SlideShare ist ein Scribd-Unternehmen logo
1 von 19
IntroducingKaspersky Anti-Virus 2011         & Kaspersky Internet Security 2011
The Threat Growing  is Changing and
The Growing Malware Threat 3 4,250,000 4,000,000 3,750,000 New threats per day 30,000+ 3,500,000 3,250,000 3,000,000 New signatures per day   3,500+ 2,750,000 2,500,000 2,250,000 Total signatures as of July 2010 4,400,000 2,000,000 1,750,000 1,500,000 Spam messages per day 30,000,000+ 1,250,000 1,000,000 750,000 500,000 250,000 0 2010 1998 2000 2002 2004 2006 2008 2009 1999 2001 2003 2005 2007
New Phishing Attacks are Most Dangerous in The Earliest Hours 4 Cost $ Victims 1 72 20 Time in Hours
This is Big Business, Well-funded, Very Clever Cybercriminals are very motivated to be as creative and tricky as possible because there’s lots of money to be made In some cases you can even call a customer service line if your hacker software isn’t working They have the resources and the motivation to do things on a grand scale with maximum impact in the shortest amount of time 5 $ $ $
             The Kaspersky Difference Premium Multi-Layer Protection Real-Time protection against viruses, spyware, Trojans, worms, rootkits, botnets and more Superior Identity Theft Defense with Virtual Keyboard to protect your most sensitive data Small Hourly Signature Updates Maximum PC Performance Small footprint with 1% CPU usage iChecker/iSwift provide intelligent scanning for maximum performance Gamer Mode blocks pop-ups and reduces use of pc’s resources in one-click Ease of Use Desktop Security Gadget Intuitive Interface
What’s NEW!Kaspersky Anti-Virus 2011         & Kaspersky Internet Security 2011
8                 Real-time Protection New:  If your PC is so severely infected that no software can be installed on it, you can  download the AVP tool to scan and eliminate all threats without calling Support Includes Rescue Disk for efficiently detecting and eliminating computer infections if your system is maliciously attacked Installs on Infected PCs
9 		Ease of Use New:  Quick desktop access to your security status and settings Customizable buttons for convenient access to frequently used security features Easy drag-and-drop functionality for instant  virus scanning Desktop Security Gadget
10 Premium Protection New:  Cutting-edge technology for proactive defense against emerging threats Monitors and analyzes system activity to detect any dangerous behavior Malicious actions can be rolled-back, preventing permanent damage System Watcher Monitor Log Reverse
v 11 ID Protection New:  Proactively detects phishing resources, in addition to using the database of phishing web sites  Protects your digital identity and blocks access to phishing web sites Virtual Keyboard keeps your passwords secure when shopping, banking or social networking online Proactive Phishing Protection
Also NEW withKasperskyInternet Security 2011
13 Emerging Threat Protection New:  Completely walled-off environment for running unknown or suspicious programs “Test drive” programs with total confidence that no harm will come to your system Includes Safe Run for Web sites for an added layer of protection when accessing web sites that handle confidential information like online banking Safe Desktop
14 Family Protection New:  Monitor, limit or block your kids’ online activities: Applications or games Communications via Email, IM or social networks File downloads Transfer of personal information like addresses, phone numbers or credit cards Web content Time spent online Advanced Parental Controls
15 Real-time Protection New:  Delivers unparalleled online security, protecting you from dangerous web sites Assesses an IP address, and assigns it a status: Trusted, Suspicious or Banned Status is determined by analyzing data related to the IP address: Rate of visit/hits Does it contain malicious code?  Does it link to suspicious web sites? Safe Surf
Blocks web sites by their country code domain Allows users the ability to specify where they want to receive content from or where they don’t want to receive it from  Protects against legitimate web sites that “re-direct” to foreign malware servers 16 Real-time Protection New:  Geo Filter
What’s New from Kaspersky 2011 Desktop Security Gadget  - Instant access to security status and features System Watcher – Monitors and analyzes system activity to detect any dangerous behavior Proactive Phishing Protection - Protects your digital identity and blocks access to phishing web sites Installation on Infected PCs -  Directly download the AVP tool to scan and eliminate all threats  Also  New with Kaspersky Internet Security 2011: Safe Desktop with Safe Run for Web sites– Completely walled-off environment for running suspicious programs and Safe Run mode for additional protection for your financial information Advanced Parental Controls – Monitor, limit or block your kids’ online activities Safe Surf–  Protects you from dangerous or offensive web sites Geo Filter – Blocks web sites by their country code domain
Unmatched Support Team 18 ,[object Object]
High-touch

Weitere ähnliche Inhalte

Was ist angesagt?

problem statement on security
problem statement on securityproblem statement on security
problem statement on securityRajuPrasad33
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10NowSecure
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesQuick Heal Technologies Ltd.
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimeSMSumon8
 
Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?ahanashrin
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
Network Situational Awareness using Tripwire IP360
Network Situational Awareness using Tripwire IP360Network Situational Awareness using Tripwire IP360
Network Situational Awareness using Tripwire IP360Tripwire
 
Ransomware- What Accountants Need To Know
Ransomware- What Accountants Need To KnowRansomware- What Accountants Need To Know
Ransomware- What Accountants Need To KnowAce Cloud Hosting
 
Network security
Network securityNetwork security
Network securityNandini Raj
 
Tripwire Adaptive Threat Protection
Tripwire Adaptive Threat ProtectionTripwire Adaptive Threat Protection
Tripwire Adaptive Threat ProtectionTripwire
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
Secure Code Warrior - Robust error checking
Secure Code Warrior - Robust error checkingSecure Code Warrior - Robust error checking
Secure Code Warrior - Robust error checkingSecure Code Warrior
 
Swiss-belhotel Security Scare Workshop May 3, 2018
Swiss-belhotel Security Scare Workshop May 3, 2018Swiss-belhotel Security Scare Workshop May 3, 2018
Swiss-belhotel Security Scare Workshop May 3, 2018Craig Rispin
 

Was ist angesagt? (19)

problem statement on security
problem statement on securityproblem statement on security
problem statement on security
 
Adware
AdwareAdware
Adware
 
Insider theft detection
Insider theft detection Insider theft detection
Insider theft detection
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Spyware
SpywareSpyware
Spyware
 
Network Situational Awareness using Tripwire IP360
Network Situational Awareness using Tripwire IP360Network Situational Awareness using Tripwire IP360
Network Situational Awareness using Tripwire IP360
 
Backdoor
BackdoorBackdoor
Backdoor
 
Ransomware- What Accountants Need To Know
Ransomware- What Accountants Need To KnowRansomware- What Accountants Need To Know
Ransomware- What Accountants Need To Know
 
Network security
Network securityNetwork security
Network security
 
Tripwire Adaptive Threat Protection
Tripwire Adaptive Threat ProtectionTripwire Adaptive Threat Protection
Tripwire Adaptive Threat Protection
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Ransomware 2017: New threats emerge
Ransomware 2017: New threats emergeRansomware 2017: New threats emerge
Ransomware 2017: New threats emerge
 
Secure Code Warrior - Robust error checking
Secure Code Warrior - Robust error checkingSecure Code Warrior - Robust error checking
Secure Code Warrior - Robust error checking
 
Swiss-belhotel Security Scare Workshop May 3, 2018
Swiss-belhotel Security Scare Workshop May 3, 2018Swiss-belhotel Security Scare Workshop May 3, 2018
Swiss-belhotel Security Scare Workshop May 3, 2018
 

Andere mochten auch

Ambientes operacionais - sistemas operacionais.
Ambientes operacionais - sistemas operacionais.Ambientes operacionais - sistemas operacionais.
Ambientes operacionais - sistemas operacionais.Ronald Santos
 
El desayuno, la comida más importante del día.
El desayuno, la comida más importante del día.El desayuno, la comida más importante del día.
El desayuno, la comida más importante del día.CEAC
 
Civil Society and Public Administration
Civil Society and Public AdministrationCivil Society and Public Administration
Civil Society and Public AdministrationSheila Dingcong
 
Postmodern Public Administration Theory
Postmodern Public Administration TheoryPostmodern Public Administration Theory
Postmodern Public Administration TheorySheila Dingcong
 
Hoe schrijf je een brief?
Hoe schrijf je een brief?Hoe schrijf je een brief?
Hoe schrijf je een brief?CVO-SSH
 

Andere mochten auch (6)

Ambientes operacionais - sistemas operacionais.
Ambientes operacionais - sistemas operacionais.Ambientes operacionais - sistemas operacionais.
Ambientes operacionais - sistemas operacionais.
 
Proyecciones
ProyeccionesProyecciones
Proyecciones
 
El desayuno, la comida más importante del día.
El desayuno, la comida más importante del día.El desayuno, la comida más importante del día.
El desayuno, la comida más importante del día.
 
Civil Society and Public Administration
Civil Society and Public AdministrationCivil Society and Public Administration
Civil Society and Public Administration
 
Postmodern Public Administration Theory
Postmodern Public Administration TheoryPostmodern Public Administration Theory
Postmodern Public Administration Theory
 
Hoe schrijf je een brief?
Hoe schrijf je een brief?Hoe schrijf je een brief?
Hoe schrijf je een brief?
 

Ähnlich wie 2011 training presentation

Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒Cheer Chain Enterprise Co., Ltd.
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
How Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software VulnerabilitiesHow Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software VulnerabilitiesBunmi Sowande
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesSejahtera Affif
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business NetworkAnindita Ghatak
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Lancope, Inc.
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docxHabeebUllah10
 
Unmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe SurfingUnmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe SurfingSoftwareDeals
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Virus removal-services
Virus removal-servicesVirus removal-services
Virus removal-servicesAskPCTechies
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 

Ähnlich wie 2011 training presentation (20)

Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
How Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software VulnerabilitiesHow Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software Vulnerabilities
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
 
Unmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe SurfingUnmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe Surfing
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
NetWitness
NetWitnessNetWitness
NetWitness
 
Virus removal-services
Virus removal-servicesVirus removal-services
Virus removal-services
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 

Kürzlich hochgeladen

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Kürzlich hochgeladen (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

2011 training presentation

  • 1. IntroducingKaspersky Anti-Virus 2011 & Kaspersky Internet Security 2011
  • 2. The Threat Growing is Changing and
  • 3. The Growing Malware Threat 3 4,250,000 4,000,000 3,750,000 New threats per day 30,000+ 3,500,000 3,250,000 3,000,000 New signatures per day 3,500+ 2,750,000 2,500,000 2,250,000 Total signatures as of July 2010 4,400,000 2,000,000 1,750,000 1,500,000 Spam messages per day 30,000,000+ 1,250,000 1,000,000 750,000 500,000 250,000 0 2010 1998 2000 2002 2004 2006 2008 2009 1999 2001 2003 2005 2007
  • 4. New Phishing Attacks are Most Dangerous in The Earliest Hours 4 Cost $ Victims 1 72 20 Time in Hours
  • 5. This is Big Business, Well-funded, Very Clever Cybercriminals are very motivated to be as creative and tricky as possible because there’s lots of money to be made In some cases you can even call a customer service line if your hacker software isn’t working They have the resources and the motivation to do things on a grand scale with maximum impact in the shortest amount of time 5 $ $ $
  • 6. The Kaspersky Difference Premium Multi-Layer Protection Real-Time protection against viruses, spyware, Trojans, worms, rootkits, botnets and more Superior Identity Theft Defense with Virtual Keyboard to protect your most sensitive data Small Hourly Signature Updates Maximum PC Performance Small footprint with 1% CPU usage iChecker/iSwift provide intelligent scanning for maximum performance Gamer Mode blocks pop-ups and reduces use of pc’s resources in one-click Ease of Use Desktop Security Gadget Intuitive Interface
  • 7. What’s NEW!Kaspersky Anti-Virus 2011 & Kaspersky Internet Security 2011
  • 8. 8 Real-time Protection New: If your PC is so severely infected that no software can be installed on it, you can download the AVP tool to scan and eliminate all threats without calling Support Includes Rescue Disk for efficiently detecting and eliminating computer infections if your system is maliciously attacked Installs on Infected PCs
  • 9. 9 Ease of Use New: Quick desktop access to your security status and settings Customizable buttons for convenient access to frequently used security features Easy drag-and-drop functionality for instant virus scanning Desktop Security Gadget
  • 10. 10 Premium Protection New: Cutting-edge technology for proactive defense against emerging threats Monitors and analyzes system activity to detect any dangerous behavior Malicious actions can be rolled-back, preventing permanent damage System Watcher Monitor Log Reverse
  • 11. v 11 ID Protection New: Proactively detects phishing resources, in addition to using the database of phishing web sites Protects your digital identity and blocks access to phishing web sites Virtual Keyboard keeps your passwords secure when shopping, banking or social networking online Proactive Phishing Protection
  • 13. 13 Emerging Threat Protection New: Completely walled-off environment for running unknown or suspicious programs “Test drive” programs with total confidence that no harm will come to your system Includes Safe Run for Web sites for an added layer of protection when accessing web sites that handle confidential information like online banking Safe Desktop
  • 14. 14 Family Protection New: Monitor, limit or block your kids’ online activities: Applications or games Communications via Email, IM or social networks File downloads Transfer of personal information like addresses, phone numbers or credit cards Web content Time spent online Advanced Parental Controls
  • 15. 15 Real-time Protection New: Delivers unparalleled online security, protecting you from dangerous web sites Assesses an IP address, and assigns it a status: Trusted, Suspicious or Banned Status is determined by analyzing data related to the IP address: Rate of visit/hits Does it contain malicious code? Does it link to suspicious web sites? Safe Surf
  • 16. Blocks web sites by their country code domain Allows users the ability to specify where they want to receive content from or where they don’t want to receive it from Protects against legitimate web sites that “re-direct” to foreign malware servers 16 Real-time Protection New: Geo Filter
  • 17. What’s New from Kaspersky 2011 Desktop Security Gadget - Instant access to security status and features System Watcher – Monitors and analyzes system activity to detect any dangerous behavior Proactive Phishing Protection - Protects your digital identity and blocks access to phishing web sites Installation on Infected PCs - Directly download the AVP tool to scan and eliminate all threats Also New with Kaspersky Internet Security 2011: Safe Desktop with Safe Run for Web sites– Completely walled-off environment for running suspicious programs and Safe Run mode for additional protection for your financial information Advanced Parental Controls – Monitor, limit or block your kids’ online activities Safe Surf– Protects you from dangerous or offensive web sites Geo Filter – Blocks web sites by their country code domain
  • 18.
  • 23.

Hinweis der Redaktion

  1. Premise
  2. This year Kaspersky has taken the “sandbox” concept one step further with our new “Safe Desktop”. It literally replicates your actual desktop in a sandbox environment, let’s you launch any file or application in Safe Mode (so no newly introduced malware can invade your system while you are in Safe Mode) – even gives you the ability to switch back and forth between your Main Desktop and your Safe Desktop.