SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Life 2.0:New World.
New Threats.


Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 2
Threat Motivation has Evolved




                                 Teens and Geeks                       Cyber-criminals
   WHO?                          –     Attention-Driven                –   Profit-Driven
                                 –     Loner Profile                   –   Highly Organized



                                 High Profile Attacks                  Stealth Attacks
                                 –     Social Engineering              –   Spyware/Adware
    HOW?                         –     Mass Mailers                    –   Automated Variant Creation and
                                                                           Morphing
                                                                       –   Persistent Threats
                                 Lost productivity                     Cyber-crime
                                 –                                     –
  WHAT?                                Clogged E-mail Systems and
                                       Networks                        –
                                                                           Identity Theft and Online Fraud
                                                                           Highly Targeted Corporate
                                 –     Help Desk and Data Loss Costs       Information Attacks




Copyright@bitdefender 2011 / www.bitdefender.com                                                             1/12/2012 • 3
Magnitude of the Problem/Opportunity



                                                                                                                   Around 1.5M
                                                                                                                   unique
                                                                                                                   malware
                                                                                                                   samples are
                                                                                                                   discovered
                                                                                                                   every month!


                                                                       Source: AV-Test Labs (www.av-test.org)



                                                                   Source: av-test.org –Sample Collection Growth

     •     “Even the best signature databases… have less than a 50% chance of catching
           completely new threats. Signatures are extremely ineffective against targeted and “zero
           day” threats.”
                                 According to Gartner

     •     “Nobody can win the war against malware with a signature-driven product, but more
           proactive technologies are required ”
                                 According to AV-Test’s Andreas Marx


Copyright@bitdefender 2011 / www.bitdefender.com                                                                                  1/12/2012 • 4
Magnitude of the Problem/Opportunity




Stuxnet wave/ World’s 1st cyber weapon


         Launched in 2010, targeting a nuclear power plant and an uranium
          enrichment facility
         A few million dollars invested in the design and development of the worm
         Cross discipline knowledge/skills used (beyond “traditional” software, social
          engineering and NLP), new stage for sophistication
         Take command (through cyberworld) of an industrial control system (physical
          world)
         The bar has been lowered for destructive attacks on other control
          systems, whether at critical infrastructure or industrial factory
         First copycats will be seen in H2, 2011

Copyright@bitdefender 2011 / www.bitdefender.com                                  1/12/2012 • 5
Market Landscape
and Trends


Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 6
Market Landscape and Trends




8 Billion $ in
2012
IDC expects the Security Software Market market to grow at a compound
annual growth rate of 8.3%, reaching a total revenue of over 8 billion$ in 2012
and nearly $10 billion by 2014!


Copyright@bitdefender 2011 / www.bitdefender.com                                  1/12/2012 • 7
Market Landscape and Trends




Security Market – the place to be
      Endpoint security has become more prominent over the past few years, despite
       economical downturn. IDC forecasts that the Consumer segment will grow by 10%
       to reach 4.4B $, while Enterprise segment will reach 5.2B $ in 2013.
      The key to success in the security market will be product differentiation through
       improved performance and features.

                    Worldwide Corporate and Consumer Endpoint Security Revenue ($ billions)
     12000.0


     10000.0                                                                             9.6
                                                                                 8.5
                                                                          7.7
      8000.0
                                                          6.6
                                                   6.4              7.1                          Consumer
      6000.0
                                      5.6                                                        Enterprise
                       4.9
      4000.0                                                                                     Total


      2000.0


          0.0
                    2006           2007            2008   2009   2010     2011    2012    2013

Copyright@bitdefender 2011 / www.bitdefender.com                                                          1/12/2012 • 8
Security Software Market Overview

New Market Trends                                                      Freeware

•    Virtualization                                                    •   Free products have 20% of consumer user
•    The move to the cloud                                                 base
•    New consumer technologies and computing                           •    Freeware is used for gradual monetization
     models creates new market opportunities                           •   IDC believes Free will become part of
•    Emerging regions: Eastern Europe, Latin                               Managed Security Service
     America, Asia/Pacific will grow at 12% per y




Competitors
                                                   Security Software Market
                                                     8 billion $ in 2012                     Bitdefender
•    Top players:                                                                             The new product
     Symantec, McAfee, Trend                                                                   The new brand
     Micro
•    Market Challengers:
     Kaspersky, AVG, BitDefen
     der




Copyright@bitdefender 2011 / www.bitdefender.com                                                            1/12/2012 • 9
Bitdefender at a glance



Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 10
BitDefender at a Glance

  The #1 Anti-Malware Security Technology in the world
           First security software vendor to receive top recommendations simultaneously from
            the most important three key independent organizations in the US, UK, and
            Germany!
           Moreover our technology is used by top security vendors: F-
            Secure, GData, Qihoo, Bullguard or IBM;

  The only security technology to have won all 14 VB Antispam awards in
   a row;
  BitDefender protects more than 400 million people worldwide (including
   technology partnerships);
  Five local offices;
  250+ engineers in R&D team;
  Products localized in more than 20 languages.


Copyright@bitdefender 2011 / www.bitdefender.com                                       1/12/2012 • 11
A Decade of Innovation

                •     First antivirus worldwide to offer intelligent updating
  2000
                •     First antivirus product to include an application firewall
     -          •     MIDAS (Malware Intrusion Detection Advanced System)- wins IST prize, “is set to revolutionize

     -                antivirus design”

                •     BitDefender to release the first ever commercial antivirus for the Linux Samba 3 servers.
     -
                •     BitDefender to release its proprietary Antispam technology.
     -
                •     BitDefender to release the hourly update system
  2005
                •     BitDefender introduces B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments)
     -          •     Spam Image Filter an important step in the combating of the new spamming techniques.

     -          •     BitDefender® Mobile Security to provide real-time protection for smartphones and PDAs.

     -          •     BitDefender® Active Virus Control to innovate with an proactive technology capable of detecting and

                      blocking new viruses in real time, on a live system.
     -
                •     60-Second QuickScan – The quickest way to find if your computer is infected!
  2011
                •     BitDefender to release safego - an application which protects Facebook users from spam, phishing

                      attacks, and profile privacy threats.
Copyright@bitdefender 2011 / www.bitdefender.com                                                                  1/12/2012 • 12
Strategy



Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 13
Understanding Consumer Security Trends




            Specialized attacks carried out by cyber   New products must rely on both cloud
            criminals are increasing in numbers and    and on premise technologies to block
            variety.                                   attacks proactively.

            New platforms: Mac, smartphones,           Cloud technologies and server side
            Tablets, Smart TVs bring new               services will be the basis for cross-
            vulnerabilities.                           platform protection.
            People don't have time &/ knowledge to     Consumer products should do 99% of
            decide on security issues.                 the job themselves, with no user
                                                       intervention. Simplicity is the key.
            Cybercrime such as identity theft and      Use of proactive technologies to prevent
            targeted spam/scam use public              information leaks and NLP (natural
            information from social networks to        language processing) techniques.
            support social engineering and
            manipulate users.



Copyright@bitdefender 2011 / www.bitdefender.com                                                  1/12/2012 • 14
Business Solutions Strategy

      Worldwide Endpoint Security Revenue by Platform:
      1.      Software grows steadily being 90% of total revenues in 2014
      2.      SaaS is already the 2nd largest platform and it doubles share from 3% in 2008 to
              7% in 2014, equal to $650M
      3.      Virtualized Platforms will increase the fastest (100% CAGR)
      4.      Hardware platform remains insignificant at nearly zero (0.2%)


        Worldwide Endpoint Security Revenue by Platform, 2008 – 2014 ($M)
                                2008               2009     2010     2011     2012     2013     2014     2009–2014
                                                                                                           CAGR (%)
   Software                      6196.8            6383.1   6842.6   7284.1   7800.6   8330.1   8874.0          6.8
   Hardware                         6.4               7.3      9.2     12.1     15.4     20.0     25.6         28.7
   Virtualized                      3.2               9.5     21.3     36.6     91.5    172.8    305.4        100.2
   SaaS                           178.8             197.9    241.9    301.6    411.8    570.1    647.3         26.7
   Total                         6385.2            6597.8   7115.1   7634.5   8319.3   9093.0   9852.4            8.3
   Source: IDC, 2010




Copyright@bitdefender 2011 / www.bitdefender.com                                                              1/12/2012 • 15
Business Solutions Strategy


          1. Leverage best of breed technology in Blue Oceans
                   Virtualization Security
                               VMware – tight partnership
                               Citrix/Microsoft/Oracle

          2. Leverage Virtualization Security in Cloud Computing
                   SaaS

          3. Disrupt mainstream endpoint/server security
                   “God-Mode” research project

          4. Temporary Virtual Patching/Vulnerability Discovery
                   Find the risk -> mitigate




Copyright@bitdefender 2011 / www.bitdefender.com                   1/12/2012 • 16
Business Solutions Strategy


          1. Deliver solutions as platforms not products
          2. BitDefender Unified Management Platform supports:
                  SaaS Grid
                              Public Cloud
                              Private Cloud
                              Hybrid

                  Virtualization Security
                           Hypervisor introspection
                           Patent pending network scanning engine
                           BitDefender hypervisor project

                  Vulnerability Assessment & Pen-Testing Engines
                           Temporary Virtual Patching (pre-zero-day)

Copyright@bitdefender 2011 / www.bitdefender.com                        1/12/2012 • 17
Building Successful OEM Partnerships

             Leverage on our strong technological leadership in security;
             Opportunity to understand trends and to integrate with complementary technologies
              and products;
             Opportunity to close long-term partnerships with strong players, generating predictable
              revenues streams;
             Average growth rate in excess of 100% over the last two years;
             Broad range of technologies covered:
                      SDKs
                             Anti-malware SDK line-up
                             Anti-spam SDKs for spam detection
                             Anti-phishing SDKs
                             Web security SDKs
                             Updater SDK & Mirroring Script
                      Extensive Platform Support
                             Windows, Mac, Linux, Unix, etc.
                             Intel x86, ARM, MIPS, PowerPC, etc.
                      BitDefender Security software for re-/co-branding
                      StreamDefender
                             technology for multi-Gb/s malware detection
                      QuickScan
                             SDK for fast, clientless, cloud-based infection assessment for end-point security

             Sizeable pipeline of deals across all geographies and in all sectors (telecom, financial,
              network infrastructure, appliance vendors, virtual services providers etc).

Copyright@bitdefender 2011 / www.bitdefender.com                                                                 1/12/2012 • 18
Moving Forward


             The need for IT security is growing
                Increase of Internet penetration;
                Exponential increase of data (personal and business) requiring protection;
                Exponential evolution (number and technologies used) of malware …
                … and professionalization (cybercrime, cyber terrorism) ;
                Consumerization of technology;
                Convergence of devices and services (new devices - same content, different form factors and
                 different technologies, new services – same content, different delivery methods, different
                 usage rationale).

             and Bitdefender has the key enablers to grow in this changing
              environment
                One of the best R&D teams, with proven technologies ahead of the market;
                Deep understanding of the consumer market needs and trends;
                Knowledge sharing through OEM partnerships.


Copyright@bitdefender 2011 / www.bitdefender.com                                                   1/12/2012 • 19
Technology Leadership
It is Bitdefender’s ability to adapt to the changing threat
landscape, constantly innovate, and raise the bar in proactive anti-
malware technology that has made it a security technology leader.




Copyright@bitdefender 2011 / www.bitdefender.com                       1/12/2012 • 20
We are #1!
First security software vendor in recent years to receive top
recommendations simultaneously from the most important three key
independent organizations in the US, UK, and Germany!




Copyright@bitdefender 2011 / www.bitdefender.com                   1/12/2012 • 21
Top Awarded Technology



     Reviewer                                      First Place   Second Place           Followers


                                                                 Kaspersky, F-Secure,   AVG, G-Data, Panda
                                   AV Test BitDefender           Symantec               Webroot



     Consumer Reports (US) BitDefender                           ESET                   Avira Symantec



                            Which (UK) BitDefender               Symantec               Bulguard, AVG



       Stiftungwarentest (DE) BitDefender                        Avira                  ESET, G-Data



Copyright@bitdefender 2011 / www.bitdefender.com                                                        1/12/2012 • 22
Experts endorsements




   Note: In the latest results for Q2 Bitdefender is again #1 among 22 security products!
Copyright@bitdefender 2011 / www.bitdefender.com                                 1/12/2012 • 23
Backup slides


Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 24
The New Brand



Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 25
•      Dacia was a country located in Europe over the territories occupied today
               by Romania, Moldova, Ukraine, Hungary and Serbia.
        •      The “Dacian Draco” was the standard of the ancient Dacian military.
        •      A wolf head combined with a snake body that made a whistling sound when
               galloping due to the air that entered the wolf's mouth.

        We have the sharp mind of the wolf, the slickness of the snake, the vigilance of
           the alpha male and the indestructibility of the snake body!




Copyright@bitdefender 2011 / www.bitdefender.com                                           1/12/2012 • 26
Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 27
Vision




Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 28
Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 29
Brand promise




Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 30
Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 31
Logo




Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 32
Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 33
Brand avatar




Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 34
Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 35
Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 36
Collaterals


Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 37
2012 Box Pack




Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 38
2012 Online Pack




Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 39
Bitdefender Corporate July2011 V3

Weitere ähnliche Inhalte

Was ist angesagt?

Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgePerfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgeSamsung Biz Mobile
 
The secure, direct to-internet branch
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branchZscaler
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingIvanti
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Samsung Biz Mobile
 
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung Biz Mobile
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...Samsung Biz Mobile
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile EnterpriseIBM Danmark
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Securitycentralohioissa
 
Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Marco Dal Pino
 
Cisco Collaboration-Spark Presentation
Cisco Collaboration-Spark PresentationCisco Collaboration-Spark Presentation
Cisco Collaboration-Spark PresentationSimplex
 
The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. Samsung Biz Mobile
 
Remote Workers Webinar (Episode 3)
Remote Workers Webinar (Episode 3)Remote Workers Webinar (Episode 3)
Remote Workers Webinar (Episode 3)Ivanti
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXSamsung Biz Mobile
 
Dizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the waterDizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the waterDizzion, Inc.
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityChief Optimist
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Dell World
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copyZscaler
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloudcentralohioissa
 

Was ist angesagt? (20)

Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgePerfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
 
The secure, direct to-internet branch
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branch
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's Changing
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses
 
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile Enterprise
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)
 
Cisco Collaboration-Spark Presentation
Cisco Collaboration-Spark PresentationCisco Collaboration-Spark Presentation
Cisco Collaboration-Spark Presentation
 
The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business.
 
Remote Workers Webinar (Episode 3)
Remote Workers Webinar (Episode 3)Remote Workers Webinar (Episode 3)
Remote Workers Webinar (Episode 3)
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOX
 
Dizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the waterDizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the water
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copy
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 

Andere mochten auch

CSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET - Juraj Malcho PresentationCSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET - Juraj Malcho PresentationCSO_Presentations
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET
 
Building & Leveraging White Database for Antivirus Testing
Building & Leveraging White Database for Antivirus TestingBuilding & Leveraging White Database for Antivirus Testing
Building & Leveraging White Database for Antivirus Testingfrisksoftware
 
Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司
Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司
Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司Cheer Chain Enterprise Co., Ltd.
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET
 
Agnitum Technology Licensing
Agnitum Technology LicensingAgnitum Technology Licensing
Agnitum Technology LicensingPavel Fyodorov
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET
 
Kaspersky presentation
Kaspersky presentationKaspersky presentation
Kaspersky presentationSam Phal
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectioninfoLock Technologies
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from SymantecArrow ECS UK
 

Andere mochten auch (11)

Dividend Yield Breakthroughs
Dividend Yield BreakthroughsDividend Yield Breakthroughs
Dividend Yield Breakthroughs
 
CSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET - Juraj Malcho PresentationCSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large Businesses
 
Building & Leveraging White Database for Antivirus Testing
Building & Leveraging White Database for Antivirus TestingBuilding & Leveraging White Database for Antivirus Testing
Building & Leveraging White Database for Antivirus Testing
 
Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司
Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司
Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Enterprises
 
Agnitum Technology Licensing
Agnitum Technology LicensingAgnitum Technology Licensing
Agnitum Technology Licensing
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
 
Kaspersky presentation
Kaspersky presentationKaspersky presentation
Kaspersky presentation
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
 

Ähnlich wie Bitdefender Corporate July2011 V3

Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersKaseya
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...Eoin Keary
 
Web security – everything we know is wrong cloud version
Web security – everything we know is wrong   cloud versionWeb security – everything we know is wrong   cloud version
Web security – everything we know is wrong cloud versionEoin Keary
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiMasha Geller
 
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Lietuvos kompiuterininkų sąjunga
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Kaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher PerspectiveKaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher PerspectiveKaseya
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYODstefriche0199
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)AP DealFlow
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareGFI Software
 
Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013Imperva
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Andris Soroka
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesSecunia
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile DeviceTyler Shields
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesKaseya
 
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptxSOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptxTamaOlan1
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityDell EMC World
 

Ähnlich wie Bitdefender Corporate July2011 V3 (20)

Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and Hackers
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
Web security – everything we know is wrong cloud version
Web security – everything we know is wrong   cloud versionWeb security – everything we know is wrong   cloud version
Web security – everything we know is wrong cloud version
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
 
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Kaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher PerspectiveKaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher Perspective
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited Ressources
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile Device
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security Breaches
 
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptxSOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
 
Mobile Megatrends 2008
Mobile Megatrends 2008Mobile Megatrends 2008
Mobile Megatrends 2008
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Venkatraman five webs
Venkatraman five websVenkatraman five webs
Venkatraman five webs
 

Bitdefender Corporate July2011 V3

  • 1.
  • 2. Life 2.0:New World. New Threats. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 2
  • 3. Threat Motivation has Evolved Teens and Geeks Cyber-criminals WHO? – Attention-Driven – Profit-Driven – Loner Profile – Highly Organized High Profile Attacks Stealth Attacks – Social Engineering – Spyware/Adware HOW? – Mass Mailers – Automated Variant Creation and Morphing – Persistent Threats Lost productivity Cyber-crime – – WHAT? Clogged E-mail Systems and Networks – Identity Theft and Online Fraud Highly Targeted Corporate – Help Desk and Data Loss Costs Information Attacks Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 3
  • 4. Magnitude of the Problem/Opportunity Around 1.5M unique malware samples are discovered every month! Source: AV-Test Labs (www.av-test.org) Source: av-test.org –Sample Collection Growth • “Even the best signature databases… have less than a 50% chance of catching completely new threats. Signatures are extremely ineffective against targeted and “zero day” threats.” According to Gartner • “Nobody can win the war against malware with a signature-driven product, but more proactive technologies are required ” According to AV-Test’s Andreas Marx Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 4
  • 5. Magnitude of the Problem/Opportunity Stuxnet wave/ World’s 1st cyber weapon  Launched in 2010, targeting a nuclear power plant and an uranium enrichment facility  A few million dollars invested in the design and development of the worm  Cross discipline knowledge/skills used (beyond “traditional” software, social engineering and NLP), new stage for sophistication  Take command (through cyberworld) of an industrial control system (physical world)  The bar has been lowered for destructive attacks on other control systems, whether at critical infrastructure or industrial factory  First copycats will be seen in H2, 2011 Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 5
  • 6. Market Landscape and Trends Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 6
  • 7. Market Landscape and Trends 8 Billion $ in 2012 IDC expects the Security Software Market market to grow at a compound annual growth rate of 8.3%, reaching a total revenue of over 8 billion$ in 2012 and nearly $10 billion by 2014! Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 7
  • 8. Market Landscape and Trends Security Market – the place to be  Endpoint security has become more prominent over the past few years, despite economical downturn. IDC forecasts that the Consumer segment will grow by 10% to reach 4.4B $, while Enterprise segment will reach 5.2B $ in 2013.  The key to success in the security market will be product differentiation through improved performance and features. Worldwide Corporate and Consumer Endpoint Security Revenue ($ billions) 12000.0 10000.0 9.6 8.5 7.7 8000.0 6.6 6.4 7.1 Consumer 6000.0 5.6 Enterprise 4.9 4000.0 Total 2000.0 0.0 2006 2007 2008 2009 2010 2011 2012 2013 Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 8
  • 9. Security Software Market Overview New Market Trends Freeware • Virtualization • Free products have 20% of consumer user • The move to the cloud base • New consumer technologies and computing • Freeware is used for gradual monetization models creates new market opportunities • IDC believes Free will become part of • Emerging regions: Eastern Europe, Latin Managed Security Service America, Asia/Pacific will grow at 12% per y Competitors Security Software Market 8 billion $ in 2012 Bitdefender • Top players: The new product Symantec, McAfee, Trend The new brand Micro • Market Challengers: Kaspersky, AVG, BitDefen der Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 9
  • 10. Bitdefender at a glance Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 10
  • 11. BitDefender at a Glance  The #1 Anti-Malware Security Technology in the world  First security software vendor to receive top recommendations simultaneously from the most important three key independent organizations in the US, UK, and Germany!  Moreover our technology is used by top security vendors: F- Secure, GData, Qihoo, Bullguard or IBM;  The only security technology to have won all 14 VB Antispam awards in a row;  BitDefender protects more than 400 million people worldwide (including technology partnerships);  Five local offices;  250+ engineers in R&D team;  Products localized in more than 20 languages. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 11
  • 12. A Decade of Innovation • First antivirus worldwide to offer intelligent updating 2000 • First antivirus product to include an application firewall - • MIDAS (Malware Intrusion Detection Advanced System)- wins IST prize, “is set to revolutionize - antivirus design” • BitDefender to release the first ever commercial antivirus for the Linux Samba 3 servers. - • BitDefender to release its proprietary Antispam technology. - • BitDefender to release the hourly update system 2005 • BitDefender introduces B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments) - • Spam Image Filter an important step in the combating of the new spamming techniques. - • BitDefender® Mobile Security to provide real-time protection for smartphones and PDAs. - • BitDefender® Active Virus Control to innovate with an proactive technology capable of detecting and blocking new viruses in real time, on a live system. - • 60-Second QuickScan – The quickest way to find if your computer is infected! 2011 • BitDefender to release safego - an application which protects Facebook users from spam, phishing attacks, and profile privacy threats. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 12
  • 13. Strategy Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 13
  • 14. Understanding Consumer Security Trends Specialized attacks carried out by cyber New products must rely on both cloud criminals are increasing in numbers and and on premise technologies to block variety. attacks proactively. New platforms: Mac, smartphones, Cloud technologies and server side Tablets, Smart TVs bring new services will be the basis for cross- vulnerabilities. platform protection. People don't have time &/ knowledge to Consumer products should do 99% of decide on security issues. the job themselves, with no user intervention. Simplicity is the key. Cybercrime such as identity theft and Use of proactive technologies to prevent targeted spam/scam use public information leaks and NLP (natural information from social networks to language processing) techniques. support social engineering and manipulate users. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 14
  • 15. Business Solutions Strategy Worldwide Endpoint Security Revenue by Platform: 1. Software grows steadily being 90% of total revenues in 2014 2. SaaS is already the 2nd largest platform and it doubles share from 3% in 2008 to 7% in 2014, equal to $650M 3. Virtualized Platforms will increase the fastest (100% CAGR) 4. Hardware platform remains insignificant at nearly zero (0.2%) Worldwide Endpoint Security Revenue by Platform, 2008 – 2014 ($M) 2008 2009 2010 2011 2012 2013 2014 2009–2014 CAGR (%) Software 6196.8 6383.1 6842.6 7284.1 7800.6 8330.1 8874.0 6.8 Hardware 6.4 7.3 9.2 12.1 15.4 20.0 25.6 28.7 Virtualized 3.2 9.5 21.3 36.6 91.5 172.8 305.4 100.2 SaaS 178.8 197.9 241.9 301.6 411.8 570.1 647.3 26.7 Total 6385.2 6597.8 7115.1 7634.5 8319.3 9093.0 9852.4 8.3 Source: IDC, 2010 Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 15
  • 16. Business Solutions Strategy 1. Leverage best of breed technology in Blue Oceans  Virtualization Security  VMware – tight partnership  Citrix/Microsoft/Oracle 2. Leverage Virtualization Security in Cloud Computing  SaaS 3. Disrupt mainstream endpoint/server security  “God-Mode” research project 4. Temporary Virtual Patching/Vulnerability Discovery  Find the risk -> mitigate Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 16
  • 17. Business Solutions Strategy 1. Deliver solutions as platforms not products 2. BitDefender Unified Management Platform supports:  SaaS Grid  Public Cloud  Private Cloud  Hybrid  Virtualization Security  Hypervisor introspection  Patent pending network scanning engine  BitDefender hypervisor project  Vulnerability Assessment & Pen-Testing Engines  Temporary Virtual Patching (pre-zero-day) Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 17
  • 18. Building Successful OEM Partnerships  Leverage on our strong technological leadership in security;  Opportunity to understand trends and to integrate with complementary technologies and products;  Opportunity to close long-term partnerships with strong players, generating predictable revenues streams;  Average growth rate in excess of 100% over the last two years;  Broad range of technologies covered: SDKs Anti-malware SDK line-up Anti-spam SDKs for spam detection Anti-phishing SDKs Web security SDKs Updater SDK & Mirroring Script Extensive Platform Support Windows, Mac, Linux, Unix, etc. Intel x86, ARM, MIPS, PowerPC, etc. BitDefender Security software for re-/co-branding StreamDefender technology for multi-Gb/s malware detection QuickScan SDK for fast, clientless, cloud-based infection assessment for end-point security  Sizeable pipeline of deals across all geographies and in all sectors (telecom, financial, network infrastructure, appliance vendors, virtual services providers etc). Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 18
  • 19. Moving Forward  The need for IT security is growing  Increase of Internet penetration;  Exponential increase of data (personal and business) requiring protection;  Exponential evolution (number and technologies used) of malware …  … and professionalization (cybercrime, cyber terrorism) ;  Consumerization of technology;  Convergence of devices and services (new devices - same content, different form factors and different technologies, new services – same content, different delivery methods, different usage rationale).  and Bitdefender has the key enablers to grow in this changing environment  One of the best R&D teams, with proven technologies ahead of the market;  Deep understanding of the consumer market needs and trends;  Knowledge sharing through OEM partnerships. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 19
  • 20. Technology Leadership It is Bitdefender’s ability to adapt to the changing threat landscape, constantly innovate, and raise the bar in proactive anti- malware technology that has made it a security technology leader. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 20
  • 21. We are #1! First security software vendor in recent years to receive top recommendations simultaneously from the most important three key independent organizations in the US, UK, and Germany! Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 21
  • 22. Top Awarded Technology Reviewer First Place Second Place Followers Kaspersky, F-Secure, AVG, G-Data, Panda AV Test BitDefender Symantec Webroot Consumer Reports (US) BitDefender ESET Avira Symantec Which (UK) BitDefender Symantec Bulguard, AVG Stiftungwarentest (DE) BitDefender Avira ESET, G-Data Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 22
  • 23. Experts endorsements Note: In the latest results for Q2 Bitdefender is again #1 among 22 security products! Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 23
  • 24. Backup slides Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 24
  • 25. The New Brand Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 25
  • 26. Dacia was a country located in Europe over the territories occupied today by Romania, Moldova, Ukraine, Hungary and Serbia. • The “Dacian Draco” was the standard of the ancient Dacian military. • A wolf head combined with a snake body that made a whistling sound when galloping due to the air that entered the wolf's mouth. We have the sharp mind of the wolf, the slickness of the snake, the vigilance of the alpha male and the indestructibility of the snake body! Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 26
  • 27. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 27
  • 28. Vision Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 28
  • 29. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 29
  • 30. Brand promise Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 30
  • 31. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 31
  • 32. Logo Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 32
  • 33. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 33
  • 34. Brand avatar Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 34
  • 35. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 35
  • 36. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 36
  • 37. Collaterals Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 37
  • 38. 2012 Box Pack Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 38
  • 39. 2012 Online Pack Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 39