ged- i ltd

75
GED-i Ltd GED-I Proprietary www.ged-i.com +972 9 8355600 [email protected] Secure data Resides on Cloud, Hosting & Local SAN storage Transferred over public/private networks Store data Very Fast SAN storage

Upload: zlata

Post on 11-Jan-2016

45 views

Category:

Documents


1 download

DESCRIPTION

GED- i Ltd. Secure data R esides on Cloud, Hosting & Local SAN storage Transferred over public/private networks Store data Very Fast SAN storage. www.ged-i.com +972 9 8355600 [email protected]. About GED- i Ltd. Israeli Company Founded in 2005 Development started in 2006 - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: GED- i  Ltd

GED-i LtdGED-i Ltd

GED-I Proprietary

www.ged-i.com +972 9 8355600 [email protected]

Secure data

Resides on Cloud, Hosting & Local SAN storage

Transferred over public/private networks

Store data

Very Fast SAN storage

Page 2: GED- i  Ltd

About GED-i Ltd

GED-I Proprietary

• Israeli Company• Founded in 2005• Development started in 2006• Held by 3 founders and private investors• Funding • External - Private & Governmental - about $800,000• Founders – About $2M

• Office is Netanya, Israel• Patent allowance in USA

Page 3: GED- i  Ltd

Company Status

GED-I Proprietary

• Sales – Initial revenues of more than $200,000• Sales – Win of project estimated of $1M (G4Crypt)• Sales channels - Europe, Asia, Israel

• Products - GSA 2000, G4Crypt - Commercial• Oracle/SUN’s Partner• IBM’s Storage Proven, Integrated Solution• HP – Interoperability, Integrated solution

Page 4: GED- i  Ltd

Management: David Saar, MBA – CEO

24 years leading High-tech companies in Executive positions. Served as Vsecure Technologies Inc CEO, founder and the GM of TSK Israel Ltd and ECI Telecom Director of Worldwide Marketing.

Elisha Atzmon, PhD – CTO, 12 years in advanced systems Research, Analysis and Implementation.

Lior Greenblat, MSc – VP R&D, 10 years in leading design, development and implementation

Advisory Board: Nadav Kedem, MSc

Most recently serves as the manager and Director of R&D at EMC Israel

Giora Cohen, BSc 25 years in leading design, development and implementation of high-tech technologies

Rony Shapiro, MSc – VP R&D, 22 years in leading design, development and implementation of security systems.

4

GED-I Proprietary

GED-i Team

Page 5: GED- i  Ltd

Security Target Markets

GED-I Proprietary

5

Cloud Computing

Cloud Operator as Infrastructure as Service

Enterprise external DC Enterprise DRP

Enterprise

Internal data center Private cloud DRP / Hosting Network connecting

remote sites

Sensitive and Confidential Data at:

Page 6: GED- i  Ltd

Target Markets - Customers

GED-I Proprietary

6

Enterprise branches

University campus

Hospital sites

Research Centers

Grocery chains

Casino sites

Telecom

Enterprise

Cloud Operator

University

Bank

Payment Processor

Insurance

Hospital

Government

Defense

Airlines company

Municipal Authority

Police

ISP

Telecom

Airports

Cities

Communication

Law enforcement

Defense bases

Private Networks

Data security for the Civilian & HLS

Page 7: GED- i  Ltd

GED-I Proprietary

Cloud/Storage Security - Why

• PCI DSS• CA 1386• DOD 5015

Compliance to Privacy Regulations

Data Security• Data Security is a “Show Stopper” for cloud

computing, mainly to Enterprises• Data deployment risks – Cloud, Hosting, Data Center • Control over Data Security measures

• HIPAA• GBL• Basel II

Page 8: GED- i  Ltd

Cloud Security Problem

CLOUD Customer

Customer

Customer

Data

Processing

Data1

Data2

Integrity, AvailabilityConfidentiality,

GED-I Proprietary

8

Page 9: GED- i  Ltd

GED-I Proprietary

SaaS IaaSPaaS

Private

Public

GED-i’s product PositioningCloud Customer mapping

• Users (Enterprises, SMB)

• Operators

• Operator Infrastructure• Operator revenue

generator

• Users (Enterprises, SMB)

• Operators

• Operators Infrastructure

Page 10: GED- i  Ltd

GED-I Proprietary

Privileged User Access – Privileged administrators and control over their access

Regulatory Compliance Data Location – Local regulations compliance Data Segregation – Shared environment, Encryption Recovery Investigative Support Long-term viability

X – available by GED-I

X – Not available by GED-i

7 Cloud Security RisksBy Gartner

Page 11: GED- i  Ltd

GED-I Proprietary

11

GSA 2000 - Storage Encryption • Data Encryption (AES 256 XTS) • For Local Data Center, Hosting site and Cloud site

G4EC - Encryption and Access Control• Ensures the confidentiality of the data located at the Hosting/Cloud• Key manager and Encryption control unit, located at  the customer site

GED-i’s Data Security suite

The Only End to End Solution

G4Crypt - Network Encryption• IP network Data encryption as it is transmitted between Customer sites

and cloud sites.

Page 12: GED- i  Ltd

GED-I Proprietary

12

Data resides in remote cloud site - Data may be exposed to unauthorized eyes

Solution – GED-I storage encryption (GSA 2000)

User’s access to cloud site through public or private networks - Data may be viewed or changed

Solution – GED-I’s network encryption (G4Crypt)

Access Control – User has no control on users access to his own Data/Servers

Solution – GED-I’s Remote control over data encryption and accessibility (G4EC)

Data and Servers availability–

User has no control when his Data are approachable

Solution – GED-I’s Remote control over data encryption and accessibility (G4EC)

Shared Cloud infrastructures and services –

Separation between different cloud users

Solution – GED-I’s Remote control over data encryption and accessibility (GSA 2000)

Cloud’s Vulnerabilities and

GED-i’s Security Suite

Page 13: GED- i  Ltd

GED-I Proprietary

13

Local Server

Clients

User Site

Cloud Services at remote site

Cloud

Data

Cloud

Servers

GKS 2000 Key Server

Cloud Data Encrypted

GSA 2000 EE Encryption Engine

Cloud data

Controlled by Cloud Client

GED-i’s Cloud Security suite

Transmitted Data Encrypted

IPSEC Agent

G4Crypt

&@

&@ &@

AB

Page 14: GED- i  Ltd

Hybrid Cloud

GED-I Proprietary

Server

Clients

Clients

Public CloudGSA 2000 EE

Encryption Engines

GKS 2000 Key Server

GSA 2000 EE Encryption Engine

Main Site

CISCO MDS 9000

CISCO MDS 9000

CISCO MDS 9000

CISCO MDS 9000

Cloud Servers

Private Cloud

Cloud Storage

Local Storage

Page 15: GED- i  Ltd

GED-I Proprietary

Data Encrypted on Cloud Storage devices Encryption per Physical server Encryption Keys at customer site Data Path encryption from Cloud site to Customer site NPIV data path – multi servers to multi targets Encryption per VM server Encryption per end-user VM Full Data Path encryption from Cloud storage to Cloud

Customer site Access to data only upon G4EC activation

X – available X - Under/Final development X - development

Security Offering status

Page 16: GED- i  Ltd

GED-I Proprietary

Storage

Server

Clients

GKS 2000 Key Server

Storage data is Encrypted and Available to End Users

?&#@

Storage’s Data Security offering

ABCD

Page 17: GED- i  Ltd

High Availability Solution

GED-I Proprietary

17

GEM 2000(Element Manager)Ethernet

FC / iSCSI

AES 256

Storage

Server

Clients

Clients

GSA 2000 EE (Encryption Engine)

GKS 2000 (Key Server)

GSA 2000 EE (Encryption Engine)

ABCD#W~Z

Page 18: GED- i  Ltd

Why GED-i

Technology The BEST security - 2 (4) encryption layers with millions of keys Central Solution for any type of data or application Integrated solution into IBM (HP) storage Dedicated HW solution - Plug and Play, no performances degradation

but - S/W product available on standard HW servers (IBM, HP) A whole media protection approach Separated Key Manager locally or remotely Easy to install and to maintain Suitable to any Servers OS Suitable to any Storage manufacturer (IBM, EMC, HP, HDS, DELL...)

GED-I Proprietary

Page 19: GED- i  Ltd

Why to encrypt (with GED-i)

Business Data Security is Enterprise’s “Show Stopper” Solution for Cloud/Storage/Hosting Operators for

Enterprises Solution for Enterprises for Cloud/Hosting/Storage Low TCO since no need to secure each application

independently Competitive Advantage over other operators Suitable to existing HW – Low investment

GED-I Proprietary

Page 20: GED- i  Ltd

• Product Sales– Customers

• Cloud operators, Storage Center, Data Center, ISP (Amazon EC2)• The High-End Market : Enterprises, Health, Financing, Research Centers,

Government, Banking

– Channels - Partnership with Storage, IT and Security integrators/VARs to Local channels perform: Sales, integration, support, GED-I 2nd line support Transfer price may based on % of end user price (30%-35%)

– Pricing: starting at $30K

• Technology Sale - OEM/ Cooperation– Storage Devices Manufacturer (EMC, IBM, SUN, HP, DELL,

HDS,…)– Communication Devices Manufacturer (CISCO, Brocade)– Security: CA, Symantec, Check Point

GED-I Proprietary

GED-I’s Go to Market & Business Model

Page 21: GED- i  Ltd

Storage Security - Based on external disks market size report by Gartner Q1/2010

GED-I Proprietary

21

Market size

Grow rate Sales in M$ 8% per security in M$ Penetration Addressable Market size M$

2012 5% $19,000 $1,520 35% $540

2013 5% $20,000 $1,600 35% $560

Page 22: GED- i  Ltd

Sales Target

GED-I Proprietary

Assumptions

1.Sales through VARs and OEM agreements

2. moderate forecast

3. Based on $5M Investment

Product Type Price Description

Superior (1+2) $30,000 Superior configuration: 1*GKS +2*GSA+1*G4EC

Superior (1+3) $40,000 Superior configuration: 1*GKS +3*GSA+1*G4EC

Superior (1+4) $50,000 Superior configuration: 1*GKS +4*GSA+1*G4EC

Sales Projection summary (in end user price) as detailed below:

Year 1 2 3 4 5 Total

Sales $1M $6M $12M $20M $28M $67M

Page 23: GED- i  Ltd

FeasibilityFeasibility

GED-I Proprietary

Based on• Existing customers• Discussions with: IBM, HP• Conferences• Consultants• Articles• Market Researches• Internal Knowhow

Page 24: GED- i  Ltd

Investment OptionsInvestment Options

GED-I Proprietary

Targets• Expanding marketing and Sales activity• Product line expansion• More focus on the cloud market• 24 months of operation• Profitability

Investment sum equity Note

$6M 25% Investment

$25M 100% Buyout

Page 25: GED- i  Ltd

SAN Storage

GED-I Proprietary

25

GFSS

GED-I Fast SAN Storage

For Performance demanding

application

Page 26: GED- i  Ltd

Fast SAN Storage

GED-I Proprietary

26

For performance demanding applications:

“READ” at very fast speed

“WRITE” at very fast speed or no writing at all

“SAVE” to disk at regular speed, periodical or no data saving at all

For Mid-Range (SMB)

Utilizing standard HW platforms

Page 27: GED- i  Ltd

SAN Storage

GED-I Proprietary

27

Target Market Mid-range (SMB) market

Competition VERY EXPENSIVE traditional storage

Advantages

No competition in the target market (??)

Usage of “every” 3rd party Server or JBOD

Un-matched price level (S/W)

Page 28: GED- i  Ltd

Target Applications

GED-I Proprietary

28

Query Data Bases (DB)

VOD Download Servers Image Processing

Data Confidential application

Music on Demand

Simulation Video Processing

Sharing Systems Army Systems

Fast Boot Application

QA/Testing systems

Page 29: GED- i  Ltd

Network Security

GED-I Proprietary

29

G4Cypt

Network Encryption

For public and Private Network

Page 30: GED- i  Ltd

Click to edit Master title style

Encrypting Data transmitted

between IT islands

Network Encryption

Encrypted IP Network

IPsec AES 256Public Network

ABCD%&^#

ABCD

Page 31: GED- i  Ltd

Click to edit Master title style

G4Crypt Models

An encryption appliance Desktop or 19” Rack mountable device Point to Multi Point (P2MP) and Point to Point (P2P)

AES 256 standard encryption Full Duplex Encryption Encryption rates at 100, 300, 600Mbs and near 1Gbs HW Bypass for fast recovery Remote management (SNMP, SSH )

Page 32: GED- i  Ltd

Click to edit Master title style

Radio Network Encryption

Central Site

Site A Site B

Site CSite D

G4Crypt 300

Page 33: GED- i  Ltd

Click to edit Master title style

Total Solution by GED-i

Page 34: GED- i  Ltd

Thank YouThank You

GED-I Proprietary

For contact:

GED-I Ltd

www.ged-i.com

+972 9 8355600

+972 52 6498246

[email protected]

Page 35: GED- i  Ltd

About GED-i Ltd

GED-I Proprietary

Israeli Company

Founded in 2005

Office is Netanya, Israel

Patent granted in USA

Sales channels - Europe, Asia, Israel

Sales – Selected to secure Italy PA network

Page 36: GED- i  Ltd

The ProblemThe Problem

GED-I Proprietary

Privacy regulations, Data breaches result in huge financial damages and business optimization obliges to secure private data and are the rationale behind the need to encrypt data on storage devices.

Today, almost all the data resides on storage devices is not encrypted. The vulnerability of non-encrypted stored data is one of the most critical security problems to enterprises, financial, health organization, government and defense.

The merging of Cloud Computing and virtualization technologies, which based on storing data at remote sites, creates major security considerations which increases the need for remote data encryption.

Moreover, in the few cases of encrypted data, a penetration into storage system, lost or stolen Disk gives the thief sufficient time to use advanced tools over Known Data Structure over a large amount of data to break the encryption (if any), to hack into and to expose the information.

Page 37: GED- i  Ltd

Product DescriptionProduct Description

GED-I Proprietary

GED-i’s appliance is installed adjacent to the Storage device ports and any data transferred to the storage device is encrypted and decrypted while it is transferred back to the user in real time. All the data is kept encrypted on the storage disks.

The required key-information for the encryption process and for the decryption process is saved on a dedicated external key server (or in All-in-ONE solution on an external retractable physical device such as a flash memory on USB port, PCMCIA, CD, server disk, etc).

Page 38: GED- i  Ltd

Technology DescriptionTechnology Description

GED-I Proprietary

GED-i’s solution is a Central Storage Data Security that uses 4 layers of Encryption:

The basic layer is a standard AES-256-XTS encryption of the data,

The second layer is storage segmentation, The third level is geometric restructuring

(scrambling) layer implemented as part of the actual writing to the storage device.

The fourth layer, the interference, involves special operations on the storage device to reduce the traceability of the storage surface characteristics.

Page 39: GED- i  Ltd

Security Target Markets

GED-I Proprietary

39

Cloud Computing

Cloud Operator as Infrastructure as Service

Enterprise external DC

Enterprise DRP

Enterprise

Internal data center Private cloud DRP / Hosting Network connecting

remote sites

Sensitive and Confidential Data at:

Page 40: GED- i  Ltd

Target Markets - Customers

GED-I Proprietary

40

Enterprise branches

University campus

Hospital sites

Research Centers

Grocery chains

Casino sites

Telecom

Enterprise

Cloud Operator

University

Bank

Payment Processor

Insurance

Hospital

Government

Defense

Airlines company

Municipal Authority

Police

ISP

Telecom

Airports

Cities

Communication

Law enforcement

Defense bases

Private Networks

Data security for the Civilian & HLS

Page 41: GED- i  Ltd

GED-I Proprietary

Storage Data security What is it

Encrypting Data resides on Storage Devices

Preventing INTERNAL data hacking

Data is secured even if was copied

Secures ANY type of data

For Enterprise Internal DC or Cloud site DC

Page 42: GED- i  Ltd

GED-I Proprietary

Network Data security What is it

Encrypting Data transferred over Public or Private networks

Preventing Data exposure even if data is

hacked

Securing Enterprise data transferred between Remote Operational sites

Page 43: GED- i  Ltd

GED-I Proprietary

Cloud/Storage Security - Why

• PCI DSS• CA 1386• DOD 5015

Compliance to Privacy Regulations

Data Security• Data Security is a “Show Stopper” for cloud

computing, mainly to Enterprises• Data deployment risks – Cloud, Hosting, Data Center • Control over Data Security measures

• HIPAA• GBL• Basel II

Page 44: GED- i  Ltd

Cloud Security Problem

CLOUD Customer

Customer

Customer

Data

Processing

Data1

Data2

Integrity, AvailabilityConfidentiality,

GED-I Proprietary

44

Page 45: GED- i  Ltd

GED-I Proprietary

45

GSA 2000 - Storage Encryption • Data Encryption (AES 256 XTS) • For Local Data Center, Hosting site and Cloud site

G4EC - Encryption and Access Control• Ensures the confidentiality of the data located at the Hosting/Cloud• Key manager and Encryption control unit, located at  the customer site

G4Crypt - Network Encryption• IP network Data encryption as it is transmitted between Customer sites

and cloud sites.

GED-i’s Data Security suite

The Only End to End Solution

Page 46: GED- i  Ltd

GED-I Proprietary

46

Local Server

Clients

User Site

Cloud Services at remote site

Cloud

Data

Cloud

Servers

GKS 2000 Key Server

Cloud Data Encrypted

GSA 2000 EE Encryption Engine

Cloud data

Controlled by Cloud Client

GED-i’s Cloud Security suite

Transmitted Data Encrypted

IPSEC Agent

G4Crypt

&@

&@ &@

AB

Page 47: GED- i  Ltd

Hybrid Cloud

GED-I Proprietary

Server

Clients

Clients

Public CloudGSA 2000 EE

Encryption Engines

GKS 2000 Key Server

GSA 2000 EE Encryption Engine

Main Site

CISCO MDS 9000

CISCO MDS 9000

CISCO MDS 9000

CISCO MDS 9000

Cloud Servers

Private Cloud

Cloud Storage

Local Storage

Page 48: GED- i  Ltd

GED-I Proprietary

Storage

Server

Clients

GKS 2000 Key Server

Storage data is Encrypted and Available to End Users

ABCD?&#@

Storage’s Data Security offering

Page 49: GED- i  Ltd

High Availability Solution

GED-I Proprietary

49

GEM 2000(Element Manager)Ethernet

FC / iSCSI

AES 256

Storage

Server

Clients

Clients

GSA 2000 EE (Encryption Engine)

GKS 2000 (Key Server)

GSA 2000 EE (Encryption Engine)

ABCD#W~Z

Page 50: GED- i  Ltd

Why GED-i

Technology The BEST security - 2 (4) encryption layers with millions of keys Central Solution for any type of data or application Integrated solution into IBM (HP) storage Dedicated HW solution - Plug and Play, no performances degradation

but - S/W product available on standard HW servers (IBM, HP) A whole media protection approach Separated Key Manager locally or remotely Easy to install and to maintain Suitable to any Servers OS Suitable to any Storage manufacturer (IBM, EMC, HP, HDS, DELL...)

GED-I Proprietary

Page 51: GED- i  Ltd

Why to encrypt (with GED-i)

Business Data Security is Enterprise’s “Show Stopper” Solution for Cloud/Storage/Hosting Operators for

Enterprises Solution for Enterprises for Cloud/Hosting/Storage Low TCO since no need to secure each application

independently Competitive Advantage over other operators Suitable to existing HW – Low investment

GED-I Proprietary

Page 52: GED- i  Ltd

Pricing – GSA 2000

Based on number of storage secured ports Per single main SAN storage 2-6 ports should be secured Major customers may have 10s-100s storage units Basic price is per single GSA 2000 appliance used to encrypt

single storage port - $10K-$16K (end user price) Actual value of basic price is depended on the link speed

(1Gbps, 4 Gbps, 8Gps) Single GSA 2000 used to encrypt 2 storage ports – $20K-$32K Single GSA 2000 used to encrypt 4 storage port – $36K-$58K Maximum encrypted storage ports per GSA 2000 – 4 ports Price is for HW and SW In special case GED-I may grant the authority to local integrator

to integrate the SW with locally purchased HW

GED-I Proprietary

Page 53: GED- i  Ltd

Business Model

Partnership with USA based channels such as integrators and VARs

Local channels perform: Sales, integration, support GED-I supplies 2nd line support Transfer price may based on % of end user price (30%-35%) or

fix transfer price with free end-user pricing (projects)

GED-I Proprietary

Page 54: GED- i  Ltd

Network Security

GED-I Proprietary

54

G4Cypt

Network Encryption

For public and Private Network

Page 55: GED- i  Ltd

Click to edit Master title style

Encrypting Data transmitted

between IT islands

Network Encryption

Encrypted IP Network

IPsec AES 256Public Network

ABCD%&^#

ABCD

Page 56: GED- i  Ltd

Click to edit Master title style

G4Crypt Models

An encryption appliance Desktop or 19” Rack mountable device Point to Multi Point (P2MP) and Point to Point (P2P)

AES 256 standard encryption Full Duplex Encryption Encryption rates at 100, 300, 600Mbs and near 1Gbs HW Bypass for fast recovery Remote management (SNMP, SSH )

Page 57: GED- i  Ltd

Click to edit Master title style

Radio Network Encryption

Central Site

Site A Site B

Site CSite D

G4Crypt 300

Page 58: GED- i  Ltd

Click to edit Master title style

Total Solution by GED-i

Page 59: GED- i  Ltd

SAN Storage

GED-I Proprietary

59

GFSS

GED-I Fast SAN Storage

For Performance demanding

application

Page 60: GED- i  Ltd

Fast SAN Storage

GED-I Proprietary

60

For performance demanding applications:

“READ” at very fast speed

“WRITE” at very fast speed or no writing at all

“SAVE” to disk at regular speed, periodical or no data saving at all

For Mid-Range (SMB)

Utilizing standard HW platforms

Page 61: GED- i  Ltd

SAN Storage

GED-I Proprietary

61

Target Market Mid-range (SMB) market

Competition VERY EXPENSIVE traditional storage

Advantages

No competition in the target market (??)

Usage of “every” 3rd party Server or JBOD

Un-matched price level (S/W)

Page 62: GED- i  Ltd

Target Applications

GED-I Proprietary

62

Fast Boot Application

Query Data Bases (DB)

VOD Download Servers

Image Processing

Data Confidential application

Music on Demand

Simulation Video Processing

Sharing Systems

Army Systems

Page 63: GED- i  Ltd

SAN Storage

GED-I Proprietary

63

Model Name Read write Save on Disk

FR-NW Yes – at very high speed No No

FR-FW Yes – at very high speed Yes – at very high speed, only to memory LU

No

FR-PW Yes – at very high speed Yes Yes – from time to time

FR-SW Yes – at very high speed Yes Yes – immediately, at Standard disks speed

Page 64: GED- i  Ltd

Benefits

As a result of GED-I unique technology and product architecture that enables to overcome the Storage inherent vulnerabilities, GED-I’s solution advantages over other solutions are:

Stronger security through 4 layers protection: AES, Segmentation, Scrambling and Interference.

Real Physical separation between the Encryption Engine and remote Key Server. Increasing the solution immunity to physical theft and to penetration and copy of the Encryption unit.

Use of hundreds of thousands or even millions of AES 256 encryption Keys

Line Speed or “Near” line speed

Selection of H/W platform from leading server manufacturers (IBM, SUN, HP)

Integrated solution into IBM’s Storage

Data decryption is always guaranteed due to the secured backup of the remote Key server.

No use of Backdoors for recovery due to the secured copy of the remote key server.

No Use of Master key for recovery due to the secured copy of the remote key server.

The 4 layers technology guarantees long term security even if the AES, or other standard encryption methods, will be mathematically compromised.

As the media volume becomes larger, the protection gets stronger GED-I Proprietary

Page 65: GED- i  Ltd

GED-I vs. Competition

GED-I Proprietary

Page 66: GED- i  Ltd

GED-I vs. Competition

GED-I Proprietary

Page 67: GED- i  Ltd

GED-I vs. Competition

GED-I Proprietary

Page 68: GED- i  Ltd

Thank YouThank You

GED-I Proprietary

For contact:

GED-I Ltd

www.ged-i.com

+972 9 8355600

+972 52 6498246

[email protected]

Page 69: GED- i  Ltd

Use Case

GED-I Proprietary

ATO ( Turkish, Ankara Chamber of Commerce ).

(1) Storage encryption solution for SAN storage based on 2* GSA 2000 encryption engines and single Key manager GKS 2000. On line, Real time Encryption and decryption!

(2) Securing HP SAN storage devices

(3) FC link at 4Gbps.

Ofek Aerial Photography (For Defense/Governmental and Public market).

(1) Storage encryption solution for SAN storage based on GSA 2000 encryption engines. On line, Real time Encryption and decryption of about 1TB per day !

(2) Storage and users Network optimization planning and design

(3) Securing SUN SAN storage

(4) iSCSI link at 1Gbps

Private Network of "Ministero Grazia e Giustizia" (Minister of Justice) in Italy

(1) IP to IPsec Encryption for 300Mbs using the G4Crypt product , January 2010

Page 70: GED- i  Ltd

GED-i High Availability Solution

Customer in Israel

GED-I Proprietary

Ethernet

Ethe

rnet

GKS 2000 (Key Server) GEM 2000

(Element Manager)

GSA 2000 EE (Encryption Engine)

CIFS

AES 256 XTS

SUN Storage

7410

File Server

Port 1

Port 2

Port 4

Port 3

Clients

Clients

CIFS

Backup tape

SUN StorageTeK SL24FC

Encrypted data backupNON- Encrypted data backup

CIFS

iSCSI

iSCSI

Port 5

CIFS

Page 71: GED- i  Ltd

GED-i High Availability Solution

Governmental Customer in Europe

GED-I Proprietary

Ethernet

Ethe

rnet

GKS 2000 (Key Server)

GEM 2000(Element Manager)

2 * GSA 2000 EE 1U Twin server

(Encryption Engine)

AES 256 XTS

HP EVA

File Server

Port i

Clients

Clients

FCPort j

FC

Clients

Page 72: GED- i  Ltd

Integrated solution HPCloud in Europe

GED-I Proprietary

72

FC

Server

Clients

Ethernet

GKS 2000 Key Server

HP

2 * GSA 2000 EE HP BL460 G7

HP EVA

HP EVA

Customer SiteCloud Site

Page 73: GED- i  Ltd

GED-i Ltd Data Security/Encryption solutions

GED-i Ltd Data Security/Encryption solutions

GED-I Proprietary

The only solution that guarantees security of stored data through four layers of encryption.

Companies spent $6.65M in average to recover from single data lost in 2008. According to the Ponemon Institute's 2008 Cost of Data Breach study,

GED-i provides leading Security/Encryption solutions for enterprise's storage devices and IP networks,

ensuring data privacy even if the data was exposed or viewed by unauthorized entity.

Page 74: GED- i  Ltd

Pricing – G4Crypt

Based on link speed ( 100Mbps, 300Mbps, 600Mbps, 1Tbps) Server model may be used to connect to up to 15 clients model Basic price is per single client G4Crypt appliance used to

encrypt single link - ex. 3200$ per 300Mbs link speed Actual value of basic price is depended on the link speed Server Model price is depended on number of connected clients Price is for HW and SW – ex server for 6 clients at 300Mbs –

4200$. In special case GED-I may grant the authority to local integrator

to integrate the SW with HW

GED-I Proprietary

Page 75: GED- i  Ltd

Pricing – G4Crypt

Based on link speed ( 100Mbps, 300Mbps, 600Mbps, 1Tbps) Server model may be used to connect to up to 15 clients model Basic price is per single client G4Crypt appliance used to

encrypt single link - ex. 3200$ per 300Mbs link speed Actual value of basic price is depended on the link speed Server Model price is depended on number of connected clients Price is for HW and SW – ex server for 6 clients at 300Mbs –

4200$. In special case GED-I may grant the authority to local integrator

to integrate the SW with HW

GED-I Proprietary