Life 2.0:New World.New Threats.Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 2
Threat Motivation has Evolved                                 Teens and Geeks                       Cyber-criminals   WHO?...
Magnitude of the Problem/Opportunity                                                                                      ...
Magnitude of the Problem/OpportunityStuxnet wave/ World’s 1st cyber weapon         Launched in 2010, targeting a nuclear ...
Market Landscapeand TrendsCopyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 6
Market Landscape and Trends8 Billion $ in2012IDC expects the Security Software Market market to grow at a compoundannual g...
Market Landscape and TrendsSecurity Market – the place to be      Endpoint security has become more prominent over the pa...
Security Software Market OverviewNew Market Trends                                                      Freeware•    Virtu...
Bitdefender at a glanceCopyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 10
BitDefender at a Glance  The #1 Anti-Malware Security Technology in the world           First security software vendor t...
A Decade of Innovation                •     First antivirus worldwide to offer intelligent updating  2000                •...
StrategyCopyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 13
Understanding Consumer Security Trends            Specialized attacks carried out by cyber   New products must rely on bot...
Business Solutions Strategy      Worldwide Endpoint Security Revenue by Platform:      1.      Software grows steadily bei...
Business Solutions Strategy          1. Leverage best of breed technology in Blue Oceans                   Virtualization...
Business Solutions Strategy          1. Deliver solutions as platforms not products          2. BitDefender Unified Manage...
Building Successful OEM Partnerships             Leverage on our strong technological leadership in security;           ...
Moving Forward             The need for IT security is growing                Increase of Internet penetration;         ...
Technology LeadershipIt is Bitdefender’s ability to adapt to the changing threatlandscape, constantly innovate, and raise ...
We are #1!First security software vendor in recent years to receive toprecommendations simultaneously from the most import...
Top Awarded Technology     Reviewer                                      First Place   Second Place           Followers   ...
Experts endorsements   Note: In the latest results for Q2 Bitdefender is again #1 among 22 security products!Copyright@bit...
Backup slidesCopyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 24
The New BrandCopyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 25
•      Dacia was a country located in Europe over the territories occupied today               by Romania, Moldova, Ukrain...
Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 27
VisionCopyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 28
Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 29
Brand promiseCopyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 30
Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 31
LogoCopyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 32
Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 33
Brand avatarCopyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 34
Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 35
Copyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 36
CollateralsCopyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 37
2012 Box PackCopyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 38
2012 Online PackCopyright@bitdefender 2011 / www.bitdefender.com   1/12/2012 • 39
Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3
Upcoming SlideShare
Loading in …5
×

Bitdefender Corporate July2011 V3

1,915 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,915
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
47
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Bitdefender Corporate July2011 V3

  1. 1. Life 2.0:New World.New Threats.Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 2
  2. 2. Threat Motivation has Evolved Teens and Geeks Cyber-criminals WHO? – Attention-Driven – Profit-Driven – Loner Profile – Highly Organized High Profile Attacks Stealth Attacks – Social Engineering – Spyware/Adware HOW? – Mass Mailers – Automated Variant Creation and Morphing – Persistent Threats Lost productivity Cyber-crime – – WHAT? Clogged E-mail Systems and Networks – Identity Theft and Online Fraud Highly Targeted Corporate – Help Desk and Data Loss Costs Information AttacksCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 3
  3. 3. Magnitude of the Problem/Opportunity Around 1.5M unique malware samples are discovered every month! Source: AV-Test Labs (www.av-test.org) Source: av-test.org –Sample Collection Growth • “Even the best signature databases… have less than a 50% chance of catching completely new threats. Signatures are extremely ineffective against targeted and “zero day” threats.” According to Gartner • “Nobody can win the war against malware with a signature-driven product, but more proactive technologies are required ” According to AV-Test’s Andreas MarxCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 4
  4. 4. Magnitude of the Problem/OpportunityStuxnet wave/ World’s 1st cyber weapon  Launched in 2010, targeting a nuclear power plant and an uranium enrichment facility  A few million dollars invested in the design and development of the worm  Cross discipline knowledge/skills used (beyond “traditional” software, social engineering and NLP), new stage for sophistication  Take command (through cyberworld) of an industrial control system (physical world)  The bar has been lowered for destructive attacks on other control systems, whether at critical infrastructure or industrial factory  First copycats will be seen in H2, 2011Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 5
  5. 5. Market Landscapeand TrendsCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 6
  6. 6. Market Landscape and Trends8 Billion $ in2012IDC expects the Security Software Market market to grow at a compoundannual growth rate of 8.3%, reaching a total revenue of over 8 billion$ in 2012and nearly $10 billion by 2014!Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 7
  7. 7. Market Landscape and TrendsSecurity Market – the place to be  Endpoint security has become more prominent over the past few years, despite economical downturn. IDC forecasts that the Consumer segment will grow by 10% to reach 4.4B $, while Enterprise segment will reach 5.2B $ in 2013.  The key to success in the security market will be product differentiation through improved performance and features. Worldwide Corporate and Consumer Endpoint Security Revenue ($ billions) 12000.0 10000.0 9.6 8.5 7.7 8000.0 6.6 6.4 7.1 Consumer 6000.0 5.6 Enterprise 4.9 4000.0 Total 2000.0 0.0 2006 2007 2008 2009 2010 2011 2012 2013Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 8
  8. 8. Security Software Market OverviewNew Market Trends Freeware• Virtualization • Free products have 20% of consumer user• The move to the cloud base• New consumer technologies and computing • Freeware is used for gradual monetization models creates new market opportunities • IDC believes Free will become part of• Emerging regions: Eastern Europe, Latin Managed Security Service America, Asia/Pacific will grow at 12% per yCompetitors Security Software Market 8 billion $ in 2012 Bitdefender• Top players: The new product Symantec, McAfee, Trend The new brand Micro• Market Challengers: Kaspersky, AVG, BitDefen derCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 9
  9. 9. Bitdefender at a glanceCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 10
  10. 10. BitDefender at a Glance  The #1 Anti-Malware Security Technology in the world  First security software vendor to receive top recommendations simultaneously from the most important three key independent organizations in the US, UK, and Germany!  Moreover our technology is used by top security vendors: F- Secure, GData, Qihoo, Bullguard or IBM;  The only security technology to have won all 14 VB Antispam awards in a row;  BitDefender protects more than 400 million people worldwide (including technology partnerships);  Five local offices;  250+ engineers in R&D team;  Products localized in more than 20 languages.Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 11
  11. 11. A Decade of Innovation • First antivirus worldwide to offer intelligent updating 2000 • First antivirus product to include an application firewall - • MIDAS (Malware Intrusion Detection Advanced System)- wins IST prize, “is set to revolutionize - antivirus design” • BitDefender to release the first ever commercial antivirus for the Linux Samba 3 servers. - • BitDefender to release its proprietary Antispam technology. - • BitDefender to release the hourly update system 2005 • BitDefender introduces B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments) - • Spam Image Filter an important step in the combating of the new spamming techniques. - • BitDefender® Mobile Security to provide real-time protection for smartphones and PDAs. - • BitDefender® Active Virus Control to innovate with an proactive technology capable of detecting and blocking new viruses in real time, on a live system. - • 60-Second QuickScan – The quickest way to find if your computer is infected! 2011 • BitDefender to release safego - an application which protects Facebook users from spam, phishing attacks, and profile privacy threats.Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 12
  12. 12. StrategyCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 13
  13. 13. Understanding Consumer Security Trends Specialized attacks carried out by cyber New products must rely on both cloud criminals are increasing in numbers and and on premise technologies to block variety. attacks proactively. New platforms: Mac, smartphones, Cloud technologies and server side Tablets, Smart TVs bring new services will be the basis for cross- vulnerabilities. platform protection. People dont have time &/ knowledge to Consumer products should do 99% of decide on security issues. the job themselves, with no user intervention. Simplicity is the key. Cybercrime such as identity theft and Use of proactive technologies to prevent targeted spam/scam use public information leaks and NLP (natural information from social networks to language processing) techniques. support social engineering and manipulate users.Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 14
  14. 14. Business Solutions Strategy Worldwide Endpoint Security Revenue by Platform: 1. Software grows steadily being 90% of total revenues in 2014 2. SaaS is already the 2nd largest platform and it doubles share from 3% in 2008 to 7% in 2014, equal to $650M 3. Virtualized Platforms will increase the fastest (100% CAGR) 4. Hardware platform remains insignificant at nearly zero (0.2%) Worldwide Endpoint Security Revenue by Platform, 2008 – 2014 ($M) 2008 2009 2010 2011 2012 2013 2014 2009–2014 CAGR (%) Software 6196.8 6383.1 6842.6 7284.1 7800.6 8330.1 8874.0 6.8 Hardware 6.4 7.3 9.2 12.1 15.4 20.0 25.6 28.7 Virtualized 3.2 9.5 21.3 36.6 91.5 172.8 305.4 100.2 SaaS 178.8 197.9 241.9 301.6 411.8 570.1 647.3 26.7 Total 6385.2 6597.8 7115.1 7634.5 8319.3 9093.0 9852.4 8.3 Source: IDC, 2010Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 15
  15. 15. Business Solutions Strategy 1. Leverage best of breed technology in Blue Oceans  Virtualization Security  VMware – tight partnership  Citrix/Microsoft/Oracle 2. Leverage Virtualization Security in Cloud Computing  SaaS 3. Disrupt mainstream endpoint/server security  “God-Mode” research project 4. Temporary Virtual Patching/Vulnerability Discovery  Find the risk -> mitigateCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 16
  16. 16. Business Solutions Strategy 1. Deliver solutions as platforms not products 2. BitDefender Unified Management Platform supports:  SaaS Grid  Public Cloud  Private Cloud  Hybrid  Virtualization Security  Hypervisor introspection  Patent pending network scanning engine  BitDefender hypervisor project  Vulnerability Assessment & Pen-Testing Engines  Temporary Virtual Patching (pre-zero-day)Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 17
  17. 17. Building Successful OEM Partnerships  Leverage on our strong technological leadership in security;  Opportunity to understand trends and to integrate with complementary technologies and products;  Opportunity to close long-term partnerships with strong players, generating predictable revenues streams;  Average growth rate in excess of 100% over the last two years;  Broad range of technologies covered: SDKs Anti-malware SDK line-up Anti-spam SDKs for spam detection Anti-phishing SDKs Web security SDKs Updater SDK & Mirroring Script Extensive Platform Support Windows, Mac, Linux, Unix, etc. Intel x86, ARM, MIPS, PowerPC, etc. BitDefender Security software for re-/co-branding StreamDefender technology for multi-Gb/s malware detection QuickScan SDK for fast, clientless, cloud-based infection assessment for end-point security  Sizeable pipeline of deals across all geographies and in all sectors (telecom, financial, network infrastructure, appliance vendors, virtual services providers etc).Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 18
  18. 18. Moving Forward  The need for IT security is growing  Increase of Internet penetration;  Exponential increase of data (personal and business) requiring protection;  Exponential evolution (number and technologies used) of malware …  … and professionalization (cybercrime, cyber terrorism) ;  Consumerization of technology;  Convergence of devices and services (new devices - same content, different form factors and different technologies, new services – same content, different delivery methods, different usage rationale).  and Bitdefender has the key enablers to grow in this changing environment  One of the best R&D teams, with proven technologies ahead of the market;  Deep understanding of the consumer market needs and trends;  Knowledge sharing through OEM partnerships.Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 19
  19. 19. Technology LeadershipIt is Bitdefender’s ability to adapt to the changing threatlandscape, constantly innovate, and raise the bar in proactive anti-malware technology that has made it a security technology leader.Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 20
  20. 20. We are #1!First security software vendor in recent years to receive toprecommendations simultaneously from the most important three keyindependent organizations in the US, UK, and Germany!Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 21
  21. 21. Top Awarded Technology Reviewer First Place Second Place Followers Kaspersky, F-Secure, AVG, G-Data, Panda AV Test BitDefender Symantec Webroot Consumer Reports (US) BitDefender ESET Avira Symantec Which (UK) BitDefender Symantec Bulguard, AVG Stiftungwarentest (DE) BitDefender Avira ESET, G-DataCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 22
  22. 22. Experts endorsements Note: In the latest results for Q2 Bitdefender is again #1 among 22 security products!Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 23
  23. 23. Backup slidesCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 24
  24. 24. The New BrandCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 25
  25. 25. • Dacia was a country located in Europe over the territories occupied today by Romania, Moldova, Ukraine, Hungary and Serbia. • The “Dacian Draco” was the standard of the ancient Dacian military. • A wolf head combined with a snake body that made a whistling sound when galloping due to the air that entered the wolfs mouth. We have the sharp mind of the wolf, the slickness of the snake, the vigilance of the alpha male and the indestructibility of the snake body!Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 26
  26. 26. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 27
  27. 27. VisionCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 28
  28. 28. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 29
  29. 29. Brand promiseCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 30
  30. 30. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 31
  31. 31. LogoCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 32
  32. 32. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 33
  33. 33. Brand avatarCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 34
  34. 34. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 35
  35. 35. Copyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 36
  36. 36. CollateralsCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 37
  37. 37. 2012 Box PackCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 38
  38. 38. 2012 Online PackCopyright@bitdefender 2011 / www.bitdefender.com 1/12/2012 • 39

×