G data 10 nov 2010
-
Upload
agora-group -
Category
Documents
-
view
191 -
download
1
description
Transcript of G data 10 nov 2010
![Page 1: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/1.jpg)
G Data Presentation
Bucharest 2010
![Page 2: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/2.jpg)
Welcome.
Costin PecinginaG Data Representative
![Page 3: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/3.jpg)
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
![Page 4: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/4.jpg)
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
![Page 5: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/5.jpg)
• Founded 1985 in Germany
• 300 employees world wide
• Offices in 13 countries: Germany (HQ), USA, Canada, Japan, China, UK, France, Italy, Spain, BeNeLux, Poland and Russia
• Sales Partners in more than 90 countries
• G Data solutions globally available
G Data Overview
![Page 6: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/6.jpg)
The IT-Security Pioneer
1987 First AntiVirus world wide
1990 First AV with graphical user interface
1995 First AV Hardware Protection
1999 First Linux based BootScan
2005 First AV with Cloud Security
2007 First Silent Firewall
2008 First Fingerprinting for top performance
![Page 7: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/7.jpg)
Member of the ITSMIG association
Under the patronage of
![Page 8: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/8.jpg)
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
![Page 9: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/9.jpg)
• DoubleScan: 2 independent Scanning Enginesfor unique 99+ Warantee
• Fastest reaction time on new threats
• Fingerprinting prevents from unnecessaryscans to save performance
• Whitelisting of known files prevents from False Positives
Reactive Protection
Jan
08
Fe
b 0
8M
ar
08
Ap
r 0
8M
ay 0
8Ju
n 0
8Ju
n 0
8Ju
l 0
8A
ug
08
Se
p 0
8O
ct 0
8N
ov 0
8D
ec
08
Jan
09
Fe
b 0
9M
ar
09
Ap
r 0
9M
ay 0
9Ju
n 0
9Ju
l 0
9A
ug
09
Se
p 0
9O
ct 0
9N
ov 0
9D
ec
09
Jan
10
Jan
10
Ma
r 1
0M
ar
10
Ap
r 1
0M
ay 1
0Ju
n 1
0Ju
l 1
0A
ug
10
90%
92%
94%
96%
98%
100%
G Data
Kaspersky
Symantec
Mc Afee
Trend Micro
Reactive detection(Source: AV-Test)
G DataKaspersky
SymantecMc Afee
Trend Micro
0
100
200
300
400
500
600
Average reaction time on new threats(Source: Computer BILD)
7h 11min
9h 19min
55min19min
3h 20min
![Page 10: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/10.jpg)
• Proactive Protection with Behaviour Blockingand several heuristics methods
• OutbreakShield: Mail based cloud security detects mass mailings such as virus outbreaks or spam attacks using statistical methodology
• Web based Cloud Security: server based URLblack lists for real time protection
Real Time Protection
Mc AfeeSymantec
KasperskyF-Secure
MS Forefront
AVG Trustport
Sophos
Redstone
Avira
G Data
80,00%
85,00%
90,00%
95,00%
100,00%
40,00% 50,00% 60,00% 70,00% 80,00% 90,00% 100,00%
Reactive Detection vs. Proactive Detection(Source: Virus Bulletin)
Reac
tive
Det
ectio
n Ra
te
Proactive Detection Rate
![Page 11: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/11.jpg)
Certifications achieved
Awards
Certifications and Awards
G Data is the world‘s leading test winner
![Page 12: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/12.jpg)
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
![Page 13: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/13.jpg)
G Data Desktop Solutions
![Page 14: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/14.jpg)
AntiMalware / AntiSpyware
Firewall / AntiSpam
Parental Control
Backup / Tuning
![Page 15: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/15.jpg)
G Data Desktop Solutions
Available now
![Page 16: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/16.jpg)
GfK TrendSetter - Germany
Computer-Software
Period : 11. - 17. October 2010 (Week 41)
GfK-TOP 10
NON-GAMES
Rank
Previous Current
Week Week Title Brand
1 1 OFFICE HOME AND STUDENT 2010 MICROSOFT
4 2 INTERNET SECURITY 2011 3 USER 25th ANNIVERSARY VERSION G DATA
3 3 INTERNET SECURITY 2011 KASPERSKY LAB
6 4 WINDOWS 7 HOME PREMIUM 64-BIT SB-VERSION MICROSOFT
5 5 INTERNET SECURITY 2011 UPDATE KASPERSKY LAB
8 6 INTERNET SECURITY 2011 3 USER UPDATE KASPERSKY LAB
10 7 WINDOWS 7 HOME PREMIUM 32-BIT SB-VERSION MICROSOFT
7 8 NORTON INTERNET SECURITY 2011 3 USER SYMANTEC
9 9 NORTON INTERNET SECURITY 2011 SYMANTEC
2 10 ANTI-VIRUS 2011 3 USER LIMITED EDITION KASPERSKY LAB
![Page 17: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/17.jpg)
G Data Business Solutions
![Page 18: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/18.jpg)
Management Server
AntiVirus Client
Firewall and AntiSpam Client
Mail Security
Remote control: installation, virus scans, updates, settingsFully automated virus scans and updates (pull-push)Fully invisible malware protection – no client interactionFor Windows and Linux2 way Firewall: Invisible protection against hacker attacksAntiSpam: Content independent real time protectionMail server independent mail gatewayProtection against malware, spam and phishing
![Page 19: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/19.jpg)
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
![Page 20: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/20.jpg)
IT Security strikes out in a new direction.
![Page 21: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/21.jpg)
![Page 22: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/22.jpg)
Web 2.0 platforms (blogs, forum entries)
Social networks (Facebook, MySpace, Twitter)
Manipulated hot topic search results
Links in instant messengers and chats
Phishing through online auctions
File sharing and file hosting
Modern Sources of attack
![Page 23: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/23.jpg)
Web 2.0 platforms (blogs, forum entries)
Social networks (Facebook, MySpace, Twitter)
Manipulated hot topic search results
Links in instant messengers and chats
Phishing through online auctions
File sharing and file hosting
Modern Souces of attack
No problem for companies…??
![Page 24: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/24.jpg)
2/3 of all Internet use in the workplace is for private reasons.(Source: Berlin Audit Court)
![Page 25: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/25.jpg)
![Page 26: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/26.jpg)
Financial harm
Loss of manpowerEconomic damage in Germany:Over 50 billion euros(Source: Berlin Audit Court)
![Page 27: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/27.jpg)
Security risks
Infiltration of new malware
IT infrastructure damage due to unauthorised software
Loss / theft of sensitive data
![Page 28: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/28.jpg)
Legal risks (German Law)
Joint responsibility for copyright infringements (pirate copies, MP3…)
If trade secrets are published
If personal data is made accessible to the public
![Page 29: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/29.jpg)
ESSENTIAL: the policy
Written definition of the content and extent of private Internet use
Use of software to ensure adherence to the policy
![Page 30: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/30.jpg)
AntiVirus / Firewall / AntiSpam
PolicyManager:
Device controlApplication controlContent FilterInternet use control
G Data EndpointProtection
![Page 31: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/31.jpg)
USB mass storage devices / hard disks
CD- / DVD- / floppy drives
Can be certified by administrator
Device control
![Page 32: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/32.jpg)
Whitelist or blacklist
Many applications predefined (file sharing, games, Messenger, etc.)
Application control
![Page 33: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/33.jpg)
80 different categories, e.g.:Chats / forums / blogsOnline auctions / job search sitesGambling / gaming…
Content Filter
![Page 34: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/34.jpg)
Definable Internet lock out times
Usage times can be limited per day, week and month
Internet use control
![Page 35: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/35.jpg)
Market survey
![Page 36: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/36.jpg)
Device control
Application control
Web / URL filter
Internet use control
Symantec Endpoint Protection
Sophos Endpoint
Security & Control
Kaspersky Antivirus
6.0
McAfee Protection
for Endpoint
Trend Micro Worry Free Business Security
G Data Endpoint Protection
Only Whitelist
Only Whitelist
Only Blacklist
![Page 37: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/37.jpg)
Best protection against malware, hackers and spam
Legal security for usage of corporate PCs
Significant improve of productivity
Easy administration thanks to unique all-in-one solution
G Data EndpointProtection advantages
![Page 38: G data 10 nov 2010](https://reader037.fdocuments.in/reader037/viewer/2022110115/54baab494a79597a308b4693/html5/thumbnails/38.jpg)
Thank you.