Documente Academic
Documente Profesional
Documente Cultură
About Espion
Our Technology
Home
About Espion
Our Technology
Su
ESPION PROBABILISTIC
REASONING (EPR) ENGIN
Douglas Sherrod
emails and spam. Independent third party testing results show the Interce
performance.
CEO and Chairman of Board
Espion International, Inc.
PROACTIVE
WHICHso
IS
The Espion Probabilistic
Reasoning
integratesvs.
theREACTIVE
industrys -leading
7117 Florida
Avenue (EPR) engine
While most companies battle spam with a reactive approach, we prefer u
Baton Rouge, LA 70806
a compact, efficient, and highly effective securityMercury
solution.
This unique, proprietary te
with over 2600 unique heuristic tests and a proprietary A.I based
(225) 293-5252
you. These features literally eliminate the need for creating complex rules
Interceptor to learn and adapt to an organizations
email flow without slowing or grow
Spam patterns are ever-changing and reacting to spam/security threats u
TABLE OF CONTENTS
Home
About Espion
Our Technology
OPERATIONS ........................................................................................................................................................................19
emails and spam. Independent third party testing results show the Interce
PRODUCTION
........................................................................................................................................................................
19
performance.
Mercury with over 2600 unique heuristic tests and a proprietary A.I based
you. These features literally eliminate the need for creating complex rules
patterns. As time goes on, the Interceptor's AI engine only gets more effe
it did the day it was installed.
In addition, MX Mercury boasts of having
EXECUTIVE SUMMARY
Home
About Espion
Our Technology
Business Description - Espion International Inc. (Espion, the Company, we, our, or us)
develops, markets, and sells email security1 solutions providing both Inbound
comprehensive
inboundContent
Email
protection (anti-spam, anti-virus, anti-hacking) as well as outbound email protection and management
(encryption, archiving, content based filtering, policy enforced encryption - HIPAA/ GLIBA/ SOX). Our
ESPION PROBABILISTIC REASONING (EPR)
solutions include an appliance product sold to business customers available in a single low cost unit
as well as a cloud based SAAS (software as a service) solution. Easy The
toEspion
plug
in, start
up(EPR) and
Probabilistic
Reasoning
engine integrates the industry
efficient,
highly effective
security solution. This unique, pr
manage, our appliances and cloud based solutions accurately filter overa compact,
99.9%
ofandspam,
scams,
Interceptorinbound
to learn and adapt
to an organizations
phishing, viruses, spyware and electronic intrusions which threaten a customers
email
flow at email flow without slow
been effectively applied in an email gateway security platform (MX Mercu
a comparatively low cost.
organizations with regulatory compliance in areas such as HIPAA, GLBA
Technology -The Companys products and solutions utilize a proprietary artificial intelligence based
algorithm called Espion Probabilistic Reasoning (EPR) which deciphers between spam and approved
email by using a constantly evolving set of spam signatures that are machine learned. In addition, the
spam engine uses information specific to each customers email flow and actually learns the syntax
and semantics of end users within the organization, making its user profiling based learning system
extremely accurate and cost effective. The highly accurate and cost saving EPR technology sets the
Company apart from its competitors.
Products: Appliances and Cloud Based- The Companys flagship product is called the Interceptor,
which combines proprietary software bundled with a rack mounted server to provide an appliance
solution (see picture below) which is deployed at the customers network firewall. The product provides
a total email security solution by packaging its anti-spam with anti-virus and anti-hacking capabilities
along with secure outbound email management via encryption, HIPAA, GLBA and Sarbanes-Oxley
compliance modules which the customer can order as additional features 2.
Having a separate
appliance at the networks gateway to scan for spam, viruses and hacking attempts takes the
processing load off the email server, preventing it from crashing and thus prolonging its life.
Additionally, appliances are easier to deploy and manage than software solutions, and offer peace of
mind to companies that do not want to outsource their messages. As such, it is the fastest growing
segment of the email security market.
More recently, the Company has also entered the SaaS (Software as a Service) segment of the
email security market. Hosted solutions offer customers with minimal upfront costs since there is no
hardware to buy and deployment to administration is virtually maintenance free, since all of the
(+)Enlarge Image
hardware is located at a datacenter. Espion has built its Interceptor software to run as a hosted
solution, allowing multiple administrators to run and manage their respective
email
accounts
The EPR engine
is hyperseeded
(loaded) from
with collective knowledge of wi
emails
and spam. Independent
third party This
testing results show the Interce
within the same hardware unit, hence making each unit able to house several
customers
at once.
allows Espion to pass the savings onto their customer and become priceperformance.
competitive as a hosted
solution. Espion is uniquely positioned to take advantage of the race to the cloud going on today as
REACTIVE
IT budgets are cut and customers look for greater capabilities and ease of PROACTIVE
use from the vs.
SaaS
based - WHICH IS
Whileamost
companies battle
with a reactive approach, we prefer u
model. In addition the hosted (or SaaS solution) is one which doesnt require
customer
tospam
purchase
over 2600 unique heuristic tests and a proprietary A.I based
software, but rather use it as a service, where it is resident remotely at aMercury
datawithcenter,
allowing the
you. These features literally eliminate the need for creating complex rules
customer to use the solution on demand. The SaaS model also relieves theSpam
customer
from having to
patterns are ever-changing and reacting to spam/security threats u
constantly upgrade and monitor the software in house, often reducing IT internal
support
costs.
issue temporarily. MX Mercury,
on the other hand, adapts to your organiz
patterns. As time goes on, the Interceptor's AI engine only gets more effe
it did the day it was installed.
In addition, MX Mercury boasts of having
1 E-mail security is defined as any software, appliance, or hosted service that filters and protects against spam
(defined as unwanted or unsolicited electronic mail), viruses, and other e-mail related threats.
2 Out bound email management is used by most companies to regulate the content and availability of
information from being disseminated from their networks. Certain governmental regulations have been enacted
to protect sensitive customer information HIPAA for healthcare organizations, GLBA for financial institutions
and Sarbanes-Oxley for the protection and archiving of corporate emails and records sent between management
and its auditors
2010 Espion International, Inc. All Rights Reserved.
Industry Outlook - Spam is a major security threat and financial drain for organizations
worldwide,
Home
About Espion
Our Technology
Products & Servic
costing an estimated $130 billion per year. Organizations poorly protected against e-mail threats pay
a high price, loosing millions of dollars in extra IT costs, productivity costs, network downtime,
bandwidth costs, and more.
Inbound Email Content
Worldwide revenue in the email security market is expected to grow from $4.4 billion in 2009, to $6.7
PROBABILISTIC
REASONING
(EPR)
billion in 2013, according to Radicati Group. Additionally, the appliance ESPION
and hosting
segments,
in
which the Company participates, have been and continue to be the fastestThegrowing
segments of the
Espion Probabilistic Reasoning (EPR) engine integrates the industry
market.
a compact, efficient, and highly effective security solution. This unique, pr
been effectively
applied in an email gateway
security platform (MX Mercu
Research Analyst Richi Jennings with the Ferris Group, indicates that the HIPAA
compliance
market
organizations with regulatory compliance in areas such as HIPAA, GLBA
represents an additional relatively new $1.5 Billion market that Espions [MX] Lock with encryption
product is directly targeting.
Strategic Vision/Market Opportunities Espion has been a research and development operation for
the past five years since its founder, David C. Burdsall passed away in 2005. During this period we
have undergone a change in control and have made significant improvements to our products and
technology. During these past few years our R&D team has kept our products up to date and on the
cutting edge of our industry and market. With the recent hiring of our new CEO, Douglas Sherrod, the
Company is now poised to ramp up sales. Mr. Sherrod has many years of experience in helping place
companies such as Espion on the map by building sales and marketing teams largely from internal
cash generation. Mr. Sherrod has put forth a very conservative and achievable near term business
plan as well as longer term projected objectives. Through strategic and cost effective lead generation
via the use of previously engaged call centers located in India and local marketing and advertising
already under way under Mr. Sherrods leadership, Espion is in the enviable position of becoming a
very fast growing email security company with proven products and a highly scalable technology which
will become very appealing to the larger industry players. Our strategic vision is to leverage our
feature rich and competitive product lines and further penetrate into the replacement appliance
market 3. Initially and further develop our hosted solution so that we can compete with the SaaS or
software as a service vendors once we have achieved a critical mass in sales via our direct and
indirect sales efforts in penetrating the replacement market.
Our goal is to achieve revenue growth in the coming 2011 fiscal year alongside upgrading our public
listing of our common stock to that of a fully reporting company. By becoming fully reporting which
calls for corresponding greater financial and operational transparency on a quarterly basis will allow
(+)Enlarge Image
Espion greater access to growth capital through the sale of equity and debt securities. We anticipate
that our common stock will recommence trading once again in the second quarter
of fiscal year 2011.
The EPR engine is hyperseeded (loaded) with collective knowledge of wi
We are confident that we will be able to bring liquidity to our current shareholders
upgrading
ourresults show the Interce
emails and spam.by
Independent
third party testing
performance.
listing (to fully reporting status) and with the corresponding growth anticipated
to our sales revenues in
the next six to twelve months, our market value is likely to increase, making ownership in our stock a
PROACTIVE vs. REACTIVE - WHICH IS
value for old as well as future investors.
Mercury with over 2600 unique heuristic tests and a proprietary A.I based
you. These features literally eliminate the need for creating complex rules
patterns. As time goes on, the Interceptor's AI engine only gets more effe
it did the day it was installed.
In addition, MX Mercury boasts of having
Company Overview
Home
About Espion
Our Technology
Email
Espion International is a 7 yr old maker of hardware based, vm-ware based, Inbound
and cloud based
emailContent
security products using highly efficient and proprietary artificial intelligence algorithms providing in
ESPION
PROBABILISTIC
REASONING (EPR)
bound security against spam, viruses and hacking attacks and outbound
compliance
and data
security using auto-encryption. With over 150 customers spanning large organizations including
The Espion Probabilistic Reasoning (EPR) engine integrates the industry
Computer Science Corporation (NYSE: CSC), the U.S. Department of Homeland
Security, major
a compact, efficient, and highly effective security solution. This unique, pr
hospitals to small Physicians offices seeking a cost-effective encryption solution,
our
products have
Interceptor to learn and adapt to an organizations email flow without slow
been commercially deployed for the past six years, protecting over 12 million
boxes
worldwide.
been email
effectively applied
in an email
gateway security platform (MX Mercu
with regulatory
compliance
in areas such as HIPAA, GLBA
Our customers have remained loyal to us since 2004, renewing their licensesorganizations
each year.
With
a newly
hired management team in place after undergoing a change of control, Espion is now poised for
aggressive sales growth and is ready to build a pre-eminent sales and marketing team to capture
market share in the maturing replacement email security appliance marketplace and in becoming a
notable contender in the cloud based security sector, both sectors which are experiencing continued
above average growth in the IT industry through the next 4 to 6 years.
Espion International, Inc. was originally founded in 2003 and is currently has offices in Baton Rouge,
LA. The Company is organized as a C Corporation domiciled in the state of Nevada, which wholly
owns Espion, LLC and INTLX, LLC, two Louisiana based limited liability companies which are the
operating companies.
Espion was initially funded with $500,000 from its founding members and further funded with an
additional $1.8 million in cash for operations and advances made for start up expenses paid by three
private investment firms. This capital has been utilized in a practical application of the proof of concept
and for marketing for over 200 customers, including Fortune 100 corporations, hospitals, state
governments, and universities are now using Espion Interceptors for their complete email security
needs.
PROACTIVE
Simple we have developed products that are simple to use, simple to install,
and havevs.
noREACTIVE
complex - WHICH IS
maintenance requirements. We also offer our customers with state of While
themostart
technical
companies
battle spam support
with a reactive approach, we prefer u
Mercury with over 2600 unique heuristic tests and a proprietary A.I based
available 24/7 year round.
you. These features literally eliminate the need for creating complex rules
Secure our products are secure and operate on a hardened kernel, making
our system virtually
issue temporarily. MX Mercury, on the other hand, adapts to your organiz
impenetrable.
patterns. As time goes on, the Interceptor's AI engine only gets more effe
it did the day it was installed.
In addition, MX Mercury boasts of having
Home
Industry Background
About Espion
Our Technology
With the global adoption of the Internet, the use of electronic messaging The
has
become
a ubiquitous
Espion
Probabilistic Reasoning
(EPR) engine integrates the industry
a compact,
efficient, and According
highly effective security
communication tool and a mission critical application for the conduct of
business.
tosolution. This unique, pr
Interceptor to learn and
adapt toboxes
an organizations
estimates by International Data Corporation, or IDC, by 2011 the number of worldwide
email
will email flow without slow
been effectively applied in an email gateway security platform (MX Mercu
be 1.6 billion, and the number of person-to-person email messages sent worldwide
will be more than
organizations with regulatory compliance in areas such as HIPAA, GLBA
9.1 trillion. Surveys by market research firm META Group estimate that 80% of business people
believe email is more valuable than the telephone for business communication. In addition to email, a
wide variety of other forms of electronic messaging have emerged and are increasingly embraced by
businesses, including instant messaging, or real-time messaging through the Internet, and Short
Messaging Service (SMS), or short text messaging through mobile phones, two-way pagers, personal
digital assistants and other mobile devices.
Increasing threats to electronic messaging.
The widespread adoption of electronic messaging has made securing and managing the messaging
infrastructure increasingly important, complex and costly. The messaging standards originally adopted
by the public Internet were not optimized to address concerns for security, privacy and fraud. As a
result, the existing infrastructure is susceptible to security attacks, which compromise and threaten the
utility of electronic messaging. Frequently encountered messaging security threats include:
spam, or unsolicited or unwanted bulk email, generally sent by individuals or organizations that send
mass emails to a specified list of email addresses;
viruses, or malicious code designed to disrupt computer systems or steal confidential information;
and
fraudulent email, or email that mimics legitimate corporate communications for the purpose of
stealing personal or financial information.
(+)Enlarge Image
emails and spam. Independent third party testing results show the Interce
performance.
We believe the proliferation of spam is one of the most severe and challenging
electronic messaging
security threats faced by businesses today. Spammers rapidly evolve techniques to circumvent efforts
aimed at stopping them. The proliferation of spam is driven largely by PROACTIVE
its potential vs.
to REACTIVE
generate - WHICH IS
While most
companies
battle spam with afor
reactive
attractive profits for spammers. Email allows a spammer to reach individuals
and
businesses
a approach, we prefer u
Mercury with over 2600 unique heuristic tests and a proprietary A.I based
fraction of the cost of using any other communication vehicle because the spam
market has almost no
you. These features literally eliminate the need for creating complex rules
barriers to entry and the marginal cost of sending additional emails is almostSpam
zero.
In addition, hackers
patterns are ever-changing and reacting to spam/security threats u
and spammers increasingly use spam to introduce viruses into business
networks
steal
issue temporarily. MX Mercury,and
on the other
hand, adapts to your organiz
patterns. As sent
time goesan
on, theaverage
Interceptor's AI engine
confidential information from businesses. According to IDC, in 2009 spammers
of only gets more effe
it did the day it was installed.
15.5 billion emails per day, and spam as a percentage of overall Internet email
traffic will grow from
35% in 2006 to 67% in 2011.
In addition, MX Mercury boasts of having
Spam is a dynamic problem. Techniques frequently used by spammers include deliberately obscuring
the identity of the email sender, implementing false unsubscribe mechanisms to validate an email
address and harvesting email addresses published on the Internet. Spammers target virtually anyone
with a valid email address, across any geography or industry. Moreover, spam campaigns often
involve large volumes of emails sent repeatedly, which tax network and server bandwidth and allow
the perpetrators to rapidly evolve the form and content of the message traffic to evade new spam
2010 Espion International, Inc. All Rights Reserved.
Many jurisdictions in the United States and abroad have enacted legislation attempting to solve the
ESPION
PROBABILISTIC
REASONING
(EPR)
spam problem. While legislation has been an important driver toward raising
public
awareness
of
spam and may act as a deterrent, legislation alone will not solve the spam problem. Governments
The Espion Probabilistic Reasoning (EPR) engine integrates the industry
have difficulty prosecuting across jurisdictions and have typically placed enforcing
spam laws at a
a compact, efficient, and highly effective security solution. This unique, pr
lower priority. In addition, the international portability of spam operations andInterceptor
the ability
ofadapt
spammers
to email flow without slow
to learn and
to an organizations
effectively applied
an email gateway security
remain anonymous has meant that an effective technology solution in been
addition
to inlegislation
is platform (MX Mercu
organizations with regulatory compliance in areas such as HIPAA, GLBA
necessary to address the spam problem.
Spam causes significant challenges for businesses
The proliferation of spam and the need to block it has created a number of significant challenges for
businesses, including:
Lost productivity. The productivity loss caused by the time employees spend separating legitimate
email from spam or responding to spam is growing increasingly significant.
False positives. The cost of false positives, or the inappropriate blocking of legitimate messages by
spam filtering systems, may result in loss of sales or critical information.
Strain on IT resources. Spam taxes the technology infrastructure by utilizing network, server and
storage resources, potentially requiring organizations to purchase additional systems and devote more
personnel to manage them.
Damage to corporate brands. Techniques have emerged, such as phishing, where spammers
create messages designed to resemble a message from a legitimate business, which not only places
the recipient at risk, but also damages the trust in the business corporate brand.
Increased risk of workplace liabilities. Spam often contains or directs users to offensive content,
which may create an uncomfortable or hostile work environment and result in greater liability risks for
businesses.
(+)Enlarge Image
Increased customer churn for messaging service providers. If email accounts become flooded with
spam, customers may become dissatisfied with the messaging service provider,
thereby
increasing
The EPR engine
is hyperseeded
(loaded) with collective knowledge of wi
emails and spam. Independent third party testing results show the Interce
customer support costs and risk of service termination.
performance.
These challenges result in significant costs for businesses. According to Ferris Research, a consulting
PROACTIVE
firm, the aggregate cost due to these spam threats for American corporations
exceeded vs.
$10REACTIVE
billion in - WHICH IS
While mostmechanism
companies battle spam
with other
a reactive approach, we prefer u
2011. These costs do not take into account spam techniques used as a delivery
for
Mercury with over 2600 unique heuristic tests and a proprietary A.I based
threats, such as viruses and fraud.
you. These features literally eliminate the need for creating complex rules
patterns. As time goes on, the Interceptor's AI engine only gets more effe
it did the day it was installed.
The proliferation of spam, compounded by the severity of email related security threats, presents a
In addition, MX Mercury boasts of having
formidable challenge for businesses as they look to maintain a secure environment,
contain costs and
realize the benefits of a messaging platform. As a result, businesses require a messaging security
solution that can address these challenges. An effective solution must:
identify and prevent spam, viruses and fraudulent email from entering the core network;
minimize false positives;
2010 Espion International, Inc. All Rights Reserved.
Home
About Espion
Our Technology
limit the management and administrative cost required to maintain control over the rapidly evolving
spam tactics and messaging threats;
support the wide variety of hardware, software and messaging applications and protocols typical of
the technology infrastructure; and
Encryption Market
Email is a mission-critical means of communication for enterprises. However, if email leaves a secure
network environment in clear text, it can be intercepted along the path between a sender and a
recipient, which permits theft, redirection, manipulation, or exposure to unauthorized parties. Failure to
control and manage such risks can result in enforcement penalties for noncompliance under numerous
different regulations. Healthcare organizations are primarily concerned with the recent changes to the
Health Information Portability Accountability Act (HIPAA) introduced via the Health Information
Technology for Economic and Clinical Health (HITECH) Act of 2009. Financial institutions are
concerned with Gramm-Leach-Bliley Act (GLBA). In addition, individual states such as
Massachusetts and Nevada have recently introduced state laws regulating email encryption. Failure to
manage the risks associated with email can also lead to decreased productivity, damaged reputation,
competitive disadvantage, a loss of intellectual property or other corporate assets, exposure to
negligence or liability claims, and diversion of resources to repair such damage.
The most recent estimate we have puts the market at $120 million in 2011.
(+)Enlarge Image
Even though there are still many security solutions focused on a single type
of security threat, the
emails and spam. Independent third party testing results show the Interce
overall trend is to offer a complete package that protects against multiple
threats.
Most popular
performance.
solutions, today, offer anti-spam/anti-virus, content filtering, encryption and some Data Loss
PROACTIVE
REACTIVE
Prevention (DLP) capabilities integrated together. These complete solutions
are often vs.
made
up of - WHICH IS
technology components sourced from multiple OEM suppliers. The key is that
they
are
available
While most companies battle spam with afrom
reactive approach, we prefer u
a single vendor, and all capabilities are managed centrally.
Mercury with over 2600 unique heuristic tests and a proprietary A.I based
you. These features literally eliminate the need for creating complex rules
patterns. As time goes on, the Interceptor's AI engine only gets more effe
it did the day it was installed.
In addition, MX Mercury boasts of having
Product Overview
Home
About Espion
Our Technology
Espion provides both standalone appliances as well as hosted solutions for inbound email security as
Inbound
EmailitsContent
well as outbound content policy management and email encryption. Espion
recently extended
Interceptor line to offer customers more targeted solutions, creating the i-series and e-series.
Additionally the company recently introduced its software as a service solution.
ESPION PROBABILISTIC REASONING (EPR)
emails and spam. Independent third party testing results show the Interce
performance.
Mercury with over 2600 unique heuristic tests and a proprietary A.I based
you. These features literally eliminate the need for creating complex rules
patterns. As time goes on, the Interceptor's AI engine only gets more effe
it did the day it was installed.
In addition, MX Mercury boasts of having
Home
About Espion
Our Technology
Espions EPR AI technology uses a proprietary algorithm to intelligently determine the true nature of
Inbound
SMTP traffic, rather than relying solely on rule-based techniques. This proactive
approachEmail
gives ourContent
product greater speed and accuracy in making determinations
on spam iterations which can typically
Search Site: Search...
fool a signature based heuristic solution. Each email is analyzed to see if itESPION
meetsPROBABILISTIC
criteria specific
to
REASONING
(EPR)
legitimate email, spam or other harmful traffic.
Home
About Espion
Our Technology
Support
Partners
Contact
Related Links
Solutions
Resources
10
Home
About Espion
Our Technology
Inbound
Email
All outbound emails (Plain Text SMTP Traffic) leaving a customers organization
are scanned
by theContent
Interceptor's MX Lock module. If an email matches content policies established by the IT administrator
or if our HIPAA, GLBA and/or SOX module has been
ESPION PROBABILISTIC REASONING (EPR)
purchased and content is determined by our EPR system
The Espion Probabilistic Reasoning (EPR) engine integrates the industry
of triggering either of these policies or regulations, the
a compact, efficient, and highly effective security solution. This unique, pr
email is automatically encrypted and stored on-disk. A
Interceptor to learn and adapt to an organizations email flow without slow
secure link is then sent out to the recipient via email.
been effectively applied in an email gateway security platform (MX Mercu
Upon receiving this email, the recipient can click on the
organizations with regulatory compliance in areas such as HIPAA, GLBA
secure link and view the email (plus any attachments)
over a secure, 1024-bit encrypted SSL tunnel in a safe
web portal. An illustration of our email encryption system
is shown on the next page.
MX Lock employs a proprietary dual-key locking system
with 1024-bit encryption. Both keys are required to
access an email. MX Lock is simply the strongest email
encryption available.
MX Lock administers a feature-rich environment of
customizable controls that enable forced compliance to
custom IT policies on outbound email. Outbound email is
encrypted using dual-key encryption, a method used by
many governmental agencies and the military, ensuring
the highest level of customizable security for email
carrying confidential and proprietary information.
Additionally, MX Lock validates the recipient using an
identity management system which can be customized to
meet your company's security needs. Upon receipt and
successful recipient validation, an email can be viewed in
any web browser installed on any operating system and
does not require additional software installation by the
recipient.
(+)Enlarge Image
you. These features literally eliminate the need for creating complex rules
11
(+)Enlarge Image
emails and spam. Independent third party testing results show the Interce
performance.
PROACTIVE
In addition, our encryption feature is offered as a device license. In other words,
there arevs.
noREACTIVE
per-user - WHICH IS
While most companies
spam with
a reactive
or per- message fees involved with our system. These provide a terrific reduction
to thebattle
Total
Cost
of approach, we prefer u
2600 unique heuristic tests and a proprietary A.I based
Ownership (TCO). MX Lock is available as a standalone appliance or asMercury
partwithofoverour
Hosted/SaaS
you. These features literally eliminate the need for creating complex rules
product offering known as the Paladin MX.
Spam patterns are ever-changing and reacting to spam/security threats u
patterns.
As time goesif
on, and
the Interceptor's
Furthermore, these policies can be configured to notify the proper internal
authority
whenAI engine
a only gets more effe
it did the day it was installed.
violation is triggered.
In addition, MX Mercury boasts of having
12
Home
About Espion
Our Technology
Interceptor to learn
adapt to -an Section
organizations email flow without slow
Complying under the Health Insurance Portability and Accountability Act (HIPAA)
of and
1996
been effectively applied in an email gateway security platform (MX Mercu
13400 and the Health Information Technology for Economic and Clinical Health
(HITECH/ARRA)
Act of
organizations with regulatory compliance in areas such as HIPAA, GLBA
2009 - Section 13400, all outbound email and file attachments MUST be sent securely and encryption
is the best method. MX Lock comes fully equipped with a HIPAA encryption engine (also known as the
Intelligent Content Scanning engine) and allows for customizable compliance rules that can be
uniquely tailored to meed our customers business needs. The IT administrator can implement specific
rules to force encrypt emails based on their content or he/she can let the HIPAA encryption engine do
its business.
GLBA Compliance
Gramm-Leach-Bliley Act Compliance
emails and spam. Independent third party testing results show the Interce
performance.
While most
companies
battle spam with
a reactive
Complying under the Gramm-Leach-Bliley Act (GLBA) of 1999 - Section
501,
requires
that
all approach, we prefer u
Mercury with over 2600 unique heuristic tests and a proprietary A.I based
outbound email and file attachments containing trade secrets, intellectual
property and other
you. These features literally eliminate the need for creating complex rules
proprietary and sensitive data or images MUST be sent securely and encryption
is the best method.
Spam patterns are ever-changing and reacting to spam/security threats u
MX Lock automatically scans outbound emails for specific content (customizable
by
IT adapts to your organiz
issue temporarily. MX Mercury,
on thethe
other hand,
patterns.
As time
goes on, thecredentials
Interceptor's AI engine only gets more effe
administrator) and encrypts emails that trigger any custom policies. Only users
with
proper
it did the day it was installed.
can send encrypted emails and only trusted recipients with accurate credentials
can decrypt and view
the content of the email. MX Lock is an impenetrable lock on our customersIn addition,
company's
trade secrets
MX Mercury boasts of having
and confidential records assuring full GLBA compliance.
13
All the features that you would expect from a software or hardware solution such as:
Additional Features
CLUSTERING
The Interceptor can guarantee our customers initial investment through clustering. As new Interceptor
hardware platforms are deployed in a customers network, old Interceptor units can be configured to
sync with the new units to provide redundancy and load balancing.
Mercury with over 2600 unique heuristic tests and a proprietary A.I based
you. These features literally eliminate the need for creating complex rules
Spam patterns
are ever-changing and reacting to spam/security threats u
CLUSTERING FOR LOAD
BALANCING
MX Mercury, on together
the other hand, adapts to your organiz
Multiple Interceptors issue
cantemporarily.
be clustered
patterns. As time goes on, the Interceptor's AI engine only gets more effe
to help manage heavy
email
loads
at your
it did the day it was installed.
organization. Each Interceptor will process
roughly the same amount of emails. If and when one of the Interceptors Inbecomes
unavailable,
addition, MX Mercury
boasts of having the
other Interceptors in the cluster will take on the extra load with zero delays in email processing.
14
company's IT infrastructure to send large emails and in doing so, potentially violate HIPAA, GLBA and SOX policies.
Upon receipt, a recipient can only view the email and download attachments upon providing proper
(+)Enlarge
Image to reply back (along with attachments of any
credentials. Additionally, MX Lock allows
the recipient
size) to the sender.
Upon receipt, a recipient can only view the email and download attachments upon providing proper credentials.
Patents/Intellectual Property
Additionally, MX Lock allows the recipient to reply back (along with attachments of any size) to the sender.
The Companys algorithms, designs, methods, and code are held as trade secrets. Proper design
controls for Espion Interceptors ensure that the source code cannot be reverse-engineered.
Additionally, the licensing system and CDs used to build the Interceptors are also protected. The
entire process from an Interceptor being built to a license being issued is logged completely.
Interceptor,Espion
MX Lock,owns
MX Mercury
and Paladin
MX are
of Espion and
International,
Inc. Information agreements
contained hereinwith
is for all
all code
created
for trademarks
the Interceptor
has non-compete
(+)Enlarge Image
development
staff
andconsult
key your
management
members.
developer
informational
purposes only.
Please
IT professional
for advice The
in themain
application
and useof
of the
theseintellectual
products andproperty
services.
emails and spam. Independent third party testing results show the Interce
Informationremain
is subject
to change
without notice.
consult
Espion International, Inc. for more current
information.
with
the company
for thePlease
requisite
period.
performance.
PROACTIVE
vs. REACTIVE
Espion has all future rights of any implementation of the A.I. algorithms. This
adds options
and exit - WHICH IS
strategies for investors.
While most companies battle spam with a reactive approach, we prefer u
Mercury with over 2600 unique heuristic tests and a proprietary A.I based
Customers
you. These features literally eliminate the need for creating complex rules
About Espion
Our Technology
Products
Services
Partners
issue&
temporarily.
MX Mercury,Support
on the other hand, adapts
to your organiz
patterns. As time goes on, the Interceptor's AI engine only gets more effe
Copyright
2010
Espion International.
All rights
reserved.
it did thegeographic
day it was installed.
Espions solutions are applicable for virtually every
customer
industry
and
region
as
evidenced by our diverse customer base. Currently Interceptors using EPR are deployed and
In addition, MX Mercury boasts of having
protecting over 200 customers in three countries including:
Fortune 500 companies: Computer Sciences Corporation (CSC)
Government agencies - City of Irvine, City of North Las Vegas
Hospitals - Northeast Health, Childrens Hospital
Small to mid sized businesses (SMBs) - CLECO, Atser, Acadian Ambulance Service, First National
Bankers Bank, Karta, Gray & Company, Sterling Bank, FEXCO
15
Competition
Home
About Espion
Our Technology
Direct Competition
Inbound
Email
Espion competes with large technology companies as well as standalone
players and
providesContent
solutions which are far less expensive but just as comprehensive as compared to our competitors. Our
1000 and 5000 series appliances are in terms of features and functionality ESPION
the equivalent
to IronPort
PROBABILISTIC
REASONING (EPR)
Systems, which was acquired by Cisco in 2008. Our Interceptor appliances cost 40% to 60% less on
Espion Probabilistic
Reasoning
(EPR) engine
average upfront costs as well as annual maintenance fees. Our lowerTheproducts
also
have
the integrates the industry
a compact, efficient, and highly effective security solution. This unique, pr
equivalent feature sets The industry has been undergoing marked consolidation
by infrastructure
Interceptor to learn and adapt to an organizations email flow without slow
players during the past several years; McAfee acquired Secure in 2008, Cisco
acquired IronPort in
been effectively applied in an email gateway security platform (MX Mercu
January 2007, and Google acquired Positini in July 2007. This follows theorganizations
acquisitions
bycompliance
Secure
in such as HIPAA, GLBA
with regulatory
in areas
2006 (of CipherTrust) and Microsoft in 2005 (of FrontBridge Technologies).
Indirect Competition
According to a Market Trends report by Joel Snyder, entitled The Future of E-mail Security, there are
more than 125 vendors in the email security market. These range from simple anti-spam, to anti-spam
with anti-virus, to encryption, to various combinations. These particular providers have only one or two
areas that they secure, and are generally able to charge lower initial rates. However, if the client
needs all of the functions that are naturally included on the Interceptor, they will have to buy several
different products. When that happens, the initial cost can quickly rise, the deployment is complex, the
client does not get the full range of features, and administration cost is higher.
Large indirect competitors include Symantec, Barrucade Networks TrendMicro and Zix - none of which
include the entire core features in one offering as does Espion.
Marketing/Sales Strategy
16
emails and spam. Independent third party testing results show the Interce
Internet
performance.
Targeted email campaigns, upgrading our website to a more interactive and informative site, SEO, and
Google/Bing/Yahoo! Advertising as well as Social Network and YouTube advertising
is planned.
PROACTIVE
vs. REACTIVE - WHICH IS
Trade Shows
Mercury with over 2600 unique heuristic tests and a proprietary A.I based
you. These
features literally
eliminate the need for creating complex rules
Trade shows offer an opportunity to get the Espion brand out. For 2011,
Espion
is considering
Spam patterns are ever-changing and reacting to spam/security threats u
participating in InterOp in Las Vegas and New York and NetSec in Scottsdale.
issue temporarily. MX Mercury, on the other hand, adapts to your organiz
patterns. As time goes on, the Interceptor's AI engine only gets more effe
Pricing Strategy
Our strategy is to offer the same or more features and better performance than the current tier one
market leaders. This will allow Espion to focus on the Mid-Range market that cannot afford the higher
alternatives, but have the same business requirements.
Espion intends to compete in the Hosted/SaaS market by partnering with datacenter and Internet
Security Vendors on a revenue share plan as well as provide Healthcare organizations with encryption
2010 Espion International, Inc. All Rights Reserved.
17
and other content policy management functions, at a very aggressive price Home
to bolster
sales.OurEspion
About Espion
Technology
products offer unique functionalities and diversification to its customers. It is Espions intent to keep
the pricing at a comparative middle range for all products.
VAR pricing is at a 25% discount off of list, with additional incentive plans. Annual support is priced at
15% of the product list price, which is industry standard.
Pricing Policies
Management Bios
18
Operations
(+)Enlarge Image
Production
you. These features literally eliminate the need for creating complex rules
With the anticipated surge of business expected to accompany the new Direct
issue sales
temporarily.initiatives,
MX Mercury, on theEspion
other hand, adapts to your organiz
patterns. As time goes on, the Interceptor's AI engine only gets more effe
is looking to outsource the fulfillment function to VARs and other synergistic organizations.
it did the day it was installed.
Receiving Orders
In addition, MX Mercury boasts of having
Espion only accepts orders from Customers or Channel Partners via a signed evaluation form or and a
Purchase Order Number. A Build Request is then issued by the Operations Manager to the Support
Staff, who then builds and ships the boxes.
Inventory
Raw materials inventory is controlled and tracked by the Director of Operations through a custom
spreadsheet as well as by regular physical counts. This information is tracked from the purchase
2010 Espion International, Inc. All Rights Reserved.
19
order to the order number to the shipping company's tracking number and finally
toAbout
theEspion
actualOurservice
Home
Technology
tag.
Since the actual product is not built until a Build Request is issued, there is no finished product that is
Inbound Email Content
stored. Once the boxes are built, shipped and installed, we have a network operations center that
stores the actual product and customer information.
The accompanying chart contains historical performance and projections. These figures and the
attached financial statements to this business plan have not been prepared in accordance with
generally accepted accounting principals, nor have they been presently been audited, reviewed or
compiled by an independent accounting firm. Full historical financial statements for the three most
recent fiscal years are available for review. These projections represent the best estimation of current
(+)Enlarge Image
management of Espion International, Inc. as to the anticipated results of operations of the company if
The EPR engine is hyperseeded (loaded) with collective knowledge of wi
the assumptions underlying such projections come to pass as contemplated.
There can be no
emails and spam. Independent third party testing results show the Interce
assurance that any or all of such assumptions will occur as contemplated. performance.
In (000s)
Investment
2009
2010
2011
150
350
2012
2013
PROACTIVE
vs. 2015
REACTIVE - WHICH IS
2014
0 While
$ most companies
0 battle spam with a reactive
0 approach, we prefer u
Mercury with over 2600 unique heuristic tests and a proprietary A.I based
you. These features literally eliminate the need for creating complex rules
Reinvest
Revenues
0$
250
775
325
1,625
3,250
625
575
450
patterns. As time goes on, the Interceptor's AI engine only gets more effe
301
CGS
Gross Profit
25
276
55
260
195
1,465
780 $
1,560
3,120
$ 1,439 $
4,020
5,095 $
10,087
22,430
Espion is poised to ramp up its sales with the infusion of a minimum of $350,000 from its current
2010 Espion International, Inc. All Rights Reserved.
20
Attached Exhibits:
A:
B:
(+)Enlarge Image
emails and spam. Independent third party testing results show the Interce
performance.
Mercury with over 2600 unique heuristic tests and a proprietary A.I based
you. These features literally eliminate the need for creating complex rules
patterns. As time goes on, the Interceptor's AI engine only gets more effe
it did the day it was installed.
In addition, MX Mercury boasts of having
21