SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Alexandru LUCA – Business Developer Manager CEE, Baltics, Turkey and Israel
“Bitdefender is riding high this season”
PC MAG, Lead Security Analyst Neil J. Rubenking, January 2013

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 2
2013 starts HIGH TECH

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 3
Life 2.0+
New World. Complicated.
New Threats. Profit Driven.
New Technologies. Cost Driven.
New Devices. Connected.
New Security. Not Many Real Options.
Life 2.0+

E-Threats behind the Curtains

Teens and Geeks

WHO?

Cyber-criminals

–
–

–
–

Attention-Driven
Loner Profile

Profit-Driven
Highly Organized

High Profile Attacks

HOW?

Stealth Attacks

–
–

–
–

Social Engineering
Mass Mailers

–

Spyware/Adware
Automated Variant Creation and
Morphing
Persistent Threats

Lost productivity

WHAT?

Cyber-crime

–

–
–

–

Clogged E-mail Systems and
Networks
Help Desk and Data Loss Costs

Copyright@Bitdefender 2013/ www.Bitdefender.com

Identity Theft and Online Fraud
Highly Targeted Corporate
Information Attacks

11/21/2013 • 5
Life 2.0+

Magnitude of the Problem/Opportunity
Around 1.5M
unique
malware
samples are
discovered
every month!

Source: AV-Test Labs (www.av-test.org)

Source: av-test.org – New Malware Growth

•

“Even the best signature databases… have less than a 50% chance of catching
completely new threats. Signatures are extremely ineffective against targeted and “zero
day” threats.”
According to Gartner

•

“Nobody can win the war against malware with a signature-driven product, but more
proactive technologies are required ”

According to AV-Test’s Andreas Marx
Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 6
Life 2.0+

Are businesses or even governments protected ?


Launched in 2010 to target a nuclear power plant and an uranium enrichment facility, Stuxnet began to draw attention on
cyber-warfare.



In 2012, Flamer made headlines as it was discovered it had been in the wild for some five years.



One of the biggest and most dangerous e-threats in the world, Flamer incorporates more than 63 different files, including core
components and pluggins.



Governments admitted to having relied on malware for cyber-espionage



In 2012, Chinese cyber-criminals have attempted to hit military personnel with spam packed with 0-day Flash exploits

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 7
Market Landscape and Trends

Security Software Market Overview
New Market Trends

Freeware

•
•
•
•

•

Virtualization
The move to the cloud
BYOD
New consumer technologies and computing
models create new market opportunities
Emerging regions: Latin America, Asia/Pacific

•

Competitors
•
•

Top players: Symantec,
McAfee, TrendMicro
Market Challengers:
Kaspersky, AVG,
Bitdefender

Copyright@Bitdefender 2013/ www.Bitdefender.com

•
•
•

Free products have 20% of consumer user
base
Freeware is used for gradual monetization
IDC believes Free will become part of
Managed Security Service
Are the freeware players fighting for security
or for eyeballs (i.e. advertising revenues)?

Security Software Market
9 billion $ in 2013

Bitdefender
Technology leadership
Best products
Future Innovation

11/21/2013 • 9
Bitdefender at a Glance
Bitdefender at a Glance

A decade of innovation in technology
2000

•

First antivirus worldwide to offer intelligent updating

-

•

First antivirus product to include an application firewall

-

•

MIDAS (Malware Intrusion Detection Advanced System)- wins IST prize, “set to revolutionize AV design”

-

•

Bitdefender to release its proprietary Antispam technology

-

•

Bitdefender introduces B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments)

-

•

Spam Image Filter an important step in combating the new spamming techniques

2005

•

Bitdefender® Mobile Security to provide real-time protection for smartphones and PDAs

-

•

Bitdefender® Active Virus Control to innovate with a real time technology

-

•

60-Second QuickScan – The quickest way to find if your computer is infected by using this online scanner

-

•

Gravity Architecture enables new generation of security for highly scalable services

•

Bitdefender Safepay™ secures all e-banking and e-shopping in a separate iron-clad, secure browser

-

•

Security for Virtualized Environments – The 1st vShield 5 solution optimized for virtualized datacenters

-

•

Cloud Security for Endpoints to provide enterprise-class security with no on-site management server

2011

•

Bitdefender Clueful™, first application to show the world how iOS apps treat user's privacy

-

•

Hypervisor Agnostic Scanning Engine – allows Bitdefender to provide the best operational cost savings for virtualization
adopters

2012
•

2013

Intra-HV memory introspection engine - prototype that allows for detecting and preventing Virtual Machine kernel mode threats
across Microsoft/Linux/etc

Copyright@Bitdefender 2013/ www.Bitdefender.com
•
Bitdefender Photon™

technology boasts scanning speed and minimizes slowdowns

11/21/2013 • 11
Bitdefender at a Glance

Results in sustainable technogical leadership
 In five local offices, 250+ engineers in R&D team warrant that Bitdefender’s technology –
protecting more than 400 million users worldwide , technology partnerships included – is
the #1 Anti-Malware Security Technology in the world.
 #1 in Security Technology


In the AV-Test overall performance award for THE BEST REPAIR
IN 2012, 3 out of the first 4 rated endpoint security vendors are
using Bitdefender engines

 #1 in Antispam Technologies


Bitdefender analyzes and issues protection for 5 million
spam messages every day, or about 35 million per week.



Bitdefender has won all 24 VBSpam awards in a row in Virus
Bulletin’s (VB) antispam tests between May 2009 to March 2013

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 12
Bitdefender at a Glance

Consistent Leader in Antivirus Technology
Consumer AV Test Score: Protection, Repair, Usability (Average)
6.00

Bitdefender
5.50

Eset
McAfee

5.00

Avira
Trend Micro

4.50

4.00

Panda
Avg
Symantec

3.50

Kaspersky

3.00

2.50

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 13
Bitdefender at a Glance

Product of the Year in 2013
AV-Comparatives
•

Awarded “Product of the Year” in January 2013

•

The only AV to receive 100% in the most complex
test ran by AV-Comparatives. Apr 2013

AV-TEST
•

Leader in the 22 months endurance test!

•

Awarded “Best Repair for 2012”, in Jan 2013

PC MAG
•

Awarded “Best Antivirus of 2013” in Jan 2013.

VB100
•

Wins 12 VB100 awards in 2 years.

Approved Corporate Product for SVE & CSE

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 14
“Bitdefender clearly took the lead in the industry”
AV Comparatives, CEO Andreas Clementi, January 2013

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 15
Backup slides

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 17
Bitdefender at a Glance

Technological leadership transferred to product
 #1 in Consumer Products


First security software vendor to receive top recommendations simultaneously from the most important three
key independent organizations in the US, UK, and Germany!

 … and catching up in 2012 with the newly introduced Business Products

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 19
The New Brand

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 20
•

•
•

Dacia was a country located in Europe over the territories occupied today
by Romania, Moldova, Ukraine, Hungary and Serbia.
The “Dacian Draco” was the standard of the ancient Dacian military.
A wolf head combined with a snake body that made a whistling sound when
galloping due to the air that entered the wolf's mouth.

We have the sharp mind of the wolf, the slickness of the snake, the vigilance of
the alpha male and the indestructibility of the snake body!

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 21
Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 22
Vision

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 23
Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 24
Brand promise

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 25
Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 26
Logo

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 27
Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 28
Brand avatar

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 29
Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 30
Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 31

Weitere ähnliche Inhalte

Was ist angesagt?

How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYOD
Caston Thomas
 
Cisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalCisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_final
Sorin Ciornei
 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
ProductNation/iSPIRT
 

Was ist angesagt? (20)

Security Matters : The Evolution of Samsung KNOX™
Security Matters: The Evolution of Samsung KNOX™Security Matters: The Evolution of Samsung KNOX™
Security Matters : The Evolution of Samsung KNOX™
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
 
How to Lead in IIoT
How to Lead in IIoTHow to Lead in IIoT
How to Lead in IIoT
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT Equipment
 
A History of IIoT Cyber-Attacks
A History of IIoT Cyber-Attacks A History of IIoT Cyber-Attacks
A History of IIoT Cyber-Attacks
 
BYOD: Bring Your Own Device or Danger?
BYOD: Bring Your Own Device or Danger?BYOD: Bring Your Own Device or Danger?
BYOD: Bring Your Own Device or Danger?
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYOD
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROI
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Cisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalCisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_final
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 
Getronics enjoys higher productivity and increased mobility with Windows 8
Getronics enjoys higher productivity and increased mobility with Windows 8Getronics enjoys higher productivity and increased mobility with Windows 8
Getronics enjoys higher productivity and increased mobility with Windows 8
 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry Power
 
IoT is Here. Is Your Facility Ready?
IoT is Here. Is Your Facility Ready?IoT is Here. Is Your Facility Ready?
IoT is Here. Is Your Facility Ready?
 
Apr 28-2015 vasco investor presentation
Apr 28-2015 vasco investor presentationApr 28-2015 vasco investor presentation
Apr 28-2015 vasco investor presentation
 
Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0
 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
 
IIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingIIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturing
 

Ähnlich wie Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender technologijas“ (Rumunija)

US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to Bitdefender
Bitdefender Enterprise
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
BlackBerry
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
LabSharegroup
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
calebbarlow
 

Ähnlich wie Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender technologijas“ (Rumunija) (20)

US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to Bitdefender
 
Bitdefender, Ana Cobzaru
Bitdefender, Ana CobzaruBitdefender, Ana Cobzaru
Bitdefender, Ana Cobzaru
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
 
Microsoft Company
Microsoft CompanyMicrosoft Company
Microsoft Company
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
 
IBM Smarter Cities
IBM Smarter CitiesIBM Smarter Cities
IBM Smarter Cities
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
 
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
 

Mehr von Lietuvos kompiuterininkų sąjunga

Mehr von Lietuvos kompiuterininkų sąjunga (20)

LIKS ataskaita 2021-2023
LIKS ataskaita 2021-2023LIKS ataskaita 2021-2023
LIKS ataskaita 2021-2023
 
Eimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizė
Eimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizėEimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizė
Eimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizė
 
B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...
B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...
B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...
 
D. Dluznevskij. YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemose
D. Dluznevskij.  YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemoseD. Dluznevskij.  YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemose
D. Dluznevskij. YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemose
 
I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...
I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...
I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...
 
G. Mezetis. Skaimenines valstybes link
G. Mezetis. Skaimenines valstybes link G. Mezetis. Skaimenines valstybes link
G. Mezetis. Skaimenines valstybes link
 
E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...
E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...
E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...
 
V. Jakuška. Ką reikėtu žinoti apie .lt domeną?
V. Jakuška. Ką reikėtu žinoti apie .lt domeną?V. Jakuška. Ką reikėtu žinoti apie .lt domeną?
V. Jakuška. Ką reikėtu žinoti apie .lt domeną?
 
V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...
V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...
V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...
 
Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...
Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...
Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...
 
Raimundas Matylevičius. Asmens duomenų valdymas
Raimundas Matylevičius. Asmens duomenų valdymasRaimundas Matylevičius. Asmens duomenų valdymas
Raimundas Matylevičius. Asmens duomenų valdymas
 
Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...
Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...
Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...
 
Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...
Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...
Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...
 
Rima Šiaulienė. IT VBE 2021 teksto maketavimo užduotis
Rima Šiaulienė. IT VBE 2021 teksto maketavimo užduotisRima Šiaulienė. IT VBE 2021 teksto maketavimo užduotis
Rima Šiaulienė. IT VBE 2021 teksto maketavimo užduotis
 
Gražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizė
Gražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizėGražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizė
Gražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizė
 
Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?
Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?
Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?
 
Eugenijus Valavičius. Hiperteksto kelias
Eugenijus Valavičius. Hiperteksto keliasEugenijus Valavičius. Hiperteksto kelias
Eugenijus Valavičius. Hiperteksto kelias
 
Tomas Kasperavičius. Robotikos realizacija edukacinėje erdvėje
Tomas Kasperavičius. Robotikos realizacija edukacinėje erdvėjeTomas Kasperavičius. Robotikos realizacija edukacinėje erdvėje
Tomas Kasperavičius. Robotikos realizacija edukacinėje erdvėje
 
Paulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėje
Paulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėjePaulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėje
Paulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėje
 
Olga Kurasova. Dirbtinis intelektas ir neuroniniai tinklai
Olga Kurasova. Dirbtinis intelektas ir neuroniniai tinklaiOlga Kurasova. Dirbtinis intelektas ir neuroniniai tinklai
Olga Kurasova. Dirbtinis intelektas ir neuroniniai tinklai
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender technologijas“ (Rumunija)

  • 1. Alexandru LUCA – Business Developer Manager CEE, Baltics, Turkey and Israel
  • 2. “Bitdefender is riding high this season” PC MAG, Lead Security Analyst Neil J. Rubenking, January 2013 Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 2
  • 3. 2013 starts HIGH TECH Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 3
  • 4. Life 2.0+ New World. Complicated. New Threats. Profit Driven. New Technologies. Cost Driven. New Devices. Connected. New Security. Not Many Real Options.
  • 5. Life 2.0+ E-Threats behind the Curtains Teens and Geeks WHO? Cyber-criminals – – – – Attention-Driven Loner Profile Profit-Driven Highly Organized High Profile Attacks HOW? Stealth Attacks – – – – Social Engineering Mass Mailers – Spyware/Adware Automated Variant Creation and Morphing Persistent Threats Lost productivity WHAT? Cyber-crime – – – – Clogged E-mail Systems and Networks Help Desk and Data Loss Costs Copyright@Bitdefender 2013/ www.Bitdefender.com Identity Theft and Online Fraud Highly Targeted Corporate Information Attacks 11/21/2013 • 5
  • 6. Life 2.0+ Magnitude of the Problem/Opportunity Around 1.5M unique malware samples are discovered every month! Source: AV-Test Labs (www.av-test.org) Source: av-test.org – New Malware Growth • “Even the best signature databases… have less than a 50% chance of catching completely new threats. Signatures are extremely ineffective against targeted and “zero day” threats.” According to Gartner • “Nobody can win the war against malware with a signature-driven product, but more proactive technologies are required ” According to AV-Test’s Andreas Marx Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 6
  • 7. Life 2.0+ Are businesses or even governments protected ?  Launched in 2010 to target a nuclear power plant and an uranium enrichment facility, Stuxnet began to draw attention on cyber-warfare.  In 2012, Flamer made headlines as it was discovered it had been in the wild for some five years.  One of the biggest and most dangerous e-threats in the world, Flamer incorporates more than 63 different files, including core components and pluggins.  Governments admitted to having relied on malware for cyber-espionage  In 2012, Chinese cyber-criminals have attempted to hit military personnel with spam packed with 0-day Flash exploits Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 7
  • 8. Market Landscape and Trends Security Software Market Overview New Market Trends Freeware • • • • • Virtualization The move to the cloud BYOD New consumer technologies and computing models create new market opportunities Emerging regions: Latin America, Asia/Pacific • Competitors • • Top players: Symantec, McAfee, TrendMicro Market Challengers: Kaspersky, AVG, Bitdefender Copyright@Bitdefender 2013/ www.Bitdefender.com • • • Free products have 20% of consumer user base Freeware is used for gradual monetization IDC believes Free will become part of Managed Security Service Are the freeware players fighting for security or for eyeballs (i.e. advertising revenues)? Security Software Market 9 billion $ in 2013 Bitdefender Technology leadership Best products Future Innovation 11/21/2013 • 9
  • 10. Bitdefender at a Glance A decade of innovation in technology 2000 • First antivirus worldwide to offer intelligent updating - • First antivirus product to include an application firewall - • MIDAS (Malware Intrusion Detection Advanced System)- wins IST prize, “set to revolutionize AV design” - • Bitdefender to release its proprietary Antispam technology - • Bitdefender introduces B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments) - • Spam Image Filter an important step in combating the new spamming techniques 2005 • Bitdefender® Mobile Security to provide real-time protection for smartphones and PDAs - • Bitdefender® Active Virus Control to innovate with a real time technology - • 60-Second QuickScan – The quickest way to find if your computer is infected by using this online scanner - • Gravity Architecture enables new generation of security for highly scalable services • Bitdefender Safepay™ secures all e-banking and e-shopping in a separate iron-clad, secure browser - • Security for Virtualized Environments – The 1st vShield 5 solution optimized for virtualized datacenters - • Cloud Security for Endpoints to provide enterprise-class security with no on-site management server 2011 • Bitdefender Clueful™, first application to show the world how iOS apps treat user's privacy - • Hypervisor Agnostic Scanning Engine – allows Bitdefender to provide the best operational cost savings for virtualization adopters 2012 • 2013 Intra-HV memory introspection engine - prototype that allows for detecting and preventing Virtual Machine kernel mode threats across Microsoft/Linux/etc Copyright@Bitdefender 2013/ www.Bitdefender.com • Bitdefender Photon™ technology boasts scanning speed and minimizes slowdowns 11/21/2013 • 11
  • 11. Bitdefender at a Glance Results in sustainable technogical leadership  In five local offices, 250+ engineers in R&D team warrant that Bitdefender’s technology – protecting more than 400 million users worldwide , technology partnerships included – is the #1 Anti-Malware Security Technology in the world.  #1 in Security Technology  In the AV-Test overall performance award for THE BEST REPAIR IN 2012, 3 out of the first 4 rated endpoint security vendors are using Bitdefender engines  #1 in Antispam Technologies  Bitdefender analyzes and issues protection for 5 million spam messages every day, or about 35 million per week.  Bitdefender has won all 24 VBSpam awards in a row in Virus Bulletin’s (VB) antispam tests between May 2009 to March 2013 Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 12
  • 12. Bitdefender at a Glance Consistent Leader in Antivirus Technology Consumer AV Test Score: Protection, Repair, Usability (Average) 6.00 Bitdefender 5.50 Eset McAfee 5.00 Avira Trend Micro 4.50 4.00 Panda Avg Symantec 3.50 Kaspersky 3.00 2.50 Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 13
  • 13. Bitdefender at a Glance Product of the Year in 2013 AV-Comparatives • Awarded “Product of the Year” in January 2013 • The only AV to receive 100% in the most complex test ran by AV-Comparatives. Apr 2013 AV-TEST • Leader in the 22 months endurance test! • Awarded “Best Repair for 2012”, in Jan 2013 PC MAG • Awarded “Best Antivirus of 2013” in Jan 2013. VB100 • Wins 12 VB100 awards in 2 years. Approved Corporate Product for SVE & CSE Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 14
  • 14. “Bitdefender clearly took the lead in the industry” AV Comparatives, CEO Andreas Clementi, January 2013 Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 15
  • 15.
  • 16. Backup slides Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 17
  • 17. Bitdefender at a Glance Technological leadership transferred to product  #1 in Consumer Products  First security software vendor to receive top recommendations simultaneously from the most important three key independent organizations in the US, UK, and Germany!  … and catching up in 2012 with the newly introduced Business Products Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 19
  • 18. The New Brand Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 20
  • 19. • • • Dacia was a country located in Europe over the territories occupied today by Romania, Moldova, Ukraine, Hungary and Serbia. The “Dacian Draco” was the standard of the ancient Dacian military. A wolf head combined with a snake body that made a whistling sound when galloping due to the air that entered the wolf's mouth. We have the sharp mind of the wolf, the slickness of the snake, the vigilance of the alpha male and the indestructibility of the snake body! Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 21
  • 23. Brand promise Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 25
  • 27. Brand avatar Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 29

Hinweis der Redaktion

  1. “Bitdefender is riding high this season”PC MAG, Lead Security Analyst Neil J. Rubenking
  2. “Bitdefender is riding high this season”PC MAG, Lead Security Analyst Neil J. Rubenking
  3. Un slide update-at e disponibil la back up slides
  4. 7 avtest in a rowAv comparatives – Advanced + - march 2012, November 2011, August 2011, February 2011, november 2010, Advanced – may 2011
  5. 7 avtest in a rowAv comparatives – Advanced + - march 2012, November 2011, August 2011, February 2011, november 2010, Advanced – may 2011
  6. “Bitdefender is riding high this season”PC MAG, Lead Security Analyst Neil J. Rubenking