Sramana Mitra: So, one of the major trends that you’re tracking is government spying on corporate networks and you’re trying to provide a secure fortress around that?
Gregg Smith: That’s correct. We try to provide the best fortress we could build around all the communications I described earlier – sharing files, voice communications, and text communications.
Sramana Mitra: What other trends do you track or react to?
Gregg Smith: We pay very close attention to the devices that are coming out. If you think about it, we first had smartphones and then we had tablets. Now, we’re getting devices that are in between. We pay much attention to how the devices are connected to the cellular network or WiFi because WiFi is a great avenue to steal information. We closely follow the devices themselves.
Sramana Mitra: Are you able to do something consequential in the internet of things architecture?
Gregg Smith: We have a variety of partners that are building things and utilizing some of our products for sensors that are used to monitor border patrol. The chip is going into military helmets for Bluetooth communications because Bluetooth has a very insecure network. We’re in discussion with some folks in the automotive space. We have a variety of partners leveraging our technology for a much more comprehensive approach to the Internet of things compared to what my team is doing here.
Sramana Mitra: Can you describe the product that you sell?
Gregg Smith: We start off with a chip. The chip comes in the form of a micro SD card, which is the same size as your fingernail or the exact same form factor of a SIM card. It provides network connectivity to a variety of networks around the world. The chip itself has Koolspan’s secret sauce in it but it also has an armed 32-bit processor, which has five times the processing power of an early IBM computer. My team of engineers and partners leverage the cryptography in that chip to build applications. We have a software development kit that allows us to easily build applications for text messaging and voice across iPhones, Blackberrys, Android devices of all flavors, tablets, and laptops. We use that one chip for the cryptography across all those different devices. The technology itself can be used on one or multiple carriers. We can also use it on the cellular networks, WiFi, and satellite communications.