SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
KASPERSKY PURE 3.0
2,000,000 
1,500,000 
1,000,000 
500,000 
0 
3,000,000 
2,500,000 
4,000,000 
3,500,000 
2000 
2002 
2004 
2006 
2008 
2010 
New threats per day 
New signatures per day 
Network attacks blocked per month 
Spam messages per day 
Web-borne infections prevented per month 
2012 
Vulnerabilities identified in 2011 
2013 
THREATS: SMARTER, FASTER, MORE FREQUENT
BUT, IT’S BIGGER THAN VIRUSES AND SPAM… 
Consumers are shopping and banking online more than ever before 2012 saw over a billion online purchases worth more than $1.2 trillion 
Consumers are storing more of their personal information and data online Tax returns, family pictures and videos, music collections, etc. What happens when your PC or data is lost, stolen or damaged? 
The average consumer has multiple, “weak” passwords and account log-ins 
Children are accessing the Internet at a younger age, and teens are particularly vulnerable to social networking threats 
With multiple PCs in the home, consumers need an easy, convenient way to manage the security of all their PCs
INTRODUCING KASPERSKY PURE 3.0
THE ULTIMATE PC PROTECTION 
Advanced Internet Security Technologies 
Password Manager 
Backup & Restore 
Encryption 
PC Tune Up 
Parental Control 
Central Management of Multiple PCs
WHAT’S NEW? 
 Additional Security During 
Financial Transactions 
Safe Money 
Secure Keyboard 
 Additional Protections Against 
Software Vulnerabilities 
Automatic Exploit Prevention 
 Online Backup 
 Password Sync 
 Windows 8 Compatibility
SECURING CONSUMERS’ FINANCIAL TRANSACTIONS
SAFE MONEY TECHNOLOGY 
Offers comprehensive and multi-level protection for all aspects of financial operations online: Using online banking systems Using payment systems (PayPal, WebMoney, etc) Shopping online 
Launches automatically
SAFE MONEY TECHNOLOGY 
Trusted sites 
URL is checked 
Browser is opened in Safe Money mode 
Trusted connection 
The authenticity of the server is checked 
Trusted environment
SAFE DATA ENTRY 
Secure Keyboard 
On-Screen Virtual Keyboard 
Protects all data entered through physical keyboard 
Activates automatically when visiting bank and payment sites 
Protects from keyloggers 
Uses non-trackable mouse- clicks 
Protects from keyloggers, screen scrappers and more 
Convenient “quick launch” option
ADDITIONAL PROTECTIONS AGAINST SOFTWARE VULNERABILITIES
DANGERS OF SOFTWARE VULNERABILITIES 
One of the easier ways for cybercriminals to find holes in users’ 
protection is through application and system vulnerabilities that haven’t 
been updated with the latest fixes 
25% 
56% 
4% 
2% 
3% 
10% 
Java 
Adobe Acrobat Reader 
Windows components 
Android Root 
Adobe Flash 
Generic/ Other 
Most Attacked Software
AUTOMATIC EXPLOIT PREVENTION 
Goes beyond scanning for vulnerabilities to also analyzing and controlling the actions of programs, applications, etc. that have vulnerabilities 
Prevents and blocks the actions of such programs and exploits by: Controlling the launch of executable files from applications with vulnerabilities Analyzing the behavior of executable files for any similarities with malicious programs Restricting the actions allowed by applications with vulnerabilities
ONLINE BACKUP
ONLINE BACKUP 
Up to 2 GB online storage 
Seamless integration with Dropbox
PASSWORD SYNC
PASSWORD SYNC 
Safely stores consumers’ passwords in the cloud (i.e., online), so they can easily access their passwords and automatic account log-in from any PC 
Additional Password Manager features: You only need to remember one master password Secures passwords & personal data in encrypted vault Automatically fills in log-ins and long web forms Automatically generates random, strong passwords
WINDOWS 8
WINDOWS 8.1 COMPATIBLE 
Windows 8 UI integration 
Protection of apps developed for Microsoft’s new user interface 
Integration with Windows 
Security Center 
Early-Launch Anti-Malware (ELAM) system support 
Measured Boot technology support 
Windows 8.1 Compatible
ADDITIONAL FEATURES
ENCRYPTION AND PC CLEAN-UP TOOLS 
Encrypt and password-protect valuable files 
Permanently delete surfing history, temp files 
Irreversibly wipe sensitive files off the system
PARENTAL CONTROLS 
Social networks are used by 80% of kids aged 12-17 
Only 10% parents are using Parental Control software 
Kaspersky PURE 3.0 Allows Parents to: Control access to PC, Internet, websites, applications and games Block/limit/log IM and social networking communications Block downloads by file type Monitor use of specific words Prevent kids from sharing confidential information
Manage every PC in your home from a single PC 
View & maintain everyone’s security settings 
Remotely manage parental controls 
Keep every PC current with updates & licenses 
CENTRAL MANAGEMENT OF MULTIPLE PC’S
KASPERSKY PURE 3.0 TOTAL SECURITY 
Ultimate PC Protection: Advanced Internet Security Technologies Password Manager Backup & Restore Encryption PC Tune Up Parental Control Central Management of Multiple PCs
KASPERSKY LAB CONSUMER PRODUCTS 
25 
Ultimate 
PC 
Protection 
Essential 
PC 
Protection 
Premium multi-device Protection
Feature 
KAV 2014 
Essential 
protection 
KIS MD 2014 
Premium 
protection 
PURE 3.0 
Ultimate 
protection 
Proactive Defense 
Antivirus 
Tweaking of computer security settings 
Personal data protection 
Parental control 
Application Control and Safe Run 
Firewall 
Dangerous website blocker 
Anti-spam 
Network security management 
Password Manager 
Data backup and recovery 
Protection for Android devices 
Protection for iOS 
Protection for MAC
THANK YOU! 
VAŠ KASPERSKY PARTNER V SLOVENIJI: 
BONA DEA d.o.o. Šmartinska cesta 130 1000 Ljubljana E-prodaja: www.itshop.si prodaja@itshop.si Telefon: 01 549 1915

Weitere ähnliche Inhalte

Was ist angesagt?

Smartphone security
Smartphone securitySmartphone security
Smartphone securityMuthu Kumar
 
Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet SecurityJohn Dorner
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Viruses, Biometrics, & Encryptions
Viruses, Biometrics, & EncryptionsViruses, Biometrics, & Encryptions
Viruses, Biometrics, & Encryptionsguest9850e5
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionsarah s
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusABHAY PATHAK
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
2016 網絡私隱通識
2016 網絡私隱通識2016 網絡私隱通識
2016 網絡私隱通識Lokman Tsui
 
2016 網絡私隱通識
2016 網絡私隱通識2016 網絡私隱通識
2016 網絡私隱通識Lokman Tsui
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
Code Red Virus
Code Red VirusCode Red Virus
Code Red Virussmithz
 
anroid based call history
anroid based call historyanroid based call history
anroid based call historymallareddy
 

Was ist angesagt? (19)

Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet Security
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Viruses, Biometrics, & Encryptions
Viruses, Biometrics, & EncryptionsViruses, Biometrics, & Encryptions
Viruses, Biometrics, & Encryptions
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Protect
ProtectProtect
Protect
 
2016 網絡私隱通識
2016 網絡私隱通識2016 網絡私隱通識
2016 網絡私隱通識
 
2016 網絡私隱通識
2016 網絡私隱通識2016 網絡私隱通識
2016 網絡私隱通識
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
Code Red Virus
Code Red VirusCode Red Virus
Code Red Virus
 
anroid based call history
anroid based call historyanroid based call history
anroid based call history
 

Andere mochten auch

SIGO Reporte Social 2014
SIGO Reporte Social 2014SIGO Reporte Social 2014
SIGO Reporte Social 2014Equipo Siguenos
 
El malevo, Cande
El malevo, CandeEl malevo, Cande
El malevo, Candesugiambruni
 
Kazakhstan fire safety 794 (catalog)
Kazakhstan fire safety 794 (catalog)Kazakhstan fire safety 794 (catalog)
Kazakhstan fire safety 794 (catalog)brianthomes841
 
Carteles de paraguay
Carteles de paraguayCarteles de paraguay
Carteles de paraguayz600l
 
Boletín Informativo de orientación académica 13-14
Boletín Informativo de orientación académica 13-14Boletín Informativo de orientación académica 13-14
Boletín Informativo de orientación académica 13-14IESCorralejo
 
A todo esto ¿Qué es un arquitectura? (Versión simple)
A todo esto ¿Qué es un arquitectura? (Versión simple)A todo esto ¿Qué es un arquitectura? (Versión simple)
A todo esto ¿Qué es un arquitectura? (Versión simple)DCC8090
 
CAS and Terracotta
CAS and TerracottaCAS and Terracotta
CAS and TerracottaJasig CAS
 
01 buenas prácticas para la publicación de artículos para enviar[1]
01 buenas prácticas para la publicación de artículos para enviar[1]01 buenas prácticas para la publicación de artículos para enviar[1]
01 buenas prácticas para la publicación de artículos para enviar[1]jpsalced
 
La empresa ling. giuridici 2013-2014-lmt
La empresa   ling. giuridici 2013-2014-lmtLa empresa   ling. giuridici 2013-2014-lmt
La empresa ling. giuridici 2013-2014-lmtSilvina Dell'Isola
 
Linkbuilding para ecommerce - Clinic SEO eShow barcelona 2015
Linkbuilding para ecommerce - Clinic SEO eShow barcelona 2015Linkbuilding para ecommerce - Clinic SEO eShow barcelona 2015
Linkbuilding para ecommerce - Clinic SEO eShow barcelona 2015Alfonso Moure Ortega
 
José de Alencar - Alfarrábios - O ermitão da Glória
José de Alencar - Alfarrábios - O ermitão da GlóriaJosé de Alencar - Alfarrábios - O ermitão da Glória
José de Alencar - Alfarrábios - O ermitão da GlóriaFrancis Monteiro da Rocha
 
Coffee Table Book - CNC Final -
Coffee Table Book - CNC Final -Coffee Table Book - CNC Final -
Coffee Table Book - CNC Final -rachaelcheong
 
Unternehmenspräsentation ProzessWert UG haftungsbeschränkt
Unternehmenspräsentation ProzessWert UG haftungsbeschränktUnternehmenspräsentation ProzessWert UG haftungsbeschränkt
Unternehmenspräsentation ProzessWert UG haftungsbeschränktthomaslamp
 
Proyectos de Ecoturismo Genuino en el 2010
Proyectos de Ecoturismo Genuino en el 2010Proyectos de Ecoturismo Genuino en el 2010
Proyectos de Ecoturismo Genuino en el 2010Allan Rhodes
 
Rhythm Techniques for L2 Classrooms
Rhythm Techniques for L2 ClassroomsRhythm Techniques for L2 Classrooms
Rhythm Techniques for L2 Classroomsmburri
 

Andere mochten auch (20)

SIGO Reporte Social 2014
SIGO Reporte Social 2014SIGO Reporte Social 2014
SIGO Reporte Social 2014
 
El malevo, Cande
El malevo, CandeEl malevo, Cande
El malevo, Cande
 
Kazakhstan fire safety 794 (catalog)
Kazakhstan fire safety 794 (catalog)Kazakhstan fire safety 794 (catalog)
Kazakhstan fire safety 794 (catalog)
 
Carteles de paraguay
Carteles de paraguayCarteles de paraguay
Carteles de paraguay
 
Boletín Informativo de orientación académica 13-14
Boletín Informativo de orientación académica 13-14Boletín Informativo de orientación académica 13-14
Boletín Informativo de orientación académica 13-14
 
Prazise Company Profile
Prazise Company ProfilePrazise Company Profile
Prazise Company Profile
 
Presentación pdf
Presentación pdfPresentación pdf
Presentación pdf
 
A todo esto ¿Qué es un arquitectura? (Versión simple)
A todo esto ¿Qué es un arquitectura? (Versión simple)A todo esto ¿Qué es un arquitectura? (Versión simple)
A todo esto ¿Qué es un arquitectura? (Versión simple)
 
CAS and Terracotta
CAS and TerracottaCAS and Terracotta
CAS and Terracotta
 
01 buenas prácticas para la publicación de artículos para enviar[1]
01 buenas prácticas para la publicación de artículos para enviar[1]01 buenas prácticas para la publicación de artículos para enviar[1]
01 buenas prácticas para la publicación de artículos para enviar[1]
 
Evolet Accesorios
Evolet AccesoriosEvolet Accesorios
Evolet Accesorios
 
La empresa ling. giuridici 2013-2014-lmt
La empresa   ling. giuridici 2013-2014-lmtLa empresa   ling. giuridici 2013-2014-lmt
La empresa ling. giuridici 2013-2014-lmt
 
Linkbuilding para ecommerce - Clinic SEO eShow barcelona 2015
Linkbuilding para ecommerce - Clinic SEO eShow barcelona 2015Linkbuilding para ecommerce - Clinic SEO eShow barcelona 2015
Linkbuilding para ecommerce - Clinic SEO eShow barcelona 2015
 
José de Alencar - Alfarrábios - O ermitão da Glória
José de Alencar - Alfarrábios - O ermitão da GlóriaJosé de Alencar - Alfarrábios - O ermitão da Glória
José de Alencar - Alfarrábios - O ermitão da Glória
 
Coffee Table Book - CNC Final -
Coffee Table Book - CNC Final -Coffee Table Book - CNC Final -
Coffee Table Book - CNC Final -
 
Unternehmenspräsentation ProzessWert UG haftungsbeschränkt
Unternehmenspräsentation ProzessWert UG haftungsbeschränktUnternehmenspräsentation ProzessWert UG haftungsbeschränkt
Unternehmenspräsentation ProzessWert UG haftungsbeschränkt
 
EP 45 Valerie Sinkus Spreecast
EP 45 Valerie Sinkus SpreecastEP 45 Valerie Sinkus Spreecast
EP 45 Valerie Sinkus Spreecast
 
Proyectos de Ecoturismo Genuino en el 2010
Proyectos de Ecoturismo Genuino en el 2010Proyectos de Ecoturismo Genuino en el 2010
Proyectos de Ecoturismo Genuino en el 2010
 
Rhythm Techniques for L2 Classrooms
Rhythm Techniques for L2 ClassroomsRhythm Techniques for L2 Classrooms
Rhythm Techniques for L2 Classrooms
 
Manual Motor Diesel 1012-1013
Manual Motor Diesel 1012-1013Manual Motor Diesel 1012-1013
Manual Motor Diesel 1012-1013
 

Ähnlich wie Predstavitev Kaspersky PURE 3.0 Total Security

Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740guest2bd2b2
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1Anne Adrian
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Ravikumar Sathyamurthy
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Internet Security
Internet SecurityInternet Security
Internet SecurityAnne Adrian
 
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxfrancis578223
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Dejan Pogačnik
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And PrivacyMISY
 
KAV KIS 2015 Product Presentation
KAV KIS 2015 Product PresentationKAV KIS 2015 Product Presentation
KAV KIS 2015 Product PresentationWiseKnow Thailand
 
The battle for safety
The battle for safetyThe battle for safety
The battle for safetyschroedinger
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overviewsferinga
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overviewsferinga
 

Ähnlich wie Predstavitev Kaspersky PURE 3.0 Total Security (20)

Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Windows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITProsWindows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITPros
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Tip sheet
 Tip sheet Tip sheet
Tip sheet
 
KAV KIS 2015 Product Presentation
KAV KIS 2015 Product PresentationKAV KIS 2015 Product Presentation
KAV KIS 2015 Product Presentation
 
The battle for safety
The battle for safetyThe battle for safety
The battle for safety
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Protect your Privacy
Protect your PrivacyProtect your Privacy
Protect your Privacy
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
 

Predstavitev Kaspersky PURE 3.0 Total Security

  • 2. 2,000,000 1,500,000 1,000,000 500,000 0 3,000,000 2,500,000 4,000,000 3,500,000 2000 2002 2004 2006 2008 2010 New threats per day New signatures per day Network attacks blocked per month Spam messages per day Web-borne infections prevented per month 2012 Vulnerabilities identified in 2011 2013 THREATS: SMARTER, FASTER, MORE FREQUENT
  • 3. BUT, IT’S BIGGER THAN VIRUSES AND SPAM… Consumers are shopping and banking online more than ever before 2012 saw over a billion online purchases worth more than $1.2 trillion Consumers are storing more of their personal information and data online Tax returns, family pictures and videos, music collections, etc. What happens when your PC or data is lost, stolen or damaged? The average consumer has multiple, “weak” passwords and account log-ins Children are accessing the Internet at a younger age, and teens are particularly vulnerable to social networking threats With multiple PCs in the home, consumers need an easy, convenient way to manage the security of all their PCs
  • 5. THE ULTIMATE PC PROTECTION Advanced Internet Security Technologies Password Manager Backup & Restore Encryption PC Tune Up Parental Control Central Management of Multiple PCs
  • 6. WHAT’S NEW?  Additional Security During Financial Transactions Safe Money Secure Keyboard  Additional Protections Against Software Vulnerabilities Automatic Exploit Prevention  Online Backup  Password Sync  Windows 8 Compatibility
  • 8. SAFE MONEY TECHNOLOGY Offers comprehensive and multi-level protection for all aspects of financial operations online: Using online banking systems Using payment systems (PayPal, WebMoney, etc) Shopping online Launches automatically
  • 9. SAFE MONEY TECHNOLOGY Trusted sites URL is checked Browser is opened in Safe Money mode Trusted connection The authenticity of the server is checked Trusted environment
  • 10. SAFE DATA ENTRY Secure Keyboard On-Screen Virtual Keyboard Protects all data entered through physical keyboard Activates automatically when visiting bank and payment sites Protects from keyloggers Uses non-trackable mouse- clicks Protects from keyloggers, screen scrappers and more Convenient “quick launch” option
  • 11. ADDITIONAL PROTECTIONS AGAINST SOFTWARE VULNERABILITIES
  • 12. DANGERS OF SOFTWARE VULNERABILITIES One of the easier ways for cybercriminals to find holes in users’ protection is through application and system vulnerabilities that haven’t been updated with the latest fixes 25% 56% 4% 2% 3% 10% Java Adobe Acrobat Reader Windows components Android Root Adobe Flash Generic/ Other Most Attacked Software
  • 13. AUTOMATIC EXPLOIT PREVENTION Goes beyond scanning for vulnerabilities to also analyzing and controlling the actions of programs, applications, etc. that have vulnerabilities Prevents and blocks the actions of such programs and exploits by: Controlling the launch of executable files from applications with vulnerabilities Analyzing the behavior of executable files for any similarities with malicious programs Restricting the actions allowed by applications with vulnerabilities
  • 15. ONLINE BACKUP Up to 2 GB online storage Seamless integration with Dropbox
  • 17. PASSWORD SYNC Safely stores consumers’ passwords in the cloud (i.e., online), so they can easily access their passwords and automatic account log-in from any PC Additional Password Manager features: You only need to remember one master password Secures passwords & personal data in encrypted vault Automatically fills in log-ins and long web forms Automatically generates random, strong passwords
  • 19. WINDOWS 8.1 COMPATIBLE Windows 8 UI integration Protection of apps developed for Microsoft’s new user interface Integration with Windows Security Center Early-Launch Anti-Malware (ELAM) system support Measured Boot technology support Windows 8.1 Compatible
  • 21. ENCRYPTION AND PC CLEAN-UP TOOLS Encrypt and password-protect valuable files Permanently delete surfing history, temp files Irreversibly wipe sensitive files off the system
  • 22. PARENTAL CONTROLS Social networks are used by 80% of kids aged 12-17 Only 10% parents are using Parental Control software Kaspersky PURE 3.0 Allows Parents to: Control access to PC, Internet, websites, applications and games Block/limit/log IM and social networking communications Block downloads by file type Monitor use of specific words Prevent kids from sharing confidential information
  • 23. Manage every PC in your home from a single PC View & maintain everyone’s security settings Remotely manage parental controls Keep every PC current with updates & licenses CENTRAL MANAGEMENT OF MULTIPLE PC’S
  • 24. KASPERSKY PURE 3.0 TOTAL SECURITY Ultimate PC Protection: Advanced Internet Security Technologies Password Manager Backup & Restore Encryption PC Tune Up Parental Control Central Management of Multiple PCs
  • 25. KASPERSKY LAB CONSUMER PRODUCTS 25 Ultimate PC Protection Essential PC Protection Premium multi-device Protection
  • 26. Feature KAV 2014 Essential protection KIS MD 2014 Premium protection PURE 3.0 Ultimate protection Proactive Defense Antivirus Tweaking of computer security settings Personal data protection Parental control Application Control and Safe Run Firewall Dangerous website blocker Anti-spam Network security management Password Manager Data backup and recovery Protection for Android devices Protection for iOS Protection for MAC
  • 27. THANK YOU! VAŠ KASPERSKY PARTNER V SLOVENIJI: BONA DEA d.o.o. Šmartinska cesta 130 1000 Ljubljana E-prodaja: www.itshop.si prodaja@itshop.si Telefon: 01 549 1915