Presentation is loading. Please wait.

Presentation is loading. Please wait.

Identity Checkpoint is

Similar presentations


Presentation on theme: "Identity Checkpoint is"— Presentation transcript:

1 Identity Checkpoint is
“The End to Identity Fraud”

2 The Big Picture Crisis 2014 (per Gartner) $225 Billion Global Losses
$26.3 Billion USA Losses 17.6 Million Americans Impacted

3 The Big Picture Crisis Identity Fraud has become the largest criminal activity in the world. According to Gartner, it costs individuals and institutions globally nearly $500 billion each year today. It devastates personal well being as well as business profits while leaving a sense of in security and impacts the quality of life almost indefinitely. Until now, there was is no foreseeable, universal solution on the horizon.

4 The Crisis & the Solution
The cause of the crisis is our non-participation in authorizing the use of our personal identifiers and financial instruments. Identity Checkpoint puts the individual back in control of their identity and proves “they are who they say they are” and verifies “they have authorized the use of their accounts and assets.” Our active participation in every transaction is the solution.

5 Product / Technology Identity Checkpoint will provide a open SaaS platform for business, financial networks and governments to implement a new “multi-factor identity and financial instrument use authorization” factor. By providing a simple, open platform to all organizations, there will be no reason for them to not apply the solution to their processes and operations. Identity Checkpoint will provide a free application to everyone for managing their personal identity and financial instruments use. Being free in the app stores, there will be no financial reason to not download and use it, accelerating adoption.

6 Market Opportunities Targets In discussions US Departments & Agencies
State & County Departments & Agencies Financial Institutions Credit Card Gateways Business Entities In discussions US Treasury & IRS DoIT & Comptroller of Maryland The targets of our marketing are simply everyone leveraging social networking and traditional media outlets to drive adoption.

7 The Basis of the Business Model
The heart of all business is the authorization of processes and the transfer of funds / ownership from one entity to another entity Each non-cash transfer of funds / ownership has a composite transactional cost which is paid to third parties Each business action event has an internal operational cost Becoming part of those transactional / event processes as the 3rd party providing authorization services is the principal business goal

8 Management Team and Advisors
Name Role Bio Marc George CEO/CTO Software Architect, Thought, Systems Consulting & Engineering Jon Tholen CSO VP, BCBS California Global Head Operations, VISA Amber Schmidlin COO SVP, Bank of America Thomas Erisman CFO CFO, 180s CFO, Reborn Beauty Peter Engstrom Advisor VP, Federal Knowledge Business, SAIC

9 Unique in the Market Models that scan activity and look for anomalies do hinder malicious activity. But, they are cost intensive and can create friction for identity and financial instrument owners. Systematic indicators and ‘red flags’ are often triggered at the end of the transaction processes. What’s worse, they often draw attention to an issue only after activity has happened. Sentry is not fraud monitoring. Sentry is fraud prevention.

10 The Competitive Landscape

11 The Sentry Difference Integrates within Current Systems
Compatible with Existing Data/Algorithm Monitoring Stops Fraudulent Information Before released into processing systems Creates a two-way dialogue with the identity/financial instrument owner. Only the actions they approve will be implemented. Those they decline can be immediately queued for review by law enforcement personnel & internal security. Free to the identity/financial instrument owner, allowing them to take an active role in protecting their identity rather than abdicating responsibility.

12 Milestones 4/3/13 Conception 5/6/13 Incorporated
5/24/13 Patent Application 1/8/14 Prototype Completed 8/20/15 Trademarks Granted 8/24/15 US SAM Activated 9/30/15 Patent Acceleration Petition 3/1/16 IRS Unsolicited Proposal Submitted 12/13/16 Patent Examination Begins 2/27/17 Designated MD Master Contractor

13 Funding Sought The funding sought is over three rounds, seed and venture, to underwrite the expected initial costs for development and initial production deployment in 6 months. Pre-Money Valuation Debt / Raise Post-Money Valuation Issued Stock Founders Late Seed Investors Round 1 Investors Round 2 Investors Seed $2,000,000 $517,000 $0 57.61% 56.71% Late Seed $3,000,000 $5,000,000 66.71% 10% Round 1 $8,000,000 74.21% 7.5% Round 2 $11,000,000 81.71%

14 The significance of this solution is Sentry has the potential to impact every activity in World.


Download ppt "Identity Checkpoint is"

Similar presentations


Ads by Google