20 BitDefender

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 24

BitDefender

MAXIMUM SECURITY. MAXIMUM SPEED.

Business Solutions Overview


Commercial Presentation

SLIDE 1

BitDefender at a Glance
Founded in 2001
A Leader in Proactive Anti-Malware Solutions
Technology Used by OEM Partners and Tens of
Millions of Customers Worldwide

Distribution in over 100


countries
Nine International Sales Offices
Product Available in 18
Languages
SLIDE 2

Magnitude of the Problem


20,000,000

16,000,000

12,000,000

In 2008 more than half a


million malware samples
were discovered every
month!

8,000,000

4,000,000

0
1998 2003 2008

Source: av-test.org Sample Collection


Growth
Source: AV-Test Labs (www.av-test.org)

The quantity of malware found is growing rapidly (graph has a logarithmic scale)
According to AV-Tests Andreas Marx Since 2004 the level of growth has gone through the roof

Even the best signature databases have less than a 50% chance of catching
completely new threats. Signatures are extremely ineffective against targeted and
zero day threats.
According to Gartner - December, 2007

Nobody can win the war against malware with a signature-driven product, but more
proactive technologies are required
According to AV-Tests Andreas Marx

SLIDE 3

Threat Landscape - Past


Proliferation Mediums
Sources of Attack Types of Threats

Viruses

Removable
Media

Email worms
Exploit worms
Script Kiddies

Rootkits

Email
Attachmen
ts

Backdoor Trojans
Instant
Messaging
Clients

SLIDE 4

Internet Threat Landscape - Present


Sources of Attack Types of Threats Proliferation Mediums
Instant
Messaging
Clients

Viruses
Hackers

Email worms
Exploit worms
P2P worms

Organized Crime

IM worms

Legitimate, Compromised
Multi-media Websites
Removable
Media
P2P
Networks
Phishing

Rootkits
Backdoor Trojans
Legitimate Businesses

Spyware

Mobile
Devices

SPAM Email
Attachmen
Public WiFi
ts
Networks

Adware
Foreign Governments
SLIDE 5

Greyware
Web 2.0
Applications

The Challenges of Proactive


Protection
The Promise:
Real-time proactive protection from malware threats,
without the need for frequent signature updates.
The Historical Reality:

"Even
"Even the
the best
best
signature
signature databases
databases
have
have less
less than
than aa 50%
50%
chance of
of catching
catching
heuristics chance
completely
completely new
new
threats.
threats. Signatures
Signatures are
are
extremely
extremely ineffective
ineffective
against
against targeted
targeted and
and
the PC
zero-day
zero-day threats."
threats."

False Positives
Traditional content-based
susceptible
Security vs. Performance
Emulation can slow down
Users do not want to sacrifice
performance
Portability
The same engine cannot usually be
SLIDE run
6
on all platforms and OS

According
According to
to Gartner
Gartner -December,
December, 2007
2007

Award Winning Detection Engine is Key


BitDefender provides a common detection and
disinfection engine across all business products
Engines are further customized for specific platforms
or application; i.e. URL and Content Inspection
On average, BitDefender detects and shields against
120,000 new e-threats per month
More than 4,000 new signatures are added to the
BitDefender antivirus database every day
BitDefender customers get around-the-clock
protection with more than 16 updates per day
BitDefenders success in detection has led to its
adoption by other leading Antivirus vendors

SLIDE 7

How The Scanning Process Works


Signature-based
pattern matching on
known virus code

0010 B8 00 00 00 00 00 00 00
40 00 00
0020 00 00 00 00 00 00 00 00
00 00 00
0030 00 00 00 00 00 00 00 D0
00 00 4C
0040 OE IF EA OE 09 CD 21 B8
01 4C CD

0010 B8 00 00 00 00 00 00 00
40 00 00
0020 00 00 00 00 00 00 00 00
00 00 00
0030 00 00 00 00 00 00 00 D0
00 00 4C
0040 OE IF EA OE 09 CD 21 B8
01 4C CD

Increased
Detection
SLIDE 8

Half a million new and


variant strains
emerging every
month, signature
engines have trouble
keeping pace
Heuristics detect
behaviors beyond the
known actions of
legitimate applications
Able to detect and
block Zero Day
threats without
referencing a
signature or

Highly Accurate Antispam Technology


Heuristic NeuNet filtering technology for SPAM
Cloud-based RBL reputation list for improved
detection
Advanced image spam filter analyzing text within
images and learns the common characteristics
BitDefender analyzes and issues protection for 5
million spam messages every day
Or about 35 million spam mails per week

BitDefender continuously ranked top in Virus


Bulletins (VB) tests for SPAM - sixth VBSpam
Source: Virus Bulletin BitDefender Security for Mail Servers 3.0.2
award
in a row
(March 2010)
SLIDE 9

Flexible Solutions for Consumers and


SOHO

Home
User
Laptops
&
Netbooks

Home User
Desktops

SLIDE 10

Security for Small and Medium


Businesses
Most Antivirus Solutions are Complex and Over
Engineered
Small to Medium Businesses have less complex network
requirements
Customers paying for features they dont use / need
Non-dedicated IT resources lack domain experience

Single Solution Vendor Provides Resource and Cost


Benefits
Secure Windows centric or heterogeneous networking
environments
Streamlines procurement, deployment, management and
support

D e f e to
n sProtect
e in D
e p t h Diverse Attack
Defense in Depth
Against
Vectors
ENDPOINT
CRITICAL
GATEWAY
SERVICES
Messaging
SLIDE
11

PROTECTION
SERVERS
systems,
desktops, and critical
File Servers all

Business Solutions Overview


CENTRALIZED MANAGEMENT
GATEWAY SERVICESENDPOINT
PROTECTION

CRITICAL
SERVERS

Network Gateways

Onsite Users

File Servers

Email Servers

Remote &
Roaming Users

Collaboration
Servers

SLIDE 12

Business Users Are Under Attack


Email Attachments
Trojans
&
Rootkits

System
Vulnerabilities

Phishing

Instant
Messaging

Removable
Media &
Network
Shares

Worms and
Network
Attacks

Viruses

SLIDE 13

SPAM

Spyware

BitDefender Centralized Management


Scalable Master-Slave Architecture
Management of gateway, server and endpoint solutions
located in different physical locations

Network Visibility and Remote Administration


Displays system deployment and related threat
information
On-demand problem resolution

Configurable Security Policies


Pre-defined templates to aid policy enforcement
Network detection of unprotected endpoints with
automatic client distribution and installation
Maintains remote and roaming user compliance even
when endpoints are offline

Integrates with Active Directory


Leverages the organizations existing Windows domain
structure and group policies
SLIDE 14

Management Console Overview


Managed
Platforms

GATEWAY
SERVICES

ENDPOINT
PROTECTION

CRITICAL
SERVERS
SLIDE
15

Management
Features

Server and Endpoint Management


Integrated Network Management Capabilities
Microsofts version of Web-Based Enterprise
Management (WBEM) Scripting Language for
Endpoint and Servers

Over 30 Predefined WMI Script Templates


Included
Hundreds of Publically Available Scripts for Mass,
Automated Remote Management;
Kill applications and processes
Install and uninstall software (including other AV
solutions)
Restart or shutdown workstations
Enable/disable autoruns and USB removable media
access

Customizable
SLIDE
16

Client / Server Installation

Reports and Statistics


Set of Predefined Reports
Infections, disinfections and quarantined files

Virus Scanning Statistics


Daily, Weekly and Monthly
User specified time period

Wizard Based Reports


Shortlist for the last 20 reports defined

Export Reports
Reports available in text or HTML formats

License Reporting and Management


License usage, inactive clients and deployed license
thresholds

SLIDE 17

Master / Slave Management Architecture


Slave Server

Master Mgmt.
Server

Remote
Office A
Internet

Headquarters

Slave Server
Slave Server

Regional
Office

Remote
Office B

Centralized Policy, Product


and Update Synchronization
SLIDE 18

Parallel Deployment
Maintains Reliability and
Faster Response

BitDefender Client Security


Industry Leading Proactive Protection
viruses, spyware, rootkits, spam, phishing and other malware

Small Memory Footprint


Optimized server-client communication
Minimal impact on system performance

Client Profiles
Power clients with unrestricted interface access
Restricted clients with limited interface access

Business Productivity Through Administrative Control


Sets restrictions against unsafe or undesirable Web sites and
user level applications
Blocks e-mail messages based on key words
Limits Internet access for specific periods of time
SLIDE 19

Client Protection and Management


Proactive
Protection

SLIDE 20

Centralized
Management

The Experts Agree


Number one rated Internet Security
software.
Consumer
Reports
September
2008antivirus software.
Number
one
rated
Consumer Reports September 2006

Rated the most effective antivirus


solution and one of the top 100
products of the year.
PC World - March 2006 and May 2006

Rated one of the top 100 privately


held European companies.
Red Herring - May 2006

Nominated for Best Software


award.
Gartner RetailVision September 2006

SLIDE 21

Industry Awards and Certifications


VBSpam Comparative Anti-spam Test- May 2009 VB 100 Award, Virus Bulletin,
UK- April 2009 Best Buy and Editors Choice, Personal Computer World, UKJanuary 2009 Advanced Plus, AV-Comparatives.org- October 2008 Buy
It!, Computer Active, UK- October 2008 Recommended, IT Reviews, UKOctober 2008 Best Value, WinmagPro, Netherlands- October 2008 Gold
Award, PC Guia, Portugal- October 2008 Editors Choice, PC Utilities, UKSeptember 2008 Number One, Consumer Reports, USA- August 2008 VB
100 Award, Virus Bulletin, UK- February 2008 VB 100 Award, Virus Bulletin,
UK- June 2008 Test Winner, PC Games, Germany- February 2008 Test Winner
and Best Buy, Online PC, Switzerland- January 2008 VB 100 Award, Virus
Bulletin, UK- December 2007
Budget-Tipp Distinction, Windows Vista,
Germany- December 2007 Gold Medal, PC Guia, Portugal- December 2007
Price Tip and Test Winner, com!, Germany- December 2007 Editors Choice,
WHAT LAPTOP, UK- December 2007 Editors Choice, Windows News, FranceNovember 2007 Recommendation, PC Today, Spain- December 2007
Recommendation, IT Reviews, UK- November 2007
Ubuntus Linux
Compliance- October 2007 Novells Linux Compliance- October 2007 Red
Hat Ready Linux Compliance- September 2007 Gold Rating, PC Advisor, UKSeptember 2007 Advanced Plus, av-comparatives.org, Austria- August 2007
SLIDE
VB 100
22 Award, Virus Bulletin, UK- June 2007 Premium Checkpoint Award,
West Coast Labs, UK- November 2006

Summary
BitDefenders Business Solutions Leverage AwardWinning Consumer Detection Technology
End-to-End Malware Protection For SMB Networks
Windows centric platform strategy
Multi-platform solutions for heterogeneous environments
Gateway, server & endpoint configuration, auditing and
management
Manage clients in remote subnets from a single central server
Centralized license management
Remote
install /solutions
uninstall of endpoint
software
Proactive
Protection
at the
to emerging
of life.
Centralized
reporting, alerting andspeed
updates
threats.

Cost and Resource Effective Solutions

Simplifies the complexity of managing Business AV solutions


Hourly updates help maintain network integrity
SLIDE 23

Thank You!

[email protected]

BitDefender Business Security


www.bitdefender.co.nz
SLIDE 24

You might also like