to Internet Threats

18
to Internet Threats The Global Leader IN REACTION TIME

description

The Global Leader. IN REACTION TIME. to Internet Threats. About Kaspersky Lab. International leader in internet security More than 200 million protected users worldwide 5 R&D and virus labs worldwide 650 employees, 1 50 developers & engineers Direct operations in 11 countries - PowerPoint PPT Presentation

Transcript of to Internet Threats

Page 1: to Internet Threats

to Internet Threatsto Internet Threats

The Global LeaderThe Global LeaderIN REACTION TIMEIN REACTION TIME

Page 2: to Internet Threats

2

About Kaspersky LabAbout Kaspersky Lab

• International leader in internet security

• More than 200 million protected users worldwide

• 5 R&D and virus labs worldwide

• 650 employees, 150 developers & engineers

• Direct operations in 11 countries

• North American headquarters in Massachusetts

• International leader in internet security

• More than 200 million protected users worldwide

• 5 R&D and virus labs worldwide

• 650 employees, 150 developers & engineers

• Direct operations in 11 countries

• North American headquarters in Massachusetts

Page 3: to Internet Threats

3

Kaspersky Technology InsideKaspersky Technology InsideMore than 100 OEM Partners

Page 4: to Internet Threats

Internet CrimeInternet CrimeIS ON THE RISE

Page 5: to Internet Threats

5

Data From the LabData From the Lab

Source: The Kaspersky Internet Security Lab Source: The Kaspersky Internet Security Lab

Page 6: to Internet Threats

6

Standard Automated Hourly Updates!

Standard Automated Hourly Updates!

Source: Vendor DataSource: Vendor Data

Page 7: to Internet Threats

7Source: Av-Test.orgSource: Av-Test.org

Size Does MatterSize Does Matter

Page 8: to Internet Threats

8Source: Av-Test.orgSource: Av-Test.org

#1 in Virus Outbreak Response#1 in Virus Outbreak Response

Page 9: to Internet Threats

9

#1 In Detection Rates* #1 In Detection Rates*

* www.av-comparatives.org* www.av-comparatives.org

Kaspersky Lab is the leader in detecting viruses, spyware, and other malicious programs

Kaspersky Lab (KAV) 99.57%

ESET (NOD32 Anti-Virus) 97.89%

Symantec (Norton Anti-Virus) 97.61%

McAfee (McAfee VirusScan) 96.41%

GeCAD Software (RAV Desktop) 94.05%

Softwin (BitDefender Prof+) 93.08%

Trend Micro (Internet Security) 91.25%

H+BEDV (AntiVir Prof.) 91.09%

GriSoft (AVG Professional) 90.47%

Alwil Software (Avast! Prof.) 89.24%

Doctor Web (Dr Web) 83.91%

Frisk Software (F-Prot Anti-Virus) 83.91%

Sophos (Sophos Anti-Virus) 90.10%

Page 10: to Internet Threats

10

Rated #1 in Spyware DetectionRated #1 in Spyware Detection

Page 11: to Internet Threats

11

Introducing Version 6.0Introducing Version 6.0Introducing Version 6.0Introducing Version 6.0

Page 12: to Internet Threats

12

Advanced Virus ScanningAdvanced Virus Scanning

• Scanning optimization and acceleration: iSwift™ and iChecker™

• Automated load balancing

• Compound objects scanning

• SafeStream™ scanning of HTTP traffic

• Automated system restoration

• Advanced disinfection

• Self defense technology

• Scanning optimization and acceleration: iSwift™ and iChecker™

• Automated load balancing

• Compound objects scanning

• SafeStream™ scanning of HTTP traffic

• Automated system restoration

• Advanced disinfection

• Self defense technology

Page 13: to Internet Threats

13

Advanced Antivirus UpdatingAdvanced Antivirus Updating

• Synchronized antivirus database

• Automatic updating mode

• Automatic load balancing and update speed optimization

• Update rollback technology

• Synchronized antivirus database

• Automatic updating mode

• Automatic load balancing and update speed optimization

• Update rollback technology

Page 14: to Internet Threats

14

Proactive ProtectionProactive Protection

• Anti-Rootkit detection

• Behavior blocking

• Roll back

• Heuristic analysis

• Integrity verification

• Virus epidemic prevention

• Anti-Rootkit detection

• Behavior blocking

• Roll back

• Heuristic analysis

• Integrity verification

• Virus epidemic prevention

Page 15: to Internet Threats

15

Spyware ProtectionSpyware Protection

• System restoration technology removes traces of spyware from the registry and file system

• Anti-phishing technology protects against scam emails

• Anti-banner technology blocks unsolicited advertising

• Anti-popup technology protects against pop-ups that exploit browser vulnerabilities

• JavaScript and VBScript blocking loaded from internet pages

• Anti-dialer technology blocks unauthorized modem connections

• System restoration technology removes traces of spyware from the registry and file system

• Anti-phishing technology protects against scam emails

• Anti-banner technology blocks unsolicited advertising

• Anti-popup technology protects against pop-ups that exploit browser vulnerabilities

• JavaScript and VBScript blocking loaded from internet pages

• Anti-dialer technology blocks unauthorized modem connections

Page 16: to Internet Threats

16

Hacker ProtectionHacker Protection

• Firewall technology filters all incoming and outgoing traffic at the packet and application levels

• Intrusion detection system (IDS) monitors network traffic for common network attacks

• Stealth Mode technology protects computers against any detection from outside the network

• Firewall technology filters all incoming and outgoing traffic at the packet and application levels

• Intrusion detection system (IDS) monitors network traffic for common network attacks

• Stealth Mode technology protects computers against any detection from outside the network

Page 17: to Internet Threats

17

Spam ProtectionSpam Protection

• Email dispatcher

• Address and phrase black and white lists

• Self-modifying spam detection

• Graphics object imaging analysis

• Message header analysis

• Email dispatcher

• Address and phrase black and white lists

• Self-modifying spam detection

• Graphics object imaging analysis

• Message header analysis

Page 18: to Internet Threats

18

to Internet Threatsto Internet Threats

The Global LeaderThe Global LeaderIN REACTION TIMEIN REACTION TIME