Com-Guard, Inc. (CGUD-OTC:BB)
Interview with:
Joe Sigismonti, President and COO
Business News, Financial News, Stocks, Money & Investment Ideas, CEO Interview
and Information on their
software and hardware products that provides PC users with an extensive set of security measures that address Internet and local security, file locking, encryption security (including e-mail), event monitoring, web site and email content filtering, and internal facility security.

 

Cover Story

CEOCFO Current Issue

Cover Story Archives

Private Equity Review

CEOCFO Interview Index

Future Features

Analyst Interviews

Corporate Financials

Contact & Ordering

This is a printer friendly page!

Com-Guard is taking PC protection beyond firewalls, anti-virus scanners and anti-spy programs by blocking access to anyone who doesn’t have the proper passwords or encryption keys to access your data

wpe1.jpg (6695 bytes)

Technology
PC Security
(CGUD-OTC:BB)

Com-Guard, Inc.

2075 Corte del Nogal # R
Carlsbad, CA 92009
Phone: 760-431-2206


Joe Sigismonti
President and COO

Interview conducted by:
Lynn Fosse, Senior Editor
CEOCFOinterviews.com
March 24, 2005

BIO:
Joe Sigismonti
serves as President and Chief Operating Officer for the Company. He has been actively involved in the development, marketing, and sales of computer systems and related products for over 30 years. As an electronics engineer, sales representative, line manager, and corporate executive, he has a proven track record in such well-known companies as McDonnell Douglas, Hewlett Packard, Scientific Atlanta, and Perkin Elmer. Mr. Sigismonti has developed and directed large, high technology marketing and sales forces worldwide. He has held positions as Vice President of sales and marketing; Vice President of worldwide sales; and Executive Vice President of operations in companies serving various high-technology markets. Mr. Sigismonti received his Bachelor of Science degree in electrical engineering from Pennsylvania State University.

Company Profile:
Com-Guard, Inc. develops and markets a line of software and hardware products for the computer industry that provide enhanced system security for both individual users and system administrators. The Company’s focus is on detection, protection and notification of various security and privacy threats. The Company provides a group of products that provides PC users with an extensive set of security measures that address Internet and local security, file locking, encryption security (including e-mail), event monitoring, web site and email content filtering, and internal facility security.

The Company's patented product, Com-Guard ProTM, utilizing the Company's Sensor CardTM, includes the Com-Guard’s unique software technology that enables users to protect and limit access to sensitive data while providing a physical security system to guard against tampering, theft of the computer or unexpected intrusions into the environment. The Com-Guard ProTM system provides environmental security by supporting internal and external sensors.  Software only adaptations of the product are sold separately under the trade names “Com-GuardTM” and “ComputerSafeTM”.   In each product, specific types of security provisions can be selected for monitoring using a simple menu approach.  Violations are immediately communicated to predetermined people or locations via a page, phone or email transmission. These products are sold through Retail and OEM channels and can be sold on a licensed basis to interested parties.   Additionally, the Company is developing and introducing a content filtering/application control product, SafePC, that blocks pornographic images and text from being displayed from web sites and email attachments in real-time and provides for the administrative control of the desktop and executable programs.

CEOCFOinterviews: Mr. Sigismonti, will you give us a little background of Com-Guard and why you have been attracted to the company?
Mr. Sigismonti: “Com-Guard is a company that is in the computer security business, aimed at the PC marketplace. We have focused our attention on the data on the computer’s storage media as being the most precious thing there is in regard to computer security. Notably, the Federal Trade Commission reports that the largest number of complaints it is receiving involves Identity Theft. There is a lot of computer theft going around and especially with exposure to the Internet, and data is the most important thing you can protect on your computer. Computers and other hardware can be replaced but the data might not.  This attracted me to Com-Guard some years ago; I had a long association with Dr. Edward W. Savarese, the CEO. We worked together at Hewlett Packard (NYSE: HPQ) and another company he founded, Personal Computer Products, Inc., in the early 80’s. When he approached me about launching this company, I was very excited about it because it was a field that I thought was going to be a very explosive one to be in.”

CEOCFOinterviews: How does Com-Guard protect data differently than firewalls and anti-virus programs?
Mr. Sigismonti: “Firewalls, anti-virus and anti-spy programs protect to a certain degree and do a good job on known threats. However, new techniques that hackers develop daily are constantly being introduced. New viruses, new penetration methods, and new spy-ware can still be installed on a system without the users knowledge and vital data can be extracted from the disc drive. What we have focused on is protecting data at the disc level, and we do that by locking up the files, by hiding them, and then at the ultimate level of protection, by encrypting them, so even if they were stolen or the computer itself was stolen, the data would still be safeguarded from any access. We look at it from a data standpoint and we protect it from the disc level up. Our software detects attempted intrusions from the Internet or from a local person walking up to the keyboard and trying to open a protected file or to load the file onto a floppy disk-drive and walking away with it. We also log the event and send notifications of the activity to the legal owner.  If a camera in installed on the system, the ComputerSafe program can even send a video clip of a physical intrusion.”

CEOCFOinterviews: Since hackers are always developing new ways, how are you so sure you can protect against something, which has not been developed?
Mr. Sigismonti: “The technology itself is straightforward. You write data to a disk drive and you have to go through a file system to get to that data on the disk drive. Our file protection system changes the method of access to certain files you designate as confidential files. The only way that you can get to those files is by going through the Com-Guard system and having the proper passwords or encryption keys to access the data. It is independent of where the access request comes from because we are sitting at the last level of protection right before the data on the disk. If the password is not correct, we will not allow access.”

CEOCFOinterviews: I would suspect that most people have no clue that they need this protection!
Mr. Sigismonti: “That is possibly true. However, the understanding is growing that there is a dark side to using the Internet or to having confidential files on your disk and I believe more and more people are recognizing this. Perhaps they still are not completely aware of what these technologies do for or to them. The Identity Theft issue is serious and much of that may come from people not realizing that their disk drive and the data on it is vulnerable to attacks.  The whole concept of computer crime and data theft has been elevated in the last five years or so as evidenced by some governmental regulations.  One such regulation is the Health Insurance Portability and Accountability Act of 1996 that establish standards to protect the privacy of personal health information.  Part of that mandate addresses how private electronic data is transmitted, stored, retrieved and protected to avoid unauthorized access.  We believe we can serve this and several other markets with of our products.

Another more subtle thing that happens is that when people are up-graded from a small disk to a larger disk, they do not take the proper precautions about the disk that they are getting rid of. A large number of times, the data on that disk can be read by anybody and there is data there that could be very damaging should it be misused. We recommend that if people have Com-Guard they take the disk that they get rid of and encrypt all the files before they get rid of the disk. That way, if somebody buys that disk at a swap meet or something; they cannot read those files.   Just deleting files does not provide sufficient protection.”

CEOCFOinterviews: Are you making revenue for the company by selling the software package outright?Mr. Sigismonti: “We have a software package as I have described, that does the data protection. We also have a patented hardware device that plugs into a computer, and it is like a car alarm for your computer. It actually works with a remote control unit; it has a vibration sensor and some other external sensors that you can add to the system to actually protect an office for instance. The vibration sensor in the computer will detect any motion, so if someone attempts to move the computer to steal it or something, it sounds off with an alarm. We have both hardware and software protection devices and the software can stand alone, or go with the hardware.”

CEOCFOinterviews: Is there much competition in this segment of the industry?
Mr. Sigismonti: “Actually, there is not a lot of direct competition doing what we do on the data side. There are people that do encryption and hide files and so on. We have a completely integrated package to not only protect the data, but also to protect the computer. Our software will detect intrusion attempts, block access to protect files and dispatch notifications to the user by phone or email. We have a number of different levels of protection that we can provide. As I mentioned, we even support video capture of an intruder if the PC is configured with a camera.  Most of the competitors in the field of computer security are found at the firewall anti-virus, anti-spyware, and network security end of the spectrum. Our focus has been at the PC level where consumers or system administrators in every industry can use our products. We cover a broad bandwidth of users.”

CEOCFOinterviews: How do you reach potential customers now, and what do you need to do to increase that reach?
Mr. Sigismonti: “Right now, we are just launching a new web-marketing program to revise our website with our latest products. It’s not done yet but is underway.  We will then be optimizing that website to bring people to it with key words and things like that. We are also embarked on a delivery system for our products to distribution market, where we are providing a trial version of the product free of charge and including with computers that are being sold. We have a couple of versions of that product and that program; one is a Manufacturing Affiliate Program.   In a nutshell we work with a PC manufacturer and provide them with flyers or labels that describe our Trial software product, where to find our web site and we include a coupon number that grants a discount against the purchase price of the product. With this program, when the user buys the computer, they will have the option to use the software and try it out.  If they want to buy it, they can go to our website and buy the final product with the discount and install it on the machine. We can track that order back to the manufacturer or distributor via the coupon number and compensate them for the order.   That program is just getting underway today. Additionally, we currently have orders for computers on which these trial packages will preloaded when the computer ships thereby cutting out one step for the user.”

CEOCFOinterviews: Please tell us about your agreement with Wintergreen Systems.
Mr. Sigismonti:  “We have announced three or more orders with Wintergreen Systems. One was for 14 thousand AMD based computers, that we have started delivering.  Another order is for 15 thousand Intel Pentium based units. The third is for 14 thousand Barebone systems. The MAP program is precisely the program that we are trying to operate through Wintergreen.”

CEOCFOinterviews: How do you educate the public and the producers of computers and companies like Wintergreen about your system and the need for it?
Mr. Sigismonti: “The challenge for us now from the standpoint of a marketing program is that we need to get a higher level of awareness of our products and that we can delivery a high level of security to users.  To do this we will be exhibiting at trade shows to attract strategic partners, distributors and end-user groups.  Our SecurePCTM systems with Com-Guard ProTM software and patented Sensor-Cards are being manufactured by Wintergreen Systems and are being distributed through other large companies; TigerDirect.com is one of the companies that sell the product.  It is a remarkable value for security conscience buyers.   We intend to continue to provide value-added security to PC’s right off the production line. Hopefully, word of mouth advertising will play a roll.  Also an on-line sales effort will attempt to direct people to our website and will play a big factor in our e-commerce sales. Then, of course, we also want magazines to review our products and to write articles about them to increase awareness. We are going to have to address all of these issues rapidly with the right people and the media.”

CEOCFOinterviews: Why is it the time for Com-Guard top start addressing these issues aggressively now?Mr. Sigismonti: “We spent the last four years in developing the products. The latest versions of the products are very sound, and feature rich. There is a growing awareness of some of the security issues and the user market is starting to become more aware of computer crime.  In the past I think we had a product that was before its time. We were constantly trying to raise the level of awareness and now, with the fanfare of what is happening with the Internet, data security and Identity Theft, I think the time is right for our products. It is all coming together.”

CEOCFOinterviews: Part of your product is to protect children and multiple computer users in the home and business; will you tell us more about these features?
Mr. Sigismonti: “That is another product. The product I was talking about we call, ComputerSafe. That product is the data protection, computer protection product. The other product we have and are introducing is called SafePC, which enables parental guidance in the home and administrative control in small and medium business. It allows an administrator or a parent to control the access of programs on the computers so they can only be run during certain hours. An example of that would be the messenger service. You can make it so that a child is not allowed to use Instant Messenger in the middle of the night. It can be locked out for the hours that you specify; that is just one example. There are other examples with any program that you want to have control of. Likewise, in business if an administrator did not want people to run certain programs at certain times; they could control that. The other portion of that product involves content filtering. It is a unique capability that uses sophisticated algorithms to analyze images on the fly in real-time regardless whether they are on a web site or in an email attachment. It determines whether the content, images and text, is pornographic or objectionable. If it is, it will block the images or text from appearing. This is a very important parental guidance and supervisory package because you don’t always know what is going to pop up on the screen, especially when someone is surfing the web and you don’t know what is really on the websites being visited; the viewer may be exposed. A staggering statistic is that over 12% of all websites are considered pornographic - that’s 4.2 million sites!  Another is that the average age of the first Internet exposure to pornography is 11 years old.  And in corporate settings it is reported that 27% of Fortune 500 companies have been subject to sexual harassment lawsuits related to inappropriate email or Internet use.  The problem is hard to keep up with since new sites are launched every day.  We do the filtering in real-time and the software is very effectively in blocking pornographic images or objectionable words so that even the newest sites can be blocked.”

CEOCFOinterviews: Will you tell us about the financial position of Com-Guard?
Mr. Sigismonti: “We could always use more money; we are a small company. We are looking to finance the inventory for the computers, for which we have PO’s. We are in the middle of supplying the first set of computers on the first order. We are preparing to start filling the order for the second 15,000 units.   Financing is an issue, but we have some financing people that we are working with but right now.   I am not at liberty to say exactly what we are doing in that area but we are actively pursuing that aspect of our business and it is very important to us.”

CEOCFOinterviews: Your products offer protection at an affordable cost.  Is the relatively low cost part of your marketing strategy?
Mr. Sigismonti: “People who purchase most software products of this nature, whether they are a firewall or anti-virus programs, typically consider them as having approximately the same value when they are looked at in a retail marketplace. You can’t be too far out of line with your prices. We attempt to price our products so that they will be readily available and represent an attractive offering, so someone would feel that it is very affordable and try it. The pricing is undervalued from the standpoint of what the price is vs. the performance and benefits provided. I think we need to go forward and introduce our products at a very attractive price.”

CEOCFOinterviews: Why should potential investors be interested in Com-Guard and why is right now the right time?
Mr. Sigismonti: “I think we have many good ideas. I think we have a good opportunity to make a contribution to this marketplace. We are experienced; both the CEO and myself have been in the industries for over 25 years. Dr. Edward W. Savarese has been the CEO of another public company for fifteen years. Our products, I believe, will stand on their own. I think they will add value to any computer they are installed on and provide a measure of protection that is vital to the end user.”

CEOCFOinterviews: Is there anything that you would like to say to investors in closing?
Mr. Sigismonti: I believe that we have several opportunities identified that can be attractive, not only now but also into the future. I think we will see continued opportunities in our chosen PC security market that, by all accounts, is growing at a handsome rate. We are beginning to execute our strategy with the distribution-marketing program as I mentioned. And we are working on improving our corporate and product awareness in the market. 

We welcome anyone to give us a call or ask us questions about what we are doing. As we are a public company, we cannot divulge any internal secrets or pending opportunities that have not been announced to the public for obvious reasons.  We would like to work with people in the investment area and we believe in strategic relationships with other companies on the technology or product side.”


disclaimers

Any reproduction or further distribution of this article without the express written consent of CEOCFOinterviews.com is prohibited.


“Firewalls, anti-virus and anti-spy programs protect to a certain degree and do a good job on known threats. However, new techniques that hackers develop daily are constantly being introduced. New viruses, new penetration methods, and new spy-ware can still be installed on a system without the users knowledge and vital data can be extracted from the disc drive. What we have focused on is protecting data at the disc level, and we do that by locking up the files, by hiding them, and then at the ultimate level of protection, by encrypting them, so even if they were stolen or the computer itself was stolen, the data would still be safeguarded from any access. We look at it from a data standpoint and we protect it from the disc level up. Our software detects attempted intrusions from the Internet or from a local person walking up to the keyboard and trying to open a protected file or to load the file onto a floppy disk-drive and walking away with it. We also log the event and send notifications of the activity to the legal owner.  If a camera in installed on the system, the ComputerSafe program can even send a video clip of a physical intrusion.” - Joe Sigismonti

Newsflash!

To view Releases highlight & left click on the company name!

 

ceocfointerviews.com does not purchase or make
recommendation on stocks based on the interviews published.

.