1
INVESTORS PRESENTATION – SEPTEMBER 2012
1
Metaforic Acquisition, April 2014
Metaforic Acquisition
Uniquely position INSIDE Secure
- n Mobile Security
Metaforic Acquisition Uniquely position INSIDE Secure on Mobile - - PowerPoint PPT Presentation
Metaforic Acquisition Uniquely position INSIDE Secure on Mobile Security April 7, 2014 1 1 INVESTORS PRESENTATION SEPTEMBER 2012 Metaforic Acquisition, April 2014 Disclaimer This communication does not constitute an offer to purchase or
1
INVESTORS PRESENTATION – SEPTEMBER 2012
1
Metaforic Acquisition, April 2014
2
INVESTORS PRESENTATION – SEPTEMBER 2012
2
Metaforic Acquisition, April 2014
This communication does not constitute an offer to purchase or exchange or the solicitation of an offer to sell or exchange any securities of INSIDE Secure. This communication contains certain statements that are neither reported financial results nor other historical information and other statements concerning INSIDE Secure. These statements may include financial projections and estimates and their underlying assumptions, statements regarding plans, objectives and expectations with respect to future operations, events, products and services and future performance. Forward-looking statements are generally identified by the words "expects", "anticipates", "believes", "intends", "estimates" and similar expressions. These and other information and statements contained in this communication constitute forward- looking statements for purposes of applicable securities laws. Although management of the company believes that the expectations reflected in the forward looking statements are reasonable, investors and security holders are cautioned that forward-looking information and statements are subject to various risks and uncertainties, many of which are difficult to predict and generally beyond the control of the company, that could cause actual results and developments to differ materially from those expressed in, or implied or projected by, the forward-looking information and statements, and the company cannot guarantee future results, levels of activity, performance or
contained in this communication include, but are not limited to: trends in semiconductor and wireless communication markets; the company's ability to develop new technology and the effects of competing technologies developed and expected intense competition generally in the companies' main markets; profitability of expansion strategy; challenges to or loss of intellectual property rights; ability to establish and maintain strategic relationships in its major businesses; ability to develop and take advantage of new products and software; future acquisitions and investments; the ability of the company's to integrate acquired businesses, activities and companies according to expectations; the ability of the company to achieve the expected synergies from acquisitions; and changes in global, political, economic, business, competitive, market and regulatory forces. Moreover, neither the company nor any other person assumes responsibility for the accuracy and completeness of such forward-looking statements. The forward-looking statements contained in this communication speak
statements after this date to conform such statements to actual results, to reflect the occurrence of anticipated results or otherwise except as otherwise required by applicable law or regulations.
3
INVESTORS PRESENTATION – SEPTEMBER 2012
3
Metaforic Acquisition, April 2014
4
INVESTORS PRESENTATION – SEPTEMBER 2012
4
Metaforic Acquisition, April 2014
5
INVESTORS PRESENTATION – SEPTEMBER 2012
5
Metaforic Acquisition, April 2014
6
INVESTORS PRESENTATION – SEPTEMBER 2012
6
Metaforic Acquisition, April 2014
7
INVESTORS PRESENTATION – SEPTEMBER 2012
7
Metaforic Acquisition, April 2014
technologies and encryption-related security software
infrastructure
Card Emulation (HCE) based mobile payments, wallets and mobile banking applications
pending, 100+ person-years R&D
entertainment DRM), Good technology (BYOD enterprise security) , Autodesk in CAM,…
Award winning expertise
8
INVESTORS PRESENTATION – SEPTEMBER 2012
8
Metaforic Acquisition, April 2014
logic from being easily understood, altered or extracted
attempt to understand application (Code Obfuscation and source level) and/or Data
in protected crypto algorithms
Metaforic Core
Cryptographic framework
Data in transit and Data in use
Metaforic Concealer Metaforic Authenticator
software trust, validating external functions, processes
from Source
Metaforic White-Box-Crypto
self-defending versions
proofing, tamper policies, with execution trust and reporting capabilities
9
INVESTORS PRESENTATION – SEPTEMBER 2012
9
Metaforic Acquisition, April 2014
and other services to be made directly between consumers' banks mobile application and retailers point-of-sale using NFC technology.
facilitate transactions to be stored on, and accessed from, cloud servers rather than a mobile device and without the use of a secure element or a SIM card.
MasterCard in February 2014
Host Card Emulation: what is it ? With Metaforic, INSIDE Secure reinforce security of Cloud-Based/HCE Mobile Payment Metaforic’s technologies i.e. software obfuscation and White- Box-Crypto are critical to reinforce security of mobile payment application running on the smartphone (Host CPU)
10
INVESTORS PRESENTATION – SEPTEMBER 2012
10
Metaforic Acquisition, April 2014
11
INVESTORS PRESENTATION – SEPTEMBER 2012
11
Metaforic Acquisition, April 2014
12
INVESTORS PRESENTATION – SEPTEMBER 2012
12
Metaforic Acquisition, April 2014
13
INVESTORS PRESENTATION – SEPTEMBER 2012
13
Metaforic Acquisition, April 2014
Dec.12
Acquisition
Mar.13
WW Reorganization plan launch
Jul.13
ESS integration & Stage 2
plan finalized INTEL NFC License announcement
March 14 Oct.13
Operational Reshaping in two Business divisions : Mobile Security Secure Transactions Acquiring Metaforic
April 14
Secure, after strategic shift initiated with the acquisition of ESS
security solutions, addressing growing market needs
14
INVESTORS PRESENTATION – SEPTEMBER 2012
14
Metaforic Acquisition, April 2014
Supported by : Common R&D and IPs Common Operations Global sales force Providing tailored solutions based on secure microcontrollers, secure firmware and associated services to protect customers key assets Providing a comprehensive suite of embedded security solutions for mobile devices combining IPs, hardware and software to protect enterprise, entertainment, and payment applications
SECURE TRANSACTIONS MOBILE SECURITY
companies.
15
INVESTORS PRESENTATION – SEPTEMBER 2012
15
Metaforic Acquisition, April 2014
─ $11.6 million paid in cash in consideration for the shares at closing ─ additional payment of up to $4.5 million in cash payable in 2015, subject
16
INVESTORS PRESENTATION – SEPTEMBER 2012
16
Metaforic Acquisition, April 2014
17
INVESTORS PRESENTATION – SEPTEMBER 2012
17
Metaforic Acquisition, April 2014