Attached files

file filename
EX-99.1 - PRESS RELEASE - INTRUSION INCintrusion_ex9901.htm
8-K - FORM 8-K - INTRUSION INCintrusion_8k.htm

Exhibit 99.2

 

Investor Relations Presentation January 2021

 
 

SAFE HARBOR STATEMENT This presentation has been prepared by INTRUSION Inc. (the “Company”) solely for informational purposes based on its own info rma tion, as well as information from public sources. This presentation has been prepared to assist interested parties in making their own evaluation of the Com pany and does not propose to contain all of the information that may be relevant. In all cases, interested parties should conduct their own investigation an d analysis of the Company and the data set forth in the presentation and any other information provided by or on behalf of the Company. This presentation does not c ons titute an offer to sell, nor a solicitation of an offer to buy, any securities of the Company by any person in any jurisdiction in which it is unlawful for suc h person to make such an offering or solicitation. Neither the Securities and Exchange Commission nor any other regulatory body has approved or disapproved of the se curities of the Company or passed upon the accuracy or adequacy of this presentation. Any representation to the contrary is a criminal offense. Except as otherwise indicated, this presentation speaks as of the date hereof. The delivery of this presentation shall not, u nde r any circumstances, create any implication that there has been no change in the affairs of the Company after the date hereof. Certain of the information contained herein may be derived from information provided by industry sources. The Company believe s t hat such information is accurate and that the sources from which it has been obtained are reliable. The Company cannot guarantee the accuracy of such informat ion and has not independently verified such information. This presentation contains forward - looking statements within the meaning of the federal securities laws. These forward - looking s tatements can be identified by the use of forward - looking terminology, including the terms “believe,” “estimate,” “project,” “anticipate,” “expect,” “seek,” “predi ct,” “continue,” “possible,” “intend,” “may,” “might,” “will,” “could,” would” or “should” or, in each case, their negative, or other variations or comparable terminology. Th ese forward - looking statements include all matters that are not historical facts. They appear in a number of places throughout this presentation and include statements reg arding our intentions, beliefs or current expectations concerning, among other things, the performance of our products in the marketplace, the current technolo gic al, network, and communication platforms our products operate on and with; our ability to stay current and competitive in our research and development effor ts; our ability to protect and enforce our intellectual property rights, the success of our commercialization objectives, and our customer marketing and sales initiativ es. We derive many of our forward - looking statements from our operating budgets and forecasts, which are based upon many detailed assumptions. While we believe that ou r a ssumptions are reasonable, we caution that it is very difficult to predict the impact of known factors, and, of course, it is impossible for us to anticipa te all factors that could affect our actual results. Forward - looking statements should not be read as a guarantee of future performance or results and may not be accurate indication s of when such performance or results will be achieved. In light of these risks and uncertainties, the forward - looking events and circumstances discussed in t his presentation may not occur and actual results could differ materially from those anticipated or implied in the forward - looking statements. A number of importan t factors could cause our actual results to differ materially from those indicated in these forward - looking statements, including risks and uncertainties related to pro duct performance, rapidly changing technologies, and the success of our sales and marketing efforts, as well as those set forth in the Company’s filings with the Securities and Exchange Commission under the heading “Risk Factors.” SAFE HARBOR STATEMENT 2

 
 

INTRUSION LEADERSHIP JACK BLOUNT President & CEO 40 years in technology as a visionary in the personal computer, local area networking, ERP, mobile computing, big data, cybersecurity and AI. CIO of USDA, the 4th largest data center in federal government SVP of Business Development at Novell, helping company grow from $50 million to $2 billion in 6 years Served as CEO, CTO, COO of 8 technology companies Began career as software engineer at IBM PRIOR AFFILIATIONS JOE HEAD Co - Founder & SVP Systems Engineering Recognized by the federal government as a top expert on cyberwar. Integral in the development of both INTRUSION Shield and Savant. Co - founder of INTRUSION, serving 37+ years as a director Named Vice Chairman of the BOD in 2000, and VP in 2003 Product Marketing Manager & Marketing Engineer at Honeywell Optoelectronics PRIOR AFFILIATIONS FRANKLIN BYRD CFO Franklin has more than 25 years of experience in finance, accounting and compliance and scaling experience with early stage and high - growth entities. Prior to joining INTRUSION, Franklin served as CFO for Peak Nano Systems, LLC. There, he was responsible for completing critical financings and scaling up office operations for the company. Franklin has also served as vice president of finance for Hunt Power L.P., a division of Hunt Consolidated Inc. Franklin is a Certified Public Accountant. PRIOR AFFILIATIONS 4

 
 

OUR HISTORY 1983 INTRUSION is established, building secure, fiber optic LAN equipment 1991 Corporate espionage case is uncovered, producing a historically - large settlement for the client & positioning INTRUSION as a formative watchdog in cybercrime. 2001 2004 2012 INTRUSION Savant launched, offering invaluable insight necessary to eliminate company infrastructure and performance issues. 2020 INTRUSION Shield to launch 5 INTRUSION Compliance Commander is launched, protecting against leakage of confidential customer information INTRUSION TraceCop launched, helping analysts and investigators dramatically reduce time & complexity in tracking cybercriminals

 
 

KEY BUSINESS HIGHLIGHTS Differentiated cybersecurity vendor undergoing dramatic TAM expansion under new leadership 1 New management team brings emphasis on growth and vision for INTRUSION 2 INTRUSION has an irreplaceable, proprietary data asset that has historically been under - monetized 3 Highly differentiated, custom business in federal network forensics 4 New solution for commercial cybersecurity market significantly expands INTRUSION ’s TAM 6 Long - term roadmap with several releases building on core technology assets 5 Transitioning company to recurring revenue model, focused on new solutions and Enterprise business 6

 
 

$3 trillion in global cybercrime losses in 2019, projected to grow to $6 trillion by 2021 SIZE OF PROBLEM & OPPORTUNITY GROWTH OF LOSSES RESULTING FROM CYBERCRIME (BY YEAR) *The Economic Impact of Cybercrime: No Slowing Down by Center for Strategic and International Studies (CSIS) McAfee ** CyberSecurity Ventures 2014 2018 2019 2021 $500 BILLION* $600 BILLION* $6 TRILLION** estimated TOTAL GOVERNMENT AND ENTERPRISE SPENDING ON SECURITY SOFTWARE AND HARDWARE CYBERSECURITY VENTURES PREDICTS GLOBAL SPENDING ON CYBERSECURITY PRODUCTS AND SERVICES WILL EXCEED $1 TRILLION CUMULATIVELY OVER THE FIVE - YEAR PERIOD FROM 2017 TO 2021 Average Annual Cybersecurity Spend per Employee Source: Gartner 2020E $1800 2012 $584 $3 TRILLION** 7

 
 

“If our firewalls stay updated, the network will stay protected” “Software and hardware from trusted vendors are secure when delivered” “Bad actors can be locked out with the right tools” “My network is clean and free from malware” Myths… …Realities Firewalls are breached everyday by armies of attackers employed by nation - states using AI and Supercomputing Malicious code is routinely embedded on all types of IT hardware shipping from China The average time to identify a network breach in 2019 was 206 days; the average lifecycle of a breach is 314 days from breach to containment Every company’s network is infected with malware living on your network every second of every day Sources: IBM, INTRUSION COMMON MISCONCEPTIONS ABOUT CYBERSECURITY THREATS 8

 
 

EXISTING SOLUTIONS 10

 
 

Monetized over 25 years as a Network Forensics Tool for Federal Customers INTRUSION TraceCop Œ 11 Patented network appliance designed to carryout bidirectional protocol decoding in RAM INTRUSION Savant Œ FOR REAL - TIME PROCESS FLOW ANALYSIS Patented Packet File Systems for recording at line rates Patented, Concise Summaries for mass - enrichment, analysis and indefinite storage World’s only database of 25 years of Internet traffic and specifically cyber crime INTRUSION constantly expands the data in TraceCop with dozens of international data feeds

 
 

A NEW FAMILY OF SOLUTIONS 14

 
 

Leverage foundational TraceCop and Savant platforms in expanded new solutions for the Enterprise INTRUSION Shield Œ FAMILY REPRESENTS A NEW PARADIGM FOR CYBERSECURITY EXISTING SOLUTIONS INTRUSION TraceCop Œ “Total history of Internet traffic” INTRUSION Savant Œ “Who is operating on my network?” AI APPLIED TO TRACECOP DATASETS & SAVANT SENSOR INTRUSION Shield Œ 1st of its KIND and 1 st in a family of solutions Identifies and kills all malicious traffic in real - time NEWEST SOLUTION 15

 
 

INTRUSION S hield Œ OFFERS REAL NETWORK SECURITY FROM THE INSIDE - OUT Patented technology layers AI on top of TraceCop and Savant , enabling real - time killing of malicious traffic PLUG - N’ - PLAY IMPLEMENTATION INTRUSION Shield VALUE PROPOSITION Does not replace existing network elements; rather, Shield is positioned as an new network security layer Only solution on the market that identifies and kills malicious agents in real - time operating on your network No Change Management; Plug - n - Play technology Daily System Updates as TraceCop database continues to grow Multiple Provisional patents filed covering Shield technology 1 st in a family of solutions 16

 
 

INTRUSION SHIELD ΠDOES NOT SEND THOUSANDS OF ALERTS, Shield USES AI TO KILL MALICIOUS TRAFFIC 17

 
 

S hield STRATEGY & MARKET SIZE: SECURITY - AS - A - SERVICE (SAAS) $20 per seat, per month pricing model designed to drive mass adoption in commercial enterprise market AGGRESSIVE RAMP UP OF RECURRING REVENUE Leverage established distributor network and channel reach of roughly 12,000 U.S. resellers* No upfront cost or contracts for customers Appliance drop - shipped direct to customers with software pre - installed by DELL (no inventory) Validation from early adoption by 12 ‘beta’ customer as Shield killed 77,539,801 threats in 90 days Drive increased momentum with rapid expansion of Shield family with introduction of 6 solutions Source: Gartner *Channel Futures 18 0 50 100 150 200 250 2019 2024E Security & Risk Market (in billions) Estimated Commercial Enterprise TAM $124.4 $207.7

 
 

INTRUSION Shield Œ PRELIMINARY BETA RESULTS Customer A Customer B Customer C 3 additional Beta customers comment on their experience with our solution 20 “This product just does not exist in the market today and is sorely needed,” said Aaron, CISCO for B. Riley Financial. “The Shield solution has shown us that virtually every network is already infected, and front - end protection is not possible. The understanding that networks are already compromised and that the only means of protection is to monitor and restrict outgoing traffic is the breakthrough of the Shield philosophy,” said Richard, President of NovaTech . “The ease and instant protection of Shield has been great,” said Michael, Portfolio Manager for Bard Associates. “It’s so simple to implement and run, yet highly effective.”

 
 

INTRUSION Shield ΠFAMILY OF SOLUTIONS ROADMAP A new family of solutions targeting important sub - segments the Enterprise & SMB markets Shield Shield CLOUD Shield Multi - Tenant CLOUD Shield RE (Remote Employees) Shield WIFI Shield CELLLAR 21

 
 

KEY INVESTMENT HIGHLIGHTS Differentiated cybersecurity vendor undergoing dramatic TAM expansion under new leadership 1 New management team with CEO that has repeated success in technology turnarounds 2 INTRUSION has a uniquely valuable , dynamica lly growing, threat - enriched Big Data Cloud of databases 3 AI based solution using ML&NN technology to protect business and government 4 Moving INTRUSION into the commercial market significantly expands our TAM 6 Developed, strategic solutions roadmap is designed to enable long - term growth 5 Leveraging modern, SaaS revenue model greatly shortens sell cycle and encourages rapid growth 26

 
 

CYBERSECURITY AS AN INDUSTRY HAS FAILED! INVEST IN A CYBER DEFENSE SOLUTION THAT WORKS! 27