SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
Vartan Minasyan
Product  idea

• Company’s  mission:  Protec5on  for  all  customers,  regardless  of  
  pla:orm
• New  product  for  consumer  product  por:olio
• Kaspersky  An5  Virus  is  there  to  strengthen  Mac  security  for  users  
  that  realise  the  value  of  the  data  on  their  PCs  to  cybercriminals
• We  are  only  adding  protec5on  where  there  is  an  iden5fied  
  significant  benefit  over  the  standard  Apple  security
What  is  the  need


• Apple  have  done  an  adequate  job  of  soIware  security  for  a  non-­‐
  specialist  company

• Users  have  benefited  from  the  rela5ve  obscurity  of  Macs  compared  
  to  PCs  making  them  a  less  lucra5ve  target  for  cybercriminals

• Apple’s  success  in  growing  market  share  has  been  reflected  with  
  increased  interest  from  cybercriminals

• It’s  Kaspersky’s  business  to  understand  the  techniques  of  
  cybercriminals  and  protect  our  customers,  we  are  very  good  at  it.
The threat
The  threat

• PC  +  Macintosh  =  good  connec5vity
• Your  Apple  Macintosh  may  not  be  damaged  by  
  some  malware,  although  it  may  slow  your  Mac  
  down
• But...  you  can  s5ll  pass  on  problems  to  users  of  
  other  types  of  computers
• Sharing  resources  or  communica5ng  with  you  could  
  endanger  their  systems
Good  PC/MAC  ci5zenship
       In wn
         te loa
         do
           rn
              et ds




                           Mac OS X
                                E-mail & IM
                               File transfers
                                    USB
      IM




                      US
     &




                      Bs
 ail
m




                       tic
E-




                           k
PC/Mac  threat  summary

Malware  could  be  get  through:  
• Internet  downloads,  E-­‐mail,  IM
• Files  you  copy  to  the  Mac
• Shared  folder  of  other  virtualized  OS


With  Mac  OS  X,  no  PC-­‐Mac  communica5on  borders:
• File  formats  are  compa5ble
• Common  network  protocols
• Almost  always  on  the  same  network,  sharing  drives  
  and  folders
Some  Mac-­‐related  malware  facts

•    The  Twier  account  belonging  to  venture  capitalist  and  Mac  evangelist  Guy  Kawasaki  was  
     hijacked  yesterday  [June]  and  used  to  push  malware  to  some  140,000  Twier  users.
     (Source  ZD  Net,  June  2009)


•    “We  recently  discovered  that  a  small  number  -­‐  less  than  1%  -­‐  of  the  Video  iPods  available  
     for  purchase  aIer  September  12,  2006,  leI  our  contract  manufacturer  carrying  the  
     Windows  RavMonE.exe  virus.”.  (Source  hp://www.apple.com/support/windowsvirus/)

•    “Trojan  Horse  can  be  found  in  pirated  copies  of  Apple’s  iWork  ‘09  applica5on  suite,  which  
     has  been  downloaded  over  20,000  5mes”  (Source  MacWorld  Jan  2009)


•    A  ZDNet  summary  of  2007  vulnerabili5es  showed  that  there  were  five  5mes  more  
     vulnerabili5es  for  Mac  OS  than  for  all  types  of  Windows  PC  opera5ng  systems.
There  are  viruses!


      New malware created specifically for Mac OS every year
35


30

            There is 1 new Trojan every week for Mac OS
25


20


15


10


5


0

     2001         2002     2003     2004     2005     2006     2007   2008   2009
-5
Total  amount  of  malware  for  Mac  OS  X

250



200



150



100



 50



      0

           2001   2002   2003   2004   2005   2006   2007   2008   2009
- 50
Apple  ads  vs  reality

On one side, funny ads with “Infected PC”   On the other side, quotes from Apple’s
                                            website:
                                             “Mac OS X doesn’t get PC viruses”




                                              And, Apple  itself,  officially  
                                              acknowledged  the  role  of  an5-­‐virus  
                                              soIware  for  the  first  5me  in  its  latest  
                                              OS  X  Security  Configura5on  Guide  
                                              released  in  May,  and  even  provides  a  
                                              link  to  a  list  of  third-­‐party  suppliers.
Product Introduction
   About the product
What  Kaspersky  An5-­‐Virus  for  Mac  does

• KMAC  strengthens  Apple’s  own  security  with  core  security  
  func5ons  Kaspersky’s  award  winning  technologies

    – Enhanced  protec5on  for  your  Macintosh
    – Keeps  your  money  and  iden5ty  safe
    – Cybercriminals  won’t  hijack  your  Macintosh
    – Your  files  won’t  be  ruined  by  hackers
    – Keeps  your  Macintosh  running  smoothly
    – Stops  passing  malware  onto  other  computer  users
    – Automated,  always-­‐on  protec5on  and  updates
    – Security  for  web  and  email
Technically  what  does  Kav  for  Mac  do


• Real-­‐5me  scanning  of  files,  Internet  downloads  and  mail  
  aachments
• File  recovery
• Only  1%  CPU  impact  on  idle
• Familiar  Mac-­‐style  appearance  and  opera5on
• Special  safeguards  to  prevent  Kaspersky  An5  Virus  from  being  
  compromised
• Automa5c  regular  and  emergency  updates  for  always-­‐on  protec5on
• Protects  against  Mac  and  Non-­‐Mac  threats  –  stop  passing  threats  
  onto  friends  and  colleagues
Macintosh  System  Requirements



• Intel-­‐based  Macintosh  computer  
    – (PowerPC  processor  not  supported)


• 512  MB  free  RAM


• 80  MB  free  hard  drive  space


• Mac  OS  X  10.4.11  opera5ng  system,  or  higher


• Works  on  Mac  OS  10.6  Snow  Leopard  (in  standard  kernel  mode)  
Product Insight
Intui5ve  Mac  Style  User  Interface
Easy  to  set-­‐up  preferences
On  demand  scanner


• Choose  between:
   – Custom  scan
   – Full  scan
   – Quick  scan
• Choose  between:
   – Manual
   – Automa5cally  scheduled
Configura5on  Deployment


• Save  seyngs  into  a  configura5on  file  for  loading  onto  other  Macs  
  for  consistent  deployment
Selec5ng  malware  to  be  monitored

• KAV  always  protects  your  computer  against  the  most  dangerous  
  types  of  malware  such  as  viruses,  Trojans,  and  hack  tools.  
• For  greater  security  you  can  monitor  addi5onal  types  of  poten5ally  
  dangerous  programs.  
When  a  problem  is  detected

 An infected
 file is found



                                                                                   New software
                                                                                      update
                                                                                     received



                                                                        fails



                         ee   ds
   File is          succ
  restored
                                   Simplified explanation of what happens when a file is found to be infected
Intelligent  scanning


 • Specify  the  depth  of  scanning  required  striking  a  balance  between  
   security  and  system  performance




• By default quarantine files are scanned after each software /
  signature update to see if they can be released
Updates


• 3  modes  for  updates
    – Automa5c  (default)
    – Scheduled
    – Manual


• Update  both  the  signatures  and  
  soIware  itself


• Update  distribu5on  folder
    – Updates  can  be  shared  amongst  network  
      by  using  a  shared  folder
Online  monitor


• Internet  and  Network  Security
   – All  files  downloaded  from  the  internet  are  checked  


• Email  Protec5on
   – Your  email  messages  and  their  aachments  will  be  
     protected  by  real-­‐5me  scanning.  

    • All  iden5fied  threats  are  blocked  
      and  you  get  an  alert.
Performance


• Installing  KMAC    on  your  Mac
   – Uses  approx  1%  of  your  CPU  processing  power  in  idle
FREE  support  –  only  a  click  away
Summary

• Apple’s  growth  is  making  them  a  more  arac5ve  target  for  
  cybercriminals


• Kaspersky’s  award  winning  technology  offers  Mac  enthusiasts  a  way  to  
  increase  their  security  protec5on  where  it  can  add  real  benefit

• Kaspersky  An5  Virus
    – Defends  against  Mac  and  PC  viruses
    – High  detec5on  rates
    – High  performance
    – Regular  automa5c  signature  and  soIware  updates
    – Simple  for  Mac  users  to  use
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.QuratNaeem
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus tayyaba rashid
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware MenaceTami Brass
 
BOSS deploy presentation
BOSS deploy presentationBOSS deploy presentation
BOSS deploy presentationSue Baxter
 
StandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech PackStandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech PackHelpSystems
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus workschinmay kelkar
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 

Was ist angesagt? (20)

Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Spyware
SpywareSpyware
Spyware
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Android system security
Android system securityAndroid system security
Android system security
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
Computer virus
Computer virusComputer virus
Computer virus
 
BOSS deploy presentation
BOSS deploy presentationBOSS deploy presentation
BOSS deploy presentation
 
StandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech PackStandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech Pack
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus
VirusVirus
Virus
 

Andere mochten auch

Looking at a Screen for 8,000 hours - Quantified Self Global Conference 2013
Looking at a Screen for 8,000 hours - Quantified Self Global Conference 2013Looking at a Screen for 8,000 hours - Quantified Self Global Conference 2013
Looking at a Screen for 8,000 hours - Quantified Self Global Conference 2013robby1066
 
FarStone Drive Clone Enterprise Presentation
FarStone Drive Clone Enterprise PresentationFarStone Drive Clone Enterprise Presentation
FarStone Drive Clone Enterprise Presentationquestar
 
Berlin Blockade
Berlin BlockadeBerlin Blockade
Berlin Blockademrjportman
 
aozorahackと青空文庫の現状とこれから (OSC 2016 Tokyo/Spring)
aozorahackと青空文庫の現状とこれから (OSC 2016 Tokyo/Spring)aozorahackと青空文庫の現状とこれから (OSC 2016 Tokyo/Spring)
aozorahackと青空文庫の現状とこれから (OSC 2016 Tokyo/Spring)masayoshi takahashi
 
YTE What can we learn from source A PROHIBITION
YTE What can we learn from source A PROHIBITIONYTE What can we learn from source A PROHIBITION
YTE What can we learn from source A PROHIBITIONmrjportman
 
The Roaring Twenties
The Roaring TwentiesThe Roaring Twenties
The Roaring Twentiesmrjportman
 
Re:VIEW新パーサ現状確認(2015年2月版)
Re:VIEW新パーサ現状確認(2015年2月版)Re:VIEW新パーサ現状確認(2015年2月版)
Re:VIEW新パーサ現状確認(2015年2月版)masayoshi takahashi
 
Gcse Af L P Point Interpretation
Gcse Af L P Point InterpretationGcse Af L P Point Interpretation
Gcse Af L P Point Interpretationmrjportman
 
Hitler And The Growth Of The Nazi Party
Hitler And The Growth Of The  Nazi  PartyHitler And The Growth Of The  Nazi  Party
Hitler And The Growth Of The Nazi Partymrjportman
 
Treaty of Versailles
Treaty of VersaillesTreaty of Versailles
Treaty of Versaillesmrjportman
 
Nazi Control P D F
Nazi  Control  P D FNazi  Control  P D F
Nazi Control P D Fmrjportman
 
Treaty of Versailles
Treaty of VersaillesTreaty of Versailles
Treaty of Versaillesmrjportman
 
Kaspersky - Presentazione strategia per il 2009
Kaspersky - Presentazione strategia per il 2009Kaspersky - Presentazione strategia per il 2009
Kaspersky - Presentazione strategia per il 2009questar
 
The 'Leadership Challenge'
The 'Leadership Challenge'The 'Leadership Challenge'
The 'Leadership Challenge'mrjportman
 
TuneUp Utilities 2009 - Presentazione della società e del prodotto
TuneUp Utilities 2009 - Presentazione della società e del prodottoTuneUp Utilities 2009 - Presentazione della società e del prodotto
TuneUp Utilities 2009 - Presentazione della società e del prodottoquestar
 
Kaspersky Small Office Security - Presentazione
Kaspersky Small Office Security - PresentazioneKaspersky Small Office Security - Presentazione
Kaspersky Small Office Security - Presentazionequestar
 
Kaspersky Antivirus per Macintosh
Kaspersky Antivirus per MacintoshKaspersky Antivirus per Macintosh
Kaspersky Antivirus per Macintoshquestar
 

Andere mochten auch (19)

Gedrag
GedragGedrag
Gedrag
 
Looking at a Screen for 8,000 hours - Quantified Self Global Conference 2013
Looking at a Screen for 8,000 hours - Quantified Self Global Conference 2013Looking at a Screen for 8,000 hours - Quantified Self Global Conference 2013
Looking at a Screen for 8,000 hours - Quantified Self Global Conference 2013
 
FarStone Drive Clone Enterprise Presentation
FarStone Drive Clone Enterprise PresentationFarStone Drive Clone Enterprise Presentation
FarStone Drive Clone Enterprise Presentation
 
Berlin Blockade
Berlin BlockadeBerlin Blockade
Berlin Blockade
 
aozorahackと青空文庫の現状とこれから (OSC 2016 Tokyo/Spring)
aozorahackと青空文庫の現状とこれから (OSC 2016 Tokyo/Spring)aozorahackと青空文庫の現状とこれから (OSC 2016 Tokyo/Spring)
aozorahackと青空文庫の現状とこれから (OSC 2016 Tokyo/Spring)
 
YTE What can we learn from source A PROHIBITION
YTE What can we learn from source A PROHIBITIONYTE What can we learn from source A PROHIBITION
YTE What can we learn from source A PROHIBITION
 
The Roaring Twenties
The Roaring TwentiesThe Roaring Twenties
The Roaring Twenties
 
aozorahack hackathon #1
aozorahack hackathon #1aozorahack hackathon #1
aozorahack hackathon #1
 
Re:VIEW新パーサ現状確認(2015年2月版)
Re:VIEW新パーサ現状確認(2015年2月版)Re:VIEW新パーサ現状確認(2015年2月版)
Re:VIEW新パーサ現状確認(2015年2月版)
 
Gcse Af L P Point Interpretation
Gcse Af L P Point InterpretationGcse Af L P Point Interpretation
Gcse Af L P Point Interpretation
 
Hitler And The Growth Of The Nazi Party
Hitler And The Growth Of The  Nazi  PartyHitler And The Growth Of The  Nazi  Party
Hitler And The Growth Of The Nazi Party
 
Treaty of Versailles
Treaty of VersaillesTreaty of Versailles
Treaty of Versailles
 
Nazi Control P D F
Nazi  Control  P D FNazi  Control  P D F
Nazi Control P D F
 
Treaty of Versailles
Treaty of VersaillesTreaty of Versailles
Treaty of Versailles
 
Kaspersky - Presentazione strategia per il 2009
Kaspersky - Presentazione strategia per il 2009Kaspersky - Presentazione strategia per il 2009
Kaspersky - Presentazione strategia per il 2009
 
The 'Leadership Challenge'
The 'Leadership Challenge'The 'Leadership Challenge'
The 'Leadership Challenge'
 
TuneUp Utilities 2009 - Presentazione della società e del prodotto
TuneUp Utilities 2009 - Presentazione della società e del prodottoTuneUp Utilities 2009 - Presentazione della società e del prodotto
TuneUp Utilities 2009 - Presentazione della società e del prodotto
 
Kaspersky Small Office Security - Presentazione
Kaspersky Small Office Security - PresentazioneKaspersky Small Office Security - Presentazione
Kaspersky Small Office Security - Presentazione
 
Kaspersky Antivirus per Macintosh
Kaspersky Antivirus per MacintoshKaspersky Antivirus per Macintosh
Kaspersky Antivirus per Macintosh
 

Ähnlich wie Kaspersky Anti-Virus for Macintosh - Technical Presentation

Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...imagazinepl
 
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Neeraj Bhandari
 
How Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software VulnerabilitiesHow Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software VulnerabilitiesBunmi Sowande
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious emailAndrew Wong
 
Computers.ppt
Computers.pptComputers.ppt
Computers.pptSdhrYdv1
 
computerviruses-171008143158.ppt
computerviruses-171008143158.pptcomputerviruses-171008143158.ppt
computerviruses-171008143158.pptssuser342286
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry moreBHack Conference
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INVijay Sarathy Rangayyan
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptxTayyabaAbbas4
 

Ähnlich wie Kaspersky Anti-Virus for Macintosh - Technical Presentation (20)

Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
 
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
 
How Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software VulnerabilitiesHow Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software Vulnerabilities
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Attacking antivirus
Attacking antivirusAttacking antivirus
Attacking antivirus
 
Mac review 2012_en
Mac review 2012_enMac review 2012_en
Mac review 2012_en
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 
Ransomeware Recovery by Veeam
Ransomeware Recovery by VeeamRansomeware Recovery by Veeam
Ransomeware Recovery by Veeam
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
computerviruses-171008143158.ppt
computerviruses-171008143158.pptcomputerviruses-171008143158.ppt
computerviruses-171008143158.ppt
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
RANSOMWARE FINAL.pptx
RANSOMWARE FINAL.pptxRANSOMWARE FINAL.pptx
RANSOMWARE FINAL.pptx
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry more
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
IBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - EcuadorIBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - Ecuador
 

Kürzlich hochgeladen

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Kürzlich hochgeladen (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Kaspersky Anti-Virus for Macintosh - Technical Presentation

  • 2. Product  idea • Company’s  mission:  Protec5on  for  all  customers,  regardless  of   pla:orm • New  product  for  consumer  product  por:olio • Kaspersky  An5  Virus  is  there  to  strengthen  Mac  security  for  users   that  realise  the  value  of  the  data  on  their  PCs  to  cybercriminals • We  are  only  adding  protec5on  where  there  is  an  iden5fied   significant  benefit  over  the  standard  Apple  security
  • 3. What  is  the  need • Apple  have  done  an  adequate  job  of  soIware  security  for  a  non-­‐ specialist  company • Users  have  benefited  from  the  rela5ve  obscurity  of  Macs  compared   to  PCs  making  them  a  less  lucra5ve  target  for  cybercriminals • Apple’s  success  in  growing  market  share  has  been  reflected  with   increased  interest  from  cybercriminals • It’s  Kaspersky’s  business  to  understand  the  techniques  of   cybercriminals  and  protect  our  customers,  we  are  very  good  at  it.
  • 5. The  threat • PC  +  Macintosh  =  good  connec5vity • Your  Apple  Macintosh  may  not  be  damaged  by   some  malware,  although  it  may  slow  your  Mac   down • But...  you  can  s5ll  pass  on  problems  to  users  of   other  types  of  computers • Sharing  resources  or  communica5ng  with  you  could   endanger  their  systems
  • 6. Good  PC/MAC  ci5zenship In wn te loa do rn et ds Mac OS X E-mail & IM File transfers USB IM US & Bs ail m tic E- k
  • 7. PC/Mac  threat  summary Malware  could  be  get  through:   • Internet  downloads,  E-­‐mail,  IM • Files  you  copy  to  the  Mac • Shared  folder  of  other  virtualized  OS With  Mac  OS  X,  no  PC-­‐Mac  communica5on  borders: • File  formats  are  compa5ble • Common  network  protocols • Almost  always  on  the  same  network,  sharing  drives   and  folders
  • 8. Some  Mac-­‐related  malware  facts • The  Twier  account  belonging  to  venture  capitalist  and  Mac  evangelist  Guy  Kawasaki  was   hijacked  yesterday  [June]  and  used  to  push  malware  to  some  140,000  Twier  users. (Source  ZD  Net,  June  2009) • “We  recently  discovered  that  a  small  number  -­‐  less  than  1%  -­‐  of  the  Video  iPods  available   for  purchase  aIer  September  12,  2006,  leI  our  contract  manufacturer  carrying  the   Windows  RavMonE.exe  virus.”.  (Source  hp://www.apple.com/support/windowsvirus/) • “Trojan  Horse  can  be  found  in  pirated  copies  of  Apple’s  iWork  ‘09  applica5on  suite,  which   has  been  downloaded  over  20,000  5mes”  (Source  MacWorld  Jan  2009) • A  ZDNet  summary  of  2007  vulnerabili5es  showed  that  there  were  five  5mes  more   vulnerabili5es  for  Mac  OS  than  for  all  types  of  Windows  PC  opera5ng  systems.
  • 9. There  are  viruses! New malware created specifically for Mac OS every year 35 30 There is 1 new Trojan every week for Mac OS 25 20 15 10 5 0 2001 2002 2003 2004 2005 2006 2007 2008 2009 -5
  • 10. Total  amount  of  malware  for  Mac  OS  X 250 200 150 100 50 0 2001 2002 2003 2004 2005 2006 2007 2008 2009 - 50
  • 11. Apple  ads  vs  reality On one side, funny ads with “Infected PC” On the other side, quotes from Apple’s website: “Mac OS X doesn’t get PC viruses” And, Apple  itself,  officially   acknowledged  the  role  of  an5-­‐virus   soIware  for  the  first  5me  in  its  latest   OS  X  Security  Configura5on  Guide   released  in  May,  and  even  provides  a   link  to  a  list  of  third-­‐party  suppliers.
  • 12. Product Introduction About the product
  • 13. What  Kaspersky  An5-­‐Virus  for  Mac  does • KMAC  strengthens  Apple’s  own  security  with  core  security   func5ons  Kaspersky’s  award  winning  technologies – Enhanced  protec5on  for  your  Macintosh – Keeps  your  money  and  iden5ty  safe – Cybercriminals  won’t  hijack  your  Macintosh – Your  files  won’t  be  ruined  by  hackers – Keeps  your  Macintosh  running  smoothly – Stops  passing  malware  onto  other  computer  users – Automated,  always-­‐on  protec5on  and  updates – Security  for  web  and  email
  • 14. Technically  what  does  Kav  for  Mac  do • Real-­‐5me  scanning  of  files,  Internet  downloads  and  mail   aachments • File  recovery • Only  1%  CPU  impact  on  idle • Familiar  Mac-­‐style  appearance  and  opera5on • Special  safeguards  to  prevent  Kaspersky  An5  Virus  from  being   compromised • Automa5c  regular  and  emergency  updates  for  always-­‐on  protec5on • Protects  against  Mac  and  Non-­‐Mac  threats  –  stop  passing  threats   onto  friends  and  colleagues
  • 15. Macintosh  System  Requirements • Intel-­‐based  Macintosh  computer   – (PowerPC  processor  not  supported) • 512  MB  free  RAM • 80  MB  free  hard  drive  space • Mac  OS  X  10.4.11  opera5ng  system,  or  higher • Works  on  Mac  OS  10.6  Snow  Leopard  (in  standard  kernel  mode)  
  • 17. Intui5ve  Mac  Style  User  Interface
  • 18. Easy  to  set-­‐up  preferences
  • 19. On  demand  scanner • Choose  between: – Custom  scan – Full  scan – Quick  scan • Choose  between: – Manual – Automa5cally  scheduled
  • 20. Configura5on  Deployment • Save  seyngs  into  a  configura5on  file  for  loading  onto  other  Macs   for  consistent  deployment
  • 21. Selec5ng  malware  to  be  monitored • KAV  always  protects  your  computer  against  the  most  dangerous   types  of  malware  such  as  viruses,  Trojans,  and  hack  tools.   • For  greater  security  you  can  monitor  addi5onal  types  of  poten5ally   dangerous  programs.  
  • 22. When  a  problem  is  detected An infected file is found New software update received fails ee ds File is succ restored Simplified explanation of what happens when a file is found to be infected
  • 23. Intelligent  scanning • Specify  the  depth  of  scanning  required  striking  a  balance  between   security  and  system  performance • By default quarantine files are scanned after each software / signature update to see if they can be released
  • 24. Updates • 3  modes  for  updates – Automa5c  (default) – Scheduled – Manual • Update  both  the  signatures  and   soIware  itself • Update  distribu5on  folder – Updates  can  be  shared  amongst  network   by  using  a  shared  folder
  • 25. Online  monitor • Internet  and  Network  Security – All  files  downloaded  from  the  internet  are  checked   • Email  Protec5on – Your  email  messages  and  their  aachments  will  be   protected  by  real-­‐5me  scanning.   • All  iden5fied  threats  are  blocked   and  you  get  an  alert.
  • 26. Performance • Installing  KMAC    on  your  Mac – Uses  approx  1%  of  your  CPU  processing  power  in  idle
  • 27. FREE  support  –  only  a  click  away
  • 28. Summary • Apple’s  growth  is  making  them  a  more  arac5ve  target  for   cybercriminals • Kaspersky’s  award  winning  technology  offers  Mac  enthusiasts  a  way  to   increase  their  security  protec5on  where  it  can  add  real  benefit • Kaspersky  An5  Virus – Defends  against  Mac  and  PC  viruses – High  detec5on  rates – High  performance – Regular  automa5c  signature  and  soIware  updates – Simple  for  Mac  users  to  use