Date post: | 15-Jan-2015 |
Category: |
Technology |
Upload: | patricia-celis |
View: | 2,185 times |
Download: | 0 times |
Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 2
New World. New Threats.
Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 3
Threat Landscape - Past
Viruses
Email worms
Exploit worms
Rootkits
Backdoor Trojans
Sources of Attack
RemovableMedia
Instant MessagingClients
Types of Threats Proliferation Mediums
Email AttachmentsScript Kiddies
Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 4
Internet Threat Landscape - Present
SLIDE 4
Viruses
Email worms
Exploit worms
P2P worms
IM worms
Rootkits
Backdoor Trojans
Spyware
Adware
Greyware
Sources of Attack
Legitimate, Compromised Multi-media Websites
RemovableMedia
MobileDevices
Public WiFi Networks
Instant MessagingClients
Hackers
Web 2.0 Applications
Types of Threats Proliferation Mediums
SPAM Email Attachments
Legitimate Businesses
P2P NetworksPhishingOrganized Crime
Foreign Governments
Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 5
Industry News
Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 6
Magnitude of the Problem
• “Even the best signature databases… have less than a 50% chance of catching completely new threats. Signatures are extremely ineffective against targeted and “zero day” threats.” According to Gartner
• “Nobody can win the war against malware with a signature-driven product, but more proactive technologies are required.” According to AV-Test’s Andreas Marx
Source: AV-Test Labs (www.av-test.org)
Around 1.5M unique malware samples are discovered every month!
Source: av-test.org –Sample Collection Growth
SLIDE 7
There is a need for organizations to implement a security solution that:– adapts to the changing threat landscape; and – constantly innovates and defends against new
and unknown (Zero-Day) threats.
The Challenge
Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 8
Bitdefender at a Glance
The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations simultaneously
from the most important three key independent organizations in the US, UK, and Germany!
Moreover our technology is used by top security vendors: F-Secure, GData, Qihoo, Bullguard or IBM;
The only security technology to have won all 14 VB Antispam awards in a row;
Bitdefender protects more than 400 million people worldwide (including technology partnerships);
Five local offices;
250+ engineers in R&D team;
Products localized in more than 20 languages.
Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 9
Technology LeadershipIt is Bitdefender’s ability to adapt to the changing threat landscape, to constantly innovate, and to raise the bar in proactive anti-malware technology that has made it a security technology leader.
Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 10
If It’s Security You’re Looking For: We Let the Experts Speak For Us
Bitdefender won the AV-TEST AWARD for Best Security Product of 2011, January 2012
SLIDE 11Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 11
Leading technology and business products, acknowledged by independent experts
Security for Mail Servers – March 2013 “The product has never failed to achieve a VBSpam award and has regularly ranked among the better performers in the test.”
Approved Corporate Product(Client Security, Security for File Servers, Security for Exchange)“The entire suite impresses due to its simple installation routine and very convenient user interface.”
SC Magazine – 5 Stars(Bitdefender Client Security)“A strong AV solution with nice management of the registry and WMI scripting for better endpoint management.”
CRN Product of the year, 2011(Business Solutions 3.5)“Bitdefender has delivered the tools that VARs can deploy to drive efficiency and security management to smaller enterprises, and it’s done in a way that eliminates cost and complexity.”
VB 100 (Client Security, Security for File Servers, Security for Samba)“Detection rates were extremely high, with very little missed anywhere, including a superb showing in theReactive and Proactive sets.”
SLIDE 12 http://av-comparatives.org/images/docs/avc_sum_201212_en.pdf
Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 13
We Let Test Results Speak For Our Performance
Reviewer First Place Second Place Followers
AV Test
Bitdefender Kaspersky, Panda, Symantec ESET, McAfee
Consumer Reports (US)
Bitdefender ESET Avira Symantec
Which (UK)
Bitdefender Symantec Bulguard, AVG
Stiftungwarentest (DE)
Bitdefender Avira ESET, G-Data
SLIDE 14
VBSpam Comparative Anti-spam Test- May 2009 • VB 100 Award, Virus Bulletin, UK- April 2009 • Best Buy and Editor’s Choice, Personal Computer World, UK- January 2009 • Advanced Plus, AV-Comparatives.org- October 2008 • “Buy It!”, Computer Active, UK- October 2008 • Recommended, IT Reviews, UK- October 2008 • Best Value, WinmagPro, Netherlands- October 2008 • Gold Award, PC Guia, Portugal- October 2008 • Editor’s Choice, PC Utilities, UK- September 2008 • Number One, Consumer Reports, USA- August 2008 • VB 100 Award, Virus Bulletin, UK- February 2008 • VB 100 Award, Virus Bulletin, UK- June 2008 • Test Winner, PC Games, Germany- February 2008 • Test Winner and Best Buy, Online PC, Switzerland- January 2008 • VB 100 Award, Virus Bulletin, UK- December 2007 • Budget-Tipp Distinction, Windows Vista, Germany- December 2007 • Gold Medal, PC Guia, Portugal- December 2007 • Price Tip and Test Winner, com!, Germany- December 2007 • Editor’s Choice, WHAT LAPTOP, UK- December 2007 • Editor’s Choice, Windows News, France- November 2007 • Recommendation, PC Today, Spain- December 2007 • Recommendation, IT Reviews, UK- November 2007 • Ubuntu’s Linux Compliance- October 2007 • Novell’s Linux Compliance- October 2007 • Red Hat Ready Linux Compliance- September 2007 • Gold Rating, PC Advisor, UK- September 2007 • Advanced Plus, av-comparatives.org, Austria- August 2007 • VB 100 Award, Virus Bulletin, UK- June 2007 • Premium Checkpoint Award, West Coast Labs, UK- November 2006
Industry awards and certifications
SLIDE 15
Govt & Education BPO & Transportation
Partial List of BitDefender Clients
SLIDE 16
Food & Beverage
General Services Engineering/Manufacturing
Partial List of BitDefender Clients
SLIDE 17
Office of Mar Roxas
Other industries
August 16 | Copyright @ Bitdefender 2012
Bitdefender Security Solutions
Mihai Cristian POPESCUConsumer and SMB Regional Presales Engineer
SLIDE 19
SLIDE 20Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 20
AVC Process Monitoring
Auto Block
AVC monitors running processes
• For each process, AVC keeps a score
• Each action taken by the process affects the score
1
126 pts
189 pts 686 pts
297 pts
2AVC detects
Malwareapp.exe as a possibly malicious
application
• Malwareapp.exe score reached the threshold
149 pts
274 pts 806 pts
321 pts
3AVC can be configured to take
the following actions
• Blocks process automatically
• Request User Action
• Send Alert to Management Console
User Action
Admin Alert
SLIDE 21Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 21
Active Virus Control – Unique Features
• High Detection Rate of New and Unknown Viruses– 63.5% of malware samples not detected by Bitdefender
scanning engine or by B-HAVE were detected by AVC
• Overcomes New Detection Avoidance Techniques
– Malware avoids heuristic detection by delaying malicious actions
– Applications already trusted can be modified in-memory, while running
– Used to launch a malware process with its own credentials
• Monitors Processes Continually, Not Just At Startup– Dropping, copying, moving or registering files in Windows System directory– Not waiting for or requesting user interaction; lack of UI– Executing code in memory space for privilege escalation– Replicating, auto-start entries or unrelated icon type– Attempting to hide from process enumeration applications
SLIDE 22Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 22
Security for Small and Medium Businesses
Network Gateways
Remote &Roaming Users
Onsite Users File Servers
Email Servers Collaboration Servers
CENTRALIZED MANAGEMENT
GATEWAY SERVICES ENDPOINT PROTECTION CRITICAL SERVERS
SLIDE 23Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 23
Business Users Are Under AttackEmail Attachments
Phishing
SPAM
Worms and Network Attacks
Spyware
System Vulnerabilities
Trojans&
Rootkits
Viruses
RemovableMedia &
Network Shares
Instant Messaging
SLIDE 24
BitDefender Centralized Management
• Configurable Security Policies– Pre-defined templates to aid policy enforcement– Network detection of unprotected endpoints with automatic
client distribution and installation– Maintains remote and roaming user compliance
• Integrates with Active Directory– Leverages the organizations existing Windows domain
structure and group policies
• Dashboard Interface – Displays deployment and threat information status with on-
demand problem resolution
• Scalable Master-Slave Architecture– Management of gateway, server and endpoint solutions
located in different physical locations
SLIDE 25
GATEWAY SERVICES
ENDPOINT PROTECTION
CRITICAL SERVERS
Managed Platforms
Management Features
Management Console Overview
SLIDE 26
CentralizedManagement
Proactive Protection
Client Protection and Management
SLIDE 27Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 27
Centralized Reports and Statistics
1. Set of Predefined Reports– Infections, disinfections, quarantined files
2. Virus Scanning Statistics– Daily, Weekly and Monthly– User specified time period
3. Wizard Based Reports– On-screen drill down for malware reports– About 30 predefined reports
4. Export Reports– Reports available in HTML and PDF formats
5. License Reporting and Management– License usage, inactive clients and deployed
license thresholds
SLIDE 28Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 28
Automated Network Auditing and Reporting
1. Increased Visibility and Productivity through Auditing
• Automates network audits for software / hardware inventory• Reports include Endpoint / Server hardware and software
configuration, user account and disk / file information• Tracks history of installed / uninstalled software for change reporting• Identifies HW/SW that is out of spec / non-compliant to security policies• Helps to maintain compliance with application usage policies
Email ServerGateway
Server
Workstation Clients
FileServer
SLIDE 29Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 29
Bitdefender Client Security
1. Industry Leading Proactive Protection– viruses, spyware, rootkits, spam, phishing and other malware
2. Small Memory Footprint – Optimized server-client communication– Minimal impact on system performance, footprint over 20%
lower with new 3.6 client
3. Prevent security tampering from users• Only limited tasks can be performed by regular users
4. Business Productivity Through Administrative Control– Sets restrictions against unsafe or undesirable Web sites and
user level applications– Blocks e-mail messages based on key words– Limits Internet access for specific periods of time
SLIDE 30
Bitdefender Business Solutions
NEW! Cloud Security for Endpoints by Bitdefender• Protects and controls laptop, desktop and server endpoints
SLIDE 31
Pag. 31
Copyright @ Bitdefender 2012
Internal Use Only - Do Not Distribute
Cloud Security for Endpoints
Enterprise-class security without the management overhead
• Eliminates security hassles and enables efficient centralized security management even for SMBs that lack dedicated IT resources
• Provides the same enterprise-class protection as on-premise solutions but eliminates the overhead and costs of onsite servers and maintenance
SLIDE 32
Pag. 32
Copyright @ Bitdefender 2012
Internal Use Only - Do Not Distribute
Local scanning and Cloud-based console
• Addresses SMB needs for robust but cost-effective antivirus and antimalware protection, using local scanning and a hosted centralized management console
• Manages any number of Windows-based laptop, desktop and server endpoints, no matter where they are located
• The solution design and deployment models make it an ideal fit for Managed Security Providers (MSPs) and ISPs
Main solution features
SLIDE 33
Pag. 33
Copyright @ Bitdefender 2012
Internal Use Only - Do Not Distribute
Key benefits
Mitigates risks and improves security posture
• Save time and money for companies with limited or no dedicated IT by centrally managing security, with automated updates and no onsite hardware and software to maintain
• Increase employee productivity and ensure and eliminate any need for their intervention to maintain security
• Increased security through real time control over all systems no matter where they are and through #1 ranked protection technologies
SLIDE 34
SLIDE 35
**Availability to be announced soon
SLIDE 36Copyright@Bitdefender 2011 / www.Bitdefender.com 11/5/2013 • 36
1. Anti-Theft - provides options to remotely locate, lock, wipe or send a message to the Android device.
2. Web Alert - alert users, when browsing, about webpages that contain malware, phishing or fraudulent content.
3. On-Install Scanning4. On-Demand Scanning5. Application Audit
SLIDE 38
END OF PRESENTATION