G data 10 nov 2010

309 views
254 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
309
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

G data 10 nov 2010

  1. 1. G Data Presentation Bucharest 2010
  2. 2. Welcome. Costin Pecingina G Data Representative
  3. 3. G Data Overview1 G Data‘s Unique Technologies2 G Data Solutions3 New: G Data EndpointProtection4
  4. 4. G Data Overview1 G Data‘s Unique Technologies2 G Data Solutions3 New: G Data EndpointProtection4
  5. 5. • Founded 1985 in Germany • 300 employees world wide • Offices in 13 countries: Germany (HQ), USA, Canada, Japan, China, UK, France, Italy, Spain, BeNeLux, Poland and Russia • Sales Partners in more than 90 countries • G Data solutions globally available G Data Overview
  6. 6. The IT-Security Pioneer 1987 First AntiVirus world wide 1990 First AV with graphical user interface 1995 First AV Hardware Protection 1999 First Linux based BootScan 2005 First AV with Cloud Security 2007 First Silent Firewall 2008 First Fingerprinting for top performance
  7. 7. Member of the ITSMIG association Under the patronage of
  8. 8. G Data Overview1 G Data‘s Unique Technologies2 G Data Solutions3 New: G Data EndpointProtection4
  9. 9. • DoubleScan: 2 independent Scanning Engines for unique 99+ Warantee • Fastest reaction time on new threats • Fingerprinting prevents from unnecessary scans to save performance • Whitelisting of known files prevents from False Positives Reactive Protection 90% 92% 94% 96% 98% 100% Jan08 Mar08 May08 Jul08 Sep08 Nov08 Jan09 Mar09 May09 Jul09 Sep09 Nov09 Jan10 Mar10 May10 Jul10 G Data Kaspersky Symantec Mc Afee Trend Micro Reactive detection (Source: AV-Test) 0 100 200 300 400 500 600 G Data Kaspersky Symantec Mc Afee Trend Micro Average reaction time on new threats (Source: Computer BILD) 7h 11min 9h 19min 55min19min 3h 20min
  10. 10. • Proactive Protection with Behaviour Blocking and several heuristics methods • OutbreakShield: Mail based cloud security detects mass mailings such as virus outbreaks or spam attacks using statistical methodology • Web based Cloud Security: server based URL black lists for real time protection Real Time Protection McAfee Symantec Kaspersky F-Secure MSForefront AVG Trustport Sophos Redstone Avira GData 80,00% 85,00% 90,00% 95,00% 100,00% 40,00% 50,00% 60,00% 70,00% 80,00% 90,00% 100,00% ReactiveDetectionvs. Proactive Detection (Source:VirusBulletin) ReactiveDetectionRate Proactive Detection Rate
  11. 11. Certifications achieved Awards Certifications and Awards G Data is the world‘s leading test winner
  12. 12. G Data Overview1 G Data‘s Unique Technologies2 G Data Solutions3 New: G Data EndpointProtection4
  13. 13. G Data Desktop Solutions
  14. 14. AntiMalware / AntiSpyware Firewall / AntiSpam Parental Control Backup / Tuning
  15. 15. G Data Desktop Solutions Available now
  16. 16. GfK TrendSetter - Germany Computer-Software Period : 11. - 17. October 2010 (Week 41) GfK-TOP 10 NON-GAMES Rank Previous Current Week Week Title Brand 1 1 OFFICE HOME AND STUDENT 2010 MICROSOFT 4 2 INTERNET SECURITY 2011 3 USER 25th ANNIVERSARY VERSION G DATA 3 3 INTERNET SECURITY 2011 KASPERSKY LAB 6 4 WINDOWS 7 HOME PREMIUM 64-BIT SB-VERSION MICROSOFT 5 5 INTERNET SECURITY 2011 UPDATE KASPERSKY LAB 8 6 INTERNET SECURITY 2011 3 USER UPDATE KASPERSKY LAB 10 7 WINDOWS 7 HOME PREMIUM 32-BIT SB-VERSION MICROSOFT 7 8 NORTON INTERNET SECURITY 2011 3 USER SYMANTEC 9 9 NORTON INTERNET SECURITY 2011 SYMANTEC 2 10 ANTI-VIRUS 2011 3 USER LIMITED EDITION KASPERSKY LAB
  17. 17. G Data Business Solutions
  18. 18. Management Server AntiVirus Client Firewall and AntiSpam Client Mail Security Remote control: installation, virus scans, updates, settings Fully automated virus scans and updates (pull-push) Fully invisible malware protection – no client interaction For Windows and Linux 2 way Firewall: Invisible protection against hacker attacks AntiSpam: Content independent real time protection Mail server independent mail gateway Protection against malware, spam and phishing
  19. 19. G Data Overview1 G Data‘s Unique Technologies2 G Data Solutions3 New: G Data EndpointProtection4
  20. 20. IT Security strikes out in a new direction.
  21. 21. Web 2.0 platforms (blogs, forum entries) Social networks (Facebook, MySpace, Twitter) Manipulated hot topic search results Links in instant messengers and chats Phishing through online auctions File sharing and file hosting Modern Sources of attack
  22. 22. Web 2.0 platforms (blogs, forum entries) Social networks (Facebook, MySpace, Twitter) Manipulated hot topic search results Links in instant messengers and chats Phishing through online auctions File sharing and file hosting Modern Souces of attack
  23. 23. Financial harm Loss of manpower
  24. 24. Security risks Infiltration of new malware IT infrastructure damage due to unauthorised software Loss / theft of sensitive data
  25. 25. Legal risks (German Law) Joint responsibility for copyright infringements (pirate copies, MP3…) If trade secrets are published If personal data is made accessible to the public
  26. 26. ESSENTIAL: the policy Written definition of the content and extent of private Internet use Use of software to ensure adherence to the policy
  27. 27. AntiVirus / Firewall / AntiSpam PolicyManager: Device control Application control Content Filter Internet use control G Data EndpointProtection
  28. 28. USB mass storage devices / hard disks CD- / DVD- / floppy drives Can be certified by administrator Device control
  29. 29. Whitelist or blacklist Many applications predefined (file sharing, games, Messenger, etc.) Application control
  30. 30. 80 different categories, e.g.: Chats / forums / blogs Online auctions / job search sites Gambling / gaming… Content Filter
  31. 31. Definable Internet lock out times Usage times can be limited per day, week and month Internet use control
  32. 32. Market survey
  33. 33. Device control Application control Web / URL filter Internet use control Symantec Endpoint Protection Sophos Endpoint Security & Control Kaspersky Antivirus 6.0 McAfee Protection for Endpoint Trend Micro Worry Free Business Security G Data Endpoint Protection Only Whitelist Only Whitelist Only Blacklist
  34. 34. Best protection against malware, hackers and spam Legal security for usage of corporate PCs Significant improve of productivity Easy administration thanks to unique all-in-one solution G Data EndpointProtection advantages
  35. 35. Thank you.

×