BitDefender MAXIMUM SECURITY. MAXIMUM SPEED. Business Solutions Overview Commercial Presentation SLIDE 1 BitDefender at a Glance • Founded in 2001 • A Leader in Proactive Anti-Malware Solutions • Technology Used by OEM Partners and Tens of Millions of Customers Worldwide • Distribution in over 100 countries • Nine International Sales Offices • Product Available in 18 Languages SLIDE 2 Magnitude of the Problem 20,000,000 16,000,000 12,000,000 In 2008 more than half a million malware samples were discovered every month! 8,000,000 4,000,000 0 1998 • 2003 2008 Source: av-test.org –Sample Collection Growth Source: AV-Test Labs (www.av-test.org) “The quantity of malware found is growing rapidly (graph has a logarithmic scale)” According to AV-Test’s Andreas Marx “Since 2004 the level of growth has gone through the roof” • “Even the best signature databases… have less than a 50% chance of catching completely new threats. Signatures are extremely ineffective against targeted and “zero day” threats.” According to Gartner - December, 2007 • “Nobody can win the war against malware with a signature-driven product, but more proactive technologies are required ” According to AV-Test’s Andreas Marx SLIDE 3 Threat Landscape - Past Sources of Attack Types of Threats Viruses Proliferation Mediums Removable Media Email worms Exploit worms Script Kiddies Rootkits Email Attachments Backdoor Trojans Instant Messaging Clients SLIDE 4 Internet Threat Landscape - Present Sources of Attack Types of Threats Proliferation Mediums Instant Messaging Clients Viruses Hackers Email worms Exploit worms Legitimate, Compromised Multi-media Websites P2P worms Organized Crime IM worms Phishing P2P Networks Rootkits Backdoor Trojans Legitimate Businesses Spyware Mobile Devices Public WiFi Networks Removable Media SPAM Email Attachments Adware Foreign Governments SLIDE 5 Greyware Web 2.0 Applications The Challenges of Proactive Protection The Promise: • Real-time proactive protection from malware threats, without the need for frequent signature updates. The Historical Reality: • False Positives – Traditional content-based heuristics susceptible • Security vs. Performance – Emulation can slow down the PC – Users do not want to sacrifice performance • Portability – The same engine cannot usually be run on all platforms and OS SLIDE 6 "Even the best signature databases have less than a 50% chance of catching completely new threats. Signatures are extremely ineffective against targeted and zero-day threats." According to Gartner - December, 2007 Award Winning Detection Engine is Key • BitDefender provides a common detection and disinfection engine across all business products • Engines are further customized for specific platforms or application; i.e. URL and Content Inspection • On average, BitDefender detects and shields against 120,000 new e-threats per month • More than 4,000 new signatures are added to the BitDefender antivirus database every day • BitDefender customers get around-the-clock protection with more than 16 updates per day • BitDefender’s success in detection has led to it’s adoption by other leading Antivirus vendors SLIDE 7 How The Scanning Process Works… • Signature-based pattern matching on known virus code 0010 B8 00 00 00 00 00 00 00 40 00 00 0020 00 00 00 00 00 00 00 00 00 00 00 0030 00 00 00 00 00 00 00 D0 00 00 4C 0040 OE IF EA OE 09 CD 21 B8 01 4C CD 0010 B8 00 00 00 00 00 00 00 40 00 00 0020 00 00 00 00 00 00 00 00 00 00 00 0030 00 00 00 00 00 00 00 D0 00 00 4C 0040 OE IF EA OE 09 CD 21 B8 01 4C CD • Half a million new and variant strains emerging every month, signature engines have trouble keeping pace • Heuristics detect behaviors beyond the known actions of legitimate applications Increased Detection SLIDE 8 • Able to detect and block “Zero Day” threats without referencing a signature or fingerprint that has yet to be released Highly Accurate Antispam Technology • Heuristic NeuNet filtering technology for SPAM • Cloud-based RBL reputation list for improved detection • Advanced image spam filter analyzing text within images and learns the common characteristics • BitDefender analyzes and issues protection for 5 million spam messages every day – Or about 35 million spam mails per week • BitDefender continuously ranked top in Virus Bulletin’s (VB) tests for SPAM - sixth VBSpam award in a row Source: Virus Bulletin – BitDefender Security for Mail Servers 3.0.2 (March 2010) SLIDE 9 Flexible Solutions for Consumers and SOHO Home User Laptops & Netbooks Home User Desktops SLIDE 10 Security for Small and Medium Businesses • Most Antivirus Solutions are Complex and Over Engineered – Small to Medium Businesses have less complex network requirements – Customers paying for features they don’t use / need – Non-dedicated IT resources lack domain experience • Single Solution Vendor Provides Resource and Cost Benefits – Secure Windows centric or heterogeneous networking environments – Streamlines procurement, deployment, management and support • Defense in Depth to Protect Against Diverse Attack Vectors – Messaging systems, desktops, and critical File Servers all provide an entry point for malware to infect the network Defense in Depth GATEWAY SERVICES ENDPOINT PROTECTION SLIDE 11 CRITICAL SERVERS Business Solutions Overview CENTRALIZED MANAGEMENT GATEWAY SERVICES ENDPOINT PROTECTION CRITICAL SERVERS Network Gateways Onsite Users File Servers Email Servers Remote & Roaming Users Collaboration Servers SLIDE 12 Business Users Are Under Attack Email Attachments Trojans & Rootkits System Vulnerabilities Phishing Instant Messaging Removable Media & Network Shares Worms and Network Attacks Viruses SLIDE 13 SPAM Spyware BitDefender Centralized Management • Scalable Master-Slave Architecture – Management of gateway, server and endpoint solutions located in different physical locations • Network Visibility and Remote Administration – Displays system deployment and related threat information – On-demand problem resolution • Configurable Security Policies – Pre-defined templates to aid policy enforcement – Network detection of unprotected endpoints with automatic client distribution and installation – Maintains remote and roaming user compliance even when endpoints are offline • Integrates with Active Directory – Leverages the organizations existing Windows domain structure and group policies SLIDE 14 Management Console Overview Managed Platforms GATEWAY SERVICES ENDPOINT PROTECTION CRITICAL SERVERS SLIDE 15 Management Features Server and Endpoint Management • Integrated Network Management Capabilities – Microsoft’s version of Web-Based Enterprise Management (WBEM) Scripting Language for Endpoint and Servers • Over 30 Predefined WMI Script Templates Included – Hundreds of Publically Available Scripts for Mass, Automated Remote Management; • • • • Kill applications and processes Install and uninstall software (including other AV solutions) Restart or shutdown workstations Enable/disable autoruns and USB removable media access • Customizable Client / Server Installation Packages – Select installation features and disable unwanted functionality – Scan system prior to Installation SLIDE 16 Reports and Statistics • Set of Predefined Reports – Infections, disinfections and quarantined files • Virus Scanning Statistics – Daily, Weekly and Monthly – User specified time period • Wizard Based Reports – Shortlist for the last 20 reports defined • Export Reports – Reports available in text or HTML formats • License Reporting and Management – License usage, inactive clients and deployed license thresholds SLIDE 17 Master / Slave Management Architecture Slave Server Master Mgmt. Server Remote Office A Headquarters Internet Slave Server Slave Server Regional Office Remote Office B • Centralized Policy, Product and Update Synchronization SLIDE 18 • Parallel Deployment Maintains Reliability and Faster Response BitDefender Client Security • Industry Leading Proactive Protection – viruses, spyware, rootkits, spam, phishing and other malware • Small Memory Footprint – Optimized server-client communication – Minimal impact on system performance • Client Profiles – Power clients with unrestricted interface access – Restricted clients with limited interface access • Business Productivity Through Administrative Control – Sets restrictions against unsafe or undesirable Web sites and user level applications – Blocks e-mail messages based on key words – Limits Internet access for specific periods of time SLIDE 19 Client Protection and Management Proactive Protection SLIDE 20 Centralized Management The Experts Agree Number one rated Internet Security software. Consumer Reports – September 2008 Number one rated antivirus software. Consumer Reports – September 2006 Rated the most effective antivirus solution and one of the top 100 products of the year. PC World - March 2006 and May 2006 Rated one of the top 100 privately held European companies. Red Herring - May 2006 Nominated for Best Software award. Gartner RetailVision – September 2006 SLIDE 21 Industry Awards and Certifications VBSpam Comparative Anti-spam Test- May 2009 • VB 100 Award, Virus Bulletin, UK- April 2009 • Best Buy and Editor’s Choice, Personal Computer World, UK- January 2009 • Advanced Plus, AV-Comparatives.org- October 2008 • “Buy It!”, Computer Active, UKOctober 2008 • Recommended, IT Reviews, UK- October 2008 • Best Value, WinmagPro, Netherlands- October 2008 • Gold Award, PC Guia, Portugal- October 2008 • Editor’s Choice, PC Utilities, UK- September 2008 • Number One, Consumer Reports, USA- August 2008 • VB 100 Award, Virus Bulletin, UK- February 2008 • VB 100 Award, Virus Bulletin, UK- June 2008 • Test Winner, PC Games, Germany- February 2008 • Test Winner and Best Buy, Online PC, Switzerland- January 2008 • VB 100 Award, Virus Bulletin, UK- December 2007 • Budget-Tipp Distinction, Windows Vista, Germany- December 2007 • Gold Medal, PC Guia, Portugal- December 2007 • Price Tip and Test Winner, com!, GermanyDecember 2007 • Editor’s Choice, WHAT LAPTOP, UK- December 2007 • Editor’s Choice, Windows News, France- November 2007 • Recommendation, PC Today, Spain- December 2007 • Recommendation, IT Reviews, UK- November 2007 • Ubuntu’s Linux ComplianceOctober 2007 • Novell’s Linux Compliance- October 2007 • Red Hat Ready Linux Compliance- September 2007 • Gold Rating, PC Advisor, UK- September 2007 • Advanced Plus, av-comparatives.org, Austria- August 2007 • VB 100 Award, Virus Bulletin, UK- June 2007 • Premium Checkpoint Award, West Coast Labs, UK- November 2006 SLIDE 22 Summary • BitDefender’s Business Solutions Leverage Award-Winning Consumer Detection Technology • End-to-End Malware Protection For SMB Networks – – – – – – – Windows centric platform strategy Multi-platform solutions for heterogeneous environments Gateway, server & endpoint configuration, auditing and management Manage clients in remote subnets from a single central server Centralized license management RemoteProactive install /solutions uninstalltoof endpoint softwareat the speed Protection emerging threats. Centralized reporting, alerting and updates of life. • Cost and Resource Effective Solutions – Simplifies the complexity of managing Business AV solutions – Hourly updates help maintain network integrity SLIDE 23 Thank You! sales@bitdefender.co.nz BitDefender Business Security www.bitdefender.co.nz SLIDE 24