Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.

Slides:



Advertisements
Similar presentations
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Advertisements

Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Next Generation Monitoring in Cisco Security Cloud Leon De Jager and Nitin.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Security for Today’s Threat Landscape Kat Pelak 1.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 10 04/18/2011 Security and Privacy in Cloud Computing.
LittleOrange Internet Security an Endpoint Security Appliance.
INTRODUCING: KASPERSKY Security FOR VIRTUALIZATION | LIGHT AGENT FOR MICROSOFT AND CITRIX VIRTUAL ENVIRONMENTS.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
Avira AntiVir Premium Kaiyu Wang. About the Avira AntiVir Premium The Avira AntVir from German. It just has 30MB, but it can kill 1,600,000 virus Fust.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
eScan Total Security Suite with Cloud Security
Antivirus Technology in State Government Kym Patterson State Chief Cyber Security Officer Department of Information Systems.
Dell Connected Security Solutions Simplify & unify.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
MANAGEMENT ANTIMALWARE PLATFORM Microsoft Malware Protection Center Dynamic Signature Svc Available only in Windows 8 Endpoint Protection Management.
Classification 10/3/2015 Worry-Free Business Security 5.0.
Proof-Of-Concept: Signature Based Malware Detection for Websites and Domain Administrators - Anant Kochhar.
Cloud-based Antivirus Project Proposal By Yuli Deng, Guofu Xiong.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
The Changing World of Endpoint Protection
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Kaspersky Labs 6 ht Annual Partner Conference · Turkey, June Kaspersky Labs 6 th Annual Partner Conference · Turkey, 2-6 June 2004 November 16.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
Threat Management Service October Crypteia Networks 2 Awards PCCW Global acquired Crypteia Networks in 2014 Crypteia Networks was founded as a Security-as-a-
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
Kaspersky Small Office Security INTRODUCING New for 2014!
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Introducing Kaspersky Anti-Virus 6.0 for Windows Workstations Introducing Kaspersky ® Anti-Virus 6.0 for Windows Workstations.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
New cloud services demand new security solutions. The evolving cloud landscape is paving the way for modern and more sophisticated technology. Among the.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Some Great Open Source Intrusion Detection Systems (IDSs)
CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department, University.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
BUILD SECURE PRODUCTS AND SERVICES
IoT Security Part 2, The Malware
Exchange Online Advanced Threat Protection
Ilija Jovičić Sophos Consultant.
Hybrid Management and Security
Ransomware & Security for Virtualization
Customized Solutions to your needs
Protecting your mobile devices away from virus by a cloud-based approach Wei Wu.
Exchange Online Advanced Threat Protection
Intercept X for Server Early Access Program Sophos Tester
Secure once, run anywhere Simplify your security with Sophos
Watchdog Anti malware is reliable application and a multi engine scanner, which can detect various malicious files, worms, malware and other online threats.
Presentation transcript:

Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference

IT Faces the “Change” Reaction Business Change Produces IT Security Challenges Business Efficiency Flexibility and Agility Reduce Costs - OPEX Consolidation Mobility and “Me Time” Technology Virtualization Mobile Devices Consumerization and Social Media Cloud Services Security Malware Diverse Platform Support Hacking/ /Phishing Poor Social Media Security PAGE 2 |

Threat landscape More than 30 millions per year PAGE 3 | 2,000,000 1,000, ,000,000 5,000,000 4,000,000 Signatures

Kaspersky Security Network (KSN) ► Cloud-based reputation database ► Billions of records ► Urgent detection with fast response ► Minimizes false positives PAGE 4 |

Protection from Unknown Threats Gathers behavioral pattern statistics New! Information about the behavior of programs running on users' computers is sent to Kaspersky Lab, where the data is analyzed and matched against the reputation of these programs If a program performs an action that is characteristic of malware, its behavioral pattern is added to Kaspersky Lab’s antivirus databases. This allows the blocking of malicious programs with similar behaviour. PAGE 5 |

Cloud-Based Protection Rapid reaction to new threats Kaspersky Security Network: Automatic collection of data about infected files from users’ computers Protection using online databases located on Kaspersky Lab servers:  UDS for files and URLs  White listing database Why is it necessary? Prompt response to threats: protection within minutes No need to store huge amounts of data on users’ computers PAGE 6 |

Hybrid & Local Technologies Hybrid Protection Hybrid Protection Cloud Technology Cloud Technology Local Technologies Kaspersky Security Network File reputation check Link reputation check Safe online-banking Anti-Phishing Anti-Spam Kaspersky Security Network File reputation check Link reputation check Safe online-banking Anti-Phishing Anti-Spam Safe Run Malicious activity roll-back Browser configuration Vulnerability Scan Recovery Disk File AV Safe Run Malicious activity roll-back Browser configuration Vulnerability Scan Recovery Disk File AV Application Control Proactive Defence Activity Monitor PAGE 7 |

Kaspersky Endpoint Security 8 for Windows & Security Center Key areas of improvement Kaspersky Endpoint Security 8 for Windows & Security Center Manageability Scalability & Virtualization support Enhanced Protection Integration with the cloud Application Control & White listing Endpoint Control PAGE 8 |

Kaspersky Endpoint Security 8 for Windows Developed for Today and Tomorrow’s Threats ► Endpoint Protection – Signature Based – Proactive Defense – Cloud Assisted – Kaspersky Security Network ► Endpoint Control – Application Control – Device Control – Web Control PAGE 9 |

Conclusion PAGE 10 | 1.Hybrid protection combines traditional and cloud technologies which provides reliable protection against latest threats 2.Leading cloud technology provides prompt reaction against new threats 3.Proactive technologies ensures immediate protection from unknown threats and providies roll-back functionality

Thank You Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / / 2 nd InfoCom Security Conference Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / / 2 nd InfoCom Security Conference