SlideShare a Scribd company logo
1 of 28
AVG 2012

Tony Anscombe, Senior Security Evangelist

September 21, 2011
We Protect Us™
AVG is 98,000,000 active users working
together, sharing threat information to
         keep each other safe.

 Together WE keep 240 new viruses off our PCs every minute


Together WE remove over 100,000,000 threats every single day

          Every 6 seconds someone new joins US


                                                               2
User Behavior Has Evolved
                                                       Movement of information to the Web



 Connected Devices in Use (M)                                                                      Users of Social Networking Sites (M)
                                                                     4,045                                                                                                                    1,556
                                                            3,541                                                                                                                1,382
                                                   3,093                                                                                               1,238
                                  2,664                                                                                                1,113
                   2,289                                                       Global Internet                           964
     1,966                                                                                               824
                                                                                   Users




     2009          2010           2011             2012     2013     2014                               2009            2010            2011            2012                     2013          2014
                                                                              Online Banking
Source: IDC May 2011                                                                              Source: IDC May 2011



 Online Search Market ($M)                                                                         Threats Becoming Complex and Web-Based
                                                                                                 Performance /
                                                                                                 Damage
                                                                                                                                                                                  Spyware
                                                                                                                                                                                            Anti-Spyware
                                                                                                                                                                                 Spam
                                                                     49,076                                                                                                                 Antispam
                                                                                                                                                                             Worms
                                                            43,782              e-Commerce                                                                                                  Web filter
                                                   39,462                                                                                                                 Banned content
                                 35,589
                   31,685                                                                                                                                              Trojans              Antivirus
    26,857                                                                                                                                                   Viruses                        IPS
                                                                                                                                                Intrusions      Content -Based
                                                                                                                                                                                            VPN
                                                                                                                                                        Connection -Based                   Firewall

                                                                                                               Hardware theft                                                    Physical   Lock & Key

     2009          2010           2011             2012     2013     2014     Cloud Storage                1980s               1990s            2000s                            Today

                            Source: IDC May 2011                                                 Source: Cisco Virtual Networking Index, 2011
Cybercrime is Growing on All Platforms

                   Daily Threats on Facebook (‘000)               Targeting Android Mobile Platform (‘00)

                                                          80
2000
                                                          60
1500
                                                          40
1000

 500                                                      20

    0                                                      0




                                                                  0




                                                                                         0



                                                                                                      0



                                                                                                                 0




                                                                                                                                         11
                                                                            10




                                                                                                                           11
    -J 8




    -J 9




    -J 0
   -M 08




   -M 09




   -M 10




                                                               -1
   -N 08
   -J 08




   -N 09
   -J 09




   -N 10

           0
   -S 08




   -S 09




   -S 10
   -M 09




   -M 10




                                                                                       -1



                                                                                                    -1



                                                                                                               -1
 29 y-0




 29 y-0




 29 y-1




         -1




                                                                          n-




                                                                                                                         n-



                                                                                                                                         -
                                                             ay




                                                                                                             ov
                                                                                     ug



                                                                                                    pe
2 9 a r-




2 9 a r-




2 9 a r-
29 ep-
2 9 o v-




29 ep-
2 9 o v-




29 ep-




                                                                                                                                      eb
29 ul-




29 ul-




29 ul-
29 an-




29 an-




      ov




                                                                           u




                                                                                                                          a
      a




      a




      a




                                                           -M




                                                                                                            -N
                                                                                   -A



                                                                                                  -S
                                                                        -J




                                                                                                                       -J



                                                                                                                                    -F
   -M




                                                                      21




                                                                                                                     07
                                                         02




                                                                                 10



                                                                                                29



                                                                                                          18




                                                                                                                                  26
29




             Mac Is Starting to Become a Target                Online Banking Password Stealer, SpyEye

As Mac is around 10% market
                                                                                      Romania        UK     India       Croatia
share, hackers are starting to                                    Taiwan 2%                          1%
                                                                                        1%                   1%          1%
target Mac users. 10% is a
known mark in security where                                Korea 2%
                                                                                                                                  Seychelles
hackers start to act                                                                                                                 1%
                                                        France
                                                          2%
                                                      Netherlands                                                       US
                                                          3%                                                           30%
                                                                Canada    Lithuania
                                                                  3%         4%
                                                                          Germany
                                                                                                                     Ukraine
                                                                           12%
                                                                                                                      22%
                                                                           Russian Federation
                                                                                 15%




                                                                                                                                               4
PC Attacks – Attack Toolkits Accelerate Growth
             Collection of Popular Attack Toolkits




                                                     5
0
                                          20000
                                                  40000
                                                          60000
                                                                  80000
                                                                          100000
                                                                                   120000
                                                                                            140000
                                                                                                     160000
                                                                                                              180000
                         21/04/2011
                         22/04/2011
                         23/04/2011
                         24/04/2011
                         25/04/2011
                         26/04/2011
                         27/04/2011
                         28/04/2011
                         29/04/2011
                         30/04/2011
                         01/05/2011
                         02/05/2011




    Sum of Total Hits
                         03/05/2011
                         04/05/2011
                         05/05/2011
                         06/05/2011
                         07/05/2011
                         08/05/2011
                         09/05/2011
                         10/05/2011
                                                                                                                                                Attacks Recorded During April-May 2011




                         11/05/2011
                                                                                                                       Fake AV for Mac OS/iOS




    Sum of Unique URLs




                         12/05/2011
                         13/05/2011
                         14/05/2011
                         15/05/2011
                         16/05/2011
                         17/05/2011
                         18/05/2011
                         19/05/2011
                         20/05/2011
                                                                                                                                                                                         Mac & iOS Users – Cyber Criminals Welcome You




6
Android Malware – Grows Faster Than PC Malware
“Android app market growing faster than iPhone apps” cnet



                                                            The most popular game




                                                            .. and the most popular
                                                             faked game – malware
                                                               crazyapps.angry.birds.rio.unlocker



•   Monetization mainly via premium SMS messages
•   Criminals no longer need to worry about $$ collection worldwide – Operators are doing it

                                                                                                    7
Brazil numbers

Unique users who had a threat blocked (LS):

• 40,497

Total number block events (LS):

• 217,562

Total number of malware reports

• 665,000


30 days to the 16.9.11
Brazil – Breakdown by threat (LS)
• Blackhole Exploit Kit     55180

• Incognito Exploit Kit     32313

• Rogue Scanner             20719

• Best Exploit Kit          19096

• WebAttacker Exploit Kit   9813

• Rogue Scanner             7385

• Link to Exploit Site      7167

• Script Injection          6737

• Rogue Scanner             6200

• Rogue Scanner             5556
Influence the Influencers
      Blogs          Forums              Social Media




                                  Connect with AVG in your online world

  Customer Support   ThreatLabs          Total active community
                                              1.2 million

                                                 31 K + Followers


                                                  370 K + Fans



                                                  795 K + views




                                                                          10
Leader in Continuously Evolving, Creating A Consolidating
Peace of Mind Market


                                    AntiSpam
  Today’s                               &
                                    Spyware
                                                         Firewall
  markets
                                                                     Safe
                          AV
                                                                    Search


                     PC
                   TuneUp                      Users                   Social
                                                                       Media

                                                                     Identify
  Tomorrow’s         Optimization
                                                                      Theft
  markets

                               Wireless
                               Devices                       Advisor
                                                Online
                                               Back-up

                                                                                11
PC Frustration Points



#1 – Security
#2 – PC Slowdown
#3 – Slow Browsing

             AVG Confidential   12
Introducing AVG Internet Security 2012




                  AVG Confidential       13
Our approach for 2012


 Designed with the help of 98 million people!

       AVG is going back to basics, creating a
     powerful, lightweight product which won’t fill
         hard drives or slow down computers.


    In short; it’s light, fast, small and eliminates
              additional user pain-points

                                                       14
AVG 2012 – Footprint Numbers



50%    smaller download size and faster install time




45%    reduction in disk space on average




20%    less processes and memory usage




             AVG Confidential                          15
User Interface




                 AVG Confidential   16
Source: comScore Video Metrix, June 2011
                                      AVG Confidential   17
For Many Users Online Video Means … waiting




                  AVG Confidential            18
AVG 2012 Internet Security Users …. watching




                 AVG Confidential              19
AVG ADVICE
• After an intensive study of user behavior with open applications we found that some
  applications needed managing to help speed things up


• Browsers are open for many hours (15-24) , consuming available memory of the PC.
  Over time, the available memory becomes low and causes the computer to slow
  down.


• AVG Advice is a new proactive service that constantly monitors the computer and
  advises the user of solutions on various computer problems they may have.


• Prompts overuse of memory by internet browsers – Google chrome, Mozilla Firefox
  and Internet Explorer only


• On by default


• Managed from the pro-active pop-up which opens advanced settings in tray
  notification.
More Browsing = Larger Memory Footprint




 Source: www.amieabz.co.uk/tabmem3.jpg
                                         AVG Confidential   21
Social Engineering Attacks – Rogue AV




                                        22
Ultimate Performance

                     Excelling in both product performance & detection
                        rate supports user acquisition and retention




Source: AV-comparatives 2011




                                                                         23
Bringing Peace of Mind To Our Connected World:
                   Diversified Product Offering

  Core Security Products                                                 New Products   Introduced in
  CONSUMER           MSRP:
                     US$39.99–$69.99 SMALL BUSINESS   MSRP:
                                                      US$39.99 upwards

                                                                                            2010




                                                                                            2011




                                                                                            2011




                                                                                            2011
       Easy-to-Use            Light on Resources       Fast

       Reliable Protection    Frequent Updates         Non-Obtrusive
                                                                                            2010


Platforms Served:

                                                                                                    24
Large Community with Strong Brand

                                                        Strong Brand Awareness


                            No. 1 most visited security software site for more than 350 weeks1



                                    No. 1 most downloaded software on CNET’s download.com
                                                 1 million downloads per week2



                               No. 1 ranked search result for free security software on Google3



                                      No. 1 downloaded security application on Android market

Source: ¹ Alexa;   2   CNET, July 2011 3Google search                                             25
What is Media saying about AVG 2012?
"CNET labs found that, on the whole, it is a faster program than last
year’s.” – Seth Rosenblatt, CNET

“In my tests and in tests by independent labs it beats many of its for-
pay competition.” – Neil Rubenking, PC Mag

“Grab a copy of the new AVG Internet Security 2012 and you’ll find the
download is half the size, installation is faster, and the suite’s
footprint on your hard drive is cut by an average of 45 percent
when compared to the previous edition.” – Mike Williams, BetaNews

“The web is packed with dangerous sites, each ready to serve up
malware just as soon as you access an infected page. Your antivirus
tool might block the attempt, of course - but why take the risk? Install
AVG LinkScanner and it'll alert you to dangerous pages before
you even reach them. Verdict: A simple and effective extra layer of
browsing security” - Mike Williams, Download Crew


                                                                           26
Peace of Mind to our
 Connected World



       AVG Confidential   27
Thank you for your attention

More Related Content

Similar to How AVG protects users by sharing threat information

e-AGE 2014 Proceedings_1st article
e-AGE 2014 Proceedings_1st articlee-AGE 2014 Proceedings_1st article
e-AGE 2014 Proceedings_1st articleAizharkyn Burkanova
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfNirGoldstein5
 
NEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security SolutionsNEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security SolutionsNECIndia
 
Smart Protection Network
Smart Protection NetworkSmart Protection Network
Smart Protection Networkkevin liao
 

Similar to How AVG protects users by sharing threat information (6)

e-AGE 2014 Proceedings_1st article
e-AGE 2014 Proceedings_1st articlee-AGE 2014 Proceedings_1st article
e-AGE 2014 Proceedings_1st article
 
Microsoft Forefront - Protection Suite
Microsoft Forefront - Protection SuiteMicrosoft Forefront - Protection Suite
Microsoft Forefront - Protection Suite
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
 
NEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security SolutionsNEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security Solutions
 
Smart Protection Network
Smart Protection NetworkSmart Protection Network
Smart Protection Network
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

How AVG protects users by sharing threat information

  • 1. AVG 2012 Tony Anscombe, Senior Security Evangelist September 21, 2011
  • 2. We Protect Us™ AVG is 98,000,000 active users working together, sharing threat information to keep each other safe. Together WE keep 240 new viruses off our PCs every minute Together WE remove over 100,000,000 threats every single day Every 6 seconds someone new joins US 2
  • 3. User Behavior Has Evolved Movement of information to the Web Connected Devices in Use (M) Users of Social Networking Sites (M) 4,045 1,556 3,541 1,382 3,093 1,238 2,664 1,113 2,289 Global Internet 964 1,966 824 Users 2009 2010 2011 2012 2013 2014 2009 2010 2011 2012 2013 2014 Online Banking Source: IDC May 2011 Source: IDC May 2011 Online Search Market ($M) Threats Becoming Complex and Web-Based Performance / Damage Spyware Anti-Spyware Spam 49,076 Antispam Worms 43,782 e-Commerce Web filter 39,462 Banned content 35,589 31,685 Trojans Antivirus 26,857 Viruses IPS Intrusions Content -Based VPN Connection -Based Firewall Hardware theft Physical Lock & Key 2009 2010 2011 2012 2013 2014 Cloud Storage 1980s 1990s 2000s Today Source: IDC May 2011 Source: Cisco Virtual Networking Index, 2011
  • 4. Cybercrime is Growing on All Platforms Daily Threats on Facebook (‘000) Targeting Android Mobile Platform (‘00) 80 2000 60 1500 40 1000 500 20 0 0 0 0 0 0 11 10 11 -J 8 -J 9 -J 0 -M 08 -M 09 -M 10 -1 -N 08 -J 08 -N 09 -J 09 -N 10 0 -S 08 -S 09 -S 10 -M 09 -M 10 -1 -1 -1 29 y-0 29 y-0 29 y-1 -1 n- n- - ay ov ug pe 2 9 a r- 2 9 a r- 2 9 a r- 29 ep- 2 9 o v- 29 ep- 2 9 o v- 29 ep- eb 29 ul- 29 ul- 29 ul- 29 an- 29 an- ov u a a a a -M -N -A -S -J -J -F -M 21 07 02 10 29 18 26 29 Mac Is Starting to Become a Target Online Banking Password Stealer, SpyEye As Mac is around 10% market Romania UK India Croatia share, hackers are starting to Taiwan 2% 1% 1% 1% 1% target Mac users. 10% is a known mark in security where Korea 2% Seychelles hackers start to act 1% France 2% Netherlands US 3% 30% Canada Lithuania 3% 4% Germany Ukraine 12% 22% Russian Federation 15% 4
  • 5. PC Attacks – Attack Toolkits Accelerate Growth Collection of Popular Attack Toolkits 5
  • 6. 0 20000 40000 60000 80000 100000 120000 140000 160000 180000 21/04/2011 22/04/2011 23/04/2011 24/04/2011 25/04/2011 26/04/2011 27/04/2011 28/04/2011 29/04/2011 30/04/2011 01/05/2011 02/05/2011 Sum of Total Hits 03/05/2011 04/05/2011 05/05/2011 06/05/2011 07/05/2011 08/05/2011 09/05/2011 10/05/2011 Attacks Recorded During April-May 2011 11/05/2011 Fake AV for Mac OS/iOS Sum of Unique URLs 12/05/2011 13/05/2011 14/05/2011 15/05/2011 16/05/2011 17/05/2011 18/05/2011 19/05/2011 20/05/2011 Mac & iOS Users – Cyber Criminals Welcome You 6
  • 7. Android Malware – Grows Faster Than PC Malware “Android app market growing faster than iPhone apps” cnet The most popular game .. and the most popular faked game – malware crazyapps.angry.birds.rio.unlocker • Monetization mainly via premium SMS messages • Criminals no longer need to worry about $$ collection worldwide – Operators are doing it 7
  • 8. Brazil numbers Unique users who had a threat blocked (LS): • 40,497 Total number block events (LS): • 217,562 Total number of malware reports • 665,000 30 days to the 16.9.11
  • 9. Brazil – Breakdown by threat (LS) • Blackhole Exploit Kit 55180 • Incognito Exploit Kit 32313 • Rogue Scanner 20719 • Best Exploit Kit 19096 • WebAttacker Exploit Kit 9813 • Rogue Scanner 7385 • Link to Exploit Site 7167 • Script Injection 6737 • Rogue Scanner 6200 • Rogue Scanner 5556
  • 10. Influence the Influencers Blogs Forums Social Media Connect with AVG in your online world Customer Support ThreatLabs Total active community 1.2 million 31 K + Followers 370 K + Fans 795 K + views 10
  • 11. Leader in Continuously Evolving, Creating A Consolidating Peace of Mind Market AntiSpam Today’s & Spyware Firewall markets Safe AV Search PC TuneUp Users Social Media Identify Tomorrow’s Optimization Theft markets Wireless Devices Advisor Online Back-up 11
  • 12. PC Frustration Points #1 – Security #2 – PC Slowdown #3 – Slow Browsing AVG Confidential 12
  • 13. Introducing AVG Internet Security 2012 AVG Confidential 13
  • 14. Our approach for 2012 Designed with the help of 98 million people! AVG is going back to basics, creating a powerful, lightweight product which won’t fill hard drives or slow down computers. In short; it’s light, fast, small and eliminates additional user pain-points 14
  • 15. AVG 2012 – Footprint Numbers 50% smaller download size and faster install time 45% reduction in disk space on average 20% less processes and memory usage AVG Confidential 15
  • 16. User Interface AVG Confidential 16
  • 17. Source: comScore Video Metrix, June 2011 AVG Confidential 17
  • 18. For Many Users Online Video Means … waiting AVG Confidential 18
  • 19. AVG 2012 Internet Security Users …. watching AVG Confidential 19
  • 20. AVG ADVICE • After an intensive study of user behavior with open applications we found that some applications needed managing to help speed things up • Browsers are open for many hours (15-24) , consuming available memory of the PC. Over time, the available memory becomes low and causes the computer to slow down. • AVG Advice is a new proactive service that constantly monitors the computer and advises the user of solutions on various computer problems they may have. • Prompts overuse of memory by internet browsers – Google chrome, Mozilla Firefox and Internet Explorer only • On by default • Managed from the pro-active pop-up which opens advanced settings in tray notification.
  • 21. More Browsing = Larger Memory Footprint Source: www.amieabz.co.uk/tabmem3.jpg AVG Confidential 21
  • 22. Social Engineering Attacks – Rogue AV 22
  • 23. Ultimate Performance Excelling in both product performance & detection rate supports user acquisition and retention Source: AV-comparatives 2011 23
  • 24. Bringing Peace of Mind To Our Connected World: Diversified Product Offering Core Security Products New Products Introduced in CONSUMER MSRP: US$39.99–$69.99 SMALL BUSINESS MSRP: US$39.99 upwards 2010 2011 2011 2011 Easy-to-Use Light on Resources Fast Reliable Protection Frequent Updates Non-Obtrusive 2010 Platforms Served: 24
  • 25. Large Community with Strong Brand Strong Brand Awareness No. 1 most visited security software site for more than 350 weeks1 No. 1 most downloaded software on CNET’s download.com 1 million downloads per week2 No. 1 ranked search result for free security software on Google3 No. 1 downloaded security application on Android market Source: ¹ Alexa; 2 CNET, July 2011 3Google search 25
  • 26. What is Media saying about AVG 2012? "CNET labs found that, on the whole, it is a faster program than last year’s.” – Seth Rosenblatt, CNET “In my tests and in tests by independent labs it beats many of its for- pay competition.” – Neil Rubenking, PC Mag “Grab a copy of the new AVG Internet Security 2012 and you’ll find the download is half the size, installation is faster, and the suite’s footprint on your hard drive is cut by an average of 45 percent when compared to the previous edition.” – Mike Williams, BetaNews “The web is packed with dangerous sites, each ready to serve up malware just as soon as you access an infected page. Your antivirus tool might block the attempt, of course - but why take the risk? Install AVG LinkScanner and it'll alert you to dangerous pages before you even reach them. Verdict: A simple and effective extra layer of browsing security” - Mike Williams, Download Crew 26
  • 27. Peace of Mind to our Connected World AVG Confidential 27
  • 28. Thank you for your attention