Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
G Data
Presentation
Bucharest 2010
Welcome.
Costin Pecingina
G Data Representative
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
• Founded 1985 in Germany
• 300 employees world wide
• Offices in 13 countries: Germany (HQ),
USA, Canada, Japan, China, U...
The IT-Security Pioneer
1987 First AntiVirus world wide
1990 First AV with graphical user interface
1995 First AV Hardware...
Member of the ITSMIG association
Under the patronage of
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
• DoubleScan: 2 independent Scanning
Engines
for unique 99+ Warantee
• Fastest reaction time on new threats
• Fingerprinti...
• Proactive Protection with Behaviour
Blocking
and several heuristics methods
• OutbreakShield: Mail based cloud security
...
Certifications achieved
Awards
Certifications and Awards
G Data is the world‘s leading test winner
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
G Data Desktop Solutions
AntiMalware /
AntiSpyware
Firewall /
AntiSpam
Parental
Control
Backup /
Tuning
G Data Desktop Solutions
Available now
GfK TrendSetter - Germany
Computer-Software
Period : 11. - 17. October 2010 (Week 41)
GfK-TOP 10
NON-GAMES
Rank
Previous C...
G Data Business Solutions
Management
Server
AntiVirus
Client
Firewall and
AntiSpam Client
Mail
Security
Remote control: installation, virus scans, u...
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
IT Security strikes out in a new direction.
Web 2.0 platforms (blogs, forum entries)
Social networks (Facebook, MySpace, Twitter)
Manipulated hot topic search results...
Web 2.0 platforms (blogs, forum entries)
Social networks (Facebook, MySpace, Twitter)
Manipulated hot topic search results...
Financial harm
Loss of manpower
Security risks
Infiltration of new malware
IT infrastructure damage due to
unauthorised software
Loss / theft of sensitive...
Legal risks (German Law)
Joint responsibility for copyright
infringements (pirate copies, MP3…)
If trade secrets are publi...
ESSENTIAL: the policy
Written definition of the content and
extent of private Internet use
Use of software to ensure adher...
AntiVirus / Firewall / AntiSpam
PolicyManager:
Device control
Application control
Content Filter
Internet use control
G Da...
USB mass storage devices / hard
disks
CD- / DVD- / floppy drives
Can be certified by administrator
Device control
Whitelist or blacklist
Many applications predefined (file
sharing, games, Messenger, etc.)
Application control
80 different categories, e.g.:
Chats / forums / blogs
Online auctions / job search sites
Gambling / gaming…
Content Filter
Definable Internet lock out times
Usage times can be limited per
day, week and month
Internet use control
Market survey
Device control
Application
control
Web / URL filter
Internet use
control
Symantec
Endpoint
Protection
Sophos
Endpoint
Secu...
Best protection against malware,
hackers and spam
Legal security for usage of
corporate PCs
Significant improve of product...
Thank you.
G data   10 nov 2010
G data   10 nov 2010
G data   10 nov 2010
Upcoming SlideShare
Loading in …5
×

G data 10 nov 2010

395 views

Published on

  • Be the first to comment

  • Be the first to like this

G data 10 nov 2010

  1. 1. G Data Presentation Bucharest 2010
  2. 2. Welcome. Costin Pecingina G Data Representative
  3. 3. G Data Overview1 G Data‘s Unique Technologies2 G Data Solutions3 New: G Data EndpointProtection4
  4. 4. G Data Overview1 G Data‘s Unique Technologies2 G Data Solutions3 New: G Data EndpointProtection4
  5. 5. • Founded 1985 in Germany • 300 employees world wide • Offices in 13 countries: Germany (HQ), USA, Canada, Japan, China, UK, France, Italy, Spain, BeNeLux, Poland and Russia • Sales Partners in more than 90 countries • G Data solutions globally available G Data Overview
  6. 6. The IT-Security Pioneer 1987 First AntiVirus world wide 1990 First AV with graphical user interface 1995 First AV Hardware Protection 1999 First Linux based BootScan 2005 First AV with Cloud Security 2007 First Silent Firewall 2008 First Fingerprinting for top performance
  7. 7. Member of the ITSMIG association Under the patronage of
  8. 8. G Data Overview1 G Data‘s Unique Technologies2 G Data Solutions3 New: G Data EndpointProtection4
  9. 9. • DoubleScan: 2 independent Scanning Engines for unique 99+ Warantee • Fastest reaction time on new threats • Fingerprinting prevents from unnecessary scans to save performance • Whitelisting of known files prevents from False Positives Reactive Protection 90% 92% 94% 96% 98% 100% Jan08 Mar08 May08 Jul08 Sep08 Nov08 Jan09 Mar09 May09 Jul09 Sep09 Nov09 Jan10 Mar10 May10 Jul10 G Data Kaspersky Symantec Mc Afee Trend Micro Reactive detection (Source: AV-Test) 0 100 200 300 400 500 600 G Data Kaspersky Symantec Mc Afee Trend Micro Average reaction time on new threats (Source: Computer BILD) 7h 11min 9h 19min 55min19min 3h 20min
  10. 10. • Proactive Protection with Behaviour Blocking and several heuristics methods • OutbreakShield: Mail based cloud security detects mass mailings such as virus outbreaks or spam attacks using statistical methodology • Web based Cloud Security: server based URL black lists for real time protection Real Time Protection McAfee Symantec Kaspersky F-Secure MSForefront AVG Trustport Sophos Redstone Avira GData 80,00% 85,00% 90,00% 95,00% 100,00% 40,00% 50,00% 60,00% 70,00% 80,00% 90,00% 100,00% ReactiveDetectionvs. Proactive Detection (Source:VirusBulletin) ReactiveDetectionRate Proactive Detection Rate
  11. 11. Certifications achieved Awards Certifications and Awards G Data is the world‘s leading test winner
  12. 12. G Data Overview1 G Data‘s Unique Technologies2 G Data Solutions3 New: G Data EndpointProtection4
  13. 13. G Data Desktop Solutions
  14. 14. AntiMalware / AntiSpyware Firewall / AntiSpam Parental Control Backup / Tuning
  15. 15. G Data Desktop Solutions Available now
  16. 16. GfK TrendSetter - Germany Computer-Software Period : 11. - 17. October 2010 (Week 41) GfK-TOP 10 NON-GAMES Rank Previous Current Week Week Title Brand 1 1 OFFICE HOME AND STUDENT 2010 MICROSOFT 4 2 INTERNET SECURITY 2011 3 USER 25th ANNIVERSARY VERSION G DATA 3 3 INTERNET SECURITY 2011 KASPERSKY LAB 6 4 WINDOWS 7 HOME PREMIUM 64-BIT SB-VERSION MICROSOFT 5 5 INTERNET SECURITY 2011 UPDATE KASPERSKY LAB 8 6 INTERNET SECURITY 2011 3 USER UPDATE KASPERSKY LAB 10 7 WINDOWS 7 HOME PREMIUM 32-BIT SB-VERSION MICROSOFT 7 8 NORTON INTERNET SECURITY 2011 3 USER SYMANTEC 9 9 NORTON INTERNET SECURITY 2011 SYMANTEC 2 10 ANTI-VIRUS 2011 3 USER LIMITED EDITION KASPERSKY LAB
  17. 17. G Data Business Solutions
  18. 18. Management Server AntiVirus Client Firewall and AntiSpam Client Mail Security Remote control: installation, virus scans, updates, settings Fully automated virus scans and updates (pull-push) Fully invisible malware protection – no client interaction For Windows and Linux 2 way Firewall: Invisible protection against hacker attacks AntiSpam: Content independent real time protection Mail server independent mail gateway Protection against malware, spam and phishing
  19. 19. G Data Overview1 G Data‘s Unique Technologies2 G Data Solutions3 New: G Data EndpointProtection4
  20. 20. IT Security strikes out in a new direction.
  21. 21. Web 2.0 platforms (blogs, forum entries) Social networks (Facebook, MySpace, Twitter) Manipulated hot topic search results Links in instant messengers and chats Phishing through online auctions File sharing and file hosting Modern Sources of attack
  22. 22. Web 2.0 platforms (blogs, forum entries) Social networks (Facebook, MySpace, Twitter) Manipulated hot topic search results Links in instant messengers and chats Phishing through online auctions File sharing and file hosting Modern Souces of attack
  23. 23. Financial harm Loss of manpower
  24. 24. Security risks Infiltration of new malware IT infrastructure damage due to unauthorised software Loss / theft of sensitive data
  25. 25. Legal risks (German Law) Joint responsibility for copyright infringements (pirate copies, MP3…) If trade secrets are published If personal data is made accessible to the public
  26. 26. ESSENTIAL: the policy Written definition of the content and extent of private Internet use Use of software to ensure adherence to the policy
  27. 27. AntiVirus / Firewall / AntiSpam PolicyManager: Device control Application control Content Filter Internet use control G Data EndpointProtection
  28. 28. USB mass storage devices / hard disks CD- / DVD- / floppy drives Can be certified by administrator Device control
  29. 29. Whitelist or blacklist Many applications predefined (file sharing, games, Messenger, etc.) Application control
  30. 30. 80 different categories, e.g.: Chats / forums / blogs Online auctions / job search sites Gambling / gaming… Content Filter
  31. 31. Definable Internet lock out times Usage times can be limited per day, week and month Internet use control
  32. 32. Market survey
  33. 33. Device control Application control Web / URL filter Internet use control Symantec Endpoint Protection Sophos Endpoint Security & Control Kaspersky Antivirus 6.0 McAfee Protection for Endpoint Trend Micro Worry Free Business Security G Data Endpoint Protection Only Whitelist Only Whitelist Only Blacklist
  34. 34. Best protection against malware, hackers and spam Legal security for usage of corporate PCs Significant improve of productivity Easy administration thanks to unique all-in-one solution G Data EndpointProtection advantages
  35. 35. Thank you.

×