SET Optimises E

advertisement
Secure E-Mail Technology (“SET”)
Confidential - June 2007
1
Disclaimer
Certain information contained in this Confidential Private Placement Memorandum (the “Memorandum”) regarding SET Ges.m.b.H. (“SET” or the “Company”) includes
forward-looking statements. Any statements that express, or involve discussions as to, expectations, plans, beliefs, assumptions, projections, objectives or future
events or performance (often, but not always, through the use of words or phrases such as “anticipates,” “expects,” “plans,” “projection,” “projects,” “believes,” “could,”
“estimates,” “intends,” and “will”) are not historical facts and may be forward-looking and, accordingly, such statements involve estimates, assumptions and
uncertainties, which could cause actual results to differ materially from those expressed in the forward-looking statements. Accordingly, there can be no assurance
that actual results will match or even come close to the forward-looking statements, and such statements are qualified in their entirety by reference to, and are
accompanied by, the factors discussed throughout this Memorandum.
Neither SET nor any of their respective affiliates, employees or representatives makes any representation or warranty, express or implied, as to the accuracy or
completeness of any of the information contained in the Memorandum or any other information (whether communicated in written or oral form) transmitted or made
available to prospective investors, and each of such persons expressly disclaims any and all liability relating to or resulting from the use of this Memorandum or such
other information by a prospective investor or any of their affiliates or representatives. Only those particular representations and warranties, if any, which may be
made by the Company to an investor in a definitive written agreement, when, as and if executed, and subject to such limitations and restrictions as may be specified
therein, will have any legal effect.
This Memorandum is submitted to prospective investors on a confidential basis for use in deciding whether to proceed with a further investigation and evaluation of the
Company in connection with their consideration of an investment in the Company. The disclosure of any of the information contained herein or supplied in connection
herewith or the use thereof for any other purpose, except with the written consent of the Company, is prohibited. This Memorandum may not be reproduced, in whole
or in part, and it is delivered to prospective investors with the understanding that it will be returned immediately on request if the recipient does not purchase the
securities offered hereby. The financial projections presented in this Memorandum represent the views of the Company Management and their current estimates of
future performance based on various assumptions which they believe are reasonable, but which may or may not prove to be correct. There can be no assurance that
the views of the Company Management are accurate or that their projections will be realized. Industry experts may disagree with these assumptions and with
managements’ views of the market and the prospects for the Company.
Neither the Company’s independent auditors, nor any other independent accountants, have compiled, examined, or performed any procedures with respect to the
projected financial information contained in the Memorandum for the Company, nor have they expressed any opinion or any other form of assurance on such
information or its achievability, and assume no responsibility for, and disclaim any association with the Memorandum for the Company.
This Memorandum has not been filed with or reviewed by, and the securities discussed herein have not been registered with or approved by, the Securities and
Exchange Commission (“SEC”) or any securities regulatory authority of any state, nor has the SEC or any such authority passed upon the accuracy or adequacy of
the Memorandum.
This Memorandum does not constitute an offer to sell or solicitation of an offer to buy any securities. The sole purpose of this Memorandum is to assist prospective
investors in deciding whether to proceed with a further investigation and evaluation of the Company in connection with their consideration of an investment in the
Company. This Memorandum does not purport to contain all information that may be material to an investor and recipients of the Memorandum should conduct their
own independent evaluation of the Company. Each recipient agrees, and the receipt of this Memorandum serves as an acknowledgement thereof, that if such
recipient determines to engage in a transaction with the Company, its determination will be based solely on the terms of the definitive agreement relating to such
transaction and on the recipient’s own investigation, analysis and assessment of the Company and the transaction.
The Company reserves the right, in its sole discretion, to reject any and all proposals made by or on behalf of any prospective investor with regard to an investment in
the Company, and to terminate further participation in the investigation and proposal process by, or any discussions or negotiations with, any prospective investor at
any time. The Company does not intend to update or otherwise revise this Memorandum following its distribution and the Company makes no representation or
warranty, express or implied, as to the accuracy or completeness of any of the information contained in this Memorandum after the date of the Memorandum.
Confidential - June 2007
2
Executive Summary
The SET Concept
The SET Team
SET Optimises E-Mail Traffic Security …
… and Empowers the Sender to Actively Monitor
the Entire Information Flow
 SET is an integrated E-Mail and messaging system
providing maximum security and the sender with full
control and authority over the information embedded
in and such attached to messages
 Christian F , 41, CEO
 Andreas W, 44, CTO
The Intended Transaction
 Raise EUR 150,000 of equity from private investors
to complete the EUR 1.2m finance requirement
according to the business plan
 SET core target customers are foremost informationsensitive corporate clients - such as finance-related
services and applications -, but also retail clients
Use of Proceeds
 SET user-friendly graphical user interface enhances
productivity and facilitates awareness of access rights
and document security
 Anticipated Exit
 SET combines proven technologies and in-house
innovation
 An operational “proof of concept” application is
available





Finalise product development and …
… prepare SET for market launch in 3Q2008
As of 2012, SET is expected to serve approximately
13,300 customers combining a total of 200,000
accounts, to generate ca. EUR 3.5m of revenues and
more than EUR 1.0m of EBIT …
… with a very dynamic growth momentum …
… which should provide the basis for an exit
opportunity via sale to a strategic investor or to the
private equity markets
The SET Alpha Version has been tested successfully since November 2005
Confidential - June 2007
3
“A typical E-Mail message is no more secure than a holiday
postcard sent through the public postal system … ”
Christian F , CEO, SET
Confidential - June 2007
4
The SET Concept
SET Secure Mail Server System
SET Optimises E-Mail Traffic Security …
… and Empowers the Sender to Actively Monitor
the Entire Information Flow

SET is an integrated E-Mail and messaging system providing
maximum security and the sender with full control and authority
over the information embedded in and such attached to
messages



Messages and confidential content – once submitted - cannot
be amended, forwarded or processed without the sender´s
authorisation and / or knowledge
The entire message flow can be actively monitored by the
sender
Optimal E-Mail traffic security because of full integration

SET core target customers are foremost information-sensitive
corporate clients, but also retail clients

SET user-friendly graphical user interface enhances productivity
and facilitates awareness of access rights and document
security

SET combines proven technologies and in-house innovation



Secure Line
Secure document access control software technology based on
proven open-source systems
Every user is enabled to (remotely) access, write or annotate
documents over an encrypted Internet connection
Documents are stored on a secure central server and access
can easily be set by authorized users even without involvement
of the IT department
Confidential - June 2007
5
SET Optimises E-Mail Security
Traditional E-Mail Traffic
SET
Numerous Moderately Secure Mail Servers
SET Secure Mail Server System
Unsecure Lines
Secure Lines
The Issues
The SET Solution
Manipulation
SET ensures that an E-Mail – once sent – cannot be
manipulated or amended by any recipient
Once sent, E-Mail with confidential content can be
forwarded to any third party without the sender either
being aware or having any control
Monitoring
SET ensures that the information embedded in or
attached to an E-Mail can only be distributed to
“authorized” third parties and E-Mail traffic can be
actively monitored by the sender
E-Mails and attachments are transmitted over the
lines (xDSL, cable, WiFi, backbone) without any
protection
Secure Transmission
100% secure E-Mail transport over encrypted SSLConnections (like bank transactions over the
Internet)
Once sent, E-Mail content can be manipulated or
amended by recipient without the sender either being
aware or having any control
Confidential - June 2007
6
The SET Team
Christian F , CEO
Andreas W, CTO
Strategy, Finance, Sales
Research & Development
Christian F , 41, is an expert in the field of electronic data
transmission and acquired his experience in the course of nearly 20
years' involvement in the field of electronic data processing and
networking.
In 1995 Andreas W and Christian F set up Alternative Telekom
AG, the first publicly listed telecom company on the Austrian Stock
Exchange. In 2000 Alternative became the second largest
alternative telecommunication company in Austria.
Within Alternative Christian F was Speaker of the Board and among others - responsible for strategy. He was involved in various
successful capital markets transactions.
Andreas W, 44, a typical entrepreneur, founded his first company in
1983 to develop electronic equipment for the polygraphic industry.
He has extensive experience in managing complex software
development projects:
• 1991: ERP (Enterprise Resource Planning) Software (still in
operation)
• 1995: Logistic Software (with Web-Interface) for waste
management (still in operation)
Within Alternative Telekom AG he was Member of the Supervisory
Board and Member of the Management Board of CyberSoft,
alternative’s voice and data billing system company.
Founding Shareholders
SET Founding Shareholders are: Alfa AG (Christian F and Andreas W); Andrea G-S and Christian S
Confidential - June 2007
7
Intended Transaction
Overview
Structural Details
 Capital Raising
 Structure
 SET intends to raise an amount of EUR 150,000 of
equity from private investors (“New Investors”) to
complete the EUR 1.2m finance requirement according to the
business plan
 Structural Overview
USE OF PROCEEDS
Personnel / Product
Development
Equipment
Sales / Admin
Other
Total
EUR
700,000
100,000
200,000
170,000
1,170,000
FUNDS AVAILABLE
EUR
Curr. Shareholders
Venture Capital
ABC Consulting
110,000
600,000
100,000
Debt
210,000
New Investors
Common Stock
150,000
Total
1,170,000
 New Investors are envisaged to subscribe an amount of
EUR 150,000 in Common Stock.
 Common Stock
 New Investors will contribute EUR 150,000 of
equity capital and post-transaction combine a total
of (xx.x)% of the shareholder capital
 Present Commitments
 Current Shareholders: LOI to contribute EUR 75,000 (in
addition to EUR 35,000 already invested)
 Venture Capital: LOI to contribute EUR 600,000
 ABC Consulting: LOI to contribute EUR 100,000
 Prerequisites
 Bank LOI to grant a loan in Q3/2009 of EUR 210,000
(based on operational target achievement)
 Funding Strategy
 SET might envisage potential additional funding rounds
to accelerate market penetration, possibly as of 2011
 Anticipated Exit
 As of 2012, SET is expected to serve approximately
13,300 customers combining a total of 200,000 accounts,
to generate ca. EUR 3.5m of revenues and more than
EUR 1.0m of EBIT …
 … with a very dynamic growth momentum …
 … which should provide the basis for an exit opportunity
via sale to a strategic investor or to the private equity
markets
Confidential - June 2007
8
“The current architecture and mechanics of E-Mail traffic do not
meet current requirements and even less future demands ….”
Andreas W, CTO, SET
Confidential - June 2007
9
How the E-Mail Traffic Works: The Postcard Comparison
“A typical E-Mail message is no more secure
than a holiday postcard sent through the public postal system … ”
Christian F , CEO, SET
The Postcard Traffic

The postcard is sent off and the sender never really knows
whether it will arrive safely …






… the postman
… the wrong recipient (if it gets to the wrong destination)
… and be passed on to persons who should neither get the
card nor become aware of the message attached





… after sending an E-Mail the sender has no further control
about the mailed content: E-Mails and attached files can be
read, printed, copied, destroyed, modified or forwarded without
the sender ever realising
And else …

The message attached to the postcard can be further
distributed on its way to the recipient and its content could
make it as „gossip“ to ones „friends“ or as „rumours“ into the
„press“
The postcard could even have been written and posted by
someone else than the one who supposedly appears to be the
sender …
… will it ever arrive?
… when will it arrive?
… will the right person receive it?
On its way, the E-Mail cannot quite be read by everyone, but …

And else …

The E-Mail is sent off and the sender never really knows
whether it will arrive safely …



… will it ever arrive?
… when will it arrive?
… will the right person receive it?
On its way, the postcard can be read by everyone …




The E-Mail Traffic
During its transfer an E-Mail and its attachments are stored on
various servers making content vulnerable
On any firm’s mail server the IT department has full access to
every E-Mail and any attached file
On the Internet a “false sender” can hide behind someone
else´s identity and send E-Mails in that other person’s name
And Spams …


Confidential - June 2007
Even if incoming E-Mails have to pass a firewall or filters, still
spam mail will be received daily; and …
… one’s E-Mail account is an open entry point for viruses,
worms and similar
10
How the E-Mail Traffic Works: Technical Basics
Traditional E-Mail Traffic
Mail Server
 Corporate (in-house)
Mail Server:
 IT department has
full access to every
E-Mail and
attachment
 Mail Server operated by
ISPs
 During the transfer
of a message
numerous Mail
Servers are
involved – in the
course of which
each and every ISP
can read, copy or
even alter E-mails
without the sender
realising
Numerous Moderately Secure Mail Servers
Backbone Network
 Even if E-Mails are
transferred securely
between the sender’s
Computer and the Mail
Server via “SSL” - there are
currently no security
mechanisms during the
exchange of messages
between Mail-Servers
 Programs called “Sniffers”
can trace E-Mails and read
messages and attachments
Unsecure Lines
Core Threats
Local Network and Internet Access line
• Without SSL communication between the sender’s
computer and the Mail Server, all transferred content is “free
and available” within the local network and on the Internet
Access line
Manipulation
Once sent, E-Mail content can be manipulated or
amended by the recipient without the sender
being aware or having any control
Monitoring
Once sent, E-Mail with confidential content can
be forwarded to any third party or processed
without the sender being aware or having any
control
Secure Transmission
E-Mails and attachments are usually transmitted
via xDSL, cable, WiFi, backbone without any
protection
Confidential - June 2007
11
Why Secure E-Mail is a Necessity: Situations
Common, Everyday Questions
“Did
the Recipient
Receive
the E-Mail?”
Special Situations
 Once an E-Mail has been sent, the sender does
not know if and when the message actually
arrived at the recipient’s destination
 Note: The “request read receipt” function of MS
Outlook does not (!) serve as confirmation
“Did
the Recipient
Read
the E-Mail?”
 Once the E-Mail has safely arrived, the
recipient may decide to read (i.e. open) or
ignore an E-Mail message and the information
attached …
 … with the sender not in a position to actively
monitor recipients actions
 Note: The “request read receipt” function of MS
Outlook does not (!) serve as confirmation
What Did
the Recipient
Do With
the E-Mail?”
 The sender has neither control nor can monitor
the recipient’s actions in respect to the E-Mail
sent and / or its attached information …
 ... E-Mails and attached information can be
copied, modified, forwarded or processed
without the sender being aware or having
control
The
“Monday
Morning
Glitch”
Remote
E-Mail
Access
The
“Identity
Game”
 As E-Mails are transferred through various
Mail Servers, transmission errors are typically
reported after several hours only and the
sender receives no information if and when a
E-Mail has successfully reached the recipient
 If Web-Mail is used to access E-Mails (e.g. on
a public Internet Terminal) then all E-Mail
content information will be (temporarily) stored
on a local server …
 … opening opportunities to all sorts of breach
and misuse of confidential information
 In the current E-Mail configuration it is
possible to hide behind a specific sender’s
identity and – hence – E-Mails can be sent
under a wrong name
Simple Mail Transfer Protocol (“SMTP”) is the standard for E-Mail transmission …
… which is a simple, text-based protocol, designed around 1970, and …
… without any real improvements over the last 35 years …
Confidential - June 2007
12
Why Secure E-Mail is a Necessity: Legal Framework
„Approaching deadlines, regulatory enforcement actions, harsh penalties, along with the prospect of
enormous civil damages and even criminal prosecution have made regulatory compliance and legal
risk management a top priority for E-Mail/messaging managers and CIOs …“
„Regulatory compliance ranks #3 on the list of top concerns of CIOs, just behind viruses and spam …“
Ferris Research (2005)
United States

Sarbanes-Oxley Act (“SOX”)








Identification and handling of information that must be kept
confidential
Identification of individual message senders
confidential transmission of email
Hardening email and other servers that store confidential
information
Tracking and logging message traffic
Auditing capabilities
Message indexing, archiving, and retention

EU Data Protection Directive


Gramm-Leach-Bliley Act (“GLBA”)


Europe
In practice GLBA´s Safeguards Rule means that
companies must implement policy enforcement tools that
can encrypt or block E-Mail traffic based on message
sender, recipient, and content as appropriate.
Data protection is all pervasive in the European Union: The
EU Data Protection Directive was drafted in October 1995
and member countries were required to legislate Directive
provisions by October 1998. The Directive sets standards
for protecting personal data within the European Union, and
applies to any organization that processes personal data, in
both public and private sectors. It also applies to foreign
entities that process personal data within the EU
An organisation has the right and duty to retain data in
order to protect itself in case of legal action. This can
include personal or private E-Mails. These, however, must
not be read by the organisation unless needed for a legal
action. The organisation must simply ensure that records
can only be used for prescribed purposes, and that it
deletes any records that contain personal data once the
required retention period has come to an end
Health Insurance Portability and Accountability Act
(“HIPAA”)

Under HIPAA everyone has the right to request the
communication flow concerning personal health information
through confidential channels
Confidential - June 2007
13
Development of World-Wide E-Mail Traffic
Statistics

Trends
World-wide
 By year end 2005 there have been more than 1bn online
users world-wide, 95% of which use E-Mail
Europe
 By year end 2005 European mailboxes will total 381m,
32% of all world-wide
 E-Mail traffic is set to rise from 26bn messages per day
in 2005, to 49bn in 2009 (17% annual growth)


E-Mail has proven to be the most used application for every
device that operates on PCs, the Internet, interactive digital TV
and – increasingly - mobile phones

Convergence is happening both in the application area with
more media-enabled, network-based services and in the
device world with technologies like the RIM Blackberry, which
integrates mobile phone and palmtop functions

Convergence and the digital world represent a significant
expansion of today’s technology marketplace
 In Europe, the past years have demonstrated how the
Internet transforms shopping (in 2004 17% of users
have shopped online), banking (18 % bank online) and
communication (E-Mail is a popular application on all
interactive channels)

Various current and newly offered services will become
significantly more popular when they are seamlessly and
securely available anywhere through a user-friendly
application
European E-Mail Statistics
400
300
200
100
0
2005
Total Mailboxes (m)
2009
Corporate Mailboxes (m)
E-Mail Users (m)
E-Mails Sent (bn)
Source: EITO 2005;
Radicati Group 2005
Confidential - June 2007
14
The Global Internet and E-Mail Security Market
Statistics


Trends
World-wide
 In 2005 the global Internet security market amounted
to about US$ 27.7bn and is expected to grow at an
annual 16% to reach US$ 58.1bn by 2010
 The global market for E-Mail security products and
services is expected to grow from US$ 3.7bn in 2005
to US$ 5.5bn by 2010; the near-term annual revenue
growth rate will hover near 25%
Europe
 The European E-Mail Security market is expected to
grow from about EUR 825M by year-end 2005, to EUR
1.4bn by 2009
European E-Mail Statistic
3.000
180
160
2.500
140
120
100
1.500
80
1.000
EUR (m)
2.000

With E-Mail traffic increasing rapidly concerns have grown
regarding security in terms of protecting against E-Mail-borne
viruses, spams and a variety of potential information leaks and
intrusion

Revenue generated in the European E-Mail Security Appliance
segment is expected to grow at an average rate of close to 50%
per year between 2005 and 2009, constituting the fastest growing
segment. Installed base attributable to this segment will grow
from 16m in 2005 to 73m by 2009

Managed E-Mail Security services are also becoming
increasingly popular, and are expected to grow at an average rate
of about 25% per year
 In Europe, the total installed base of mailboxes served by
Managed E-Mail Security Service Providers is expected to
grow from 14m in 2005 to 38m in 2009 and …
 … companies are increasingly considering Managed EMail Security Services as a long-term solution, rather than
just a quick-fix or transitional substitute
60
40
500
20
0
0
2005
Corporate Mailboxes (m)
Internet Security Market (EUR m)
2009
Managed Mailboxes (m)
E-Mail Secuity Market (EUR m)
Source: IDC 2005
Confidential - June 2007
15
Players in the Internet and E-Mail Security Market
Proposition
Document
Management
Group
Collaboration
Internet
Enabled
Services
Major Players
Comments
 Enables
organizations
to
create
centralized repositories or libraries …
 … containing all unstructured data
generated
 Powerful search and retrieval tools make
information easily available for use and
collaboration across the entire enterprise
 Typically in-house solutions
 Group-based but not document-based
access control with need for administrator
 Enables customers to quickly and easily
build secure and reliable messaging,
calendaring
and
scheduling,
and
collaborative application solutions
 Very complex software aimed at large
organizations
 Specialized training necessary to use the
group collaboration and Web folder
technology effectively
 Implementation,
installation
and
maintenance requires professional services
 Comprise different types of Internet-based
services which address specific needs for
the active Internet user
 While Hushmail and Postini solved the
specific addressed issues …
 … global Internet Enabled Services appear
to miss security features
Assessment
Closed Networks
Focus
of
Major Players
 Applications and security provided are
usually limited to applications within a
closed system
(i.e.
within
an
organisation) ….
 … leaving the external messaging flow
vulnerable
Product Focus
 System complexity requires substantial
in-house technology and IT teams …
 … with only limited service provided by
suppliers
Confidential - June 2007
Premium Price
 Due to customers focused on, i.e. large
organisations, positioned as premium
price products
16
The SET Solution
Key Features
SET Secure Mail Server System


Manipulation

Secure Line

Monitoring



Secure
Transmission

SET ensures that an E-Mail – once sent – cannot be
manipulated or amended by any recipient
Every SET user has a unique authentication - which
assures that no spam or viruses will be sent via E-Mail
No one will be able to send an E-Mail using someone else’s
identity
During the lifetime of an E-Mail the sender will have full
control over all aspects of content distribution and can
monitor all relevant E-Mail traffic
The sender allows or prevents further distribution (forward,
redirect, copy, export), the print out, storage and the
availability of the E-Mail and related documents
The owner has the right to pull back an E-Mail at any time
All E-Mails will be transferred using 100% secure Internet
links (Secure Socket Layer)
There will be no unknown connections - only one secure
point-to-point connection between the sender and the EMail server and the E-Mail server and the recipient
Positioning
Focus of Major Players
SET Focus
Closed Network
Open Standards

SET relies on open standards - transmitting data over Secure Socket Layer Technology
Product Focus
Service Focus

SET is not selling a software, but provides a unique secure E-Mail solution service ...
Premium Price
Competitive Price

... for a very competitive price
Confidential - June 2007
17
SET E-Mail Traffic: Examples





Sender uses SET like standard E-Mail
Message, Subject and Attachments are encrypted and are transferred over secure lines
Receiver is allowed to copy, print and save the message
Receiver is allowed to reply and forward the message, but must not modify the original content
Sender receives status information about all actions of the receiver






Sender uses some of the SET security functions
Message, Subject and Attachments are encrypted and are transferred over secure lines
Receiver is allowed to make a print out of the message
Receiver is allowed to reply the message, but must not modify the original content
Receiver must not copy or save the contents and is not allowed to forward the message
Sender receives status information about all actions taken by the receiver





Sender sets maximal confidentiality for the message
Message, Subject and Attachments are encrypted and are transferred over secure lines
Receiver must not copy or save the contents
Receiver must not forward or reply to the message
Sender sets validation timeframe for the E-Mail between 14. Jan. 2006 08:00 and 15. Feb.
2006 20:00. The Subject-line will not be seen by the recipient before 14. Jan. 2006 08:00; the
message can only be viewed until 15. Feb. 2006 20:00
Sender receives status information about all actions taken by the receiver

In addition: SET enables Users to transfer files without any file size limitation
Confidential - June 2007
18
SET - Functional Overview
The Server
Secure Against Physical Attacks



SET servers will be operated in
secure server-housing locations
At least two servers will be installed
on two different continents with 100%
redundancy
All data will be saved on hardwareencrypted storage systems

Hence: In the unlikely case
that a server were “stolen”,
stored data will not be
readable
The Client
Secure Against Internet Attacks





SET servers will be hidden behind
state-of-the-art firewalls and only
registered customers - with SET
Client Application - will be able to
pass the firewalls
Transmission of messages does take
place in an absolute secure way using
“Secure Socket Layer” encryption
Only secure point-to-point connectivity
between sender and server or
recipient and server are allowed
Only authenticated customers are
allowed to send messages
All data will be saved with a customer
related encryption key


Hence: Only the sender and
the recipient of an E-Mail are
able to read the content or
the attached files …
… even SET employees will
be unable to read anything
Full Control by Sender over Access Rights

During the lifecycle of the E-Mail the
sender will have full control over all
aspects of content distribution
The sender allows or prevents any
further distribution (forward, redirect,
copy, export), print out
and / or
availability of information
Sender has the right to pull back an EMail any time


Elimination of Local Filing

If requested, not a single file or piece of
information is stored on local hard-disc
All client-related information is loaded
directly from the server during startup of
the application
installable on mobile storage devices like
USB-sticks


Full Control by Sender over Access Rights

Confidential - June 2007
SET avoids Spam and Phishing Mails,
as only authenticated users have
access
19
Investor Relations: An SET Application
The Investor Relations Context
CEO
Shareholders
CFO
Board Member
The SET Solution
Accounting
IR
Treasury
PR
Controlling
…..
Board Member
Research Analysts
Stock Exchange
Stakeholders
Press
Employees
Internal Communication
 If a secure IT environment is already in place, then the
established system will be used further on
 If not, then SET will be used for all relevant communication
between Supervisory Board, Board members, senior staff
positions and Accounting, Treasury and Controlling to ensure
absolute confidentiality in-house and tracking of document flow
External Communication
 All external communication of relevant documents will be
executed via SET:
 Shareholders
 All documents to accomplish a company’s legal
disclosure requirements (eg. Ad-Hoc Releases) shall be
transmitted via SET to companies like DGAP, Hugin,
Bloomberg, Reuters, etc. to guarantee confirmable,
simultaneous delivery
 Professional Services
 All non-disclosed documents which have to be shared
with Investment Bankers, Lawyers, Auditors, Advisors
etc. shall be routed via SET to ensure verifiable
transmission and authenticity - furthermore all parties are
able to check the document flow at any time
Confidential - June 2007
20
Target customers
Corporate Clients
Service
Package


Direct Corporate Clients
Retail Distributors
CFO Offices
and
Investor Relations Teams
Telecom Service Providers
and
Internet Service Providers
SET E-Mail Client-Software
Consulting Service


Full operational services and
maintenance provided by SET
SET-operated call centre and
Help Desk

Direct sales - One-on-One

Sales
and
Distribution
Revenue
per E-Mail p.m.



Maintenance
and
Support



Retail Clients
EUR 8.50 per E-Mail address


Direct Retail Clients
“Branded” SET E-Mail ClientSoftware for customers of
Telecoms/ISPs
If requested “SET Server”Application

SET E-Mail Client-Software
All operational services and
maintenance provided by SET
All direct end user-related
services provided by respective
Telecom/ISP

Full operational services and
maintenance provided by SET
Support through SET Web-Site
Direct sales - One-on-One to
Telecoms/ISPs …
… whereby end user has contract
with chosen Telecom/ISP


One-To-Masses
Internet-Sales via fully automated
Sales-System
EUR 2.50 per E-Mail address …
… based on anticipated revenue
split

EUR 5.00 per E-Mail address

The SET Read-Only Function for E-Mails received via SET can be downloaded for FREE from the SET Website
Confidential - June 2007
21
Product features
“Single ClientApplication”

The application
consists of just one
file, which can be
stored easily on
mobile devices like
USB-sticks (no
complicated InstallMechanism)
Standard
E-Mail Functions


Sending “New”,
“Reply-To” and
“Forward” messages
Receiving already
“filtered” and
(individually-defined)
category-sorted by
selected criteria
Advanced
E-Mail Functions






SET direct respond: when E-Mail sent to an unknown EMail Account, sender receives immediate response from
server
If E-Mail is “forwarded” or “replied to” original message
content cannot be modified and a visible timestamp will
be set in the E-Mail
Sender has the possibility to withdraw an E-Mail at any
time
Timed E-Mail: Set exact time for E-Mail message to
appear in recipient’s E-Mail box
Temporally Available E-Mails: Set time frame for E-Mail
message to appear in recipient’s E-Mail box
Message Status: Sender can trace entire E-Mail
circulation and the current location









Application
Functions




Unlimited attachment
file size
Drag and drop support
Live resizing of
windows
Support for long file
names
Received Notification
Received Subject Line
Received Message
Received Message-Counter
Current Location
Forwarded To
SET active communication: Server able to establish
client connection actively notify user (e.g. “New
Message has Arrived”-note is actively sent by server)
All relevant parts of the E-Mail and its attachments are
encrypted
Server-side address book
Confidential - June 2007
22
SET - Product Building Blocks
Product Development
Sales & Distribution
Maintenance & Service
Achieved
 Market research
 Detailed definition of SET E-Mail
Client functionality
 Detailed definition of SET E-Mail
Server functionality
 Sample Client- and Server Application
for Windows, Mac OS X and Linux
The SET Alpha Version
has been tested successfully
since November 2005
Next Steps










Coding of final SET Secure Mail
Client Solution
Coding of final SET Secure Mail
Server Solution
Internal documentation
Software Quality Assurance
In-House Beta Test Phase
End User documentation
Select final Hardware Platform for
Servers
Select Server Centers (Europe,
America, Asia)
“friendly” customers Test Phase
Final Release 1.0







End-User Web-Site
Online registration for SET Service
Preparation of marketing materials for
all sales channels
Setup and Implementation of
international Sales
(Telecommunication Companies and
Internet Service Providers)
Setup and Implementation of
“Professional Services” Sales (CFOs
and Investor Relation Departments of
public listed companies)
Setup and Implementation of “public”
Sales
Setup of Accounting and Billing
Confidential - June 2007




Definition of Quality of Service
Agreement with Server Centers
Definition of Quality of Service
Agreement with Hardware vendors
Setup of Call Center (Germanspeaking)
Setup of Call Center (Englishspeaking)
23
SET - Implementation Time Table
Maintenance
& Service
Sales &
Distribution
Product Development
2005/2006
2007
2008
2. HY 2008
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4 5 6
Market research
Preparation of Businessplan
Definition of functionality
Development of Sample Application
Coding of "final" Application
Internal Documentation
Software Quality Assurance
In-House Beta Testing
End User Documentation
Server Hardware selection
Server Center selection
"friendly customer" Beta Test
final 1.00 Release
Web-Site design
Development of Online registration
Preparation of marketing material
Implementation International Sales
Implementation "Professional Services" Sales
Implementation Public Sales
Setup of Accounting and Billing
QoS Agreement Server Centers
QoS Agreement Server Hardware vendors
Call Center (German-speaking)
Call Center (English-speaking)
Confidential - June 2007
24
Financial Overview - Assumptions
Revenues
Operations
Secure Mail Service – Corporate Customers






Commencing July 2008 with five business customers
Signing up five additional customers per month with an additional growth
rate of 3% per month
Addresses business customers with at least 30 mail accounts
For each account SET charges EUR 8.50 per month
We do not assume any price decreases over time, as SET will provide
more service to the customers
Nevertheless we assume a decrease in the average number of accounts
per customer by -1% per month; stopping at 16 accounts per customer


SET will operate (rent rack
space) one technical server
center in Europe and one in
North America
Billing will be outsourced



Personnel Costs


SET E-Mail Technology - ISPs




Development and SG&A
Commencing October 2008 with one ISP customer
Signing up one additional ISP customer per quarter
Address ISPs with at least 50,000 mail accounts in operation
For each new ISP 1% of its accounts will start to use the SET Secure Mail
Service
Each month 1%+ of ISP’s accounts start to use SET Secure Mail Service,
up to a maximum of 10% of all users per ISP
For each account (once in use) SET charges EUR 2.50 per month
We assume a price decrease of 1% per month, stopping at EUR 1.00 per
month.
Starting in 2007 SET will
employ one software
developers and one technical
admin. After being fully
operational two persons to
be in charge of the Help Desk
(US/EU), one administration
secretary, one person Sales
ISP and one person Sales
Business will be employed
In line with growing account
numbers additional personnel
will be employed
Sales Expenses



ISP customer acquisition
costs: EUR 5,000 per
customer
Business customer
acquisition costs: EUR 900
Public customer
acquisition costs: EUR 20
Secure Mail Service – Retail Customers





Commencing Juli 2008 with 500 customers
Signing up 100 additional customers per month with an additional growth
rate of 3% per month
SET addresses everyone around the Globe for this service
For each account SET charges EUR 5.00 per month
We do not assume any price decreases over time, as we will give more
service to the customers
Confidential - June 2007
25
Financial Overview – Income Statement
P&L Statement
2007
2008
2009
2010
2011
2012
2013
2014
46.768
629.828
1.706.694
2.600.208
3.537.338
4.591.207
5.889.657
direct operational costs
21.437
160.785
388.280
597.233
830.493
1.104.869
1.452.816
Gross Margin 1
Gross Margin 1 (%)
25.331
54%
469.043
74%
1.318.414
77%
2.002.974
77%
2.706.845
77%
3.486.338
76%
4.436.841
75%
71.500
534.085
809.777
1.000.406
1.240.711
1.500.579
1.694.333
1.948.649
EBITDA
EBITDA (%)
-71.500
-9999%
-508.754
-2008%
-340.734
-73%
318.007
24%
762.263
38%
1.206.266
45%
1.792.004
51%
2.488.192
56%
Depreciation
EBIT
EBIT (%)
1.250
-72.750
-9999%
56.503
-565.257
-2231%
92.667
-433.401
-92%
107.694
210.313
16%
122.667
639.596
32%
135.167
1.071.099
40%
58.552
1.733.452
50%
51.000
2.437.192
55%
Interest paid
Net Profit/Net Loss
-72.750
-565.257
9.144
-442.545
12.843
197.470
438
639.159
1.071.099
1.733.452
2.437.192
Tax
Profit/Net Loss
Profit/Loss cum
-72.750
-72.750
-565.257
-638.007
-442.545
-1.080.552
197.470
-883.082
639.159
-243.924
166.078
905.021
827.175
337.547
1.395.906
2.560.628
476.069
1.961.123
4.997.820
Revenues
Revenue (EU)
Costs
OPEX
Confidential - June 2007
26
Financial Overview – Balance Sheet
Balance Sheet
2007
2008
2009
2010
2011
2012
2013
2014
13.750
263.747
219.080
163.385
91.719
7.552
Current Assets
382.800
167.881
33.499
235.172
955.238
2.034.229
3.550.168
5.661.251
Total Assets
396.550
431.628
252.579
398.558
1.046.956
2.041.781
3.550.168
5.661.251
349.750
321.993
-120.552
76.918
716.076
1.621.098
3.017.003
4.978.126
46.800
109.635
373.131
321.640
330.880
420.684
533.165
683.124
396.550
431.628
252.579
398.558
1.046.956
2.041.781
3.550.168
5.661.251
Assets
Non-Current Assets
Equity and Liabilities
Equity
Liabilities
Equity and Liabilities
Note: The negative Equity position in 2009 is covered by a Bank Loan (EUR 210.000)
Confidential - June 2007
27
Financial Overview – Cash Flow Statement
Cash Flow Statement
2007
EBIT
Depreciation
EBITDA
Cash Flow from operating activities
-72.750
1.250
-71.500
-30.683
Cash Flow from investing activities
2008
2009
2010
2011
2012
2013
2014
-565.257
56.503
-508.754
-471.215
-433.401
92.667
-340.734
-310.355
210.313
107.694
318.007
357.782
639.596
122.667
762.263
825.727
1.071.099
135.167
1.206.266
1.074.438
1.733.452
58.552
1.792.004
1.487.732
2.437.192
51.000
2.488.192
2.049.153
-15.000
-306.500
-48.000
-52.000
-51.000
-51.000
-51.000
-51.000
Cash Flow from financing activities
422.500
537.500
210.000
-122.500
-87.500
Cash Flow
Cash Flow cum
376.817
376.817
-240.215
136.602
-148.355
-11.753
183.282
171.529
687.227
858.756
1.023.438
1.882.194
1.436.732
3.318.926
1.998.153
5.317.079
Confidential - June 2007
28
Download