Weekly Barometer 25 janvier 2012 2 Investment Case Like many - - PowerPoint PPT Presentation

weekly barometer
SMART_READER_LITE
LIVE PREVIEW

Weekly Barometer 25 janvier 2012 2 Investment Case Like many - - PowerPoint PPT Presentation

Weekly Barometer 25 janvier 2012 2 Investment Case Like many other industries, security is in the early stages of its digital and tech transformation thanks to innovations in artificial intelligence, robotics and augmented reality


slide-1
SLIDE 1

Weekly Barometer

25 janvier 2012

slide-2
SLIDE 2

2

Investment Case

➢ Like many other industries, security is in the early stages of its digital and tech transformation thanks to innovations in artificial intelligence, robotics and augmented reality ➢ This tech upgrade cycle gives confidence that the current capex and government spending momentum will last several years and that private contractors will keep delivering above-consensus revenue and earnings growth ➢ Space exploration could be another major source of upside for private contractors as the US plans missions to the Moon and beyond and as the new NASA Administrator is a proponent of outsourcing some of the NASA’s operations to the private sector ➢ Government-led space exploration will also give a boost to commercial space in the medium term ➢ Civil security will be in the spotlight as the Internet of Things opens the way to new cyber attacks and as smart cities become reality, pointing to strong demand for smart devices, inspection and detection systems and cyber security

Security & Space Certificate details

✓ Issuing bank: Natixis, Calculation agent: Natixis SA ✓ ISIN: XS1317057278 ✓ Currency: USD ✓ Fees: 1.65% management fee + 15% performance fee, high water mark ✓ Bloomberg ticker: NXSRGDEF

slide-3
SLIDE 3

3

Space Biometrics & CyberSecurity New Generation Technologies Security Devices Smart Cities & Homes

slide-4
SLIDE 4

4

Security: A Major Tech Upgrade Cycle Is On Its Way

➢ With the rise of Internet of Things, security threats will only keep growing and society will have to adapt ➢ Against this backdrop, companies are investing in new technologies that identify, analyze and process threat-related data

Network security Authentication Data analytics Data encryption Devices installation Threat prediction

slide-5
SLIDE 5

➢ Thanks to the Internet of Things and Artificial Intelligence, smart cities are about to become reality ✓ Traffic and parking space management, safety and law enforcement and smart grids will be in the spotlight

5

The Rise Of Smart And Safe Cities (I)

slide-6
SLIDE 6

6

The Rise Of Smart And Safe Cities (II)

FACIAL RECOGNITION BODY-WORN CAMERAS CYBERSECURITY SENSORS AND DRONES SMART HOME CAMERAS SECURITY CAMERAS/ VIDEO ANALYTICS

slide-7
SLIDE 7

7

Biometrics To Identify, Target and Protect

➢ Biometrics uses facial image, fingerprint, iris, DNA or voice pattern to identify individuals

✓ Biometrics has many applications:

Accessing corporate buildings Accessing devices Opening one’s house door Unlocking car doors

slide-8
SLIDE 8

8

The Internet of Things Opens the Way to New Cyber Attacks

➢ All connected devices and systems will be exposed to security threats ➢ Attacks on the IoT will hit healthcare, financial services, manufacturing…

50% of new business processes and systems will include an IoT

component by 2020 (source: Gartner)

Pacemakers can be attacked remotely

ATTACKS

Take control Steal information Disrupt services Controls for smart doors locks or lighting systems can be vulnerable Infotainment systems are exposed to threats

slide-9
SLIDE 9

9

Cyber Security: A Major Action Field For Both States And Corporations

➢ The cyber security market is expected to grow from USD122bn in 2016 to USD202bn by 2021, a 10.6% CAGR (Source: Research and Markets) ➢ How to protect against cyber attacks?

Network security Data encryption

Data encryption translates data into another form, or code, so that only people with a secret key can access Security features such as antivirus and antimalware as well as firewalls and intrusion prevention and detection systems

Data analytics Authentication security

Robust authentication mechanisms such as two-factor authentication, digital certificates and biometrics Collecting and monitoring data to build predictive and anomaly detection models

slide-10
SLIDE 10

➢ Two directives are boosting cybersecurity requirements in the European Union

10

➢ All companies involved in the digital transformation will have to reach a standard of protection

Cybersecurity Spending To Get A Boost From Regulations

slide-11
SLIDE 11

11

Space Tech: From Next-Gen Satellites To Space Tourism

Stratobus – project for 2020: half satellite and half drone (Thales) Space-Based Laser – intercepts missiles or destroys satellites ➢ Space discovery is no longer a sleepy dream, but a major global challenge for the emancipation of digitalization and interconnection NASA's Mars InSight Lander

slide-12
SLIDE 12

12

➢ During the Cold War, the US and the Soviet Union used space exploration to:

Space Exploration Enters Into Its Next Chapter

➢ The return to the Moon and the potential first journey to Mars planned by the US are intended to Develop security applications Demonstrate technological advantage Ensure the survival of the human species Better understand our planet Get some hints about the origin of life

slide-13
SLIDE 13

CST-100 Starliner is planning to fly for the first time NASA astronauts to the ISS by December 2018

13

Space Exploration A Major Source Of Revenue For Private Companies

➢ The NASA budget is expected to balloon over the years to fund these new space missions ➢ Importantly, the NASA is expected to develop public-private partnerships with the likes of:

(Northrop Grumman)

Dragon V2, a new version of the spacecraft, will take astronauts to the space station Cygnus spacecraft is on its way to the International Space Station

slide-14
SLIDE 14

14

Commercial Space To Develop In The Medium Term: Space Tourism First

Georges Whitesides, CEO Virgin Galactic

Blue Origin (Jeff Bezos) is developing the New Shepard to enable short- duration space tourism Virgin Galactic (Richard Branson) provides suborbital spaceflights to space tourists SpaceX CEO Elon Musk shared a picture

  • f

his company’s new space suits

slide-15
SLIDE 15

15

Asteroid Mining Will Fuel Travel Within Space: A Modern Day Gold Rush

slide-16
SLIDE 16

16

Satellites have four major roles

➢ Space exploration is a source of innovations in the fields of healthcare, materials, robotics and transportation systems ➢ But also remains important in defense-related fields such as aeronautics and IT & Telecoms (satellites) ➢ Satellites appear as a major actor in the global security value chain, creating the fundamentals for telecommunication technologies

Satellites Make The Link Between Space And Earth

slide-17
SLIDE 17

17

Security And Innovation Share A Common History (I)

➢ Many civilian technologies and innovations find their roots in security Research. The CIA has its

  • wn venture capital company that invests in Silicon Valley start-ups (Q-Tel)

Innovation

slide-18
SLIDE 18

18

Security And Innovation Share A Common History (II)

Medical Technologies

The Defense Advanced Research Projects Agency (DARPA), responsible for the development of military technologies, has been working for years

  • n

Exoskeletons The military played a role in the development

  • f

vaccines in order to fight epidemics The first automatic injection device, the ComboPen, was invented in the 70s for a military use. The civil device to treat allergic reaction, the Epipen, was approved in 1987 by the FDA The first blood bank was created in 1917 for the US Army Medical Corps. Blood could be stored and used in battlefield surgery. It paved the way for modern blood storage techniques

slide-19
SLIDE 19

Conclusion: Innovation At The Heart Of Security And Space

Technology as a driver of space exploration

✓ Outer Space Discovery ✓ Connectivity ✓ Reconnaissance ✓ Satellites & telecommunications

19

➢ Innovation at the service of security and public safety

✓ Real time surveillance & smart cities ✓ Cybersecurity & biometrics ✓ Security of IoT devices ✓ 5G

slide-20
SLIDE 20

This report has been produced by the organizational unit responsible for investment research (Research unit) of AtonRâ Partners and sent to you by the company sales representatives. As an internationally active company, AtonRâ Partners SA may be subject to a number of provisions in drawing up and distributing its investment research documents. These regulations include the Directives

  • n the Independence of Financial Research issued by the Swiss Bankers Association.

Although AtonRâ Partners SA believes that the information provided in this document is based on reliable sources, it cannot assume responsibility for the quality, correctness, timeliness or completeness

  • f the information contained in this report.

The information contained in these publications is exclusively intended for a client base consisting of professionals or qualified investors. It is sent to you by way of information and cannot be divulged to a third party without the prior consent of AtonRâ Partners. While all reasonable effort has been made to ensure that the information contained is not untrue or misleading at the time of publication, no representation is made as to its accuracy or completeness and it should not be relied upon as such. Past performance is not indicative or a guarantee of future results. Investment losses may occur, and investors could lose some or all of their investment. Any indices cited herein are provided only as examples of general market performance and no index is directly comparable to the past or future performance of the Certificate. It should not be assumed that the Certificate will invest in any specific securities that comprise any index, nor should it be understood to mean that there is a correlation between the Certificate’s returns and any index returns. Any material provided to you is intended only for discussion purposes and is not intended as an offer or solicitation with respect to the purchase or sale of any security and should not be relied upon by you in evaluating the merits of investing in any securities.

20

Disclaimer