1 / 24

Business Solutions Overview Commercial Presentation

Business Solutions Overview Commercial Presentation. BitDefender at a Glance . Founded in 2001 A Leader in Proactive Anti-Malware Solutions Technology Used by OEM Partners and Tens of Millions of Customers Worldwide. Distribution in over 100 countries Nine International S ales O ffices

caspar
Download Presentation

Business Solutions Overview Commercial Presentation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Business Solutions OverviewCommercial Presentation

  2. BitDefender at a Glance • Founded in 2001 • A Leader in Proactive Anti-Malware Solutions • Technology Used by OEM Partners and Tens of Millions of Customers Worldwide • Distribution in over 100 countries • Nine International Sales Offices • Product Available in 18 Languages

  3. “The quantity of malware found is growing rapidly (graph has a logarithmic scale)” According to AV-Test’s Andreas Marx “Since 2004 the level of growth has gone through the roof” “Even the best signature databases… have less than a 50% chance of catching completely new threats. Signatures are extremely ineffective against targeted and “zero day” threats.” According to Gartner - December, 2007 “Nobody can win the war against malware with a signature-driven product, but more proactive technologies are required ” According to AV-Test’s Andreas Marx Magnitude of the Problem In 2008 more than half a million malware samples were discovered every month! Source: av-test.org –Sample Collection Growth Source: AV-Test Labs (www.av-test.org)

  4. Threat Landscape - Past Proliferation Mediums Sources of Attack Types of Threats Removable Media Viruses Email worms Exploit worms Rootkits Backdoor Trojans Email Attachments Script Kiddies Instant Messaging Clients

  5. Internet Threat Landscape - Present Proliferation Mediums Sources of Attack Types of Threats Instant Messaging Clients Viruses Email worms Exploit worms P2P worms IM worms Rootkits Backdoor Trojans Spyware Adware Greyware Hackers Legitimate, Compromised Multi-media Websites Web 2.0 Applications Removable Media P2P Networks Organized Crime Phishing SPAM Email Attachments Public WiFi Networks Mobile Devices Legitimate Businesses Foreign Governments

  6. The Challenges of Proactive Protection The Promise: • Real-time proactive protection from malware threats, without the need for frequent signature updates. "Even the best signature databases have less than a 50% chance of catching completely new threats. Signatures are extremely ineffective against targeted and zero-day threats."According to Gartner - December, 2007 • The Historical Reality: • False Positives • Traditional content-based heuristics susceptible • Security vs. Performance • Emulation can slow down the PC • Users do not want to sacrifice performance • Portability • The same engine cannot usually be run on all platforms and OS

  7. Award Winning Detection Engine is Key BitDefender provides a common detection and disinfection engine across all business products Engines are further customized for specific platformsor application; i.e. URL and Content Inspection On average, BitDefender detects and shields against 120,000 new e-threats per month More than 4,000 new signatures are added to the BitDefender antivirus database every day BitDefender customers get around-the-clock protection with more than 16 updates per day BitDefender’s success in detection has led to it’s adoption by other leading Antivirus vendors

  8. How The Scanning Process Works… • Signature-based pattern matching on known virus code • Half a million new and variant strains emerging every month, signature engines have trouble keeping pace • Heuristics detect behaviors beyond the known actions of legitimate applications • Able to detect and block “Zero Day” threats without referencing a signature or fingerprint that has yet to be released 0010 B8 00 00 00 00 00 00 00 40 00 00 0020 00 00 00 00 00 00 00 00 00 00 00 0030 00 00 00 00 00 00 00 D0 00 00 4C 0040 OE IF EA OE 09 CD 21 B8 01 4C CD 0010 B8 00 00 00 00 00 00 00 40 00 00 0020 00 00 00 00 00 00 00 00 00 00 00 0030 00 00 00 00 00 00 00 D0 00 00 4C 0040 OE IF EA OE 09 CD 21 B8 01 4C CD Increased Detection

  9. Highly Accurate Antispam Technology Heuristic NeuNet filtering technology for SPAM • Cloud-based RBL reputation list for improved detection Advanced image spam filter analyzing text within images and learns the common characteristics BitDefender analyzes and issues protection for 5 million spam messages every day • Or about 35 million spam mails per week • BitDefender continuously ranked top in Virus Bulletin’s (VB) tests for SPAM - sixth VBSpam award in a row Source: Virus Bulletin – BitDefender Security for Mail Servers 3.0.2 (March 2010)

  10. Flexible Solutions for Consumers and SOHO Home User Laptops & Netbooks Home User Desktops

  11. Security for Small and Medium Businesses Most Antivirus Solutions are Complex and Over Engineered • Small to Medium Businesses have less complex network requirements • Customers paying for features they don’t use / need • Non-dedicated IT resources lack domain experience Single Solution Vendor Provides Resource and Cost Benefits • Secure Windows centric or heterogeneous networking environments • Streamlines procurement, deployment, management and support Defense in Depth to Protect Against Diverse Attack Vectors • Messaging systems, desktops, and critical File Servers all provide an entry point for malware to infect the network Defense in Depth ENDPOINT PROTECTION CRITICAL SERVERS GATEWAY SERVICES

  12. Business Solutions Overview CENTRALIZED MANAGEMENT ENDPOINT PROTECTION CRITICAL SERVERS GATEWAY SERVICES Network Gateways Onsite Users File Servers Collaboration Servers Email Servers Remote & Roaming Users

  13. Business Users Are Under Attack Email Attachments Trojans & Rootkits System Vulnerabilities Phishing Instant Messaging Removable Media & Network Shares Worms and Network Attacks Viruses SPAM Spyware

  14. BitDefender Centralized Management Scalable Master-Slave Architecture • Management of gateway, server and endpoint solutions located in different physical locations Network Visibility and Remote Administration • Displays system deployment and related threat information • On-demand problem resolution Configurable Security Policies • Pre-defined templates to aid policy enforcement • Network detection of unprotected endpoints with automatic client distribution and installation • Maintains remote and roaming user compliance even when endpoints are offline Integrates with Active Directory • Leverages the organizations existing Windows domain structure and group policies

  15. Management Console Overview Managed Platforms Management Features GATEWAY SERVICES ENDPOINT PROTECTION CRITICAL SERVERS

  16. Server and Endpoint Management Integrated Network Management Capabilities • Microsoft’s version of Web-Based Enterprise Management (WBEM) Scripting Language for Endpoint and Servers Over 30 Predefined WMI Script Templates Included • Hundreds of Publically Available Scripts for Mass, Automated Remote Management; • Kill applications and processes • Install and uninstall software (including other AV solutions) • Restart or shutdown workstations • Enable/disable autoruns and USB removable media access Customizable Client / Server Installation Packages • Select installation features and disable unwanted functionality • Scan system prior to Installation

  17. Reports and Statistics Set of Predefined Reports • Infections, disinfections and quarantined files Virus Scanning Statistics • Daily, Weekly and Monthly • User specified time period Wizard Based Reports • Shortlist for the last 20 reports defined Export Reports • Reports available in text or HTML formats License Reporting and Management • License usage, inactive clients and deployed license thresholds

  18. Master / Slave Management Architecture Slave Server Master Mgmt. Server Remote Office A Headquarters Internet Slave Server Slave Server Regional Office Remote Office B • Centralized Policy, Product and Update Synchronization • Parallel Deployment Maintains Reliability and Faster Response

  19. BitDefender Client Security Industry Leading Proactive Protection • viruses, spyware, rootkits, spam, phishing and other malware Small Memory Footprint • Optimized server-client communication • Minimal impact on system performance Client Profiles • Power clients with unrestricted interface access • Restricted clients with limited interface access Business Productivity Through Administrative Control • Sets restrictions against unsafe or undesirable Web sites and user level applications • Blocks e-mail messages based on key words • Limits Internet access for specific periods of time

  20. Client Protection and Management Proactive Protection Centralized Management

  21. The Experts Agree Number one rated Internet Security software. Consumer Reports – September 2008 Number one rated antivirus software. Consumer Reports – September 2006 Rated the most effective antivirus solution and one of the top 100 products of the year. PC World - March 2006 and May 2006 Ratedone of the top 100 privately held European companies. Red Herring - May 2006 Nominated for Best Software award. Gartner RetailVision – September 2006

  22. Industry Awards and Certifications VBSpam Comparative Anti-spam Test- May 2009 • VB 100 Award, Virus Bulletin, UK- April 2009 • Best Buy and Editor’s Choice, Personal Computer World, UK- January 2009 • Advanced Plus, AV-Comparatives.org- October 2008 • “Buy It!”, Computer Active, UK- October 2008 • Recommended, IT Reviews, UK- October 2008 • Best Value, WinmagPro, Netherlands- October 2008 • Gold Award, PC Guia, Portugal- October 2008 • Editor’s Choice, PC Utilities, UK- September 2008 • Number One, Consumer Reports, USA- August 2008 • VB 100 Award, Virus Bulletin, UK- February 2008 • VB 100 Award, Virus Bulletin, UK- June 2008 • Test Winner, PC Games, Germany- February 2008 • Test Winner and Best Buy, Online PC, Switzerland- January 2008 • VB 100 Award, Virus Bulletin, UK- December 2007 • Budget-Tipp Distinction, Windows Vista, Germany- December 2007 • Gold Medal, PC Guia, Portugal- December 2007 • Price Tip and Test Winner, com!, Germany- December 2007 • Editor’s Choice, WHAT LAPTOP, UK- December 2007 • Editor’s Choice, Windows News, France- November 2007 • Recommendation, PC Today, Spain- December 2007 • Recommendation, IT Reviews, UK- November 2007 • Ubuntu’s Linux Compliance- October 2007 • Novell’s Linux Compliance- October 2007 • Red Hat Ready Linux Compliance- September 2007 • Gold Rating, PC Advisor, UK- September 2007 • Advanced Plus, av-comparatives.org, Austria- August 2007 • VB 100 Award, Virus Bulletin, UK- June 2007 • Premium Checkpoint Award, West Coast Labs, UK- November 2006

  23. Summary • BitDefender’s Business Solutions Leverage Award-Winning Consumer Detection Technology • End-to-End Malware Protection For SMB Networks • Windows centric platform strategy • Multi-platform solutions for heterogeneous environments • Gateway, server & endpoint configuration, auditing and management • Manage clients in remote subnets from a single central server • Centralized license management • Remote install / uninstall of endpoint software • Centralized reporting, alerting and updates • Cost and Resource Effective Solutions • Simplifies the complexity of managing Business AV solutions • Hourly updates help maintain network integrity Proactive solutions to emerging threats. Protection at the speed of life.

  24. Thank You! sales@bitdefender.co.nz BitDefender Business Security www.bitdefender.co.nz

More Related