SlideShare a Scribd company logo
1 of 12
Nick Kingsbury – Chairman, Accumuli PLC
Accumuli PLC




The Issue

Businesses rely on the internet.
i


The internet provides a channel for many
serious threats to businesses.
Types of Threat



               • IT System disruption
               • Data theft – intellectual property, commercially sensitive
                    data, personal data

               • Web presence attack
               • SCADA attack – industrial control systems




© 2011 Accumuli Security
© 2011 Accumuli Security
DDoS
Distributed Denial of Service attacks




                          LO




                                        Low Orbit Ion Cannon
Accumuli Security

               Leading the way in Advanced Security Solutions

               The only mid sized security integrator delivering protection and control to the
               enterprise market, underpinned by our own IPR and our own managed service
               platform.



               Our Plan


              •    Buy, build and sell play

              •    Acquire UK IT Security Services Businesses at c.£3-10m revenue level

                       •   Gain economies of scale & cost reduction

                       •   Cross selling opportunities

                       •   Enhance revenue visibility

                       •   Investing in key technology components




© 2011 Accumuli Security
Accumuli PLC




Proliferation of Access Points and Devices
The Accumuli Difference
             Leading the way in advanced security solutions




© 2011 Accumuli Security
Accumuli’s response
Webscreen Case Study - Watch Shop
Distributed Denial of Service Protection



• Watch Shop is the leading retailer of brand
  name designer watches with efficient shopping
  systems available.



• Watch Shop suffered a DDoS attack and
  everything in the business came to a complete
  standstill. “The pickers had nothing to pick,
  the packers had nothing to pack.”




•“When your company is under attack, you learn alot very quickly and we put our
full confidence in the technology employed by Webscreen. Their unique heuristic
(self learning) technology works from the minute you power the Webscreen
appliance” Director, Watch Shop.
Our Customers
Accumuli PLC




Future…

•   Accumuli operates in a growing market:

               EMEA MSSP market forecast to grow by 19% CAGR between 2011 and
               2017 to $8.4bn (Frost & Sullivan)

               2010 UK Government committed £650m of additional funding to Cyber-
               security

               Many more niche threats

               eg Denial of Service attacks from hacktivists, extortionists, rogue
               competitors

               Regulation driving uptake of Security Information Event Management
               (SIEM) activity in this emerging area

    Competition:

                    Large integrators and outsourcers (our customers)

                    Vendors

                    Niche providers

                    Accumuli offers more comprehensive approach
Any questions?

More Related Content

What's hot

TrendMicro DeepSecurity CASE - Testimonal
TrendMicro DeepSecurity CASE - TestimonalTrendMicro DeepSecurity CASE - Testimonal
TrendMicro DeepSecurity CASE - TestimonalEduardo Alves
 
RocketCyber Top 10 Security Startups - 2019
RocketCyber Top 10 Security Startups - 2019RocketCyber Top 10 Security Startups - 2019
RocketCyber Top 10 Security Startups - 2019RocketCyber
 
Data sovereignty issues: a 15 minute debrief for not-for-profits
Data sovereignty issues: a 15 minute debrief for not-for-profitsData sovereignty issues: a 15 minute debrief for not-for-profits
Data sovereignty issues: a 15 minute debrief for not-for-profitsrgtechnologies
 
Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017Frederike Kaltheuner
 
Cisco Lightning Talk
Cisco Lightning TalkCisco Lightning Talk
Cisco Lightning TalkEd Donahue
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security ServicesParviz Iskhakov, PhD
 
Trends of mobile application development
Trends of mobile application developmentTrends of mobile application development
Trends of mobile application developmentManev Dave
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmannsegughana
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyCYBERWISER .eu
 
The Current Status of Cyber Security in the BAS Industry
The Current Status of Cyber Security in the BAS IndustryThe Current Status of Cyber Security in the BAS Industry
The Current Status of Cyber Security in the BAS IndustryMemoori
 
4b. P&C Insurance and The IOT - Z. Schmiesing
4b. P&C Insurance and The IOT - Z. Schmiesing4b. P&C Insurance and The IOT - Z. Schmiesing
4b. P&C Insurance and The IOT - Z. Schmiesingschmiez
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceDale Butler
 
Challenges with Data Center Synchronization and Options for Precise Synchroni...
Challenges with Data Center Synchronization and Options for Precise Synchroni...Challenges with Data Center Synchronization and Options for Precise Synchroni...
Challenges with Data Center Synchronization and Options for Precise Synchroni...Equinix
 
5 future trends shaping it support
5 future trends shaping it support5 future trends shaping it support
5 future trends shaping it supportBradenMartin1
 
Cybersecurity Risk Assessment - 'All Done' with WISER
Cybersecurity Risk Assessment - 'All Done' with WISERCybersecurity Risk Assessment - 'All Done' with WISER
Cybersecurity Risk Assessment - 'All Done' with WISERCYBERWISER .eu
 
Trinity Leeds Launches Next - Generation Shopping Center
Trinity Leeds Launches Next - Generation Shopping Center Trinity Leeds Launches Next - Generation Shopping Center
Trinity Leeds Launches Next - Generation Shopping Center wbrewin
 

What's hot (20)

TrendMicro DeepSecurity CASE - Testimonal
TrendMicro DeepSecurity CASE - TestimonalTrendMicro DeepSecurity CASE - Testimonal
TrendMicro DeepSecurity CASE - Testimonal
 
RocketCyber Top 10 Security Startups - 2019
RocketCyber Top 10 Security Startups - 2019RocketCyber Top 10 Security Startups - 2019
RocketCyber Top 10 Security Startups - 2019
 
Data sovereignty issues: a 15 minute debrief for not-for-profits
Data sovereignty issues: a 15 minute debrief for not-for-profitsData sovereignty issues: a 15 minute debrief for not-for-profits
Data sovereignty issues: a 15 minute debrief for not-for-profits
 
Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017
 
Cisco Lightning Talk
Cisco Lightning TalkCisco Lightning Talk
Cisco Lightning Talk
 
Fromdistance - Hot product news
Fromdistance - Hot product newsFromdistance - Hot product news
Fromdistance - Hot product news
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security Services
 
Trends of mobile application development
Trends of mobile application developmentTrends of mobile application development
Trends of mobile application development
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
 
The Current Status of Cyber Security in the BAS Industry
The Current Status of Cyber Security in the BAS IndustryThe Current Status of Cyber Security in the BAS Industry
The Current Status of Cyber Security in the BAS Industry
 
4b. P&C Insurance and The IOT - Z. Schmiesing
4b. P&C Insurance and The IOT - Z. Schmiesing4b. P&C Insurance and The IOT - Z. Schmiesing
4b. P&C Insurance and The IOT - Z. Schmiesing
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conference
 
Challenges with Data Center Synchronization and Options for Precise Synchroni...
Challenges with Data Center Synchronization and Options for Precise Synchroni...Challenges with Data Center Synchronization and Options for Precise Synchroni...
Challenges with Data Center Synchronization and Options for Precise Synchroni...
 
5 future trends shaping it support
5 future trends shaping it support5 future trends shaping it support
5 future trends shaping it support
 
Cybersecurity Risk Assessment - 'All Done' with WISER
Cybersecurity Risk Assessment - 'All Done' with WISERCybersecurity Risk Assessment - 'All Done' with WISER
Cybersecurity Risk Assessment - 'All Done' with WISER
 
Trinity Leeds Shopping Centre
Trinity Leeds Shopping CentreTrinity Leeds Shopping Centre
Trinity Leeds Shopping Centre
 
Trinity Leeds Launches Next - Generation Shopping Center
Trinity Leeds Launches Next - Generation Shopping Center Trinity Leeds Launches Next - Generation Shopping Center
Trinity Leeds Launches Next - Generation Shopping Center
 

Viewers also liked

My magazine research
My magazine research My magazine research
My magazine research adinewenner
 
My magazine research
My magazine researchMy magazine research
My magazine researchadinewenner
 
2014318102739955734 morocco economic challenges
2014318102739955734 morocco economic challenges2014318102739955734 morocco economic challenges
2014318102739955734 morocco economic challengesYounes Belfellah
 
My SurveyMonkey result
My SurveyMonkey resultMy SurveyMonkey result
My SurveyMonkey resultadinewenner
 
Selection of pictures
Selection of picturesSelection of pictures
Selection of picturesadinewenner
 
The election of photos
The election of photos The election of photos
The election of photos adinewenner
 
Corruption challenges in_morocco
Corruption challenges in_moroccoCorruption challenges in_morocco
Corruption challenges in_moroccoYounes Belfellah
 
My magazine research
My magazine research My magazine research
My magazine research adinewenner
 
Academic Search Complete
Academic Search CompleteAcademic Search Complete
Academic Search Completewaleed ali
 

Viewers also liked (15)

My magazine research
My magazine research My magazine research
My magazine research
 
My magazine research
My magazine researchMy magazine research
My magazine research
 
2014318102739955734 morocco economic challenges
2014318102739955734 morocco economic challenges2014318102739955734 morocco economic challenges
2014318102739955734 morocco economic challenges
 
Iss.ppt
Iss.pptIss.ppt
Iss.ppt
 
My SurveyMonkey result
My SurveyMonkey resultMy SurveyMonkey result
My SurveyMonkey result
 
Evaluation
EvaluationEvaluation
Evaluation
 
Evaluation
EvaluationEvaluation
Evaluation
 
Selection of pictures
Selection of picturesSelection of pictures
Selection of pictures
 
Evaluation
EvaluationEvaluation
Evaluation
 
Evaluation
EvaluationEvaluation
Evaluation
 
The election of photos
The election of photos The election of photos
The election of photos
 
Corruption challenges in_morocco
Corruption challenges in_moroccoCorruption challenges in_morocco
Corruption challenges in_morocco
 
My magazine research
My magazine research My magazine research
My magazine research
 
Emerald
EmeraldEmerald
Emerald
 
Academic Search Complete
Academic Search CompleteAcademic Search Complete
Academic Search Complete
 

Similar to Accumuli Presentation Feb 2012

IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterAnna Landolfi
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationPaula Koziol
 
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &MLAWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &MLAmazon Web Services
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
deceptionGUARD by GrayMatter
deceptionGUARD by GrayMatterdeceptionGUARD by GrayMatter
deceptionGUARD by GrayMatterGrayMatter
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
iSecureCyber (Long Pitch Deck)
iSecureCyber (Long Pitch Deck)iSecureCyber (Long Pitch Deck)
iSecureCyber (Long Pitch Deck)Prabir Saha
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
Security Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteSecurity Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteMobiloitte
 
B fujitsu uk-and_ireland_cs.en-us
B fujitsu uk-and_ireland_cs.en-usB fujitsu uk-and_ireland_cs.en-us
B fujitsu uk-and_ireland_cs.en-ustewodros13
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesMichele Vecchione
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldSamsung Business USA
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Debunking IoT Security Myths
Debunking IoT Security MythsDebunking IoT Security Myths
Debunking IoT Security Mythscumulocity
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecuritySatyaKVivek
 

Similar to Accumuli Presentation Feb 2012 (20)

AGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-iAGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-i
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver Innovation
 
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &MLAWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
deceptionGUARD by GrayMatter
deceptionGUARD by GrayMatterdeceptionGUARD by GrayMatter
deceptionGUARD by GrayMatter
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
iSecureCyber (Long Pitch Deck)
iSecureCyber (Long Pitch Deck)iSecureCyber (Long Pitch Deck)
iSecureCyber (Long Pitch Deck)
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Security Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteSecurity Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - Mobiloitte
 
B fujitsu uk-and_ireland_cs.en-us
B fujitsu uk-and_ireland_cs.en-usB fujitsu uk-and_ireland_cs.en-us
B fujitsu uk-and_ireland_cs.en-us
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile world
 
Cyber
Cyber Cyber
Cyber
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Debunking IoT Security Myths
Debunking IoT Security MythsDebunking IoT Security Myths
Debunking IoT Security Myths
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT Security
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Accumuli Presentation Feb 2012

  • 1. Nick Kingsbury – Chairman, Accumuli PLC
  • 2. Accumuli PLC The Issue Businesses rely on the internet. i The internet provides a channel for many serious threats to businesses.
  • 3. Types of Threat • IT System disruption • Data theft – intellectual property, commercially sensitive data, personal data • Web presence attack • SCADA attack – industrial control systems © 2011 Accumuli Security
  • 4. © 2011 Accumuli Security
  • 5. DDoS Distributed Denial of Service attacks LO Low Orbit Ion Cannon
  • 6. Accumuli Security Leading the way in Advanced Security Solutions The only mid sized security integrator delivering protection and control to the enterprise market, underpinned by our own IPR and our own managed service platform. Our Plan • Buy, build and sell play • Acquire UK IT Security Services Businesses at c.£3-10m revenue level • Gain economies of scale & cost reduction • Cross selling opportunities • Enhance revenue visibility • Investing in key technology components © 2011 Accumuli Security
  • 7. Accumuli PLC Proliferation of Access Points and Devices
  • 8. The Accumuli Difference Leading the way in advanced security solutions © 2011 Accumuli Security
  • 9. Accumuli’s response Webscreen Case Study - Watch Shop Distributed Denial of Service Protection • Watch Shop is the leading retailer of brand name designer watches with efficient shopping systems available. • Watch Shop suffered a DDoS attack and everything in the business came to a complete standstill. “The pickers had nothing to pick, the packers had nothing to pack.” •“When your company is under attack, you learn alot very quickly and we put our full confidence in the technology employed by Webscreen. Their unique heuristic (self learning) technology works from the minute you power the Webscreen appliance” Director, Watch Shop.
  • 11. Accumuli PLC Future… • Accumuli operates in a growing market: EMEA MSSP market forecast to grow by 19% CAGR between 2011 and 2017 to $8.4bn (Frost & Sullivan) 2010 UK Government committed £650m of additional funding to Cyber- security Many more niche threats eg Denial of Service attacks from hacktivists, extortionists, rogue competitors Regulation driving uptake of Security Information Event Management (SIEM) activity in this emerging area Competition: Large integrators and outsourcers (our customers) Vendors Niche providers Accumuli offers more comprehensive approach