1 copyright @ bitdefender 2013 copyright @ bitdefender 2014 “what business are we really in?”...

28
1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014 www.bitdefender.com/enterprise “What business are we really in?” 1. Theodore Levitt

Upload: ralf-barton

Post on 16-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

1

Copyright @ Bitdefender 2013

Copyright @ Bitdefender 2014www.bitdefender.com/enterprise

“What business are we really in?”

1. Theodore Levitt

Page 2: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

2

Copyright @ Bitdefender 2013

Copyright @ Bitdefender 2014www.bitdefender.com/enterprise

DATA

Endpoint protection*

APPS

Operatingsystem

Traditional antimalwareSignature based scanning and protectionHeuristic detectionFirewalll

Advanced antimalwareHIPS – host based intrusion preventionWeb protectionApplication whitelisting

Vulnerability ManagementAssessmentPatch Management

Anti-malware with advanced server supportSpecialized servers (e.g. email)virtual server environments

Endpoint security

Data SecurityEncryptionDevice controlDLP - data loss preventionMDM – mobile application management

Page 3: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

3

Copyright @ Bitdefender 2013

Copyright @ Bitdefender 2014www.bitdefender.com/enterprise

ENDPOINT SECURITY is our business

Page 4: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

4

Copyright @ Bitdefender 2013

Copyright @ Bitdefender 2014www.bitdefender.com/enterprise

Understanding The Impact of Virtualization Security

Page 5: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

5

Copyright @ Bitdefender 2013

E-Threats behind the Curtains

Real World Virtual World

Teens and Geeks– Attention-Driven– Loner Profile

Cyber-criminals– Profit-Driven – Highly Organized

High Profile Attacks– Social Engineering – Mass Mailers

Stealth Attacks– Spyware/Adware– Automated Variant Creation

and Morphing – Persistent Threats

Lost productivity– Clogged E-mail Systems and

Networks– Help Desk and Data Loss

Costs

Cyber-crime– Identity Theft and Online

Fraud– Highly Targeted Corporate

Information Attacks

WHO?

HOW?

WHAT?

Page 6: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

6

Copyright @ Bitdefender 2013

Magnitude of the Problem/Opportunity

• “Even the best signature databases… have less than a 50% chance of catching completely new threats. Signatures are extremely ineffective against targeted and “zero day” threats.”

According to Gartner

• “Nobody can win the war against malware with a signature-driven product, but more proactive technologies are required ”

According to AV-Test’s Andreas Marx

Source: AV-Test Labs (www.av-test.org)

Around 1.5M unique malware samples are discovered every month!

Source: av-test.org – New Malware Growth

Page 7: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

7

Copyright @ Bitdefender 2013

Virtualization market drivers and adoption

XTraditional Antimalware

Page 8: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

8

Copyright @ Bitdefender 2013

Antivirus Impact:

200 MBof memory per VM

200+ MBof disk per VM

The antimalware agent adds : Scan Engines – Signatures -Databases… to each VM

Page 9: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

9

Copyright @ Bitdefender 2013

Creating The Perfect Storm

Each with its own

I/O Stream

Physical Server Can Support

50-70 Virtual Desktops

8-12 Virtual Servers

1

Page 10: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

10

Copyright @ Bitdefender 2013

Creating The Perfect Storm

Scan

Scan

Scan

ScanScan

Scan

Simultaneous Update

Simultaneous Update Simultaneous Update

Simultaneous Update

AV STORM

Page 11: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

11

Copyright @ Bitdefender 2013

Capacity Impact:

VSSecurity Capacity

Impact #1

Page 12: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

12

Copyright @ Bitdefender 2013

Security Gaps:

Boot latency & Boot time gaps

System are vulnerable to attacks during AV loading, updates and during backup recovery

Impact #2

Page 13: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

13

Copyright @ Bitdefender 2013

Lack of intelligent co-ordination

o Integrate with virtualization managemento Non-existent VMs remain o Serialize full system scanso Policy applied to groups

Impact #3

Page 14: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

14

Copyright @ Bitdefender 2013

Secure Virtual Appliancethe Impact:

Security & Capacity

Remote Scanning

New Security Strategies

Page 15: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

15

Copyright @ Bitdefender 2013

Secure Virtual Appliance

Deduplicate and Centralize

+30% saving on CPU impact

+10% saving on Memory impact

Page 16: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

16

Copyright @ Bitdefender 2013

Traditional AV VS. BD Tools) - impact on host

Host running 72 virtual machines Local cache and server cache used

Tradit

ional

AV

EPSEC inte

grat

ion

EPSEC inte

grat

ion +

BD T

ools

BD Too

ls

47%

11% 12% 16%18%

7% 8% 8%

CPU Memory

At least 10% saving on Memory impactAt least 30% saving on CPU impact

Page 17: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

17

Copyright @ Bitdefender 2013

Approach: VMware integration

VMware vShield Endpoint

VMware vCenter integration

BD Tools

“Agentless”?

Page 18: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

18

Copyright @ Bitdefender 2013

Approach: Bitdefender Technology

o Any hypervisor

o SVA redundancy

o Performance and simplicity

Page 19: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

20

Copyright @ Bitdefender 2013

Security

reinvented

o Hypervisor agnostic; Supports VMware, Citrix, Microsoft, AWS, Oracle, and Red Hat virtualization

o OS agnostic; Windows, Linux and Solaris servers as well as VDI instances

o Integrated management; VMware, Citrix, Amazon Web Services

o 30% more VMs per physical host; Increased server consolidation ratios with centralized antimalware

o Tiny footprint on the VMs: 60 MB of disk and 30 MB of memory in non-VMware environments

Page 20: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

21

Copyright @ Bitdefender 2013

Built with Virtualization Built for Virtualization

Page 21: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

22

Copyright @ Bitdefender 2013

Virtualization is another disruptive technology take advantage of your chance to improve security!

o Virtualization needs purpose-built securityo Two approaches today; vShield and Bitdefender o Management must be integrated (vCenter, XenServer, AD) o Avoid YAPS (Yet Another Point Solution)o Future-proof (OS & hypervisor, private & public, mobile)o Traditional endpoint and management architectures will fail

Page 22: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

23

Copyright @ Bitdefender 2013

Page 23: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

24

Copyright @ Bitdefender 2013

Gravity ZoneSecurity for Endpoints On Premise or Cloud-based

Simple to deploy, install & manage

Secures:•Windows•MAC•Servers

•Exchange (roadmap)•Mobile (roadmap)

Comprehensive Security from one dashboard

Secures:•Physical devices (windows, MACS,

Servers)•Mobile Devices

• Virtualized Environments(VMware. Citrix Xen, Hyper V and more)

OR

Page 24: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

25

Copyright @ Bitdefender 2013

Control Center Console Endpoint Security (EPS)

The New Business Portfolio is entirely based on the Bitdefender GravityZone Architecture

Page 25: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

26

Copyright @ Bitdefender 2013

Bitdefender at a Glance

Consistent Leader

Quarter 2

/2010

Quarter 3

/2010

Quarter 1

/2011

Quarter 2

/2011

Jul/Aug 2011

Sep/Oct

2011

Nov/Dec 2

011

Jan/Feb 2012

Mar/Apr 2

012

May/Jun 2012

Jul/Aug 2012

Sep/Oct

2012

Nov/Dec 2

012

Jan/Feb 2013

Mar/Apr 2

013

May/Jun 2013

Jul/Aug 2013

Sep / Oct

2013

Nov / Dec 2

0132.50

3.00

3.50

4.00

4.50

5.00

5.50

6.00

6.50

AV Test Score: Protection, Performance, Usability (Average)

Bitdefender Eset McAfee Avira Trend MicroPanda Avg Symantec Kaspersky

Page 26: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

27

Copyright @ Bitdefender 2013

Advanced protection through proactive detection

• Active Virus Control leverages advanced heuristic methods to detect new potential threats in real time

• It monitors all application activity throughout the lifecycle of the application processes

• B-HAVE analyzes the behavior of potentially malicious codes inside a secure virtual computer environment

• It eliminates false positives and significantly increasing detection rates for new and unknown malware

Page 27: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

28

Copyright @ Bitdefender 2013

The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations simultaneously from the

most important three key independent organizations in the US, UK, and Germany!

Only security company to receive 14 VB Antispam awards in a row

BitDefender protects more than 500 million people worldwide (including technology partnerships)

Nine international sales offices with ~ 475 employees worldwide

260+ technical people and engineers in R&D team

Products localized in more than 20 languages.

120 OEM Partners and Growing

Trusted by top security companies globally: F-Secure, G-Data, Trustport, e-Scan, Qihoo, Bullguard, Acronis IBM, etc

Bitdefender at-a-glance

Page 28: 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014  “What business are we really in?” 1.Theodore Levitt

29

Copyright @ Bitdefender 2013

Copyright @ Bitdefender 2014www.bitdefender.com/enterprise

Questions and Thank-you