comparative for “software only” secure communications solutions for data, voice and video. Potential competitors are typically in either “Hardware Specific” or “Firmware Specific” categories.

http://www.koolspan.com/ Commercial type on hardware system

The KoolSpan solution is available today in an Ethernet-based network appliance and client-side Smart Card that plugs into a USB port. Along with streamlined device integration capabilities, KoolSpan delivers a security architecture greatly reducing the effort required for user/network security administration. KoolSpan also is highly suitable for a large range of OEM and embedded systems supporting critical enterprise voice, wireless and data networking applications.

http://www.cellcrypt.com/?gclid=CLzViqvJu5YCFQOcFQodXWyeKw Commercial type on hardware systemSecure calls can be completed from one mobile device to another mobile device, between a mobile and a landline, or from landline to landline. The architecture requires all secure calls to be routed through a Cellcrypt Switch, which can be publicly or privately hosted. The calls passing through the switch are not decrypted, ensuring complete privacy.

http://www.snapdefense.com/pages.php?module=15&cat=12&incat=0 Snapcell is a patented micro-adapter used for secure point-to-point cellular communications over any GSM frequency (850/900/1800/1900). Snapcell is compatible with popular Ericsson T-Series phones including T28, V800, K500i, T637 and several others. Attach Snapcell onto the handset and enjoy military-strength security at toll-voice quality!

http://www.sigillu.com/index.htmlWe are pleased to announce the 3rd generation of our secure phones, with improved audio quality, enhanced ultra low latency, and support for the most modern Nokia™ phones.

http://www.gdc4s.com/content/detail.cfm?item=97aef0a4-96e4-4ab2-b33b-eb832c4bb4c2The Sectéra® Wireless GSM® Phone provides end-to-end high assurance secure voice and data communications for commercial GSM wireless networks operating in the 900/1800/1900 MHz bandwidths worldwide. The Sectéra Secure Wireless Phone also can be used as a regular wireless phone, both domestically and abroad, and can exchange secure voice and data communications with the Sectéra Wireline Terminal connected to an analog desktop phone. GSM (Global System for Mobile Communications) is a leading, worldwide, wireless telecommunications technology. The National Security Agency (NSA) has certified the secure phone’s ability to protect information classified Top Secret and below using Type 1 encryption algorithms available to authorized U.S. Government personnel.

Note: This primary advantage SecurVoice© has over these Solutions is secure communications interoperability.

Page 13: SecurDigital Presentation V7

The Genesis Key, Inc. Confidential

Pricing Model

Page 14: SecurDigital Presentation V7

The Genesis Key, Inc. Confidential

Contact Us

For further information regarding SecurVoice©, please contact:

The Genesis Key, Inc.355 I Street SW, Suite #401Washington, DC 20024203.912.5532 / 202.701.4900www.genesis-key.com www.securdigital.com

[email protected]