SlideShare a Scribd company logo
1 of 34
Norton 2008 Product Overview Rowan Trollope Senior Vice President, Consumer Products
Norton 2008 Product Focus Areas
Shattering Norton’s Negative Performance Perception
Performance Improvements Boot Time Memory UI Launch Download Scan Time IE Launch Install Time 1-2 Minutes (MSI Install) 10 Seconds (Impact) Current 29-30 MB < 2 Seconds 3:15 (mm:ss) 9 Seconds (Impact) < 4 Seconds (Impact) 2.25 Minutes (MSI Install) 14-25 Seconds (Impact) 2007 10-15 MB 1.7 Seconds 2:15 (mm:ss) 7 Seconds (Impact) 1.8 Seconds (Impact) 3.2 Minutes < 10 Seconds (Impact) 08 Target 10 MB < 2 Seconds 1:55 (mm:ss) 3-7 Seconds (Impact) < 1.8 Seconds (Impact) Industry 16 Seconds (Impact) 43 MB 3 Seconds 2:35 (mm:ss) 60 Seconds 1.5 - 5 Seconds 1:30-4:00 Minutes
Norton 2008 Product Focus Areas
New Threats - The Botnet Crisis ,[object Object],[object Object],[object Object],* Source:  Symantec ISTR XI Botherders:  The Black Market Spam Phishing Messages Fraud Websites Adware & Spyware Fraudsters Spammers Distributors Keylogging / ID Theft Denial of Service
[object Object],[object Object],[object Object],Example of a Botnet Infection Symantec Confidential What the User Sees What’s Actually Happening CSmith ,[object Object],[object Object],[object Object],******** Threat is dropped on machine via invisible iFrame in page C S m i t h 1 0 0 2 1 9 5 9
Scale of the Botnet Crisis Symantec Confidential
Scale of the Botnet Crisis Symantec Confidential
Symantec Confidential Scale of the Botnet Crisis
Symantec Confidential Scale of the Botnet Crisis Six million hijacked consumer PCs
Norton AntiBot
Norton AntiBot Performance Fast Boot Low Memory Footprint Fast Install Low CPU Overhead 2 Second Overhead to System Boot 1 – 2  Minutes 10 MB Less than 2%  Compatible with all major endpoint security products
New Threats – Drive-by Downloads ,[object Object],[object Object],[object Object],[object Object],[object Object]
Browser Exploits are Everywhere February 2, 2007 Super Bowl Weekend Dolphin Stadium  web site hacked A program that records  keystrokes was  automatically downloaded  to each visitor’s machine
New Browser Protection Codename “Canary” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Only Canary Has  Strong Browser Protection % of attacks blocked, out of  36 Internet Explorer vulnerabilities  (includes all known exploited vulnerabilities) Source:  Symantec internal lab testing 0 50 100 Canary Product A Product B Product C Product D Product E Product F Product G Product H 100% 17% 14% 14% 11% 8% 6% 3% 3%
Only Canary is Resilient to Obfuscation % of  obfuscated  attacks blocked, out of  36 Internet Explorer vulnerabilities  (includes all known exploited vulnerabilities) Source:  Symantec internal lab testing 0 50 100 Canary Product B Product A Product C Product D Product E Product F Product G Product H 100% 6%
Norton 2008 Product Focus Areas
Protection beyond the PC -  Security That Revolves Around You
Perfect Storm for Smartphone Security Need for Smartphone Security Now : Users and experts are increasingly realizing that smartphones need to be protected just like PCs $1B in mobile security and  AV in 2008  (Source: IDC) Increasing Smartphone Threats :  Mobile virus variants have almost doubled every 6 months from 2004-2006 PC:Mobile Viruses = 450:1 (Source: Symantec Security Response) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Fastest Growing Device Segment :  Smart phone growth = 31% (IDC) Other mobiles = 7% (IDC) Mobiles out ship PC’s 5:1 in 2006 By 2008, smartphones are expected to out ship laptops (Gartner) Vulnerabilities :  mWindows = PC Windows 6 years ago (WinNT) Smartphones are the next destination for hackers
Norton Smartphone Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Security Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Norton 2008 Product Focus Areas
Identity Theft is Consumers’ #1 Fear ,[object Object],[object Object],[object Object],[object Object],Sources: Gartner, Cyber Security Industry Alliance, FTC
Norton Identity Safe Provides a safe and convenient way to manage identities online ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],* Included in Norton Internet Security & Norton 360v2 New Product New Product
Product Portfolio Norton SmartPhone Security * Mobile Security Products Market Category Norton SystemWorks Norton Save & Restore Norton Ghost Norton Confidential Norton Confidential Online Edition * Norton AntiVirus Transaction Security  Security Backup & Recovery Norton Internet Security PC Tuneup Norton 360 PC Security Point Products Comprehensive Protection * Future Product Norton AntiBot *
Thank you
Norton Internet Security
Embedded and Enhanced Support ,[object Object],[object Object],[object Object],Note: Product Features not yet committed
Norton AntiVirus 2008 Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Norton Internet Security 2008 Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

What's hot (20)

Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
Samsung knox and android for work
Samsung knox and android for workSamsung knox and android for work
Samsung knox and android for work
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Aca presentation arm_
Aca presentation arm_Aca presentation arm_
Aca presentation arm_
 
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsBlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaper
 

Similar to sym

Software Vendor (Norton Anti-Virus)
Software Vendor (Norton Anti-Virus)Software Vendor (Norton Anti-Virus)
Software Vendor (Norton Anti-Virus)
John Joseph San Juan
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
ssuser57b3e5
 
Norton Presentation - Homework
Norton Presentation - HomeworkNorton Presentation - Homework
Norton Presentation - Homework
Loïc Naga
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Nancy Nimmegeers
 

Similar to sym (20)

Effective
EffectiveEffective
Effective
 
Effective
EffectiveEffective
Effective
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Software Vendor (Norton Anti-Virus)
Software Vendor (Norton Anti-Virus)Software Vendor (Norton Anti-Virus)
Software Vendor (Norton Anti-Virus)
 
Materi cyber sec.pdf
Materi cyber sec.pdfMateri cyber sec.pdf
Materi cyber sec.pdf
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
COMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptxCOMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptx
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Norton Presentation - Homework
Norton Presentation - HomeworkNorton Presentation - Homework
Norton Presentation - Homework
 
Android security - an enterprise perspective
Android security -  an enterprise perspectiveAndroid security -  an enterprise perspective
Android security - an enterprise perspective
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

sym

  • 1. Norton 2008 Product Overview Rowan Trollope Senior Vice President, Consumer Products
  • 2. Norton 2008 Product Focus Areas
  • 3. Shattering Norton’s Negative Performance Perception
  • 4. Performance Improvements Boot Time Memory UI Launch Download Scan Time IE Launch Install Time 1-2 Minutes (MSI Install) 10 Seconds (Impact) Current 29-30 MB < 2 Seconds 3:15 (mm:ss) 9 Seconds (Impact) < 4 Seconds (Impact) 2.25 Minutes (MSI Install) 14-25 Seconds (Impact) 2007 10-15 MB 1.7 Seconds 2:15 (mm:ss) 7 Seconds (Impact) 1.8 Seconds (Impact) 3.2 Minutes < 10 Seconds (Impact) 08 Target 10 MB < 2 Seconds 1:55 (mm:ss) 3-7 Seconds (Impact) < 1.8 Seconds (Impact) Industry 16 Seconds (Impact) 43 MB 3 Seconds 2:35 (mm:ss) 60 Seconds 1.5 - 5 Seconds 1:30-4:00 Minutes
  • 5. Norton 2008 Product Focus Areas
  • 6.
  • 7.
  • 8. Scale of the Botnet Crisis Symantec Confidential
  • 9. Scale of the Botnet Crisis Symantec Confidential
  • 10. Symantec Confidential Scale of the Botnet Crisis
  • 11. Symantec Confidential Scale of the Botnet Crisis Six million hijacked consumer PCs
  • 13. Norton AntiBot Performance Fast Boot Low Memory Footprint Fast Install Low CPU Overhead 2 Second Overhead to System Boot 1 – 2 Minutes 10 MB Less than 2% Compatible with all major endpoint security products
  • 14.
  • 15. Browser Exploits are Everywhere February 2, 2007 Super Bowl Weekend Dolphin Stadium web site hacked A program that records keystrokes was automatically downloaded to each visitor’s machine
  • 16.
  • 17. Only Canary Has Strong Browser Protection % of attacks blocked, out of 36 Internet Explorer vulnerabilities (includes all known exploited vulnerabilities) Source: Symantec internal lab testing 0 50 100 Canary Product A Product B Product C Product D Product E Product F Product G Product H 100% 17% 14% 14% 11% 8% 6% 3% 3%
  • 18. Only Canary is Resilient to Obfuscation % of obfuscated attacks blocked, out of 36 Internet Explorer vulnerabilities (includes all known exploited vulnerabilities) Source: Symantec internal lab testing 0 50 100 Canary Product B Product A Product C Product D Product E Product F Product G Product H 100% 6%
  • 19. Norton 2008 Product Focus Areas
  • 20. Protection beyond the PC - Security That Revolves Around You
  • 21.
  • 22.
  • 23.
  • 24. Norton 2008 Product Focus Areas
  • 25.
  • 26.
  • 28.
  • 29. Product Portfolio Norton SmartPhone Security * Mobile Security Products Market Category Norton SystemWorks Norton Save & Restore Norton Ghost Norton Confidential Norton Confidential Online Edition * Norton AntiVirus Transaction Security Security Backup & Recovery Norton Internet Security PC Tuneup Norton 360 PC Security Point Products Comprehensive Protection * Future Product Norton AntiBot *
  • 32.
  • 33.
  • 34.