SlideShare une entreprise Scribd logo
1  sur  16
AWARD-WINNING PROTECTION 
FOR YOUR PC AND YOUR DIGITAL LIFE
PCs are still the most vulnerable devices to attacks 
3 of 4 users still feel PCs are unsafe 
Source: Kaspersky Lab
Your personal digital information is vulnerable... 
and cybercriminals know that! 
High-value information 
stored on devices 
Source: Kaspersky Lab 
Photos/Videos 
/Music created 
by you Files for work & 
personal use 
25% 
Banking 
details 
Coursework, 
study 
materials 
Personal email 
messages 
Address book 
/phone contacts Passwords, 
account 
details 
46% 
35% 
41% 
39% 
23% 23%
Award-winning PC protection 
How our 
products help 
you to fight 
against today's 
threats? 
Kaspersky Anti-Virus 
Essential protection for your 
PC against the latest malware 
Kaspersky Internet Security 
Premium protection for your PC, 
your privacy, your identity, your 
money and your kids against 
malware and online threats
Malware has become faster, 
smarter & more complicated 
Threat Solution! 
Free, Automatic Updates 
& Upgrades* ensure you 
always have the latest 
version of your Kaspersky 
security product 
System Watcher 
rescues your PC from 
harmful damage and lets 
you rollback bad activity, 
if your PC became 
infected 
Trusted Applications 
Mode 
ensures only trusted 
applications are allowed 
to run on your PC 
* During licence period. Licence period starts when 
you activate the product on the first PC 
254 
children born 
on Earth per minute 
219 
new malware 
detected per minute 
Source: Kaspersky Lab – Kaspersky Security Bulletin 2013
Public Wi-Fi could cost you 
more than you think 
Source: Kaspersky Lab 
40% users risk exposing 
their personal and financial 
data using Public Wi-Fi 
Security Notifications 
for Public Wi-Fi 
Networks prevents your 
data from being stolen 
on public Wi-Fi networks
Close the curtains on your life 
at home 
1800 students 
in Philadelphia 
were spied on 
by high school authorities 
using laptop cameras 
Webcam Protection 
blocks unauthorized 
access to your webcam 
and prevents your PC 
from becoming an open 
window into your private 
world 
Source: www.computerworld.com
Phishing remains a serious threat 
to your money and your identity 
Source: Kaspersky Lab 
Social Networking 
363,795,899 malware 
detected 
Web Browsing 
196,912,503 malware 
detected 
Online banking 
and shopping 
53,976,555 malware 
detected 
In 2013, phishing was monetized mostly by the 
sale of stolen accounts linked to banking data 
& contact lists 
Anti-Phishing 
defends you against 
phishing sites or emails 
that try to steal your 
money or your identity
Losing real money on the Internet 
9 out of 10 consumers have experienced some forms of 
financial threats and lost some or all of their money online 
Safe Money 
Kaspersky Lab's 
award-winning 
technology provides 
extra security on your PC 
for banking, shopping 
and making payments 
online 
BANK 
ONLINE 
BANKING 
Source: Kaspersky Lab
Unmonitored computer 
access could put your child at risk 
Parental Control 
helps keep your children 
safe & protected online 
via determining the 
access to the PC itself, 
applications, games, IMs 
and social networks… 
even when you are not 
physically next to your 
child 
Content children faced 
on the Internet 
3.0% 
Cruelty 
and violence 
2.0% 
Weapons 
1.8% 
Gambling 
0.9% 
Drugs 
16.8% 
Erotic and 
pornography 
3.0% 
Obscene 
language 3.8% 
Illegal 
software 
$#%@! 
Source: Kaspersky Lab
Premium protection quality. 
Proven by independent tests 
100% 
80% 
60% 
40% 
20% 
Score 
of TOP 3 
places 
Bitdefender 
Sophos 
Avira 
G-Data 
Kaspersky Lab 
Symantec 
F-Secure 
1st places – 41 
Participation in 79 
tests/reviews 
TOP 3 = 77% 
Trend Micro 
McAfee 
Avast 
BullGuard 
AhnLab Panda Microsoft 
AVG 
Eset 
20 40 60 80 N of independent tests/reviews 
Source: Kaspersky Lab 
In 2013, Kaspersky Lab 
products participated 
in 79 independent tests 
and reviews. 
Our products won the 
1st place 41 times and 
finished in the Top 3 of 
all tests 61 times (77%). 
The size of the bubble is 
number of 1st places.
Usability. Perfected 
Real-time protection 
status of your PC 
Easy to navigate 
with self-explanatory 
User Interface 
Detailed activity 
reporting
Performance. Optimized 
Works behind-the-scenes to check 
the reputation of all the launched 
applications, websites, analyzing 
program behavior, updating its 
databases, and more to ensure 
you’re always safe – all without 
slowing down your PC.
Prevent costly broadband or data plan charges 
Cost-Aware Networking* helps to 
monitor and optimize how much 
data you use to avoid unnecessary 
broadband and cellular data charges from 
increased online activity. 
SPEND SAVE 
* Cost-Aware Networking feature is available for Windows® 8 or higher
Which protection is right for you? 
Essential 
Protection 
for Your PC 
Premium 
Protection 
for Your PC 
Threat Protection 
Identity Protection 
Optimized Performance & Usability 
Financial Security 
Parental Control 
Digital Assets Protection 
LEARN MORE TRY FOR FREE LEARN MORE TRY FOR FREE
If it's important for you. We've got it protected.

Contenu connexe

Tendances

Web Security
Web SecurityWeb Security
Web SecurityTripad M
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityPatty Ramsey
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesSlideTeam
 
Home cyber security
Home cyber securityHome cyber security
Home cyber securityMichael File
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threadsVdidv
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Avar2011 changing security_awareness_training
Avar2011 changing security_awareness_trainingAvar2011 changing security_awareness_training
Avar2011 changing security_awareness_trainingYoungjun Chang
 
Cybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshareCybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshareYoungjun Chang
 

Tendances (20)

Mobile security
Mobile securityMobile security
Mobile security
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber security
Cyber securityCyber security
Cyber security
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
cyber security
cyber securitycyber security
cyber security
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Mobile app security
Mobile app securityMobile app security
Mobile app security
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Avar2011 changing security_awareness_training
Avar2011 changing security_awareness_trainingAvar2011 changing security_awareness_training
Avar2011 changing security_awareness_training
 
Cybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshareCybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshare
 

En vedette

Math power point for content standard 1[1]
Math power point for content standard 1[1]Math power point for content standard 1[1]
Math power point for content standard 1[1]epsteach
 
The Global Information Technology Report 2013
The Global Information Technology Report 2013The Global Information Technology Report 2013
The Global Information Technology Report 2013WiseKnow Thailand
 
WEF Global Competitiveness Report 2013-14
WEF Global Competitiveness Report 2013-14WEF Global Competitiveness Report 2013-14
WEF Global Competitiveness Report 2013-14WiseKnow Thailand
 
Texas STaR Chart- explained
Texas STaR Chart- explainedTexas STaR Chart- explained
Texas STaR Chart- explainedBethnye
 
ฉลาดรู้เน็ต
ฉลาดรู้เน็ตฉลาดรู้เน็ต
ฉลาดรู้เน็ตWiseKnow Thailand
 

En vedette (7)

Math power point for content standard 1[1]
Math power point for content standard 1[1]Math power point for content standard 1[1]
Math power point for content standard 1[1]
 
The Global Information Technology Report 2013
The Global Information Technology Report 2013The Global Information Technology Report 2013
The Global Information Technology Report 2013
 
Cyber threats 2013
Cyber threats 2013Cyber threats 2013
Cyber threats 2013
 
WEF Global Competitiveness Report 2013-14
WEF Global Competitiveness Report 2013-14WEF Global Competitiveness Report 2013-14
WEF Global Competitiveness Report 2013-14
 
Texas STaR Chart
Texas STaR ChartTexas STaR Chart
Texas STaR Chart
 
Texas STaR Chart- explained
Texas STaR Chart- explainedTexas STaR Chart- explained
Texas STaR Chart- explained
 
ฉลาดรู้เน็ต
ฉลาดรู้เน็ตฉลาดรู้เน็ต
ฉลาดรู้เน็ต
 

Similaire à KAV KIS 2015 Product Presentation

Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Dejan Pogačnik
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business NetworkAnindita Ghatak
 
15 Way to Protect Your Business From a Cyberattack .pdf
15 Way to Protect Your Business From a Cyberattack .pdf15 Way to Protect Your Business From a Cyberattack .pdf
15 Way to Protect Your Business From a Cyberattack .pdfBorja ARRIZABALAGA URIARTE
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutionsCyberhunter Cyber Security
 
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒Cheer Chain Enterprise Co., Ltd.
 
Predstavitev Kaspersky PURE 3.0 Total Security
Predstavitev Kaspersky PURE 3.0 Total SecurityPredstavitev Kaspersky PURE 3.0 Total Security
Predstavitev Kaspersky PURE 3.0 Total SecurityDejan Pogačnik
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 

Similaire à KAV KIS 2015 Product Presentation (20)

Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015
 
Kaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand LaunchKaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand Launch
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Security & Compliance for Startups
Security & Compliance for StartupsSecurity & Compliance for Startups
Security & Compliance for Startups
 
15 Way to Protect Your Business From a Cyberattack .pdf
15 Way to Protect Your Business From a Cyberattack .pdf15 Way to Protect Your Business From a Cyberattack .pdf
15 Way to Protect Your Business From a Cyberattack .pdf
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
 
Predstavitev Kaspersky PURE 3.0 Total Security
Predstavitev Kaspersky PURE 3.0 Total SecurityPredstavitev Kaspersky PURE 3.0 Total Security
Predstavitev Kaspersky PURE 3.0 Total Security
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 

Plus de WiseKnow Thailand

Capital in the Twenty-First Century.pdf
Capital in the Twenty-First Century.pdfCapital in the Twenty-First Century.pdf
Capital in the Twenty-First Century.pdfWiseKnow Thailand
 
eBook_A_Legacy_for_All_6July2022.pdf
eBook_A_Legacy_for_All_6July2022.pdfeBook_A_Legacy_for_All_6July2022.pdf
eBook_A_Legacy_for_All_6July2022.pdfWiseKnow Thailand
 
The Age of Spiritual Machines: When Computers Exceed Human Intelligence
The Age of Spiritual Machines: When Computers Exceed Human IntelligenceThe Age of Spiritual Machines: When Computers Exceed Human Intelligence
The Age of Spiritual Machines: When Computers Exceed Human IntelligenceWiseKnow Thailand
 
ตำราตรวจโรคหมอสุรเกียรติ์.pdf
ตำราตรวจโรคหมอสุรเกียรติ์.pdfตำราตรวจโรคหมอสุรเกียรติ์.pdf
ตำราตรวจโรคหมอสุรเกียรติ์.pdfWiseKnow Thailand
 
รายงานผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ในประเทศไทย ปี 2564
รายงานผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ในประเทศไทย ปี 2564รายงานผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ในประเทศไทย ปี 2564
รายงานผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ในประเทศไทย ปี 2564WiseKnow Thailand
 
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ในประเทศไทย ปี 2564
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ในประเทศไทย ปี 2564เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ในประเทศไทย ปี 2564
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ในประเทศไทย ปี 2564WiseKnow Thailand
 
คู่มือฉบับประชาชน กรณีรักษาแบบผู้ป่วยนอกและแยกกักกันตนเอง.pdf
คู่มือฉบับประชาชน กรณีรักษาแบบผู้ป่วยนอกและแยกกักกันตนเอง.pdfคู่มือฉบับประชาชน กรณีรักษาแบบผู้ป่วยนอกและแยกกักกันตนเอง.pdf
คู่มือฉบับประชาชน กรณีรักษาแบบผู้ป่วยนอกและแยกกักกันตนเอง.pdfWiseKnow Thailand
 
Thailand Internet User Behavior 2020 Presentation
Thailand Internet User Behavior 2020 PresentationThailand Internet User Behavior 2020 Presentation
Thailand Internet User Behavior 2020 PresentationWiseKnow Thailand
 
Thailand Internet User Behavior 2020
Thailand Internet User Behavior 2020Thailand Internet User Behavior 2020
Thailand Internet User Behavior 2020WiseKnow Thailand
 
เรียนรู้ อยู่กับฝุ่น PM2.5
เรียนรู้ อยู่กับฝุ่น PM2.5เรียนรู้ อยู่กับฝุ่น PM2.5
เรียนรู้ อยู่กับฝุ่น PM2.5WiseKnow Thailand
 
Thailand Economic Monitor - Harnessing Fintech for Financial Inclusion
Thailand Economic Monitor - Harnessing Fintech for Financial InclusionThailand Economic Monitor - Harnessing Fintech for Financial Inclusion
Thailand Economic Monitor - Harnessing Fintech for Financial InclusionWiseKnow Thailand
 
สู่จุดจบ! | The Coming Collapse of Thailand
สู่จุดจบ! | The Coming Collapse of Thailandสู่จุดจบ! | The Coming Collapse of Thailand
สู่จุดจบ! | The Coming Collapse of ThailandWiseKnow Thailand
 
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2560
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2560เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2560
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2560WiseKnow Thailand
 
Thailand Internet User Profile 2016
Thailand Internet User Profile 2016Thailand Internet User Profile 2016
Thailand Internet User Profile 2016WiseKnow Thailand
 
เอกสารประกอบของ Thailand Internet User Profile 2016
เอกสารประกอบของ Thailand Internet User Profile 2016 เอกสารประกอบของ Thailand Internet User Profile 2016
เอกสารประกอบของ Thailand Internet User Profile 2016 WiseKnow Thailand
 
What if the next big disruptor isn’t a what but a who?
What if the next big disruptor isn’t a what but a who?What if the next big disruptor isn’t a what but a who?
What if the next big disruptor isn’t a what but a who?WiseKnow Thailand
 
The Future 100: Trends and Change to Watch in 2016
The Future 100: Trends and Change to Watch in 2016The Future 100: Trends and Change to Watch in 2016
The Future 100: Trends and Change to Watch in 2016WiseKnow Thailand
 

Plus de WiseKnow Thailand (20)

Capital in the Twenty-First Century.pdf
Capital in the Twenty-First Century.pdfCapital in the Twenty-First Century.pdf
Capital in the Twenty-First Century.pdf
 
eBook_A_Legacy_for_All_6July2022.pdf
eBook_A_Legacy_for_All_6July2022.pdfeBook_A_Legacy_for_All_6July2022.pdf
eBook_A_Legacy_for_All_6July2022.pdf
 
The Age of Spiritual Machines: When Computers Exceed Human Intelligence
The Age of Spiritual Machines: When Computers Exceed Human IntelligenceThe Age of Spiritual Machines: When Computers Exceed Human Intelligence
The Age of Spiritual Machines: When Computers Exceed Human Intelligence
 
ตำราตรวจโรคหมอสุรเกียรติ์.pdf
ตำราตรวจโรคหมอสุรเกียรติ์.pdfตำราตรวจโรคหมอสุรเกียรติ์.pdf
ตำราตรวจโรคหมอสุรเกียรติ์.pdf
 
รายงานผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ในประเทศไทย ปี 2564
รายงานผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ในประเทศไทย ปี 2564รายงานผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ในประเทศไทย ปี 2564
รายงานผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ในประเทศไทย ปี 2564
 
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ในประเทศไทย ปี 2564
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ในประเทศไทย ปี 2564เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ในประเทศไทย ปี 2564
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ในประเทศไทย ปี 2564
 
คู่มือฉบับประชาชน กรณีรักษาแบบผู้ป่วยนอกและแยกกักกันตนเอง.pdf
คู่มือฉบับประชาชน กรณีรักษาแบบผู้ป่วยนอกและแยกกักกันตนเอง.pdfคู่มือฉบับประชาชน กรณีรักษาแบบผู้ป่วยนอกและแยกกักกันตนเอง.pdf
คู่มือฉบับประชาชน กรณีรักษาแบบผู้ป่วยนอกและแยกกักกันตนเอง.pdf
 
Thailand Internet User Behavior 2020 Presentation
Thailand Internet User Behavior 2020 PresentationThailand Internet User Behavior 2020 Presentation
Thailand Internet User Behavior 2020 Presentation
 
Thailand Internet User Behavior 2020
Thailand Internet User Behavior 2020Thailand Internet User Behavior 2020
Thailand Internet User Behavior 2020
 
เรียนรู้ อยู่กับฝุ่น PM2.5
เรียนรู้ อยู่กับฝุ่น PM2.5เรียนรู้ อยู่กับฝุ่น PM2.5
เรียนรู้ อยู่กับฝุ่น PM2.5
 
Thailand Economic Monitor - Harnessing Fintech for Financial Inclusion
Thailand Economic Monitor - Harnessing Fintech for Financial InclusionThailand Economic Monitor - Harnessing Fintech for Financial Inclusion
Thailand Economic Monitor - Harnessing Fintech for Financial Inclusion
 
สู่จุดจบ! | The Coming Collapse of Thailand
สู่จุดจบ! | The Coming Collapse of Thailandสู่จุดจบ! | The Coming Collapse of Thailand
สู่จุดจบ! | The Coming Collapse of Thailand
 
CLS for Volunteer
CLS for VolunteerCLS for Volunteer
CLS for Volunteer
 
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2560
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2560เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2560
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2560
 
Cyber Threats 2015
Cyber Threats 2015Cyber Threats 2015
Cyber Threats 2015
 
Thailand Internet User Profile 2016
Thailand Internet User Profile 2016Thailand Internet User Profile 2016
Thailand Internet User Profile 2016
 
เอกสารประกอบของ Thailand Internet User Profile 2016
เอกสารประกอบของ Thailand Internet User Profile 2016 เอกสารประกอบของ Thailand Internet User Profile 2016
เอกสารประกอบของ Thailand Internet User Profile 2016
 
What if the next big disruptor isn’t a what but a who?
What if the next big disruptor isn’t a what but a who?What if the next big disruptor isn’t a what but a who?
What if the next big disruptor isn’t a what but a who?
 
Interaction 2016
Interaction 2016Interaction 2016
Interaction 2016
 
The Future 100: Trends and Change to Watch in 2016
The Future 100: Trends and Change to Watch in 2016The Future 100: Trends and Change to Watch in 2016
The Future 100: Trends and Change to Watch in 2016
 

Dernier

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Dernier (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

KAV KIS 2015 Product Presentation

  • 1. AWARD-WINNING PROTECTION FOR YOUR PC AND YOUR DIGITAL LIFE
  • 2. PCs are still the most vulnerable devices to attacks 3 of 4 users still feel PCs are unsafe Source: Kaspersky Lab
  • 3. Your personal digital information is vulnerable... and cybercriminals know that! High-value information stored on devices Source: Kaspersky Lab Photos/Videos /Music created by you Files for work & personal use 25% Banking details Coursework, study materials Personal email messages Address book /phone contacts Passwords, account details 46% 35% 41% 39% 23% 23%
  • 4. Award-winning PC protection How our products help you to fight against today's threats? Kaspersky Anti-Virus Essential protection for your PC against the latest malware Kaspersky Internet Security Premium protection for your PC, your privacy, your identity, your money and your kids against malware and online threats
  • 5. Malware has become faster, smarter & more complicated Threat Solution! Free, Automatic Updates & Upgrades* ensure you always have the latest version of your Kaspersky security product System Watcher rescues your PC from harmful damage and lets you rollback bad activity, if your PC became infected Trusted Applications Mode ensures only trusted applications are allowed to run on your PC * During licence period. Licence period starts when you activate the product on the first PC 254 children born on Earth per minute 219 new malware detected per minute Source: Kaspersky Lab – Kaspersky Security Bulletin 2013
  • 6. Public Wi-Fi could cost you more than you think Source: Kaspersky Lab 40% users risk exposing their personal and financial data using Public Wi-Fi Security Notifications for Public Wi-Fi Networks prevents your data from being stolen on public Wi-Fi networks
  • 7. Close the curtains on your life at home 1800 students in Philadelphia were spied on by high school authorities using laptop cameras Webcam Protection blocks unauthorized access to your webcam and prevents your PC from becoming an open window into your private world Source: www.computerworld.com
  • 8. Phishing remains a serious threat to your money and your identity Source: Kaspersky Lab Social Networking 363,795,899 malware detected Web Browsing 196,912,503 malware detected Online banking and shopping 53,976,555 malware detected In 2013, phishing was monetized mostly by the sale of stolen accounts linked to banking data & contact lists Anti-Phishing defends you against phishing sites or emails that try to steal your money or your identity
  • 9. Losing real money on the Internet 9 out of 10 consumers have experienced some forms of financial threats and lost some or all of their money online Safe Money Kaspersky Lab's award-winning technology provides extra security on your PC for banking, shopping and making payments online BANK ONLINE BANKING Source: Kaspersky Lab
  • 10. Unmonitored computer access could put your child at risk Parental Control helps keep your children safe & protected online via determining the access to the PC itself, applications, games, IMs and social networks… even when you are not physically next to your child Content children faced on the Internet 3.0% Cruelty and violence 2.0% Weapons 1.8% Gambling 0.9% Drugs 16.8% Erotic and pornography 3.0% Obscene language 3.8% Illegal software $#%@! Source: Kaspersky Lab
  • 11. Premium protection quality. Proven by independent tests 100% 80% 60% 40% 20% Score of TOP 3 places Bitdefender Sophos Avira G-Data Kaspersky Lab Symantec F-Secure 1st places – 41 Participation in 79 tests/reviews TOP 3 = 77% Trend Micro McAfee Avast BullGuard AhnLab Panda Microsoft AVG Eset 20 40 60 80 N of independent tests/reviews Source: Kaspersky Lab In 2013, Kaspersky Lab products participated in 79 independent tests and reviews. Our products won the 1st place 41 times and finished in the Top 3 of all tests 61 times (77%). The size of the bubble is number of 1st places.
  • 12. Usability. Perfected Real-time protection status of your PC Easy to navigate with self-explanatory User Interface Detailed activity reporting
  • 13. Performance. Optimized Works behind-the-scenes to check the reputation of all the launched applications, websites, analyzing program behavior, updating its databases, and more to ensure you’re always safe – all without slowing down your PC.
  • 14. Prevent costly broadband or data plan charges Cost-Aware Networking* helps to monitor and optimize how much data you use to avoid unnecessary broadband and cellular data charges from increased online activity. SPEND SAVE * Cost-Aware Networking feature is available for Windows® 8 or higher
  • 15. Which protection is right for you? Essential Protection for Your PC Premium Protection for Your PC Threat Protection Identity Protection Optimized Performance & Usability Financial Security Parental Control Digital Assets Protection LEARN MORE TRY FOR FREE LEARN MORE TRY FOR FREE
  • 16. If it's important for you. We've got it protected.