SlideShare a Scribd company logo
1 of 10
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 2
2011
2000
2005
-
-
-
2012
2013
-
-
-
-
-
-
-
-
-
The beginning…
-
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 3
 First antivirus worldwide to offer intelligent updating
 First antivirus product to include an application firewall
 MIDAS (Malware Intrusion Detection Advanced System)- wins IST prize, “set to revolutionize AV design”
 Bitdefender to release its proprietary Antispam technology
 Bitdefender introduces B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments)
 Spam Image Filter an important step in combating the new spamming techniques
 Bitdefender® Mobile Security to provide real-time protection for smartphones and PDAs
 Bitdefender® Active Virus Control to innovate with a real time technology
 60-Second QuickScan – The quickest way to find if your computer is infected by using this online scanner
 Gravity Architecture enables new generation of security for highly scalable services
 Bitdefender Safepay™ secures all e-banking and e-shopping in a separate iron-clad, secure browser
 Security for Virtualized Environments – The 1st vShield 5 solution optimized for virtualized datacenters
 Bitdefender Clueful™, first application to show the world how iOS apps treat user's privacy
 Bitdefender Photon™ technology boasts scanning speed and minimizes slowdowns
 Cloud Security for Endpoints to provide enterprise-class security with no on-site management server
 Hypervisor Agnostic Scanning Engine – allows Bitdefender to provide the best operational cost savings for virtualization adopters
 Intra-HV memory introspection engine - prototype that allows for detecting and preventing Virtual Machine kernel mode threats
across Microsoft/Linux/etc
2011
2001
2005
-
-
-
2012
2013
-
-
-
-
-
-
-
-
-
A decade of innovation in technology
-
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 4
 #1 in Security Technology
 Bitdefender wins both AV-Test awards for Home Users: Best
Protection and Best Performance in 2013.
 3 out of the first 4 rated endpoint security vendors are using
Bitdefender engines
 #1 in Antispam Technologies
 Bitdefender analyzes and issues protection for 5 million
spam messages every day, or about 35 million per week.
 Bitdefender has won all 30 VBSpam awards in a row in Virus
Bulletin’s (VB) antispam tests between May 2009 to March 2014
 In five local offices, 250+ engineers in R&D team warrant that Bitdefender’s technology –
protecting more than 400 million users worldwide , technology partnerships included – is
the #1 Anti-Malware Security Technology in the world.
Results in sustainable technogical leadership
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 5
AV-TEST
 Awarded “Best Protection” and “Best Performance” in
January 2014
PC MAG
 Awarded “Best Antivirus of 2014” in Jan 2013
 Winner of 3 Editor’s Choice awards in 2013
AV-COMPARATIVES
 Winner of Gold Award for Proactive Malware Protection
 The only AV to receive 100% in the most complex test
ran by AV-Comparatives. Apr 2013
VB100
 Owner of 14 VB100 certifications in 2 years for corporate
products
Approved Corporate Product for SVE & CSE
Awarded “Best Antivirus of 2014”
Copyright@Bitdefender 2013/ www.Bitdefender.com 5/27/2014 • 6
Shiftworks Co Ltd
100 + OEM partnerships
UNDER THE SIGN OF THE
DACIAN WOLF
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 9
• The “Dacian Draco” was the standard of the
ancient Dacian military.
• A wolf head combined with a snake body
that made a whistling sound when galloping
due to the air that entered the wolf's mouth.
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 10
Welcome to the GravityZone
Security for Virtualized Environments, Security for
Endpoints and Security for Mobile Devices
Bitdefender, Ana Cobzaru

More Related Content

What's hot

Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 

What's hot (20)

Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating System
 
Secured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant AssetsSecured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant Assets
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 security
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Stc 2016 regional-round-iot testing in agile.
Stc 2016 regional-round-iot testing in agile.Stc 2016 regional-round-iot testing in agile.
Stc 2016 regional-round-iot testing in agile.
 
Contributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity StandardsContributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity Standards
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
 
IoT security
IoT securityIoT security
IoT security
 
Outpost24 webinar - preventing wireless attacks with device visibility and t...
Outpost24 webinar -  preventing wireless attacks with device visibility and t...Outpost24 webinar -  preventing wireless attacks with device visibility and t...
Outpost24 webinar - preventing wireless attacks with device visibility and t...
 

Viewers also liked

Viewers also liked (7)

How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...
 
1C - AccountTimbal
1C - AccountTimbal1C - AccountTimbal
1C - AccountTimbal
 
Privesc.eu - Vitalie Esanu
Privesc.eu - Vitalie EsanuPrivesc.eu - Vitalie Esanu
Privesc.eu - Vitalie Esanu
 
How to build successful IT start-up for world market from Eastern Europe, Rag...
How to build successful IT start-up for world market from Eastern Europe, Rag...How to build successful IT start-up for world market from Eastern Europe, Rag...
How to build successful IT start-up for world market from Eastern Europe, Rag...
 
TypeScript vs. CoffeeScript, Vlad Iliescu
TypeScript vs. CoffeeScript, Vlad IliescuTypeScript vs. CoffeeScript, Vlad Iliescu
TypeScript vs. CoffeeScript, Vlad Iliescu
 
Estonian Experience in Robotics, Heilo Altin
Estonian Experience in Robotics, Heilo AltinEstonian Experience in Robotics, Heilo Altin
Estonian Experience in Robotics, Heilo Altin
 
The Third Platform Technologies - Accelerating the Curve, Laurentiu Popescu
The Third Platform Technologies - Accelerating the Curve, Laurentiu PopescuThe Third Platform Technologies - Accelerating the Curve, Laurentiu Popescu
The Third Platform Technologies - Accelerating the Curve, Laurentiu Popescu
 

Similar to Bitdefender, Ana Cobzaru

US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to Bitdefender
Bitdefender Enterprise
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
TheInevitableCloud
 
sb-checkpoint-matrix42
sb-checkpoint-matrix42sb-checkpoint-matrix42
sb-checkpoint-matrix42
Wayne Phillips
 

Similar to Bitdefender, Ana Cobzaru (20)

Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
 
US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to Bitdefender
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Trend Micro Antivirus.pdf
Trend Micro Antivirus.pdfTrend Micro Antivirus.pdf
Trend Micro Antivirus.pdf
 
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
 
Av is dead long live managed endpoint security
Av is dead   long live managed endpoint securityAv is dead   long live managed endpoint security
Av is dead long live managed endpoint security
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
Dtl 2012 q4_home.1
Dtl 2012 q4_home.1Dtl 2012 q4_home.1
Dtl 2012 q4_home.1
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
sb-checkpoint-matrix42
sb-checkpoint-matrix42sb-checkpoint-matrix42
sb-checkpoint-matrix42
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 

More from Moldova ICT Summit

Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov Endava
Moldova ICT Summit
 
Talentalism and its impact on education in ICT sector by Diana Bocaneala Endava
Talentalism and its impact on education in ICT sector by Diana Bocaneala EndavaTalentalism and its impact on education in ICT sector by Diana Bocaneala Endava
Talentalism and its impact on education in ICT sector by Diana Bocaneala Endava
Moldova ICT Summit
 
Agile methodologies based on BDD and CI by Nikolai Shevchenko
Agile methodologies based on BDD and CI by Nikolai ShevchenkoAgile methodologies based on BDD and CI by Nikolai Shevchenko
Agile methodologies based on BDD and CI by Nikolai Shevchenko
Moldova ICT Summit
 
Hitachi Unified Compute Platform by Cornel Tutuianu
Hitachi Unified Compute Platform by Cornel TutuianuHitachi Unified Compute Platform by Cornel Tutuianu
Hitachi Unified Compute Platform by Cornel Tutuianu
Moldova ICT Summit
 
Enterprise Architecture supporting the change by Vladimir Calmic Endava
Enterprise Architecture supporting the change by Vladimir Calmic EndavaEnterprise Architecture supporting the change by Vladimir Calmic Endava
Enterprise Architecture supporting the change by Vladimir Calmic Endava
Moldova ICT Summit
 
Strategia de crestere a competitivitatii industriei TI
Strategia de crestere a competitivitatii industriei TIStrategia de crestere a competitivitatii industriei TI
Strategia de crestere a competitivitatii industriei TI
Moldova ICT Summit
 
The business of innovation by W.Grommen
The business of innovation by W.GrommenThe business of innovation by W.Grommen
The business of innovation by W.Grommen
Moldova ICT Summit
 
European Experience developing Business Angel Ecosystem by Paulo Andrez
European Experience developing Business Angel Ecosystem by Paulo AndrezEuropean Experience developing Business Angel Ecosystem by Paulo Andrez
European Experience developing Business Angel Ecosystem by Paulo Andrez
Moldova ICT Summit
 
HR: What industry thinks of by Olivier Prado
HR: What industry thinks of by Olivier PradoHR: What industry thinks of by Olivier Prado
HR: What industry thinks of by Olivier Prado
Moldova ICT Summit
 
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015
Moldova ICT Summit
 

More from Moldova ICT Summit (15)

TrackDuck - Edmundas Balčikonis
TrackDuck - Edmundas BalčikonisTrackDuck - Edmundas Balčikonis
TrackDuck - Edmundas Balčikonis
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov Endava
 
Talentalism and its impact on education in ICT sector by Diana Bocaneala Endava
Talentalism and its impact on education in ICT sector by Diana Bocaneala EndavaTalentalism and its impact on education in ICT sector by Diana Bocaneala Endava
Talentalism and its impact on education in ICT sector by Diana Bocaneala Endava
 
Agile methodologies based on BDD and CI by Nikolai Shevchenko
Agile methodologies based on BDD and CI by Nikolai ShevchenkoAgile methodologies based on BDD and CI by Nikolai Shevchenko
Agile methodologies based on BDD and CI by Nikolai Shevchenko
 
Hitachi Unified Compute Platform by Cornel Tutuianu
Hitachi Unified Compute Platform by Cornel TutuianuHitachi Unified Compute Platform by Cornel Tutuianu
Hitachi Unified Compute Platform by Cornel Tutuianu
 
Enterprise Architecture supporting the change by Vladimir Calmic Endava
Enterprise Architecture supporting the change by Vladimir Calmic EndavaEnterprise Architecture supporting the change by Vladimir Calmic Endava
Enterprise Architecture supporting the change by Vladimir Calmic Endava
 
Bina systems Cloud Applications
Bina systems Cloud ApplicationsBina systems Cloud Applications
Bina systems Cloud Applications
 
Strategia de crestere a competitivitatii industriei TI
Strategia de crestere a competitivitatii industriei TIStrategia de crestere a competitivitatii industriei TI
Strategia de crestere a competitivitatii industriei TI
 
BAIT MD infoDev
BAIT MD infoDevBAIT MD infoDev
BAIT MD infoDev
 
Customs presentation
Customs presentationCustoms presentation
Customs presentation
 
White Book presentation
White Book presentationWhite Book presentation
White Book presentation
 
The business of innovation by W.Grommen
The business of innovation by W.GrommenThe business of innovation by W.Grommen
The business of innovation by W.Grommen
 
European Experience developing Business Angel Ecosystem by Paulo Andrez
European Experience developing Business Angel Ecosystem by Paulo AndrezEuropean Experience developing Business Angel Ecosystem by Paulo Andrez
European Experience developing Business Angel Ecosystem by Paulo Andrez
 
HR: What industry thinks of by Olivier Prado
HR: What industry thinks of by Olivier PradoHR: What industry thinks of by Olivier Prado
HR: What industry thinks of by Olivier Prado
 
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Bitdefender, Ana Cobzaru

  • 1.
  • 2. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 2 2011 2000 2005 - - - 2012 2013 - - - - - - - - - The beginning… -
  • 3. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 3  First antivirus worldwide to offer intelligent updating  First antivirus product to include an application firewall  MIDAS (Malware Intrusion Detection Advanced System)- wins IST prize, “set to revolutionize AV design”  Bitdefender to release its proprietary Antispam technology  Bitdefender introduces B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments)  Spam Image Filter an important step in combating the new spamming techniques  Bitdefender® Mobile Security to provide real-time protection for smartphones and PDAs  Bitdefender® Active Virus Control to innovate with a real time technology  60-Second QuickScan – The quickest way to find if your computer is infected by using this online scanner  Gravity Architecture enables new generation of security for highly scalable services  Bitdefender Safepay™ secures all e-banking and e-shopping in a separate iron-clad, secure browser  Security for Virtualized Environments – The 1st vShield 5 solution optimized for virtualized datacenters  Bitdefender Clueful™, first application to show the world how iOS apps treat user's privacy  Bitdefender Photon™ technology boasts scanning speed and minimizes slowdowns  Cloud Security for Endpoints to provide enterprise-class security with no on-site management server  Hypervisor Agnostic Scanning Engine – allows Bitdefender to provide the best operational cost savings for virtualization adopters  Intra-HV memory introspection engine - prototype that allows for detecting and preventing Virtual Machine kernel mode threats across Microsoft/Linux/etc 2011 2001 2005 - - - 2012 2013 - - - - - - - - - A decade of innovation in technology -
  • 4. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 4  #1 in Security Technology  Bitdefender wins both AV-Test awards for Home Users: Best Protection and Best Performance in 2013.  3 out of the first 4 rated endpoint security vendors are using Bitdefender engines  #1 in Antispam Technologies  Bitdefender analyzes and issues protection for 5 million spam messages every day, or about 35 million per week.  Bitdefender has won all 30 VBSpam awards in a row in Virus Bulletin’s (VB) antispam tests between May 2009 to March 2014  In five local offices, 250+ engineers in R&D team warrant that Bitdefender’s technology – protecting more than 400 million users worldwide , technology partnerships included – is the #1 Anti-Malware Security Technology in the world. Results in sustainable technogical leadership
  • 5. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 5 AV-TEST  Awarded “Best Protection” and “Best Performance” in January 2014 PC MAG  Awarded “Best Antivirus of 2014” in Jan 2013  Winner of 3 Editor’s Choice awards in 2013 AV-COMPARATIVES  Winner of Gold Award for Proactive Malware Protection  The only AV to receive 100% in the most complex test ran by AV-Comparatives. Apr 2013 VB100  Owner of 14 VB100 certifications in 2 years for corporate products Approved Corporate Product for SVE & CSE Awarded “Best Antivirus of 2014”
  • 6. Copyright@Bitdefender 2013/ www.Bitdefender.com 5/27/2014 • 6 Shiftworks Co Ltd 100 + OEM partnerships
  • 7. UNDER THE SIGN OF THE DACIAN WOLF
  • 8. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 9 • The “Dacian Draco” was the standard of the ancient Dacian military. • A wolf head combined with a snake body that made a whistling sound when galloping due to the air that entered the wolf's mouth.
  • 9. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 10 Welcome to the GravityZone Security for Virtualized Environments, Security for Endpoints and Security for Mobile Devices