business solutions overview commercial presentation
DESCRIPTION
Business Solutions Overview Commercial Presentation. BitDefender at a Glance . Founded in 2001 A Leader in Proactive Anti-Malware Solutions Technology Used by OEM Partners and Tens of Millions of Customers Worldwide. Distribution in over 100 countries Nine International S ales O ffices - PowerPoint PPT PresentationTRANSCRIPT
SLIDE 1
BitDefenderMAXIMUM SECURITY. MAXIMUM SPEED.
Business Solutions OverviewCommercial Presentation
SLIDE 2
• Founded in 2001
• A Leader in Proactive Anti-Malware Solutions
• Technology Used by OEM Partners and Tens of Millions of Customers Worldwide
• Distribution in over 100 countries
• Nine International Sales Offices
• Product Available in 18 Languages
BitDefender at a Glance
SLIDE 3
• “The quantity of malware found is growing rapidly (graph has a logarithmic scale)” According to AV-Test’s Andreas Marx “Since 2004 the level of growth has gone through the roof”
• “Even the best signature databases… have less than a 50% chance of catching completely new threats. Signatures are extremely ineffective against targeted and “zero day” threats.”
According to Gartner - December, 2007
• “Nobody can win the war against malware with a signature-driven product, but more proactive technologies are required ”
According to AV-Test’s Andreas Marx
Source: AV-Test Labs (www.av-test.org)
Magnitude of the Problem
1998 2003 20080
4,000,000
8,000,000
12,000,000
16,000,000
20,000,000
In 2008 more than half a million malware samples were discovered every month!
Source: av-test.org –Sample Collection Growth
SLIDE 4
Threat Landscape - Past
Viruses
Email worms
Exploit worms
Rootkits
Backdoor Trojans
Sources of Attack
RemovableMedia
Instant MessagingClients
Types of Threats Proliferation Mediums
Email AttachmentsScript Kiddies
SLIDE 5
Internet Threat Landscape - Present
Viruses
Email worms
Exploit worms
P2P worms
IM worms
Rootkits
Backdoor Trojans
Spyware
Adware
Greyware
Sources of Attack
Legitimate, Compromised Multi-media Websites
RemovableMedia
MobileDevices
Public WiFi Networks
Instant MessagingClients
Hackers
Web 2.0 Applications
Types of Threats Proliferation Mediums
SPAM Email Attachments
Legitimate Businesses
P2P NetworksPhishingOrganized Crime
Foreign Governments
SLIDE 6
The Historical Reality: • False Positives
– Traditional content-based heuristics susceptible
• Security vs. Performance– Emulation can slow down the PC – Users do not want to sacrifice performance
• Portability– The same engine cannot usually be run on all
platforms and OS
The Promise: • Real-time proactive protection from malware threats, without the
need for frequent signature updates.
The Challenges of Proactive Protection
"Even the best signature databases have less than a
50% chance of catching completely new threats. Signatures are extremely
ineffective against targeted and zero-day threats."
According to Gartner - December, 2007
SLIDE 7
Award Winning Detection Engine is Key
• BitDefender provides a common detection and disinfection engine across all business products
• Engines are further customized for specific platformsor application; i.e. URL and Content Inspection
• On average, BitDefender detects and shields against 120,000 new e-threats per month
• More than 4,000 new signatures are added to the BitDefender antivirus database every day
• BitDefender customers get around-the-clock protection with more than 16 updates per day
• BitDefender’s success in detection has led to it’s adoption by other leading Antivirus vendors
SLIDE 8
I n c r e a s e d D e t e c ti o n
How The Scanning Process Works…
0010 B8 00 00 00 00 00 00 00 40 00 000020 00 00 00 00 00 00 00 00 00 00 000030 00 00 00 00 00 00 00 D0 00 00 4C0040 OE IF EA OE 09 CD 21 B8 01 4C CD
0010 B8 00 00 00 00 00 00 00 40 00 000020 00 00 00 00 00 00 00 00 00 00 000030 00 00 00 00 00 00 00 D0 00 00 4C0040 OE IF EA OE 09 CD 21 B8 01 4C CD
• Signature-based pattern matching on known virus code
• Half a million new and variant strains emerging every month, signature engines have trouble keeping pace
• Heuristics detect behaviors beyond the known actions of legitimate applications
• Able to detect and block “Zero Day” threats without referencing a signature or fingerprint that has yet to be released
SLIDE 9
Highly Accurate Antispam Technology
• Heuristic NeuNet filtering technology for SPAM
• Cloud-based RBL reputation list for improved detection
• Advanced image spam filter analyzing text within images and learns the common characteristics
• BitDefender analyzes and issues protection for 5 million spam messages every day– Or about 35 million spam mails per week
• BitDefender continuously ranked top in Virus Bulletin’s (VB) tests for SPAM - sixth VBSpam award in a row
Source: Virus Bulletin – BitDefender Security for Mail Servers 3.0.2 (March 2010)
SLIDE 10
Flexible Solutions for Consumers and SOHO
Home UserLaptops & Netbooks
Home UserDesktops
SLIDE 11
Security for Small and Medium Businesses• Most Antivirus Solutions are Complex and Over Engineered
– Small to Medium Businesses have less complex network requirements– Customers paying for features they don’t use / need– Non-dedicated IT resources lack domain experience
• Single Solution Vendor Provides Resource and Cost Benefits– Secure Windows centric or heterogeneous networking environments – Streamlines procurement, deployment, management and support
• Defense in Depth to Protect Against Diverse Attack Vectors– Messaging systems, desktops, and critical File Servers all provide an
entry point for malware to infect the network
D e f e n s e i n D e p t h
GATEWAY SERVICES ENDPOINT PROTECTION CRITICAL SERVERS
SLIDE 12
Business Solutions Overview
Network Gateways
Remote &Roaming Users
Onsite Users File Servers
Email Servers Collaboration Servers
CENTRALIZED MANAGEMENT
GATEWAY SERVICES ENDPOINT PROTECTION CRITICAL SERVERS
SLIDE 13
Business Users Are Under AttackEmail Attachments
Phishing
SPAM
Worms and Network Attacks
Spyware
System Vulnerabilities
Trojans&
Rootkits
Viruses
RemovableMedia &
Network Shares
Instant Messaging
SLIDE 14
BitDefender Centralized Management• Scalable Master-Slave Architecture
– Management of gateway, server and endpoint solutions located in different physical locations
• Network Visibility and Remote Administration– Displays system deployment and related threat information– On-demand problem resolution
• Configurable Security Policies– Pre-defined templates to aid policy enforcement– Network detection of unprotected endpoints with automatic client
distribution and installation– Maintains remote and roaming user compliance even when
endpoints are offline
• Integrates with Active Directory– Leverages the organizations existing Windows domain structure and
group policies
SLIDE 15
GATEWAY SERVICES
ENDPOINT PROTECTION
CRITICAL SERVERS
Managed Platforms
Management Features
Management Console Overview
SLIDE 16
Server and Endpoint Management• Integrated Network Management Capabilities
– Microsoft’s version of Web-Based Enterprise Management (WBEM) Scripting Language for Endpoint and Servers
• Over 30 Predefined WMI Script Templates Included– Hundreds of Publically Available Scripts for Mass, Automated
Remote Management;• Kill applications and processes• Install and uninstall software (including other AV solutions)• Restart or shutdown workstations • Enable/disable autoruns and USB removable media access
• Customizable Client / Server Installation Packages– Select installation features and disable unwanted functionality– Scan system prior to Installation
SLIDE 17
Reports and Statistics• Set of Predefined Reports
– Infections, disinfections and quarantined files
• Virus Scanning Statistics– Daily, Weekly and Monthly– User specified time period
• Wizard Based Reports– Shortlist for the last 20 reports defined
• Export Reports– Reports available in text or HTML formats
• License Reporting and Management– License usage, inactive clients and deployed license thresholds
SLIDE 18
Master / Slave Management Architecture
Headquarters
Remote Office A
Regional Office
Remote Office B
Master Mgmt. Server
Slave Server
Slave ServerSlave Server
Internet
• Centralized Policy, Product and Update Synchronization
• Parallel Deployment Maintains Reliability and Faster Response
SLIDE 19
BitDefender Client Security• Industry Leading Proactive Protection
– viruses, spyware, rootkits, spam, phishing and other malware
• Small Memory Footprint – Optimized server-client communication– Minimal impact on system performance
• Client Profiles– Power clients with unrestricted interface access– Restricted clients with limited interface access
• Business Productivity Through Administrative Control– Sets restrictions against unsafe or undesirable Web sites and user level
applications– Blocks e-mail messages based on key words– Limits Internet access for specific periods of time
SLIDE 20
CentralizedManagement
Proactive Protection
Client Protection and Management
SLIDE 21
Rated the most effective antivirus solution and one of the top 100 products of the year.PC World - March 2006 and May 2006
Rated one of the top 100 privately held European companies.Red Herring - May 2006
Number one rated Internet Security software.Consumer Reports – September 2008
Nominated for Best Software award.Gartner RetailVision – September 2006
Number one rated antivirus software.Consumer Reports – September 2006
The Experts Agree
SLIDE 22
VBSpam Comparative Anti-spam Test- May 2009 • VB 100 Award, Virus Bulletin, UK- April 2009 • Best Buy and Editor’s Choice, Personal Computer World, UK- January 2009 • Advanced Plus, AV-Comparatives.org- October 2008 • “Buy It!”, Computer Active, UK- October 2008 • Recommended, IT Reviews, UK- October 2008 • Best Value, WinmagPro, Netherlands- October 2008 • Gold Award, PC Guia, Portugal- October 2008 • Editor’s Choice, PC Utilities, UK- September 2008 • Number One, Consumer Reports, USA- August 2008 • VB 100 Award, Virus Bulletin, UK- February 2008 • VB 100 Award, Virus Bulletin, UK- June 2008 • Test Winner, PC Games, Germany- February 2008 • Test Winner and Best Buy, Online PC, Switzerland- January 2008 • VB 100 Award, Virus Bulletin, UK- December 2007 • Budget-Tipp Distinction, Windows Vista, Germany- December 2007 • Gold Medal, PC Guia, Portugal- December 2007 • Price Tip and Test Winner, com!, Germany- December 2007 • Editor’s Choice, WHAT LAPTOP, UK- December 2007 • Editor’s Choice, Windows News, France- November 2007 • Recommendation, PC Today, Spain- December 2007 • Recommendation, IT Reviews, UK- November 2007 • Ubuntu’s Linux Compliance- October 2007 • Novell’s Linux Compliance- October 2007 • Red Hat Ready Linux Compliance- September 2007 • Gold Rating, PC Advisor, UK- September 2007 • Advanced Plus, av-comparatives.org, Austria- August 2007 • VB 100 Award, Virus Bulletin, UK- June 2007 • Premium Checkpoint Award, West Coast Labs, UK- November 2006
Industry Awards and Certifications
SLIDE 23
Proactive solutions to emerging threats.
Protection at the speed of life.
Summary• BitDefender’s Business Solutions Leverage Award-Winning
Consumer Detection Technology
• End-to-End Malware Protection For SMB Networks– Windows centric platform strategy– Multi-platform solutions for heterogeneous environments– Gateway, server & endpoint configuration, auditing and management – Manage clients in remote subnets from a single central server– Centralized license management– Remote install / uninstall of endpoint software– Centralized reporting, alerting and updates
• Cost and Resource Effective Solutions– Simplifies the complexity of managing Business AV solutions– Hourly updates help maintain network integrity