Business description of ZERIFY-INC from last 10-k form

StrikeForce Technologies, Inc. is a software development and services company that offers a suite of integrated computer network security products using proprietary technology. StrikeForce Technical Services Corporation was incorporated in August 2001 under the laws of the State of New Jersey. On September 3, 2004, the stockholders approved an amendment to the Certificate of Incorporation to change the name to StrikeForce Technologies, Inc. On November 15, 2010, we redomiciled under the laws of the State of Wyoming. We initially conducted operations as an integrator and reseller of computer hardware and telecommunications equipment and services until December 2002.  In December 2002, and formally memorialized in September 2003, we acquired certain intellectual property rights and patent pending technology from NetLabs.com including the rights to further develop and sell their principal technology. In addition, certain officers of NetLabs.com joined our company as officers and directors of our company. We subsequently changed our name to StrikeForce Technologies, Inc., under which we have conducted our business since August 2003. Our strategy is to develop and market our suite of network security products to the corporate, financial, healthcare, government, insurance, e-commerce and consumer sectors. We plan to grow our business primarily through internally generated sales, rather than by acquisitions. We have no subsidiaries and we conduct our operations from our corporate office in Edison, New Jersey.

We own the exclusive right to license and develop various identification protection software products to protect computer networks from unauthorized access and to protect network owners and users from identity theft.  We have developed a suite of products partly based upon this exclusive license that is targeted to the financial services, e-commerce, corporate, government, healthcare and consumer sectors. 



We began our operations in 2001 as a reseller and integrator of computer hardware and iris biometric technology. From the time we started our operations through the first half of 2003, we derived the majority of our revenues as an integrator. In December 2002, upon the acquisition of the licensing rights to certain intellectual property and patent pending technology from NetLabs.com, we shifted the focus of our business to developing and marketing our own suite of security products. Based upon the acquired licensing rights and additional research and development, we have developed various identification protection software products to protect computer networks from unauthorized access and to protect network owners and users from identity theft. In November 2010, we received notice that the United States Patent Office (“USTPO”) has issued an official Notice of Allowance for the patent application for the technology relating to our ProtectID® product, titled "Multi-Channel Device Utilizing a Centralized Out-of-Band Authentication System". In January 2011, we received notice that the United States Patent Office issued the Company Patent No. 7,870,599.  The “Out-of-Band Patent” went through a USTPO Re-Examination process starting on August 16, 2011 and concluded on December 27, 2011, with all of our patent claims remaining in-tact and seven additional Company patent claims being added. In 2011, we submitted an additional continuation patent on the “Out-of-Band” Patent, with another sixty-six additional Company claims now pending. The technology we developed and use in our GuardedID® product is the subject of a pending patent application.  In December 2011, we executed an exclusive agreement with an agent to represent us in enforcing the patent.

We completed the development of our ProtectID® platform at the end of June 2006 and we completed the core development of our keyboard encryption and anti-keylogger product, GuardedID®, in December 2006, with continuous enhancements, which is currently being sold and distributed. We seek to locate customers in a variety of ways. These include contracts primarily with value added resellers and distributors (both inside the United States and internationally), direct sales calls initiated by our internal staff, exhibitions at security and technology trade shows, through the media, through consulting agreements, and through our own and agent relationships. Our sales generate revenue either as an Original Equipment Manufacturer (“OEM”) model, through a Hosting/License agreement, bundled with other company’s products or through direct purchase by customers. We price our products for cloud consumer transactions based on the number of transactions in which our software products are utilized. We also price our products for business applications based on the number of users. We believe that these pricing models provide our company with one-time, monthly, quarterly and yearly recurring revenues. We are also generating revenues from annual maintenance contracts, renewal fees and expect, but cannot guarantee, an increase in revenues based upon the execution of various agreements that we have recently closed and are being implemented.

In October 2010, we executed an agreement to pursue a funding opportunity through a consulting company that, through an executed Memorandum of Understanding, purports to provide funding to us over time, necessary to sustain the Company while current contracts for business revenues develop and increase to a sustainable level. Other multiple alternative funding options had not progressed to viable proposals or did not close because of their expressed high risk level associated with our secured lenders, large debt positions and low revenues. A requirement of this funding source, utilizing an equity funding approach, required us to re-domicile in the State of Wyoming in order for this project to move forward in a necessary timeframe and at a necessary low cost to the Company. In November 2010, we received the corporate registration, amended articles of incorporation and by-laws as a result of our re-domiciling in the State of Wyoming.

We generated all of our 2011 and 2010 revenues of $448,127 and $265,990, respectively, from the sales of our security products. We market our products to financial service firms, e-commerce companies, government agencies, the enterprise market in general and with virtual private network companies, as well as technology service companies that service all the above markets. We seek such sales through our own direct efforts and primarily through distributors, resellers and third party agents. We are also seeking to license the technology as original equipment with computer hardware and software manufacturers. We are engaged in production installations and pilot projects with various distributors, resellers and direct customers, as well as having reached additional reseller agreements with strategic vendors internationally, including South America, Europe and Asia. Our GuardedID® product is also being sold directly to consumers, primarily through the Internet as well as distributors, resellers, third party agents and potential OEM agreements by bundling GuardedID® with their products (providing a value-add to their own products and offerings).

We have incurred substantial losses since our inception. Our management believes that our products provide a cost-effective, more secure and technologically competitive solution to address the problems of network security and identity theft in general. However, there can be no assurance that our products will continue to gain increased acceptance and continue to grow in the commercial marketplace or that one of our competitors will not introduce technically superior products. 

Our executive office is located at 1090 King Georges Post Road, Suite 603, Edison, NJ 08837. Our telephone number is (732) 661-9641. We have 7 employees. Our Company’s website is www.strikeforcetech.com.  We are not including the information contained in our website as part of, or incorporating it by reference into, this report on Form 10-K.

Our Products

StrikeForce is a software development and services company. We own and are seeking to commercially exploit various identification protection software products that were developed to protect computer networks from unauthorized access, real time, and to protect network owners and users from identity theft and data breaches. Our principal products ProtectID® and GuardedID®, inclusive of our unique CryptoColor® technology, are proprietary authentication and keystroke encryption technologies that are intended to eliminate unauthorized access to computer networks and to prevent unauthorized individuals from copying (logging) keystrokes. We are developing a market for our suite of products in the financial services, e-commerce, corporate, healthcare, government and consumer sectors. Our products are as follows:

·

ProtectID® is an authentication platform that uses “Out-of-Band” two-factor in-house installation, cloud service technology and a hybrid to authenticate computer network users by a variety of methods including traditional passwords combined with a telephone, iPhone, Droid, Blackberry, PDA, or multiple computer secure sessions, biometric identification or encrypted devices such as tokens or smartcards as examples. The authentication procedure separates authentication information such as usernames and passwords or biometric information, which are then provided to or from the network’s host server across separate channels. The platform allows for client choices, per their company’s security policies, which evolves over time with newly available and customer requested technologies.

GuardedD® creates a 128-bit encrypted real time separate pathway for information delivery from a keyboard to a targeted application on a local computer, preventing the use of spyware/malware to collect user information.  This product provides keyboard encryption and helps prevent keylogging from occurring in real time, which helps prevent the number one threat to consumers and businesses in today’s market: keylogging software, which is stealth software embedded in web sites, emails, pictures, MP3 files, videos or other software that, once unknowingly launched, secretly monitors and records all of a user's keystrokes on the computer and sends the data to the identity thief without the user’s awareness.  Keylogging has been reported as the #1 cause of major data breaches that occurred in 2010, as reported in the 2010 Verizon Data Breach Report.

Our products sometimes include software and hardware that we contractually license from other vendors. These products include VASCO (an authentication and e-signature solutions company) tokens, as well as additional authentication and telecommunication software devices.  

The ProtectID® Cloud Service can be hosted by our service provider (we have a strategic arrangement with a third party SAS70 hosting service) or not hosted and the ProtectID® Platform can be installed internally in a customer’s infrastructure. With the exception of our free redistributable Microsoft software components and our reseller agreement with VASCO, none of our contracts for hardware or software are with a sole supplier of that product.

Factors that are considered important to our success include, but are not limited to, the following:

ProtectID® addresses the needs of a broad variety of customers for authentication security. One of the biggest problems facing the world is Identity Theft, the effects of which total an estimated $221 billion per year in business losses.

FBI warns of $100 million cyber-threat to small business, reported November 3, 2009 by Computerworld

Bank Technology News reported in January 2010, that consumers have been aware of the threats of online crime, yet are still falling prey to scams at increasing rates, according to RSA Security (“RSA”) who found that 70% of users feel their banks should implement stronger security.

48% of all data breaches in 2011 were caused by key loggers (malware copying keystrokes), as reported by the Verizon 2012 Data Breach  Report.

In 2011, it was reported that RSA Security was breached in late 2011 from which Lockheed Martin and others were affected. This event caused many companies to look to other means of two-factor authentication, such as Out-of-Band. The RSA Data Breach started with a keylogging virus.

Heartland Payment Systems Inc. said that cyber criminals compromised its computer network using keyloggers, gaining access to customer information associated with 100 million card transactions it handles each month, as reported by the Wall Street Journal on January 21, 2009.

In respect to the latest version of our keyboard encryption and anti-keylogger Product, GuardedID®, a recent report from a government security group known as CERT states that minimally 80% of the malicious keylogging programs are undetected by the major anti-virus software suites. However, the Guarded ID(R) is designed to render the malicious programs useless, in real time.

The Effectiveness of Our Products: Our products have been designed to provide, we believe,  a high available level of security for computer networks and individual users. In particular, we believe that the now Patented “Out-of-Band” authentication process is an innovative technology that will greatly prevent unauthorized access to computer networks and will provide effective security products to drastically reduce the incidence of identity fraud for our customers. We have contractually commenced implementation of our products on a large global scale, yet there can be no assurance that they will function in all aspects as intended. Likewise, a high level of innovation characterizes the software industry and there can be no assurance that our competitors will not develop and introduce a superior product. The effective functioning of our products once deployed is an important factor in our future success. To date and our knowledge, all of our clients have reported, per a report by Research 2.0, that our products work as described .

Ability to Integrate our Software with Customer Environments: There are numerous operating systems that are used by computer networks. The ability of a software product to integrate with multiple operating systems is likely to be a significant factor in customer acceptance of particular products. StrikeForce’s ProtectID® operates on an independent Cloud Service platform and is also able to integrate with multiple operating systems and user interfaces for an in-house implementation. ProtectID® has been designed to use multiple authentication devices that are currently on the market (including, but not limited to, biometrics, key-fob tokens, iPhones, iPads, Blackberrys, Androids, PDA’s, smart cards and other Mobile devices). Our ability to integrate our products with multiple existing and future technologies is currently a key factor in the growth of our product’s acceptance and is demonstrated by our success with recent clients and installations referred to in a number of our 2011 and 2012 press releases.  Our GuardedID® product currently operates with Windows Internet Explorer (IE) and Firefox web browsers and our upgraded Premium version works with almost all applications running on a Windows desktop platform, inclusive of Microsoft Office. New features and functions for both products continue to be developed via our research and development, as well as the ability to operate on other technology platforms, such as Apple and we expect deployment of our GuardedID® for the MAC OS in the second quarter of 2012.

Relative Cost: We have attempted to design our products to provide a cost-effective suite of products for financial services, e-commerce, commercial, healthcare, government and direct-consumer customers. Our ability to offer our products at a competitive price and to add to existing installations is likely in our opinion, to be a key factor in the acceptance of our product as we have seen with many of our clients.

Business Model

We are focusing primarily on developing sales through “channel” relationships in which our products are offered by other manufacturers, distributors, value-added resellers and agents, internationally. In 2010, we added and publicly announced a major channel distributor who provides a presence for us in London, England, representing us in the European Union. We also sell our suite of security products directly from our Edison, NJ office, which also augments our channel partner relationships. It is our strategy that these “channel” relationships will provide the greater percentage of our revenues ongoing, as was the case in 2011. Examples of the channel relationships that we are seeking include already establishing original equipment manufacturer (“OEM”) and bundled relationships with other security technology and software providers that would integrate or bundle the enhanced security capabilities of ProtectID® and or GuardedID® into their own product lines, thereby providing greater value to their clients. These would include providers of networking software and manufacturers of computer and telecommunications hardware and software that provide managed services, as well as all markets interested in increasing the value of their products and packages, such as financial services software, anti-virus, government integrators and identity theft product companies.

Our primary target markets include financial services such as banks, insurance companies, e-commerce based services companies, telecommunications and cellular carriers, technology software companies, healthcare, government agencies and consumers. For the near term, we are focusing our concentration on the identity theft and data breach strategic problem areas, such as where compliance with government regulations are key and stolen passwords are used to acquire private information illegally. We recently executed a multi-year contract with a major US financial lender who will utilize our ProtectID® solution for its over (12,000,000) employees, administrators and consumers.

Because we are now experiencing a growing market demand, we are developing a sizeable global reseller and distribution channel as a strategy to generate, manage and fulfill demand for our products across market segments, minimizing the requirement for an increase in our staff. We have minimized the concentration on our initial direct sales efforts as our distribution and reseller channels continue to grow internationally with a major focus in Europe.

We seek to generate revenue through fees for ProtectID® based on consumer usage in the financial and healthcare services markets, as well as enterprises in general, through our Cloud Service, plus one-time and annual per person fees in the enterprise markets which often are for local installations of our product, and set-up and recurring transaction fees when the product is accessed in our Cloud Service, along with yearly maintenance fees, and other one-time and recurring fees. We also intend to generate revenues through sales of our GuardedID® product. GuardedID® pricing is for an annual license and we discount for volume purchases. GuardedID® pricing models, especially when bundling through OEM contracts, include monthly and quarterly recurring revenues. As more agreements are reached by our distributors, we are experiencing monthly increasing sales growth, through the execution of GuardedID® bundled OEM agreements. We also provide our clients a choice of operating our ProtectID® software internally by licensing it or through our hosted Cloud Service. GuardedID® requires a download on each and every computer it protects, whether for employees or consumers. We have three GuardedID® products, (i) a standard version which protects browser data entry only, (ii) a premium version which protects almost all the applications running under Microsoft Windows on the desktop, including Microsoft Office Suite and (iii) an Enterprise version which provides the Enterprise administrative rights and the use of Microsoft’s Enterprise tools for the product’s deployment.

Marketing

 Our multi-channel marketing strategy includes:

Direct sales to enterprise and commercial customers. In this effort, we are purchasing marketing programs, a new strategy for us, and we are looking at other inside sales alternatives in order to respond aggressively to inquiries relating to our products.

The global addition of resellers, agents & distributors (our strategic sales channel) who distribute and resell our products and services to enterprise and commercial customers (technology and software product distributors, systems integrators, managed service companies, other security technology and software vendors, telecom companies, identity theft related product companies, etc.).

Application Service Provider (ASP) Partners: Our certified SAS 70 third party service provides a hosting platform that facilitates faster implementations at competitive prices for our Cloud Service option.

Original Equipment Manufacturers (OEM): SFT products are sold to other security technology vendors that integrate ProtectID® and  GuardedID® into their products (bundling) and services providing for monthly increasing recurring revenues.

Internet sites that sell GuardedID® to consumers and small enterprises, such as affiliates.

Our hosting service provider is Host My Site and we have been under contract with them since December 2007 when we executed an agreement with a nationwide premier data center and co-location services provider who functions as an Application Service Provider for our ProtectID product, which requires a secondary server used for the “Out-of-Band” two-factor authentication technology. We believe that this relationship improves the implementation time, reduces the cost and training requirements, and allows for ease of scalability on an as needed basis. The hosting site is also SAS 70 (Statement on Auditing Standards (SAS) No. 70,) certified, which is critical to providing a secure compliant service that is required by most of our clients. Our agreement with the services provider was for a one-year (1) term, initially ending in December 2008 and renewing automatically for one-year (1) terms, and is still in effect. The relationship can be terminated by either party on sixty days written notice. The hosting service is compensated by our Company based on a flat monthly fee per the terms of the contract that can increase as we require additional services.

Intellectual Property

In December 2011, we executed an exclusive agreement with an agent to represent us in enforcing the patent. Our firewall product, which was in the research and design phase, is no longer being developed; therefore, the pending provisional patent application was allowed to expire. A fourth patent application relating to our ProtectID® product was combined into the first ProtectID® patent application and the fourth application was allowed to lapse.

We have three trademarks that have been approved and registered: ProtectID®, GuardedID® and CryptoColor®.

A portion of our software is licensed from third parties and the remainder is developed by our own team of developers. We rely upon confidentiality agreements signed by our employees, consultants and third parties to protect the intellectual property rights.

We license technology from third parties, including software that is integrated with internally developed software and used in our products to perform key functions. We anticipate that we will continue to license technology from third parties in the future. Although we are not substantially dependent on any individual licensed technology, some of the software that we license from third parties could be difficult for us to replace. The effective implementation of our products depends upon the successful operation of third-party licensed products in conjunction with our suite of products, and therefore any undetected errors in these licensed products could create delays in the implementation of our products, impair the functionality of our products, delay new product introductions, damage our reputation, and/or cause us to provide substitute products.

Business Strategy

We expect to incur significant additional costs before we become profitable. We anticipate that most of the costs that we incur will be related to salaries, professional fees, marketing, sales and research & design. We anticipate that we will increase our sales force by approximately one full-time employee and our technology staff by approximately two employees during the next twelve months. At the present time, our monthly cash expenditure burn rate is approximately $95,000 per month. We expect that our monthly cash usage for operations will increase in the future due to contracted and anticipated increased volumes and the preceding additions. We anticipate that the area in which we will experience the greatest increase in operating expenses is in marketing, selling, advertising, payroll related to sales and product support, technology and global strategic business consulting subject to cash availability.

Our primary strategy over the next 12 months is to focus on the growth and support of our channel partners, including distributors, resellers and original equipment manufacturers (OEMs). Secondly, our internal sales team will target potential direct sales to network customers, and in industries that management believes provides the greatest potential for sales. These include small to medium sized financial institutions, government agencies, e-commerce, healthcare and enterprise businesses. Our management hopes to leverage the  increase in marketing expenses and is looking outside the business for further direct sales expansion. We are also executing agreements with strategic resellers and distributors for marketing, selling and supporting our products internationally. It is our intention to ultimately utilize distributors, resellers and agents to generate the bulk of our sales internationally, realizing that this strategy will take time to nurture. There can be no assurance, however, that we will succeed in implementing our sales strategy. Although management believes that there is an increasingly strong market for our products, we have not generated substantial revenue from the sale of our principal products and there is no assurance we can secure a market sufficient to permit us to achieve profitability in the next twelve months.

Competition

The software development and services market is characterized by innovation and competition. There are several well-established companies within this market that offer network security systems and newer companies with emerging technologies.

We believe that our patented “Out-of-Band” two-factor identity authentication product is an innovative, secure, adaptable, competitively priced, integrated network authentication system. The main features of ProtectID® include: an open architecture “Out-of-Band” platform for user authentication; operating system independence; biometric layering; mobile authentication; secure website logon; Virtual Private Network (“VPN”) access; domain authentication and multi-level authentication. Unlike other techniques for increased network security, ProtectID® does not rely on a specific authentication device or method (e.g., phone, tokens, smart cards, digital certificates or biometrics, such as a retinal or fingerprint scan). Rather ProtectID® has been developed as an “open platform” that incorporates many authentication devices and methods. For example, once a user has been identified to a computer network, a system deploying our ProtectID® authentication system permits the “Out-of-Band” authentication of that user by a telephone, iPhone, iPad, Blackberry, PDA, email, hard token, SSL client software, a biometric device such as a fingerprint scan, or others, before that user is permitted to access the network. By using “Out-of-Band” authentication methods, management believes that ProtectID® provides a competitive product for customers with security requirements greater than typical name and password schemes for virtual private networks and computer systems with multiple users at remote locations, as examples. We also believe that our keystroke encryption product, GuardedID®, offers an additional competitive edge for network security and e-commerce applications that should provide greater levels of security and the ability to evolve over time based on newer technologies when made available. Both products have limited competition based on our product’s ability to protect individual identities and computers/devices.

Although we believe that our suite of products offer competitive advantages, there is no assurance that any of these products will gain acceptance in the marketplace. Our competitors include established software and hardware companies that are likely to be better financed and to have established sales channels. Due to the high level of innovation in the software development industry, it is also possible that a competitor will introduce a product that provides a higher level of security than the ProtectID® products or which can be offered at prices that are more advantageous to the customer.

Employees

As of fiscal year end December 31, 2011, the Company had 7 employees. We believe relations with employees are generally good.

WHERE YOU CAN FIND MORE INFORMATION

You are advised to read this Form 10-K in conjunction with other reports and documents that we file from time to time with the SEC. In particular, please read our Quarterly Reports on Form 10-Q and Current Reports on Form 8-K that we file from time to time. You may obtain copies of these reports directly from us or from the SEC at the SEC’s Public Reference Room at 100 F. Street, N.E. Washington, D.C. 20549, and you may obtain information about obtaining access to the Reference Room by calling the SEC at 1-800-SEC-0330. In addition, the SEC maintains information for electronic filers at its website http://www.sec.gov.