SlideShare a Scribd company logo
IntroducingKaspersky Anti-Virus 2011         & Kaspersky Internet Security 2011
The Threat Growing  is Changing and
The Growing Malware Threat 3 4,250,000 4,000,000 3,750,000 New threats per day 30,000+ 3,500,000 3,250,000 3,000,000 New signatures per day   3,500+ 2,750,000 2,500,000 2,250,000 Total signatures as of July 2010 4,400,000 2,000,000 1,750,000 1,500,000 Spam messages per day 30,000,000+ 1,250,000 1,000,000 750,000 500,000 250,000 0 2010 1998 2000 2002 2004 2006 2008 2009 1999 2001 2003 2005 2007
New Phishing Attacks are Most Dangerous in The Earliest Hours 4 Cost $ Victims 1 72 20 Time in Hours
This is Big Business, Well-funded, Very Clever Cybercriminals are very motivated to be as creative and tricky as possible because there’s lots of money to be made In some cases you can even call a customer service line if your hacker software isn’t working They have the resources and the motivation to do things on a grand scale with maximum impact in the shortest amount of time 5 $ $ $
             The Kaspersky Difference Premium Multi-Layer Protection Real-Time protection against viruses, spyware, Trojans, worms, rootkits, botnets and more Superior Identity Theft Defense with Virtual Keyboard to protect your most sensitive data Small Hourly Signature Updates Maximum PC Performance Small footprint with 1% CPU usage iChecker/iSwift provide intelligent scanning for maximum performance Gamer Mode blocks pop-ups and reduces use of pc’s resources in one-click Ease of Use Desktop Security Gadget Intuitive Interface
What’s NEW!Kaspersky Anti-Virus 2011         & Kaspersky Internet Security 2011
8                 Real-time Protection New:  If your PC is so severely infected that no software can be installed on it, you can  download the AVP tool to scan and eliminate all threats without calling Support Includes Rescue Disk for efficiently detecting and eliminating computer infections if your system is maliciously attacked Installs on Infected PCs
9 		Ease of Use New:  Quick desktop access to your security status and settings Customizable buttons for convenient access to frequently used security features Easy drag-and-drop functionality for instant  virus scanning Desktop Security Gadget
10 Premium Protection New:  Cutting-edge technology for proactive defense against emerging threats Monitors and analyzes system activity to detect any dangerous behavior Malicious actions can be rolled-back, preventing permanent damage System Watcher Monitor Log Reverse
v 11 ID Protection New:  Proactively detects phishing resources, in addition to using the database of phishing web sites  Protects your digital identity and blocks access to phishing web sites Virtual Keyboard keeps your passwords secure when shopping, banking or social networking online Proactive Phishing Protection
Also NEW withKasperskyInternet Security 2011
13 Emerging Threat Protection New:  Completely walled-off environment for running unknown or suspicious programs “Test drive” programs with total confidence that no harm will come to your system Includes Safe Run for Web sites for an added layer of protection when accessing web sites that handle confidential information like online banking Safe Desktop
14 Family Protection New:  Monitor, limit or block your kids’ online activities: Applications or games Communications via Email, IM or social networks File downloads Transfer of personal information like addresses, phone numbers or credit cards Web content Time spent online Advanced Parental Controls
15 Real-time Protection New:  Delivers unparalleled online security, protecting you from dangerous web sites Assesses an IP address, and assigns it a status: Trusted, Suspicious or Banned Status is determined by analyzing data related to the IP address: Rate of visit/hits Does it contain malicious code?  Does it link to suspicious web sites? Safe Surf
Blocks web sites by their country code domain Allows users the ability to specify where they want to receive content from or where they don’t want to receive it from  Protects against legitimate web sites that “re-direct” to foreign malware servers 16 Real-time Protection New:  Geo Filter
What’s New from Kaspersky 2011 Desktop Security Gadget  - Instant access to security status and features System Watcher – Monitors and analyzes system activity to detect any dangerous behavior Proactive Phishing Protection - Protects your digital identity and blocks access to phishing web sites Installation on Infected PCs -  Directly download the AVP tool to scan and eliminate all threats  Also  New with Kaspersky Internet Security 2011: Safe Desktop with Safe Run for Web sites– Completely walled-off environment for running suspicious programs and Safe Run mode for additional protection for your financial information Advanced Parental Controls – Monitor, limit or block your kids’ online activities Safe Surf–  Protects you from dangerous or offensive web sites Geo Filter – Blocks web sites by their country code domain
Unmatched Support Team 18 ,[object Object]
High-touch

More Related Content

What's hot

problem statement on security
problem statement on securityproblem statement on security
problem statement on security
RajuPrasad33
 
Adware
AdwareAdware
Adware
Avani Patel
 
Insider theft detection
Insider theft detection Insider theft detection
Insider theft detection
SumanthKommineni
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
NowSecure
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
Quick Heal Technologies Ltd.
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
SMSumon8
 
Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?
ahanashrin
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
Nick Miller
 
Spyware
SpywareSpyware
Spyware
Avani Patel
 
Network Situational Awareness using Tripwire IP360
Network Situational Awareness using Tripwire IP360Network Situational Awareness using Tripwire IP360
Network Situational Awareness using Tripwire IP360
Tripwire
 
Backdoor
BackdoorBackdoor
Backdoor
phanleson
 
Ransomware- What Accountants Need To Know
Ransomware- What Accountants Need To KnowRansomware- What Accountants Need To Know
Ransomware- What Accountants Need To Know
Ace Cloud Hosting
 
Network security
Network securityNetwork security
Network security
Nandini Raj
 
Tripwire Adaptive Threat Protection
Tripwire Adaptive Threat ProtectionTripwire Adaptive Threat Protection
Tripwire Adaptive Threat Protection
Tripwire
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
 
Ransomware 2017: New threats emerge
Ransomware 2017: New threats emergeRansomware 2017: New threats emerge
Ransomware 2017: New threats emerge
Symantec Security Response
 
Secure Code Warrior - Robust error checking
Secure Code Warrior - Robust error checkingSecure Code Warrior - Robust error checking
Secure Code Warrior - Robust error checking
Secure Code Warrior
 
Swiss-belhotel Security Scare Workshop May 3, 2018
Swiss-belhotel Security Scare Workshop May 3, 2018Swiss-belhotel Security Scare Workshop May 3, 2018
Swiss-belhotel Security Scare Workshop May 3, 2018
Craig Rispin
 

What's hot (19)

problem statement on security
problem statement on securityproblem statement on security
problem statement on security
 
Adware
AdwareAdware
Adware
 
Insider theft detection
Insider theft detection Insider theft detection
Insider theft detection
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Spyware
SpywareSpyware
Spyware
 
Network Situational Awareness using Tripwire IP360
Network Situational Awareness using Tripwire IP360Network Situational Awareness using Tripwire IP360
Network Situational Awareness using Tripwire IP360
 
Backdoor
BackdoorBackdoor
Backdoor
 
Ransomware- What Accountants Need To Know
Ransomware- What Accountants Need To KnowRansomware- What Accountants Need To Know
Ransomware- What Accountants Need To Know
 
Network security
Network securityNetwork security
Network security
 
Tripwire Adaptive Threat Protection
Tripwire Adaptive Threat ProtectionTripwire Adaptive Threat Protection
Tripwire Adaptive Threat Protection
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Ransomware 2017: New threats emerge
Ransomware 2017: New threats emergeRansomware 2017: New threats emerge
Ransomware 2017: New threats emerge
 
Secure Code Warrior - Robust error checking
Secure Code Warrior - Robust error checkingSecure Code Warrior - Robust error checking
Secure Code Warrior - Robust error checking
 
Swiss-belhotel Security Scare Workshop May 3, 2018
Swiss-belhotel Security Scare Workshop May 3, 2018Swiss-belhotel Security Scare Workshop May 3, 2018
Swiss-belhotel Security Scare Workshop May 3, 2018
 

Viewers also liked

Ambientes operacionais - sistemas operacionais.
Ambientes operacionais - sistemas operacionais.Ambientes operacionais - sistemas operacionais.
Ambientes operacionais - sistemas operacionais.
Ronald Santos
 
El desayuno, la comida más importante del día.
El desayuno, la comida más importante del día.El desayuno, la comida más importante del día.
El desayuno, la comida más importante del día.
CEAC
 
Civil Society and Public Administration
Civil Society and Public AdministrationCivil Society and Public Administration
Civil Society and Public Administration
Sheila Dingcong
 
Postmodern Public Administration Theory
Postmodern Public Administration TheoryPostmodern Public Administration Theory
Postmodern Public Administration Theory
Sheila Dingcong
 
Hoe schrijf je een brief?
Hoe schrijf je een brief?Hoe schrijf je een brief?
Hoe schrijf je een brief?
CVO-SSH
 

Viewers also liked (6)

Ambientes operacionais - sistemas operacionais.
Ambientes operacionais - sistemas operacionais.Ambientes operacionais - sistemas operacionais.
Ambientes operacionais - sistemas operacionais.
 
Proyecciones
ProyeccionesProyecciones
Proyecciones
 
El desayuno, la comida más importante del día.
El desayuno, la comida más importante del día.El desayuno, la comida más importante del día.
El desayuno, la comida más importante del día.
 
Civil Society and Public Administration
Civil Society and Public AdministrationCivil Society and Public Administration
Civil Society and Public Administration
 
Postmodern Public Administration Theory
Postmodern Public Administration TheoryPostmodern Public Administration Theory
Postmodern Public Administration Theory
 
Hoe schrijf je een brief?
Hoe schrijf je een brief?Hoe schrijf je een brief?
Hoe schrijf je een brief?
 

Similar to 2011 training presentation

Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
TechSoup
 
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
Cheer Chain Enterprise Co., Ltd.
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
Sophos Benelux
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
Rahul Nayan
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Alireza Ghahrood
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
Lumension
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
Asif Raza
 
How Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software VulnerabilitiesHow Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software Vulnerabilities
Bunmi Sowande
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
Symptai Consulting Limited
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesSejahtera Affif
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
Anindita Ghatak
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
Lancope, Inc.
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
HabeebUllah10
 
Unmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe SurfingUnmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe Surfing
SoftwareDeals
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
Art Ocain
 
NetWitness
NetWitnessNetWitness
Virus removal-services
Virus removal-servicesVirus removal-services
Virus removal-servicesAskPCTechies
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Security
 

Similar to 2011 training presentation (20)

Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
How Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software VulnerabilitiesHow Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software Vulnerabilities
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
 
Unmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe SurfingUnmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe Surfing
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
NetWitness
NetWitnessNetWitness
NetWitness
 
Virus removal-services
Virus removal-servicesVirus removal-services
Virus removal-services
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

2011 training presentation

  • 1. IntroducingKaspersky Anti-Virus 2011 & Kaspersky Internet Security 2011
  • 2. The Threat Growing is Changing and
  • 3. The Growing Malware Threat 3 4,250,000 4,000,000 3,750,000 New threats per day 30,000+ 3,500,000 3,250,000 3,000,000 New signatures per day 3,500+ 2,750,000 2,500,000 2,250,000 Total signatures as of July 2010 4,400,000 2,000,000 1,750,000 1,500,000 Spam messages per day 30,000,000+ 1,250,000 1,000,000 750,000 500,000 250,000 0 2010 1998 2000 2002 2004 2006 2008 2009 1999 2001 2003 2005 2007
  • 4. New Phishing Attacks are Most Dangerous in The Earliest Hours 4 Cost $ Victims 1 72 20 Time in Hours
  • 5. This is Big Business, Well-funded, Very Clever Cybercriminals are very motivated to be as creative and tricky as possible because there’s lots of money to be made In some cases you can even call a customer service line if your hacker software isn’t working They have the resources and the motivation to do things on a grand scale with maximum impact in the shortest amount of time 5 $ $ $
  • 6. The Kaspersky Difference Premium Multi-Layer Protection Real-Time protection against viruses, spyware, Trojans, worms, rootkits, botnets and more Superior Identity Theft Defense with Virtual Keyboard to protect your most sensitive data Small Hourly Signature Updates Maximum PC Performance Small footprint with 1% CPU usage iChecker/iSwift provide intelligent scanning for maximum performance Gamer Mode blocks pop-ups and reduces use of pc’s resources in one-click Ease of Use Desktop Security Gadget Intuitive Interface
  • 7. What’s NEW!Kaspersky Anti-Virus 2011 & Kaspersky Internet Security 2011
  • 8. 8 Real-time Protection New: If your PC is so severely infected that no software can be installed on it, you can download the AVP tool to scan and eliminate all threats without calling Support Includes Rescue Disk for efficiently detecting and eliminating computer infections if your system is maliciously attacked Installs on Infected PCs
  • 9. 9 Ease of Use New: Quick desktop access to your security status and settings Customizable buttons for convenient access to frequently used security features Easy drag-and-drop functionality for instant virus scanning Desktop Security Gadget
  • 10. 10 Premium Protection New: Cutting-edge technology for proactive defense against emerging threats Monitors and analyzes system activity to detect any dangerous behavior Malicious actions can be rolled-back, preventing permanent damage System Watcher Monitor Log Reverse
  • 11. v 11 ID Protection New: Proactively detects phishing resources, in addition to using the database of phishing web sites Protects your digital identity and blocks access to phishing web sites Virtual Keyboard keeps your passwords secure when shopping, banking or social networking online Proactive Phishing Protection
  • 13. 13 Emerging Threat Protection New: Completely walled-off environment for running unknown or suspicious programs “Test drive” programs with total confidence that no harm will come to your system Includes Safe Run for Web sites for an added layer of protection when accessing web sites that handle confidential information like online banking Safe Desktop
  • 14. 14 Family Protection New: Monitor, limit or block your kids’ online activities: Applications or games Communications via Email, IM or social networks File downloads Transfer of personal information like addresses, phone numbers or credit cards Web content Time spent online Advanced Parental Controls
  • 15. 15 Real-time Protection New: Delivers unparalleled online security, protecting you from dangerous web sites Assesses an IP address, and assigns it a status: Trusted, Suspicious or Banned Status is determined by analyzing data related to the IP address: Rate of visit/hits Does it contain malicious code? Does it link to suspicious web sites? Safe Surf
  • 16. Blocks web sites by their country code domain Allows users the ability to specify where they want to receive content from or where they don’t want to receive it from Protects against legitimate web sites that “re-direct” to foreign malware servers 16 Real-time Protection New: Geo Filter
  • 17. What’s New from Kaspersky 2011 Desktop Security Gadget - Instant access to security status and features System Watcher – Monitors and analyzes system activity to detect any dangerous behavior Proactive Phishing Protection - Protects your digital identity and blocks access to phishing web sites Installation on Infected PCs - Directly download the AVP tool to scan and eliminate all threats Also New with Kaspersky Internet Security 2011: Safe Desktop with Safe Run for Web sites– Completely walled-off environment for running suspicious programs and Safe Run mode for additional protection for your financial information Advanced Parental Controls – Monitor, limit or block your kids’ online activities Safe Surf– Protects you from dangerous or offensive web sites Geo Filter – Blocks web sites by their country code domain
  • 18.
  • 23.

Editor's Notes

  1. Premise
  2. This year Kaspersky has taken the “sandbox” concept one step further with our new “Safe Desktop”. It literally replicates your actual desktop in a sandbox environment, let’s you launch any file or application in Safe Mode (so no newly introduced malware can invade your system while you are in Safe Mode) – even gives you the ability to switch back and forth between your Main Desktop and your Safe Desktop.