1 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document.

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT Medium Font to be used by customers and partners : Arial Copyright©2011.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
1 Thomas Weisel Partners Tech2003 Conference VeriSign Company Overview Dana Evan, CFO February 2003.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership.
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
MIGRATION FROM SCREENOS TO JUNOS based firewall
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Steve Bennett President & Chief Executive Officer NASDAQ OMX International Investor Program December 4, 2013.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
© 2014 IBM Corporation Smarter Workforce Services Business Process Innovation.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Black Box Corporation Overview. Black Box Corporation 2 Forward-Looking Statements - Any forward-looking statements contained in this presentation are.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Needham 11 th Annual Growth Conference January 6, 2009 NASDAQ: BBOX.
Title Slide – Option 1. Title Slide – Option 2 Insert Text.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Akamai Technologies - Overview RSA ® Conference 2013.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
The Changing World of Endpoint Protection
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
Mail-Filters The Global Leader in OEM Anti-Spam Solutions.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
The Power of We ™ Matt Booher VP Corporate Treasurer and Investor Relations Officer Avaya Avaya Financial Strength.
Network security Product Group 2 McAfee Network Security Platform.
Investor Presentation November Forward Looking Statements This presentation may contain forward-looking statements which are subject to a number.
1 Autodesk Confidential © 2006 Corporate Overview.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
1 ©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. ©2015. CYREN.
Sky Advanced Threat Prevention
Threat Landscape Ryan Kane – SWAT Specialist - Secure Wireless, & Access Technologies Data Connectors ABQ December 2015.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Investor Presentation May Safe Harbor Disclaimer This presentation may contain forward-looking information with respect to plans, projections, or.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Supertex Acquisition February 10, Supertex Acquisition/February 2014 l Cautionary Statement: Statements about the expected timing, completion,
Palo Alto Networks - Next Generation Security Platform
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Blue Coat Cloud Continuum
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
BUILD SECURE PRODUCTS AND SERVICES
The time to address enterprise mobility is now
Microsoft Education Better outcomes, proven results, trusted technology.
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Hybrid Management and Security
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Behavior Analytics Market to surpass $3.5bn by 2024: Global Market Insights,
Threat Management Gateway
Jon Peppler, Menlo Security Channels
Prevent Costly Data Leaks from Microsoft Office 365
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
AKAMAI INTELLIGENT PLATFORM™
The Next Generation Cyber Security in the 4th Industrial Revolution
Secure once, run anywhere Simplify your security with Sophos
4th Quarter 2016 Earnings Call
Improve Patient Experience with Saama and Microsoft Azure
Microsoft Data Insights Summit
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Presentation transcript:

1 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. INVESTOR PRESENTATION May 2015 NASDAQ: CYRN

2 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Safe Harbor and Forward Looking Statements This presentation contains forward-looking statements, including projections about our business, within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of For example, statements in the future tense, and statements including words such as "expect," "plan," "estimate," "anticipate," or "believe" are forward- looking statements. These statements are based on information available to us at the time of the presentation; we assume no obligation to update any of them. The statements in this presentation are not guarantees of future performance and actual results could differ materially from our current expectations as a result of numerous factors, including business conditions and growth or deterioration in the Internet market, commerce and the general economy, both domestic as well as international; fewer than expected new-partner relationships; competitive factors, including pricing pressures; technological developments, and products offered by competitors; the ability of our OEM partners to successfully penetrate markets with products integrated with CYREN technology; a slower than expected acceptance rate for our newer product offerings; availability of qualified staff; and technological difficulties and resource constraints encountered in developing new products, as well as those risks described in the text of this presentation and the company's Annual Reports on Form 20-F and reports on Form 6-K and prospectus supplement dated May 15, 2015 and prospectus dated July 3, 2014 filed pursuant to Rule 424(b)(2), which are available through © 2015 CYREN. All rights reserved. CYREN, Recurrent Pattern Detection, RPD, Zero-Hour and GlobalView are trademarks, and Authentium, Command Antivirus and Command AntiMalware are registered trademarks of CYREN. U.S. Patent No. 6,330,590 is owned by CYREN. All other marks are the property of their respective companies.

3 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. The Best Security Data Enables the Best Protection CYREN is leveraging its unique position as a proven, trusted provider of cyber intelligence to deliver the industry’s best security.

4 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. CYREN Snapshot  U.S. Headquarters / / Offices in Europe, Middle East and APAC  190 employees  Worldwide direct sales and channel distribution  19 data centers worldwide / / fault- tolerant network  24x7x365 support  GlobalView™ Cloud Platform processing 17 billion transactions per day from 600+ million endpoints  200+ global partners in 190 countries Company FactsFinancials Representative Global Partners  2014 revenue $31.9M (GAAP)  9-year revenue CAGR 29%  100% recurring SaaS revenues  2014 customers have generated $169.9M in lifetime revenue value  $8.5M cash on balance sheet

5 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. The CYREN Cloud by the Numbers

6 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. APPLICATION Policy, Enforcement, Logging, Alerting, Reporting ANALYSIS RPD, Heuristics, Signature, Human, etc. THREAT DATA 17 BILLION transactions per day ENDPOINTS 500 THOUSAND points of presence, protecting 600 MILLION users SECURITY Applied Cyber Intelligence INSIGHT Cyber Intelligence Pre-CompromiseCompromise Post-Compromise ReconnaissanceWeaponization Delivery ExploitationInstallation Command & Control Actions on Target Helping Enterprises Disrupt the Cyber Kill Chain CYREN Delivers Applied Cyber Intelligence

7 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. CYREN WebSecurity CYREN WebSecurity for Public WiFi CYREN Security CYREN Cyber Threat Protection Cyber Intelligence Suite Malicious IP Intelligence Feed Malware Intelligence Feed Phishing Intelligence Feed Malware Attack Detection AntiMalware URL Filtering Mobile Security IP Reputation AntiSpam Outbound AntiSpam Malware Attack Detection Security Suite CYREN Product Portfolio

8 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. CYREN Cloud Platform Solutions Global threat analysis, behavioral, and dynamic reputation scoring is only available via the Cloud. Cloud-driven security solution using full content inspection, including SSL traffic, to better protect employees from rapidly evolving cyber threats Cyber security solutions responsive to advanced malware and other cyber attacks that routinely bypass conventional signature- based defenses Our Security Cloud arms organizations with the intelligence needed to prevent and handle breaches. CyberThreat Protection

9 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. © 2014 CYREN Confidential and Proprietary 9 From multiple appliances by multiple vendors at every gateway To a global Cloud security platform from the industry leader Load Balancer Edge Firewall Server–Side SSL Tunnel Aggregation firewall Client - side SSL tunnel Sandbox SSL Web Filter Logfiles Flow Management Content Inspection SSL PAC File SSL We Are Disrupting Web Security Today

10 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. © 2014 CYREN Confidential and Proprietary 10 Mobile App Consumer Cloud Private Cloud Blocking Threats Enforcing Business Policy Cloud App Public Cloud Analyzing Web Traffic Applying Cyber Intelligence Bot Exploits APT Malware RoamingHomeProductionIndustrial Internet of Things BranchMobile HQRemote Office Protection for Every Business or Technology Model

11 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Cloud security is already large/high growth and will eventually consume the entire security category Cloud Security $14B TAM 20% CAGR Traditional Security $35B TAM Market Opportunity and Comps

12 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Revenue Breakdown 2014 Revenue By Contract Sign Date ($ in millions - GAAP) 2014 customers have delivered $169.9M in lifetime revenue

13 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Balance Sheet ItemMarch 31, 2015March 31, 2014 Cash$8,489$2,327 Current Assets$14,044$10,079 Credit Line$4,543$4,297 Deferred Revenue$4,387$6,346 Current Liabilities$13,645$15,043 Shareholder’s Equity$27,960$26,797 Shares Outstanding31,39826,519 All numbers in thousands (000s) Balance Sheet Review

14 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Moving Upstream in the Cybersecurity Value Chain Embedded SDK Solutions ASP $ $1.00 / user / year  Leverages all technology, data analytics and applied cyber intelligence assets to largest enterprise customer markets  Positions CYREN toward the top of the security value chain  Customer economics up to 100X greater than embedded OEM model  Data subscription model produces 100% recurring revenue stream  Embedded global OEM partners deliver stable revenue base and valuable data  High customer stickiness; average customer contract length > 6 years Cyber Intelligence Suite ASP $ $5.00 / user / year CYREN WebSecurity ASP $ $30.00 / user / year CWS + Cybersecurity ASP $ $60.00 / user / year TAM $200M+ TAM $1B+ TAM $10B+ TAM $30B+  Cyber intelligence solutions leverage high value OEM security data  Intelligence feeds/analytics expand addressable market into enterprise  CWS offers pure play SaaS solution model to enterprise customers  Includes all benefits of embedded SDKs plus cyber intelligence solutions  Customer economics 20-50X higher than embedded OEM model

15 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. ENDPOINTS 500 Thousand global points of presence, protecting 600 Million users DATA 17 Billion transactions per day ANALYSIS Recurrent Pattern Detection, Sandbox Array, Heuristics, Signature, Human APPLICATION Policy, Enforcement, Alerting, Logging, Reporting OUR Cloud Platform OUR Real-Time CYBER Intelligence OUR Security Analytics OUR Detection Engines Why CYREN?

16 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. You can also find us here: twitter.com/cyreninc linkedin.com/company/cyren ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Thank You