20 BitDefender
20 BitDefender
20 BitDefender
SLIDE 1
BitDefender at a Glance
Founded in 2001
A Leader in Proactive Anti-Malware Solutions
Technology Used by OEM Partners and Tens of
Millions of Customers Worldwide
16,000,000
12,000,000
8,000,000
4,000,000
0
1998 2003 2008
The quantity of malware found is growing rapidly (graph has a logarithmic scale)
According to AV-Tests Andreas Marx Since 2004 the level of growth has gone through the roof
Even the best signature databases have less than a 50% chance of catching
completely new threats. Signatures are extremely ineffective against targeted and
zero day threats.
According to Gartner - December, 2007
Nobody can win the war against malware with a signature-driven product, but more
proactive technologies are required
According to AV-Tests Andreas Marx
SLIDE 3
Viruses
Removable
Media
Email worms
Exploit worms
Script Kiddies
Rootkits
Email
Attachmen
ts
Backdoor Trojans
Instant
Messaging
Clients
SLIDE 4
Viruses
Hackers
Email worms
Exploit worms
P2P worms
Organized Crime
IM worms
Legitimate, Compromised
Multi-media Websites
Removable
Media
P2P
Networks
Phishing
Rootkits
Backdoor Trojans
Legitimate Businesses
Spyware
Mobile
Devices
SPAM Email
Attachmen
Public WiFi
ts
Networks
Adware
Foreign Governments
SLIDE 5
Greyware
Web 2.0
Applications
"Even
"Even the
the best
best
signature
signature databases
databases
have
have less
less than
than aa 50%
50%
chance of
of catching
catching
heuristics chance
completely
completely new
new
threats.
threats. Signatures
Signatures are
are
extremely
extremely ineffective
ineffective
against
against targeted
targeted and
and
the PC
zero-day
zero-day threats."
threats."
False Positives
Traditional content-based
susceptible
Security vs. Performance
Emulation can slow down
Users do not want to sacrifice
performance
Portability
The same engine cannot usually be
SLIDE run
6
on all platforms and OS
According
According to
to Gartner
Gartner -December,
December, 2007
2007
SLIDE 7
0010 B8 00 00 00 00 00 00 00
40 00 00
0020 00 00 00 00 00 00 00 00
00 00 00
0030 00 00 00 00 00 00 00 D0
00 00 4C
0040 OE IF EA OE 09 CD 21 B8
01 4C CD
0010 B8 00 00 00 00 00 00 00
40 00 00
0020 00 00 00 00 00 00 00 00
00 00 00
0030 00 00 00 00 00 00 00 D0
00 00 4C
0040 OE IF EA OE 09 CD 21 B8
01 4C CD
Increased
Detection
SLIDE 8
Home
User
Laptops
&
Netbooks
Home User
Desktops
SLIDE 10
D e f e to
n sProtect
e in D
e p t h Diverse Attack
Defense in Depth
Against
Vectors
ENDPOINT
CRITICAL
GATEWAY
SERVICES
Messaging
SLIDE
11
PROTECTION
SERVERS
systems,
desktops, and critical
File Servers all
CRITICAL
SERVERS
Network Gateways
Onsite Users
File Servers
Email Servers
Remote &
Roaming Users
Collaboration
Servers
SLIDE 12
System
Vulnerabilities
Phishing
Instant
Messaging
Removable
Media &
Network
Shares
Worms and
Network
Attacks
Viruses
SLIDE 13
SPAM
Spyware
GATEWAY
SERVICES
ENDPOINT
PROTECTION
CRITICAL
SERVERS
SLIDE
15
Management
Features
Customizable
SLIDE
16
Export Reports
Reports available in text or HTML formats
SLIDE 17
Master Mgmt.
Server
Remote
Office A
Internet
Headquarters
Slave Server
Slave Server
Regional
Office
Remote
Office B
Parallel Deployment
Maintains Reliability and
Faster Response
Client Profiles
Power clients with unrestricted interface access
Restricted clients with limited interface access
SLIDE 20
Centralized
Management
SLIDE 21
Summary
BitDefenders Business Solutions Leverage AwardWinning Consumer Detection Technology
End-to-End Malware Protection For SMB Networks
Windows centric platform strategy
Multi-platform solutions for heterogeneous environments
Gateway, server & endpoint configuration, auditing and
management
Manage clients in remote subnets from a single central server
Centralized license management
Remote
install /solutions
uninstall of endpoint
software
Proactive
Protection
at the
to emerging
of life.
Centralized
reporting, alerting andspeed
updates
threats.
Thank You!