+ All Categories
Home > Investor Relations > Vasco Investor Presentation

Vasco Investor Presentation

Date post: 27-Jul-2015
Category:
Upload: vasco-data-security
View: 68 times
Download: 0 times
Share this document with a friend
Popular Tags:
30
© 2014 - VASCO Data Security `
Transcript

© 2014 - VASCO Data Security

`

© 2014 - VASCO Data Security CONFIDENTIAL

Forward Looking Statements

Statements made in this presentation that relate to future plans, events or performances are forward-

looking statements within the meaning of Section 21e of the Securities Exchange Act of 1934 and

Section 27A of the Securities Act of 1933. These forward-looking statements (1) are identified by use

of terms and phrases such as “expect”, “believe”, “will”, “anticipate”, “emerging”, “intend”, “plan”,

“could”, “may”, “estimate”, “should”, “objective”, “goal”, “possible”, “potential”, “project” and similar

words and expressions, but such words and phrases are not the exclusive means of identifying them,

and (2) are subject to risks and uncertainties and represent our present expectations or beliefs

concerning future events. VASCO cautions that the forward-looking statements are qualified by

important factors that could cause actual results to differ materially from those in the forward-looking

statements. These risks, uncertainties and other factors that have been described in our Annual

Report on Form 10-K for the year ended December 31, 2013 and include, but are not limited to, (a)

risks of general market conditions, including currency fluctuations and the uncertainties resulting from

turmoil in world economic and financial markets, (b) risks inherent to the computer and network security

industry, including rapidly changing technology, evolving industry standards, increasingly sophisticated

hacking attempts, increasing numbers of patent infringement claims, changes in customer

requirements, price competitive bidding, and changing government regulations, and (c) risks specific to

VASCO, including, demand for our products and services, competition from more established firms and

others, pressures on price levels and our historical dependence on relatively few products, certain

suppliers and certain key customers. Thus, the results that we actually achieve may differ materially

from any anticipated results included in, or implied by these statements. Except for our ongoing

obligations to disclose material information as required by the U.S. federal securities laws, we do not

have any obligations or intention to release publicly any revisions to any forward-looking statements to

reflect events or circumstances in the future or to reflect the occurrence of unanticipated events.

2

© 2014 - VASCO Data Security CONFIDENTIAL

Company Overview

VASCO is a global leader in strong authentication, digital signatures,

and identity management solutions specializing in securing financial

transactions and protecting access to data and applications.

3

© 2014 - VASCO Data Security CONFIDENTIAL

Listed on NASDAQ in 1997

21% Compound Annual Growth Rate in

Revenues from 2004-2014

48 Consecutive Quarters of Profitability

Visionary in Gartner Magic Quadrant

for User Authentication

Company Overview

4

© 2014 - VASCO Data Security CONFIDENTIAL

10,000+ Customers in more than 100 Countries,

More than half of the Top 100 Global Banks

and 1,700+ Financial Institutions rely on VASCO

More than 200 Million Authenticators Sold

On-Premise, Mobile, and Cloud Solutions

Company Overview

5

© 2014 - VASCO Data Security CONFIDENTIAL

Global Company

VASCO HQ

VASCO Offices

VASCO Sales Presence

6

© 2014 - VASCO Data Security CONFIDENTIAL

Financial Institution Customers

VASCO is the world leader in providing two-factor

authentication and digital signature solutions to

financial institutions. More than half of the

Top 100 Global Banks rely on VASCO solutions.

7

© 2014 - VASCO Data Security CONFIDENTIAL

Frequency and sophistication of attacks has increased

High-profile breaches have brought security

to the C-level and Board of Directors

New regulations are being enacted globally to protect

consumer transactions and personal privacy

Mobile is becoming the device of choice

There is a greater need to enhance security

while improving convenience for users

Key Growth Drivers

8

© 2014 - VASCO Data Security CONFIDENTIAL

"Two out of three attacks focus on [login] credentials at some

point in the attack. Trying to get valid credentials is part of many

styles of attacks and patterns"

- Jay Jacobs, senior analyst with Verizon

Authentication & Digital Signature Platform

Why Authentication

• Data breaches are up 49%(1)

• Protects against the newest attacks

• Easy to implement and use

(1) The Breach Level Index, released February, 2015.

9

© 2014 - VASCO Data Security CONFIDENTIAL

Technology and Products

1988 1st DIGIPASS

“Access Key”

1989 1st DIGIPASS

with Keypad

2002 VACMAN

Controller

2004 DIGIPASS GO 3

1st 1-button token

2005 IDENTIKEY

SERVER

2005 DIGIPASS 810

EMV card reader

2006 DIGIPASS 905

1st connected

Card reader

2007 DIGIPASS 270

1st thin form

Token w/keypad

2008 DP for Mobile

Soft token

for phones

VASCO Solution Timeline

1991 DIGIPASS 550

with e-Signature

10

© 2014 - VASCO Data Security CONFIDENTIAL

2014 Rabo Scanner

Card reader with

CrontoSIgn technology

2014 DIGIPASS for Apps

with CrontoSIgn

technology

Technology and Products

2013 DIGIPASS for Apps

SDK for integration

into applications

VASCO Solution Timeline

2011 DIGIPASS 920

Connected reader

for e-Government

2013 DIGIPASS 870

1st dual mode

e-Gov’t reader

2015 Risk IDS

1st RBA with

Intelligent engine

2013 DIGIPASS 760

1st token with

Cronto technology

11

2014 DIGIPASS Bluetooth

Smart-enabled

Authenticators

© 2014 - VASCO Data Security CONFIDENTIAL

Host System

• VACMAN Controller: Combines all VASCO authentication

technologies into a unified backend platform.

• IDENTIKEY Authentication & Federation Servers: Off-

the-shelf centralized servers that with complete functionality.

• Cloud Services: Authentication and digital signature

services for web and mobile application developers run on

VASCO’s servers.

Client Authenticators

• DIGIPASS: Industry-leading number of hardware and

software authentication and signature (electronic and digital)

solutions available to customers.

• Embedded & OEM Solutions: DIGIPASS integrated into

client devices such as Intel’s Identity Protection Technology.

VASCO’s Product Offerings

12

© 2014 - VASCO Data Security CONFIDENTIAL

On-Premise Business Model

Banking:

• Corporate Accounts

• Consumer Accounts

• Internet and Mobile

Applications

Enterprise Security:

• Remote access

• Application Security for

B-to-B and B-to-C

• Employee network access

13

© 2014 - VASCO Data Security CONFIDENTIAL

Cloud-Based Business Model

A cloud-based expansion of VASCO’s traditional

on-premise solution.

“By 2017, more than 50% of enterprises

will choose cloud-based services as the

delivery option for new or refreshed

user authentication implementations,

up from less than 10% today.” - Gartner

Cloud advantages:

• Easy to implement

• Unlimited scalability

• Low implementation cost

• Operating vs. Capital expense

• Rapid deployment

14

© 2014 - VASCO Data Security CONFIDENTIAL

• Strong Authentication in the cloud

• Allows customers to reduce implementation time and cost

• Provides strong authentication protection without

requiring a high level of expertise on staff

• Host system software maintained on VASCO servers:

• Business-to-Business (B2B)

• Business-to-Employee (B2E)

• Business-to-Consumer (B2C)

• Recurring revenue paid by the customer

DIGIPASS as a Service

DIGIPASS as a Service

15

© 2014 - VASCO Data Security CONFIDENTIAL

Key Product Initiatives

DIGIPASS

760

New Attack Methods Require Innovative Solutions

16

DIGIPASS

for Apps

DIGIPASS

Bluetooth

Risk-Based

Authentication

© 2014 - VASCO Data Security CONFIDENTIAL

• Developed by Cambridge University PhD’s

• Acquired by VASCO in May 2013

• Next generation HD Color QR Code

with greatly expanded data capacity

• Combines strong authentication and

signature capabilities with a high level

of user convenience

• Defeats Man-in-the-Middle attacks

• Fully supported by VACMAN and IDENTIKEY

• Works from a mobile device or DIGIPASS 760

Cronto Visual Image Authentication

DIGIPASS 760

17

© 2014 - VASCO Data Security CONFIDENTIAL

Cronto Visual Image Authentication

How it Works – Scan to Sign

18

© 2014 - VASCO Data Security CONFIDENTIAL

• Incorporates security directly into the application

DIGIPASS for APPS

DIGIPASS for APPS

• Native integration

of two-factor

authentication

• Developers focus

on their application

and outsource the

security to VASCO

Source: Gartner

Global App Downloads Passed 100 Billion Last Year

Estimated mobile app downloads worldwide (in billions)

19

© 2014 - VASCO Data Security CONFIDENTIAL

DIGIPASS for APPS

A Library of Advanced Security Applications

20

All of the necessary building

blocks to secure applications at

every level, from provisioning to

the human interface.

© 2014 - VASCO Data Security CONFIDENTIAL 21

Geolocation

OS Version

JailBreak &

Rootkit

Malware

PIN Activated

Behavior

Analysis

Biometric

Clie

nt

Score

Polic

y

Score

Calc

ula

tion

OT

P Inje

ction

Clie

nt

Sid

e D

ecis

ion P

olic

y Action 1

Action 2

Action 3

Action 4

Action 5

Action 6

1 2

3 4

Action 1

Action 2

Action 3

Action 4

Action 5

Action 6

Serv

er

Score

Polic

y

OT

P E

xtr

action

OT

P V

alid

ation

5 6

Conte

xt

Pla

tform

U

ser

DIGIPASS for APPS

Intelligent Risk Scoring for Mobile Devices

© 2014 - VASCO Data Security CONFIDENTIAL

• Eliminates the biggest hurdles to cloud adoption

• Boosts customer trust

• Security as a competitive differentiator

• Ease of implementation

• Provides a pay-as-you-grow approach

• Next step in DIGIPASS as a Service

Cloud-based Security for Application Developers

DIGIPASS for APPS

22

© 2014 - VASCO Data Security CONFIDENTIAL

Bluetooth Smart-enabled

23

Bluetooth Smart Enables Authentication

with almost any User Device

• Solves the problem of mobile devices with no USB port

• More convenient with no cables to connect

• Secure Bluetooth Smart-enabled connection

• Works in connected and unconnected mode

© 2014 - VASCO Data Security CONFIDENTIAL

Risk-Based

Authentication

How it works:

Risk IDS

Source: Gartner

24

© 2014 - VASCO Data Security CONFIDENTIAL

• Contextual analysis to apply the appropriate level of security

• Real-time analysis and intelligent decision engine focusing on:

• Web and mobile application login

• Financial transactions via online and mobile channels

• Monitoring non-monetary events such as change of address

• Identification of accounts that demonstrate abnormal characteristics

for the prevention of money laundering.

Risk IDS

Risk-Based Authentication

25

© 2014 - VASCO Data Security CONFIDENTIAL

Financials

Historical Overview

26

© 2014 - VASCO Data Security CONFIDENTIAL

Revenue and Operating Income

Revenue Operating Incomein millions USD in millions USD

CAGR (revenue)

2004-2014

21%

27

© 2014 - VASCO Data Security CONFIDENTIAL

Cash Balance and Net Working Capital

Net Cash Balance Net working capitalin millions USD in millions USD

28

© 2014 - VASCO Data Security

© 2014 - VASCO Data Security

Copyright

2014 VASCO Data Security. All rights reserved.

No part of this publication may be reproduced, stored in a retrieval system, or

transmitted, in any form or by any means, electronic, mechanical, photocopying,

recording, or otherwise, without the prior written permission of VASCO Data

Security.

Trademarks

VASCO®, VACMAN®, IDENTIKEY®, aXsGUARD®, DIGIPASS® Cronto®

MYDIGIPASS.COM® and the ® logo are registered or unregistered

trademarks of VASCO Data Security, Inc. and/or VASCO Data Security

International GmbH in the U.S. and other countries

Copyright & Trademarks

30


Recommended