g data 10 nov 2010

38
G Data Presentation Bucharest 2010

Upload: agora-group

Post on 18-Jan-2015

193 views

Category:

Documents


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: G data   10 nov 2010

G Data Presentation

Bucharest 2010

Page 2: G data   10 nov 2010

Welcome.

Costin PecinginaG Data Representative

Page 3: G data   10 nov 2010

G Data Overview1

G Data‘s Unique Technologies2

G Data Solutions3

New: G Data EndpointProtection4

Page 4: G data   10 nov 2010

G Data Overview1

G Data‘s Unique Technologies2

G Data Solutions3

New: G Data EndpointProtection4

Page 5: G data   10 nov 2010

• Founded 1985 in Germany

• 300 employees world wide

• Offices in 13 countries: Germany (HQ), USA, Canada, Japan, China, UK, France, Italy, Spain, BeNeLux, Poland and Russia

• Sales Partners in more than 90 countries

• G Data solutions globally available

G Data Overview

Page 6: G data   10 nov 2010

The IT-Security Pioneer

1987 First AntiVirus world wide

1990 First AV with graphical user interface

1995 First AV Hardware Protection

1999 First Linux based BootScan

2005 First AV with Cloud Security

2007 First Silent Firewall

2008 First Fingerprinting for top performance

Page 7: G data   10 nov 2010

Member of the ITSMIG association

Under the patronage of

Page 8: G data   10 nov 2010

G Data Overview1

G Data‘s Unique Technologies2

G Data Solutions3

New: G Data EndpointProtection4

Page 9: G data   10 nov 2010

• DoubleScan: 2 independent Scanning Enginesfor unique 99+ Warantee

• Fastest reaction time on new threats

• Fingerprinting prevents from unnecessaryscans to save performance

• Whitelisting of known files prevents from False Positives

Reactive Protection

Jan

08

Fe

b 0

8M

ar

08

Ap

r 0

8M

ay 0

8Ju

n 0

8Ju

n 0

8Ju

l 0

8A

ug

08

Se

p 0

8O

ct 0

8N

ov 0

8D

ec

08

Jan

09

Fe

b 0

9M

ar

09

Ap

r 0

9M

ay 0

9Ju

n 0

9Ju

l 0

9A

ug

09

Se

p 0

9O

ct 0

9N

ov 0

9D

ec

09

Jan

10

Jan

10

Ma

r 1

0M

ar

10

Ap

r 1

0M

ay 1

0Ju

n 1

0Ju

l 1

0A

ug

10

90%

92%

94%

96%

98%

100%

G Data

Kaspersky

Symantec

Mc Afee

Trend Micro

Reactive detection(Source: AV-Test)

G DataKaspersky

SymantecMc Afee

Trend Micro

0

100

200

300

400

500

600

Average reaction time on new threats(Source: Computer BILD)

7h 11min

9h 19min

55min19min

3h 20min

Page 10: G data   10 nov 2010

• Proactive Protection with Behaviour Blockingand several heuristics methods

• OutbreakShield: Mail based cloud security detects mass mailings such as virus outbreaks or spam attacks using statistical methodology

• Web based Cloud Security: server based URLblack lists for real time protection

Real Time Protection

Mc AfeeSymantec

KasperskyF-Secure

MS Forefront

AVG Trustport

Sophos

Redstone

Avira

G Data

80,00%

85,00%

90,00%

95,00%

100,00%

40,00% 50,00% 60,00% 70,00% 80,00% 90,00% 100,00%

Reactive Detection vs. Proactive Detection(Source: Virus Bulletin)

Reac

tive

Det

ectio

n Ra

te

Proactive Detection Rate

Page 11: G data   10 nov 2010

Certifications achieved

Awards

Certifications and Awards

G Data is the world‘s leading test winner

Page 12: G data   10 nov 2010

G Data Overview1

G Data‘s Unique Technologies2

G Data Solutions3

New: G Data EndpointProtection4

Page 13: G data   10 nov 2010

G Data Desktop Solutions

Page 14: G data   10 nov 2010

AntiMalware / AntiSpyware

Firewall / AntiSpam

Parental Control

Backup / Tuning

Page 15: G data   10 nov 2010

G Data Desktop Solutions

Available now

Page 16: G data   10 nov 2010

GfK TrendSetter - Germany

Computer-Software

Period : 11. - 17. October 2010 (Week 41)

 GfK-TOP 10

NON-GAMES    

Rank    

Previous Current  

Week Week Title Brand

1 1 OFFICE HOME AND STUDENT 2010 MICROSOFT

4 2 INTERNET SECURITY 2011 3 USER 25th ANNIVERSARY VERSION G DATA

3 3 INTERNET SECURITY 2011 KASPERSKY LAB

6 4 WINDOWS 7 HOME PREMIUM 64-BIT SB-VERSION MICROSOFT

5 5 INTERNET SECURITY 2011 UPDATE KASPERSKY LAB

8 6 INTERNET SECURITY 2011 3 USER UPDATE KASPERSKY LAB

10 7 WINDOWS 7 HOME PREMIUM 32-BIT SB-VERSION MICROSOFT

7 8 NORTON INTERNET SECURITY 2011 3 USER SYMANTEC

9 9 NORTON INTERNET SECURITY 2011 SYMANTEC

2 10 ANTI-VIRUS 2011 3 USER LIMITED EDITION KASPERSKY LAB

Page 17: G data   10 nov 2010

G Data Business Solutions

Page 18: G data   10 nov 2010

Management Server

AntiVirus Client

Firewall and AntiSpam Client

Mail Security

Remote control: installation, virus scans, updates, settingsFully automated virus scans and updates (pull-push)Fully invisible malware protection – no client interactionFor Windows and Linux2 way Firewall: Invisible protection against hacker attacksAntiSpam: Content independent real time protectionMail server independent mail gatewayProtection against malware, spam and phishing

Page 19: G data   10 nov 2010

G Data Overview1

G Data‘s Unique Technologies2

G Data Solutions3

New: G Data EndpointProtection4

Page 20: G data   10 nov 2010

IT Security strikes out in a new direction.

Page 21: G data   10 nov 2010
Page 22: G data   10 nov 2010

Web 2.0 platforms (blogs, forum entries)

Social networks (Facebook, MySpace, Twitter)

Manipulated hot topic search results

Links in instant messengers and chats

Phishing through online auctions

File sharing and file hosting

Modern Sources of attack

Page 23: G data   10 nov 2010

Web 2.0 platforms (blogs, forum entries)

Social networks (Facebook, MySpace, Twitter)

Manipulated hot topic search results

Links in instant messengers and chats

Phishing through online auctions

File sharing and file hosting

Modern Souces of attack

No problem for companies…??

Page 24: G data   10 nov 2010

2/3 of all Internet use in the workplace is for private reasons.(Source: Berlin Audit Court)

Page 25: G data   10 nov 2010
Page 26: G data   10 nov 2010

Financial harm

Loss of manpowerEconomic damage in Germany:Over 50 billion euros(Source: Berlin Audit Court)

Page 27: G data   10 nov 2010

Security risks

Infiltration of new malware

IT infrastructure damage due to unauthorised software

Loss / theft of sensitive data

Page 28: G data   10 nov 2010

Legal risks (German Law)

Joint responsibility for copyright infringements (pirate copies, MP3…)

If trade secrets are published

If personal data is made accessible to the public

Page 29: G data   10 nov 2010

ESSENTIAL: the policy

Written definition of the content and extent of private Internet use

Use of software to ensure adherence to the policy

Page 30: G data   10 nov 2010

AntiVirus / Firewall / AntiSpam

PolicyManager:

Device controlApplication controlContent FilterInternet use control

G Data EndpointProtection

Page 31: G data   10 nov 2010

USB mass storage devices / hard disks

CD- / DVD- / floppy drives

Can be certified by administrator

Device control

Page 32: G data   10 nov 2010

Whitelist or blacklist

Many applications predefined (file sharing, games, Messenger, etc.)

Application control

Page 33: G data   10 nov 2010

80 different categories, e.g.:Chats / forums / blogsOnline auctions / job search sitesGambling / gaming…

Content Filter

Page 34: G data   10 nov 2010

Definable Internet lock out times

Usage times can be limited per day, week and month

Internet use control

Page 35: G data   10 nov 2010

Market survey

Page 36: G data   10 nov 2010

Device control

Application control

Web / URL filter

Internet use control

Symantec Endpoint Protection

Sophos Endpoint

Security & Control

Kaspersky Antivirus

6.0

McAfee Protection

for Endpoint

Trend Micro Worry Free Business Security

G Data Endpoint Protection

Only Whitelist

Only Whitelist

Only Blacklist

Page 37: G data   10 nov 2010

Best protection against malware, hackers and spam

Legal security for usage of corporate PCs

Significant improve of productivity

Easy administration thanks to unique all-in-one solution

G Data EndpointProtection advantages

Page 38: G data   10 nov 2010

Thank you.