to Internet Threats
description
Transcript of to Internet Threats
to Internet Threatsto Internet Threats
The Global LeaderThe Global LeaderIN REACTION TIMEIN REACTION TIME
2
About Kaspersky LabAbout Kaspersky Lab
• International leader in internet security
• More than 200 million protected users worldwide
• 5 R&D and virus labs worldwide
• 650 employees, 150 developers & engineers
• Direct operations in 11 countries
• North American headquarters in Massachusetts
• International leader in internet security
• More than 200 million protected users worldwide
• 5 R&D and virus labs worldwide
• 650 employees, 150 developers & engineers
• Direct operations in 11 countries
• North American headquarters in Massachusetts
3
Kaspersky Technology InsideKaspersky Technology InsideMore than 100 OEM Partners
Internet CrimeInternet CrimeIS ON THE RISE
5
Data From the LabData From the Lab
Source: The Kaspersky Internet Security Lab Source: The Kaspersky Internet Security Lab
6
Standard Automated Hourly Updates!
Standard Automated Hourly Updates!
Source: Vendor DataSource: Vendor Data
7Source: Av-Test.orgSource: Av-Test.org
Size Does MatterSize Does Matter
8Source: Av-Test.orgSource: Av-Test.org
#1 in Virus Outbreak Response#1 in Virus Outbreak Response
9
#1 In Detection Rates* #1 In Detection Rates*
* www.av-comparatives.org* www.av-comparatives.org
Kaspersky Lab is the leader in detecting viruses, spyware, and other malicious programs
Kaspersky Lab (KAV) 99.57%
ESET (NOD32 Anti-Virus) 97.89%
Symantec (Norton Anti-Virus) 97.61%
McAfee (McAfee VirusScan) 96.41%
GeCAD Software (RAV Desktop) 94.05%
Softwin (BitDefender Prof+) 93.08%
Trend Micro (Internet Security) 91.25%
H+BEDV (AntiVir Prof.) 91.09%
GriSoft (AVG Professional) 90.47%
Alwil Software (Avast! Prof.) 89.24%
Doctor Web (Dr Web) 83.91%
Frisk Software (F-Prot Anti-Virus) 83.91%
Sophos (Sophos Anti-Virus) 90.10%
10
Rated #1 in Spyware DetectionRated #1 in Spyware Detection
11
Introducing Version 6.0Introducing Version 6.0Introducing Version 6.0Introducing Version 6.0
12
Advanced Virus ScanningAdvanced Virus Scanning
• Scanning optimization and acceleration: iSwift™ and iChecker™
• Automated load balancing
• Compound objects scanning
• SafeStream™ scanning of HTTP traffic
• Automated system restoration
• Advanced disinfection
• Self defense technology
• Scanning optimization and acceleration: iSwift™ and iChecker™
• Automated load balancing
• Compound objects scanning
• SafeStream™ scanning of HTTP traffic
• Automated system restoration
• Advanced disinfection
• Self defense technology
13
Advanced Antivirus UpdatingAdvanced Antivirus Updating
• Synchronized antivirus database
• Automatic updating mode
• Automatic load balancing and update speed optimization
• Update rollback technology
• Synchronized antivirus database
• Automatic updating mode
• Automatic load balancing and update speed optimization
• Update rollback technology
14
Proactive ProtectionProactive Protection
• Anti-Rootkit detection
• Behavior blocking
• Roll back
• Heuristic analysis
• Integrity verification
• Virus epidemic prevention
• Anti-Rootkit detection
• Behavior blocking
• Roll back
• Heuristic analysis
• Integrity verification
• Virus epidemic prevention
15
Spyware ProtectionSpyware Protection
• System restoration technology removes traces of spyware from the registry and file system
• Anti-phishing technology protects against scam emails
• Anti-banner technology blocks unsolicited advertising
• Anti-popup technology protects against pop-ups that exploit browser vulnerabilities
• JavaScript and VBScript blocking loaded from internet pages
• Anti-dialer technology blocks unauthorized modem connections
• System restoration technology removes traces of spyware from the registry and file system
• Anti-phishing technology protects against scam emails
• Anti-banner technology blocks unsolicited advertising
• Anti-popup technology protects against pop-ups that exploit browser vulnerabilities
• JavaScript and VBScript blocking loaded from internet pages
• Anti-dialer technology blocks unauthorized modem connections
16
Hacker ProtectionHacker Protection
• Firewall technology filters all incoming and outgoing traffic at the packet and application levels
• Intrusion detection system (IDS) monitors network traffic for common network attacks
• Stealth Mode technology protects computers against any detection from outside the network
• Firewall technology filters all incoming and outgoing traffic at the packet and application levels
• Intrusion detection system (IDS) monitors network traffic for common network attacks
• Stealth Mode technology protects computers against any detection from outside the network
17
Spam ProtectionSpam Protection
• Email dispatcher
• Address and phrase black and white lists
• Self-modifying spam detection
• Graphics object imaging analysis
• Message header analysis
• Email dispatcher
• Address and phrase black and white lists
• Self-modifying spam detection
• Graphics object imaging analysis
• Message header analysis
18
to Internet Threatsto Internet Threats
The Global LeaderThe Global LeaderIN REACTION TIMEIN REACTION TIME