SlideShare a Scribd company logo
1 of 25
INTRODUCTION TO 
BITDEFENDER 
Mihai Guran – Global Sales Director 
US Tour 
New York 11/4, Washington 11/5, Chicago 11/6
BITDEFENDER TEAM 
US TOUR NOV. 2014 – NEW YORK 11/4 
Paul Lupo – Territory Manager, Nord-East 
Peter Braccia – Enterprise Business Development Manager, Nord-East and Mid-Atlantic 
Jim Mulholland - Enterprise Business Development Manager, Nord-East and Mid-Atlantic 
Peter Nourse – Marketing Director, US & Canada 
Rebecca Mendenhall – Enterprise Marketing Manager, US & Canada 
Ana Fasic – Support Account Manager, US & Canada 
Angelo Jambore – Product Marketing Director, Global 
Bo Skeel – Global Evangelist, Bitdefender Enterprise Solutions
AGENDA 
Introduction to Bitdefender 
Bitdefender Technologies 
Bitdefender Partner Advantage Program (PAN) 
Demos/discussions – Gravity Zone Solutions, Cloud Solutions, PAN tool/program 
Q&A
WHO IS BITDEFENDER?
500 MILLION 
Users are protected by Bitdefender 
technologies.
>100 
OEM partners use Bitdefender 
technologies in their cyber-security 
products and services.
BITDEFENDER: GLOBAL COVERAGE 
ROMANIA (HQ AND DEVELOPMENT LABS) 
UNITED STATES (WEST & EAST COASTS), UK, GERMANY, SPAIN, UAE, DENMARK 
COUNTRY PARTNERS, GOLD/SILVER/BRONZE PARTNERS
WHAT DOES BITDEFENDER DO?
A WORLD OF 
ENDPOINTS
PROTECTING 
THE MODERN 
LIFE AND BUSINESS 
STYLE
RESULTS IN SUSTAINABLE TECHNOGICAL 
LEADERSHIP 
 #1 Anti-Malware Security Technology in the world 
 #1 in Security Technology 
 #1 in Antispam Technologies 
Copyright@Bitdefender 2014/ www.bitdefender.com 11/17/2014 • 11
A DECADE OF INNOVATION IN TECHNOLOGY 
• First antivirus worldwide to offer intelligent updating 
• First antivirus product to include an application firewall 
• MIDAS (Malware Intrusion Detection Advanced System)- wins IST prize, “set to revolutionize AV design” 
• Bitdefender to release its proprietary Antispam technology 
• Bitdefender introduces B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments) 
• Spam Image Filter an important step in combating the new spamming techniques 
• Bitdefender® Mobile Security to provide real-time protection for smartphones and PDAs 
• Bitdefender® Active Virus Control to innovate with a real time technology 
• 60-Second QuickScan – The quickest way to find if your computer is infected by using this online scanner 
• Gravity Architecture enables new generation of security for highly scalable services 
• Bitdefender Safepay™ secures all e-banking and e-shopping in a separate iron-clad, secure browser 
• Security for Virtualized Environments – The 1st vShield 5 solution optimized for virtualized datacenters 
• Cloud Security for Endpoints to provide enterprise-class security with no on-site management server 
• Bitdefender Clueful™, first application to show the world how iOS apps treat user's privacy 
• Hypervisor Agnostic Scanning Engine – allows Bitdefender to provide the best operational cost savings for virtualization adopters 
• Intra-HV memory introspection engine - prototype that allows for detecting and preventing Virtual Machine kernel mode threats across 
Microsoft/Linux/etc 
• Bitdefender Photon™ technology boasts scanning speed and minimizes slowdowns 
2000 
- 
- 
- 
- 
- 
2005 
- 
- 
- 
- 
- 
- 
2011 
- 
2012 
2014 
Copyright@Bitdefender 2014/ www.bitdefender.com 11/17/2014 • 12
>15,000 
It is the largest amount of VDI’s 
protected in a single customer.
>1,700 
It the number of CPU’s in the largest 
Gravity Zone for SVE installations.
WHY PARTNER WITH 
BITDEFENDER?
CYBER SECURITY MARKET IS HOT!
$67 BILLION 
Cyber security market in 2013 
compared with 3.5 B in 2002. 
Gartner predicts $86 billion by 2016.
BITDEFENDER 
PARTNER PROGRAM 
Partner Advantage Network (PAN)
Why work with Bitdefender? 
Copyright@Bitdefender 2014/ www.bitdefender.com 11/17/2014 • 19
FOCUSED ON THE PARTNERS’ NETWORK 
http://www.bitdefender.com/partners/ 
Copyright@Bitdefender 2014/ www.bitdefender.com 11/17/2014 • 20
Partners Testimonials 
Copyright@Bitdefender 2013/ www.Bitdefender.com 11/17/2014 • 21
PARTNERSHIP LEVELS 
Bronze 
Silver 
Gold 
Copyright@Bitdefender 2014/ www.bitdefender.com 11/17/2014 • 22
 PARTNER MANAGEMENT 
 ORDERING 
 DEAL REGISTRATION 
 RENEWALS MANAGEMENT 
 LEADS MANAGEMENT 
 MARKETING MATERIALS 
 TRAININGS & CERTIFICATIONS 
 TOOLBOX 
(NFRs, License Keys, Information & Extension) 
PAN Portal 
One-stop-shop for Partner Advantage Network program 
implementation, gathering all the needed information on 
deal registrations, program offerings, product releases, 
sales and marketing tools, leads management, renewals, 
account protection and regional product promotions. 
Access: https://pan.bitdefender.com/ 
How to use the PAN portal demos: 
https://pan.bitdefender.com/CertificationsTraining/port 
al_demos 
Copyright@Bitdefender 2013/ www.Bitdefender.com 11/17/2014 • 23
PAN – RESELLING CONDITIONS 
Copyright@Bitdefender 2014/ www.bitdefender.com 11/17/2014 • 24
THANK YOU! 
Q & A ?

More Related Content

What's hot

Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Security Matters : The Evolution of Samsung KNOX™
Security Matters: The Evolution of Samsung KNOX™Security Matters: The Evolution of Samsung KNOX™
Security Matters : The Evolution of Samsung KNOX™Samsung at Work
 
Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgePerfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgeSamsung Biz Mobile
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Samsung Biz Mobile
 
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung Biz Mobile
 
Jamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS SecurityJamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS Securitycentralohioissa
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXSamsung Biz Mobile
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeSamsung Biz Mobile
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksSkycure
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMSkycure
 
The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. Samsung Biz Mobile
 
Azure IoT from groundup
Azure IoT from groundupAzure IoT from groundup
Azure IoT from groundupRaminder Singh
 
Tools for Evaluating Mobile Threat Defense Solutions
Tools for Evaluating Mobile Threat Defense SolutionsTools for Evaluating Mobile Threat Defense Solutions
Tools for Evaluating Mobile Threat Defense SolutionsSkycure
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020DevOps.com
 
Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Marco Dal Pino
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile EnterpriseIBM Danmark
 
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_ENMID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_ENVladyslav Radetsky
 
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Skycure
 

What's hot (20)

Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Security Matters : The Evolution of Samsung KNOX™
Security Matters: The Evolution of Samsung KNOX™Security Matters: The Evolution of Samsung KNOX™
Security Matters : The Evolution of Samsung KNOX™
 
Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgePerfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses
 
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
 
Jamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS SecurityJamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS Security
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOX
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, Anytime
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMM
 
The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business.
 
Azure IoT from groundup
Azure IoT from groundupAzure IoT from groundup
Azure IoT from groundup
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
Tools for Evaluating Mobile Threat Defense Solutions
Tools for Evaluating Mobile Threat Defense SolutionsTools for Evaluating Mobile Threat Defense Solutions
Tools for Evaluating Mobile Threat Defense Solutions
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020
 
Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile Enterprise
 
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_ENMID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
 
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
 

Viewers also liked

Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Lietuvos kompiuterininkų sąjunga
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET
 
CSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET - Juraj Malcho PresentationCSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET - Juraj Malcho PresentationCSO_Presentations
 
Building & Leveraging White Database for Antivirus Testing
Building & Leveraging White Database for Antivirus TestingBuilding & Leveraging White Database for Antivirus Testing
Building & Leveraging White Database for Antivirus Testingfrisksoftware
 
Agnitum Technology Licensing
Agnitum Technology LicensingAgnitum Technology Licensing
Agnitum Technology LicensingPavel Fyodorov
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET
 
Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司
Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司
Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司Cheer Chain Enterprise Co., Ltd.
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET
 
Kaspersky presentation
Kaspersky presentationKaspersky presentation
Kaspersky presentationSam Phal
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectioninfoLock Technologies
 
Pawel FORCZMANSKI (West Pomeranian University of Technology) "Advanced digita...
Pawel FORCZMANSKI (West Pomeranian University of Technology) "Advanced digita...Pawel FORCZMANSKI (West Pomeranian University of Technology) "Advanced digita...
Pawel FORCZMANSKI (West Pomeranian University of Technology) "Advanced digita...Lietuvos kompiuterininkų sąjunga
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from SymantecArrow ECS UK
 

Viewers also liked (13)

Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Enterprises
 
CSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET - Juraj Malcho PresentationCSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
 
Building & Leveraging White Database for Antivirus Testing
Building & Leveraging White Database for Antivirus TestingBuilding & Leveraging White Database for Antivirus Testing
Building & Leveraging White Database for Antivirus Testing
 
Agnitum Technology Licensing
Agnitum Technology LicensingAgnitum Technology Licensing
Agnitum Technology Licensing
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large Businesses
 
Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司
Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司
Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司
 
Dividend Yield Breakthroughs
Dividend Yield BreakthroughsDividend Yield Breakthroughs
Dividend Yield Breakthroughs
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
 
Kaspersky presentation
Kaspersky presentationKaspersky presentation
Kaspersky presentation
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 
Pawel FORCZMANSKI (West Pomeranian University of Technology) "Advanced digita...
Pawel FORCZMANSKI (West Pomeranian University of Technology) "Advanced digita...Pawel FORCZMANSKI (West Pomeranian University of Technology) "Advanced digita...
Pawel FORCZMANSKI (West Pomeranian University of Technology) "Advanced digita...
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
 

Similar to US Roadshow - Introduction to Bitdefender

WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
 WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021 WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021Purdicom
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Rafael Maranon
 
Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...Mindtree Ltd.
 
Visual Frog - Leap into the Cloud
Visual Frog - Leap into the CloudVisual Frog - Leap into the Cloud
Visual Frog - Leap into the Cloudcmcdonne
 
End Point Security - K7
End Point Security - K7End Point Security - K7
End Point Security - K7Prime Infoserv
 
Connected homes - Create a safer, healthier and greener world for your custom...
Connected homes - Create a safer, healthier and greener world for your custom...Connected homes - Create a safer, healthier and greener world for your custom...
Connected homes - Create a safer, healthier and greener world for your custom...Mindtree Ltd.
 
Case Study on Big Data Service for Manufacturing - Silver Touch Technologies
Case Study on Big Data Service for Manufacturing - Silver Touch TechnologiesCase Study on Big Data Service for Manufacturing - Silver Touch Technologies
Case Study on Big Data Service for Manufacturing - Silver Touch TechnologiesSilver Touch Technologies
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxssuser365526
 
Winjit Corporate Brochure
Winjit Corporate BrochureWinjit Corporate Brochure
Winjit Corporate Brochuresarang sethiya
 
Pivotal Overview: Canadian Team
Pivotal Overview: Canadian TeamPivotal Overview: Canadian Team
Pivotal Overview: Canadian TeamVMware Tanzu
 
Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Amer Zia
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile BankingVeridium
 
Digital Disruption Across Tomorrow's Manufacturing Supply Chains
Digital Disruption Across Tomorrow's Manufacturing Supply ChainsDigital Disruption Across Tomorrow's Manufacturing Supply Chains
Digital Disruption Across Tomorrow's Manufacturing Supply ChainsMark Morley, MBA
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonDigital Catapult
 
Vidyo: Online-Video Customer Service
Vidyo: Online-Video Customer ServiceVidyo: Online-Video Customer Service
Vidyo: Online-Video Customer ServicerAVe [PUBS]
 
Panda security corporate_presentation_2012
Panda security corporate_presentation_2012Panda security corporate_presentation_2012
Panda security corporate_presentation_2012Truong Minh Yen
 

Similar to US Roadshow - Introduction to Bitdefender (20)

WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
 WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021 WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...
 
Bitdefender, Ana Cobzaru
Bitdefender, Ana CobzaruBitdefender, Ana Cobzaru
Bitdefender, Ana Cobzaru
 
Visual Frog - Leap into the Cloud
Visual Frog - Leap into the CloudVisual Frog - Leap into the Cloud
Visual Frog - Leap into the Cloud
 
End Point Security - K7
End Point Security - K7End Point Security - K7
End Point Security - K7
 
Connected homes - Create a safer, healthier and greener world for your custom...
Connected homes - Create a safer, healthier and greener world for your custom...Connected homes - Create a safer, healthier and greener world for your custom...
Connected homes - Create a safer, healthier and greener world for your custom...
 
Case Study on Big Data Service for Manufacturing - Silver Touch Technologies
Case Study on Big Data Service for Manufacturing - Silver Touch TechnologiesCase Study on Big Data Service for Manufacturing - Silver Touch Technologies
Case Study on Big Data Service for Manufacturing - Silver Touch Technologies
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
Winjit Corporate Brochure
Winjit Corporate BrochureWinjit Corporate Brochure
Winjit Corporate Brochure
 
Pivotal Overview: Canadian Team
Pivotal Overview: Canadian TeamPivotal Overview: Canadian Team
Pivotal Overview: Canadian Team
 
Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
Digital Disruption Across Tomorrow's Manufacturing Supply Chains
Digital Disruption Across Tomorrow's Manufacturing Supply ChainsDigital Disruption Across Tomorrow's Manufacturing Supply Chains
Digital Disruption Across Tomorrow's Manufacturing Supply Chains
 
Camdog pitch deck
Camdog pitch deckCamdog pitch deck
Camdog pitch deck
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Vidyo: Online-Video Customer Service
Vidyo: Online-Video Customer ServiceVidyo: Online-Video Customer Service
Vidyo: Online-Video Customer Service
 
Panda security corporate_presentation_2012
Panda security corporate_presentation_2012Panda security corporate_presentation_2012
Panda security corporate_presentation_2012
 
ARED pitch deck
ARED pitch deckARED pitch deck
ARED pitch deck
 

Recently uploaded

The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfryanfarris8
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyAnusha Are
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfayushiqss
 

Recently uploaded (20)

The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 

US Roadshow - Introduction to Bitdefender

  • 1. INTRODUCTION TO BITDEFENDER Mihai Guran – Global Sales Director US Tour New York 11/4, Washington 11/5, Chicago 11/6
  • 2. BITDEFENDER TEAM US TOUR NOV. 2014 – NEW YORK 11/4 Paul Lupo – Territory Manager, Nord-East Peter Braccia – Enterprise Business Development Manager, Nord-East and Mid-Atlantic Jim Mulholland - Enterprise Business Development Manager, Nord-East and Mid-Atlantic Peter Nourse – Marketing Director, US & Canada Rebecca Mendenhall – Enterprise Marketing Manager, US & Canada Ana Fasic – Support Account Manager, US & Canada Angelo Jambore – Product Marketing Director, Global Bo Skeel – Global Evangelist, Bitdefender Enterprise Solutions
  • 3. AGENDA Introduction to Bitdefender Bitdefender Technologies Bitdefender Partner Advantage Program (PAN) Demos/discussions – Gravity Zone Solutions, Cloud Solutions, PAN tool/program Q&A
  • 5. 500 MILLION Users are protected by Bitdefender technologies.
  • 6. >100 OEM partners use Bitdefender technologies in their cyber-security products and services.
  • 7. BITDEFENDER: GLOBAL COVERAGE ROMANIA (HQ AND DEVELOPMENT LABS) UNITED STATES (WEST & EAST COASTS), UK, GERMANY, SPAIN, UAE, DENMARK COUNTRY PARTNERS, GOLD/SILVER/BRONZE PARTNERS
  • 9. A WORLD OF ENDPOINTS
  • 10. PROTECTING THE MODERN LIFE AND BUSINESS STYLE
  • 11. RESULTS IN SUSTAINABLE TECHNOGICAL LEADERSHIP  #1 Anti-Malware Security Technology in the world  #1 in Security Technology  #1 in Antispam Technologies Copyright@Bitdefender 2014/ www.bitdefender.com 11/17/2014 • 11
  • 12. A DECADE OF INNOVATION IN TECHNOLOGY • First antivirus worldwide to offer intelligent updating • First antivirus product to include an application firewall • MIDAS (Malware Intrusion Detection Advanced System)- wins IST prize, “set to revolutionize AV design” • Bitdefender to release its proprietary Antispam technology • Bitdefender introduces B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments) • Spam Image Filter an important step in combating the new spamming techniques • Bitdefender® Mobile Security to provide real-time protection for smartphones and PDAs • Bitdefender® Active Virus Control to innovate with a real time technology • 60-Second QuickScan – The quickest way to find if your computer is infected by using this online scanner • Gravity Architecture enables new generation of security for highly scalable services • Bitdefender Safepay™ secures all e-banking and e-shopping in a separate iron-clad, secure browser • Security for Virtualized Environments – The 1st vShield 5 solution optimized for virtualized datacenters • Cloud Security for Endpoints to provide enterprise-class security with no on-site management server • Bitdefender Clueful™, first application to show the world how iOS apps treat user's privacy • Hypervisor Agnostic Scanning Engine – allows Bitdefender to provide the best operational cost savings for virtualization adopters • Intra-HV memory introspection engine - prototype that allows for detecting and preventing Virtual Machine kernel mode threats across Microsoft/Linux/etc • Bitdefender Photon™ technology boasts scanning speed and minimizes slowdowns 2000 - - - - - 2005 - - - - - - 2011 - 2012 2014 Copyright@Bitdefender 2014/ www.bitdefender.com 11/17/2014 • 12
  • 13. >15,000 It is the largest amount of VDI’s protected in a single customer.
  • 14. >1,700 It the number of CPU’s in the largest Gravity Zone for SVE installations.
  • 15. WHY PARTNER WITH BITDEFENDER?
  • 17. $67 BILLION Cyber security market in 2013 compared with 3.5 B in 2002. Gartner predicts $86 billion by 2016.
  • 18. BITDEFENDER PARTNER PROGRAM Partner Advantage Network (PAN)
  • 19. Why work with Bitdefender? Copyright@Bitdefender 2014/ www.bitdefender.com 11/17/2014 • 19
  • 20. FOCUSED ON THE PARTNERS’ NETWORK http://www.bitdefender.com/partners/ Copyright@Bitdefender 2014/ www.bitdefender.com 11/17/2014 • 20
  • 21. Partners Testimonials Copyright@Bitdefender 2013/ www.Bitdefender.com 11/17/2014 • 21
  • 22. PARTNERSHIP LEVELS Bronze Silver Gold Copyright@Bitdefender 2014/ www.bitdefender.com 11/17/2014 • 22
  • 23.  PARTNER MANAGEMENT  ORDERING  DEAL REGISTRATION  RENEWALS MANAGEMENT  LEADS MANAGEMENT  MARKETING MATERIALS  TRAININGS & CERTIFICATIONS  TOOLBOX (NFRs, License Keys, Information & Extension) PAN Portal One-stop-shop for Partner Advantage Network program implementation, gathering all the needed information on deal registrations, program offerings, product releases, sales and marketing tools, leads management, renewals, account protection and regional product promotions. Access: https://pan.bitdefender.com/ How to use the PAN portal demos: https://pan.bitdefender.com/CertificationsTraining/port al_demos Copyright@Bitdefender 2013/ www.Bitdefender.com 11/17/2014 • 23
  • 24. PAN – RESELLING CONDITIONS Copyright@Bitdefender 2014/ www.bitdefender.com 11/17/2014 • 24
  • 25. THANK YOU! Q & A ?

Editor's Notes

  1. Bitdefender has made a clean value proposition to their partners, by highlighting the top technology we are offering, as we received the #1 spot in the most rigorous tests. The new partner program is also capitalizing on the success attributed by media and most prestigious influencers in the market.  The support offered through a dedicated partner portal and also the ease of doing business with unique products is giving our partner the right tools for going to market. To show our loyalty and commitment, it is also a very important benefit, Bitdefender is offering. Lifetime recurrent and protected revenues are given to a clear partner ranking that provides more incentives and higher profits.
  2. The commitment to the values we promote and sustain can be certified only by our partners, through the testimonials they offered. Convinced that we are the best to work with and our will to develop their business is incontestable.
  3. We couldn’t keep our promises without the right tool to offer the benefits that our partners need and our support to move their business forward. The main benefits of this in-house developed and customizable platform are listed in this slide. But the list is open and continuous improvements are being done by our development engineers.