Company Name | No | Company Type | Funnel Stage | POI | Comments | Last Contact |
---|---|---|---|---|---|---|
MarqVision | 1 | IP Infringement Protection | 2nd Stage - Received one pager | Elaine | ||
Charles | Spoke with Elaine (BD) and Charles (head of product) about the possibility of using facial recognition for their clients to detect fraud | 21/03 | ||||
Oracle | 2 | Software | 3rd Stage - NDA signed | LIsa | ||
Patrick | Have had 2 calls with Oracle. Last Friday we went through the high level tech solution and our pricing. They seemed excited about the possibility of working together. NDA has been signed. Looking to set-up next call with their tech guy to discuss technical logistics | 22/03 | ||||
CSC | 3 | Compliance | Beginning - LI Response | Elizabeth Sylves | Came back to me to set up a time to chat this week. Will update with meeting time | 25/03 |
CoreSearch | 4 | Brand Risk and Protection | LI Connect | Zoe Martin | Said she’d email Head of Partnerships with my details | 25/03 |
MarkMonitor | 5 | Brand Risk and Protection | LI Connect | Jacques Blanc | ||
Ed Schandlbauer | Spoke with Jacques who put me in touch with Ed who heads up partnerships | 25/03 | ||||
Ceartas | 6 | Privacy Protection (Series B) | Warm intro to CEO | Dan Purcell | Setting up a mutually beneficial time to meet up this week. Will discuss possible partnership opportunity. | 26/03 |
Red Point | 7 | Ip Infringement Protection | Email with Head of Partnerships | Oliver Traube | Emailed to ask what we would want in a partnership. Outlined our use cases and how we could potentially work together. Waiting to hear back | 25/03 |
Armatec Global | 8 | Data security for gov / critical infrastructure and police | Women in AI Luncheon | Roanne Monte | Discussed in person about meeting to get feedback on tech. Linkedin message sent. Waiting to get best time. | 27/3 |
Crisis Management Centre | 9 | Enterprise crisis management consulting | LI Connect | Nordin Abdullah | Messaged to ask if we’d be interested in partnership. “government and the private sector here in the malicious content space especially as it relates to critical supply chains.” Waiting to get best time | 27/3 |
Deloitte | 10 | Consulting / Data Privacy and Digital Innovation | Women in AI Luncheon | Abigail Holman | Discussed in person about meeting to get feedback on tech. Linkedin message sent. Waiting to get best time. | 27/3 |
Hootsuite | 11 | Social Media Management | In-person meetup and email with Head of Partnerships | Gunnar Habitz | Verbal / Email confirmation of partnership interest. Meeting with CEO discussed. Can’t complete LOI without seeing the tech first. | 20/3 |
Online Safety Exchange | 12 | Safetytech consultancy and Partnerships (global) | In-person meetup with CEO / Founder | Martin Cocker | Verbal / Email confirmation of partnership interest. Will be % share of profit | 27/3 |
Brolly | 13 | Social Media curation/sentiment analysis | In-person meetup with CTO | Alli Nazemian | Verbal / Email confirmation of partnership interest. Will be using our APIs to provide extra value to clients. Nearing LOI. | 17/3 |
INSINTO | 14 | Malicious content detection and prevention | LI Warm Intro | Adam Brolas | Looking to partner. Meeting set up for next week. | 27/3 |
Double Verify | 15 | Digital Media Analytics | Call with Imran to discuss partnership | Imran Masood | Outlined our offering and how we could potentially work together. | 28/02 |
Channel Factory | 16 | Digital Media Analytics | In-person meeting with MD | James Rose | Had an in person discussion about each others tech and how we could potentially work together | 7/03 |
T3K.AI | 17 | Malicious Image/video detection | Discussed partnership | Maria | Verbal / Email confirmation of partnership interest. Will be % share of profit | 26/03 |
Alecto AI | 18 | Face detection across the web | Discussed partnership | CEO | Verbal / Email confirmation of partnership interest & collaboration. |
Hey Corey,
I'm the CPO from TMF and we've been speaking to a ton of Marketing leaders in your space about protecting their brand by leveraging the detection of malicious content. Here are 3 challenges that I hear over and over:
You're probably going to tell me you have this sorted.
I would personally love to understand how you have done this if so for us to see how we can add value to the challenges about XYZ (You can change this but this needs to be short and sharp)