Sramana Mitra: I’ve done quite a lot of work in EDA. I worked very closely with Joe as well. I’ve heard his perspective about what you were talking about. I understand what you are saying, but from your point of view, you are trying to sell software, so you need segments that can buy your software to be able to grow your business.
This brings me to the next question. Could you describe architecturally how you do the anti-piracy solution in the context of a SaaS product?
Ted Miracco: Getting the data is not the challenging part. Everyone is collecting data. SaaS companies and on-premise software can collect data. The main challenge is what you can do with the data. The aggregation and the case management is where a lot of the value add is.
If a customer instruments a product with our technology and puts a release out, they start receiving data within 30 days. One of the things about the incoming data is, it becomes very confusing. Machines are moving around and there’re VPNs. There’s room for a lot of errors. In particular, there is a lot of room for aggregating the data incorrectly.
I can give a simple example. Let’s say, Intel is designing chips and is using a popular EDA tool. One of their employees has those tools and is working on a laptop at Starbucks. Suppose you have a bunch of students who are known to use illegal crack software. The data can be easily aggregated through that common IP address. The students can connect through the corporation incorrectly, because they were both using the same IP address and you might have a registration.
Cylynt is capable of taking in millions of records and making sense of them, aggregating that data in the cloud, enriching the data, and putting together infringement cases that make sense to our clients. The machine intelligence that we use, the way we scrub the data, and aggregate machines to organizations and machines to credentials allow our clients to get a clear picture of what is going on.
That is where the magic happens – in the back end of the cloud. Most software companies could easily write a data collection routing. The problem is what you do with the data when it comes in, especially when it comes in like a firehose and you can’t ingest it fast enough to process it. That is where we excel.
Sramana Mitra: I’m going to move you out of the EDA use cases. I think we’ve got the EDA use cases. We understand that you do well in the EDA on the semiconductor where you have core expertise and background. Is that applicable to SaaS companies? There are 500 companies that are over the $50 million ARR threshold in SaaS. Is that a category that is applicable for you?
Ted Miracco: It is applicable, but it isn’t as interesting today because of the size of the company. If you look at the 200 largest software companies in the world and you run through that list, about 20 of them are our clients. They are mostly on-premise.
SaaS is definitely where the startups are. I know you have a strong focus on it. If you are a SaaS company and you already have data, we can mine that data and show opportunities to generate incremental revenue. It comes down to the log files.
You have log files and you have basic information about what is going on with the user community. We can ingest that log file and spit out a whole series of opportunities based on what we are seeing in the data.
This segment is part 4 in the series : Thought Leaders in Cyber Security: Cylynt CEO Ted Miracco
1 2 3 4 5