SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 2
2011
2000
2005
-
-
-
2012
2013
-
-
-
-
-
-
-
-
-
The beginning…
-
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 3
 First antivirus worldwide to offer intelligent updating
 First antivirus product to include an application firewall
 MIDAS (Malware Intrusion Detection Advanced System)- wins IST prize, “set to revolutionize AV design”
 Bitdefender to release its proprietary Antispam technology
 Bitdefender introduces B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments)
 Spam Image Filter an important step in combating the new spamming techniques
 Bitdefender® Mobile Security to provide real-time protection for smartphones and PDAs
 Bitdefender® Active Virus Control to innovate with a real time technology
 60-Second QuickScan – The quickest way to find if your computer is infected by using this online scanner
 Gravity Architecture enables new generation of security for highly scalable services
 Bitdefender Safepay™ secures all e-banking and e-shopping in a separate iron-clad, secure browser
 Security for Virtualized Environments – The 1st vShield 5 solution optimized for virtualized datacenters
 Bitdefender Clueful™, first application to show the world how iOS apps treat user's privacy
 Bitdefender Photon™ technology boasts scanning speed and minimizes slowdowns
 Cloud Security for Endpoints to provide enterprise-class security with no on-site management server
 Hypervisor Agnostic Scanning Engine – allows Bitdefender to provide the best operational cost savings for virtualization adopters
 Intra-HV memory introspection engine - prototype that allows for detecting and preventing Virtual Machine kernel mode threats
across Microsoft/Linux/etc
2011
2001
2005
-
-
-
2012
2013
-
-
-
-
-
-
-
-
-
A decade of innovation in technology
-
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 4
 #1 in Security Technology
 Bitdefender wins both AV-Test awards for Home Users: Best
Protection and Best Performance in 2013.
 3 out of the first 4 rated endpoint security vendors are using
Bitdefender engines
 #1 in Antispam Technologies
 Bitdefender analyzes and issues protection for 5 million
spam messages every day, or about 35 million per week.
 Bitdefender has won all 30 VBSpam awards in a row in Virus
Bulletin’s (VB) antispam tests between May 2009 to March 2014
 In five local offices, 250+ engineers in R&D team warrant that Bitdefender’s technology –
protecting more than 400 million users worldwide , technology partnerships included – is
the #1 Anti-Malware Security Technology in the world.
Results in sustainable technogical leadership
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 5
AV-TEST
 Awarded “Best Protection” and “Best Performance” in
January 2014
PC MAG
 Awarded “Best Antivirus of 2014” in Jan 2013
 Winner of 3 Editor’s Choice awards in 2013
AV-COMPARATIVES
 Winner of Gold Award for Proactive Malware Protection
 The only AV to receive 100% in the most complex test
ran by AV-Comparatives. Apr 2013
VB100
 Owner of 14 VB100 certifications in 2 years for corporate
products
Approved Corporate Product for SVE & CSE
Awarded “Best Antivirus of 2014”
Copyright@Bitdefender 2013/ www.Bitdefender.com 5/27/2014 • 6
Shiftworks Co Ltd
100 + OEM partnerships
UNDER THE SIGN OF THE
DACIAN WOLF
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 9
• The “Dacian Draco” was the standard of the
ancient Dacian military.
• A wolf head combined with a snake body
that made a whistling sound when galloping
due to the air that entered the wolf's mouth.
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 10
Welcome to the GravityZone
Security for Virtualized Environments, Security for
Endpoints and Security for Mobile Devices
Bitdefender, Ana Cobzaru

Weitere ähnliche Inhalte

Was ist angesagt?

Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTIoT613
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkClearnetwork
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns Exosite
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemKaspersky Lab
 
Secured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant AssetsSecured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant AssetsYokogawa
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityZymbian
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks
 
Stc 2016 regional-round-iot testing in agile.
Stc 2016 regional-round-iot testing in agile.Stc 2016 regional-round-iot testing in agile.
Stc 2016 regional-round-iot testing in agile.Archana Krushnan
 
Contributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity StandardsContributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity StandardsYokogawa1
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
Outpost24 webinar - preventing wireless attacks with device visibility and t...
Outpost24 webinar -  preventing wireless attacks with device visibility and t...Outpost24 webinar -  preventing wireless attacks with device visibility and t...
Outpost24 webinar - preventing wireless attacks with device visibility and t...Outpost24
 

Was ist angesagt? (20)

Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating System
 
Secured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant AssetsSecured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant Assets
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 security
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Stc 2016 regional-round-iot testing in agile.
Stc 2016 regional-round-iot testing in agile.Stc 2016 regional-round-iot testing in agile.
Stc 2016 regional-round-iot testing in agile.
 
Contributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity StandardsContributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity Standards
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
 
IoT security
IoT securityIoT security
IoT security
 
Outpost24 webinar - preventing wireless attacks with device visibility and t...
Outpost24 webinar -  preventing wireless attacks with device visibility and t...Outpost24 webinar -  preventing wireless attacks with device visibility and t...
Outpost24 webinar - preventing wireless attacks with device visibility and t...
 

Andere mochten auch

How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...Moldova ICT Summit
 
How to build successful IT start-up for world market from Eastern Europe, Rag...
How to build successful IT start-up for world market from Eastern Europe, Rag...How to build successful IT start-up for world market from Eastern Europe, Rag...
How to build successful IT start-up for world market from Eastern Europe, Rag...Moldova ICT Summit
 
TypeScript vs. CoffeeScript, Vlad Iliescu
TypeScript vs. CoffeeScript, Vlad IliescuTypeScript vs. CoffeeScript, Vlad Iliescu
TypeScript vs. CoffeeScript, Vlad IliescuMoldova ICT Summit
 
Estonian Experience in Robotics, Heilo Altin
Estonian Experience in Robotics, Heilo AltinEstonian Experience in Robotics, Heilo Altin
Estonian Experience in Robotics, Heilo AltinMoldova ICT Summit
 
The Third Platform Technologies - Accelerating the Curve, Laurentiu Popescu
The Third Platform Technologies - Accelerating the Curve, Laurentiu PopescuThe Third Platform Technologies - Accelerating the Curve, Laurentiu Popescu
The Third Platform Technologies - Accelerating the Curve, Laurentiu PopescuMoldova ICT Summit
 

Andere mochten auch (7)

How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...
 
1C - AccountTimbal
1C - AccountTimbal1C - AccountTimbal
1C - AccountTimbal
 
Privesc.eu - Vitalie Esanu
Privesc.eu - Vitalie EsanuPrivesc.eu - Vitalie Esanu
Privesc.eu - Vitalie Esanu
 
How to build successful IT start-up for world market from Eastern Europe, Rag...
How to build successful IT start-up for world market from Eastern Europe, Rag...How to build successful IT start-up for world market from Eastern Europe, Rag...
How to build successful IT start-up for world market from Eastern Europe, Rag...
 
TypeScript vs. CoffeeScript, Vlad Iliescu
TypeScript vs. CoffeeScript, Vlad IliescuTypeScript vs. CoffeeScript, Vlad Iliescu
TypeScript vs. CoffeeScript, Vlad Iliescu
 
Estonian Experience in Robotics, Heilo Altin
Estonian Experience in Robotics, Heilo AltinEstonian Experience in Robotics, Heilo Altin
Estonian Experience in Robotics, Heilo Altin
 
The Third Platform Technologies - Accelerating the Curve, Laurentiu Popescu
The Third Platform Technologies - Accelerating the Curve, Laurentiu PopescuThe Third Platform Technologies - Accelerating the Curve, Laurentiu Popescu
The Third Platform Technologies - Accelerating the Curve, Laurentiu Popescu
 

Ähnlich wie Bitdefender, Ana Cobzaru

Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Lietuvos kompiuterininkų sąjunga
 
US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderBitdefender Enterprise
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Trend Micro Antivirus.pdf
Trend Micro Antivirus.pdfTrend Micro Antivirus.pdf
Trend Micro Antivirus.pdfCloudtechtiq
 
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...Kaspersky
 
Av is dead long live managed endpoint security
Av is dead   long live managed endpoint securityAv is dead   long live managed endpoint security
Av is dead long live managed endpoint securitySolarwinds N-able
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityOnward Security
 
Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up ICS
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfSetiya Nugroho
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microTheInevitableCloud
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonDigital Catapult
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)Carla Nadin
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for BusinessRobert Crane
 
sb-checkpoint-matrix42
sb-checkpoint-matrix42sb-checkpoint-matrix42
sb-checkpoint-matrix42Wayne Phillips
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxssuser365526
 

Ähnlich wie Bitdefender, Ana Cobzaru (20)

Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
 
US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to Bitdefender
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Trend Micro Antivirus.pdf
Trend Micro Antivirus.pdfTrend Micro Antivirus.pdf
Trend Micro Antivirus.pdf
 
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
 
Av is dead long live managed endpoint security
Av is dead   long live managed endpoint securityAv is dead   long live managed endpoint security
Av is dead long live managed endpoint security
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
Dtl 2012 q4_home.1
Dtl 2012 q4_home.1Dtl 2012 q4_home.1
Dtl 2012 q4_home.1
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
sb-checkpoint-matrix42
sb-checkpoint-matrix42sb-checkpoint-matrix42
sb-checkpoint-matrix42
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 

Mehr von Moldova ICT Summit

TrackDuck - Edmundas Balčikonis
TrackDuck - Edmundas BalčikonisTrackDuck - Edmundas Balčikonis
TrackDuck - Edmundas BalčikonisMoldova ICT Summit
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaMoldova ICT Summit
 
Talentalism and its impact on education in ICT sector by Diana Bocaneala Endava
Talentalism and its impact on education in ICT sector by Diana Bocaneala EndavaTalentalism and its impact on education in ICT sector by Diana Bocaneala Endava
Talentalism and its impact on education in ICT sector by Diana Bocaneala EndavaMoldova ICT Summit
 
Agile methodologies based on BDD and CI by Nikolai Shevchenko
Agile methodologies based on BDD and CI by Nikolai ShevchenkoAgile methodologies based on BDD and CI by Nikolai Shevchenko
Agile methodologies based on BDD and CI by Nikolai ShevchenkoMoldova ICT Summit
 
Hitachi Unified Compute Platform by Cornel Tutuianu
Hitachi Unified Compute Platform by Cornel TutuianuHitachi Unified Compute Platform by Cornel Tutuianu
Hitachi Unified Compute Platform by Cornel TutuianuMoldova ICT Summit
 
Enterprise Architecture supporting the change by Vladimir Calmic Endava
Enterprise Architecture supporting the change by Vladimir Calmic EndavaEnterprise Architecture supporting the change by Vladimir Calmic Endava
Enterprise Architecture supporting the change by Vladimir Calmic EndavaMoldova ICT Summit
 
Strategia de crestere a competitivitatii industriei TI
Strategia de crestere a competitivitatii industriei TIStrategia de crestere a competitivitatii industriei TI
Strategia de crestere a competitivitatii industriei TIMoldova ICT Summit
 
The business of innovation by W.Grommen
The business of innovation by W.GrommenThe business of innovation by W.Grommen
The business of innovation by W.GrommenMoldova ICT Summit
 
European Experience developing Business Angel Ecosystem by Paulo Andrez
European Experience developing Business Angel Ecosystem by Paulo AndrezEuropean Experience developing Business Angel Ecosystem by Paulo Andrez
European Experience developing Business Angel Ecosystem by Paulo AndrezMoldova ICT Summit
 
HR: What industry thinks of by Olivier Prado
HR: What industry thinks of by Olivier PradoHR: What industry thinks of by Olivier Prado
HR: What industry thinks of by Olivier PradoMoldova ICT Summit
 
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015Moldova ICT Summit
 

Mehr von Moldova ICT Summit (15)

TrackDuck - Edmundas Balčikonis
TrackDuck - Edmundas BalčikonisTrackDuck - Edmundas Balčikonis
TrackDuck - Edmundas Balčikonis
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov Endava
 
Talentalism and its impact on education in ICT sector by Diana Bocaneala Endava
Talentalism and its impact on education in ICT sector by Diana Bocaneala EndavaTalentalism and its impact on education in ICT sector by Diana Bocaneala Endava
Talentalism and its impact on education in ICT sector by Diana Bocaneala Endava
 
Agile methodologies based on BDD and CI by Nikolai Shevchenko
Agile methodologies based on BDD and CI by Nikolai ShevchenkoAgile methodologies based on BDD and CI by Nikolai Shevchenko
Agile methodologies based on BDD and CI by Nikolai Shevchenko
 
Hitachi Unified Compute Platform by Cornel Tutuianu
Hitachi Unified Compute Platform by Cornel TutuianuHitachi Unified Compute Platform by Cornel Tutuianu
Hitachi Unified Compute Platform by Cornel Tutuianu
 
Enterprise Architecture supporting the change by Vladimir Calmic Endava
Enterprise Architecture supporting the change by Vladimir Calmic EndavaEnterprise Architecture supporting the change by Vladimir Calmic Endava
Enterprise Architecture supporting the change by Vladimir Calmic Endava
 
Bina systems Cloud Applications
Bina systems Cloud ApplicationsBina systems Cloud Applications
Bina systems Cloud Applications
 
Strategia de crestere a competitivitatii industriei TI
Strategia de crestere a competitivitatii industriei TIStrategia de crestere a competitivitatii industriei TI
Strategia de crestere a competitivitatii industriei TI
 
BAIT MD infoDev
BAIT MD infoDevBAIT MD infoDev
BAIT MD infoDev
 
Customs presentation
Customs presentationCustoms presentation
Customs presentation
 
White Book presentation
White Book presentationWhite Book presentation
White Book presentation
 
The business of innovation by W.Grommen
The business of innovation by W.GrommenThe business of innovation by W.Grommen
The business of innovation by W.Grommen
 
European Experience developing Business Angel Ecosystem by Paulo Andrez
European Experience developing Business Angel Ecosystem by Paulo AndrezEuropean Experience developing Business Angel Ecosystem by Paulo Andrez
European Experience developing Business Angel Ecosystem by Paulo Andrez
 
HR: What industry thinks of by Olivier Prado
HR: What industry thinks of by Olivier PradoHR: What industry thinks of by Olivier Prado
HR: What industry thinks of by Olivier Prado
 
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Bitdefender, Ana Cobzaru

  • 1.
  • 2. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 2 2011 2000 2005 - - - 2012 2013 - - - - - - - - - The beginning… -
  • 3. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 3  First antivirus worldwide to offer intelligent updating  First antivirus product to include an application firewall  MIDAS (Malware Intrusion Detection Advanced System)- wins IST prize, “set to revolutionize AV design”  Bitdefender to release its proprietary Antispam technology  Bitdefender introduces B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments)  Spam Image Filter an important step in combating the new spamming techniques  Bitdefender® Mobile Security to provide real-time protection for smartphones and PDAs  Bitdefender® Active Virus Control to innovate with a real time technology  60-Second QuickScan – The quickest way to find if your computer is infected by using this online scanner  Gravity Architecture enables new generation of security for highly scalable services  Bitdefender Safepay™ secures all e-banking and e-shopping in a separate iron-clad, secure browser  Security for Virtualized Environments – The 1st vShield 5 solution optimized for virtualized datacenters  Bitdefender Clueful™, first application to show the world how iOS apps treat user's privacy  Bitdefender Photon™ technology boasts scanning speed and minimizes slowdowns  Cloud Security for Endpoints to provide enterprise-class security with no on-site management server  Hypervisor Agnostic Scanning Engine – allows Bitdefender to provide the best operational cost savings for virtualization adopters  Intra-HV memory introspection engine - prototype that allows for detecting and preventing Virtual Machine kernel mode threats across Microsoft/Linux/etc 2011 2001 2005 - - - 2012 2013 - - - - - - - - - A decade of innovation in technology -
  • 4. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 4  #1 in Security Technology  Bitdefender wins both AV-Test awards for Home Users: Best Protection and Best Performance in 2013.  3 out of the first 4 rated endpoint security vendors are using Bitdefender engines  #1 in Antispam Technologies  Bitdefender analyzes and issues protection for 5 million spam messages every day, or about 35 million per week.  Bitdefender has won all 30 VBSpam awards in a row in Virus Bulletin’s (VB) antispam tests between May 2009 to March 2014  In five local offices, 250+ engineers in R&D team warrant that Bitdefender’s technology – protecting more than 400 million users worldwide , technology partnerships included – is the #1 Anti-Malware Security Technology in the world. Results in sustainable technogical leadership
  • 5. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 5 AV-TEST  Awarded “Best Protection” and “Best Performance” in January 2014 PC MAG  Awarded “Best Antivirus of 2014” in Jan 2013  Winner of 3 Editor’s Choice awards in 2013 AV-COMPARATIVES  Winner of Gold Award for Proactive Malware Protection  The only AV to receive 100% in the most complex test ran by AV-Comparatives. Apr 2013 VB100  Owner of 14 VB100 certifications in 2 years for corporate products Approved Corporate Product for SVE & CSE Awarded “Best Antivirus of 2014”
  • 6. Copyright@Bitdefender 2013/ www.Bitdefender.com 5/27/2014 • 6 Shiftworks Co Ltd 100 + OEM partnerships
  • 7. UNDER THE SIGN OF THE DACIAN WOLF
  • 8. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 9 • The “Dacian Draco” was the standard of the ancient Dacian military. • A wolf head combined with a snake body that made a whistling sound when galloping due to the air that entered the wolf's mouth.
  • 9. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 10 Welcome to the GravityZone Security for Virtualized Environments, Security for Endpoints and Security for Mobile Devices