InvestorsHub Logo
Followers 45
Posts 6663
Boards Moderated 4
Alias Born 07/11/2001

Re: None

Tuesday, 12/05/2017 9:03:03 PM

Tuesday, December 05, 2017 9:03:03 PM

Post# of 26303
I received this today in response to my questions. I asked him if I could share with other investors and he said yes.

I'm afraid I can't give you an answer as to anything having to do with their development cycles, sales, lack there of, or past integration of the software. I simply don't have any first party knowledge of those inner workings as they pertain to Validian.

I can say from personal experience in the security space over the years, dealing with the patent processes, as well as the tremendous / very, very, very expensive trial and error nature of the undertaking that it's a giant risk to say the least. In fact, most software applications never achieve significant traction, irrespective of how useful / cutting edge the application is, that's just the cruel truth.

Especially in the security software space, because no one is really ever interested in security until something goes wrong. Normally, the security line items in budgets get near the bottom attention and funding. It doesn't really matter if it goes so wrong and so badly for somebody else that it makes world news, and common sense dictates you should take action.

Until it happens to you, most organizations simply don't care and security is relegated to near last place. That is, until something goes wrong for you, then, all kinds of resources are brought to bear and budgets magically become available and things are taken seriously. My old boss once said we're in the "Oh Crap Business", because we never get involved until somebody says "Oh Crap, we have a problem". I can personally attest to that as a dead fact, after years of responding to data breaches around the globe and having investigated hundreds of cases in pretty much every realm.

Also, keep in mind that the vast majority of all cyber security incidents go unreported, which dilutes overall awareness globally. When incidents occur, all kinds of NDA's are initiated because nobody wants to be known as that company that got broken into, unless reporting laws require some sort of notification.

As far as wide spread adoption of any application, no CIO, CISO, or Admin will ever implement any technology into their infrastructure without first running to ground EVERY LAST ASPECT of how this new proposed software affects every other aspect of the network. Especially with security software, because security software can break all kinds of other dependent services, and the internal review and validation can take months if not years. Now, carry that over to classified government systems, etc., and that internal validation process goes into a whole new level.

I'll endeavor to answer the remainder of your question as best I can, keeping in mind we're under several Non-Disclosure Agreements with regard to how the technology actually implements its processes, methodologies, and interfaces.

As a whole, the cyber security industry and cyber security as a philosophical discipline is broken into two categories, network and host based. Whereby, you focus on securing and scanning through either the individual systems, or all of them as a whole network. Such as network based or host based intrusion detection, or putting anti virus or encryption on the network email gateway or on the individual systems, etc.

If you look at the industry and products as a whole, they don't change much. If you go to a security conference and expo anywhere in the world, every vendor is pretty much selling the exact same core style of product. There's very little new innovation that actually comes through, this however, is definitely innovative.

The software we've tested successfully integrates several sub specific protocols that normally don't work well together into a very innovative platform, that works, and works well. The particular approach and more importantly, the base assumptions the development team undertook in this case were certainly different. It's nice to be able to think different every once in a while.

There's definitely a place for the software in any solid security posture, because it streamlines a lot of functions and actually does away with arcane architecture and systems that are in use today.



Have a great day,

-Rafael-


Rafael Gorgal
Partner
G-C Partners, LLC.
rgorgal@g-cpartners.com
214-641-2602
Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.