2
Most read
7
Most read
1
Wedge Networks
Real-time threat detection
and prevention
for connected autonomous
systems.
INVESTOR PRESENTATION
WHAT WE DO
2
 Real-time solutions for
imperceivable latency
 Autonomous Detection & Prevention
 Embedded Advanced Security for 5G
enabled Networking @ the “Far
Edge”
Threat Detection
Threat Prevention
THE OPPORTUNITY
3
1. Connected Vehicles (CV and CAV)
2. Traffic Management (ITS)
3. Critical Infrastructure/Smart Grids
4. Environmental Monitoring
5. Smart Buildings/Homes
6. Smart Cities
7. Supply Chain Management/Warehousing
8. Industrial, Agriculture and Commercial Management
Source: TechTarget.com, March 30, 2022
Connected and Autonomous Systems
Top 8 Applications and Examples of Connected Systems
Image: ieee.org
6
WHY NOW? The Future is today.
They’re Here!
Connected Autonomous Vehicles (CAV) and Intelligent Transportation Systems (ITS)
© Wedge Networks, Inc., CONFIDENTIAL -5-
→ Integration with BlackBerry IVYTM
• BlackBerry & L-SPARK - the forefront of innovation in connected vehicle technology
• Participate in BlackBerry IVYTM ecosystem
• Next gen CAV use cases leveraging in-vehicle data to improve driver and passenger
experiences
Intelligent Traffic Systems:
→ EU and Canada consortium for CAV and Smart Transportation Safety Services
• 5G-enabled time-critical road safety
• Wedge is Chair of Canadian Cluster and leads cybersecurity efforts
• Making transportation and mobility smarter, more secure, safer and greener
Connected Autonomous Vehicles:
→ Mobility Xlab - Sweden based collaboration hub founded in 2017 to create and develop
innovations with future mobility
• CEVT, Ericsson, Polestar, Veoneer, Volvo Cars, Volvo Group and Zenseact
• Co-create solutions for safe and secure mobility
• CAV’s require real-time security to ensure safety
OUR ADVANTAGE
CAV & ITS First Mover Advantage - Key partners
Why Real-time Threat Prevention is
Critical
6
PROBLEM
Connected
Vehicles
In-Vehicle
Threats
External
Threats
• Large expanding attack surface extending to the “Far Edge”
• Increased attacks against connected systems: 400,000+ new malware/day in 2021
 CAV travelling @ 100KM/hr - 1second delayed response = 28m in unintended distance
MARKET OPPORTUNITY
800M+
7
connected light vehicles
from 2020 to 2035
Mobility Xlab + Wedge
BlackBerry IVY + Wedge
Advanced real-time security
required standard feature of CAV
embedded software
Electrification | Connectivity
Automation
OEMs must include real-time and
network threat detection and prevention
capabilities in their vehicles
$1 per vehicle per month
licensing could be worth ARR:
$5.7B
8
Critical infrastructure protection (CIP)
Worth $154.59 Billion by 2027 | 6.2% CAGR
Source: Fortune Business Insights, July 7, 2022
Large industrial infrastructures - requiring internet connectivity for automated
operations, administration and remote monitoring:
• Smart Cities
• Defense
• Transportation
• Energy systems
• Healthcare
ADDITIONAL USE CASE - Market Opportunity
• Finance
• Telecommunications
• Manufacturing
• Water Systems
• Many more and growing …
Strategic Partnerships & Managed Service Providers (MSPs)
• $200K contracted MRR/bookings; NTM
forecasting $200K to $300K MRR growth
• Target - $1.0M MRR in 24 months
Validated Go-2-Market Strategy
 Patented high performance engines
Provides deep visibility into all network traffic types and enables real-time threat prevention
 Patented machine learning process
Enables automated detection and prevention including never-before-seen threats
 CANLite anomaly detection algorithm
Delivers 99.9% threat detection accuracy with 50% less computing resources, for on device
real-time threat detection and prevention designed for CAV and ITS
 Crowdsourced orchestrated threat intelligence
Enables complete and up-to-date threat identification, exchange and enrichment
 Products are ‘software-defined’
Facilitates integration with software and hardware platforms and new operating environments
from cloud to 5G enabled network edge – including BlackBerry IVY/Zenseact.
10
COMPETITIVE ADVANTAGES
23
Thank you!

More Related Content

PDF
Automotive Cyber Security Market_ Safeguarding the Future of Mobility.pdf
PDF
Growing internet of things solution in industries and mobile
PDF
A fresh approach to remote IoT connectivity | by Podsystem
PDF
A fresh approach to remote IoT Connectivity by Podsystem
PPTX
Artificial-Intelligence-in-Autonomous-Vehicles (1)-1.pptx
PPTX
Artificial-Intelligence-in-Autonomous-Vehicles (1).pptx
PPTX
Top 10 digital trends for power and utilities
PDF
Kham pha thi truong 5G & Dich chuyen Kinh te So
Automotive Cyber Security Market_ Safeguarding the Future of Mobility.pdf
Growing internet of things solution in industries and mobile
A fresh approach to remote IoT connectivity | by Podsystem
A fresh approach to remote IoT Connectivity by Podsystem
Artificial-Intelligence-in-Autonomous-Vehicles (1)-1.pptx
Artificial-Intelligence-in-Autonomous-Vehicles (1).pptx
Top 10 digital trends for power and utilities
Kham pha thi truong 5G & Dich chuyen Kinh te So

Similar to Real-time threat detection and prevention for connected autonomous systems (20)

PDF
Smart grids business case
PDF
top Data-usecases-for-telcommunications.pdf
PDF
Top IoT and Telematics Security Threats to Watch in 2025
PDF
Podsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographics
PDF
A Fresh Approach to Remote IoT Connectivity
PDF
Mobile Edge Computing Market: Unleashing the Potential of Edge AI
PPTX
SGN Webinar March 14 2013 Norman_SAIC
PDF
5g Technology: A key Enabler to next generation in car experiences
PPTX
The Brutal Reality of the Future of Connected Devices
PDF
Ericsson Technology Review: Driving transformation in the automotive and road...
PDF
The Industrialist: Sparks
PDF
Electric Car Hacking: Exploring Vulnerabilities and Securing the Future of Mo...
PDF
Overview of IoT and Security issues
PPTX
Smart-Traffic-Control-Systems-using-IoT-An-Overview.pptx
PDF
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
PDF
HH QUALCOMM UplinQ - the next 10 billion mobile devices
PPTX
Private Networks.pptx
PPTX
Crisis-Ready Crisis-Proof IT Infrastructure for the New Normal
PPTX
Final-Presentation-MWC19-Friedhelm-Ramme-ERICSSON.pptx
PDF
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Smart grids business case
top Data-usecases-for-telcommunications.pdf
Top IoT and Telematics Security Threats to Watch in 2025
Podsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographics
A Fresh Approach to Remote IoT Connectivity
Mobile Edge Computing Market: Unleashing the Potential of Edge AI
SGN Webinar March 14 2013 Norman_SAIC
5g Technology: A key Enabler to next generation in car experiences
The Brutal Reality of the Future of Connected Devices
Ericsson Technology Review: Driving transformation in the automotive and road...
The Industrialist: Sparks
Electric Car Hacking: Exploring Vulnerabilities and Securing the Future of Mo...
Overview of IoT and Security issues
Smart-Traffic-Control-Systems-using-IoT-An-Overview.pptx
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
HH QUALCOMM UplinQ - the next 10 billion mobile devices
Private Networks.pptx
Crisis-Ready Crisis-Proof IT Infrastructure for the New Normal
Final-Presentation-MWC19-Friedhelm-Ramme-ERICSSON.pptx
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Ad

Recently uploaded (20)

PPTX
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
PDF
income tax laws notes important pakistan
PDF
Stacey L Stevens - Canada's Most Influential Women Lawyers Revolutionizing Th...
PDF
Business Communication for MBA Students.
PPTX
BUSINESS CYCLE_INFLATION AND UNEMPLOYMENT.pptx
PPTX
Understanding Procurement Strategies.pptx Your score increases as you pick a ...
PDF
Engaging Stakeholders in Policy Discussions: A Legal Framework (www.kiu.ac.ug)
DOCX
Handbook of entrepreneurship- Chapter 7- Types of business organisations
PPTX
CTG - Business Update 2Q2025 & 6M2025.pptx
DOCX
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
PDF
Consumer Behavior in the Digital Age (www.kiu.ac.ug)
PPTX
operations management : demand supply ch
PDF
HQ #118 / 'Building Resilience While Climbing the Event Mountain
PPTX
IMM.pptx marketing communication givguhfh thfyu
PPT
Retail Management and Retail Markets and Concepts
PPTX
Transportation in Logistics management.pptx
PDF
Second Hand Fashion Call to Action March 2025
PDF
Sustainable Digital Finance in Asia_FINAL_22.pdf
DOCX
Center Enamel A Strategic Partner for the Modernization of Georgia's Chemical...
DOCX
Center Enamel Powering Innovation and Resilience in the Italian Chemical Indu...
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
income tax laws notes important pakistan
Stacey L Stevens - Canada's Most Influential Women Lawyers Revolutionizing Th...
Business Communication for MBA Students.
BUSINESS CYCLE_INFLATION AND UNEMPLOYMENT.pptx
Understanding Procurement Strategies.pptx Your score increases as you pick a ...
Engaging Stakeholders in Policy Discussions: A Legal Framework (www.kiu.ac.ug)
Handbook of entrepreneurship- Chapter 7- Types of business organisations
CTG - Business Update 2Q2025 & 6M2025.pptx
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
Consumer Behavior in the Digital Age (www.kiu.ac.ug)
operations management : demand supply ch
HQ #118 / 'Building Resilience While Climbing the Event Mountain
IMM.pptx marketing communication givguhfh thfyu
Retail Management and Retail Markets and Concepts
Transportation in Logistics management.pptx
Second Hand Fashion Call to Action March 2025
Sustainable Digital Finance in Asia_FINAL_22.pdf
Center Enamel A Strategic Partner for the Modernization of Georgia's Chemical...
Center Enamel Powering Innovation and Resilience in the Italian Chemical Indu...
Ad

Real-time threat detection and prevention for connected autonomous systems

  • 1. 1 Wedge Networks Real-time threat detection and prevention for connected autonomous systems. INVESTOR PRESENTATION
  • 2. WHAT WE DO 2  Real-time solutions for imperceivable latency  Autonomous Detection & Prevention  Embedded Advanced Security for 5G enabled Networking @ the “Far Edge” Threat Detection Threat Prevention
  • 3. THE OPPORTUNITY 3 1. Connected Vehicles (CV and CAV) 2. Traffic Management (ITS) 3. Critical Infrastructure/Smart Grids 4. Environmental Monitoring 5. Smart Buildings/Homes 6. Smart Cities 7. Supply Chain Management/Warehousing 8. Industrial, Agriculture and Commercial Management Source: TechTarget.com, March 30, 2022 Connected and Autonomous Systems Top 8 Applications and Examples of Connected Systems Image: ieee.org
  • 4. 6 WHY NOW? The Future is today. They’re Here! Connected Autonomous Vehicles (CAV) and Intelligent Transportation Systems (ITS)
  • 5. © Wedge Networks, Inc., CONFIDENTIAL -5- → Integration with BlackBerry IVYTM • BlackBerry & L-SPARK - the forefront of innovation in connected vehicle technology • Participate in BlackBerry IVYTM ecosystem • Next gen CAV use cases leveraging in-vehicle data to improve driver and passenger experiences Intelligent Traffic Systems: → EU and Canada consortium for CAV and Smart Transportation Safety Services • 5G-enabled time-critical road safety • Wedge is Chair of Canadian Cluster and leads cybersecurity efforts • Making transportation and mobility smarter, more secure, safer and greener Connected Autonomous Vehicles: → Mobility Xlab - Sweden based collaboration hub founded in 2017 to create and develop innovations with future mobility • CEVT, Ericsson, Polestar, Veoneer, Volvo Cars, Volvo Group and Zenseact • Co-create solutions for safe and secure mobility • CAV’s require real-time security to ensure safety OUR ADVANTAGE CAV & ITS First Mover Advantage - Key partners
  • 6. Why Real-time Threat Prevention is Critical 6 PROBLEM Connected Vehicles In-Vehicle Threats External Threats • Large expanding attack surface extending to the “Far Edge” • Increased attacks against connected systems: 400,000+ new malware/day in 2021  CAV travelling @ 100KM/hr - 1second delayed response = 28m in unintended distance
  • 7. MARKET OPPORTUNITY 800M+ 7 connected light vehicles from 2020 to 2035 Mobility Xlab + Wedge BlackBerry IVY + Wedge Advanced real-time security required standard feature of CAV embedded software Electrification | Connectivity Automation OEMs must include real-time and network threat detection and prevention capabilities in their vehicles $1 per vehicle per month licensing could be worth ARR: $5.7B
  • 8. 8 Critical infrastructure protection (CIP) Worth $154.59 Billion by 2027 | 6.2% CAGR Source: Fortune Business Insights, July 7, 2022 Large industrial infrastructures - requiring internet connectivity for automated operations, administration and remote monitoring: • Smart Cities • Defense • Transportation • Energy systems • Healthcare ADDITIONAL USE CASE - Market Opportunity • Finance • Telecommunications • Manufacturing • Water Systems • Many more and growing …
  • 9. Strategic Partnerships & Managed Service Providers (MSPs) • $200K contracted MRR/bookings; NTM forecasting $200K to $300K MRR growth • Target - $1.0M MRR in 24 months Validated Go-2-Market Strategy
  • 10.  Patented high performance engines Provides deep visibility into all network traffic types and enables real-time threat prevention  Patented machine learning process Enables automated detection and prevention including never-before-seen threats  CANLite anomaly detection algorithm Delivers 99.9% threat detection accuracy with 50% less computing resources, for on device real-time threat detection and prevention designed for CAV and ITS  Crowdsourced orchestrated threat intelligence Enables complete and up-to-date threat identification, exchange and enrichment  Products are ‘software-defined’ Facilitates integration with software and hardware platforms and new operating environments from cloud to 5G enabled network edge – including BlackBerry IVY/Zenseact. 10 COMPETITIVE ADVANTAGES

Editor's Notes

  • #6: Read the header Smart City is a network of computers. Each computer can be attacked Goes beyond information security, but to : Equipment safety – light bulb Human safety – autonomous driving cars Why do we have safety issues? It is because in smart city security goes beyond IT to OT