Teknologiayrittäjyydestä Elektroniikkainsinöörien seura, 2. 6. 2009 Tapio Koivu
Sisältö Alkava yritys? Miten teknologialähtöinen yritys syntyy? Case Envault Corporation Keskeisiä johtopäätöksiä
Alkava yritys Teknologiapohjaisen yrityksen arviointi Perustajat -> kyvykkyys Markkina ja ratkaisu -> potentiaali Asemointi arvoketjussa ja kilpailuun nähden -> toiminnan perusta Alusta & mahdollistavat teknologiat, applikaation piirteet -> skaalautuvuus Radikaali innovaatio vs. yksittäinen ominaisuus -> kilpailu-etu Keksintö ja teknologia -> kilpailuedun kestävyys Alkava yritys harvoin kaatuu teknologiasta lähteviin ongelmiin! Rahaa on aina vähän, mutta vähän sitä pitää ollakin!
VTT Spin-Off Process Qualifiers Specification Verification Contracts Assumption of investment opportunity Putting the invention opportunity into specific terms Verification of the investment opportunities and presentation to other investors Preparation of contracts RESULT: Commercialization launched RESULT: Legally authorized company, sole right to the company for exploiting the technology RESULT: First actual financing round implemented, technology rights transfered to the company RESULT: A single business operating on its own
YRITYSAIHIOIDEN SYNNYTTÄMINEN OSAAJAT AIHIO Yrittäjyyden toimintamallit PAKETOINTI TEKNOLOGIA, IDEAT YRITYS RAHOITUS
RAHOITUSLÄHTEITÄ TE-keskukset, starttirahat Pankki FFF Tekes, muut T&K-rahoittajat Enkelit Riskirahoittajat (Veraventure, Conor, Inventure, jne ) Teolliset firmat Omistaako 100 % 100 000 eurosta vai 2 % 100 000 miljoonan firmasta?
Challenge 1: Encryption Is Poor Protection Anything that is encrypted can be cracked, given enough time - Bruce Schneier The Princeton Cold Boot Attack (Feb-2008) The UT176 Unmount Attack (Mar-2008)
Challenge 2: The Data Leakage of Mobile Mass Storage Devices Sensitive data on the loose The Corporate The Corporate Information Security Policy
Challenge 3: Classified Military Information at Risk Misplaced USB memory stick contained classified NATO information. (Försvarsmakten, SWE, January 4, 2008) A highly placed official at the [Dutch] Military Intelligence and Security Service has lost very secret information from the US National Security Agency ( ) on a memory stick ( ) information given the stamp of top secret. (Nisnews, NL, October 2, 2007) Just weeks after the [Dutch] military owned up to losing one memory stick, it was confirmed that another flash drive was discovered in rental car ( ) data discovered on the USB stick included battle plans for Dutch troops and details of reconnaissance missions. Thumb drives that contained intimate details on everything from US soldiers to secret informants were sold in Afghanistan by teenagers for $40 a piece (MSNBC, USA, April 13, 2006)
The Splitstreem Solution The Corporate Sensitive data protected and remotely controlled by the Corporation The Corporate Information Security Policy Expanded and Enforced
Vaulting - Splitstreem Revolutionizes Data Protection 1. Don t encrypt your data envault it! Splitting data into two separate storage medias guarantees security Unauthorized usage is impossible 2. Then remotely control your data! Control data usage with time-, location-, and access-based restrictions Deny / allow access remotely Monitor data access in real-time Splitstreem has secured IPRs for these methods. (E.g. EU pat. pend. 0070414/H04L.)
Copyright 2008 Splitstreem Ltd. All rights reserved COMPANY CONFIDENTIAL Vaulting Ensures Bullet-Proof Data Protection...Company... Ëê œ budget... 2009...... 01 1 0 01 10 01 10 0 1 10... 1. Splitstreem driver software (SW) automatically encrypts the file, to break its structure. A file, on its way to a device 2. SW removes a number of random bits (e.g. 1% of bits, a fragment ) and sends them to a network server. 3. SW writes the remaining data (~99%) to the storage device as a protected file. Protected file (incomplete, unreadable) Fragment Device Human factor removed - All files automatically secured. - No user passwords, missing data is the decryption key. Centralized remote control - Allow/deny access to fragments in real time to control memory devices. Network server, FragmentVault TM Monitoring - Accessing fragments creates real-time log entries on FragmentVault.
Susan, accounting, 8GB
KESKEISIÄ JOHTOPÄÄTÖKSIÄ Teknologia on vain osa yhtälöä Ensimmäinen suoja on vain lähtökohta, suojaa pitää huoltaa jatkuvasti Rahaa saa, jos palaset on kohdallaan, ongelma on viisaan rahoituksen löytäminen Kilpailua on aina! Ensimmäinen idea on aina väärä!