Cyber Security Services Business Plan

Transcription

Cyber Security Services Business Plan
CONFIDENTIAL
1
No.
_________________
2009-
Cyber Security Services
Business Plan
Industriestrasse 13C CH-6304 Zug Schweiz +41.44.586.8520 [email protected]
10306 West Emerald Street Boise, Idaho. 83704 +1.208.343.8520 [email protected]
3-15-6 Higashi 3-Chome 150-0011 Tokyo Japan +81 (0) 3 5468 7373 http://japan.digitar.com
Confidentiality Agreement
The undersigned acknowledges that the information provided by DigiTar AG. in this business plan is
confidential; therefore, reader of said document agrees not to disclose it without the express written
permission of DigiTar AG.
It is acknowledged by the reader that information furnished in this Business Plan is in all respects
confidential (except information that is in the public domain or obtained through other means) and
that any disclosure or use of same by reader may cause serious harm or damage to DigiTar AG.
Upon request, this document is to be immediately returned to:
D. W. Williams, CEO, DigiTar AG.
10306 West Emerald Boise, ID 83704
___________________
Signature
___________________
Name (typed or printed)
___________________
Date
This is a business plan. It does not imply an offering of securities.
2
CONFIDENTIAL
SaaS Cyber Security Services Business Plan.
1.8
Industriestrasse 13C CH-6304 Zug Schweiz +41.44.586.8520 [email protected]
10306 West Emerald Street Boise, Idaho. 83704 +1.208.343.8520 [email protected]
3-15-6 Higashi 3-Chome 150-0011 Tokyo Japan +81 (0) 3 5468 7373 http://japan.digitar.com
DigiTar: A Complete Network Security On Demand; No Assembly required
Traditional security approaches that require IT managers to research, justify, acquire, install and maintain multiple security
technologies are quickly going the way of the dinosaur and being replaced with utility based security also known as Security In The
Cloud. As we are all too aware, security threats are growing at an exponential rate as are the number of security technologies designed
to address these new threats. This never ending process has become an arms race that no one can win.
DigiTar's Security In The Cloud model provides the highest level of protection and flexibility available today by connecting businesses
to the Internet through DigiTar’s multimillion dollar security infrastructure - all without capital expenditure or complicated and
expensive systems integration projects. Offered as a subscription based, pre-integrated security utility, DigiTar has significantly
reduced the time and work required to address pressing security issues without integration risk or headaches;
in other words: "No Assembly Required".
DigiTar's Vision of the Future:
•
Bring order and clarity to the world's messaging.
–
–
e-mail, Instant Messaging, Web-Mail, VoIP and Micro-Blog messaging of the next decade [Web 2.0 enhanced].
provide advanced secure communications for cyber / wired / wireless connectivity's.
–
–
–
–
services that interlock to provide intuitive seamless access to the messages you need,
presented in ways that are instantly relevant to your task at hand.
empower organizations and individuals with the features they desperately need...instantly.
this means no client administration burdens and no waiting for results and benefits.
–
correlate and find the information you want regardless of how you received it (eMail, IM, Twitter, VoIP, etc.)
•
•
Continuously expanding set of messaging services.
DigiTar’s “Next-Gen” Over-arching concept of "Unified Messaging".
DigiTar Motto: ZERO Configuration; ZERO Maintenance; 100% Security!
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
3
CONFIDENTIAL
CONTENTS
Executive Summary ……………………………………………………………………………………….
Page 4
Financial Summary Overview ……………………………………………………………………….
Page 5
The Business Concept ……………………………………………………………………………………
Page 6
In-depth Overview ………………………………………………………………………………………....
Page 8
Company History ……………………………………………………………………………………………..
Page 11
Sales Objectives / Strategies …………………………………………………………………………
Page 11
Management CV’s / Advisory Board ……………………………………………………………….
Page 12
Company Facilities ………………………………………………………………………………………….
Page 13
Products & Services Summary ………………….……………………………………………….
Page 14
Competitive Comparisons ……………………………………………………………………………..
Page 15
Technology Assets ………………………………………………………………………………………….
Page 16
DigiTar Services Examples ……………………………….…………………………………………..
Page 19
Detailed Market Analysis ………………………………………………………………………………
Page 24
Global Customer Base & Demand ………………………………………………………………..
Page 26
Primary Markets / Market Trends .………………………………………………………………..
Page 28
Value Proposition …………………………………………………………………………………………..
Page 31
Marketing Strategy …………………………………………………………………………………………
Page 32
Sales Strategy ………………………………………………………………………………………………..
Page 33
Sample Client List
………………………………………………………………………………………………………………………
Page 34
Strategic Alliances ………………………………………………………………………………………..
Page 35
Customer Testimonials & Recommendations ………………………………………………
Page 37
News Articles re: CyberSec Markets ……………………………………………………………
Page 49
DigiTar Technology Scaling & Financial Impact Plans ……………………………….
Page 55
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
4
CONFIDENTIAL
DigiTar AG.
Cyber Messaging Security Services
Business Plan Briefing
Executive Summary: DigiTar was established for the development of proprietary technology solutions to cyber
security problems within the internet communications industries. DigiTar formalized the infrastructure (people and facilities)
and development of advanced proprietary technology services solutions for the rapidly growing eMessaging and voice/data
security markets. Starting in 2005, DigiTar put real customers (Banks and ISP’s) on line!
market share opportunity
>$1,000,000,000 by 2016.
DigiTar provides proprietary advanced cyber security solutions and unparalleled
message processing capabilities, at extremely low cost, to IT Subcontractors,
Internet Service Providers, and small medium (SMB) corporate enterprise
network markets. Equivalent service performance products are not available at the retail level, and are not cost effective when
obtained from competitive commercial cyber security service providers.
DigiTar believes that security and management of information technology for
business is similar to legal advice, accounting, graphic arts and other bodies of
knowledge; that it is not inherently a do-it-yourself project. Smart business
people who aren't computer experts require vendors of reliable cyber security
technologies and support. They will utilize quality cyber security vendors as
they use other professional service suppliers, as “Trusted Allies”.
Demand for these
services is growing at
> 30% year-to-year.
DigiTar has invested $2,000,000 in proprietary systems and advanced product-services to capture this phenomenal opportunity.
DigiTar provides comprehensive proprietary eMessage™-DNA processing technologies for use by ISP’s, businesses, and
individual’s worldwide, against today’s and tomorrow’s cyber terrorism attacks and malicious content internet communications.
The demand for these services is growing at a rate greater than 30% year-to-year. As the sophistication of these attacks
becomes more difficult for business organizations and individuals to handle, DigiTar
..greater than
meets these challenges with low cost 24x7 advanced surveillance/protection systems
$100,000,000 in sales
and the most contemporary knowledge of attack signatures and eMessage-DNA
properties available today.
by the end of 2012.
DigiTar has achieved strong market acceptance and plans to grow toward greater
than $100,000,000 in sales by the end of 2012. This represents a corporate
growth of >200% year-to-year.
DigiTar’s plan targets attaining a 20% share of served markets by 2013.
For the investor, an IRR
greater than 200+%
More importantly, DigiTar’s market expansion plan, for its’ proprietary technologies, targets untapped parallel markets including
mobile communications/handhelds and Internet Telephony for its cyber security technology. With proprietary new services,
DigiTar’s growth will continue exponentially.
DigiTar technology was designed modularly so enhancements and new eComm services can be encompassed dynamically as
client needs change. DigiTar projects the future eComm will split into multiple embodiments including email, Webmail, Instant
Messaging, Voice over Internet and Micro Blogging. Each technology serves a different purpose and provides different benefits to
the user. All are inherently insecure and require solutions to provide protection from cyber threats. DigiTar’s technology today
scales easily to provide a complete integrated solution for these evolving multiple eCommunications embodiments.
New investment funding activities proceeds will be used to market and promote its’ proprietary services globally and expand the
client base for its’ Secure Messaging Services [SMS] and Complete Enterprise Security [CES] service-products.
Long term financing: During March 2009, DigiTar executed a Memo of Understanding, for investment during 3rd Quarter of
2009, of up to €2,000,000, by Pontis Capital GmbH of Vienna Austria. Proceeds of this financing will be used as working capital to
globally expand and intensify the scope of the Company’s sales & marketing programs; and to assure maximized revenue and
client base growth during 2010, and beyond, for DigiTar’s SaaS eServices.
PONTIS is member of the Austrian Private Equity and Venture Capital Organization (AVCO) and the European Private Equity and
Venture Capital Association (EVCA).
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
5
CONFIDENTIAL
Financial Plan Snapshot/Summary & Projections:
2004
Revenue
nm
COGS
2005
2006
2007
2008
2009
$156,000
$109,997
$523,300
$1,502,090
forecast
$4,356,000
2010
2011
2012
forecast
$14,675,000
forecast
$60,650,000
forecast
$132,550,000
$23,000
$37,607
$230,082
$732,350
$2,106,360
$6,834,250
$26,986,000
$55,803,170
Gross Pf’
$133,000
$72,390
$293,218
$769,740
$2,249,640
$7,840,750
$33,664,000
$76,746,830
Expenses
$232,000
$388,634
$288,500
$760,850
$2,136,900
$7,060,000
$27,550,000
$55,650,000
EBT
($99,000)
($316,244)
$4,718
$8,890
$112,740
$780,750
$6,114,000
$21,096,830
FY 2007
$306,660
$37,000
$0
$98,640
$81,000
FY 2008
$456,000
$62,000
$0
$25,000
$959,090
FY 2009
$3,050,000
$106,000
$0
$25,000
$1,175,000
FY 2010
$9,700,000
$550,000
$150,000
$500,000
$3,775,000
FY 2011
$43,800,000
$3,050,000
$2,000,000
$500,000
$11,300,000
FY2012
$75,824,000
$19,429,000
$10,982,000
$1,600,000
$24,715,000
Sales
SENTINEL SMS
SENTINEL CES
SENTINEL IM
Licensing & ManSecurityServices
Other/SENTINEL Services Enhancements
Total Revenue:
$523,300
$1,502,090
$4,356,000
$14,675,000
$60,650,000
$132,550,000
FY 2007
$44,370
$2,386
$0
$2,650
$5,676
$175,000
FY 2008
$286,000
$16,500
$0
$8,850
$216,000
$205,000
FY 2009
$1,282,000
$53,000
$0
$6,250
$503,750
$261,360
FY 2010
$3,983,000
$275,000
$49,500
$125,000
$1,521,250
$880,500
FY 2011
$17,082,000
$1,525,000
$660,000
$125,000
$3,955,000
$3,639,000
FY2012
$27,516,360
$9,714,500
$3,624,060
$400,000
$6,595,250
$7,953,000
$230,082
$732,350
$2,106,360
$6,834,250
$26,986,000
$55,803,170
GM
Expenses
$293,218
$288,500
$769,740
$760,850
$2,249,640
$2,136,900
$7,840,750
$7,060,000
$33,664,000
$27,550,000
$76,746,830
$55,650,000
PBT
PBT%
COGS%
Exp%
$4,718
0.90%
43.97%
55.13%
$8,890
0.59%
48.76%
50.65%
$112,740
2.59%
48.36%
49.06%
$780,750
5.32%
46.57%
48.11%
$6,114,000
10.08%
44.49%
45.42%
$21,096,830
15.92%
42.10%
41.98%
COGS
SENTINEL SMS
SENTINEL CES
SENTINEL IM
Licensing & ManSecurityServices
SENTINEL Services Enhancements
Depreciation
Total COGS:
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
6
CONFIDENTIAL
The Business Concept: There was a time when cutting-edge
enterprise network security meant a firewall on your perimeter and antivirus software on the desktop. No longer!
With the advent of polymorphic Internet worms, application-layer cyber
attacks, Trojan horses, Intrusion-Identity Theft, adware, spyware, and
wireless hacks, the network security picture is more complicated than ever.
To make matters worse, the enterprise’s cost of managing cyber security
has increased exponentially; well beyond the resources of small and
medium sized organizations.
Managed Services Reach “Tipping Point”
IT research firm Yankee Group issued a report mid-year
suggesting that message management and threat protection
had reached a “tipping point” in favor of an outsourced
managed service model. Yankee cited several factors
spurring the shift
away from in-house software products to managed services,
including the need to rely on specialized knowledge, the
rapid response time needed to deal with threats, and the fact
that fighting message threats is not a core competency that
adds any value to the company’s bottom line.
“Email Sanitization Services Preserve Peace of Mind,” Yankee Group
DigiTar provides complete cyber messaging systems solutions,
Research by Andrew Jaquith,
including advanced programs and advanced proprietary security feature
sets, without the need for the user organization to hire or expand internal
staff or spend capital on new network facilities in order to enjoy a secure
internal and external network environment. DigiTar’s client remains focused
on their own business activities, be that a Law Firm, Bank, Mortgage
Broker, Church, University or Medical office/Clinic, etc., thereby keeping precious resources invested in activities that meet
regulatory compliance issues or business data management needs which optimize revenue & costs.
The total SMB IT Market is currently (2009) >$26B in size; growing at greater than 33% compounded annual rate; and is largely
unprotected from sophisticated attackers operating today.
Value Proposition
DigiTar makes it easy for regional IT Subcontractors, Value-Added Resellers/Distributors (VARs/VADs) and Internet Service
Providers (ISP’s) to play a larger role in combating all sorts of spam and viruses without the need to spend money. VAR’s & ISP’s
are offering DigiTar security services that scan all incoming and outgoing mail for viruses and spam; if a user's machine comes
under attack, DigiTar technology blocks the attacking traffic, notifies the client, and performs automatic disinfection of the traffic.
This kind of resource allows each VAR/ISP to charge additional fees for the cyber security protection which increases their own
business revenues more quickly and with reduced competitive pressure from other ISP’s who do not offer DigiTar Sentinel leading
edge cyber security services.
No other supplier delivers the eMessage™ classification accuracy of services, the network performance
improvements nor the exceptionally low cost benefits for the customer, equivalent to DigiTar.
Value Proposition
DigiTar makes it easy for regional IT Subcontractors, Value-Added Resellers/Distributors (VARs/VADs) and Internet Service
Providers (ISP’s) to play a larger role in combating all sorts of spam and viruses without the need to spend money. Because of
the "designed-in ability to scale", DigiTar makes it easy for its clients to grow or diminish in headcount, and/or modify bandwidth
requirements. All without any budget “impacts” for additional/excess hardware, bandwidth, software and personnel expense
issues.
Unique to DigiTar is a proprietary "Auto-Provisioning" technology whereby customers are relieved of draconian
bookkeeping and directory integration tasks that competitive offerings require. DigiTar automatically keeps track of "active" users
in the client domain and charges only for users that utilize the service during the calendar month. This eliminates painful periodic
manual "culling" by the client administrator (if there is one) and insecure external links to internal client directories. This keeps
costs in line with actual use and maintains maximum client security and separation. This frees up several 100’s of hours per year
of productivity savings, and incalculable security savings for the enterprise.
DigiTar’s Sentinel technology is built on accelerated architecture implementations and proprietary message processing algorithms
that simply “stop” Spam and other Cyber Threats from Entering Your Networks! DigiTar Sentinel can process messages 400 to
700 times faster than the competition. What they do in 3 seconds, DigiTar can do in .004 secs. This allows DigiTar to service
100’s more clients on a given technology resource (hardware processing facility) at an internal cost that is estimated at <5% of
the competition’s cost of operations. This gives DigiTar the advantage of selling its’ services at a fraction of that of the
competition and still enjoy excellent gross margins.
For the end user client, as well as the VAR/ISP sales channel, this means unequalled benefits of real savings, revenue
enhancement and state of the art (up to 99.9% message classification accuracy) Cyber Security benefits.
DigiTar's Vision is to bring order and clarity to the world's messaging; be it e-mail, IM, VoIP, micro-blogging(Twitter) or
messaging of the next decade. We envision a continuously expanding set of messaging services. Services that interlock to provide
intuitive seamless access to the messages you need, presented in ways that are instantly relevant to your task at hand.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
7
CONFIDENTIAL
DigiTar empowers organizations and individuals with the service features they desperately need...instantly. This means no
administration burdens and no waiting.
DigiTar's Vision is to bring order and clarity to the world's messaging; be it e-mail, IM, VoIP, micro-blogging(Twitter) or
messaging of the next decade. We envision a continuously expanding set of messaging services. Services that interlock to provide
intuitive seamless access to the messages you need, presented in ways that are instantly relevant to your task at hand.
Our immediate and midterm vision comprises 6 Business Vectors:
1.) Next-Generation eMessaging - Solutions that enable customers to maintain connectivity, archive communications (of all
types), enforce security, be compliant, and communicate with any organization...using IM services like AIM, MSN and
Yahoo and/or micro blogging via Twitter!
2.) Consumer market revenues - proprietary user defined preferences advertising platforms with regional markets internet
promotions advertisers and agencies.
3.) Regulatory compliance (SOX, HIPAA, etc.) - Service-based compliance for an organization's messaging. Nothing to
replace. No additional capital or administrative overhead to become compliant. No burden.
4.) For Major Client’s mail flow, DigiTar On-Site Systems, DigiTar SENTINEL “On-Site” Resource Unit [DSRU], allows DigiTar
to perform in-client as a systems service resource provider. Sentinel Messaging™ On-Site DSRU scales dynamically to
accommodate virtually unlimited message processing capacity.
5.) Wireless communications – Elimination of unwanted communications (Spam etc.) and advertisements on wireless
networks and wireless text messaging facilities. Fixed-flat rate wireless services evolution makes the cost of bandwidth
the primary expense growth factor for wireless service providers.
6.) Voice-over-IP - VoIP is just another message for DigiTar. Our services will protect clients from voice spam, while
providing the regulatory compliance that is mandatory for any electronic messaging medium.
Over-arching all our efforts is the long-term concept of "unified messaging". The ability to find and correlate the
information you want, regardless of how you received it
Web Plan Summary
The DigiTar website (www.digitar.com) is the virtual business card and portfolio for the company, as well as its online "home."
The website is intuitive and straightforward, yet elegant and well designed; a cyber message processing website that stays
current with the latest trends and provides information to the customers and a portal to our programs and products. The site
utilizes the latest demonstrations capability of Flash technology so as to maximize a potential client's quick understanding of
DigiTar product-services and application information.
Website Marketing Strategy
We will maintain a two-way link between our website and our product-services customers and suppliers. In addition to using the
page as a sales tool, we will develop a monthly newsletter and a cyber security status links information page for industry lexicon
sites. We will also maintain two-way links between major client organizations and supporters.
Development Requirements
The DigiTar website has been developed with limited expense and technical resources. A simple hosting provider, Tierranet.net,
hosts the site and provides the network technical back end.
DigiTar will maintain and enhance the site user graphic and interface to develop the simple, elegant, yet Internet focused site.
DigiTar will design all website graphics and layouts.
As the website rolls out future developments, newsletters and other related messaging and cyber security related applications
issues will be chronicled via technical presentations and "walk-thru demonstration presentations.
Organizational Structure
DigiTar is organized to focus on two main activities:
1.) Client development for revenue growth; and
2.) Product development for greater reach into the served markets. Support personnel and staff positions are limited and
must be associated with specific tasks that directly support one or both of the above objectives.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
8
CONFIDENTIAL
In Depth Overview: DigiTar’s Security as a Service (SaaS): Sentinel Messaging™
This presentation covers DigiTar’s “Security as a Service” (SaaS), the next
generation in eMessage processing innovations.
DigiTar Sentinel Messaging™ is a paradigm shift away from the methods of
the past and greatly reduces the complexity of enterprise email flow while
dramatically increasing its reliability and security.
In brief, DigiTar developed “eStrands Technology” in order to deliver
advanced eMessage processing innovation for several problem areas:

Highly parallel-modular architectural implementation that assures
message delivery and unlimited scalability to meet load demand
without disrupting a Client’s business operations.

Reduces enterprise system complexity and increases stability by
providing a completely outsourced integrated solution with zero
required management.

Enables quick reaction to Client’s needs via modular architecture –
add functionality and feature sets as fast as, and whenever,
required.
No more, “One size limit’s all”.

Ensures message continuity and enhanced reliability through a
massively parallel, self-healing and redundant channel architecture
that includes integrated in-depth audit reporting and content
filtering capabilities

Assured messaging compliance via enforced messaging formatting
and integrated archiving procedures.

Secure CLIENT-wide messaging through multi-layered anti-virus and proprietary anti-spam technologies in combination
with policy-enforced encryption.

Simplifies and transparently automates delivery of functional module code updates & service enhancements through an
update anytime service-approach and single-point of precision delivery channel.

Modularity architecture eliminates code update defects associated with application rewrites required to add-on / expand
functionality necessary to mitigate new threat vector evolutions.
Sentinel Messaging™ is an outsourced complete SMTP message-processing solution that integrates several proprietary Internet
cyber security & eMessaging components to form a tightly integrated service pipeline.
eStrands™/eMessage™ Processing Element Components include & integrate:

E-mail Distributed-Denial-of-Service Protection (DDoS)

Autoprovisioning and VeriSYNC™ – eliminates manual administration/management of user directories

Anti-Virus – zero hour blocking

Anti-Spam – unmatched spam/legitimate classification accuracy (>99.7% average)

Content Filtering – complex policy-based filtering on 60 different categories

Outbound Processing – Confidential / Proprietary info management

Disaster Recovery - NeverLost™ eMessaging -7-day mail queuing for downed mail servers

Transport-level Encryption - (B2B)

Message-level Encryption - (individual recipient)

Archival - regulatory compliance mail retention

Premium Disaster Recovery - continuous data protection backup with per-user browser-based recovery consoles and
per-user webmail capability
Innovation & Novelty
As a SaaS service, DigiTar Sentinel Messaging™ provides several unique benefits unavailable from appliance and boxed-product
approaches:
 Zero-effort systems administration
 Zero-effort cyber threat signature upgrades
 Zero-effort technology functionality update management
 Single-point of responsibility (“one throat to choke”)
 Sub 1-hour malware threat vulnerability window
 Round-the-clock automatic spam detection updates
 Instant provisioning of additional service features (no downtime, no architecting)
 Elimination of virii and other security threats outside of your perimeter
 Reduction of penetration risk and vulnerability exploits by locating all functional components (i.e. anti-virus, anti-spam,
mail processing engines, etc.) outside of Client’s IT infrastructure.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
9
CONFIDENTIAL
In addition to the singular ability of Sentinel Messaging™ to dramatically reduce a Client’s mail flow complexity, DigiTar also
provides hand-in-glove support services including automated direct user support on day-to-day issue resolutions.
Benefits and Marketability
In the course of implementing a Sentinel Messaging™ installation for the CLIENT, DigiTar provides the following:
Reduced system complexity – Integrated functionality and cross-functionalities

Eliminate multiple CLIENT-internal tiers of mail functionality (anti-virus, anti-spam, etc.).

Remove the need for CLIENT administration of multiple vendor solutions and supporting infrastructure
(load-balancers, etc.) and improves messaging systems reliability.

Eradicate finger pointing and problem resolution times by providing a single vendor of responsibility.
1. Improve overall communication with operational users and customers

Provides a robust / redundant communication resource and eliminates message latency delays.

User-administered anti-spam quarantines provides unmatched 99%+ classification accuracy and
dramatically increases the quality of the mail stream; thereby enhancing the robustness of the Client’s ecommunication.

Provide support controls, which ensure accountability, security and availability.
2. Eliminate security risks

VeriSYNC™ / Autoprovisioning and confirmation of valid users without the requiring integration with the
Client’s LDAP Directory protects enterprise network structure and confidential information.

Removes requirements to manually manage eMail user Directories. No insecured human activities &
disclosures.

Establish pro-active process controls that pre-empt and obviate potential operational interruptions.
3. Provide turn-key levels of messaging and resource management

As there is no hardware to operate, and no software to maintain or configure, Sentinel Messaging™
eliminates the majority of burdens of conducting messaging management on Client’s mail flow.

Capacity upgrades and feature enhancements are instantly provisioned. Sentinel Messaging™ completely
eliminates the equipment surplus; acquisition and re-purposing that are normally required parts of
eSecurity life-cycle management for optimizing a Client’s mail flow.
4. Eliminate problems of a Monolithic solution (Dedicated Appliance or Server configurations)

No more “all-new” hardware upgrades or undected code defects embodied in rewritten applications.

No more waiting several days for cyber threat signatures updates or cyclical software release
enhancements.

Enjoy Real-time Dynamic load matching of “resources-to-functionality-requirements” and infinite scaling
without limitation.

No single point of failure that takes down the entire network operation.




Disruptive Implications of the eStrands SaaS Technology: Services and Systems
DigiTar SENTINEL “On-Site” Resource Unit [DSRU]
As a systems service resource provider, Sentinel Messaging™ On-Site DSRU scales dynamically to accommodate virtually
unlimited message processing capacity. For a Major Client’s mail flow, DigiTar assures expandable DSRU modular unit capacity
of:
Peak messages per hour capacity: 4,000,000
Sustained messages per day capacity: 61,000,000
Disaster recovery retention period: 7 days
Uninterrupted message flow and latencies of less than 1.5 seconds.
DigiTar’s Fully Integrated SaaS Solution
Currently, the complexity of a Client’s mail flow is largely induced by the variety of vendors (sometimes more than 4)
and number of servers/appliances (6-9) necessary to satisfy all of a typical Client’s required processing (AV, AS, content filtering,
etc.). This does not take into account the ancillary networking and server load-balancing gear required to further support the
current solution.
In contrast, implementing Sentinel Messaging™ consolidates all required message processing functionality into a single
logical unit, and completely eliminates the management headache of an in-house solution. Further, by re-locating the DigiTar
message processing out ahead of the Client’s network (in the red zone), the risk of security breach through an exploit in the mail
flow is completely contained outside of Clients critical infrastructure.
Unlike legacy vendor solutions, Sentinel Messaging™ was not narrowly designed primarily as an anti-spam or anti-virus
solution. Rather, its primary design goal was to create a massively parallel, self-healing and redundant message processing and
logistics pipeline, into which various service functionalities could be plugged easily, reliably and rapidly. As such, all messaging
services offered by Sentinel Messaging™ are designed as fully integrated modules, which plug into a well-defined and robust
messaging backbone. The benefits when compared to competing single and multi-vendor solutions are many-fold.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
10
CONFIDENTIAL
First, each processing phase (i.e., anti-virus, anti-spam, encryption, etc.) is not an autonomous unit as with typical
competitive single-function vendor (multiple-box and/or applications software) solutions. Rather, each DigiTar Processing element
within each service phase is aware not only of the load and health of other processing elements in the same phase, but also the
availability of other phases downstream. This allows all processing elements within a phase to dynamically absorb the excess
message load from a failed peer, and also to dynamically route around entire phases in the unlikely scenario that all processing
elements in a phase become unavailable (it has never occurred). This resiliency is possible because the services are built on a
common messaging backbone whose primary design goal was to ensure the absolute delivery of every message. Further, since all
services that integrate with the backbone are DigiTar-developed, there is no incompatibility between varying message processing
functionality.
Second, by implementing a common messaging backbone, DigiTar does not have to micro-manage the components in
the pipeline. Rather they interact to self-adjust and self-heal, thereby eliminating the number one cause of system downtime:
human error. Also, this common backbone enables an enforced audit trail/chain-of-custody across services for maximum audit
and regulatory compliance.
Third, for the CLIENT there is no management or administration required at all. All service and capacity upgrades, spam
DNA and AV updates, as well as, service monitoring and repair are handled 24/7/365 by DigiTar. This zero management impact
also extends to the initial installation, where there is no equipment to install or software to configure. All that is required is an MX
eMail redirection.
Fourth, Sentinel Messaging™ uses the well-defined principal of MX-redirection to enable the transparent and secure
routing of CLIENT mail to a DigiTar processing silo. What this entails is changing the mail exchanger (MX) record for the CLIENT
to point first to the DigiTar processing silo, instead of the CLIENT mail host system. At that point, all mail is first delivered to
Sentinel Messaging™ where it is cleaned and processed, after which it is then sent over an encrypted link to Client’s mail servers.
Start-up installations take less than 10 minutes to complete from start to finish. This occurs without requiring the CLIENT to
remove any of the existing mail flow architecture.
Rather than being disruptive to the Client, Sentinel Messaging™ is installed in parallel to the existing mail flow and delivers
around it directly to the Client’s Messaging servers (Java Systems or Exchange). The existing mail flow components that are then
unnecessary and can be inactivated once Sentinel Messaging™ installation is complete and active, thereby ensuring a disruptionless migration.
Overall, Sentinel Messaging™ allows a CLIENT to eliminate several servers and load-balancers from the Client’s existing mailflow, and instead receive a single point of reporting and provisioning for mail services. Also, the CLIENT has “one-throat-tochoke” in terms of support, thereby eliminating the potential finger pointing from disparate multi-vendor solutions. Sentinel
Messaging™ is by its nature as a robust service-oriented solution; the epitome of integrated mail processing.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
11
CONFIDENTIAL
Company History: DigiTar represents the consolidation of two business entities, DigiTar SP (Founded 2002) {IT
Networking & Cyber Security contract services}, and Spectrum Technology SP (Founded 1992) {high technology business
development consulting company to the data communications and cyber connectivity industries}. DigiTar's founders have
a combined experience of more than 50 man/years in high technology and data communications technology and
management. DigiTar AG. is a Swiss Corporation headquartered in Zug Schweiz with R&D in Boise, Idaho USA. The
Company founders are, Dale Williams, Chairman/President; Jason Williams Vice President CTO/COO and Director of
Finance K. Sipiora-Williams.
DigiTar's primary business Charter is to provide in-depth cyber security network services, for profit, as a managed
security service provider (MSSP) to SMB legal, medical, corporate and financial enterprises as well as large
Municipal/State/Federal agencies and corporations.
The combined paid-in capital of the resulting enterprise is made up of business assets, equipment, purchased technology,
purchased market research, memberships with Homeland Security industry organizations and alliances, purchased
technical training and cyber security certifications, office equipment, furniture, and file systems. Additionally, more than
one thousand (1000+) Man months of DigiTar cyber processing technology, and business and market development
activities, have been completed and funded by the founders at a replacement value of the proprietary IP of more than
$2,000,000.
Capital: Throughout the startup phase the founder’s funded DigiTar R&D activities. All Founders investments have been
consolidated into the Paid-in Capital of DigiTar. In 2005, DigiTar secured long term SBA financing for equipment. In
2006, additional private financing for working capital needs was established. Total debt is as follows:
Total long-term debt and funding history is shown by this table below:
Source of
Date of
Capital
Loan or
capital
venture
Amount
Equity
Founders
2004 /2005
$900,000
Seed
SBA Loan
2005
$250,000
Loan
Pvt Investors
2006 /2007
$400,000
Loan
Sales Objectives / Strategies
1. Penetrate the global/regional Internet Service Providers [ISP], Telcos and IT Sub-Contractor markets, second and
third tier suppliers, to>50% level with DigiTar SENTINEL SMS and CES message processing services. The major Internet
service providers today, namely Microsoft, AOL and Yahoo, have already started major campaigns to lure e-mail accounts
away from competitive suppliers who are promising antivirus and antispam filtering as a part of their service. This leaves
the second and third tier suppliers at a significant disadvantage, because it is costly for any one of them to be able to do
establish Advanced Technology message processing for their user base. DigiTar's SENTINEL technology provides an
immediate and transparent solution for this market, which comprises more than 30 million e-mail accounts, serviced by
1500 second and third tier ISP’s.
2. Introduce advanced service products that expand revenues for SMB and major business enterprise messaging clients
and/or enterprise message content management markets so as to differentiate DigiTar's high-margin DigiTar Sentinel
technology services and make them super-attractive for add-on to in-house enterprise IT traffic management and
productivity value-added programs.
3. Expand DigiTar's rifle shot marketing to targeted Global Distribution Channels, with a broad sales program aimed at
selected-targeted end-user enterprises using Value-Added Resellers and in-country Partner-Agents. The key phrase here
is Market Segmentation.
Keys to Success
The strength and value of DigiTar's technology is most appreciated by those organizations that are subject to new
demands on their capital and technical staff by outside forces and regulations. In the past, smaller and medium-sized
business organizations have been able to operate without extensive record/document security facilities and systems. Now,
with the mandates of several new governmental laws, many companies (including medical clinics, drug stores, law firms,
records repositories, title companies, mortgage companies, real estate firms, brokerage firms {especially satellite
locations}, and many other firms) are faced with compliance investments to their networks and archive facilities. These
new demands are coming at the same time that the cost of supporting ongoing, sustaining operations and updating
requirements, is skyrocketing. As cyber-based communications take over greater percentages of business information
and commerce activities, the need for better cyber security is expanding exponentially.
DigiTar provides the latest state-of-the-art in antivirus, antispam, intrusion-detection & prevention, content filtering,
spyware/Phishing and Hacker attack deterrence, to name a few. The keys to DigiTar's success depend upon timely
penetration of these types of organizations. Initial contacts will be made through regional ISP's who are the primary
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
12
CONFIDENTIAL
connectivity suppliers to the targeted clients. DigiTar will initially distribute its services and SMS technology through ISP’s
as an add-on service and revenue opportunity for smaller regional IPSs. This resolves the need for the ISP to invest in
cyber security enhancements at the same time it is investing in necessary resources required to meet the compliance
issues of their customers who are subject to the new reporting and archival mandates of the federal laws.
Management / Advisory Board C.V.’s
Chairman of DigiTar AG. Previously VP/General Manager Rockwell International, Director of
Marketing Microcomputer Division Intel Corporation; over 30 years experience in the computer, e-business and
telecommunications industries as an entrepreneur and business development consultant.
D W Williams – President
J J W Williams – VP Chief Operations & Technology Officer, > 15 years experience in computer networking applications
markets. He received his BA from Washington & Lee University in Virginia, magna cum laude.
Member of Technical Staff at CyberHighway internet services provider, and as Manager IT and Network Specialist for the State
of Idaho. He has received Professional Certification as a Cyber Security gateway systems expert and is a Member of the ISSA
and Homeland Security Leadership Alliance.
K Sipiora-Williams –VP & Chief Administration Officer, has more than 20 years of business operations experience in high
Technology firms in Silicon Valley. She has been a member of several technology startup organizations and has held senior
financial planning and market development positions with successful entrepreneurial firms. She served as VP of Finance for
Spectrum Technology for 10 years.
Premier European business development experience in Cyber
Information and Advanced Networking technology markets. Executive Sales and Market channel development positions with
leading Europe suppliers: General Manager-NOKIA Internet Communications; Vice President EMEA-Exinda Networks Pty.;
Vice President EMEA & Managing Director- ForeScout Technologies, Central & Eastern European Manager-Ipsilon Networks
Ltd, and Business Unit Director-ADIVA Computertechnology GMBH.
R M Richter – Director Business Development Europe,
H Iino – Director Business Development Japan, Eminently successful Japan entrepreneur and
network systems market
pioneer. Iino san’s business associations include extensive previous collaboration with Matsushita, Fuji and NEC Corporations.
Iino san introduced DigiTar to Sakura KK, the IT division of Mitsui-Sumitomo Bank Group, and major Japan clients for DigiTar
services including Sakushin University of Tokyo.
T Rampelberg, Member of Technical Staff Technology Development, extensive development experience in anti-spam
engines and next generation proprietary cyber security software algorithms. Previous experience includes Performance
Engineering – Mirapoint, and Google, and LDAP, NIS+ and Kerberos distributed authentication services for the Computer
Science Division at Pepperdine University. Tom has a BS in Computer Science from Pepperdine University.
DigiTar Advisory Board:
DigiTar has established a Technology/Business Advisory Board made up of key individuals from several cyber communications
disciplines and business expertise arenas. The Charter of this body is “to facilitate critical reviews, discussions, analysis and
recommendations concerning DigiTar development technology programs and/or business concepts.
R Wagner -Director; 30+ years Contracts Lawyer, as in-house executive counsel in High Tech Fortune 50 Corporations.
Dr. D. Bingham - Senior Scientist – Advanced Technologies, Idaho National Laboratories US Energy Dept.
G Litteer – Scientist – Cyber Security Infrastructure Research, Idaho National Laboratories US Energy Dept.
Dr. D Thompson - VP, Computer Science & Technology Dept Chairman, Pepperdine University; California
T W Tinsley; University Network Security Director, Washington & Lee University; Virginia
Maj. Gen. M Heath (Ret.) – Director Emeritus UK Defense Electronics Research Agency (DERA) England
D Bartlett - Executive VP Operations, IDACOMM [Internet Services Provider] Idaho
C Merrill – Certified Public Accountant, BDO Siedman LLP.
P Thoms – Chairman/ CEO, NXT Private Limited Hong Kong
DigiTar AG of Counsel:
Peter Midgley, Esq.; Lawyer & Partner Zarian Midgley LLP - Boise, Idaho USA
Dr. Christian Faßbender; Lawyer & Partner Waldeck Rechtsanwälte, Frankfurt am Main DE
Peter Hodel; Lawyer & Partner Hodel - Frei Advokatur – Zug Schweiz
Dr. Stefan Klass; Lawyer & Partner BRUHIN KLASS Rechtsanwälte - Zug Schweiz
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
13
CONFIDENTIAL
Company Points of Presence and Facilities
DigiTar's European HQ Domicile is in Zug Schweiz with USA business offices and R&D Operations Center located at a secure
facility (co-located with the Boise Police Substation and the offices of Loomis Fargo armored car services) at Boise, ID 83704.
DigiTar’s Secure Production Operations Center is located in Boise, ID 83709 (see photos below). In addition, DigiTar has
established a DigiTar-Japan business development agency in Ebisu, Shibuya-ku, Tokyo, Japan for Japan and China eMessage
processing markets.
USA Business & R&D Center:
Production Operations Data Center:
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
14
CONFIDENTIAL
Product and Service Descriptions
DigiTar has developed a specialized cyber network security services program known as "Sentinel©", targeted specifically at
SMB Enterprise, Legal, Medical and Professional services and large enterprise businesses. Sentinel© is a low-cost high security
services technology platform specifically tailored in a modular, expandable configuration that is available on a low-cost
monthly basis. DigiTar is marketing these services as annual or multiple year service contracts. Sentinel© is a turnkey solution
which provides all aspects of cyber security needs including antivirus, intrusion detection-prevention, virtual private
networking, content filtering, firewall and bandwidth management.
DigiTar is strongly positioned against its competitors in the managed security services space, due primarily to the combination
of its focus on small-medium business and our proprietary industry-unique methods of detecting and preventing cyber threats.
As compared to competitive MSSP providers, DigiTar provides sub-25 user pricing models that make security affordable to
smaller firms, and when technology compared, DigiTar's Digital DNA method (unique to DigiTar) of identifying and eliminating
message-borne pathogens yields a 99.9+% protection-level that no other services provider can claim, thus making DigiTar a
more attractive solution even to companies as large as 200,000+ users/employees.
Graphical Overview of DigiTar SENTINEL Architecture
Composite overview of SENTINEL SMS and CES services functional processes components.
DigiTar SENTINEL Messaging Services [SMS]: E-mail messaging Protection Services
SMS services monitor and cleanse all domain e-mail traffic; removing Cyber virii and Spam contents from the data
streams between a user's site and any incoming message(s), via the Internet.
DigiTar Complete EnterprisePRO Security [CES]: Complete business cyber security Protection services. CES
provides business protection services, operating 24/7, extending cyber protection to include all web traffic, e-mail,
and private communications between a user and any web site or e-mail host associated with the worldwide web
communication networks. CES enterprise protection provides safekeeping from cyber terrorism, including intrusion
detection & prevention, content filtering, and network performance & bandwidth management.
DigiTar cyber security equipment systems that have proprietary DigiTar functionality integrated as a valueadded component. These products range from cyber filters and software to complete turnkey SOC (Security
Operations Centers) implementations, as customized for specific customers.
DigiTar “On-Site™ & DSRU Licensing of proprietary security services equipment to international partners and major
OEM accounts; and for unique or specific customer requirements which can be added to DigiTar products and
services offerings as standard products for revenue enhancement and competitive sales advantages.
DigiTar Cyber Technology Sales: Licensing of proprietary software and associated security services
DigiTar's market reach strategy targets unique and/or specific customer requirements that can be added to the
DigiTar products and services offerings, as standard products, for revenue enhancement and competitive sales
advantages. Development of an international presence can most effectively be accomplished by developing jointventure partners in targeted market countries who contribute to the efficacy of the services technology, via language
and symbol recognition enhancements to the underlying DigiTar algorithms and processing technology. Local incountry marketing activities by a Licensee/Partner will deliver more timely revenue results at lower costs to DigiTar
than direct expansion into a foreign market by the Company. Licensing of technology allows for a continual (multiyear) sharing of revenue streams without the expense of developing in-country support personnel.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
15
CONFIDENTIAL
Competitive Comparison
DigiTar SENTINEL SMS message processing cost/benefit ratio exceeds all the top competitors in the cyber security services
market today.
Taken strictly on a cost per user basis, SENTINEL SMS sells for $3.00/month/user [$36.00/Yr] in small company
implementations, (i.e., 3 to 5 users per domain). By comparison, all other suppliers charge $60.00 to $80.00/year/user; and
most of them require a minimum of 50 or 100 users per domain. At higher populations of users/domain, the cost of SENTINEL
SMS is less than $8.00/user/year.
On the technical level, SENTINEL SMS is the “clear leader in performance” due to real-time message processing; no
competitor offers this benefit. Therefore, there are virtually no delays associated with the Processing/Cleansing processes.
Message datum transfer is real-time and never delayed; this means that the recipient is never left "on hold" while the antivirus/anti-spam systems are working.
The following table summarizes the technical features of DigiTar SENTINEL vs. those of the competitive offerings in the
market today.
Competitive Technology Analysis
DigiTar
SENTINEL
McAfee
Mirapoint
Barracuda
SpamCop
Symantec
Ironport
MessageLabs
Google
Postini
Spam Engine
iSTAT©
Spam Assassin
Realtime Black List
Brightmail®
Proprietary
Technology
Dynamic Spam
Trend Alignment™
DNA
Rules
RBL
Bayesian
Rules
YES
NO
NO
NO
NO
YES
Per Individual
Global Rule Based
Global Rule
Based
Global Rule Based
Global Rule Based
YES
Complete User
Control
YES
SENTINEL Auto
Learns from User
Preferences and
Actions
NO
Requires Admin @
Server Level
NO
Requires Admin
@ Server Level
MessageLabs-Yes
Yes
NO
NO
NO
NO
YES
Tailored to User
Preferences
NO
User Must Mark Each
Message for
White/Black Listing
NO
Yes
Yes
Automatic
Quarantine
YES
NO
Sys Re-labels
Message “Subject
Line” Only
NO
Yes
Yes
Secure Personal
Quarantine
YES
NO Quarantine
NO
MessageLabs-Yes
Yes
NO
Symantec/Ironport-NO
MessageLabs-Yes
Yes
User Preferences
User
Self Service
Automatic System
Learning
Personal
White List
Spam Isolated
Complete Content
Anti-Virus
Protection
Spam Catch Rate
NO
YES
Spam is handled after
Outside of the User’s penetrating User’s
Network
Network
YES
Nested Attachments
Included
NO
Simple Virus
Protection @
Additional Cost
NO
NO
Simple Virus
Protection Only
@ Additional Cost
NO
Simple Virus
Protection @
Additional Cost
99%+
Typ 85%-90%
Flattens @ 95%
with Full Time
Network
Spam Administrator
Typ65%-80%
Typ 90%-95%
Typ 90%-95%
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
16
CONFIDENTIAL
Technology
Internet technology has had a significant effect on business processes over the past couple of decades. For that reason, a
new trend in business communications has emerged. Technological advances in electronic mail are attracting the attention of
companies who depend on direct mail for leads. Companies can download potential customer addresses and names over the
Internet and have a host of customer communications out-sourced.
To the recipients, this communications inflow is most times unwanted, and in some cases contains dangerous message
materials. Moreover, this robs the targeted business enterprise of valuable employee productivity time. (See: Cost of Spam
Calculator in the Appendix.)
DigiTar has developed an advanced set of Message DNA algorithms that support all types of system operating environments
including Linux, Windows and Macintosh technology. Moreover, DigiTar has developed feature rich enhancement benefits for
the user so as to eliminate major protocol and size limitations associated with E-mail and Instant Messaging constructs
currently plaguing the industry.
DigiTar Sentinel™ Technologies/Benefits:
iStat© - eStrand© Technology
-Dynamically Adjusts to Block Emerging ThreatsTraditional anti-spam technology methods such as lists, rules and heuristics are all limited in their approach. Sentinel DNA
indexes are highly specialized analysis's designed to detect elements in a message’s DNA. Further, SENTINEL eliminates the
need for constant user updates required by traditional anti-spam technologies.
SENTINEL analyzes the DNA of email to provide a “spam index” gene used to determine and identify spam. Because
SENTINEL analyzes the genetic make-up of email rather than content, it is language agnostic, and are capable of identifying
spam in any language.
SENTINEL is able to track evolving mutations to spam’s genetic structure, delivering updated spamDNA information
continuously, defeating new spam techniques before they can become effective. Sentinel is the immune system for email.
iSTAT© – Powerful Proprietary Algorithms Identify Spam
• Highly specialized iSTAT© programs detect mutations in a message’s DNA
• Sentinel’s iSTAT technology immunizes against evolving spam forms
• iSTAT technology supersedes traditional approaches including content evaluation, lists, rules, heuristics
eStrands© - Proprietary DNA classification Engine
• Sentinel’s eStrand engine, using genetic algorithms, constantly provides most effective spam DNA classification accuracy
• Sentinel eStrand Technology delivers continuously updated eMessage DNA information 24/7
• Sentinel eStrand Technology appends each message with a unique tag enabling future logging services
iMESH™ /”WCL Technology
-Dynamically reacting/adjusting to Morphing DDos AttacksMitigating a Distributed Denial of Service (DDoS) attack requires OSI Layer 3 mitigation combined with Layer 7 intelligence. In
the DigiTar™ systems, this means identifying offending hosts (Cyber Threat Attackers) quickly through numerous Layer 7
anomaly detection processes, and denying those, and similar, hosts the ability to send such content for an amount of time
commensurate with their offenses. The key to stopping a DDoS is to quickly translate threat identification into threat
mitigation.
DigiTar™ created its multi-phased iMESH™ mail transfer system. iMESH™ is a distributed system that consists of multiple
phases that are meshed for resiliency and speed. Each phase of iMESH™ can communicate Layer 7 anomalies back to the very
first phase to enable deep pattern recognition and thereby mitigate extremely distributed attacks.
Key to iMESH™’s mitigation capabilities is its proprietary Weighted Control List™ (WCL™) embedded in the first phase. As
hosts exhibit offending behavior, they are added to the WCL™ with a weight commensurate to their offenses. Repeat offenses
greatly increase the weight, particularly when done at short intervals. The higher the weight, the longer a host will be denied
access to the DigiTar™ ecosystem. A host’s weight decays over time, allowing attacking mail servers the opportunity to be
cleaned up and eventually be considered legitimate again. iMESH™ will also auto-rate limit mail deliveries to protect client mail
servers from floods of legitimate mail.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
17
CONFIDENTIAL
Sentinel Kamiza™ Overview
-Superior Management Control for select AdminsSometimes it is necessary and beneficial for Client Administrators to be assigned special privileges regarding the governance
of Sentinel Messaging™ operations. The Kamiza Administrator is assigned senior responsibility for a number of important roles
critical to maintaining the maximum efficiency and efficacy of the organization.
Sentinel Kamiza™ enables approved individuals who are assigned Kamiza Administrator status, to access the Sentinel
Messaging™ quarantine of any individual within their organization. This is provided through DoppelGanger™ technology,
which enables a Kamiza Administrator to assume the Sentinel Messaging™ identity of any user who’s Sentinel Messaging™
Portal they need to access. Once a Kamiza Administrator has assumed the Sentinel Messaging™ identity of a user, he or she
can do anything the user themselves could do within their Sentinel Messaging™ Portal, including:

Release false positives.

Change the user’s password.

Change Sentinel Messaging™ Digest delivery frequency.

Administer the user’s whitelist.

More…
Sentinel Kamiza™ empowers any approved Principal, within the organization, to execute the responsibility of maintaining a
constant vigil over their e-mail security.
DigiTar veriSYNC™ Technology
-AutoProvisioningIf/when a DigiTar customer enables/disables a user name in their mail server, Sentinel Messaging™ will notice automatically
that that the user is new-valid or now-invalid. If a user is found to be invalid by veriSYNC™, Sentinel Messaging™ will refuse
to accept new messages and return an error to the sending server, which will then send a bounce to legitimate senders
informing them the message could not be delivered.
On the other hand, if Sentinel Messaging™ notices that a new user has been validated in the Customer’s mail host, DigiTar’s
system automatically provisions the new user in the DigiTar approved user lists. This relieves the customer from the of
draconian bookkeeping and directory integration tasks required by all competitive AV/AS technology suppliers.; DigiTar
automatically keeps track of "active" users eliminating painful periodic manual "culling" by the client administrator and
insecure links to client directories. The elegance of veriSYNC™ is that it works with all customer e-mail systems and
directories, regardless of type.
DigiTar veriSYNC™ Technology (cont)
-Protection from Cyber Security Directory Harvest AttacksThe DigiTar customer can choose between 3 behaviors when veriSYNC™ determines a recipient is invalid:
554 Response: Accept the invalid recipient and return a 554 error. This has the benefit of not telling the spammer which
recipient is invalid. It also provides the benefit that if a legitimate sender types a recipient name incorrectly by mistake, they
will receive a bounce message informing them of the mistake.
This is an exclusive to SENTINEL, DigiTar-proprietary behavior.
No competitor protects against DHA while enabling legitimate senders to receive notification of their
addressing mistakes.
 Silent Drop: Accept the invalid recipient and also accept the DATA section. Then silently drop the message to any invalid
recipients, and deliver the message to any valid recipients.
 DHA Protection Disabled: Send a standard “550 No Such User” error in response to any invalid RCPT TO. This provides no
DHA protection.
Silent dropping of mail to invalid recipients is a crucial security feature that is accepted best practice. Sentinel Messaging ™
veriSYNC™ feature is the “Best-in-Class” mechanism by which we enable this best practice.
DigiTar veriSYNC™ Technology (cont)
-Protection from Denial of Service AttacksDigiTar’s veriSYNC™ technology also continuously protects its’ customers from Denial-of-Service attacks.
A prime example is a DigiTar customer who is a global positioning tracking company. Their devices are used in critical law
enforcement applications, and the devices e-mail their status back to the company who then publishes the data via the web to
their customers 24/7. Very recently, the company's domain saw their gross e-mail traffic jump from 7,000 messages/day to
60,000 messages/day. That jump occurred within an 8-hour period of time, as a result of being targeted by a spam attack.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
18
CONFIDENTIAL
Because they were protected by veriSYNC™, Sentinel Messaging™ silently dropped the messages to invalid accounts (over
100,000 different user accounts were tried) and the company was able to keep their mission critical e-mail flowing. The
company did not experience any increase in their normal mail traffic (2,500 legitimate messages/day), as DigiTar filtered these
(legitimate eMessages™) out of the deluge of bogus traffic and delivered them to the rightful recipients.
For minimum vulnerability and liability purposes, DigiTar has an unequalled competitive advantage using veriSYNC(tm) to
maximally protect its’ client organizations from both cyber-attacks as well as social engineering that comes from directory
harvests.
DigiTar Technology Benefits
DigiTar “SENTINEL” Technology provides complete cyber messaging solutions.
 Including: low cost 24x7 protection using the most advanced knowledge of attack signatures and eMessage-DNA
properties to block: virus, spam, spyware, polymorphic Internet worms, Trojans, Identity Theft, adware, Intrusion and
application layer cyber attacks.
 Eliminating: need for the customer to hire/expand internal staff or spend capital to achieve complete security of internal
and external network messaging environments.
 Competitive Edge: SENTINEL services are easy (transparent) to integrate; use customer’s existing domain and networks;
no additional infrastructure or personnel required.
 Designed-in “Ability to scale“: DigiTar makes it easy for clients to grow or diminish in headcount, and/or bandwidth
requirements. No client Capital budget “impacts” for additional (or surplus ) hardware, bandwidth, software or personnel
changes.
 Auto-Provisioning: Customers are relieved of draconian bookkeeping and directory integration tasks; DigiTar
automatically keeps track of "active" users eliminating painful periodic manual "culling" by the client administrator and
insecure links to client directories.
 Eliminates costs and maintains maximum client security and separation. [Several 100’s of hours per month of productivity
savings, and incalculable security savings.]
 Threat Classification Accuracy: For the end user client, as well as the VAR/ISP sales channel, this means unequalled
productivity (real $$’s) savings, revenue enhancement and state of the art (99.9% accurate) Cyber Security benefits.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
19
CONFIDENTIAL
Cyber security Service Market Segments: SMS / CES
DigiTar SENTINEL SMS (SENTINEL Messaging Services)
DigiTar has a highly redundant multiphase security message processing and content cleansing network architecture.
SENTINEL SMS: Use of multiple antispam engines and antivirus engines coupled with 24x7 security updates as to the latest
antivirus signatures and rule sets designated by global cyber security monitoring and cyber terrorism prevention organizations.
SENTINEL SMS blocks objectionable and/or unwanted messaging; removal of spam, spy ware, Phishing, and intrusion attack
software – sites – documents. Material of this nature is removed from the message stream and trashed according to central
cyber security monitoring and client managed security rule sets. Questionable materials are quarantined in a protected clientunique web site for review and disposition by the client, (i.e., "whitelist" if always valuable; "release" to client mail server if
desired this time). SENTINEL will automatically empty the quarantine after periodic reviews by the user; no further actions by
the user to eliminate the spam from the quarantine are required.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
20
CONFIDENTIAL
For example;
Normally, when someone is sending an e-mail message to "[email protected]", the sender’s mail server interrogates the Internet
name server to locate the IP address for blow.com. The Internet name server returns requested information; in this case that
the blow.com domain is located at IP address 1.2.3.4. Joe is inundated with a torrent of unwanted and hazardous material on
an hourly and daily basis. Management of this in-rush requires considerable time and expense both in regard to personnel
distractions, productivity impacts, acquisition costs of AV software and manual updates on a regular basis. By redirecting Joe's
inbound e-mail traffic to SENTINEL's SMS Cleansing Silo [IP 4.2.1.4], only spam-free and virus-free e-mails are allowed
through. All virii, worms, etc. are trashed and the spam is quarantined in a secure user-personal quarantine site, away from
the enterprise network. An additional benefit to the enterprise is the cost reduction associated with expanded
network/bandwidth infrastructures no longer burdened by supporting messaging traffic flows that were clogging up the
Enterprise's Voice/Data communications facilities.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
21
CONFIDENTIAL
DigiTar SENTINEL CES (Complete Enterprise Security)
SENTINEL CES: DigiTar’s on-site client premise Sentinel provides complete Enterprise-wide intrusion prevention and
virtual private networking capability, which augments the secure messaging services from the Sentinel SMS configuration.
SENTINEL CES builds on the SMS message processing engines, for SMTP traffic, and broadens the datum processing activities
by adding custom HTTP traffic engines and algorithms that clean web content, File Transfer Protocol files, Instant Messaging
traffic and provide Intrusion Detection and Prevention processing as well as Virtual Private Networking communications.
As with SENTINEL SMS, SENTINEL CES blocks objectionable and/or unwanted Web content material and provides removal of
Virii, Spyware, Phishing, and Intrusion Attacks delivered by Software/Sites/Documents. Material of this nature is removed
from the Datum stream and trashed according to central cyber security monitoring and client managed security rule sets.
Again, questionable materials can be quarantined in a protected client-unique web site for review and disposition by the client,
(i.e., "whitelist" if always valuable; "release" to client mail server if desired this time).
SENTINEL will automatically empty the quarantine after periodic reviews by the user; no further actions by the user to
eliminate Datum from the quarantine are required.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
22
CONFIDENTIAL
Enterprise Security with SENTINEL CES Technology
Internet
Hacker Bob
Enterprise Branch
Offices
Secure SMTP
Secure HTTP
Remote Sites
VPN - Secure VoIP
CES
Work at Home
Dedicated VPN Link
Major
Customer
On-Demand VPN Link
PBX
PBX
SENTINEL
DigiTar SENTINEL SMS
Secure VoIP
Web Server
Hotel / Home / Cust Site
Secure VoIP
Secure HTTP
Secure SMTP
V
oI V
P oI
V
P oI
V
P oI
P
Mail
Server
DigiTar Client Services
Enterprise HQ
Offices
CES Secure Services: AV / AS / CF / I PS / BW /VPN
Sentinel CES/VoIP – Providing VoIP Security & QoS
A key issue for VoIP phone system deployments is the problem of normal data traffic plugging networks lines, and leaving
little or no room for VoIP traffic. This is particularly the case with Service Provider (SP) deployments, where the SP controls
the quality of service (QoS) inside the SP network, but cannot control how the customer uses the T1 or DSL that provides
service over the “last mile”. Often, the customer will use their network link to full capacity (i.e. downloading PDFs or watching
videos) thus making it very difficult for VoIP calls to maintain their quality…if they can get through at all.
Adding to this situation is the recent FCC ruling that VoIP SPs must provide
911 access, thus making the problem of an unusable VoIP installation
particularly acute. Moreover, VoIP handsets are susceptible to the same virus
infections, exploits and Denial-of-Service (DoS) attacks that plague standard
computer systems.
“… CES… guarantees VoIP
quality and availability,
regardless of the client’s
Internet usage profile.”
Sentinel CES/VoIP secures the VoIP handsets, and, in addition, guarantees minimum available bandwidth levels to those
handsets. By deploying CES/VoIP, VoIP SPs can guarantee VoIP quality and availability, regardless of the client’s Internet
usage profile. Undesirable-effects of attacks on VoIP handsets include: phone calls by unauthorized third parties (i.e.
suspicious calls to Afghanistan on your bill), eavesdropping, and complete incapacitation of your VoIP systems. CES can
ensure both the security of your calls, and protect the capability to make them.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
23
CONFIDENTIAL
Future Products and Services
Next Generation DigiTar -PRODUCT ENHANCEMENT PLANS/PRIORITIES – CONFIDENTIAL
1.) SENTINEL “Today” Enhancements:
Pattern-based routing & policy groups.
Dynamic Address extensions.
New Portal with web APIs underneath.
Managerial executive console [Confidential PRD]
IBM Lotus-Domino Plug-in & Integration
2.) SENTINEL “Next Generation” Technologies:
TweetComplete™ Micro-Blogging Tools [Confidential PRD]
MaxIM™ Secure Instant Messaging [Confidential PRD]
eAttach™ Protection Services [Confidential PRD]
MadAve™ Advert Revenue [Confidential PRD]
SMS Wireless eMessaging™ [Confidential PRD]
These development activities are sensitive work product of DigiTar technical team, and will be a part of patent and Intellectual
Property filings covering state-of-the-art messaging management, and smart wireless technologies along with instant
messaging Web2.0 security. Introduction of these service products is scheduled during late 2009 through 2011. The
heretofore-unavailable features and capabilities of these advanced technologies will revolutionize the way providers service
their clients. Moreover, they will infinitely expand revenue communications currently “blocked” due to system limitations of
today’s network implementations. Lastly, these products will "unfetter" the next generation smart phone 3G capabilities when
it comes to eliminating "malware" (voice and eMessage Spam) and other cyber attacks these new phones are subject to.
Summary Market Characteristics:
SMB Market: Average Range Client Size 50 to 250 users/client
Large Enterprise Market: Average Range Client Size 750 to 5000 users/client
Larger Gov/Telco/ISP Enterprise Market: Range Client Size 25,000 to 3.5 million users/client
Anticipated changes in the client makeup will be driven by the bi-furcations of eMessaging structures and the impact of .MOBI
on the organizations. eMail as we know it today is evolving and expanding alone the “needs” lines of usage.
In particular “Text Messaging” and “Instant Messaging” are replacing portions of the normal short context emails of the past.
Immediacy of connection and feedback is the big attraction of these communications mediums. Even newer eMessaging
Channels are appearing as “Opt-In” Micro-Blogging message delivery conduits (Twitter/Tweets).
These will further expand / enhance the efficacy of eCommunications and have significant impacts on future concepts of
Business and operations campaigns of all types (Marketing, Services, Political, Public Relations, etc.).
Likewise, it is impossible to escape the evolution of wireless “Mobile” connectivity. Products such as iPhones, Blackberrys,
and new Nokia smart handsets are bringing the information directly to the user without the need of in-house networks
and client hardware systems.
Fortunately for DigiTar, these evolutions were considered as a part of the backbone technology architecture of our all
types of “eMessagingAlignment™ charter and long term business objectives. Also fortunate, is the fact that these new
Communications implementations are massively insecure in their HTTP transfer protocols. They open additional requirements
and applications for DigiTar technology available today and planned for release in the future.
DigiTar’s services market is getting exponentially larger and less competitive (for a while) at the same time.
A contra positive trend, to the above, we see with very large enterprise clients planning to move to services “On-Site”.
Select types of enterprises are driven to seek better functionally and costs but wish to do so with on-site data processing
storage and management. These orgs are highly regulated in some cases and worry about data processing outside their
physical plant for PR and ethereal reasons. Inquiries from Japanese and USA bank clients have suggested a desire/need
for “DigiTar On-Site” and/or “DigiTar In-a Box” embodiments with remote management and updating of on-site
operations being performed on client traffic. As discussed earlier, DigiTar technology is massively modular and redundant
to maximize performance and reliability. DigiTar has been working with its hardware technology partner, SUN
Microsystems, Inc., on development of server-storage technology systems that embody multiple virtual processing
Elements using SUN’s “Secure SOLARIS” Operating system and multi-Threaded server architectures. This is a long term
Vision-of-the-future concept which is not included in the financial projections. It is included here for completeness of
Disclosure and insight into the modularity of our technology.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
24
CONFIDENTIAL
Market Analysis Summary
Enterprise Security: As recent virus attacks vividly demonstrated, companies large and small are struggling to maintain
around-the-clock network security. Occurring nearly simultaneously,
the Blaster, Welchia, Sobig.F and Conflicker worms ripped through
“the need for better cyber security is
hundreds of thousands of corporate computers, resulting in untold
expanding exponentially.” [Gartner]
damages and lost productivity. This was followed by even more
devastating epidemics of MyDoom, Bagle, and NetSky worms. In such an atmosphere, how can small businesses maximize
their IT investments and successfully manage security?
“in-house teams struggle to understand and defend
against the latest security threats because this
requires constant system monitoring – something
that few small businesses can afford”. [Gartner]
Handling security in-house: Small/medium sized
businesses are in a unique – and extremely challenging
– position when it comes to combating security threats.
Lacking the IT staff commonly found in enterprise
operations, they must nevertheless protect their network from attack. This normally entails formulating a security policy and
implementing firewall, intrusion detection, virus detection, and other security technologies. But even after taking these steps,
the challenge remains of how to manage the security effort. Security, after all, is not static, and small businesses – like any
other operation – must be prepared to proactively monitor, maintain, and upgrade their network protection.
According to market researcher Gartner, at most companies, the staff responsible for these security functions is also
responsible for other activities and spends most of its time on non-security projects. For resource-constrained small
businesses, Gartner added, such added responsibility is often too taxing.
The bottom line: maintaining the necessary vigilance in these days of “zero-day” attacks requires significant investments in
staff, IT systems, and training. NB: DigiTar provides “Zero-Hour”
Protection!
Michael Osterman reported in 2006 “The trend to
integrate messaging security will continue,
Outsourcing the security operation: The cost-effective alternative is
driven by an increasing number of organizational
for small businesses to outsource the management and monitoring of
requirements for messaging security focused on
stopping malware, spam and phishing attacks;
their network security to an MSSP like DigiTar. An MSSP can combine
plus adding secure messaging, archiving, content
advanced technology with expert human analysis, enabling a small
filtering for compliance and other services.”
business to cost-effectively strengthen its security posture. An MSSP can
“Messaging Security Market Trends, 2005-2008,
also provide a level of technology and expertise that ensures rapid
An Osterman Research Multiclient Study, 2008.
response to real threats. In general, an MSSP’s services include timely
phone and email access to security monitoring staff and Web access to
reports on such things as device status, change requests, and service
level performance. Most importantly, by effectively solving security
problems, these services enable small businesses to focus on their core, everyday business issues.
Security Management: Small/medium sized Business (SMB) need the benefits of maximum protection, and minimized
threat-discovery to threat-destruction time just like the large enterprises. In-short, World-class security, Maximum Protection,
but at minimum costs
SMB Threats Summary:
 -Worldwide problem
 -Everyone connected to the Internet is a target.
 -Automated tools, blended threats, and worms increase exposure.
 -Systemic problems, vulnerabilities and configuration errors, make security more difficult
Market Segmentation
DigiTar's markets are rapidly growing and are tied to cyber security demands of today's Information Technology world.
Information security is required at all levels – personal level, corporate level, state and national level. According to the U.S.
Department of Homeland Security, there is a steady rise in the occurrence of cyber attacks. As per a recent survey, cyber
attacks cost businesses more than $ 46.2 billion (2007) in damage and clean up cost, while the cost in 2000 was $17.1 billion.
Some enterprises were forced to shut down whole networks to fix the problem. Thus, there is clearly a sizeable requirement
for DigiTar's cyber security products and services for many years.
Major market segment: Sales of E-mail messaging Protection Services:
A very high demand market for 24/7 services that monitor all domain e-mail traffic and remove Cyber virii and Spam
contents from the transfer data streams between a user's site and any incoming message(s) via the Internet.
Major market segment: Sales of Complete business cybersecurity Protection services:
A major market for business protection services operating 24/7 that extends cyber protection to include all packetswitched data traffic, and private communications between a user and any web site or e-mail host associated with the
world-wide web communication capabilities. Complete enterprise protection provides protection from cyber terrorism,
including intrusion detection & prevention, content filtering, and performance & bandwidth management.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
25
CONFIDENTIAL
Major market segment: Sales of cyber security equipment and systems that have proprietary DigiTar functionality
integrated as a value-added component.
These products range from cyber filters and software to complete turnkey SOC (Security Operations Centers)
implementations, as customized for specific customers.
Custom market segment: DigiTar “On-Site™ & DSRU Sales & Licensing of custom software and Joint Venture
proprietary security services to international partners and major OEM accounts; and for unique or specific customer
requirements which can be added to DigiTar products and services offerings as standard products for revenue
enhancement and competitive sales advantages.
Market Analysis – TAM Customers/Application
2005
Potential Customers
eMail messaging Protection:
Complete Enterprise Cyber
Protection:
Cyber Security Services:
Proprietary Technology: DSRU
Licensing
MSSP ManSecServices
Other
2006
2007
2008
2009
2010
CAGR
690,000,000 803,850,000 936,485,250 1,091,005,316 1,271,021,193 1,480,739,690
16.5%
15,000,000
19,950,000
26,533,500
35,289,555
46,935,108
62,423,694
33.0%
11,000,000
14,300,000
18,590,000
24,167,000
31,417,100
40,842,230
30.0%
3,405,000
5,771,475
9,782,650
16,581,592
28,105,798
47,639,328
69.5%
1,000,000
100,000
1,200,000
115,000
1,440,000
132,250
1,728,000
152,088
2,073,600
174,901
2,488,320
201,136
20.0%
15.0%
720,505,000 845,186,475 992,963,650 1,168,923,551 1,379,727,701 1,634,334,398
Total:
17.8%
Source: International Data Corporation (IDC)
Target Market Segment Strategy [Spam Market Drivers]
Spam, commonly defined as, “unsolicited commercial e-mail”, is a powerful advertising channel for many products and
services. As a result, spamming has become a profitable business, driven by the low cost of sending e-mail compared to other
direct marketing techniques. The high return on investment for spammers has resulted in an overwhelming volume of
unwanted messages in personal and business e-mail boxes.
Consider this: Conducting a direct mail campaign costs an average of
$1.39 per person, meaning that a response rate of 1 in 14 is
necessary just to break even on a $20 item. Selling the same $20
item via unsolicited spam e-mail costs only $0.0004 per person,
meaning that a response rate of 1 in 50,000 gets the seller back to
break-even; anything above that is gravy.
DigiTar SENTINEL SMS Simply
Stops Spam and Other E-mail
Threats from Entering Your
Networks!
Phishing
Phishing is a specific type of spam message that solicits personal information from the recipient. Phishers use social
engineering techniques to fool recipients into believing that the message originated from a trusted sender. These attacks are
especially dangerous because they often con victims into divulging social security numbers, bank account information or credit
card numbers. In one six-month period, from November 2005 to May 2006, Phishing attacks increased in frequency by 4000%
and the trend continues upward.
Spoofing
Spoofing is an especially deceptive form of Phishing/Spam that hides the domain of the spammer or the spam's origination
point. Spammers often hijack the domains of well-known businesses or government entities to enhance the validity of their
commercial message or scam.
An example of spoofing is an e-mail that appears to come from a bank requesting that users log into their account to update
or correct personal information. When the users follow a link embedded in the e-mail, they are redirected to a site that looks
and behaves like the expected bank website. However, unbeknownst to the soon-to-be identity theft victims, the site is
actually controlled by the scam artists who sent the e-mail. Any and all information entered by the victim can now be used in
a variety of ways, none of them good.
Today's spammers are craftier than ever before and have begun blending elements of both Phishing and Spoofing into their
messages, further spinning their web of deception. The toxic combination of Spoofing and Phishing presents a dangerous
major threat that can trick most anyone into providing personal information to a stranger.
Toothless Legislation
In 2004, President Bush signed into law the "Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003,"
or "CAN-SPAM Act". While well intentioned, CAN-SPAM has done little or nothing to curb the flow of unwanted e-mail. In fact,
an estimated 97% of all spam e-mail sent in 2008 violated the Act, and the United States still dwarfs other nations in terms of
the origin of spam, with research revealing that an astonishing 85.9% of all spam comes from U.S.-based IP addresses. While
CAN-SPAM was designed to decrease the overall volume of spam, the exact opposite has happened: in 2004, spam accounted
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
26
CONFIDENTIAL
for approximately 77% of all e-mail traffic, and Phishing attacks continue to increase exponentially, with studies showing an
increase of 10,000% from November 2006 to May 2008.
Why Anti Spam Software for the Desktop is Not Enough
(See: Symantec Hit by Large-Scale Flaw )
The dramatic increase in spam volume has prompted a corresponding surge in stand-alone anti spam software solutions for
the desktop, all with varying levels of effectiveness. Some anti spam software uses text filtering to screen incoming messages
for known characteristics of spam, while other solutions rely solely on reputation systems, which monitor and categorize email senders by IP address according to their sending behavior. Still other anti spam software uses "challenge/response
filters" to block unapproved mail until the sender responds (manually) to a challenge e-mail sent to their e-mail account to
verify his or her identity.
With so many different methods of filtering spam, no single software-based desktop anti spam solution is capable of
effectively stopping spam before it reaches the inbox. The only way to successfully fight spam is by employing DigiTar's
SENTINEL anti-spam "DNA" technology. SENTINEL's anti-spam engine is tailored to each user's requirements and coupled
with constant updates from global spam definition lexicons plus DigiTar's proprietary spam DNA recognition algorithms. Most
importantly however, is the positioning of an effective anti spam solution, ahead of the e-mail gateway, not at the desktop.
Without protection ahead of the gateway, mail servers waste massive amounts of bandwidth, cpu utilization and storage
space processing every message (wanted or not) and end-users face the unenviable task of deciding what to do with the
countless spam messages that successfully reach them. DigiTar SENTINEL deals with spam and other attacks before they get
inside your network, thereby adding a critical layer of security and separation from the "malware" and your internal
operations.
Take a Consolidated Approach to Anti Spam
Because it takes a person several moments to process a message and identify it as spam, it is critical to automate that human
process, thereby eliminating the impact on employee productivity and business costs in dealing with the removal of spam from
the workplace. In addition to effectively identifying spam, businesses must be assured that legitimate mail is not blocked in
error. Even one false positive, or incorrectly blocked e-mail, can have a significant impact on businesses today. Accurate spam
processing requires a combination of analyses to properly examine various message criteria combined with real-time
intelligence data.
By utilizing DigiTar's advanced DNA message analysis technologies, and placing the Anti-Spam solution ahead of the network
e-mail gateway, an enterprise can retake control of their inbox while improving bandwidth utilization and saving costs.
Global Market Demand [24 Hour/Day Assets Leverage]:
DigiTar supports its’ Global customer demand is via high speed Fiber-Optic connectivity (between DigiTar and the global client
location) and requires a limited number of DigiTar Data Centers. Non-overlapping maximum active user periods yield rolling
regional demand loads of 90% of Regional message traffic occurring between 0900 thru 1100 and 1400 thru 1600 local time.
DigiTar Facility utilization is defined by the demand usage levels (active Users) associated with 24 1- hour Periods/Area; given
12 service Regions (World-Wide) and total client User Base as follows: [Greenwich Mean Time=Z Time]
1
2
3
4
5
6
7
8
9
10
11
12
Area/Region
EEC/United Kingdom
EEC/France\Germany
Mid East/Israel
Mid East/Dubai
India/Delhi\Mumbai
China/HKG\Shang\Beijing
Japan/Tokyo\Osaka\Kyoto\Nara
Australia/Sydney
USA/LAX
USA/DEN
USA/CHI
USA/NYC
∆ to Z Time
+0 Hours
+1 Hours
+2 Hours
+4 Hours
+5 Hours
+8 Hours
+9 Hours
+10 Hours
-8 Hours
-7 Hours
-6 Hours
-5 Hours
Total Users
500,000
2,600,000
100,000
100,000
500,000
1,750,000
3,500,000
300,000
2,500,000
1,250,000
2,500,000
4,500,000
20,100,000
Max Active user Peak Load
250,000
1,300,000
50,000
50,000
250,000
875,000
1,750,000
150,000
1,250,000
625,000
1,250,000
2,250,000
3,510,000(1)
Note(1): Maximum Regional User periods (demand levels) do not align with any other regions; therefore, DigiTar needs
support for a maximum user load of 3.5 M users (Peak Load) of 20.1M clients.
Examples: India client eMessage processing by DigiTar USA requires 800mSecs (0.8 Secs) total message transfer time
(From/Return) plus 200m/Sec processing time at DigiTar Data Center; Total >2.0 Sec message latency time.
Austria client eMessage processing by DigiTar USA requires 400mSecs (0.4Secs) total message transfer time
(From/Return) plus 200m/Sec processing time at DigiTar Data Center; Total >1.0 Sec message latency time.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
27
CONFIDENTIAL
Business Models: 2010 Global Served Available Market
Active Users:
20,100,000
Peak Users:
Monthly Revenue/User@
3,510,000
$0.58/User(2)
$11,658,000
Gross Annual Revenue
$139,896,000
Note(2): Discounted net revenues to DigiTar after Marketing/Sales regional absorption costs.
Business Models: 2012 Global Served Available Market
Active Users:
58,750,000
Peak Users:
Monthly Revenue/User@
7,000,000
$0.43/User(2)
$25,262,500
Gross Annual Revenue
$303,150,000
Note(2): Discounted net revenues to DigiTar after Marketing/Sales regional absorption costs
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
28
CONFIDENTIAL
What the CyberSec Market Needs:
Network Security Solutions Must Evolve:
Security Challenges and Needs

Solutions that ensure business continuity, network availability, and applications access to secure centralized office
locations as well as distributed remote workers.

Protection against today's complex blended threats and unknown attacks

Proven security that does not require constant increases in security staff to select, deploy and manage security
solutions

Scalable management solutions that contribute to business unit efficiency and meet regulatory compliance

Reduce acquisition, installation, and management costs associated with security functions
Market Trends
DigiTar's markets are rapidly growing and are tied to cyber
security demands of today's Information Technology world.
..steady rise in the occurrence of cyber
attacks (48 % rise 2003, 67% rise in 2005,
76% rise in 2007, 84% rise in 2008)
[US Dept of Homeland Security]
Information security is required at all levels – personal level,
corporate level, state and national level. According to the U.S. Department of Homeland Security recent survey, 2007 cyber
attacks cost businesses more than $ 46.2 billion in damage and clean up cost, while the cost in 2002 was $ 17.1 billion. Some
enterprises were forced to shut down whole networks to fix the problem. Thus, there is clearly a sizeable requirement for
DigiTar's cyber security products and services for many years.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
29
CONFIDENTIAL
Current Security Trends






The Number of threats is increasing year over year; over 2,600 new vulnerabilities documented in 2003; over 56,000
in 2004, over 552,000 in 2006 and over 3,504,000 in 2008.
Many new vulnerabilities are easy to exploit with many applications and protocol code being made public for scripting
and interface
Sophistication of threats are evolving – severity of vulnerabilities are increasing
Time of infection is now very fast requiring IT to react much faster
Malicious Code which exposes confidential data has increased significantly–Blended attacks against Microsoft have
increased 10,000 fold
The motive and intent is changing – moving from notoriety to financial gain garnered by theft of financial and
personal information
Market Growth
In the first quarter of 2003, there were an estimated 30,000 Internet Service Providers in the United States alone:
In particular;
 5,000 are colleges and universities.
 1,800 are fixed wireless service providers1, including “community” or non-commercial shared networks.
 2,500 are Wi-Fi Wireless network nodes, “hot points,” and similar free-access services.
 15,000 are Multi-Tenant Unit and Multi-Dweller Unit providers, serving apartment buildings, office buildings, college
campuses and other properties2.
 12,300 are dialup and broadband services offered by independent ISP’s using incumbent telephone companies.3
8,000 are rural and independent ILEC telephone companies that offer broadband and narrowband Internet services.4
 1,000 are cable television companies, including cable over-builders, private cable systems, and local and national
cable providers that offer broadband Internet services.
 340 are cyber-cafes, resorts, shopping mass kiosk sites and others offering Internet access.
 100 are competitive local exchange carriers that offer broadband services, wireless or dial-up services.5
 125 are “virtual ISP” services such as the AFL-CIO and the Republican Party, which operate Internet services but
have no infrastructure or support of their own.
 Today (2009) there are an estimated 155,000 of additional global ISP’s, including the remnant “free” services, Fiberto-the-home (FTTH) providers, powerline providers, information services, private ISP’s and virtual private networks,
corporate ISP services, and web hosting companies.
1
Source: In-Stat/MDR, March, 2003.
Source: Broadband Properties Magazine, 2003
Source: Combined data from Verizon, SBC, BellSouth and Qwest
4
Source: US Telecom Association, 2003
5
Source: New Paradigm Resources Group “CLEC Industry Report 2003”
2
3
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
30
CONFIDENTIAL
According to the U.S. Internet Industry Association, the major trends affecting the Internet service provider industry in the
opening years of the 21st Century are:

The growth of broadband. 33 million Americans were online via broadband as of the end of 2003. Broadband
posted a 59 percent growth rate in 2002, while dial-up accounts declined by 10 percent.6 Broadband connections
surpassed dial-up connections in 2007 and virtually will replace dial-up by 2010.7

Evolving Internet services. Traditional Internet services -- email, web browsing and e-commerce – continue to
grow. Email messaging will increase by 40% per year through this decade, according to the Gartner Group. And the
US Department of Commerce notes that retail sales online surged again last year, up 58 percent over 2007. Added to
these traditional applications are a new generation of network services that include peer-to-peer file sharing, instant
messaging, Internet to cell phone integration and text messaging, and Voice-Over-IP telephony. These services will
combine with other telecommunications and video services over broadband to drive growth and profitability.
Email Subscribers: According to Jupiter Research, as of September 30, 2008 the total number of global ISP subscribers was
812.1 million. This number does not include subscribers at work, at universities, or in government.
The US Bureau of Census reports revenue data that covers the 1997 through 2008 periods indicating a 36% CAGR growth of
DigiTar’s initial key market, “Internet access services”, also known as Internet Service Providers [ISP’s]. Estimates of growth
through 2011 and beyond are based on Census data and industry forecasts completed by the U.S. Internet Industry
Association [USIIA], The Internet Security Alliance [ISA] and Jupiter Research.
Source: U.S. Bureau of the Census, Economic Census
NAICS Code:
Title:
Sector:
Definition:
518111
Internet service providers
51
This industry comprises establishments known as Internet service providers. Establishments in this industry
provide client’s access to the Internet and generally provide related services such as Web hosting, Web
page designing, and hardware or software consulting related to the Internet connectivity. Establishments in
this industry may provide local, regional, or national coverage for clients or provide backbone services
(except telecommunications carriers) for other Internet service providers. Internet service providers have the
equipment and telecommunication network access required for a point-of-presence on the Internet.
2007
Product line
code
Description
35550
Internet access services
35551
Internet access services: Narrowband
35552
Internet access services: Broadband
Ten Year Profile & Projection:
518111-35550
2001
2002
2003
2004
Revenue/Yr
$16,170
$20,374
$24,163
$30,108
$x1,000,000
23.90%
26.00%
18.60%
24.60%
Yrly AGR
6
7
Number of establishments
16, 394
3,917
13,620
2005
$38,809
28.90%
2006
$52,392
35.00%
2007
$71,777
37.00%
2008
$99,053
38.00%
2009
$137,683
39.00%
2010
$192,756
40.00%
See http://cyberatlas.internet.com/markets/ broadband/article/0,,10099_1570321,00.html
Study By ARC Group, referenced at http://cyberatlas.internet.com/markets/broadband/article/0,1323,10099_985891,00.html
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
31
CONFIDENTIAL
Value Proposition
DigiTar provides a complete low cost "Turn-Key" solution to its clients including all hardware, software, 24 hour updates to the
virus and spam filters, and all management and reporting of the events and the results of all traffic scanned and/or purged.
No other supplier, to date, has the breath of services or system user benefits comparable to DigiTar.
By providing complete solutions, including custom programs and/or feature sets, the client can remain focused on their own
business activities without the need to expand internal staff and facilities in order to meet regulatory compliance issues or
business data management needs.
Distributing a Service
DigiTar will initially distribute its SMS and CES service products to end users through Independent IT Contractors, VARs and
Internet Service Providers (ISP's). In concert with sales through ISPs, DigiTar will also promote and distribute through its own
web site and allow customers to sign up and pay via credit card for its SMS services. DigiTar's direct distribution sales plan
includes positioning regional agents (commissioned sales) in key metro areas for business development of medium and midsized business firms and enterprises.
DigiTar direct sales of security services will be handled by the Regional ISP’s and Value-Added IT-Contractors and Resellers
and in-country Partner/Agents, both domestic and international.
Development of select USA and certain international markets will be pursued with an objective to form a joint venture
business relationship wherein DigiTar will license its technology, and co-location equipment, to substantive regional partners
who have the market contacts, depth, technical expertise, and financial where-with-all to establish leadership revenues for
DigiTar via franchise and royalty fees commensurate with the served market.
Competition and Buying Patterns
The traditional cyber security industry has been dominated by only a few major manufacturers: Symantec, McAfee,
MessageLabs, and Postini; and then come the low-end players: Spam Assassin, SpamCop, and Barracuda. With the exception
of the high end players, MessageLabs (Purchased by Symantec 2008) and Postini (Purchased by Google 2007) who maintain
their own sales forces, the other manufacturers distribute and sell mainly through authorized dealers, retailers or via their web
site.
Given the rapidly growing cyber security threats, the future will most likely be dominated by the same participants as
described above. While Symantec has been a past leader in the sales of single function per user "boxed" products, McAfee has
emerged as both an innovator, and a leader, in this area as well.
Main Competitors
The cyber security "services" market has been dominated by MessageLabs, and Postini who offer very expensive solutions,
primarily to the large corporations and government agencies business markets. While these services offer extensive features,
they are increasingly ineffective at coping with rapidly changing spam trends and are inflexible to the scaling + specific needs
of the individual customer. Some competitors, (Ironport), offer/require the user enterprise to purchase a combination of
software and hardware products. This makes the integration of security products (hardware) into the user’s network topology
much more difficult and expensive; and requires in-house IT Management personnel.
Customer Benefit-Value Proposition
DigiTar makes it easy for both regional and international Internet Service Providers (ISP’s) to play a larger role in combating
viruses. ISP’s will be offering DigiTar security services that scan all incoming and outgoing mail for viruses and spam; if a
user's machine comes under attack, DigiTar will block the attacking traffic, notify the ISP, and perform automatic disinfection
of the traffic. This kind of resource will allow ISP’s to charge a fee for the cyber security protection which will grow their own
business more quickly and with reduced competitive pressure from other ISP’s who do not offer DigiTar Sentinel competitive
edge services.
No other supplier, to date, has the breadth of services or the reporting systems comparable to DigiTar for the
same cost to the customer.
By providing complete solutions, including custom programs and/or feature sets, the client can remain focused
on their own business activities without the need to expand internal staff and facilities in order to meet
regulatory compliance issues or business data management needs.
Competitive Edge
DigiTar SENTINEL SMS/CES services are easy (transparent) to integrate and utilize within the users existing domain and
networks without need for additional infrastructure or personnel. Because of the "designed-in ability to scale", DigiTar makes
it easy for its clients to grow or diminish in size, and bandwidth processing requirements, without budget impacts for
additional/excess hardware, bandwidth, software and personnel issues.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
32
CONFIDENTIAL
DigiTar has built-in a proprietary "Auto-Provisioning" technology whereby customers are relieved of draconian bookkeeping
and directory integration tasks that competitive offerings require. DigiTar automatically keeps track of "active" users in the
client domain and charges only for users that utilize our service during the calendar month. This eliminates painful periodic
manual "culling" by the client administrator, as well as capricious and insecure “LDAP” links to internal client directories, in
order to keep costs in line with actual use and maintain maximum client security and separation. This can amount to many
man-hours per month of productivity savings, and incalculable security savings.
DigiTar's technical staff is unequalled in the innovation of cyber security concepts and implementation of unique DNA
algorithms and system constructs. DigiTar will pursue patents and intellectual property rights filings that will differentiate and
protect DigiTar's core technology strengths from competitive offerings.
Joint selling with major VAR & ISP sales managers and training of their sales personnel allows DigiTar to capture the power of
multiple & broadly distributed sales organization(s) throughout the USA, and internationally, without having to directly pay for
these large sales teams before real revenue is achieved from the sales region.
DigiTar has developed the cyber security industry's first secure service solution to voice over internet connectivity (VoIP phone
systems). VoIP is becoming a major growth market, especially in the small-medium sized business markets. Operational cost
of these systems is far below that of standard phone and PSTN tariffs from RBOCs. However these systems (Digitized Voice)
are subject to the same cyber attacks that business computers are. DigiTar plans to exploit the VoIP market with its "secure
VoIP" services in concert with ISPs that are investing in this area in order to expand and differentiate their service offering to
their regional markets.
Marketing Strategy
DigiTar makes it easy for both regional and international Independent IT Contractors and Internet Service Providers (ISP’s) to
play a larger role in combating cyber threats. VAR’s and ISP’s offering DigiTar security services are delivering complete "TurnKey" solutions to its clients including all hardware, software, 24 hour updates to the virus and spam filters, as well as all
management and reporting of the events and results of all traffic scanned and/or purged. No other supplier to date has the
integrated breadth of services or the reporting systems comparable to DigiTar. This kind of resource allows ISP’s to charge a
fee for the cyber security protection which will grow their own business more quickly and reduce competitive pressure from
other ISP’s who do not offer DigiTar Sentinel competitive edge services.
DigiTar provides a deep discount, up to 50%, to resellers of SMS and CES services.
By providing complete solutions, including custom programs and/or feature sets, the client can remain focused on their own
business activities without the need to expand internal staff and facilities in order to meet regulatory compliance issues or
business data management needs. DigiTar's technical staff is unequalled in the innovation of cyber security concepts and
implementation of unique DNA algorithms and system constructs.
DigiTar has extensively modeled the costs associated with providing cyber security services for a broad spectrum of account
sizes. DigiTar has developed an aggressive pricing strategy that saves clients significant costs, as compared to competitive
suppliers, and at the same time delivers gross and net margin to DigiTar well in excess of industry norms. Due to DigiTar's
proprietary technologies, business constructs and the extensive margins built into this business plan, DigiTar will remain
profitable in the face of possible competitive price pressures.
Joint selling with major Resellers, and training of their sales personnel, allows DigiTar to capture the power of multiple &
broadly distributed sales organization(s) throughout the World without having to directly pay for these large sales teams
before real revenue is achieved across the region.
Positioning Statement
Association with prominent Resellers and Internet Service Providers (ISP's) globally wherein DigiTar brings a turnkey ability for
the them to offer advanced cyber security features and capabilities to their existing and competitive customer base. This
spares them the need to spend additional capital, and avoids the expansion of current employment to cover the security
monitoring and systems performance required to provide users with 24/7 cyber security protection from web-based virii,
intrusions, spam mail and secure virtual private connectivity to and through the world wide web cyber business environments.
Pricing Strategy
DigiTar has priced its services based upon value and return on investments criteria. DigiTar has extensively modeled the costs
associated with providing cyber security services for a broad spectrum of account sizes. Distributors & select Resellers can
enjoy up to 50% discounts on list user pricing, which produces excellent margins for the sales organization without the need
for add-on administration or equipment expense.
DigiTar has developed an aggressive pricing strategy that saves clients significant expense, as compared to competitive
suppliers, and at the same time delivers gross and net margin to DigiTar well in excess of industry norms. Due to DigiTar's
proprietary technologies, business constructs and the extensive margins built into this business plan, DigiTar will remain
profitable in the face of possible competitive price pressures.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
33
CONFIDENTIAL
Promotion Strategy
DigiTar plans to list its services with major internet search services, such as Google, Yahoo, etc., and advertise on these
services also. In complement with the search engine services, DigiTar will directly contact targeted smaller and medium sized
clients, i.e., ISP's, Law firms, Mortgage services, Banks, county and city agencies, Medical clinics and associated regional
facilities, through the use of e-mail-list services and each industry's promotional publications.
Key to the DigiTar plans for enhanced services is a viral marketing campaign targeted initially at technophile cyber
communities and early adopters of paradigm-shifting technology. It is these early adopters that are, by nature, evangelists
that push new technology out towards friends, family and general adoption. We will allure published and recognized
luminaries in technorati circles with the use of DigiTar’s compelling technology, in exchange for testimonials on their channels
to the community.
Examples of such luminaries and their channels are:

Jon Udell – His opinion articles (InfoWorld, et. al.) and blogs are widely read and trusted by the technology
community for his perceived sharpness and attunement to new and useful technology trends.

Joel Spolsky – Spolsky’s blog “Joel on Software” is read by thousands in the Information Technology and
technology-at-large communities. Due to the nature of blogging, his opinions and insights are viewed as uninfluenced
by glitzy marketing and grounded instead in reality. As a result, his influence over his readership is great.

Slashdot – Under recognized as a resource by established vendors, Slashdot is a massively followed harbinger of
successful paradigm-shifting technology. So pervasive is its influence that it has a verb associated with it. To be
“slashdotted” is to have your web site hit by so many visitors as to be effectively overloaded. The verb has its origins
in the fact that almost every site Slashdot references becomes rapidly slashdotted. Google, Flickr and BitTorrent are
but a few of the services and products that have been widely accepted by the early-adopter community after
mention on Slashdot.

There are additional techno luminaries and communities that will be targeted as well. The above list represents the
planned initial contacts.
Distribution Strategy
DigiTar will initially focus on developing VAR and ISP sales channels in order to establish regional blocks of residential and
business end user accounts. This revenue base will be enhanced through the addition of new add-on services that are
proprietary, patented "pay-for-use" incremental charges for benefits unavailable from other suppliers.
Distribution sales channels, particularly with regard to international users, will be established where market development and
expansion can be effected at a favorable cost to DigiTar in return for revenue commitments from these markets over a
contract period of years. DigiTar believes that many USA and international distribution opportunities exist wherein the joint
venture program can more rapidly garner market share for DigiTar services at significantly reduced cost, as compared to
developing said markets directly.
DigiTar has established its web site so as to support direct sales and user add-on services for any end user that chooses to
take advantage of these proprietary services and benefits.
Marketing Programs
To date, DigiTar is focused on the smaller and medium sized business markets, i.e., companies, firms and agencies that have
less than 5000 users per domain. Small firms might only contain 5 to 50 users. Medium sized organizations will have 300 to
2500 users. Depending upon the enterprise, the connectivity provider or ISP associated with the enterprise, DigiTar will
provide cost savings and feature-benefits unavailable from other eMessage security services suppliers. In some cases the ISP
may use DigiTar services as a way to attract hosting and connectivity revenues away from their indigenous competition.
DigiTar Sales/Marketing Channel Strategy:
Sales Strategy: Tailored to the Client
Strategic alliances with regional domestic and international Value Added Resellers and Distributor plus Internet Services
Providers (ISP’s) are fundamental to the initial customer focus sales strategy of DigiTar. Since many potential clients are
serviced by regional ISP’s, DigiTar represents a low-cost/no-cost upgrade to their existing service for their customer base. The
firms have major investments in data transmission infrastructures and message management systems but lack an effective
integrated cyber security solution.
To be able to "bolt-on" DigiTar security services, without major capital outlay or the hiring of certified cyber security
management personnel, is a significant advantage to these regional providers in their continuing competitive battles with the
super large ISP’s such as MSN.com and AOL.com.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
34
CONFIDENTIAL
Globally there are a large number of small regional phone services companies that are struggling to remain competitive
against the "By-pass" phone companies and the large RBOCs of the Bell System. DigiTar will joint venture with some of these
organizations to enhance their offering to their ratepayers while at the same time providing DigiTar with a captive market user
base within each of these regional communications suppliers markets.
Special Japanese market initial strategic alliance focus includes several organizations in Banking and IT Computer network
products and services.
Commitment to Channel Sales Model
Strategic alliances with regional and Pan-National IT Distributors, Resellers and Internet Services Providers are fundamental to
the strong marketing focus and sales strategy of DigiTar. Since many Global Clients are serviced by regional distributors and
resellers, DigiTar represents a low-cost/no-cost upgrade to their existing sales programs and product offerings to their existing
and new-potential (outsourcing) customer base. High Gross Margins provided by DigiTar makes the Channel decision to add
DigiTar to the profit line, without the requirement for capital expanse, an easy one to support.
VAD:
DigiTar is targeting to have one Value Added Distributor per Territory to develop the Local Markey quickly: with,

A Strong established access to Value Added Reseller base

A Strong established contacts to ISPs and Telcos

Local Channel Management

Local Account Management

The Ability to influence local decision makers

Local PR
VAR:
DigiTar’s target is to have the most active and innovative Value Added Reseller: who already,

Understands how to promote and sell new services

Is Established in the IT-Security business

Has strong access to Enterprise Market

Has strong access to local Government sector(s)
Sample Client List (By Geography and Business Type):
Sample Clients Legend:
USA/Canada
Japan/Asia
Europe
Retail
Universities & Schools
Law Firms
Services
Professional
lylepearson.com
controller.stanford.edu
angstman.com
a-c-accounting.com
agsgps.com
miracle-earcenter.com
evolve.stanford.edu
cosholaw.com
actionbarricade.com
amelio.com
mollyo.biz
family.stanford.edu
daviesmoore.com
adv-bus-networks.com
clearwaterrei.com
olvcaldwell.org
lanecc.edu
goicoechealaw.com
bsmwireless.com
daviesrourke.com
statpads.com
law.stanford.edu
himbergerlaw.com
circlecenergy.com
dct-web.co.jp
tatesrents.com
ml.sakushin-u.ac.jp
jbhhlaw.com
citent.com
digitar-japan.com
wingscenter.com
purchasing.stanford.edu
jesutton.com
datatelco.com
eaglesconsulting.com
rcdb.org
technology.stanford.edu
mgslegal.com
djautotransport.com
eberle.com
wlu.edu
richardsonandoleary.com
dukephotos.com
explorationservice.com
technologylawgroup.com
foto-grafics.com
frontlinegeo.com
Medical
landelapharma.com
Churches
kimvorsemd.com
catholicidaho.org
treasurevalleylawyers.com
ir-m.com
geosourceenergy.net
landofchaos.com
familyradio.org
zarianmidgley.com
m2mcomm.com
gtgcpa.com
mluquemd.com
risenchristboise.org
milliganevents.com
lktechinc.com
valleywidehealth.com
sacredheartboise.org
mk-cpa.net
mathieucomputer.net
Real Estate
Manufacturing
stmarksboise.org
cradlepoint.com
plan-it-services.de
notes.corpinfo.com
colliersidaho.net
stmarksschool.pvt.k12.id.us
cspboise.com
propertybyowner.com
onspirix.com
deltasquare.com
stmarys-boise.org
ef5.nl
quantumpointtech.com
pimtx.com
ettore.com
stisurveys.com
pontiscapital.at
gvcrouchmerc.com
Government
hscc.org
ccidaho.org
flashelement.com
support4domino.com
rmeinc.net
spectra.com
ci.healdsburg.ca.us
hydeelectric.net
thesolution.at
rprwyatt.com
Construction
superiorec.net
idahocenter.com
interstate-electric.com
woodriverlandtrust.org
iddk.com
wyattaerospace.com
brightoncorp.com
stackle.com
syringabank.com
brandroots.com
idhfa.org
thunderspring.com
cfauscorp.com
thaarchitecture.com
vanauker.com
nhcgov.com
olrboise.org
esiconstruction.com
virtualitidaho.com
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
35
CONFIDENTIAL
Strategic Alliances
Establishing key business development relationships with the leading IT market suppliers, SUN Microsystems, Inc. and IBM
Corporation has allowed DigiTar to market worldwide with the partnership advantages that include platinum level systems and
services support in more than 200 countries by trained in-country personnel of SUN and IBM. In addition, DigiTar’s
Partnership status provides advanced access to in-country marketing teams along with joint sales programs that complement
SUN and IBM products. [See the following News Releases]
DIGITAR ACHIEVES ENHANCED STATUS AS A PRINCIPLE PARTNER WITH SUN
MICROSYSTEMS ADVANTAGE PARTNER PROGRAM
Boise, ID (July 15, 2006) – DigiTar AG. (DTAR), a leading IT outsource provider of Security as a Service
(SaaS) and automated Web Content processing solutions, today announced it has been designated by SUN
Microsystems as a “Principal Partner” with SUN Microsystems Advantage Partner program.
SUN Microsystems Advantage Partner program delivers a wealth of offerings and options to DigiTar, in five key
areas:
MARKETING TOOLS: Broadens the reach and increases the efficiency and cost-effectiveness of DigiTar’s
marketing efforts by leveraging Sun’s considerable experience, resources, and market influence.
SALES ENGAGEMENT: Takes DigiTar’s go-to-market efforts to the next level by tapping into Sun’s sales
organization, with privileged access to expertise across the organization and expanded teaming opportunities with
other program participants.
TECHNOLOGY AND PRODUCTS: Cuts the cost and complexity of designing, developing, and deploying DigiTar
SaaS eMessaging and Web 2.0 Services—to shorten time to market and increase the return on investment.
EDUCATION AND INFORMATION: Build technology competence with Sun products and stay abreast of the
latest tools, technologies, and topics of interest in DigiTar’s industry—so as to stay a step ahead of competitors.
PARTNER INITIATIVES: Participate in Sun partner initiatives focused around a specific technology and find
new ways to expand DigiTar business opportunities and revenue streams.
DigiTar’ state-of-the-art, SENTINELMessaging™ and SENTINELComplete™ Enterprise technology provides
Fortune 500 and Fortune 1000 clients unprecedented levels of protection, and allows its clients to maintain
24x7x365 access to their mission-critical systems and cyber communications data without any planned or
unplanned interruptions.
“DigiTar understands that even a few minutes of downtime within a services provider can have a catastrophic
effect on a company’s business operations, corporate reputation, and ultimately, its bottom line,” said Dale
Williams, President and CEO of DigiTar.
“DigiTar has built a world-class eMessaging infrastructure that, combined with a wealth of
industry experience and expertise from SUN, ensures that DigiTar clients always have the
highest level of turn-key CyberSec solution processing performance and reliability necessary to
compete in today’s global marketplace.”
About DigiTar
DigiTar AG. (DTAR) provides outsourced eMessaging and cyber security processing services for world-class IT
communications solutions that accommodate the business needs of large and small, data-intensive enterprise
companies. DigiTar operates a highly reliable and secure Enterprise Data Center facilities that offer “five nines”
(99.999%) availability and highly scalable processing systems in conjunction with managed IT solutions that
secure Fortune 1000 companies’ mission-critical, threat & disaster proof cyber messaging and communications.
DigiTar is a SUN Microsystems Advantage - Principal Partner, which assures DigiTar clients of
leading edge innovation, performance, reliability and support. As a result, DigiTar solutions enable clients to
reduce their operating costs and focus on their core competencies.
For more information about DigiTar, contact www.digitar.com.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
36
CONFIDENTIAL
From: [email protected]
Sent: Thu 10/12/2006 1:36 PM
To: DigiTar AG.
Subject: Advanced level membership
At this time we’re pleased to inform you that your customer services technology to IBM Lotus
Notes and Domino applications software products was approved for and has qualified you for
the following:
"DigiTar AG. - IBM Advanced Business Partner"
Achieving PartnerWorld Advanced level entitles you to use the IBM Business Partner emblem
and the designation "IBM Advanced Business Partner". Use of this emblem endorses your
relationship with IBM in the minds of your clients and can reinforce their decision to do
business with you. The IBM Business Partner emblem and usage guidelines can be found at:
http://ibm.com/partnerworld/pwhome.nsf/weblook/emblem_welcome.html
In addition, your company is now entitled to a powerful set of marketing, sales, and technical
resources specific to the industries and markets you serve through the PartnerWorld Industry
Networks. Please visit http://ibm.com/partnerworld/industrynetworks to learn more. If you are
interested in a complete listing of all PartnerWorld benefits, they can be found at:
https://ibm.com/partnerworld/mem/manage/mem_ben.html
Congratulations!
Thank you for your interest in IBM. If you have questions regarding PartnerWorld or this email, please contact PartnerWorld Contact Services at:
http://ibm.com/partnerworld/pwhome.nsf/weblook/cpw_index.html
Sincerely,
The PartnerWorld ISV team
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
37
CONFIDENTIAL
Case Studies and letters of Customer endorsement and recommendations:
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
38
CONFIDENTIAL
David Bartlett – Executive Vice President Operations
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
39
CONFIDENTIAL
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
40
CONFIDENTIAL
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
41
CONFIDENTIAL
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
42
CONFIDENTIAL
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
43
CONFIDENTIAL
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
44
CONFIDENTIAL
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
45
CONFIDENTIAL
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
46
CONFIDENTIAL
2006 DigiTar, All Rights Reserved
DigiTar™ case study series - Sentinel Messaging™
RiskSecure, LLC
April 2006
RiskSecure provides a range of cyber security consulting services, including compliance audits, round-theclock vulnerability scanning as well as in-depth security training. Their clients range from small-sized
businesses to companies in the Fortune 50. Through their commitment to improving security and reducing
risk, RiskSecure has established themselves as a world-class provider for security services.
About Troy Taylor
Troy has worked for Fortune 50 clients in roles such as Divisional Information Security Manager for HewlettPackard and has over fifteen years of IT experience. He has started, run and sold several start ups and holds
degrees in Nuclear Physics and an MBA.
The Problem: Spam Overload
To say RiskSecure had a problem with spam might be the understatement of the year. Having collected
many “old growth” domains from the companies that merged to form RiskSecure, the company was a target
for armies of spammers. Many thousands of spams would hit its mailboxes every day.
For a long time, RiskSecure employed the Open-Source Software program SpamAssassin to mitigate the
problem. However, the spammers seemed to always be one-step ahead. The volume of spam processing
kept increasing to the point where hundreds of spams where slipping past SpamAssassin every day.
Additional layers of spam filtering were implemented and eventually even those failed. Something needed to
be done before email became a useless tool. RiskSecure needed a solution to fix the problem and it needed
to happen fast.
The Solution: Sentinel Messaging™
As a longtime information security insider, RiskSecure CEO Troy Taylor was familiar with the many products
and
approaches on the market. So when looking for a new messaging security solution, he was skeptical that he
would find anything that performed better than SpamAssassin.
“To be honest, when I first heard about DigiTar’s Sentinel Messaging™ solution, I had my doubts that it
would perform any better than SpamAssassin. In fact, I was fairly sure they would not get even close to 99%
accuracy. So, RiskSecure was understandably thrilled at the results Sentinel Messaging™ produced within
the first two weeks. We’re consistently seeing accuracies in the range of 99.2% to 99.7%. It’s truly amazing.”
RiskSecure has also enjoyed many unanticipated ancillary benefits of using Sentinel Messaging™:
“DigiTar has reduced the amount of mail hitting RiskSecure’s servers by over 75%. Thus, we can spend
more time working and less time on manually filtering email and save a tremendous amount of time
upgrading our mail infrastructure.
Frankly, the biggest benefit has been DigiTar’s support and service. Anytime RiskSecure has had a question
or needed
assistance, DigiTar worked diligently to address our concerns. The turnaround time has been fantastic.
Refreshingly, this just seems to be the normal way DigiTar runs their business.
Having a technical background, I am used to managing infrastructure in-house, and I was hesitant to give up
control of such a critical part of our business. Since RiskSecure is a security services company, any failure
could be catastrophic to our reputation. DigiTar has consistently delivered on our reliability expectations
and RiskSecure’s ability to handle previously insurmountable mountains of spam. I personally believe their
solution is among the best on the market and certainly the most affordable.
We would without hesitation recommend Sentinel Messaging™ to any of RiskSecure’s customers, including
the Fortune 50 clients. DigiTar has made a believer out of RiskSecure as a company and me personally.”
Moving forward, RiskSecure states they look forward to taking advantage of additional Sentinel Messaging™
features
as their business grows and their disaster recovery and messaging compliance needs expand. The fact that
this will
be a zero hassle, instant deployment event, makes their choice particularly comforting.
DigiTar's mission is to align and elucidate the world's messaging. Our services enhance existing messaging
systems with next generation feature sets, through state-of-the-art technology development. Core to our
philosophy is the commitment that next-generation enhancements should reduce not add to the burden of
those systems. We seek zero configuration principles across our entire service line.
To find out how you can benefit as RiskSecure has, please contact DigiTar Sales via
[email protected].
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
47
CONFIDENTIAL
DigiTar™ case study series - Sentinel Messaging™
Stanford Law School
March 2007
The Problem: Processing Overload
Spam was making Bao Tran’s life miserable. As the Technical Services Manager at Stanford Law School
(SLS), availability of his IBM Domino cluster was keeping him up at night. SLS’ server-based anti-spam
and anti-virus packages were buckling under the torrents of e-mail thrown at them…and taking the
Domino cluster down. Further complicating matters, was the hands-off approach the security software
vendors took to addressing Bao’s growing problem.
As a result, Bao started looking for an alternative solution. One that would both increase the accuracy
and effectiveness of SLS’ mail security, while offloading the processing burden. When he chose DigiTar’s
Sentinel Messaging™ service for its superior performance, low administrative overhead and service
commitment, he did not realize how quickly his choice would pay off. While Sentinel Messaging™ had
been chosen by SLS, full deployment was awaiting the completion of a metered activation plan.
Without warning, swarms of e-mail with 7MB attachments started hitting the SLS Domino cluster.
Someone had forwarded a 7MB e-mail to a mailing list subscribed to by many faculty and staff, and it
was grinding the cluster to a halt. So when the massive e-mail storm hit, each server in the Domino
cluster started to grind to halt under spam and virus scanning load.
The Solution: DigiTar Sentinel Messaging™
DigiTar™ was immediately ready to help. After discussion with DigiTar™ messaging engineers, Bao
quickly obtained the necessary SLS approvals to authorize a full Sentinel Messaging™ deployment:
“We didn’t know how to get the situation under control. Our old spam and virus scanning software
was crushing our Domino cluster, and professors were starting to notice that their e-mail was being
heavily delayed. I called DigiTar to find out how fast they could stand up a full-deployment…hoping we
could remove the anti-spam and anti-virus software that was killing us. Imagine my amazement when
they said they could be ready to go in 60 minutes. Normally, a major change like this would have
required weeks of preparation and careful planning.
Without Sentinel Messaging™’s amazing auto-provisioning and veriSYNC™ features, making a move
so quickly would have been unthinkable…even given our dire situation. With any other service, just
getting an accurate user list together would have taken days. To get Sentinel Messaging™ fully
configured and running didn’t require any more effort than saying ‘Yes’.
More importantly, DigiTar™ treated Stanford Law’s problem as if it was DigiTar’s problem from the
minute I called. They had a signed purchase order from us…they didn’t have to go the extra mile.”
Within minutes of activating all of Stanford Law School’s users, Sentinel Messaging™ completely
shouldered the burden of the unexpected Denial-of-Service:
“The SLS Domino cluster returned to stability within minutes of activating Sentinel Messaging™.
Without the amazing service and support we received from the DigiTar™ staff, we could not have
successfully weathered this incident.
Throughout our trial, and now production use, DigiTar has consistently provided a level of service and
concern for our organization that we have never before experienced in IT. You can’t buy that kind of
relationship. ”
Source: Mr. Bao Tran - Technical Services Manager, Stanford Law School; Palo Alto CA
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
48
CONFIDENTIAL
DigiTar™ case study series - Sentinel Messaging™
The Problem: Poor Service & Spam Avalanche
December 2006
Colliers International - Boise had a major issue. “Our Office was getting overloaded with spam
on our Exchange server and so we moved to a messaging security service to address the issue.
Unfortunately, the service’s message classification accuracy wasn’t much better, and it also
introduced up to 4-hour delays to our receiving mail. Further, the service wasn’t able to resolve the
fact that many critical messages didn’t arrive at all.”
“In a series of efforts to fix our problems, Colliers first tried GFI MailEssentials anti-spam software
on our Exchange server, which was ineffective against the tide of spam we faced daily. As a result,
we then tried the SecureTide™ messaging security service from AppRiver®. Rather than a cleaner
inbox, Colliers now tolerated mail delays of up to 4 hours, and sometimes mail that simply didn’t
arrive at all. AppRiver’s response of “not our problem” was crippling Colliers from conducting
millions of dollars of business on a daily basis. Fed up with the “not our problem” attitude, Colliers
went looking for a better answer…and a better service relationship.”
The Solution: DigiTar Sentinel Messaging™
Colliers CFO Elaine Holm’s biggest concern was the mail they were missing: “Clients would send emails that just wouldn’t arrive. Best case, it would take a couple of hours for the mail that did
arrive to get to us. In our business, getting mail on time can mean the difference between making a
million dollar deal and getting shutout. We were just hamstrung.”
“Every time we’d talk with AppRiver it was the same story…'we don’t know what the issue is, the
mail delays are normal, ….not our problem'. They didn’t expend any effort to help us resolve the
problems. It was tempting to laugh at our IT solutions provider when they suggested another
service vendor - DigiTar. Needless to say I was stunned at the level of service we received with
DigiTar’s Sentinel Messaging™. It was a night and day difference from AppRiver.”
“From day one with DigiTar, when problems of missing mail persisted, DigiTar assumed the issues
were their problems. They went above and beyond their own systems, spending days tracking
down the issue with our clients’ IT departments. They finally identified the problem as being
caused by our former DNS provider Time Warner Telecom. Even when the problem was positively
identified as not being DigiTar’s responsibility, DigiTar worked with Time Warner on our behalf to
make sure Time Warner resolved the issue. DigiTar made Time Warner’s problem their
responsibility and kept us informed. We didn’t buy a special support contract…this was just
DigiTar’s standard level of service.”
Colliers International – Boise, since then has enjoyed many additional benefits of using DigiTar
Sentinel Messaging™ Services: “The most immediate effect of using Sentinel Messaging™ was that
the mail delays disappeared. Even before Time Warner resolved our DNS issue, our mail started
arriving within seconds of our clients sending it. No longer did we wait 4 hours for an e-mail like
we did under AppRiver™. Also, our spam deluge problem disappeared.”
“If your business relies on e-mail, we can’t recommend DigiTar Sentinel Messaging™ highly
enough. Our relationship is what DigiTar values the most. In addition to DigiTar’s continued velvet
glove service, Colliers is looking forward to upcoming features of Sentinel Messaging™ as our
business grows and our messaging needs become more sophisticated.”
Source: Ms. Elaine Holm - Chief Financial Officer Colliers International – Boise
Operations
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
49
CONFIDENTIAL
Recent News Articles: Cyber Security Trends & Challenges
Report: “Security” Tops CIOs' IT Investment List
By Scott Campbell, ChannelWeb 1:35 PM EDT Wed.
Apr. 15, 2009
Seventy percent of CIOs said they will continue to invest in IT initiatives over the next 12 months,
according to a survey by Robert Half Technology.
Information security was chosen as the top technology, with 43 percent of the 1,400 respondents
expecting to invest in that area. That was followed by virtualization (28 percent) and data center
efficiency (27 percent).
"Although times are lean, many companies are finding that they can't afford to postpone IT
investments that lead to increased security, efficiencies or revenues," said Dave Willmer, executive
director of Robert Half Technology, in a statement. "Organizations also are trying to make sure
they are prepared for growth when conditions improve, and enhancing their IT infrastructure is
part of that process."
CIOs in the financial services and transportation sectors were most likely to cite information
security as an investment in the next 12 months, with 59 percent and 58 percent of respondents,
respectively, citing that technology. Other technologies rounding out the top five investments for
CIOs are VoIP (26 percent) and Software-as-a-Service (26 percent).
"Subscribing to SaaS, rather than purchasing software licenses, is a particularly attractive option
for businesses with tight IT budgets," according to Robert Half Technology. "
Other IT initiatives for which CIOs are planning less investment include green IT (20 percent),
business intelligence (19 percent), and social networking (18 percent).
Glenn Leatherwood, director of IT architecture at Valmont Industries, Valley, Neb., said the
results didn't surprise him. "I would agree that information security is a big focal point right
now.”
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
50
CONFIDENTIAL
MARKET BULLETIN:
CyberSec is at the top of the list of issues deemed important (87 percent) in
2009.
Forrester 2009 Security Trends
Despite Economy, Security Spending To Increase In 2009
Data protection, identity management to get increasing attention in new year's budgets, Forrester
says
By Tim Wilson
Despite a troubled economy, both large and small enterprises are poised to spend a higher percentage of
their IT budgets on security in 2009, a major research firm said today.
According to new reports on IT security trends in large enterprises and small and midsize businesses (SMBs)
released today by Forrester Research, the pressure to cut back on IT spending is not slowing the trend
toward increased security spending.
"Security is getting a larger slice of the IT budget pie," says Forrester analyst Jonathan Penn in the
enterprise study. "Firms are devoting 11.7 percent of their company's IT operating budget to IT security in
2008 -- contrasted with 7.2 percent in 2007 -- and plan to continue nudging up IT security budgets in 2009
to 12.6 percent of the IT operating budget." Security will also account for a higher percentage of budget
allocations for new initiatives this year, going from 17.7 percent in 2008 to 18.5 percent in 2009, the report
says.
Similar increases are expected in smaller companies, Penn says in the SMB report. "SMBs devoted 9.1
percent of their companies' IT operating budget to IT security in 2008 -- down from 9.4 percent in 2007 -but they have plans to bring IT security budgets back up to 10.1 percent in 2009," the report says.
"Allocation of budget for new initiatives mirrors this trend, with security going from 14.9 percent in 2008 to
15.9 percent in 2009. No big swings of the budget axe here."
What are the drivers behind the spending increases? "Protecting the organization's information assets is the
top issue facing security programs," the enterprise report states. "Data security (90 percent) is most often
cited as an "important" or "very important" issue for IT security organizations, followed by application
security (86 percent) and business continuity/disaster recovery (84 percent). Meanwhile, areas like threat
management (81 percent) and regulatory compliance (80 percent) are cited less frequently."
Among SMBs, data security is at the top of the list of issues deemed important (87 percent), with
application security close behind (80 percent), Forrester says.
Among technologies, outsourced security services, data loss prevention, and identity and access
management are at the top of the list to receive more attention in 2009.
"Managed security services are growing, driven by skill needs and cost savings," the enterprise
report says.
"The two top drivers among firms for using a managed security service provider are the
demand for a specialized skill set (29 percent) and the need to reduce costs (28 percent).
While email/Web content filtering is the most popular managed security service today, the
greatest promise for [managed security services] growth in the coming 12 months is in
vulnerability assessment and in host event log monitoring and management."
Pasted from <http://www.darkreading.com/security/management/showArticle.jhtml?articleID=212700661>
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
51
CONFIDENTIAL
Web 2.0 brings set of security concerns
By Tom Sullivan
Security: As companies continue adopting new Web 2.0 technologies including online collaboration, social networking, file sharing, a new report from
Forrester Research found that Web 2.0 security concerns abound.
Web 2.0 security concerns abound
Filed under: Security
A lack of comprehensive security tools designed to stop Web-based threats continues to be a problem among businesses, according to a new survey
published by Forrester Research and Secure Computing on Monday
According to the study -- which was based on interviews conducted by Forrester with roughly 150 IT pros -- companies of all sizes continue to adopt a
larger number of Web-based applications, in particular so-called Web 2.0 technologies such as online collaboration and file-sharing tools, yet few have
done anything to protect themselves against the growing volume of attacks that seek to piggyback on the systems.
First off, even though most companies (97 percent) consider themselves prepared for malware threats, a majority (79 percent) admit that they are still
falling prey to attacks on a "frequent basis," with a relatively large number (68 percent) conceding that they have "room for improvement."
At the same time, companies clearly recognize the potential for Web 2.0 applications to become channels through which they might have sensitive or
valuable data walk out the proverbial door. Roughly 92 percent of the respondents said that outbound data leakage prevention (DLP) is a part of their
Web-filtering strategy, with 58 percent ranking it as an "extremely important" business concern.
In terms of aligning their defenses, companies seem less responsive. Forrester said that "most" enterprises are still dependent on security tools
designed to keep traditional attacks at bay, while few have made the move to begin defending against newer threats.
Overall, only 33 percent of those interviewed for the study said that they have data leakage prevention capabilities in place today, while 57 percent of
those surveyed indicated a belief that restricting access to social networking and rich media sites could "visibly increase" employee productivity.
"We have found that most companies that have implemented any kind of Web protection have only installed URL filtering and signature scanning,"
Chenxi Wang, a Forrester researcher involved with the study said in a report summary. "Malware writers are now using the Web as a primary vehicle to
propagate a plethora of new threats undeterred by traditional security means. The need for more effective Web protection has never been greater."
Among the recommendations offered to companies in the report to help close the apparent gap:
-Employ new technologies that do a better job handling Web 2.0 threats, including reputation services, blended attack protection, behavior-monitoring
tools, outbound content control systems and applications-usage controls.
Pasted from <http://weblog.infoworld.com/zeroday/archives/2007/10/web_20_security.html>
Spammers Giving Up?
By Betsy Schiffman
Bill Gates was wildly optimistic when he said in 2004 that the problem of spam would be "solved" by 2006. The volume of junk e-mail transmitted
worldwide is still enormous. But a remarkable trend is underfoot, according to Brad Taylor, a staff software engineer at Google: The number of spam
attempts -- that is, the number of junk messages sent out by spammers -- is flat for the first time in years. Other experts disagree with Google, pointing
out that overall spam attempts continue to rise. By most estimates, tens of billions of spam messages are sent daily.
Chenxi Wang, an analyst at Forrester Research, scoffs at the idea that spam attempts could be on the decline.
"I'm seeing that the overall trend is up," Wang says. "We're not seeing a drastic increase, though. And we're also seeing an increase of targeted spam
instead of blanket spam that hits everybody in a large population. Today, for instance, you see spam messages on saving (on) prescription drugs
targeted to seniors."
For its part, Yahoo, too, says the overall amount of spam transmitted is on the rise.
Regardless of the overall spam attempts, David Daniels, vice president of Jupiter Research, predicts the number of spam messages that actually reach
a typical inbox will remain roughly flat over the next three years. And for most people, that's what really matters.
"We're forecasting that the number of spam messages that annually reach the average inbox will hit 4,351 in 2007. For 2010, we think that number will
essentially be flat at 4,403. The growth will be very, very small," Daniels says.
New anti-spam technologies are also always under development, and there are new anti-spam services and technologies becoming available to
consumers and enterprises
It's by no means a perfect system, though. And spammers are, if nothing else, persistent.
In a bizarre twist, Daniels thinks that instead of receiving spam offers from penny-stock pushers, mailboxes will increasingly be filled with marketing
messages that we choose to receive, such as promotional e-mails from a favorite clothing store or a bank. He thinks the average number of messages
from marketers that individuals receive annually will grow from 2,715 in 2007 to 3,335 in 2010.
"We expect people to spend as much time on e-mail as they have, but we think people will receive more e-mail from legitimate marketers. So there will
be more competition to get consumers’ attention in the inbox, but it will be more like competition between The Gap and J.C. Penney as opposed to The
Gap and a Viagra salesman."
Pasted from <http://www.wired.com/print/techbiz/it/news/2007/11/google_spam>
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
52
CONFIDENTIAL
WHITE PAPER - Web Security SaaS: The Next Generation of Web Security
April 2008
IDC OPINION
The demand for more comprehensive Web security solutions has been fueled by the increasing sophistication of
Web-based threats that reach far beyond productivity, bandwidth, and liability issues. The Web has become the
new threat vector of choice for hackers and cybercriminals to distribute malware and perpetrate identity theft,
financial fraud, and corporate espionage.
As most organizations struggle to be protected against traditional email-borne malware, the Web has become an
added burden as an additional latest target for hackers to launch various types of malware attacks. As a growing
number of Web 2.0 applications make their way into the enterprise, they bring with them even more security
concerns and attack vectors. A recent IDC study found that two-thirds of organizations are currently using at least
one Web 2.0 application (source: Web 2.0 Applications Are Already in the Enterprise: Key Findings from IDC's
AppStats Survey, IDC #208944, October 2007).
Organizations of all sizes are trying to combat the problem with a multilayered defense. However, the resources
required to manage multiple security products can often overwhelm an IT department in the enterprise business
environment irrespective of size. Many SMB organizations lack the in-house capabilities to keep up with the
evolving threat landscape. These factors are driving the growing interest in security as a service (SaaS)
protection. The adoption of SaaS in the messaging security market has grown explosively over the past few
years. IDC believes many SMB organizations will leverage the same SaaS benefits to address their Web security
needs as well. In fact, a recent IDC survey found that Web security SaaS has the highest planned adoption rate
(approximately 14%) over the next 18 months in business environments.
Above the Clouds: A Berkeley View of Cloud Computing
Electrical Engineering and Computer Sciences-University of California at Berkeley
Technical Report No. UCB/EECS-2009-28 http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
February 10, 2009
Executive Summary
Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the
IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and
purchased. Developers with innovative ideas for new Internet services no longer require the large capital outlays
in hardware to deploy their service or the human expense to operate it. They need not be concerned about
overprovisioning for a service whose popularity does not meet their predictions, thus wasting costly resources, or
underprovisioning for one that becomes wildly popular, thus missing potential customers and revenue. Moreover,
companies with large batch-oriented tasks can get results as quickly as their programs can scale, since using
1000 servers for one hour costs no more than using one server for 1000 hours. This elasticity of resources,
without paying a premium for large scale, is unprecedented in the history of IT.
Cloud Computing refers to both the applications delivered as services over the Internet and the hardware and
systems software in the datacenters that provide those services. The services themselves have long been
referred to as Software as a Service (SaaS). The datacenter hardware and software is what we will call a Cloud.
Thus, Cloud Computing is the sum of SaaS and Utility Computing. People can be users or providers of SaaS, or
users or providers of Utility Computing. We focus on SaaS Providers (Cloud Users) and Cloud Providers, which
have received less attention than SaaS Users.
From a hardware point of view, three aspects are new in Cloud Computing.
1. The benefit of infinite computing resources available on demand, thereby eliminating the need for Cloud
Computing
users to plan far ahead for provisioning.
2. The elimination of an up-front commitment by Cloud users, thereby allowing companies to start small and
increase hardware resources only when there is an increase in their needs.
3. The ability to pay for use of computing resources on a short-term basis as needed (e.g., processors by the hour
and storage by the day) and release them as needed, thereby rewarding conservation by letting machines and
storage go when they are no longer useful.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
53
CONFIDENTIAL
The following presents excerpts of an eBRIEFING paper published by COMPUTERWORLD - September 2008
COMPUTERWORLD - September 2008
Cyber Security as a Service
MakesSense Today
Trends of the Future: Outsourced Cyber Security Service eliminates
the agony of email and Web threats management.
Key reasons to Adopt SaaS Security
Corporate IT teams are waging a significant security battle on two fronts these days: stopping attacks via the Web and through email. They
are tirelessly trying to protect their networks against known and unknown viruses, spyware and phishing attacks. However, the more
complex these threats become, the more infrastructure companies have to bring in-house, sending capital expenditures through the roof.
It’s a battle that Aaron Zuccolin, manager of information systems at the Canadian law firm Watson Goepel Maledy LLP, estimates that
80% to 90% of his Vancouver, B.C.-based firm’s email is spam.
[Enterprise security] is a fool’s game to manage in-house because you can spend thousands of dollars on hardware, software and personnel and still not lower your risk.”
Aaron Zuccolin - MANAGER of INFORMATION SYSTEMS, WATSON GOEPEL MALEDY LLP
“Trying to manage that volume day-to-day in-house would be ridiculous,” he says. “Enterprise security is highly variable in terms of the
threats you have to deal with, the solutions that are out there to deal with them, and the complexity you want to endure as you scale.
Instead, like many of his peers today, Zuccolin has opted for a security software-as-a-service (SaaS) strategy, a software application
delivery model where applications are hosted on the Internet and clients pay for usage rather than infrastructure and licensing. By
offloading his email security to a provider, Zuccolin says he can focus his team on developing policies and procedures that mitigate the
overall data privacy risk.
Chenxi Wang, principal analyst at Forrester Research Inc., says that SaaS offerings will become more prevalent over the next few years as
services continue to mature and organizations see SaaS as viable for more than just legacy business applications. “Companies are getting
more comfortable with SaaS in general—it’s becoming more of a norm. They’re realizing the benefit of outsourcing commoditized solutions, like security, to specialists so they can stay focused on their core business,” she says.
In fact, companies are seeing drawbacks to owning and managing their own security infrastructure. For instance, on-premise security
software and appliances can create a single point of failure. They can also be hard to scale as threats increase, slow to respond to new
threats, and a drain on internal IT resources.
[Companies] are realizing the benefit of out-sourcing commoditized solutions, like security, to specialists so they can stay
focused on their core business.”
CHENXI WANG - PRINCIPAL ANALYST, FORRESTER RESEARCH INC
Security SaaS solves Benefits of Outsourcing Security… and/or why SaaS makes sense:
Provides improved manageability In most organizations today, security revolves around building and managing either hardware and
software or appliances. IT teams must spend a major portion of their time focusing on licensing, updates, performance and availability for a
host of security systems strewn about the enterprise. They also struggle with implementation and setup costs, as well as compatibility
issues. This leaves little time for managing what’s most important—the revenue oriented business processes that enhance corporate growth,
profits and efficiency of the core business.
With SaaS, companies can eliminate the burden of managing infrastructure and focus on developing and enforcing streamlined policies.
They can also direct responses to overall threats via a single console, rather than having to tweak configurations at distributed locations.
Zuccolin says this holistic view has made it easier and more effective for him to combat spam, spyware, virus and phishing threats.
“We’re more strategic now. We’ve gotten rid of the mundane work so we can focus on our overall security policies such as lowering our
risk and disaster recovery,” Zuccolin says; “in fact, we can focus more on business analytics and problem solving.”
Features guaranteed SLAs One of the biggest benefits to SaaS is knowing that the provider has promised to uphold a service-level
agreement (SLA). SLAs traditionally guarantee a higher level of performance, availability, uptime and security than IT teams are able to
deliver in-house. Most SLAs offer a way for companies to access reports that feature details on threat mitigation, throughput and responsetime performance, as well as other key metrics.
SLAs also offer a clear understanding of the different levels of support customers will receive based on the threat priority level. “With
SLAs, you put escalation procedures in place so you know what to expect when an abnormal situation happens. You also know that things
will be taken care of, and when they’re not, who to call,” Wang says.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
54
CONFIDENTIAL
Affords flexibility and scalability Trying to keep up with the demands of protecting email and Web security can be impossible—literally.
Consider that in most cases, IT teams must physically build out their networks to handle corporate growth. And as the network expands, so
does the need, and additional cost, for IT staff to manage it. SaaS enables IT teams to easily and transparently scale security to match
business needs. For instance, they can quickly add a group of users that resulted from a corporate merger or beef up scanning to protect the
organization from unwanted Web content. They can also make sure that mobile users have the same security on-and off- network—a
difficult challenge with on-premise solutions.
Provides high-quality security by Full-Time security experts It would take a larger IT team, than most companies have, to continually
address the security challenges organizations face today, according to Wang. As an example, she points to the fact that 711,912 new
malware threats were reported in 2007, which translates into 1,950 new malware attacks each day.
She adds that the Web is becoming increasingly more dangerous, with growing numbers of search queries resulting in exposure to
malicious attack URL sites. To adequately combat most of these threats, IT teams need immediate and detailed knowledge of emerging
attack vectors. One or two staff members devoted part-time to security can’t possibly detect and mitigate these risks quickly enough to
ward off serious damage.
Wang says that less than half of respondents to a 2007 Forrester survey reported using any kind of real-time
protection such as behavior-based detection, outbound content protection, heuristics detection, content
inspection, reputation filters or URL filtering.
Integrated Threat Management With SaaS, companies don’t have to be security experts. Instead, they can depend on the global based
expertise of a provider that is constantly monitoring and combating new threats to the network. Using signature, behavior and heuristic
analysis in tandem with access and policy controls, a SaaS provider can quickly thwart spam, virus, spyware and phishing attacks within
email as well as detect inappropriate content and malware on Web sites that users visit. And since this protection is in the cloud, CyberSec
providers can eliminate the threat before it impacts the network. Thereby, companies avoid sluggish system performance, reduced
employee productivity and other business disruptions that spam causes. Cloud-based protection also gives providers a holistic view of potential threats so they know how to protect customers from attacks that have affected other organizations.
Zuccolin says security SaaS gives him immediate access to updates without having the typical delay required to download and test a patch.
He considers it the fastest response to zero-day threats.
Reduces bandwidth requirements and improves network performance SaaS is not only a cost-saver, but also a resource-saver, according
to Wang. She says that offloading email and Web security takes a lot of pressure off the enterprise to handle traffic generated by spam. For
instance, if a company builds its network to support 15 million inbound email messages per day and 14 million are purely junk, that’s a lot
of money wasted trying to deal with the volume on-premise. “After you move to an in-the-cloud offering, you only need to support a million messages per day on your own network so bandwidth consumption is drastically reduced,” she says. By ridding the network of that
extra burden, companies can also see a boost in performance along with real cost savings.
SaaS provides defense-in-depth security Security experts recommend that companies have a multilayered approach to security, but buying
and managing the infrastructure required to do that can be cost-prohibitive.
Security SaaS enables IT teams to have a layered approach without all the headaches. Web security SaaS can handle fast processing of
connection-level filtering and provide an on-premise solution delivering more in-depth content analysis. That first layer lightens the load
the on-premise solution has to inspect, enhancing the network’s speed and overall security.
Zuccolin says he uses his email security SaaS as an additional layer to ensure outbound email is free of unwanted content and intellectual
property so his company is seen as a good corporate citizen.
Enhances cost savings surrounding security One of the biggest issues for many organizations is determining if security SaaS adds to the
bottom line. As mentioned previously, by eliminating the need for infrastructure and the personnel to manage that infrastructure, SaaS
offers immediate savings. In a 2007 study, market research firm Gartner Inc. found that SaaS secure Web gateway solutions cost as much
as $40 less per user than appliances. Companies realize these savings by having a subscription model with predictable costs.
Companies can also see cost benefits from needing less storage and bandwidth since a lot of spam and other false content is handled offnetwork. SaaS lowers help desk costs as well because IT teams spend less time fixing damage caused by spam, viruses, malware and other
attacks.
By using a comprehensive security SaaS solution, organizations can avoid the incurred costs of a data breach. A survey by the Ponemon
Institute LLC found that 74% of respondents reported a loss of customers, 59% faced potential litigation, 33% faced potential fines, and
32% experienced a decline in share value.
As these reasons prove, SaaS is definitely the best option for tackling even the toughest Web and email security challenges. Not only do IT
teams get to hand off routine security infrastructure tasks, but they also get instant and scalable access to top-notch security protection
across the entire organization.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
55
CONFIDENTIAL
DigiTar Technology Scaling & Financial Impact Plans:
Scaling is a function of load balancing ahead of, and after, each major operations phase of the overall processing operation (“Silo”– see
attached Silo overview on Page 8 above). This gives DigiTar’s architecture the ability to accept/add-in additional capability and capacity at any
phase that is becoming saturated without shutting down the operations nor requiring redesign of the process flow. With the addition of
distributed (locally or geographically) data centers, we establish “Back-Hauls” connectivity between the sites and share message loads on
multiple systems. The resource requirements increase as the number of customers increase.
The amalgamation of traffic from all customers is the peak load capacity requirements exhibited at each hour in the 24 hour processing day.
However, the global client base systemically spreads the peaks loads across multiple time zones so that the algebraic sum of all customers
traffic never occurs a “one time”. Rather, there are multiple peak points that occur when first the USA business is “awake” and then tapers off
to be replaced by Asia-Japan-India peaks which are subsequently replaced by European client traffic. After 24 hours, the process repeats
itself.
DigiTar supports a Global business market opportunity, currently from our primary data centers in the USA via Fiber Optic and Satellite
connectivity through cyber space routers that interconnect the bulk of the business markets. In the future, additional data centers in Europe,
Asia and the USA will be interconnected (via Back-hauls) so as to continue the “Designed-in” philosophy of infinite load balancing architecture.
This provides not only capacity as needed and dynamically on demand, but also delivers continuous uptime and reliability of service to the
customer regardless of his actual geographic location.
Globally, the latency of a message from India being processed in DigiTar’s USA facilities and returned to a recipient in India (traveling more
than 25,000 miles round trip) is less than 2 seconds worst case and typically averages 800mSec to 1300mSec including processing time at
DigiTar. This is equal to travelling around the world in approximately 1 second. But since the data is digital bits/bytes between computers,
and not voice between persons, a 1 to 2 second latency is not noticed nor offensive. In local regional processing, the latency averages 100300mSec from sender thru DigiTar and delivery to recipient.
The cost vs message processing rates graphs (shown below) assume a decline over time in ASP (average selling price/user) and the margins
are calculated based upon modeled production capacity resource assets applied, at a needed message rate for the peak loads anticipated,
plus the burden of personnel and corporate allocations associated with R&D, Marketing, Operations and G&A.
We believe DigiTar is uniquely positioned to support uninterrupted growth of the client base and scaling unequaled by the competition. We
also know DigiTar can process faster than the competition by several orders of magnitude.
“How do we know this?”
Message latency! Postini’s message latency in the USA, processing USA clients, averages 30 to 45 sec best case. Several DigiTar clients, in
particular Law Firms, dropped Postini after latencies of 30minutes occurred on a consistent basis.
“Why does this occur?”
Both Postini and MessageLabs use “fixed assignments” of clients to be processed on specific systems. If the assigned system is or becomes
loaded, everyone suffers a massive slow down in their messages. When a client complains about the latency, both Postini and MessageLabs
have to relocate the entire clients’ activity and storage elements to another system which more lightly loaded. This is a scheduled activity
(sometimes delayed several days) that occurs late at night when the traffic is small and the lost messages problem is minimal. Attorneys are
very impatient and DigiTar has heard many “unacceptable Latency” stories from new Law Firm clients who previously used Postini and
MessageLabs.
Lower latency per message means more messages processed on any given resource. More messages processed/sec means more revenue per
production resource assets applied. Hence the focus in the attached graphs on message rates as the key index of everything in this business.
Likewise, Cost per user is a function of the number of eMessages you can process at a time (Messages/Second). At DigiTar we have a very
detailed processing through-put simulation model which calculates the resources required in the processing “Silo” (Equipment, Bandwidth,
Software Support Licenses, People, and more) for a given processing rate planned. We developed this simulation model 3 years ago and keep
it up to date on a Qtrly basis. It changes primarily due to advances in component architecture hardware (SUN, Cisco, Juniper, Brocade, etc.)
and changes in fixed/variable costs such as facilities and Bandwidth utilization. The graphs are the output of a multi-rate-simulation analysis
completed just recently for the update business plan.
Cost per user is a function of the number of eMessages you can process at a time (Messages/Second). At DigiTar we have a very detailed
processing through-put simulation model which calculates the resources required in the processing “Silo” (Equipment, Bandwidth, Software
Support Licenses, People, and more) for a given processing rate planned. We developed this simulation model 3 years ago and keep it up to
date on a Qtrly basis. It changes primarily due to advances in component architecture hardware (SUN, Cisco, Juniper, Brocade, etc.) and
changes in fixed/variable costs such as facilities and Bandwidth utilization. The graphs are the output of a multi-rate-simulation analysis
completed just recently for the update business plan.
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
56
CONFIDENTIAL
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
57
CONFIDENTIAL
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8
58
CONFIDENTIAL
DigiTar AG www.digitar.eu +1.208.343.8520 USA +41.44.586.8520 Europe +81 (0) 3 5468 7373Japan
20090622 1.8