Jcj corporate blind overview november 19 2012 1-1

15
JCJ Business JCJ Proprietary & Confidential

Transcript of Jcj corporate blind overview november 19 2012 1-1

Page 1: Jcj corporate blind  overview november 19 2012 1-1

JCJ Business

JCJ Proprietary & Confidential

Page 2: Jcj corporate blind  overview november 19 2012 1-1

Corporate Overview

• JCJ provides solutions to governments,

service provider sand enterprises seeking to achieve

full control of Skype within their networks.

• JCJ was founded in April, 2010. – Offices located in the U.S and Canada

– $800K initial angel investment

– Headcount – 8 employees and contractors

• JCJ solutions protected by patents: – Skype detection and blocking

– Skype traffic analysis

– Skype Legal Intercept

– Defensive capabilities that protect customer networks and assets from Skype based attacks and exploits

– Offensive capabilities based on Skype infrastructure

– Intelligence collection using Skype infrastructure

• Only available from JCJ

• Deployed within US government and overseas in telecom infrastructure supporting 30+ million people

2

Page 3: Jcj corporate blind  overview november 19 2012 1-1

What is Skype? Network of 800 million users and 30% of global telco traffic

3

SuperNode

SuperNode

SuperNode

Relay

Relay Relay

Vulnerabilities to Networks • P2P - Decentralized & distributed • Bypasses firewalls, IPS and NAT • Unmanageable • Untraceable • Undetectable • Exposes organizations to significant risk

Benefits to Skype User • Highly secure proprietary encrypted signalling • Highly secure proprietary encrypted media (voice,

video, IM, files) • Extremely cost effective • Best in class obfuscation and anti-debugging

protection

Client Client

Page 4: Jcj corporate blind  overview november 19 2012 1-1

Skype Global Market

• 800+ million registered users, 45 million concurrent users on-line

• Strong move to wireless space via smartphones.

• Moving to consumer products such as TV sets.

• Tight integration with Microsoft products

• Integration with Facebook (1 billion users).

• Corporate security managers see Skype as a potential threat.

• Skype for iPhone and Android represent a threat to telecoms

4

Page 5: Jcj corporate blind  overview november 19 2012 1-1

Challenges of Skype • Security and Compliance

– Enables untraceable transfer of information from/to enterprises using Skype

file transfer, IM, voice and video channels (source code, client information,

trade secrets, etc.)

• Telco's revenues

– Skype heavily impacting voice revenue due to usage of data components of

the calling plans

• Network enumeration and reconnaissance

– Allows to obtain external/internal IP addresses of devices behind firewalls/NAT

– Enhances attacker ability to perform targeted attacks on targets

• Cyber attacks

– Ideal platform for launching sophisticated attacks (bypasses security

infrastructure)

• Legal Intercept

– Fully encrypted communication

• Network Resources

– Unauthorized utilization of computing and network resources

– Skype video calls can reach a peak at 500 kbit/s per user, taxing the

enterprise infrastructure 5

Page 6: Jcj corporate blind  overview november 19 2012 1-1

JCJ Value Proposition

• Manage and control unwanted/unauthorized communications within, as well as, to and

from the network through visibility to Skype.

• Provide Skype reporting, tracking, and historical communications records for applications

like Skype, across the network, ensuring compliance with internal security practices and

industry requirements.

• Provides Skype blocking capabilities in conjunction with 3rd party firewalls,

IPS, etc.

• Enables telcos to control and manage Skype traffic

• Provides Skype Legal Intercept (LI) capabilities

• Enable the organizations to rapidly respond to, and defend against,

Skype born cyber attacks.

• Enables implementation of unique offensive capabilities based on

Skype infrastructure

• Reclaim enterprise assets and reduce expenses associated with them by managing

resources hijacked by Skype applications

Page 7: Jcj corporate blind  overview november 19 2012 1-1

JCJ Products and Solutions

7

• Detection Engine™ provides 100% reliable detection of Skype

traffic:

• Collection of information about Skype users, calls, sessions and other

information related Skype usage

• Very high performance (proven in production) - 10 and 20 Gbit/s

• Network connectivity – in-line or network tap

• Provides Skype blocking capabilities in conjunction with 3rd party

firewalls, IPS, etc.

• Implementation – Stand-alone product or OEM

• Analytical Engine™ works in concert with Detection Engines and

provides:

• Skype usage statistics reports

• maps of Skype network providing comprehensive view of

infrastructure, clients, relays and other resources used by Skype

• Centralized management for Detection Engines infrastructure

Page 8: Jcj corporate blind  overview november 19 2012 1-1

JCJ Products and Solutions

8

• Skype LI™ uses the infrastructure provided by Detection

Engine™ and Analytical Engine to collect content of the

communication carried over Skype voice, video and IM

channels.

• Skype DLP™ provides protection against data leakage

utilizing Skype infrastructure.

• Specialized capabilities available to government customers

Page 9: Jcj corporate blind  overview november 19 2012 1-1

JCJ Technology Stack

Page 10: Jcj corporate blind  overview november 19 2012 1-1

JCJ Products Roadmap

10

Enhancements to Existing Solutions and Products:

10Gbit/sec Skype media type identification

Skype conferencing and call out handling

Support for Skype/Facebook

Integration with firewalls using OpenFlow

GUI enhancements

New Product Functionality

RipTide Data Leakage Protection

Expanded support for mobile devices

Enhanced LI

Skype Blocking Solutions

Page 11: Jcj corporate blind  overview november 19 2012 1-1

JCJ Customers

11

• Oversea Service Provider

Skype Legal Intercept Solution

30+ million people

24x10 Gbit/s pipes

14 Detection Engines

1 Analytical Engine

LI module

Several more deployment expected next year

• US Government Agency

Specialized capabilities

Page 12: Jcj corporate blind  overview november 19 2012 1-1

Potential License Sales Revenue

12

• Average large deal size (24x10 Gbit/s pipes)

Software/Appliances - $4,175,000

Implementation – $20,000

Average Sale – $4,195,000

Support @20%/year - $835,000

• Average medium deal size (8x10 Gbit/s pipes)

Software/Appliances - $1,925,000

Implementation – $10,000

Average Sale – $1,925,000

Support @20%/year - $385,000

• Average small size deal (1x10 Gbit/s pipe)

Software/Appliances - $1,250,000

Implementation – $10,000

Average Sale – $1,260,000

Support @20%/year - $252,000

Page 13: Jcj corporate blind  overview november 19 2012 1-1

Market Analysis

13

• Market segments:

• Government agencies globally

• Service Providers globally

• Enterprises North America and Europe

• Market Segment – JCJ Solutions

• Government agencies globally – Skype LI, special cyber capabilities

• Service Providers - Skype detection and management

• Enterprises – Skype detection and management including Data Leakage Protection (DLP)

• Market Segments – TAM, 2013

• Governments - 90 countries ~ $400M

• Service Providers – top 100 ~ $200M

• Fortune 500 and Europe 500 - ~ $100M

• TAM - ~$700M

• Market share targets:

• 2013 – 1% of the total market

• 2014 – 4% of the total market

• 2015 - 8% of the total market

Government

Service Providers

Fortune 500 and Europe 500

Page 14: Jcj corporate blind  overview november 19 2012 1-1

Competition

14

Existing solutions use statistical and behavioral analysis to identify and/or block Skype: High false/positive

Outdated

No Skype control, statistics, content, etc.

No LI capabilities

No Direct Competition – Technology Is Only Available From JCJ

Page 15: Jcj corporate blind  overview november 19 2012 1-1

JCJ IP

15

• Complete, in-depth knowledge of Skype protocols,

applications and network topology built over the

last 3 years

• Products and Solutions

• Research team

• Two non-provisional patents pending (09/2011) –

“Method and Detection System for Detecting Encrypted Peer-to-peer (EP2P) Sessions Associated With a

Particular EP2P Network”

“Method and Discovery System for Discovering Encrypted Peer-to-peer (EP2P) Nodes Associated With a

Particular EP2P Network”

• Two provisional patents –

“Systems And Methods For Implementing Lawful Interception On Encrypted and/or Obfuscated P2P

Communication Network”

“Systems and Methods for Preventing And Blocking Network Security Attacks Executed Through Encrypted

and/or Obfuscated P2P Communication Networks”