to internet threats

18
to Internet Threats The Global Leader IN REACTION TIME

Upload: hallie

Post on 22-Jan-2016

36 views

Category:

Documents


0 download

DESCRIPTION

The Global Leader. IN REACTION TIME. to Internet Threats. About Kaspersky Lab. International leader in internet security More than 200 million protected users worldwide 5 R&D and virus labs worldwide 650 employees, 1 50 developers & engineers Direct operations in 11 countries - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: to Internet Threats

to Internet Threatsto Internet Threats

The Global LeaderThe Global LeaderIN REACTION TIMEIN REACTION TIME

Page 2: to Internet Threats

2

About Kaspersky LabAbout Kaspersky Lab

• International leader in internet security

• More than 200 million protected users worldwide

• 5 R&D and virus labs worldwide

• 650 employees, 150 developers & engineers

• Direct operations in 11 countries

• North American headquarters in Massachusetts

• International leader in internet security

• More than 200 million protected users worldwide

• 5 R&D and virus labs worldwide

• 650 employees, 150 developers & engineers

• Direct operations in 11 countries

• North American headquarters in Massachusetts

Page 3: to Internet Threats

3

Kaspersky Technology InsideKaspersky Technology InsideMore than 100 OEM Partners

Page 4: to Internet Threats

Internet CrimeInternet CrimeIS ON THE RISE

Page 5: to Internet Threats

5

Data From the LabData From the Lab

Source: The Kaspersky Internet Security Lab Source: The Kaspersky Internet Security Lab

Page 6: to Internet Threats

6

Standard Automated Hourly Updates!

Standard Automated Hourly Updates!

Source: Vendor DataSource: Vendor Data

Page 7: to Internet Threats

7Source: Av-Test.orgSource: Av-Test.org

Size Does MatterSize Does Matter

Page 8: to Internet Threats

8Source: Av-Test.orgSource: Av-Test.org

#1 in Virus Outbreak Response#1 in Virus Outbreak Response

Page 9: to Internet Threats

9

#1 In Detection Rates* #1 In Detection Rates*

* www.av-comparatives.org* www.av-comparatives.org

Kaspersky Lab is the leader in detecting viruses, spyware, and other malicious programs

Kaspersky Lab (KAV) 99.57%

ESET (NOD32 Anti-Virus) 97.89%

Symantec (Norton Anti-Virus) 97.61%

McAfee (McAfee VirusScan) 96.41%

GeCAD Software (RAV Desktop) 94.05%

Softwin (BitDefender Prof+) 93.08%

Trend Micro (Internet Security) 91.25%

H+BEDV (AntiVir Prof.) 91.09%

GriSoft (AVG Professional) 90.47%

Alwil Software (Avast! Prof.) 89.24%

Doctor Web (Dr Web) 83.91%

Frisk Software (F-Prot Anti-Virus) 83.91%

Sophos (Sophos Anti-Virus) 90.10%

Page 10: to Internet Threats

10

Rated #1 in Spyware DetectionRated #1 in Spyware Detection

Page 11: to Internet Threats

11

Introducing Version 6.0Introducing Version 6.0Introducing Version 6.0Introducing Version 6.0

Page 12: to Internet Threats

12

Advanced Virus ScanningAdvanced Virus Scanning

• Scanning optimization and acceleration: iSwift™ and iChecker™

• Automated load balancing

• Compound objects scanning

• SafeStream™ scanning of HTTP traffic

• Automated system restoration

• Advanced disinfection

• Self defense technology

• Scanning optimization and acceleration: iSwift™ and iChecker™

• Automated load balancing

• Compound objects scanning

• SafeStream™ scanning of HTTP traffic

• Automated system restoration

• Advanced disinfection

• Self defense technology

Page 13: to Internet Threats

13

Advanced Antivirus UpdatingAdvanced Antivirus Updating

• Synchronized antivirus database

• Automatic updating mode

• Automatic load balancing and update speed optimization

• Update rollback technology

• Synchronized antivirus database

• Automatic updating mode

• Automatic load balancing and update speed optimization

• Update rollback technology

Page 14: to Internet Threats

14

Proactive ProtectionProactive Protection

• Anti-Rootkit detection

• Behavior blocking

• Roll back

• Heuristic analysis

• Integrity verification

• Virus epidemic prevention

• Anti-Rootkit detection

• Behavior blocking

• Roll back

• Heuristic analysis

• Integrity verification

• Virus epidemic prevention

Page 15: to Internet Threats

15

Spyware ProtectionSpyware Protection

• System restoration technology removes traces of spyware from the registry and file system

• Anti-phishing technology protects against scam emails

• Anti-banner technology blocks unsolicited advertising

• Anti-popup technology protects against pop-ups that exploit browser vulnerabilities

• JavaScript and VBScript blocking loaded from internet pages

• Anti-dialer technology blocks unauthorized modem connections

• System restoration technology removes traces of spyware from the registry and file system

• Anti-phishing technology protects against scam emails

• Anti-banner technology blocks unsolicited advertising

• Anti-popup technology protects against pop-ups that exploit browser vulnerabilities

• JavaScript and VBScript blocking loaded from internet pages

• Anti-dialer technology blocks unauthorized modem connections

Page 16: to Internet Threats

16

Hacker ProtectionHacker Protection

• Firewall technology filters all incoming and outgoing traffic at the packet and application levels

• Intrusion detection system (IDS) monitors network traffic for common network attacks

• Stealth Mode technology protects computers against any detection from outside the network

• Firewall technology filters all incoming and outgoing traffic at the packet and application levels

• Intrusion detection system (IDS) monitors network traffic for common network attacks

• Stealth Mode technology protects computers against any detection from outside the network

Page 17: to Internet Threats

17

Spam ProtectionSpam Protection

• Email dispatcher

• Address and phrase black and white lists

• Self-modifying spam detection

• Graphics object imaging analysis

• Message header analysis

• Email dispatcher

• Address and phrase black and white lists

• Self-modifying spam detection

• Graphics object imaging analysis

• Message header analysis

Page 18: to Internet Threats

18

to Internet Threatsto Internet Threats

The Global LeaderThe Global LeaderIN REACTION TIMEIN REACTION TIME