Put the former Chief Scientist from Bell Labs together with a guy who started his career at Computerland back in the 80’s and you have one of the newest security software companies to hit the market.
George Waller, co-founder of Strikeforce, teamed up with his partner when they both realized that computer hacking had gone from a competition to big business. With millions of dollars at stake hackers are becoming smarter and smarter and infiltrating some of the most sophisticated systems regularly.
George tells us that “The FBI put out a report about two years ago and they said that they felt that greater than 70% of the world’s computers have spyware on it.”
Roy Weissman of MediaJobs.com spoke with George about how Strikeforce has created some compelling products to help protect everyone from the largest enterprise firms to one PC households
Listen in or read along as Roy Weissman talks with George about why he and his partner, Ram Pemmaraju, the former Bell Labs Chief Scientist believe Strikeforce will become the market leader.
You can listen to the interview as well as read it below:
Roy: My name is Roy Weissman from MediaJobs.com. Today we’re speaking with George Waller, the Founder and CEO of StrikeForce Technologies. StrikeForce Technologies is the innovator of out of band, multi-factor authentication and keystroke encryption for desktop and mobile devices. That sounds like a mouthful, George.
Welcome, George. Tell us a little bit about what you guys do and why you got into this business.
George: I appreciate that, thank you for having me, Roy. Just to clarify, my title is the Executive Vice President and I’m the co-founder of the company, not the CEO and Founder.
George: I actually was the original CEO. Then I realized one of the things I wanted to do is become a public company and to grow it and I knew we needed a lot of help and I knew I needed to get someone with that strong MBA style background.
I actually hired to replace myself someone that came from, his name is Mark L. Kay and he came out of JP Morgan Chase. For 26 years he was the Worldwide Manager and CIO of their security services. I hired up, as they say.
Roy: That’s good. How long has he been there?
George: I hired him in 2003.
Roy: I guess he’s been there a few years.
George: Yes. He’s been here for quite some time and doing a fantastic job.
Roy: How did you get, why this business, George? What is your background and how did you end up in this business?
George: My background has been in the computer industry and I’ve done several different things in the computer industry, worked it, learned it from the ground, as they say, from the ground up. Started selling in Computerland back in the ’80s when they just came in with personal computers just came out.
I was working for Computerland but back then that was strictly just boxes. Networking really wasn’t an issue. The Internet wasn’t out there for public usage yet. Then I went from a box company to a services company and started learning the service side of it, the software side of it.
Then went and worked for an offshore developer where we had several hundred developers outside the country where we did project management and product development but specifically software development from outside the country.
Then I met up with my co-founder Ram Pemmaraju, who is the CTO. He had this absolutely fantastic idea and he pitched me on it about using the phone for the purposes of authentication. He had the vision, knowing that the Internet was going to continue to grow and that everyone, every site, whether it’s a bank or your corporate site would need some form of authentication.
He realized that the old methodology out there wasn’t going to suffice in this new world so he realized that you needed to go mobile. You needed to have a solution that enabled a mobile device to actually authenticate you into, whether it’s your bank or your corporate VPN or a social network and website, he envisioned that.
Essentially, he’s the inventor of what we call ‘out of band authentication’, which is essentially using a mobile device to authenticate into a website or for a transaction.
Roy: Are you talking about using caller ID and things like that?
George: No. I’ll give you an example. A big problem today, and everyone reads about it every day, is the amount of breaches that happen around the world. They are just fast and furious and when these breaches happen.
First thing is for the company that’s breached, it could cost that company upwards of $10 million in fines, litigation, not to mention brand degradation and the loss of information for your customers because if they breach that company, they’re usually going for either corporate espionage or, more importantly, they want to get access to information which they can sell.
The majority of the hacking today is motivated by monies. A lot of the big analysts have put out numbers such as Forrester, Aberdeen, Gartner, that worldwide corporate breaches and identity theft have now gone into the trillions of dollars on a yearly basis.
With that as a backdrop we saw, Ram saw, that companies needed to really truly protect themselves and because his background was both telephony and security working for, he comes out of Bell Labs. Prior to Bell Labs he was a chief scientist and chief architect.
Prior to Bell Labs he worked for Bellcore, then he worked for a large building contractor designing and inventing voice encryptors.
He had two unique disciplines of security and telephony and he realized in the mid ’90s that joining the two would be a great, would not only create a great opportunity to create a company and a product but more than that to make the world a safer place.
When we met he explained to me the concept of what he called out of band authentication and essentially that is, it’s the latest generation or the latest evolution of authentication.
When you talk about authentication, most people know that, most people use the single factor authentication. Essentially that’s using username and password to log into something.
The problem with username and password is that’s too easily hacked. The world then did come out with two factor authentication but that two factor authentication is sending, for example, your username, your password and the something else like a token number that the company gives you, this little physical token that you press the button it gives you a six digit number and you send it with your username and password.
That was good for many years. The problem was that the hackers realized that all that data is going over the same data stream. Essentially, the same computer link when you’re logged in, you’re logging into your bank or you’re logging into your website, that one connection over the Internet is what they call inbound communications.
If you’re sending all your information over that channel, if a hacker can hack that channel, they now have all your data.
The hackers have developed the concept of man in the middle where they get a piece of spyware, it sits on your computer and it gathers all that data and then basically they can log in as you way before you can log in. What Ram envisioned is a much more secure and easily deployable and very cost efficient way of authenticating by using a mobile device.
Check this out. Let’s say I want to log in. Every night I leave, wherever I am at night I’m logging into my corporate assets to my company. I pull up my web page on my mobile device or my computer, I type in my username, type in my password.
Hit Submit or login and two seconds later my phone rings and my phone actually says, ‘George, this is StrikeForce Technologies remote access client on the phone. Please put in your secret pin code,’ or it will ask me to use my voice as a biometric.
My username went on over the computer channel but my voice or my secret pin code, that I would plug in on the keypad of the mobile device, goes over the mobile device or the mobile network so essentially it’s the splitting up of the username from password and sending them on two separate channels versus sending all the information on one channel.
Because of that concept that he developed, out of band authentication, it enables anyone because everyone in the world has a phone today, to log in from wherever you are in a more secure fashion.
Because we’re leveraging the telephone network that’s already in place there needs to be no infrastructure put out there and because of that we can deliver cost effective, two-factor, out of band authentication which makes the world a safer place, less expensive than any other authentication method out there.
Roy: Hopefully, you’re not trying to log in where the cell service is bad.
George: With the cell services?
Roy: Where the cell service is bad.
George: Well, yes. The good thing of what we’ve done is, Ram actually figured out an answer for that. He took our authentication technology and he turned it into a platform for authentication which enables you to use multiple methods. We do support the old style hard tokens, we have our own.
We also support soft tokens where you can actually have a little applet that runs on your mobile device and you press it and it gives you a six digit number instantly. You don’t even need to have access to cell service to log in today with our platform.
Roy: The applet is kind of like the old school algorithm keypads which came up with a unique number.
George: That’s exactly what it is and we have the four that can sit on the desktop of your
computer or sit on your mobile device so that today our platform offers 14 different methods of logging in and any of the methods can be used as a redundant backup to any of the methods.
Roy: This sounds great. I guess what I’m wondering is, and again being unsophisticated at this so don’t be offended at my question but it sounds like anybody could set it up. Just tell the computer to call this phone number and get it verified. Where is the secret sauce here?
George: The secret sauce is you need to be provisioned. For example, it’sgenerally your administrator in the company provisioning your phone number into the system so that when the system’s going to call you, it’s only going to call one number and one number only in the whole world.
Roy: No, that I get. I’m talking about with respect to competitors, from a business perspective. What’s to stop a competitor from just writing their software so that when you try to log in it automatically dials your phone number and you have to answer the phone? I guess what I’m trying to figure out is what are you doing that proprietary?
George: First of all, you have to actually be logging in. Let me ask you this. If your phone rang right now and it said to you, ‘Roy,’ right now. You and I are on the phone. We’re doing an interview. If your phone rang right now and said, ‘Roy, will you authorize $12,000 to be wired out of your bank account,’ would you do it right now in this instant?
Roy: No. I get that. I’m not talking about from a security perspective, I’m talking about from a competitor perspective. What’s to stop a competitor from just writing the software.
George: Making something similar?
George: Sorry, I didn’t understand your question.
Roy: That’s fine. I understand the security aspect that when you have multiple variables, it’s harder and harder to duplicate it.
George: We do have some competitors but the key thing is that in January 11th of 2011, we were awarded the patent on out of band authentication. We recently put one of the top law firms in the world, signed an agreement with them and they have now started to litigate against those infringers and the biggest of those infringers is a company called Phone Factor, which was bought out by Microsoft.
We are right now litigating against them as well as other infringers. We do own a patent and we are very highly confident that we will win if it ever gets to court. I don’t think it’ll go to court. I think they’ll settle way before it goes to court but we will definitely win in this case because we do own the patent and they own nothing.
Technologically, there are some infringers but we are aggressively, we have an aggressive infringement strategy going on right now and we’re going after anyone infringing on us.
Roy: Now are you concerned that as of late the talk is that the patent office is getting too loose
and they’re patenting things that really shouldn’t have been patented and calling into question some patents that have been done probably in the last, especially since technology and the Internet.
I’m sure you remember years back Amazon tried to patent or they did patent the one-click purchase and even though they had the patent it would have been very bad if they tried to enforce that, so they kind of backed off.
But technically, they have a patent for that. There’s been talk recently that some of the patents that have been given have just been too generic. Would you have concerns that this could happen to your patent?
George: No. Not at all. It’s a very sophisticated system and a patent is, while we have an authentication platform that allows for lots of things, our patent is specifically on the out of band stuff and we’re not worried about that or the argument that the patent office is too loose in granting their patents in this case because this is, obviously, it’s built in and around security.
We have a second set of servers that were split into panels. That’s not something that people could say, They just had that,’ or anything like that. It’s, when Ram invented this, it took years to build. Many, many years to build it and then get it working so we have no concerns about that.
Roy: How long has this product been out on the market?
George: We started showing the first version of it in 2001 but by the time we really, and that was the beta version of it, it really started hitting the market around 2004ish, 2003, 2004 but as you know most products are a work in progress and what we had in 2004 is drastically different than what we have now.
What we have now is drastically different than 2004 so it’s evolved. The first version was just strictly a phone call back to your phone. That was it. Didn’t do anything else.
Then we started adding in other methods of out of band. Then we added in hard tokens. Then we add in soft tokens and then something else that we did which is very unique, it’s the only technology, which we call out of band, in the world that can actually be installed 100% on premise. Even our infringers haven’t figured out how to do that. They’re all strictly cloud based services.
While we also offer a cloud service, we’re the only technology that can be put on premise to run from within a company’s firewall and that’s got nothing to do with the patent, it’s just that no one else has figured out how to do that.
That’s a credit to Ram’s strong background in telephony where he knew how to make that work so we feel we have a big edge over our competitors on that as well.
Roy: Are there any major companies that have purchased your technology, that are using it that you can mention?
George: Most of them, since it is a security product, most of our customers are all under contract that we can’t mention them because one of the strategies of any sound security professional is never tell the people what you’re using.
It’s hard enough to keep the bad guys out but when you tell them what you’re using you’re kind of focusing in on saying, ‘Here’s the lock. I dare you to pick it.’ I can tell you this, we have Fortune banks using it.
We have major healthcare institutions using it, we have universities using it, we have government agencies using it, we have SMBs and mid-size organizations. We’ve got one of the largest silicone chip manufacturers in the mobile space using it.
We have a lot of people using it around the world, using our technology to protect themselves.
Roy: Are there any names you can mention?
George: I’d honestly have to look into see, because I can’t divulge anyone’s name without approval.
Roy: When you say Fortune, you’re saying Fortune 100 companies.
George: No. I’m talking about we have Fortune 10, Fortune 50, Fortune 100. We have banks within all of those.
Roy: I guess they’re seeing success or they wouldn’t… When you sell, is this a one-time sale or is this, the money you’re making from this, you sell them the product, get a check. Is there ongoing payments or is it just one payment?
George: Well no. There is always some sort of ongoing payment based on the business model. That’s another thing, Roy that we’ve been able to figure out. One of the things my CEO had brought, of the many great things he brought to the table, there’s one of them is that if we can’t fit into the other person’s business model they’ll never buy it and it’ll never work out for them.
While most of our competitors take, you’re going to pay us yearly per user, a fee per user. Again, they’re only cloud service. We offer a cloud service very similar where an institution or any company can take further employees or users, yearly per user fee.
But because we also go on site, in other words our product can be installed 100% internally, well that reduces all those costs of a cloud service.
On site we actually enable a user to have either a one-time fee or a three year greatly reduced fee. For example, they can take a, I’m just going to say, ‘quantity one’, because we’re not talking specific quantities here but quantity one on our authentication on site to be $25.00 and that’s it. It’s a one-time fee and they own it for that user.
Obviously, if you have 500 users it’s less than that and you’ve got 5,000 it’s much less than that. Whereas if the company says, ‘Look. I don’t have $25.00,’ we also have the concept of breaking it up over multiple years to pay for it.
The great thing is we’ve come out with multiple models, business models that enable us to offer to our clients options on what works financially better for them and then in our cloud service we have something very unique whereas all of our competitors charge per year per user, as I said, we also have that method.
We also have something else that they don’t have. For example, a very large bank, one of our Fortune 100 banks, came to us about seven years ago, they’ve been our client over seven years and they said to us, “We have millions of users and the thing is that we want to run our own risk based system up front to determine riskiness of a transaction so we don’t want to buy authentication for all our millions of users, however, we need to use it for any of those millions just in case of a risky transaction.”
What we do then, Roy, is we created an authentication bucket so that when people are doing authentications into their website, if they deem that authentication that access is risky because all of a sudden Roy’s trying to log in from Bulgaria at 4:00 in the morning and that’s not Roy’s profile.
What will happen is they’ll use our system to authenticate that user and we charge them on a per authentication basis and what we did with them is we created a block of authentications so they buy a large block that never expires and they use them on-demand, so essentially, they can buy authentication, in this case I can say that they buy authentications by a 100,000 block of authentications.
Then they use them as appropriately and when the block of authentications runs low they just re-up it but they get to leverage that 100,000 across their multiple millions of people.
Roy: That sounds great. What would you say your average sale is to a client, when you sell these product, or services is? The average dollar value.
George: The smaller ones, if we’re talking to the SMBs it’s typically $5,000 to $15,000. If we’re talking in the, let’s say the more mid range companies, we’re talking 75,000 to $100,000.
Roy: What is your average size transaction these days is what?
George: We have multiple products, that’s another thing but in the authentication specifically, it’s probably in the $30,000 range.
Roy: That’s good. Now besides the out of band there are other things you do, aren’t there?
George: Yes. We also invented the concept of keystroke encryption and this I’m very excited for because on this one we have, I’m excited about all of our products but in the keystroke encryption we have both a consumer play as well as an enterprise play.
What I mean by enterprise I mean government agencies, corporations, hospitals, everything.
As you know, Roy, we read stories everyday about all these breaches. One of the biggest reasons that there are all these breaches and one of the biggest reasons for all this identity theft out there in the world is because antivirus, which the world, has been used for about 25, 27 years is no longer effective. Any virus has literally not changed much, yet the hackers over the last 25 years have improved and grown exponentially better.
That’s why, if you think about this, I don’t know a computer in the world, they’re billing into computers, I don’t know a computer in the world that doesn’t have antivirus right out of the box.
If you buy it from Dell it comes with it or you buy it from anywhere. I don’t know anyone that doesn’t have antivirus but yet everyday there are tens of thousands and hundreds of thousands of breaches worldwide every day. How is that possible if antivirus actually works?
If you watch the security gurus talk, as I do and I’m one of them, around the world the security gurus will all say that antivirus is only about 20%, 25% effective at best and an antivirus cannot stop what they call a “zero day attack”.
What a zero day attack is, let’s just say I’m a hacker. I sit down today and I write a piece of spyware and then I introduce that spyware through an email or I go infect some website, a legitimate website and they put it out there so that everyone that goes there now gets spyware.
There is no antivirus in the world that can stop a zero day attack because they all work on some level of either known signatures or heuristics [sounds like], basically understanding what you’ve done before. If I don’t know the signature of that website that you’re going to go to where they download that link that you’re going to download and open, if I won’t know that that’s bad, then my system will automatically open it up.
The problem in the world, one of the biggest problems is that the antivirus people have been doling out the feeding everyone the, what I call the antivirus Kool-Aid for years, telling people that they’re safe and sound and they don’t have to worry about anything just update your antivirus.
That’s not true. That’s absolutely, that is false and they are misleading people to constantly buy and upgrade their software to the newer version.
Roy: They don’t offer, the antivirus software doesn’t do anything with key logging?
George: No. Absolutely. In fact, antivirus people are misleading the public because if you pick up and I’ve actually complained to the attorney general about this and I hope they do something one day.
If you pick up a box of any antivirus, right on the side of it, it says, “prevents key logging attacks.” What it doesn’t have is it doesn’t have a disclaimer which states we could only stop the known key loggers, we can’t stop new ones that we don’t know about.
Because they don’t put that disclaimer on there, most people think that they’re safe and sound but as I said, if you have a zero day attack is written today, it automatically bypasses anything on your system, therefore, go ahead.
Roy: What percentage of computers would you say have been infected with key logging?
George: The FBI put out a report about two years ago and they said that they felt that greater than 70% of the world’s computers have spyware on it. What we do know is that the number one type of spyware that steals the data, which was put out by the Verizon Report…
They put this yearly investigative report out. Is that when data was exfiltrated for the purposes of stealing from a customer, 96% of the time a key logger was the culprit because a key logger is an amazing piece of software.
It just sits there and it copies each and every keystroke and then it emails it off to the bad guy.
Roy: Now what does your software do?
George: What we do is when we looked at this problem back in 2005, we started looking at how the hacking was still going on and we knew we wanted to build multiple products so basically my CPO and I talked about, ‘Can we stop this new wave of hacking via key loggers?’
The way that they get around there is either through phishing or nefarious emails to a person with an infected attachment or one of the newest ways that they get to people is through social networking and/or infecting major websites.
Like two months ago, WNBC, Channel 4 here in New York was hacked and their site, the malware writers put a key logger called a Citadel key logger right to their website. If you went to MSNBC site to look up the latest SNL skit, you automatically got infected. You can’t even trust a legitimate site today, that it hasn’t been turned into a harbinger of spyware.
Roy: Does your software, do you have a patent on this software?
George: We have a patent pending so essentially what we’ve done is what Ram figured out is that the old concept of trying to prevent the bad guy from getting into your computer, that an old concept that is flawed drastically. What he realized is that what we needed to do is actually protect the data.
Because what are the hackers after? They’re after your data so one of the things that every security guy knows is that encryption is good. What he did was applied the concept of encryption to your keystrokes so essentially it took about two and a half years to write the software.
As soon as you download the software, Roy, instantly it starts encrypting each and every keystroke in real time, no matter what you’re doing. You’re on any website, you’re in an IM chat, you’re logging into your company’s VPN, you’re using Outlook.
Where’s the wealth of any company’s information? It’s in its email. Anything that you do, as soon as your finger touches that key, the keyboard, whether wireless USB or PS2, we encrypt each and every keystroke in real time.
Therefore, we don’t stop the spyware from getting in there because you can’t stop spyware from getting in there. That’s a cat and mouse game that you’re always going to lose.
What we did was we came out with a new paradigm, we changed our paradigm by encrypting each and every keystroke so that all your keystrokes between your keyboard and the application are safe and sound.
I’m proud to say that in the last year alone, the last 14 months almost 6 million, or I think we might have just broke 6 million copies have been downloaded to protect both consumer and corporations.
Roy: Now what does it cost for the software?
George: As a consumer it’s $29.95 and they get to put it on two computers. Essentially, it’s $15.00 a computer for the year and then on renewal it’s $24.00, so it drops to $12.00 a computer.
Roy: You mean it’s $29.00 a year?
George: It’s 29.95 for the first year, then it’s $24.00 each year after that.
Roy: You have 6 million people that have paid this money?
George: No. I said 6 million downloads. The deals that we’ve done, let me, I’m going to get right back to that but I just want to answer where I was going but I won’t forget that. We have a, what I was actually saying prior to that is that we have both the consumer and an enterprise version so for the consumer it’s $29.95 then it’s $24.95 for renewal.
For the enterprise it’s $39.95 because there’s a bunch of more enterprise components in there for the network administrator but with them, they buy it by the amount of users and they buy it by the per-user but then there’s only a 15%t yearly maintenance on those. They buy it for actually 80 users or 8,000 users.
To get back to your question, because I’ll never forget that and I want to answer it is that in, what happens is a lot of our bigger partners, like for example ID Vault, they OEM our software and they delivered it out to large customers and in those, we don’t say how much we make but we get per user per month.
They wrote major deals out there like they did a deal with Comcast. Another one of our big partners is a company called Intersections and they have a product I guarantee you heard of, called Identity Guard.
They’re marketed everywhere and we’re built right into their product so a lot of our sales, Roy, are through the OEM relationships so we get substantially less but we get paid monthly by those business partners. They use it to make their products more safe and secure.
Roy: That sounds fantastic, I mean you guys have become real security mavens here.
George: Now in about 45 days, 30 to 45 days we’re going to take basically our out of band authentication, we’re going to take our keystroke encryption. We did that already and then we took a couple other things and we’re now introducing a product for your mobile device.
We are once again introducing encryption now for a mobile device, the first of its kind in the world. Ultimately, what we’re all about, Roy, is we protect access to your corporate network or your website, we protect the desktop from spyware and now we’ll be protecting the mobile device from spyware.
Roy: Now how many employees do you guys have now?
George: We’re now at seven and we’re hiring today.
Roy: That’s fantastic.
George: We’ve been a small company, real grassroots doing this for 12 years now.
Roy: Where are you guys, where’s your office space?
George: We’re located in Edison, New Jersey.
Roy: Another thing, can you give us a sense of the revenues of the company or any kind of metrics to help our audience?
George: We’ve doubled and tripled, we double our sales, just about doubled it the last three years. Last year, I’m proud to say that we did just about $1 million and we are on track for multiplying that by several times this year. We’re very excited and we expect to double our revenues each year for the foreseeable future, minimally.
Roy: There is no shortage of a need for security and truly keystroke issues are major. I read an article about a guy, a business who, somebody got on his computer, logged into his bank account from his computer and wired hundreds of thousands of dollars away from his account and the bank wouldn’t give him the money back because they said, ‘It came from your computer.’
George: It didn’t actually come from his computer. What it does is, if they key log your credentials, then, they log in from their computer.
Roy: No. It came from his computer.
Roy: See, as I’m sure you’re aware, with IP addresses and security for cash management they can track your IP address too. They know if it came from your, so therefore you can’t, in some accounts you can’t log in from anywhere but your own computer in your office because of the IP address.
That super security to protect somebody from Russia logging in and wiring your money. If they can get control of your computer from a remote location, then they can use your computer to log into the bank and wire the money out and it looks totally secure to the bank.
George: I hear you and I agree but most banks, they don’t even check the IP, Roy. Most banks and this is what we’ve been seeing this happen more and more, but you’re absolute right. If I get a key logger on your system and I steal your credentials and I log in as you from anywhere else in the world, guess what?
Your bank does not need to pay you back the money because one of the things, and this is a big misgiving on banking. If someone walks into the bank today and they dress up as Roy and they steal, the teller accidentally gives them all your money.
Later on, when you find out there’s no money there and the bank pulls their cameras and they go, ‘Oh my god. We gave it to someone that looks like Roy and the guy really wasn’t Roy.’ They’ll automatically replace all your money. They have to.
However, when you sign on for online banking, 99.9% of the people don’t actually read the EULA, the End User License Agreement when they’re signing on to actually do banking and in that EULA it says that that long scroll down like eight pages long and you just hit the bottom ‘I Accept’.
In that EULA actually says, ‘You are responsible for the hygiene of your personal computer. If someone steals your credentials, if spyware is found on your computer and they steal your credentials because of that, we the bank do not need to pay you back your money.’
Roy: It’s a serious, it’s a serious business.
George: It’s a big problem.
Roy: It sounds like you guys are really poised to really grow significantly. Where do you think the company’s going to be in two or three years revenue wise?
George: I think the company in two to three years with the deals that we’re working on, the contracts that we’ve been signed and a lot of contracts that we sign they take a couple of months for them to build the components on their site to get it up and running. I think the company’s poised to do many millions.
I also think that with all the acquisitions going on in the market I would think that there are probably plenty of companies that would love to own our technologies and I’m talking about the big ones. Possibly even some of the ones that we’re suing.
The next couple of years are going to be very interesting because cyber security is getting better funded today. I just read an article two days ago that U.S. government, the Pentagon’s going to be spending another $23 billion extra over the next year just to help stop fraud and cyber theft.
Our products are poised to be enveloped into that by some companies. We feel very, we couldn’t be in a better place at a better time. That’s for sure.
Roy: George, sounds like you’re in a fantastic business. We’re coming down the home stretch. Is there any one last thought you want to leave with everyone before we close out our interview?
George: I just want to, I will. Security should always be top of mind and the key thing is always question everything but more than that, we’re glad to work with everyone and especially with the keystroke encryption because the Internet is so woven into our lives today. Email is so woven into our lives.
Social networking websites and social network is so woven into our lives. You’re bound to click on something by accident. That’s not your fault. That’s nobody’s fault. Where people are at fault is if they don’t take the precautions that they need.
We’re glad to work with people and put the keystroke encryption on every computer in the world. That is the most important thing I can leave anyone with because that’s the only way that you’ll know that you’re data is safe, your family is safe, your credentials are safe, your money is safe. I leave off on that one.
Roy: That’s fantastic. How will people get in touch with you if they want to reach you?
George: StrikeForce, we’re over here at anytime. They can reach us at 732–661-9641 and our website is strikeforcetech.com and we’re glad to help everyone out.
Roy: George, I really appreciate, we appreciate you taking the time. Definitely been an exciting call. Security is a huge thing and you guys seem very well poised to get a big piece of that market, so thank you very much.
George: OK. Thank you so much, Roy.
Roy: Thank you.