SlideShare a Scribd company logo
1 of 17
Download to read offline
© 2016 Kaspersky Lab. All rights reserved.
FEEL THE POWER
OF PROTECTION
WITH KASPERSKY LAB
2
HOW KASPERSKY LAB CAN HELP YOU
TO STAY SAFE AGAINST DIGITAL DANGERS
Safeguards your PC and all the
precious things you store on it.
Protects you when you
surf, socialize & shop –
on + Multi –Device PC &
Mac, plus Android
devices
Gives you the power to protect
your family – on PC, Mac,
phone, iPad & Android
+Data Encryption ,Backup & Restore
+ Password Manager
Kaspersky®
Total
Security
Choose the
protection that's
right for you
3
LAYERS OF PROTECTION
Kaspersky®
Anti-Virus
Kaspersky®
Internet Security
Kaspersky®
Total Security
Performance
Simplicity
Privacy
Money
KidsPC, Mac
& Mobile
Multi-Device
Passwords
Files
Security
4
Layers of Protection
Kaspersky
Anti-Virus
Kaspersky
Internet Security
Kaspersky
Total Security
Security
Award-winning protection
Performance
Optimized for efficiency
Simplicity
Easy-to-manage security
PC, Mac & Mobile
One product is all you need
Privacy
Identity protection & more
Money
Security for online banking & shopping
Parental Control
Protection for kids on PCs & Mac computers
Safe Kids
Helps your kids enjoy the digital world
on PC, Mac & Mobile
Passwords
Secure storage & easy access
Files
Encryption & backup of your photos,
music & memories
WHICH SOLUTION IS RIGHT FOR YOU?
5
PROTECT MOBILE
LIFE ON PHONES
OR TABLETS
DEFEND YOUR
PRIVACY ONLINEMAINTAIN
SECURITY OF
APPS & FILES
PROTECT
PASSWORDS AND
IDENTITY
KEEP PERSONAL
INFORMATION
MANAGE
THE SOFTWARE
SECURE
COMMUNICATION
BLOCK
DANGEROUS
BEHAVIOR
PROTECT
WHEN,
SOCIALIZING
& SHOPPING
WHAT DO WE EXPECT FROM SECURITY?
6
MULTI-DEVICE
SECURES MULTIPLE DEVICES – WITH ONE LKASPERSKY
Source: Consumer Security Risks Survey 2015,
by B2B International & Kaspersky Lab
PC, MAC & MOBILE,
Every device you use could
compromise your security. So
we help you protect PCs, Mac
computers and Android devices
– plus you can lock, wipe &
locate missing Android phones
& tablets
The product can be installed
on the number of devices granted
by the license that you purchase.
67% of the respondents use multiple devices
to go online at home, while travelling, at work,
in cafes, shops and elsewhere
7
PASSWORD MANAGER
SECURELY STORES PASSWORDS FOR EASY ACCESS
PASSWORDS
There’s no need to memorize
all your complex passwords.
You only needs to remember
one master password – to
access all individual
passwords, via your PC,
Mac, Android phone & tablet,
Phone and iPad. Our service
even generates strong
passwords on your PC for all
your app and website
accounts.
III II
I
48% of respondents used potentially
insecure methods of password storage
– leaving them vulnerable to theft
14% of respondents use one
password for all their accounts
Source: (1) Consumer Security Risks Survey 2015, by B2B International & Kaspersky Lab; (2) ‘Are you cyber savvy?’ quiz by Kaspersky Lab
8
DATA ENCRYPTION ,BACKUP & RESTORE
PROTECTS PRECIOUS FILES, PHOTOS & MEMORIES
FILES
Because you never want to
lose irreplaceable files, we
help you back up your
precious memories – plus
encrypt your confidential
information and totally shred
unwanted files.*
88% stores private or personal
information on digital devices
*Available on PCs only.
Estimated median value of
replacing all digital assets
stored on devices
is $682
Source: Consumer Security Risks Survey 2015, by B2B International & Kaspersky Lab
9
ANTI-RANSOMWARE
SAY NO TO CRYPTO-LOCKERS &RANSOMWARE
Ransomware is one of the fastest growing types of
malware. Between 2014-15, attacks have increased
700% on average globally.
Businesses are targeted by cybercriminals who
encrypt and hold their data ‘hostage’ until a ransom is
paid. provides a strong defense against crypto-
malware with System Watcher technology. It can
block even unknown malware before it executes –
and backup files before malware can change or
encrypt them.
10
HELPS DEFEND YOUR KIDS AGAINST ONLINE
DANGERS & MORE
Source: Growing Up Online research. Connected Kids, by Kaspersky Lab
*Available on PCs & Mac computers
only.
**The service is available with
Kaspersky Total Security only.
Kaspersky Safe Kids**
helps you find better ways
to keep your kids safe – on
PC, Mac, iPhone, iPad &
Android devices. With
device usage scheduling,
GPS safe zones,
notifications about
suspicious activities and
summaries of what they
search, see & share… you
can stay connected with
your kids and help keep
them safe.
KIDS
Our Parental Control
features help you to steer
kids away from online
dangers, block inappropriate
websites and manage
messaging on social
networks.*
37% of young people
have encountered
dangers online…
including inappropriate
content and bullying
63% of children find it hard to distinguish
between what is true and what is false
online
11
PROTECTS AGAINST VIRUSES, ATTACKS & MORE
Source: Kaspersky Security Bulletin 2015. Overall statistics for 2015
SECURITY
We all need to guard against
digital dangers – so our
award-winning security helps
you protect your family and
yourself against today’s
threats.
*Available on PCs within Kaspersky
Internet Security & Kaspersky Total
Security &Small office security only.
MANAGE YOUR
SOFTWARE
Scan the software on your PC
and install updates – to keep
your software up-to-date. Find
applications, toolbars, adware
and other software that may
affect performance & security
– and lets you decide whether
to remove them. Help block
installation attempts that try to
install software or make
changes to your PC.*
NEW
99,8% of mobile malware
is targeting at Android
Almost 6 mln unique attacks on
Mac devices were recorded in
2015
Kaspersky Lab products
repelled more then 798 mln
attacks from online resources
in 2015
12
DEFENDS AGAINST PHISHING, SPYING & TRACKING
Source: (1) Consumer Security Risks Survey 2015, by B2B International & Kaspersky Lab; (2) International Travel Report 2016 by Kaspersky Lab
PRIVACY
Don’t let anyone steal
confidential information. We
help you guard personal
data, prevent online
activities being monitored* &
block unauthorized webcam
use*.
20% of users fiscally cover
webcam to avoid spying
*Available on PCs & Mac computers
only.
**Available on PCs only.
82% of users go online through
unsecured public Wi-Fi networks
while on travel
Anti-Phishing Protection was triggered
147 mln times in 2015
SECURE YOUR
COMMUNICATIONS
If you’re using a public
network, Secure
Connection** encrypts all
data you send and receive.
Even if data is intercepted, it
can’t be read.
NEW
13
BOOSTS SECURITY FOR ONLINE SHOPPING
& BANKING
Source: Consumer Security Risks Survey 2015, by B2B International & Kaspersky Lab
MONEY
SAFE MONEY
Fraudsters are always on the
lookout. So Safe Money
helps you protect your
money and account details…
to stop cybercriminals
stealing them… by checking
that the site is secure, plus
ensures you’re not being
tricked by a fake site and
then opens the website in a
special, protected mode.*
*Available on PCs & Mac computers
only.
11% have lost money as
a result of cyber attack
22% have lost more
than $1,000
14
LETS DEVICES PERFORM AS THEY’RE DESIGNED TO
PERFORMANCE
Security shouldn’t slow
you down. Our protection
technologies work
‘behind the scenes’ – so
your computers and
mobile devices can help
you to keep up with your
busy life.
Windows®
Mac
AndroidTM
/ iOS
15
SIMPLIFIES YOUR SECURITY – WITH EASY,
ONLINE CONTROL
SIMPLICITY
Nobody wants to waste
time getting to grips with
complex security. That’s
why we give you a free My
Kaspersky account that
makes it easy to manage
your security from
anywhere you can get
online.
16
MOST TESTED. MOST AWARDED. KASPERSKY LAB PROTECTION.*
0%
20%
40%
60%
80%
100%
20 40 60 80 100
N of independent tests/reviews
ScoreofTOP3places
Bitdefender
Sophos
G DATA
Symantec
F-Secure
Intel Security (McAfee)
Trend Micro
Avira
Avast
AVG
ESET
Quick Heal
Microsoft
Panda Security
In 2015 Kaspersky Lab products participated in 94
independent tests and reviews. Our products were awarded
60 firsts and achieved 77 Top3 finishes.
Kaspersky Lab
1st places – 60
Participation in 94
tests/reviews
TOP 3 = 82%
BullGuard
* Notes:
• According to summary results of
independent tests in 2015 for
corporate, consumer and mobile
products.
• Summary includes independent tests
conducted by : AV-Comparatives, AV-
Test, Dennis Technology Labs, MRG
Effitas, NSS Labs, PC Security Labs,
VirusBulletin.
• Tests performed in these programs
assess all protection technologies
against known, unknown and
advanced threats.
• The size of the bubble reflects the
number of 1st places achieved.
Top overall test rating for 2015. For details, please see http://www.kaspersky.com/top3
17
THANK YOU
FOR CHOOSING US
Learn more about this products
Kaspersky®
Total
Security

More Related Content

What's hot

What attackers know about your mobile apps that you don’t: Banking & FinTech
What attackers know about your mobile apps that you don’t: Banking & FinTechWhat attackers know about your mobile apps that you don’t: Banking & FinTech
What attackers know about your mobile apps that you don’t: Banking & FinTechNowSecure
 
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App RiskMobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App RiskNowSecure
 
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeMobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeNowSecure
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2Monica Hamilton
 
How Android and iOS Security Enhancements Complicate Threat Detection
How Android and iOS Security Enhancements Complicate Threat DetectionHow Android and iOS Security Enhancements Complicate Threat Detection
How Android and iOS Security Enhancements Complicate Threat DetectionNowSecure
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeNowSecure
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
Venkasure Total Security + Presentation
Venkasure Total Security + PresentationVenkasure Total Security + Presentation
Venkasure Total Security + Presentationvenkasureantivirus
 
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019Mobile App Security Predictions 2019
Mobile App Security Predictions 2019NowSecure
 
Next-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNext-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNowSecure
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsIBM Security
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an AntivirusQuick Heal Technologies Ltd.
 
The New Economics of Cloud Security
The New Economics of Cloud SecurityThe New Economics of Cloud Security
The New Economics of Cloud SecurityAlert Logic
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Appsprimomh
 
Ascendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityAscendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityCristian Garcia G.
 
Mobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic MenaceMobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic MenaceNowSecure
 

What's hot (20)

What attackers know about your mobile apps that you don’t: Banking & FinTech
What attackers know about your mobile apps that you don’t: Banking & FinTechWhat attackers know about your mobile apps that you don’t: Banking & FinTech
What attackers know about your mobile apps that you don’t: Banking & FinTech
 
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App RiskMobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
 
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeMobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the Code
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2
 
How Android and iOS Security Enhancements Complicate Threat Detection
How Android and iOS Security Enhancements Complicate Threat DetectionHow Android and iOS Security Enhancements Complicate Threat Detection
How Android and iOS Security Enhancements Complicate Threat Detection
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Venkasure Total Security + Presentation
Venkasure Total Security + PresentationVenkasure Total Security + Presentation
Venkasure Total Security + Presentation
 
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019Mobile App Security Predictions 2019
Mobile App Security Predictions 2019
 
Check Point Infinity
Check Point Infinity Check Point Infinity
Check Point Infinity
 
30 Killer Internet Security Tips
30 Killer Internet Security Tips30 Killer Internet Security Tips
30 Killer Internet Security Tips
 
Next-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNext-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approach
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
 
The New Economics of Cloud Security
The New Economics of Cloud SecurityThe New Economics of Cloud Security
The New Economics of Cloud Security
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
Ascendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityAscendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber Security
 
Mobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic MenaceMobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic Menace
 

Similar to Kaspersky 2017 Thailand Launch

Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Dejan Pogačnik
 
Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityUnderstanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityNeil Parker
 
KAV KIS 2015 Product Presentation
KAV KIS 2015 Product PresentationKAV KIS 2015 Product Presentation
KAV KIS 2015 Product PresentationWiseKnow Thailand
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Anwar CHFI, SSCP, ITIL
 
15 Way to Protect Your Business From a Cyberattack .pdf
15 Way to Protect Your Business From a Cyberattack .pdf15 Way to Protect Your Business From a Cyberattack .pdf
15 Way to Protect Your Business From a Cyberattack .pdfBorja ARRIZABALAGA URIARTE
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015anpapathanasiou
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Billtrust
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
Information security for business majors
Information security for business majorsInformation security for business majors
Information security for business majorsPaul Melson
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Sam Norallah
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industrySeqrite
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Advanced monitoring
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfTuring.com
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonPatricia M Watson
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of thingsChristian Milde
 

Similar to Kaspersky 2017 Thailand Launch (20)

Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015
 
Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityUnderstanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber Security
 
KAV KIS 2015 Product Presentation
KAV KIS 2015 Product PresentationKAV KIS 2015 Product Presentation
KAV KIS 2015 Product Presentation
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
15 Way to Protect Your Business From a Cyberattack .pdf
15 Way to Protect Your Business From a Cyberattack .pdf15 Way to Protect Your Business From a Cyberattack .pdf
15 Way to Protect Your Business From a Cyberattack .pdf
 
datasheet-quickheal-total-securitypdf...
datasheet-quickheal-total-securitypdf...datasheet-quickheal-total-securitypdf...
datasheet-quickheal-total-securitypdf...
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Information security for business majors
Information security for business majorsInformation security for business majors
Information security for business majors
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Cyber security
Cyber securityCyber security
Cyber security
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 

Recently uploaded

Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 

Recently uploaded (20)

Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 

Kaspersky 2017 Thailand Launch

  • 1. © 2016 Kaspersky Lab. All rights reserved. FEEL THE POWER OF PROTECTION WITH KASPERSKY LAB
  • 2. 2 HOW KASPERSKY LAB CAN HELP YOU TO STAY SAFE AGAINST DIGITAL DANGERS Safeguards your PC and all the precious things you store on it. Protects you when you surf, socialize & shop – on + Multi –Device PC & Mac, plus Android devices Gives you the power to protect your family – on PC, Mac, phone, iPad & Android +Data Encryption ,Backup & Restore + Password Manager Kaspersky® Total Security Choose the protection that's right for you
  • 3. 3 LAYERS OF PROTECTION Kaspersky® Anti-Virus Kaspersky® Internet Security Kaspersky® Total Security Performance Simplicity Privacy Money KidsPC, Mac & Mobile Multi-Device Passwords Files Security
  • 4. 4 Layers of Protection Kaspersky Anti-Virus Kaspersky Internet Security Kaspersky Total Security Security Award-winning protection Performance Optimized for efficiency Simplicity Easy-to-manage security PC, Mac & Mobile One product is all you need Privacy Identity protection & more Money Security for online banking & shopping Parental Control Protection for kids on PCs & Mac computers Safe Kids Helps your kids enjoy the digital world on PC, Mac & Mobile Passwords Secure storage & easy access Files Encryption & backup of your photos, music & memories WHICH SOLUTION IS RIGHT FOR YOU?
  • 5. 5 PROTECT MOBILE LIFE ON PHONES OR TABLETS DEFEND YOUR PRIVACY ONLINEMAINTAIN SECURITY OF APPS & FILES PROTECT PASSWORDS AND IDENTITY KEEP PERSONAL INFORMATION MANAGE THE SOFTWARE SECURE COMMUNICATION BLOCK DANGEROUS BEHAVIOR PROTECT WHEN, SOCIALIZING & SHOPPING WHAT DO WE EXPECT FROM SECURITY?
  • 6. 6 MULTI-DEVICE SECURES MULTIPLE DEVICES – WITH ONE LKASPERSKY Source: Consumer Security Risks Survey 2015, by B2B International & Kaspersky Lab PC, MAC & MOBILE, Every device you use could compromise your security. So we help you protect PCs, Mac computers and Android devices – plus you can lock, wipe & locate missing Android phones & tablets The product can be installed on the number of devices granted by the license that you purchase. 67% of the respondents use multiple devices to go online at home, while travelling, at work, in cafes, shops and elsewhere
  • 7. 7 PASSWORD MANAGER SECURELY STORES PASSWORDS FOR EASY ACCESS PASSWORDS There’s no need to memorize all your complex passwords. You only needs to remember one master password – to access all individual passwords, via your PC, Mac, Android phone & tablet, Phone and iPad. Our service even generates strong passwords on your PC for all your app and website accounts. III II I 48% of respondents used potentially insecure methods of password storage – leaving them vulnerable to theft 14% of respondents use one password for all their accounts Source: (1) Consumer Security Risks Survey 2015, by B2B International & Kaspersky Lab; (2) ‘Are you cyber savvy?’ quiz by Kaspersky Lab
  • 8. 8 DATA ENCRYPTION ,BACKUP & RESTORE PROTECTS PRECIOUS FILES, PHOTOS & MEMORIES FILES Because you never want to lose irreplaceable files, we help you back up your precious memories – plus encrypt your confidential information and totally shred unwanted files.* 88% stores private or personal information on digital devices *Available on PCs only. Estimated median value of replacing all digital assets stored on devices is $682 Source: Consumer Security Risks Survey 2015, by B2B International & Kaspersky Lab
  • 9. 9 ANTI-RANSOMWARE SAY NO TO CRYPTO-LOCKERS &RANSOMWARE Ransomware is one of the fastest growing types of malware. Between 2014-15, attacks have increased 700% on average globally. Businesses are targeted by cybercriminals who encrypt and hold their data ‘hostage’ until a ransom is paid. provides a strong defense against crypto- malware with System Watcher technology. It can block even unknown malware before it executes – and backup files before malware can change or encrypt them.
  • 10. 10 HELPS DEFEND YOUR KIDS AGAINST ONLINE DANGERS & MORE Source: Growing Up Online research. Connected Kids, by Kaspersky Lab *Available on PCs & Mac computers only. **The service is available with Kaspersky Total Security only. Kaspersky Safe Kids** helps you find better ways to keep your kids safe – on PC, Mac, iPhone, iPad & Android devices. With device usage scheduling, GPS safe zones, notifications about suspicious activities and summaries of what they search, see & share… you can stay connected with your kids and help keep them safe. KIDS Our Parental Control features help you to steer kids away from online dangers, block inappropriate websites and manage messaging on social networks.* 37% of young people have encountered dangers online… including inappropriate content and bullying 63% of children find it hard to distinguish between what is true and what is false online
  • 11. 11 PROTECTS AGAINST VIRUSES, ATTACKS & MORE Source: Kaspersky Security Bulletin 2015. Overall statistics for 2015 SECURITY We all need to guard against digital dangers – so our award-winning security helps you protect your family and yourself against today’s threats. *Available on PCs within Kaspersky Internet Security & Kaspersky Total Security &Small office security only. MANAGE YOUR SOFTWARE Scan the software on your PC and install updates – to keep your software up-to-date. Find applications, toolbars, adware and other software that may affect performance & security – and lets you decide whether to remove them. Help block installation attempts that try to install software or make changes to your PC.* NEW 99,8% of mobile malware is targeting at Android Almost 6 mln unique attacks on Mac devices were recorded in 2015 Kaspersky Lab products repelled more then 798 mln attacks from online resources in 2015
  • 12. 12 DEFENDS AGAINST PHISHING, SPYING & TRACKING Source: (1) Consumer Security Risks Survey 2015, by B2B International & Kaspersky Lab; (2) International Travel Report 2016 by Kaspersky Lab PRIVACY Don’t let anyone steal confidential information. We help you guard personal data, prevent online activities being monitored* & block unauthorized webcam use*. 20% of users fiscally cover webcam to avoid spying *Available on PCs & Mac computers only. **Available on PCs only. 82% of users go online through unsecured public Wi-Fi networks while on travel Anti-Phishing Protection was triggered 147 mln times in 2015 SECURE YOUR COMMUNICATIONS If you’re using a public network, Secure Connection** encrypts all data you send and receive. Even if data is intercepted, it can’t be read. NEW
  • 13. 13 BOOSTS SECURITY FOR ONLINE SHOPPING & BANKING Source: Consumer Security Risks Survey 2015, by B2B International & Kaspersky Lab MONEY SAFE MONEY Fraudsters are always on the lookout. So Safe Money helps you protect your money and account details… to stop cybercriminals stealing them… by checking that the site is secure, plus ensures you’re not being tricked by a fake site and then opens the website in a special, protected mode.* *Available on PCs & Mac computers only. 11% have lost money as a result of cyber attack 22% have lost more than $1,000
  • 14. 14 LETS DEVICES PERFORM AS THEY’RE DESIGNED TO PERFORMANCE Security shouldn’t slow you down. Our protection technologies work ‘behind the scenes’ – so your computers and mobile devices can help you to keep up with your busy life. Windows® Mac AndroidTM / iOS
  • 15. 15 SIMPLIFIES YOUR SECURITY – WITH EASY, ONLINE CONTROL SIMPLICITY Nobody wants to waste time getting to grips with complex security. That’s why we give you a free My Kaspersky account that makes it easy to manage your security from anywhere you can get online.
  • 16. 16 MOST TESTED. MOST AWARDED. KASPERSKY LAB PROTECTION.* 0% 20% 40% 60% 80% 100% 20 40 60 80 100 N of independent tests/reviews ScoreofTOP3places Bitdefender Sophos G DATA Symantec F-Secure Intel Security (McAfee) Trend Micro Avira Avast AVG ESET Quick Heal Microsoft Panda Security In 2015 Kaspersky Lab products participated in 94 independent tests and reviews. Our products were awarded 60 firsts and achieved 77 Top3 finishes. Kaspersky Lab 1st places – 60 Participation in 94 tests/reviews TOP 3 = 82% BullGuard * Notes: • According to summary results of independent tests in 2015 for corporate, consumer and mobile products. • Summary includes independent tests conducted by : AV-Comparatives, AV- Test, Dennis Technology Labs, MRG Effitas, NSS Labs, PC Security Labs, VirusBulletin. • Tests performed in these programs assess all protection technologies against known, unknown and advanced threats. • The size of the bubble reflects the number of 1st places achieved. Top overall test rating for 2015. For details, please see http://www.kaspersky.com/top3
  • 17. 17 THANK YOU FOR CHOOSING US Learn more about this products Kaspersky® Total Security