SlideShare a Scribd company logo
1 of 22
Kaspersky Security for Mac
  Comprehensive Protection for the Mac OS X Environment




Vartan Minasyan, Head of Product Management, KAV/KIS


Kaspersky Security for Mac Launch Event, Moscow, 14-16, May 2012
PAGE 1 |
Introduction

           Web Security

           Parental Controls

           Mac Look and Feel




PAGE 2 |
Introduction




1 2 3 4 5
Threats for Mac. They are a reality.
                       Rootkit.OSX.Weapox
           IM-Worm.OSX.Leap MacLocker
               MAC Defender
              OSX/iWorkS-A MacSweeper

              Flashfake botnet
   Mac OS X SMS ransomware Backdoor.OSX.Reshe.a (HellRTS.D)

                          OSX/RSPlug-A
            Virus.OSX.Macarena ZeoBit MacKeeper
                  OSX.Trojan.iServices
PAGE 4 |   1 2 3 4 5
Vectors of infection

How malware can end up on a Mac:


  When downloading programs and files (as in the case of Leap worm).
  Via vulnerabilities in apps (Safari, PDF, etc.).
  By installing illegal software or using “pirate” keygens for legal software
  (as in the case of OSX.Trojan.iServices).
  Fraudulent programs that ask users to enter their password and then gain
  access to the computer.
  Via fake antivirus software.




PAGE 5 |   1 2 3 4 5
Why advanced security is needed

 Apple‟s standard security levels protect you from a limited cybercrime threat



 As Apple has gained market share we have seen an increase in cybercriminal
 activity targeting Mac enthusiasts


 Even if Macintosh computers are not vulnerable to most malware in circulation,
 they are an effective way of transferring viruses to colleagues and friends


 Kaspersky Lab has the infrastructure, experience and know-how to protect our
 customers from over 70,000 new threats per day – the kind of protection only a
 devoted specialist company can offer




PAGE 6 |   1 2 3 4 5
Best security solution for Mac
Kaspersky Security for Mac ensures you and your
children are always safe with advanced, real-time
protection from viruses, phishing, dangerous websites and
more.

           Protects against Mac and PC malware in real-time
           Detects phishing and dangerous websites
           Keeps your children safe online
           Safeguards your private data
           Stops PC malware from being passed on to friends and colleagues
           Has familiar Mac „look and feel‟




PAGE 7 |     1 2 3 4 5
Where is Kaspersky Anti-Virus for Mac?

 Kaspersky Security for Mac is the successor to Kaspersky
                Anti-Virus 2011 for Mac.



                                     Latest protection technologies
                                     Improved Web Antivirus
                                                                                                     Kaspersky
                                     Improved anti-phishing technologies                             Security for
                                     Parental controls                                                      Mac
                                     Sensitive data protection




     However, not all the features that would move the product into the “Internet Security” category are there.
     Therefore, we have given the product the somewhat more generic name of Kaspersky Security for Mac.




PAGE 8 |      1 2 3 4 5
Latest Kaspersky Lab technologies

     Real-time Protection
                       Web Anti-Virus
  File Anti-Virus
                      Heuristics



 Kaspersky Security Network (KSN)


    Anti-Phishing
                       URL Advisor




PAGE 9 |   1 2 3 4 5
Web Security




1 2 3 4 5
Online monitor

  Internet and Network Security
       File Anti-Virus scans files for the presence of malware whenever they are
       opened, saved or executed on the computer, and on any associated drives
       Improved!
       Scans web traffic and checks the website against a database of phishing sites
       and dangerous URLs New!
       Kaspersky URL Advisor alerts about suspicious and phishing links Improved!

  Email Protection (scans email messages and attachments)
  All identified threats are blocked
  and you are alerted.




PAGE 11 |   1 2 3 4 5
Private data protection

                        New! Virtual Keyboard defeats keyloggers
                        and screen-capture malware




                                                 Virtual keyboard
                                                 opens
                                                 automatically
                                                 when user wants
                                                 to enter login
                                                 and password




PAGE 12 |   1 2 3 4 5
Private data protection
  New! Prevents children
  from sharing personal
    information (phone
  numbers, addresses or
 banking details) over the
          Internet




PAGE 13 |   1 2 3 4 5
Parental Controls




1 2 3 4 5
Extended parental controls
  New! Parental controls
  include:
  • Internet time control
  • Blocking of unwanted
    websites (plus white &
    blacklists)
  • Restricting downloads by
    file type
  • Safe search
  • Social networking control
    (Facebook, Twitter)
  • Blocking of personal data
    sharing
  • Detailed reports




PAGE 15 |   1 2 3 4 5
Control of social networking




PAGE 16 |   1 2 3 4 5
Mac Look and Feel




1 2 3 4 5
Product look & feel
  User-friendly and intuitive interface
  Protection status in the main window
  Access to all key features from the main
  window New!
  Welcome page to greet the user and provide
  guidance for the program New!




                                               Easy to set-up preferences
                                               Fast access to statistics on all detected
                                               and neutralized threats




PAGE 18 |      1 2 3 4 5
On-demand scanner

  Shows the bar with current
  scanning process
  Choose between:
  • Full scan
  • Quick scan
  • Virus scan of any object

  Choose between:
  • Manual
  • Automatically scheduled

  Adds drag and drop scan for files
  and folders




PAGE 19 |    1 2 3 4 5
Protection center
  If threats are found, the user will be
  alerted and the status in the main
  window changes




                                           The user can eliminate
                                           threats in Protection Center




PAGE 20 |   1 2 3 4 5
Conclusion

  The latest technologies protect against
  emerging Mac threats
  Improved Web Anti-Virus provides
  efficient protection against harmful and
  phishing websites
  Virtual Keyboard safeguards the most
  sensitive data
  Parental controls protect kids from
  harmful websites and deliver a controlled
  experience on social networks
  A revamped and simple-to-use interface
  provides all necessary data at a glance,
  with a Mac look and feel

PAGE 21 |   1 2 3 4 5
Thank you!



Vartan Minasyan, Head of Product Management, KAV/KIS


Kaspersky Security for Mac Launch Event, Moscow, 14-16, May 2012


PAGE 22 |

More Related Content

What's hot

Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowSkycure
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesTrend Micro
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Skycure
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General PresentationKsenia Kondratieva
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMSkycure
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)DavidNicholls52
 
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...Alexander Benoit
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Disaster recovery glossary
Disaster recovery glossaryDisaster recovery glossary
Disaster recovery glossarysinglehopsn
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelDavid J Rosenthal
 
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)PacSecJP
 
Web App Attacks - Stats & Remediation
Web App Attacks - Stats & RemediationWeb App Attacks - Stats & Remediation
Web App Attacks - Stats & RemediationQualys
 
Cloud Security Myths Vs Facts
Cloud Security Myths Vs FactsCloud Security Myths Vs Facts
Cloud Security Myths Vs FactsOPAQ
 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Alexander Benoit
 
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'ts
Experts Live Europe 2017 -  Windows 10 Servicing - the do’s and don'tsExperts Live Europe 2017 -  Windows 10 Servicing - the do’s and don'ts
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'tsAlexander Benoit
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksSkycure
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceQualys
 

What's hot (20)

Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to Know
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General Presentation
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMM
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)
 
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Disaster recovery glossary
Disaster recovery glossaryDisaster recovery glossary
Disaster recovery glossary
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Top Application Security Threats
Top Application Security Threats Top Application Security Threats
Top Application Security Threats
 
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
 
Web App Attacks - Stats & Remediation
Web App Attacks - Stats & RemediationWeb App Attacks - Stats & Remediation
Web App Attacks - Stats & Remediation
 
Cloud Security Myths Vs Facts
Cloud Security Myths Vs FactsCloud Security Myths Vs Facts
Cloud Security Myths Vs Facts
 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
 
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'ts
Experts Live Europe 2017 -  Windows 10 Servicing - the do’s and don'tsExperts Live Europe 2017 -  Windows 10 Servicing - the do’s and don'ts
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'ts
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 

Viewers also liked

Astaro IT-Security-Lösungen
Astaro IT-Security-LösungenAstaro IT-Security-Lösungen
Astaro IT-Security-Lösungennetlogix
 
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3netlogix
 
SMS PASSCODE: Authentifizierung per Handy
SMS PASSCODE: Authentifizierung per HandySMS PASSCODE: Authentifizierung per Handy
SMS PASSCODE: Authentifizierung per Handynetlogix
 
Einführung in die VPN Standortvernetzung
Einführung in die VPN StandortvernetzungEinführung in die VPN Standortvernetzung
Einführung in die VPN Standortvernetzungfbeisel
 
Astaro Security Wall - Sechs Schritte zur sicheren IT
Astaro Security Wall - Sechs Schritte zur sicheren ITAstaro Security Wall - Sechs Schritte zur sicheren IT
Astaro Security Wall - Sechs Schritte zur sicheren ITnetlogix
 
FLOW3: Security mit AOP
FLOW3: Security mit AOPFLOW3: Security mit AOP
FLOW3: Security mit AOPnetlogix
 
TYPO3 Neos and Flow - Security 2.0
TYPO3 Neos and Flow - Security 2.0TYPO3 Neos and Flow - Security 2.0
TYPO3 Neos and Flow - Security 2.0netlogix
 

Viewers also liked (7)

Astaro IT-Security-Lösungen
Astaro IT-Security-LösungenAstaro IT-Security-Lösungen
Astaro IT-Security-Lösungen
 
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3
 
SMS PASSCODE: Authentifizierung per Handy
SMS PASSCODE: Authentifizierung per HandySMS PASSCODE: Authentifizierung per Handy
SMS PASSCODE: Authentifizierung per Handy
 
Einführung in die VPN Standortvernetzung
Einführung in die VPN StandortvernetzungEinführung in die VPN Standortvernetzung
Einführung in die VPN Standortvernetzung
 
Astaro Security Wall - Sechs Schritte zur sicheren IT
Astaro Security Wall - Sechs Schritte zur sicheren ITAstaro Security Wall - Sechs Schritte zur sicheren IT
Astaro Security Wall - Sechs Schritte zur sicheren IT
 
FLOW3: Security mit AOP
FLOW3: Security mit AOPFLOW3: Security mit AOP
FLOW3: Security mit AOP
 
TYPO3 Neos and Flow - Security 2.0
TYPO3 Neos and Flow - Security 2.0TYPO3 Neos and Flow - Security 2.0
TYPO3 Neos and Flow - Security 2.0
 

Similar to Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Environment

Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
Kaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Anti-Virus for Macintosh - Technical PresentationKaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Anti-Virus for Macintosh - Technical Presentationquestar
 
How to install Kaspersky Antivirus.ppt
How to install Kaspersky Antivirus.pptHow to install Kaspersky Antivirus.ppt
How to install Kaspersky Antivirus.pptjhony64281
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Dejan Pogačnik
 
Cybercrime Threats in 2012 - What You Need to Know
Cybercrime Threats in 2012 - What You Need to KnowCybercrime Threats in 2012 - What You Need to Know
Cybercrime Threats in 2012 - What You Need to KnowKaseya
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overviewsferinga
 
eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.eScan
 
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxfrancis578223
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015SLBdiensten
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityUltraUploader
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious emailAndrew Wong
 
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒Cheer Chain Enterprise Co., Ltd.
 
Esteban Próspero
Esteban PrósperoEsteban Próspero
Esteban PrósperoClusterCba
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceAberla
 

Similar to Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Environment (20)

Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
Kaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Anti-Virus for Macintosh - Technical PresentationKaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Anti-Virus for Macintosh - Technical Presentation
 
How to install Kaspersky Antivirus.ppt
How to install Kaspersky Antivirus.pptHow to install Kaspersky Antivirus.ppt
How to install Kaspersky Antivirus.ppt
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015
 
Cybercrime Threats in 2012 - What You Need to Know
Cybercrime Threats in 2012 - What You Need to KnowCybercrime Threats in 2012 - What You Need to Know
Cybercrime Threats in 2012 - What You Need to Know
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
 
eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.
 
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 
Mac review 2012_en
Mac review 2012_enMac review 2012_en
Mac review 2012_en
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
 
Esteban Próspero
Esteban PrósperoEsteban Próspero
Esteban Próspero
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Environment

  • 1. Kaspersky Security for Mac Comprehensive Protection for the Mac OS X Environment Vartan Minasyan, Head of Product Management, KAV/KIS Kaspersky Security for Mac Launch Event, Moscow, 14-16, May 2012 PAGE 1 |
  • 2. Introduction Web Security Parental Controls Mac Look and Feel PAGE 2 |
  • 4. Threats for Mac. They are a reality. Rootkit.OSX.Weapox IM-Worm.OSX.Leap MacLocker MAC Defender OSX/iWorkS-A MacSweeper Flashfake botnet Mac OS X SMS ransomware Backdoor.OSX.Reshe.a (HellRTS.D) OSX/RSPlug-A Virus.OSX.Macarena ZeoBit MacKeeper OSX.Trojan.iServices PAGE 4 | 1 2 3 4 5
  • 5. Vectors of infection How malware can end up on a Mac: When downloading programs and files (as in the case of Leap worm). Via vulnerabilities in apps (Safari, PDF, etc.). By installing illegal software or using “pirate” keygens for legal software (as in the case of OSX.Trojan.iServices). Fraudulent programs that ask users to enter their password and then gain access to the computer. Via fake antivirus software. PAGE 5 | 1 2 3 4 5
  • 6. Why advanced security is needed Apple‟s standard security levels protect you from a limited cybercrime threat As Apple has gained market share we have seen an increase in cybercriminal activity targeting Mac enthusiasts Even if Macintosh computers are not vulnerable to most malware in circulation, they are an effective way of transferring viruses to colleagues and friends Kaspersky Lab has the infrastructure, experience and know-how to protect our customers from over 70,000 new threats per day – the kind of protection only a devoted specialist company can offer PAGE 6 | 1 2 3 4 5
  • 7. Best security solution for Mac Kaspersky Security for Mac ensures you and your children are always safe with advanced, real-time protection from viruses, phishing, dangerous websites and more. Protects against Mac and PC malware in real-time Detects phishing and dangerous websites Keeps your children safe online Safeguards your private data Stops PC malware from being passed on to friends and colleagues Has familiar Mac „look and feel‟ PAGE 7 | 1 2 3 4 5
  • 8. Where is Kaspersky Anti-Virus for Mac? Kaspersky Security for Mac is the successor to Kaspersky Anti-Virus 2011 for Mac. Latest protection technologies Improved Web Antivirus Kaspersky Improved anti-phishing technologies Security for Parental controls Mac Sensitive data protection However, not all the features that would move the product into the “Internet Security” category are there. Therefore, we have given the product the somewhat more generic name of Kaspersky Security for Mac. PAGE 8 | 1 2 3 4 5
  • 9. Latest Kaspersky Lab technologies Real-time Protection Web Anti-Virus File Anti-Virus Heuristics Kaspersky Security Network (KSN) Anti-Phishing URL Advisor PAGE 9 | 1 2 3 4 5
  • 11. Online monitor Internet and Network Security File Anti-Virus scans files for the presence of malware whenever they are opened, saved or executed on the computer, and on any associated drives Improved! Scans web traffic and checks the website against a database of phishing sites and dangerous URLs New! Kaspersky URL Advisor alerts about suspicious and phishing links Improved! Email Protection (scans email messages and attachments) All identified threats are blocked and you are alerted. PAGE 11 | 1 2 3 4 5
  • 12. Private data protection New! Virtual Keyboard defeats keyloggers and screen-capture malware Virtual keyboard opens automatically when user wants to enter login and password PAGE 12 | 1 2 3 4 5
  • 13. Private data protection New! Prevents children from sharing personal information (phone numbers, addresses or banking details) over the Internet PAGE 13 | 1 2 3 4 5
  • 15. Extended parental controls New! Parental controls include: • Internet time control • Blocking of unwanted websites (plus white & blacklists) • Restricting downloads by file type • Safe search • Social networking control (Facebook, Twitter) • Blocking of personal data sharing • Detailed reports PAGE 15 | 1 2 3 4 5
  • 16. Control of social networking PAGE 16 | 1 2 3 4 5
  • 17. Mac Look and Feel 1 2 3 4 5
  • 18. Product look & feel User-friendly and intuitive interface Protection status in the main window Access to all key features from the main window New! Welcome page to greet the user and provide guidance for the program New! Easy to set-up preferences Fast access to statistics on all detected and neutralized threats PAGE 18 | 1 2 3 4 5
  • 19. On-demand scanner Shows the bar with current scanning process Choose between: • Full scan • Quick scan • Virus scan of any object Choose between: • Manual • Automatically scheduled Adds drag and drop scan for files and folders PAGE 19 | 1 2 3 4 5
  • 20. Protection center If threats are found, the user will be alerted and the status in the main window changes The user can eliminate threats in Protection Center PAGE 20 | 1 2 3 4 5
  • 21. Conclusion The latest technologies protect against emerging Mac threats Improved Web Anti-Virus provides efficient protection against harmful and phishing websites Virtual Keyboard safeguards the most sensitive data Parental controls protect kids from harmful websites and deliver a controlled experience on social networks A revamped and simple-to-use interface provides all necessary data at a glance, with a Mac look and feel PAGE 21 | 1 2 3 4 5
  • 22. Thank you! Vartan Minasyan, Head of Product Management, KAV/KIS Kaspersky Security for Mac Launch Event, Moscow, 14-16, May 2012 PAGE 22 |

Editor's Notes

  1. Зловредов для Маков на данные момент известно около сотни.По сравнению с количеством угроз для пользователей ПК (около 5 млн) цифра незначительна.