BitDefender Business Solutions Overview

advertisement
BitDefender
MAXIMUM SECURITY. MAXIMUM SPEED.
Business Solutions Overview
Commercial Presentation
SLIDE 1
BitDefender at a Glance
• Founded in 2001
• A Leader in Proactive Anti-Malware Solutions
• Technology Used by OEM Partners and Tens of Millions of
Customers Worldwide
• Distribution in over 100 countries
• Nine International Sales Offices
• Product Available in 18 Languages
SLIDE 2
Magnitude of the Problem
20,000,000
16,000,000
12,000,000
In 2008 more than half a million
malware samples were
discovered every month!
8,000,000
4,000,000
0
1998
•
2003
2008
Source: av-test.org –Sample Collection Growth
Source: AV-Test Labs (www.av-test.org)
“The quantity of malware found is growing rapidly (graph has a logarithmic scale)”
According to AV-Test’s Andreas Marx “Since 2004 the level of growth has gone through the roof”
•
“Even the best signature databases… have less than a 50% chance of catching completely new threats.
Signatures are extremely ineffective against targeted and “zero day” threats.”
According to Gartner - December, 2007
•
“Nobody can win the war against malware with a signature-driven product, but more proactive technologies
are required ”
According to AV-Test’s Andreas Marx
SLIDE 3
Threat Landscape - Past
Sources of Attack
Types of Threats
Viruses
Proliferation Mediums
Removable
Media
Email worms
Exploit worms
Script Kiddies
Rootkits
Email
Attachments
Backdoor Trojans
Instant Messaging
Clients
SLIDE 4
Internet Threat Landscape - Present
Sources of Attack
Types of Threats
Proliferation Mediums
Instant Messaging
Clients
Viruses
Hackers
Email worms
Exploit worms
Legitimate, Compromised
Multi-media Websites
P2P worms
Organized Crime
IM worms
Phishing
P2P Networks
Rootkits
Backdoor Trojans
Legitimate Businesses
Spyware
Mobile
Devices
Public WiFi
Networks
Removable
Media
SPAM Email
Attachments
Adware
Foreign Governments
SLIDE 5
Greyware
Web 2.0 Applications
The Challenges of Proactive Protection
The Promise:
• Real-time proactive protection from malware threats, without the
need for frequent signature updates.
The Historical Reality:
• False Positives
– Traditional content-based heuristics susceptible
• Security vs. Performance
– Emulation can slow down the PC
– Users do not want to sacrifice performance
• Portability
– The same engine cannot usually be run on all
platforms and OS
SLIDE 6
"Even the best signature
databases have less than a
50% chance of catching
completely new threats.
Signatures are extremely
ineffective against targeted
and zero-day threats."
According to Gartner - December,
2007
Award Winning Detection Engine is Key
• BitDefender provides a common detection and
disinfection engine across all business products
• Engines are further customized for specific platforms
or application; i.e. URL and Content Inspection
• On average, BitDefender detects and shields against 120,000 new
e-threats per month
• More than 4,000 new signatures are added to the BitDefender
antivirus database every day
• BitDefender customers get around-the-clock protection with more
than 16 updates per day
• BitDefender’s success in detection has led to it’s adoption by other
leading Antivirus vendors
SLIDE 7
How The Scanning Process Works…
• Signature-based pattern
matching on known virus
code
0010 B8 00 00 00 00 00 00 00 40 00 00
0020 00 00 00 00 00 00 00 00 00 00 00
0030 00 00 00 00 00 00 00 D0 00 00 4C
0040 OE IF EA OE 09 CD 21 B8 01 4C CD
0010 B8 00 00 00 00 00 00 00 40 00 00
0020 00 00 00 00 00 00 00 00 00 00 00
0030 00 00 00 00 00 00 00 D0 00 00 4C
0040 OE IF EA OE 09 CD 21 B8 01 4C CD
• Half a million new and
variant strains emerging
every month, signature
engines have trouble
keeping pace
• Heuristics detect behaviors
beyond the known actions
of legitimate applications
Increased Detection
SLIDE 8
• Able to detect and block
“Zero Day” threats without
referencing a signature or
fingerprint that has yet to
be released
Highly Accurate Antispam Technology
• Heuristic NeuNet filtering technology for SPAM
• Cloud-based RBL reputation list for improved detection
• Advanced image spam filter analyzing text within
images and learns the common characteristics
• BitDefender analyzes and issues protection for 5 million spam
messages every day
– Or about 35 million spam mails per week
• BitDefender continuously ranked top in Virus Bulletin’s (VB)
tests for SPAM - sixth VBSpam award in a row
Source: Virus Bulletin – BitDefender Security for Mail Servers 3.0.2 (March 2010)
SLIDE 9
Flexible Solutions for Consumers and SOHO
Home User
Laptops &
Netbooks
Home User
Desktops
SLIDE 10
Security for Small and Medium Businesses
• Most Antivirus Solutions are Complex and Over Engineered
– Small to Medium Businesses have less complex network requirements
– Customers paying for features they don’t use / need
– Non-dedicated IT resources lack domain experience
• Single Solution Vendor Provides Resource and Cost Benefits
– Secure Windows centric or heterogeneous networking environments
– Streamlines procurement, deployment, management and support
• Defense in Depth to Protect Against Diverse Attack Vectors
– Messaging systems, desktops, and critical File Servers all provide an
entry point for malware to infect the network
Defense in Depth
GATEWAY SERVICES ENDPOINT PROTECTION
SLIDE 11
CRITICAL SERVERS
Business Solutions Overview
CENTRALIZED MANAGEMENT
GATEWAY SERVICES
ENDPOINT PROTECTION
CRITICAL SERVERS
Network Gateways
Onsite Users
File Servers
Email Servers
Remote &
Roaming Users
Collaboration
Servers
SLIDE 12
Business Users Are Under Attack
Email Attachments
Trojans
&
Rootkits
System
Vulnerabilities
Phishing
Instant
Messaging
Removable
Media &
Network Shares
Worms and
Network Attacks
Viruses
SLIDE 13
SPAM
Spyware
BitDefender Centralized Management
• Scalable Master-Slave Architecture
– Management of gateway, server and endpoint solutions
located in different physical locations
• Network Visibility and Remote Administration
– Displays system deployment and related threat information
– On-demand problem resolution
• Configurable Security Policies
– Pre-defined templates to aid policy enforcement
– Network detection of unprotected endpoints with automatic
client distribution and installation
– Maintains remote and roaming user compliance even when
endpoints are offline
• Integrates with Active Directory
– Leverages the organizations existing Windows domain
structure and group policies
SLIDE 14
Management Console Overview
Managed
Platforms
GATEWAY SERVICES
ENDPOINT PROTECTION
CRITICAL SERVERS
SLIDE 15
Management
Features
Server and Endpoint Management
• Integrated Network Management Capabilities
– Microsoft’s version of Web-Based Enterprise Management
(WBEM) Scripting Language for Endpoint and Servers
• Over 30 Predefined WMI Script Templates Included
– Hundreds of Publically Available Scripts for Mass, Automated
Remote Management;
•
•
•
•
Kill applications and processes
Install and uninstall software (including other AV solutions)
Restart or shutdown workstations
Enable/disable autoruns and USB removable media access
• Customizable Client / Server Installation Packages
– Select installation features and disable unwanted functionality
– Scan system prior to Installation
SLIDE 16
Reports and Statistics
• Set of Predefined Reports
– Infections, disinfections and quarantined files
• Virus Scanning Statistics
– Daily, Weekly and Monthly
– User specified time period
• Wizard Based Reports
– Shortlist for the last 20 reports defined
• Export Reports
– Reports available in text or HTML formats
• License Reporting and Management
– License usage, inactive clients and deployed license thresholds
SLIDE 17
Master / Slave Management Architecture
Slave Server
Master Mgmt. Server
Remote
Office A
Headquarters
Internet
Slave Server
Slave Server
Regional
Office
Remote
Office B
• Centralized Policy, Product and
Update Synchronization
SLIDE 18
• Parallel Deployment Maintains
Reliability and Faster Response
BitDefender Client Security
• Industry Leading Proactive Protection
– viruses, spyware, rootkits, spam, phishing and other malware
• Small Memory Footprint
– Optimized server-client communication
– Minimal impact on system performance
• Client Profiles
– Power clients with unrestricted interface access
– Restricted clients with limited interface access
• Business Productivity Through Administrative Control
– Sets restrictions against unsafe or undesirable Web sites and user
level applications
– Blocks e-mail messages based on key words
– Limits Internet access for specific periods of time
SLIDE 19
Client Protection and Management
Proactive
Protection
SLIDE 20
Centralized
Management
The Experts Agree
Number one rated Internet Security software.
Consumer Reports – September 2008
Number one rated antivirus software.
Consumer Reports – September 2006
Rated the most effective antivirus solution and one
of the top 100 products of the year.
PC World - March 2006 and May 2006
Rated one of the top 100 privately held
European companies.
Red Herring - May 2006
Nominated for Best Software award.
Gartner RetailVision – September 2006
SLIDE 21
Industry Awards and Certifications
VBSpam Comparative Anti-spam Test- May 2009 • VB 100 Award, Virus Bulletin, UK- April
2009 • Best Buy and Editor’s Choice, Personal Computer World, UK- January 2009 •
Advanced Plus, AV-Comparatives.org- October 2008 • “Buy It!”, Computer Active, UKOctober 2008 • Recommended, IT Reviews, UK- October 2008 • Best Value, WinmagPro,
Netherlands- October 2008 • Gold Award, PC Guia, Portugal- October 2008 • Editor’s
Choice, PC Utilities, UK- September 2008 • Number One, Consumer Reports, USA- August
2008 • VB 100 Award, Virus Bulletin, UK- February 2008 • VB 100 Award, Virus Bulletin,
UK- June 2008 • Test Winner, PC Games, Germany- February 2008 • Test Winner and Best
Buy, Online PC, Switzerland- January 2008 • VB 100 Award, Virus Bulletin, UK- December
2007 • Budget-Tipp Distinction, Windows Vista, Germany- December 2007 • Gold Medal,
PC Guia, Portugal- December 2007 • Price Tip and Test Winner, com!, GermanyDecember 2007 • Editor’s Choice, WHAT LAPTOP, UK- December 2007 • Editor’s Choice,
Windows News, France- November 2007 • Recommendation, PC Today, Spain- December
2007 • Recommendation, IT Reviews, UK- November 2007 • Ubuntu’s Linux ComplianceOctober 2007 • Novell’s Linux Compliance- October 2007 • Red Hat Ready Linux
Compliance- September 2007 • Gold Rating, PC Advisor, UK- September 2007 •
Advanced Plus, av-comparatives.org, Austria- August 2007 • VB 100 Award, Virus
Bulletin, UK- June 2007 • Premium Checkpoint Award, West Coast Labs, UK- November
2006
SLIDE 22
Summary
• BitDefender’s Business Solutions Leverage Award-Winning
Consumer Detection Technology
• End-to-End Malware Protection For SMB Networks
–
–
–
–
–
–
–
Windows centric platform strategy
Multi-platform solutions for heterogeneous environments
Gateway, server & endpoint configuration, auditing and management
Manage clients in remote subnets from a single central server
Centralized license management
RemoteProactive
install /solutions
uninstalltoof endpoint
softwareat the speed
Protection
emerging
threats.
Centralized
reporting,
alerting and updates of life.
• Cost and Resource Effective Solutions
– Simplifies the complexity of managing Business AV solutions
– Hourly updates help maintain network integrity
SLIDE 23
Thank You!
sales@bitdefender.co.nz
BitDefender Business Security
www.bitdefender.co.nz
SLIDE 24
Download