SlideShare une entreprise Scribd logo
1  sur  30
August 16 | Copyright @ Bitdefender 2012

Bitdefender Products
Overview

Alexandru LUCA – Business Developer Manager CEE, Baltics, Turkey and Israel
Slide 2
Copyright @ Bitdefender 2013

Agenda
1.

Malware evolution

2.

Bitdefender - Company Overview

3.

Awards and Certifications
3.1. Leader in Antivirus Technology
3.2. A decade of innovation

3.3. No.1 Ranked Innovative technology
4.

Bitdefender Consumer Solutions

5.

Bitdefender Business Solutions
5.1. Server Security Solutions - Windows
5.2. Server Security Solutions - Linux
5.3. Client Security
5.4. Cloud Security for endpoints
5.5. Security for Virtualized Environments
5.6. GravityZone

17-Jan-13

2
Slide 3
Copyright @ Bitdefender 2013

1. Malware evolution
50,000,000
45,000,000

40,000,000
35,000,000
30,000,000
25,000,000
20,000,000
15,000,000
10,000,000
5,000,000
0
2001 2002 2003 2004 2005 2006 2007 2008 2009 2010

AV-Test's Malware Repository (Collection) Statistics
Copyright © 2010 AV-Test GmbH;
17-Jan-13

3
Slide 4
Copyright @ Bitdefender 2013

2. Bitdefender at a Glance
 The #1 Anti-Malware Security Technology in the world

 First security software vendor to receive top recommendations
simultaneously from the most important three key independent
organizations in the US, UK, and Germany!
 Moreover our technology is used by top security vendors under OEM
business model: F-Secure, GData, Qihoo, Bullguard or IBM;
 The only security technology to have won all 22 VB Antispam awards in a row;
 Bitdefender protects more than 400 million people worldwide (including technology
partnerships);
 HQ in Romania with regional offices in: US, UK, Germany, Spain, Nordics
(Denmark), Middle East (UAE)
 3 R&D expertise centers in Romania;
 Products localized in more than 24 languages.

17-Jan-13

4
Slide 5
Copyright @ Bitdefender 2013

3. Awards and Certifications
CRN:The Best Security Product of the Year 2011
Award
AV-Comparatives “Seal of Approval”
Bitdefender Business Solutions 3.5, December 2011
Bitdefender Business Solutions 3.5, September 2011
Virus Bulletin’s VB100 Awards
Bitdefender Client Security 3.5, File Servers 3.5, Samba 3.1.2

Virus Bulletin’s VBSpam Awards
Bitdefender Security for Mail Servers 3.0.2, March 2012

MICROSOFT CERTIFIED
for Windows 2010, 2008 R2 and
Exchange 2010. Security for
Windows Servers (December
2010)
17-Jan-13

MICROSOFT COMPATIBLE
with Windows 7,
Client Security 3.1.9
(December 2010)

INTEROPERABILITY
CERTIFIED
Business Solutions v3.5
(December 2010)
5
Slide 6
Copyright @ Bitdefender 2013

3.1. Leader in Antivirus Technology

17-Jan-13

6
Slide 7
Copyright @ Bitdefender 2013

3.2. A decade of innovation

2005
2012
17-Jan-13

1.

1st antivirus product with application firewall

2.

1st prize for MIDAS, “set to revolutionize AV design”

3.

1st antivirus product with intelligent updating

4.

New hourly update system from Bitdefender

5.

2000
-

New “Behavioral Heuristic Analyzer in Virtual Environments” (B-HAVE)

6.

Real-time detection of unknown viruses with Active Virus Control (AVC)

7.

60-Second QuickScan as the quickest way to find if your computer is
infected by using this online scanner

8.

Safego to protect Facebook users from spam, phishing attacks, and profile
privacy threats

9.

1st VMware vShield 5 integrated solution for virtualized datacenters

10.

New Cloud Security Services based on the Gravity Architecture
7
Slide 8
Copyright @ Bitdefender 2013

3.3. No.1 Ranked Innovative technology

0010 B8 00 00 00 00 00 00 00 40 00 00
0020 00 00 00 00 00 00 00 00 00 00 00
0030 00 00 00 00 00 00 00 D0 00 00 4C
0040 OE IF EA OE 09 CD 21 B8 01 4C CD

Increased
17-Jan-13

0010 B8 00 00 00 00 00 00 00 40 00 00
0020 00 00 00 00 00 00 00 00 00 00 00
0030 00 00 00 00 00 00 00 D0 00 00 4C
0040 OE IF EA OE 09 CD 21 B8 01 4C CD

0010 B8 00 00 00 00 00 00 00 40 00 00
0020 00 00 00 00 00 00 00 00 00 00 00
0030 00 00 00 00 00 00 00 D0 00 00 4C
0040 OE IF EA OE 09 CD 21 B8 01 4C CD

Detection
8
Slide 9
Copyright @ Bitdefender 2013

3.3. No.1 Ranked Innovative technology
126 pts

297 pts

149 pts

321 pts
Auto Block

189 pts

686 pts

1
AVC monitors
running processes
• For each
process, AVC
keeps a score
• Each action taken
by the process
affects the score
17-Jan-13

274 pts

User Action

806 pts

2
AVC detects
Malwareapp.exe as a
possibly malicious
application
• Malwareapp.exe
score reached the
threshold

3

Admin Alert

AVC can be configured to
take the following actions
• Blocks process
automatically
• Request User Action
• Send Alert to
Management Console
9
Slide 10
Copyright @ Bitdefender 2012

August 16 | Copyright @ Bitdefender 2012

Bitdefender
Portfolio

16-Aug-12

10
Slide 11
Copyright @ Bitdefender 2013

4. Bitdefender Consumer Products
PC and Mac Security

Smartphone and Tablet Security

Premium Services

SECURITY

Bitdefender 2013

Bitdefender Sphere
Mobile Security

Install&Config

Parental Control
Antivirus for Mac
Virus Removal
Security Essential

Anti-Theft

UTILITY TOOLS

Clueful

SafeBox

PC Tune UP
Debug

FREE TOOLS

Quick Scan
17-Jan-13

USB
Immunizer

Virus
Scanner

Power Tune-Up
Traffic Light
11
Slide 12
Copyright @ Bitdefender 2013

Product Line 2013
ANTIVIRUS PLUS
2013

INTERNET
SECURITY 2013

TOTAL SECURITY
2013

Antivirus & Antispyware

●

●

●

Search Advisor

●

●

●

Antiphishing
Social Networking
Protection
SafepayNEW

●

●

●

●

●

●

●

●

●

Remote managementNEW

●

●

●

USB immunizerNEW

●

●

●

Antispam

●

●

Firewall

●

●

Parental Control IMPROVED

●

●

-

●

File Encryption
Tune-up

●

SafeboxIMPROVED

●

Anti-TheftNEW

●

17-Jan-13

12
Slide 13
Copyright @ Bitdefender 2013

Experience Bitdefender 2013

17-Jan-13

13
Slide 14
Copyright @ Bitdefender 2013

Parental Control
Watch over your kids and their life online
Bitdefender Parental Control blocks inappropriate content, restricts Web access
between custom-set hours, and remotely monitors your children's online activity –
including that on Facebook
•

•
•

•

17-Jan-13

Social networks tracking: parents may
monitor kids' Facebook account and
log their activity.
Comprehensive activity reports:
tracks kids' online activities
Mobile phone tracking: offers parents
tools to access and monitor their kids`
Android devices.
Web admin interface: Parental
Control Web Interface is a discreet
way to check what children do online.

14
Slide 15
Copyright @ Bitdefender 2013

Anti-Theft
Keep it safe. Keep it yours.
Windows laptops and netbooks..... Android tablets and smartphones.... Have no fear,
Bitdefender Anti-Theft is here! This “invisible” app gives you a head-start in locating,
locking and even wipe all your lost or stolen mobile devices, BEFORE strangers have
the chance to access your personal information.

•
•
•
•
•

17-Jan-13

Invisible. Thief-proof.
Lock, wipe, locate, alarm
Multi-platform. Android and Windows
Permanent, easy access.
Multiple protection levels. Online and SMS.

15
Slide 16
Copyright @ Bitdefender 2013

Mobile Security
Enjoy your Android. We keep it safe
Protect your device from electronic threats and save your battery with
Bitdefender Mobile Security. Because your smartphone or tablet is no good
if you can't use it.

•
•
•
•

Defends against viruses and spyware
Is always up to date
Allows you remotely locate the device, wipe it or send a
message to it
Gives advance warning of risky websites

Bitdefender Mobile Security is practically unnoticeable
on your Android device and very easy to use. - PC Mag
Bitdefender Mobile Security has the advantage of low
system resource occupancy while protecting the mobile device - PCSL Test
17-Jan-13

16
Slide 17
Copyright @ Bitdefender 2013

5. Bitdefender Business Products
ENDPOINT PROTECTION:
 Bitdefender Client Security – includes Management Server for centralized administration
 Bitdefender Antivirus for Mac
 Bitdefender Antivirus Scanner for Unices

SERVER PROTECTION:






Bitdefender Security for File Servers
Bitdefender Security for Samba
Bitdefender Security for Exchange
Bitdefender Security for Mail Servers (Windows/Linux)
Bitdefender Security for SharePoint

NEW PRODUCTS:
 Bitdefender Cloud Security for Endpoints
 Bitdefender Security for Virtualized Environments
 Bitdefender GravityZone
 Bitdefender GravityZone In-a-box
17-Jan-13

17
Slide 18
Copyright @ Bitdefender 2013

5.1. Server Security Solutions - Windows
Mail Server

File Server

Collaboration Server

Bitdefender Security
for File Servers

Bitdefender Security
for SharePoint

Bitdefender Security for
Exchange
Bitdefender Security for
Mail Servers

Bitdefender Client Security

Workstation
17-Jan-13

Workstation

Workstation

Mobile
Workstation
18
Slide 19
Copyright @ Bitdefender 2013

5.2. Server Security Solutions - Linux
Gateway

Mail Server

Bitdefender Security for
Mail Servers (Linux)

File Server

Collaboration Server

Bitdefender Security
for Samba

Bitdefender Antivirus Scanner for Unices

Workstation
17-Jan-13

Workstation

Workstation

Mobile Workstation
19
Slide 20
Copyright @ Bitdefender 2013

5.3. Bitdefender Client Security


Centralized Administration, Protection and
Control of workstations inside a network
•

Considerably
reduces
administration costs
for networks,
ensuring centralized
management of the
antivirus protection
in complex networks



Use the integrated
WMI scripts to
access, configure
and monitor
Windows resources.

Business Client (x86 & x64) Add-on

•



Server Add-on



Policy based management system



Master-Slave extensible architecture



New station automatic detection and
deployment



Integration with Bitdefender products for
Windows and Linux servers



WMI Scripts



Network Audit



Real-time status of the server and clients
presented on the console Dashboard



Graphical Reports

17-Jan-13

20
Slide 21
Copyright @ Bitdefender 2013

Bitdefender Client Security - Dashboard

17-Jan-13

21
Slide 22
Copyright @ Bitdefender 2013

5.4. Cloud Security - Dashboard overview
The simple Cloud-based dashboard is a status pane composed by 7 portlets,
allowing quick security overview of protected endpoints, including both workstations and
servers, with local roll-up reports from multiple networks or geographically dispersed sites.

17-Jan-13

22
Slide 23
Copyright @ Bitdefender 2013

Cloud Security - Architecture

Cloud Security Console

Endpoint Client

17-Jan-13

23
Slide 24
Copyright @ Bitdefender 2013

Cloud Security – Account types

Partner

Partner

(Distributor)

(Distributor)

Company
(Customer)

Partner
(Reseller)

Partner
(Reseller)

Company
(Customer)

External
accounts

Partner
(Reseller)
Partner
(Reseller)

Administrator
Administrator
Reporter

Internal
accounts

Company
(Customer)

Reporter
Administrator
Reporter
17-Jan-13

UNLIMITED LEVEL

24
Slide 25
Copyright @ Bitdefender 2013

5.5. Bitdefender Security for
Virtualized Environments
Centralized Scanning Functions
 The unique Bitdefender
Architecture allows many
scanning functions to be
centralized
 By centralizing these functions
on a hardened Linux-based
virtual appliance, the solution
effectively de-duplicates
antimalware load associated
with updates, scanning and
management
 VMs only require the installation of a Silent Agent that allows offloading antimalware
agent processing to the centralized Security Virtual Appliance (SVA)
17-Jan-13

25
Slide 26
Copyright @ Bitdefender 2013

Security for Virtualized Environments
Dashboard overview

17-Jan-13

Security Console – Dashboard

26
Slide 27
Copyright @ Bitdefender 2013

Silent Agent

Silent Agent
17-Jan-13

27
Slide 28
Copyright @ Bitdefender 2013

5.6. Bitdefender GravityZone
How do you solve security with:
•
•
•
•

Insight into physical, virtualization and mobile security
Lack of central control
Complex deployment
Lack of high availability

GravityZone by Bitdefender
• Unified security for physical, virtualized and mobile environments
• Central control
• Built in redundancy and load balance for auto-scaling and high availability
17-Jan-13

28
Slide 29
Copyright @ Bitdefender 2013

Bitdefender GravityZone
Control Center
• Unified security for physical, virtualization and mobiles
• Built in redundancy and auto-scaling
• Integrated with 3rd parties like VMware, Citrix & Microsoft
Security for Virtualized Environments
• Remote Scan Protection (Agentless) for ANY hypervisor
• Increased server consolidation
• Windows, Linux and Solaris support

Security for Endpoints
• Physical Windows protection
• Host-based Firewall, IDS, web filtering & control, data
protection and application control
Security for Mobiles Devices
• IOS and Android support
• Device compliance & profile control
• On-access scanning & encryption
17-Jan-13

29
Slide 30
Copyright @ Bitdefender 2013

Questions?
Thank you!

Copyright @ Bitdefender 2013
Copyright @ Bitdefender 2012
enterprise.bitdefender.com
enterprise.bitdefender.com

17-Jan-13

30

Contenu connexe

Tendances

Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung Biz Mobile
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystemMark Oakton
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXSamsung Biz Mobile
 
The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. Samsung Biz Mobile
 
Samsung and Android Security brochure
Samsung and Android Security brochureSamsung and Android Security brochure
Samsung and Android Security brochureSherief Razzaque
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung Biz Mobile
 
Knox premium for customer
Knox premium for customerKnox premium for customer
Knox premium for customerJavier Gonzalez
 
Build 2017 - B8101 - Windows 10 identity overview
Build 2017 - B8101 - Windows 10 identity overviewBuild 2017 - B8101 - Windows 10 identity overview
Build 2017 - B8101 - Windows 10 identity overviewWindows Developer
 
The Threat is Real: Protect Valuable Systems and Data from the Inside and Out
The Threat is Real: Protect Valuable Systems and Data from the Inside and OutThe Threat is Real: Protect Valuable Systems and Data from the Inside and Out
The Threat is Real: Protect Valuable Systems and Data from the Inside and OutBomgar
 
Azure IoT from groundup
Azure IoT from groundupAzure IoT from groundup
Azure IoT from groundupRaminder Singh
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeSamsung Biz Mobile
 
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_ENMID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_ENVladyslav Radetsky
 
Samsung knox and android for work
Samsung knox and android for workSamsung knox and android for work
Samsung knox and android for workJavier Gonzalez
 
ESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...Samsung Biz Mobile
 
Software-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and RightSoftware-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and RightSBWebinars
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security
 

Tendances (20)

Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystem
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOX
 
The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business.
 
Samsung and Android Security brochure
Samsung and Android Security brochureSamsung and Android Security brochure
Samsung and Android Security brochure
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
 
Knox premium for customer
Knox premium for customerKnox premium for customer
Knox premium for customer
 
Build 2017 - B8101 - Windows 10 identity overview
Build 2017 - B8101 - Windows 10 identity overviewBuild 2017 - B8101 - Windows 10 identity overview
Build 2017 - B8101 - Windows 10 identity overview
 
The Threat is Real: Protect Valuable Systems and Data from the Inside and Out
The Threat is Real: Protect Valuable Systems and Data from the Inside and OutThe Threat is Real: Protect Valuable Systems and Data from the Inside and Out
The Threat is Real: Protect Valuable Systems and Data from the Inside and Out
 
Azure IoT from groundup
Azure IoT from groundupAzure IoT from groundup
Azure IoT from groundup
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, Anytime
 
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_ENMID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
 
Samsung knox and android for work
Samsung knox and android for workSamsung knox and android for work
Samsung knox and android for work
 
ESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure Authentication
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...
 
Software-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and RightSoftware-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and Right
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large Businesses
 
Virtual Security
Virtual SecurityVirtual Security
Virtual Security
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection Plus
 

Similaire à Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumunija)

Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Lietuvos kompiuterininkų sąjunga
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for BusinessRobert Crane
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35Felipe Prado
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityOnward Security
 
Ivanti Patch Tuesday for April 2020
Ivanti Patch Tuesday for April 2020Ivanti Patch Tuesday for April 2020
Ivanti Patch Tuesday for April 2020Ivanti
 
2022 December Patch Tuesday
2022 December Patch Tuesday2022 December Patch Tuesday
2022 December Patch TuesdayIvanti
 
Roundtable ignite november 2021
Roundtable ignite november 2021Roundtable ignite november 2021
Roundtable ignite november 2021Marco Moioli
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxArrow ECS UK
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with WatsonSylvia Low
 
Track 4 session 6 - st dev con 2016 - samsung artik
Track 4   session 6 - st dev con 2016 - samsung artikTrack 4   session 6 - st dev con 2016 - samsung artik
Track 4 session 6 - st dev con 2016 - samsung artikST_World
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT securityIoT613
 
Alexander Antukh. (In)security of Appliances
Alexander Antukh. (In)security of AppliancesAlexander Antukh. (In)security of Appliances
Alexander Antukh. (In)security of AppliancesPositive Hack Days
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsBitbar
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data CenterGroup of company MUK
 
Entreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTEntreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTScaleway
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 

Similaire à Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumunija) (20)

Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
Bitdefender, Ana Cobzaru
Bitdefender, Ana CobzaruBitdefender, Ana Cobzaru
Bitdefender, Ana Cobzaru
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
Ivanti Patch Tuesday for April 2020
Ivanti Patch Tuesday for April 2020Ivanti Patch Tuesday for April 2020
Ivanti Patch Tuesday for April 2020
 
2022 December Patch Tuesday
2022 December Patch Tuesday2022 December Patch Tuesday
2022 December Patch Tuesday
 
Roundtable ignite november 2021
Roundtable ignite november 2021Roundtable ignite november 2021
Roundtable ignite november 2021
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptx
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
Track 4 session 6 - st dev con 2016 - samsung artik
Track 4   session 6 - st dev con 2016 - samsung artikTrack 4   session 6 - st dev con 2016 - samsung artik
Track 4 session 6 - st dev con 2016 - samsung artik
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
Alexander Antukh. (In)security of Appliances
Alexander Antukh. (In)security of AppliancesAlexander Antukh. (In)security of Appliances
Alexander Antukh. (In)security of Appliances
 
Alexander Antukh
Alexander AntukhAlexander Antukh
Alexander Antukh
 
Evento 15 aprile
Evento 15 aprileEvento 15 aprile
Evento 15 aprile
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 
Entreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTEntreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoT
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 

Plus de Lietuvos kompiuterininkų sąjunga

Eimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizė
Eimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizėEimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizė
Eimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizėLietuvos kompiuterininkų sąjunga
 
B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...
B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...
B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...Lietuvos kompiuterininkų sąjunga
 
D. Dluznevskij. YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemose
D. Dluznevskij.  YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemoseD. Dluznevskij.  YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemose
D. Dluznevskij. YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemoseLietuvos kompiuterininkų sąjunga
 
I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...
I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...
I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...Lietuvos kompiuterininkų sąjunga
 
E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...
E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...
E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...Lietuvos kompiuterininkų sąjunga
 
V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...
V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...
V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...Lietuvos kompiuterininkų sąjunga
 
Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...
Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...
Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...Lietuvos kompiuterininkų sąjunga
 
Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...
Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...
Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...Lietuvos kompiuterininkų sąjunga
 
Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...
Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...
Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...Lietuvos kompiuterininkų sąjunga
 
Gražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizė
Gražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizėGražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizė
Gražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizėLietuvos kompiuterininkų sąjunga
 
Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?
Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?
Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?Lietuvos kompiuterininkų sąjunga
 
Tomas Kasperavičius. Robotikos realizacija edukacinėje erdvėje
Tomas Kasperavičius. Robotikos realizacija edukacinėje erdvėjeTomas Kasperavičius. Robotikos realizacija edukacinėje erdvėje
Tomas Kasperavičius. Robotikos realizacija edukacinėje erdvėjeLietuvos kompiuterininkų sąjunga
 
Paulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėje
Paulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėjePaulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėje
Paulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėjeLietuvos kompiuterininkų sąjunga
 

Plus de Lietuvos kompiuterininkų sąjunga (20)

LIKS ataskaita 2021-2023
LIKS ataskaita 2021-2023LIKS ataskaita 2021-2023
LIKS ataskaita 2021-2023
 
Eimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizė
Eimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizėEimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizė
Eimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizė
 
B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...
B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...
B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...
 
D. Dluznevskij. YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemose
D. Dluznevskij.  YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemoseD. Dluznevskij.  YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemose
D. Dluznevskij. YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemose
 
I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...
I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...
I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...
 
G. Mezetis. Skaimenines valstybes link
G. Mezetis. Skaimenines valstybes link G. Mezetis. Skaimenines valstybes link
G. Mezetis. Skaimenines valstybes link
 
E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...
E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...
E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...
 
V. Jakuška. Ką reikėtu žinoti apie .lt domeną?
V. Jakuška. Ką reikėtu žinoti apie .lt domeną?V. Jakuška. Ką reikėtu žinoti apie .lt domeną?
V. Jakuška. Ką reikėtu žinoti apie .lt domeną?
 
V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...
V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...
V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...
 
Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...
Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...
Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...
 
Raimundas Matylevičius. Asmens duomenų valdymas
Raimundas Matylevičius. Asmens duomenų valdymasRaimundas Matylevičius. Asmens duomenų valdymas
Raimundas Matylevičius. Asmens duomenų valdymas
 
Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...
Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...
Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...
 
Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...
Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...
Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...
 
Rima Šiaulienė. IT VBE 2021 teksto maketavimo užduotis
Rima Šiaulienė. IT VBE 2021 teksto maketavimo užduotisRima Šiaulienė. IT VBE 2021 teksto maketavimo užduotis
Rima Šiaulienė. IT VBE 2021 teksto maketavimo užduotis
 
Gražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizė
Gražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizėGražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizė
Gražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizė
 
Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?
Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?
Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?
 
Eugenijus Valavičius. Hiperteksto kelias
Eugenijus Valavičius. Hiperteksto keliasEugenijus Valavičius. Hiperteksto kelias
Eugenijus Valavičius. Hiperteksto kelias
 
Tomas Kasperavičius. Robotikos realizacija edukacinėje erdvėje
Tomas Kasperavičius. Robotikos realizacija edukacinėje erdvėjeTomas Kasperavičius. Robotikos realizacija edukacinėje erdvėje
Tomas Kasperavičius. Robotikos realizacija edukacinėje erdvėje
 
Paulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėje
Paulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėjePaulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėje
Paulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėje
 
Olga Kurasova. Dirbtinis intelektas ir neuroniniai tinklai
Olga Kurasova. Dirbtinis intelektas ir neuroniniai tinklaiOlga Kurasova. Dirbtinis intelektas ir neuroniniai tinklai
Olga Kurasova. Dirbtinis intelektas ir neuroniniai tinklai
 

Dernier

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Dernier (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumunija)

  • 1. August 16 | Copyright @ Bitdefender 2012 Bitdefender Products Overview Alexandru LUCA – Business Developer Manager CEE, Baltics, Turkey and Israel
  • 2. Slide 2 Copyright @ Bitdefender 2013 Agenda 1. Malware evolution 2. Bitdefender - Company Overview 3. Awards and Certifications 3.1. Leader in Antivirus Technology 3.2. A decade of innovation 3.3. No.1 Ranked Innovative technology 4. Bitdefender Consumer Solutions 5. Bitdefender Business Solutions 5.1. Server Security Solutions - Windows 5.2. Server Security Solutions - Linux 5.3. Client Security 5.4. Cloud Security for endpoints 5.5. Security for Virtualized Environments 5.6. GravityZone 17-Jan-13 2
  • 3. Slide 3 Copyright @ Bitdefender 2013 1. Malware evolution 50,000,000 45,000,000 40,000,000 35,000,000 30,000,000 25,000,000 20,000,000 15,000,000 10,000,000 5,000,000 0 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 AV-Test's Malware Repository (Collection) Statistics Copyright © 2010 AV-Test GmbH; 17-Jan-13 3
  • 4. Slide 4 Copyright @ Bitdefender 2013 2. Bitdefender at a Glance  The #1 Anti-Malware Security Technology in the world  First security software vendor to receive top recommendations simultaneously from the most important three key independent organizations in the US, UK, and Germany!  Moreover our technology is used by top security vendors under OEM business model: F-Secure, GData, Qihoo, Bullguard or IBM;  The only security technology to have won all 22 VB Antispam awards in a row;  Bitdefender protects more than 400 million people worldwide (including technology partnerships);  HQ in Romania with regional offices in: US, UK, Germany, Spain, Nordics (Denmark), Middle East (UAE)  3 R&D expertise centers in Romania;  Products localized in more than 24 languages. 17-Jan-13 4
  • 5. Slide 5 Copyright @ Bitdefender 2013 3. Awards and Certifications CRN:The Best Security Product of the Year 2011 Award AV-Comparatives “Seal of Approval” Bitdefender Business Solutions 3.5, December 2011 Bitdefender Business Solutions 3.5, September 2011 Virus Bulletin’s VB100 Awards Bitdefender Client Security 3.5, File Servers 3.5, Samba 3.1.2 Virus Bulletin’s VBSpam Awards Bitdefender Security for Mail Servers 3.0.2, March 2012 MICROSOFT CERTIFIED for Windows 2010, 2008 R2 and Exchange 2010. Security for Windows Servers (December 2010) 17-Jan-13 MICROSOFT COMPATIBLE with Windows 7, Client Security 3.1.9 (December 2010) INTEROPERABILITY CERTIFIED Business Solutions v3.5 (December 2010) 5
  • 6. Slide 6 Copyright @ Bitdefender 2013 3.1. Leader in Antivirus Technology 17-Jan-13 6
  • 7. Slide 7 Copyright @ Bitdefender 2013 3.2. A decade of innovation 2005 2012 17-Jan-13 1. 1st antivirus product with application firewall 2. 1st prize for MIDAS, “set to revolutionize AV design” 3. 1st antivirus product with intelligent updating 4. New hourly update system from Bitdefender 5. 2000 - New “Behavioral Heuristic Analyzer in Virtual Environments” (B-HAVE) 6. Real-time detection of unknown viruses with Active Virus Control (AVC) 7. 60-Second QuickScan as the quickest way to find if your computer is infected by using this online scanner 8. Safego to protect Facebook users from spam, phishing attacks, and profile privacy threats 9. 1st VMware vShield 5 integrated solution for virtualized datacenters 10. New Cloud Security Services based on the Gravity Architecture 7
  • 8. Slide 8 Copyright @ Bitdefender 2013 3.3. No.1 Ranked Innovative technology 0010 B8 00 00 00 00 00 00 00 40 00 00 0020 00 00 00 00 00 00 00 00 00 00 00 0030 00 00 00 00 00 00 00 D0 00 00 4C 0040 OE IF EA OE 09 CD 21 B8 01 4C CD Increased 17-Jan-13 0010 B8 00 00 00 00 00 00 00 40 00 00 0020 00 00 00 00 00 00 00 00 00 00 00 0030 00 00 00 00 00 00 00 D0 00 00 4C 0040 OE IF EA OE 09 CD 21 B8 01 4C CD 0010 B8 00 00 00 00 00 00 00 40 00 00 0020 00 00 00 00 00 00 00 00 00 00 00 0030 00 00 00 00 00 00 00 D0 00 00 4C 0040 OE IF EA OE 09 CD 21 B8 01 4C CD Detection 8
  • 9. Slide 9 Copyright @ Bitdefender 2013 3.3. No.1 Ranked Innovative technology 126 pts 297 pts 149 pts 321 pts Auto Block 189 pts 686 pts 1 AVC monitors running processes • For each process, AVC keeps a score • Each action taken by the process affects the score 17-Jan-13 274 pts User Action 806 pts 2 AVC detects Malwareapp.exe as a possibly malicious application • Malwareapp.exe score reached the threshold 3 Admin Alert AVC can be configured to take the following actions • Blocks process automatically • Request User Action • Send Alert to Management Console 9
  • 10. Slide 10 Copyright @ Bitdefender 2012 August 16 | Copyright @ Bitdefender 2012 Bitdefender Portfolio 16-Aug-12 10
  • 11. Slide 11 Copyright @ Bitdefender 2013 4. Bitdefender Consumer Products PC and Mac Security Smartphone and Tablet Security Premium Services SECURITY Bitdefender 2013 Bitdefender Sphere Mobile Security Install&Config Parental Control Antivirus for Mac Virus Removal Security Essential Anti-Theft UTILITY TOOLS Clueful SafeBox PC Tune UP Debug FREE TOOLS Quick Scan 17-Jan-13 USB Immunizer Virus Scanner Power Tune-Up Traffic Light 11
  • 12. Slide 12 Copyright @ Bitdefender 2013 Product Line 2013 ANTIVIRUS PLUS 2013 INTERNET SECURITY 2013 TOTAL SECURITY 2013 Antivirus & Antispyware ● ● ● Search Advisor ● ● ● Antiphishing Social Networking Protection SafepayNEW ● ● ● ● ● ● ● ● ● Remote managementNEW ● ● ● USB immunizerNEW ● ● ● Antispam ● ● Firewall ● ● Parental Control IMPROVED ● ● - ● File Encryption Tune-up ● SafeboxIMPROVED ● Anti-TheftNEW ● 17-Jan-13 12
  • 13. Slide 13 Copyright @ Bitdefender 2013 Experience Bitdefender 2013 17-Jan-13 13
  • 14. Slide 14 Copyright @ Bitdefender 2013 Parental Control Watch over your kids and their life online Bitdefender Parental Control blocks inappropriate content, restricts Web access between custom-set hours, and remotely monitors your children's online activity – including that on Facebook • • • • 17-Jan-13 Social networks tracking: parents may monitor kids' Facebook account and log their activity. Comprehensive activity reports: tracks kids' online activities Mobile phone tracking: offers parents tools to access and monitor their kids` Android devices. Web admin interface: Parental Control Web Interface is a discreet way to check what children do online. 14
  • 15. Slide 15 Copyright @ Bitdefender 2013 Anti-Theft Keep it safe. Keep it yours. Windows laptops and netbooks..... Android tablets and smartphones.... Have no fear, Bitdefender Anti-Theft is here! This “invisible” app gives you a head-start in locating, locking and even wipe all your lost or stolen mobile devices, BEFORE strangers have the chance to access your personal information. • • • • • 17-Jan-13 Invisible. Thief-proof. Lock, wipe, locate, alarm Multi-platform. Android and Windows Permanent, easy access. Multiple protection levels. Online and SMS. 15
  • 16. Slide 16 Copyright @ Bitdefender 2013 Mobile Security Enjoy your Android. We keep it safe Protect your device from electronic threats and save your battery with Bitdefender Mobile Security. Because your smartphone or tablet is no good if you can't use it. • • • • Defends against viruses and spyware Is always up to date Allows you remotely locate the device, wipe it or send a message to it Gives advance warning of risky websites Bitdefender Mobile Security is practically unnoticeable on your Android device and very easy to use. - PC Mag Bitdefender Mobile Security has the advantage of low system resource occupancy while protecting the mobile device - PCSL Test 17-Jan-13 16
  • 17. Slide 17 Copyright @ Bitdefender 2013 5. Bitdefender Business Products ENDPOINT PROTECTION:  Bitdefender Client Security – includes Management Server for centralized administration  Bitdefender Antivirus for Mac  Bitdefender Antivirus Scanner for Unices SERVER PROTECTION:      Bitdefender Security for File Servers Bitdefender Security for Samba Bitdefender Security for Exchange Bitdefender Security for Mail Servers (Windows/Linux) Bitdefender Security for SharePoint NEW PRODUCTS:  Bitdefender Cloud Security for Endpoints  Bitdefender Security for Virtualized Environments  Bitdefender GravityZone  Bitdefender GravityZone In-a-box 17-Jan-13 17
  • 18. Slide 18 Copyright @ Bitdefender 2013 5.1. Server Security Solutions - Windows Mail Server File Server Collaboration Server Bitdefender Security for File Servers Bitdefender Security for SharePoint Bitdefender Security for Exchange Bitdefender Security for Mail Servers Bitdefender Client Security Workstation 17-Jan-13 Workstation Workstation Mobile Workstation 18
  • 19. Slide 19 Copyright @ Bitdefender 2013 5.2. Server Security Solutions - Linux Gateway Mail Server Bitdefender Security for Mail Servers (Linux) File Server Collaboration Server Bitdefender Security for Samba Bitdefender Antivirus Scanner for Unices Workstation 17-Jan-13 Workstation Workstation Mobile Workstation 19
  • 20. Slide 20 Copyright @ Bitdefender 2013 5.3. Bitdefender Client Security  Centralized Administration, Protection and Control of workstations inside a network • Considerably reduces administration costs for networks, ensuring centralized management of the antivirus protection in complex networks  Use the integrated WMI scripts to access, configure and monitor Windows resources. Business Client (x86 & x64) Add-on •  Server Add-on  Policy based management system  Master-Slave extensible architecture  New station automatic detection and deployment  Integration with Bitdefender products for Windows and Linux servers  WMI Scripts  Network Audit  Real-time status of the server and clients presented on the console Dashboard  Graphical Reports 17-Jan-13 20
  • 21. Slide 21 Copyright @ Bitdefender 2013 Bitdefender Client Security - Dashboard 17-Jan-13 21
  • 22. Slide 22 Copyright @ Bitdefender 2013 5.4. Cloud Security - Dashboard overview The simple Cloud-based dashboard is a status pane composed by 7 portlets, allowing quick security overview of protected endpoints, including both workstations and servers, with local roll-up reports from multiple networks or geographically dispersed sites. 17-Jan-13 22
  • 23. Slide 23 Copyright @ Bitdefender 2013 Cloud Security - Architecture Cloud Security Console Endpoint Client 17-Jan-13 23
  • 24. Slide 24 Copyright @ Bitdefender 2013 Cloud Security – Account types Partner Partner (Distributor) (Distributor) Company (Customer) Partner (Reseller) Partner (Reseller) Company (Customer) External accounts Partner (Reseller) Partner (Reseller) Administrator Administrator Reporter Internal accounts Company (Customer) Reporter Administrator Reporter 17-Jan-13 UNLIMITED LEVEL 24
  • 25. Slide 25 Copyright @ Bitdefender 2013 5.5. Bitdefender Security for Virtualized Environments Centralized Scanning Functions  The unique Bitdefender Architecture allows many scanning functions to be centralized  By centralizing these functions on a hardened Linux-based virtual appliance, the solution effectively de-duplicates antimalware load associated with updates, scanning and management  VMs only require the installation of a Silent Agent that allows offloading antimalware agent processing to the centralized Security Virtual Appliance (SVA) 17-Jan-13 25
  • 26. Slide 26 Copyright @ Bitdefender 2013 Security for Virtualized Environments Dashboard overview 17-Jan-13 Security Console – Dashboard 26
  • 27. Slide 27 Copyright @ Bitdefender 2013 Silent Agent Silent Agent 17-Jan-13 27
  • 28. Slide 28 Copyright @ Bitdefender 2013 5.6. Bitdefender GravityZone How do you solve security with: • • • • Insight into physical, virtualization and mobile security Lack of central control Complex deployment Lack of high availability GravityZone by Bitdefender • Unified security for physical, virtualized and mobile environments • Central control • Built in redundancy and load balance for auto-scaling and high availability 17-Jan-13 28
  • 29. Slide 29 Copyright @ Bitdefender 2013 Bitdefender GravityZone Control Center • Unified security for physical, virtualization and mobiles • Built in redundancy and auto-scaling • Integrated with 3rd parties like VMware, Citrix & Microsoft Security for Virtualized Environments • Remote Scan Protection (Agentless) for ANY hypervisor • Increased server consolidation • Windows, Linux and Solaris support Security for Endpoints • Physical Windows protection • Host-based Firewall, IDS, web filtering & control, data protection and application control Security for Mobiles Devices • IOS and Android support • Device compliance & profile control • On-access scanning & encryption 17-Jan-13 29
  • 30. Slide 30 Copyright @ Bitdefender 2013 Questions? Thank you! Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2012 enterprise.bitdefender.com enterprise.bitdefender.com 17-Jan-13 30

Notes de l'éditeur

  1. Bitdefender, the creator of number-one-ranked, award-winning security solutions secures the digital experience of tens of millions of home and corporate users across the globe