The document provides an overview of Bitdefender's GravityZone security platform. Some key points:
- GravityZone is an integrated security platform that provides unified prevention, detection, response and risk analytics across endpoints, network, cloud and human users.
- It offers both cloud-hosted and on-premises console delivery options for centralized management.
- The platform brings together next-gen endpoint protection, endpoint detection and response, and risk analytics technologies through a single agent and console.
- Its integrated technologies and services are designed to provide best breach avoidance through detection and response, prevention, risk analytics, and security services.
Block Armour is a Singapore, UK, USA, and India based award-winning Cybersecurity venture focused on harnessing modern approaches and emerging technologies such as Blockchain to counter growing cybersecurity challenges in bold new ways. Accelerated by Airbus and featured among the Top 25 Cybersecurity innovations worldwide, Block Armour has developed a next-gen Zero Trust security platform and delivers integrated cybersecurity solutions for today’s hybrid enterprise-IT environments. The award-winning platform is powered by Software Defined Perimeter (SDP) architecture and private Blockchain technology, and is aligned with the NIST Zero Trust Framework.
Block Armour is helping organizations in multiple geographies to consolidate their Cybersecurity investments (across on-prem systems, Cloud, and IoT), enforce Zero Trust principles enterprise-wide, defend against cyberattacks, and comply with regulations.
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlockArmour1
For oil and gas companies navigating the complex intersection of IoT, hybrid IT environments, and cybersecurity, Block Armour's Zero Trust Cybersecurity Mesh offers a comprehensive solution. By leveraging the strengths of SDP together with the transparency and immutability of Blockchain, this design ensures robust Zero Trust based security tailored to the industry's critical cybersecurity needs.
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
How to design secure software products for IoT, embedded application, smart metering, smart lighting, medical application with the help of Common Criteria
Block Armour is a Singapore, UK, USA, and India based award-winning Cybersecurity venture focused on harnessing modern approaches and emerging technologies such as Blockchain to counter growing cybersecurity challenges in bold new ways. Accelerated by Airbus and featured among the Top 25 Cybersecurity innovations worldwide, Block Armour has developed a next-gen Zero Trust security platform and delivers integrated cybersecurity solutions for today’s hybrid enterprise-IT environments. The award-winning platform is powered by Software Defined Perimeter (SDP) architecture and private Blockchain technology, and is aligned with the NIST Zero Trust Framework.
Block Armour is helping organizations in multiple geographies to consolidate their Cybersecurity investments (across on-prem systems, Cloud, and IoT), enforce Zero Trust principles enterprise-wide, defend against cyberattacks, and comply with regulations.
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlockArmour1
For oil and gas companies navigating the complex intersection of IoT, hybrid IT environments, and cybersecurity, Block Armour's Zero Trust Cybersecurity Mesh offers a comprehensive solution. By leveraging the strengths of SDP together with the transparency and immutability of Blockchain, this design ensures robust Zero Trust based security tailored to the industry's critical cybersecurity needs.
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
How to design secure software products for IoT, embedded application, smart metering, smart lighting, medical application with the help of Common Criteria
Product security by Blockchain, AI and Security CertsLabSharegroup
Three themes You need to think about Product Security — and some tips for How to Do It
I have been working with software security laboratories and IT security firms for years. I have talked with clients, read and watched dozens of articles/videos and talked with several experts about product security themes, future, technologies.
The three themes are:
Is the blockchain the new technology of trust?
Blockchain has the potential to transform industries. However, some security experts raised questions: If blockchain is broadly used in technology solutions will security standards be adopted? How to protect the cryptographic keys that allow access to the blockchain applications? Although it is true that the potential is huge such as securing IoT nodes, edge devices with authentication, improved confidentiality and data integrity, disrupting current PKI systems, reducing DDoS attacks etc.
AI (Machine Learning, Deep Learning, Reinforcement Learning algorithm) potential in Product Security
Machine learning can help in creating products that analyse threats and respond to attacks and security incidents. There are several repositories on GitHub or open-source codes by IBM available for developers. Deep learning networks are rapidly growing due to cheap cloud GPU services and after Reinforcement learning algorithm’s last success nobody knows the upper limit.
Product Security by International security standards and practices
The present, future, and developmental orientations of independent third party certificates Industry. How can the international standards answer the rapid growth of new technologies and maintain secure applications in IoT, Blockchain or AI-driven industries?
Are IT products reliable, secure and will they stay that way?
I would like to explain Product Security in a simple way. My goal is the introduction of product security for Tech startups, fast-growing Tech firms. Furthermore, I would like to emphasize the benefits of product security certification.
Best Practices for Cloud-Based IoT SecuritySatyaKVivek
Cloud-based IoT solutions are the future for digital products and services. However, the security risks associated with virtual infrastructures can’t be ignored either. Cybercriminals are constantly finding new ways to carry out malicious attacks and call for tighter security practices. Thankfully, building IoT solutions on the cloud is a solution and can significantly bolster the network’s security.
Solution: Block Armour Secure Remote Access for WFHBlock Armour
The Covid-19 pandemic has compelled organizations to allow large sections of the workforce to work from home. A majority of enterprises have deployed a VPN to provide remote access and ensure business continuity. However, traditional VPNs were never designed for today's highly distributed and hybrid IT environments and could expose enterprise applications and sensitive data on the corporate network to malware, ransomware, and other cyberattacks. Learn how Block Armour's #ZeroTrust security solution with integrated 2-factor authentication mitigates the risk of unauthorized access, prevents malware propagation and enables secure and compliant remote access for employees working from home due to Covid-19.
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
It’s widely known that patch management is a major pain point for most businesses. IT teams struggle to keep systems patched and secure. Cyber-attacks are continuous and anti-virus protection alone isn’t effective.
Cyber hygiene best practices need to be followed to keep organizations secure and to prevent security breaches.
In this webinar, Chandrashekhar - SecPod’s Founder & CEO, Douglas Smith - BlueHat Cyber’s Senior Sales Director, and Greg Pottebaum - SecPod’s VP OEM & Strategic Alliances, demonstrate:
- How to efficiently reduce the cyber-attack surface of your business
- Simple strategies to improve your security management
- How Blue Hat Cyber uses SanerNow to automate patch management and secure their customer’s endpoints
Request a FREE Demo of SanerNow platform at:
www.secpod.com
About SecPod
SecPod is an endpoint security and management technology company. SecPod (Security Podium, incarnated as SecPod)
was founded in the year 2008. SecPod’s SanerNow platform and tools are used by MSPs and enterprises worldwide.
SecPod also licenses security technology to top security vendors through its SCAP Content Professional Feed.
Facebook: https://www.facebook.com/secpod/
LinkedIn: https://www.linkedin.com/company/secp...
Twitter: https://twitter.com/SecPod
Email us at info@secpod.com to get more details on how to secure your organisation from cyber attacks.
Conference Security by Design - Gemalto - Security in IoTWitekio
For those who didn't come to our conference "Security by Design : An IoT must have", or those who want to see it again, here is the presentation made by Gemalto.
Block Armour has developed an advanced Zero Trust security platform and delivers integrated cybersecurity solutions for today’s hybrid enterprise-IT environments. The award-winning platform is powered by Software Defined Perimeter (SDP) architecture and private Blockchain technology, and is aligned with the NIST Zero Trust Framework.
Block Armour is helping organizations in multiple geographies to consolidate their Cybersecurity investments (across on-prem systems, Cloud, and IoT), enforce Zero Trust principles enterprise-wide, defend against cyberattacks, and comply with regulations.
Block Armour has developed an advanced Zero Trust security platform and delivers integrated cybersecurity solutions for today’s hybrid enterprise-IT environments. The award-winning platform is powered by Software Defined Perimeter (SDP) architecture and private Blockchain technology, and is aligned with the NIST Zero Trust Framework
The platform is helping organizations in multiple geographies to consolidate their Cybersecurity investments (across on-prem systems, Cloud, and IoT), enforce Zero Trust principles enterprise-wide, defend against cyberattacks, and comply with regulations.
Conozca como entender la propuesta de valor que tenemos junto a Check Point en la nube pública con una perspectiva de ciberseguridad para los procesos de adopción de los servicios de nube
Product security by Blockchain, AI and Security CertsLabSharegroup
Three themes You need to think about Product Security — and some tips for How to Do It
I have been working with software security laboratories and IT security firms for years. I have talked with clients, read and watched dozens of articles/videos and talked with several experts about product security themes, future, technologies.
The three themes are:
Is the blockchain the new technology of trust?
Blockchain has the potential to transform industries. However, some security experts raised questions: If blockchain is broadly used in technology solutions will security standards be adopted? How to protect the cryptographic keys that allow access to the blockchain applications? Although it is true that the potential is huge such as securing IoT nodes, edge devices with authentication, improved confidentiality and data integrity, disrupting current PKI systems, reducing DDoS attacks etc.
AI (Machine Learning, Deep Learning, Reinforcement Learning algorithm) potential in Product Security
Machine learning can help in creating products that analyse threats and respond to attacks and security incidents. There are several repositories on GitHub or open-source codes by IBM available for developers. Deep learning networks are rapidly growing due to cheap cloud GPU services and after Reinforcement learning algorithm’s last success nobody knows the upper limit.
Product Security by International security standards and practices
The present, future, and developmental orientations of independent third party certificates Industry. How can the international standards answer the rapid growth of new technologies and maintain secure applications in IoT, Blockchain or AI-driven industries?
Are IT products reliable, secure and will they stay that way?
I would like to explain Product Security in a simple way. My goal is the introduction of product security for Tech startups, fast-growing Tech firms. Furthermore, I would like to emphasize the benefits of product security certification.
Best Practices for Cloud-Based IoT SecuritySatyaKVivek
Cloud-based IoT solutions are the future for digital products and services. However, the security risks associated with virtual infrastructures can’t be ignored either. Cybercriminals are constantly finding new ways to carry out malicious attacks and call for tighter security practices. Thankfully, building IoT solutions on the cloud is a solution and can significantly bolster the network’s security.
Solution: Block Armour Secure Remote Access for WFHBlock Armour
The Covid-19 pandemic has compelled organizations to allow large sections of the workforce to work from home. A majority of enterprises have deployed a VPN to provide remote access and ensure business continuity. However, traditional VPNs were never designed for today's highly distributed and hybrid IT environments and could expose enterprise applications and sensitive data on the corporate network to malware, ransomware, and other cyberattacks. Learn how Block Armour's #ZeroTrust security solution with integrated 2-factor authentication mitigates the risk of unauthorized access, prevents malware propagation and enables secure and compliant remote access for employees working from home due to Covid-19.
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
It’s widely known that patch management is a major pain point for most businesses. IT teams struggle to keep systems patched and secure. Cyber-attacks are continuous and anti-virus protection alone isn’t effective.
Cyber hygiene best practices need to be followed to keep organizations secure and to prevent security breaches.
In this webinar, Chandrashekhar - SecPod’s Founder & CEO, Douglas Smith - BlueHat Cyber’s Senior Sales Director, and Greg Pottebaum - SecPod’s VP OEM & Strategic Alliances, demonstrate:
- How to efficiently reduce the cyber-attack surface of your business
- Simple strategies to improve your security management
- How Blue Hat Cyber uses SanerNow to automate patch management and secure their customer’s endpoints
Request a FREE Demo of SanerNow platform at:
www.secpod.com
About SecPod
SecPod is an endpoint security and management technology company. SecPod (Security Podium, incarnated as SecPod)
was founded in the year 2008. SecPod’s SanerNow platform and tools are used by MSPs and enterprises worldwide.
SecPod also licenses security technology to top security vendors through its SCAP Content Professional Feed.
Facebook: https://www.facebook.com/secpod/
LinkedIn: https://www.linkedin.com/company/secp...
Twitter: https://twitter.com/SecPod
Email us at info@secpod.com to get more details on how to secure your organisation from cyber attacks.
Conference Security by Design - Gemalto - Security in IoTWitekio
For those who didn't come to our conference "Security by Design : An IoT must have", or those who want to see it again, here is the presentation made by Gemalto.
Block Armour has developed an advanced Zero Trust security platform and delivers integrated cybersecurity solutions for today’s hybrid enterprise-IT environments. The award-winning platform is powered by Software Defined Perimeter (SDP) architecture and private Blockchain technology, and is aligned with the NIST Zero Trust Framework.
Block Armour is helping organizations in multiple geographies to consolidate their Cybersecurity investments (across on-prem systems, Cloud, and IoT), enforce Zero Trust principles enterprise-wide, defend against cyberattacks, and comply with regulations.
Block Armour has developed an advanced Zero Trust security platform and delivers integrated cybersecurity solutions for today’s hybrid enterprise-IT environments. The award-winning platform is powered by Software Defined Perimeter (SDP) architecture and private Blockchain technology, and is aligned with the NIST Zero Trust Framework
The platform is helping organizations in multiple geographies to consolidate their Cybersecurity investments (across on-prem systems, Cloud, and IoT), enforce Zero Trust principles enterprise-wide, defend against cyberattacks, and comply with regulations.
Conozca como entender la propuesta de valor que tenemos junto a Check Point en la nube pública con una perspectiva de ciberseguridad para los procesos de adopción de los servicios de nube
Similar to Presales-Present_GravityZone Products_June2023.pptx (20)
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteGoogle
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
👉👉 Click Here To Get More Info 👇👇
https://sumonreview.com/ai-pilot-review/
AI Pilot Review: Key Features
✅Deploy AI expert bots in Any Niche With Just A Click
✅With one keyword, generate complete funnels, websites, landing pages, and more.
✅More than 85 AI features are included in the AI pilot.
✅No setup or configuration; use your voice (like Siri) to do whatever you want.
✅You Can Use AI Pilot To Create your version of AI Pilot And Charge People For It…
✅ZERO Manual Work With AI Pilot. Never write, Design, Or Code Again.
✅ZERO Limits On Features Or Usages
✅Use Our AI-powered Traffic To Get Hundreds Of Customers
✅No Complicated Setup: Get Up And Running In 2 Minutes
✅99.99% Up-Time Guaranteed
✅30 Days Money-Back Guarantee
✅ZERO Upfront Cost
See My Other Reviews Article:
(1) TubeTrivia AI Review: https://sumonreview.com/tubetrivia-ai-review
(2) SocioWave Review: https://sumonreview.com/sociowave-review
(3) AI Partner & Profit Review: https://sumonreview.com/ai-partner-profit-review
(4) AI Ebook Suite Review: https://sumonreview.com/ai-ebook-suite-review
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Mind IT Systems
Healthcare providers often struggle with the complexities of chronic conditions and remote patient monitoring, as each patient requires personalized care and ongoing monitoring. Off-the-shelf solutions may not meet these diverse needs, leading to inefficiencies and gaps in care. It’s here, custom healthcare software offers a tailored solution, ensuring improved care and effectiveness.
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
A Comprehensive Look at Generative AI in Retail App Testing.pdfkalichargn70th171
Traditional software testing methods are being challenged in retail, where customer expectations and technological advancements continually shape the landscape. Enter generative AI—a transformative subset of artificial intelligence technologies poised to revolutionize software testing.
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
1. W W W . B I T D E F E N D E R . C O M
BITDEFENDER
GRAVITYZONE
M r . S o n g k l o d S r i p h u m b a n g P r o d u c t M a n a g e r
E N D P O I N T N E T W O R K C L O U D
2. OCTOBER 20, 2023
END-TO-END BREACH AVOIDANCE
OCTOBER 20, 2023
AGENDA o About Bitdefender
o Introduction GravityZone
o Security Solution
o Q&A
4. 4
OUR MISSION
Trusted cybersecurity technology
provider in the world
We are committed to help secure your
organization from breaches and
business disruptions.
5. 5
WE ARE: A GLOBAL
CYBER-SECURITY INNOVATOR
We provide end-to-end breach avoidance.
@endpoint @network @cloud
MAIN HQ IN BUCHAREST, ROMANIA
ENTERPRISE HQ IN SILICON VALLEY (SANTA CLARA, CALIFORNIA US)
FOUNDED IN 2001 1,600+ EMPLOYEES WORLDWIDE
800+ IN R&D / ENGINEERING
38% OF GLOBAL
CYBER-SECURITY FIRMS USE
BITDEFENDER TECHNOLOGY
20K+ PARTNERS WORLDWIDE
150+ OEM PARTNERS
500M+ Protecting
Users Worldwide
6. The Progression of Endpoint Security
Evolution of Endpoint Security
Beyond Anti-Malware
AV
Antivirus
NGAV
Next Generation
Antivirus
EPP
Endpoint
Protection
NGEP
Next Generation
Endpoint Protection
EDR
Endpoint Detection
& Response
uses a database
of known 'signatures’
to detect virus
uses a database
of known 'signatures’
+ heuristic analysis,
HIPS, and more
features
uses a database
of known 'signatures’
+ heuristics, behavior
analysis, internet and
network access (Web,
Mail, Firewall, IPS,
Device Control,
Application Control)
Machine Learning
based protection
against new and
unknown threats,
fileless & PowerShell
attacks, zero-day
vulnerabilities,
Ransomware Rollback,
Sandboxing
Discover and
investigate techniques,
tactics
and procedures (TTPs),
Root Cause
Analysis, MITRE
ATT&CK framework
IoC, Threat hunting,
Incident Response
7. The Progression of Endpoint Security
Evolution of Endpoint Security
Beyond Anti-Malware
The evolution of EDR
and XDR
The integrated
solution, combines
EDR and Network Traffic
Analytics
email, endpoint, server,
cloud workloads, and
network
XDR
eXtended Detection and
Response
MDR
Managed Detection
and Response Services
Outsourced
Cybersecurity Operations
for endpoints, plus
network and security
analytics, with the threat-
hunting expertise of a
SOC
Feature..
8. 8
CONFIDENTIAL
OCTOBER 20, 2023
ACKNOWLEDGED INNOVATION
LEADER
First machine learning-
based detection
First automated stream detection
based on machine learning
2008 2011 2013 2014 2015 2016 2017 2018 2019
First IoT security
(Bitdefender Box)
First tunable machine learning
(HyperDetect)
First integrated Prevention,
Detection, Response and Risk
Analytics
First noise reduction algorithm
for finding misclassified
samples
First use of deep learning to
increase detection rates
Only Hypervisor-based memory
introspection (HVI)
First tunable machine learning in
agentless virtualization security
2022
First human risk
analytics
/xEDR
9. OCTOBER 20, 2023
PARTNERED BY
LAW ENFORCEMENT AGENCIES
AGAINST CYBER CRIME
Actively engaged in countering international cybercrime with
major law enforcement agencies, in takedowns
operations or as part of international initiatives.
• Takedown of Hansa, the second-largest black market, in collaboration with Europol &
FBI.
• Part of Europol’s NoMoreRansom and Microsoft’s TechAccord. Helped victims save
$632 million in ransomware claims.
• Appointed CVE Numbering Authority in MITRE Partnership.
10. OCTOBER 20, 2023
TRUSTED BY
KEY ORGANIZATIONS
WORLDWIDE
“Bitdefender allows us to show Citrix to the world
without the paralyzing fear of being hacked.”
11. OCTOBER 20, 2023
RELIED ON
IN KEY TECHNOLOGY
PARTNERSHIPS
Proud technology alliance partner to major virtualization vendors, directly contributing
to the development of secure ecosystems with VMware, Nutanix, Citrix, Linux
Foundation, Microsoft, AWS, and Pivotal.
12. October 20, 2023 12
RECOGNIZED BY
GLOBAL SECURITY ANALYSTS &
REVIEWERS
TRUSTED BY
ENTERPRISES AND LAW
ENFORCEMENT AGENCIES
RELIED ON
in key technology
partnerships
Leader in the inaugural Forrester® WAVE ™ for Cloud
Workload Security
100% detection in the first Advanced Real-
World test by AV-Comparatives
“Received a score of 100% for evasions.
No false positives” NSS Labs
PROTECTING KEY ORGANIZATIONS
WORLDWIDE
FBI Department of Justice
PARTNERING AGAINST CYBER CRIME
13. October 20, 2023
13
OCTOBER 20, 2023
EDR LEADER ACROSS THE BOARD
Independent labs AV-TEST & AV-COMPARATIVES confirm EDR
excellency
With "Endpoint Security
(Ultra)", Bitdefender succeeded
at fielding a top product in 2021
which was able to meet the high
standards of the AV-TEST
Institute.
MARCH 2020 AV-TEST Award for
Bitdefender – certified proof of peak
excellence
Staggering 100% score in AV-
Comparatives first APT attack
test
DECEMBER 2019 AV-Comparatives
Enhanced Real World Protection Test
Bitdefender, a global
cybersecurity leader, was named
a Customers’ Choice in North
America in the 2021
15. October 20, 2023
15
OCTOBER 20, 2023
"Bitdefender is the biggest
EDR vendor you haven’t
considered but should have."
The Forrester Wave™: Enterprise Detection And Response, Q2 2022
21. 20 octobre 2023 | Confidentiel
In cybersecurity and Formula 1, every millisecond counts.
Technology makes all the difference in who has the
advantage.
Bitdefender researchers, security analysts, and engineers
are on the cutting edge of cybersecurity, developing threat
and behavioral analytics from its network of millions of
monitored and protected endpoints to prevent, detect and
respond to threats faster.
A partnership born from a passion for high
performance and technological innovation.
« Bitdefender shares with Scuderia Ferrari a heritage of
excellence and a demonstrated track record of building
state of the art, innovative technologies to deliver
winning results. »
Florin Talpes
Co-founder and CEO, Bitdefender
22. W W W . B I T D E F E N D E R . C O M
GRAVITYZONE SITE
REFERENCES
33. W W W . B I T D E F E N D E R . C O M
GRAVITYZONE PLATFORM
34. OCTOBER 20, 2023
DETECTION & RESPONSE
PREVENTION
RISK
ANALYTICS &
HARDENING
SERVICES
THE FIRST UNIFIED SECURITY AND RISK
ANALYTICS PLATFORM
BITDEFENDER
GRAVITYZONE®
Unified Prevention, Detection, Response and
Hardening Across Endpoint, Network, Cloud and
Human
35.
36. FASTER TIME-TO-PROTECTION WITH FLEXIBLE CONSOLE-DELIVERY
OPTIONS
BITDEFENDER-HOSTED CLOUD CONTROL CENTER
ON-PREMISES GRAVITY ZONE CONTROL CENTER
• Hardened Linux virtual appliance
• Spins up in <15 minutes
• Web-scale high-availability architecture
• Automatic system upgrades
• No OS or database licenses needed
• Zero deployment time
• No server resources needed
• No administration
• No additional costs
39. Bitdefender
Relay Role
Server Zone
Client Zone
Proxy Server
GravityZone Cloud Console
GRAVITYZONE CLOUD – Offline Internet
Relay Module:
• Communication Server
• Update Signature
• Installation Software
• Logs transfer
• Receive command
47. OCTOBER 20, 2023
DETECTION
&
RESPONSE
PREVENTION
RISK
ANALYTICS
&
HARDENING
SERVICES
INTEGRATED
TECHNOLOGIES
& SERVICES
FOR THE BEST
BREACH
AVOIDANCE
Bitdefender GravityZone is a
next-generation security platform that lets you
protect all the endpoints in the enterprise,
including client devices and both virtual and
physical datacenter infrastructure.
INCIDENT
VISUALIZATION
ROOT CAUSE
ANALYSIS
ANOMALY DEFENSE
PROCESS
INSPECTOR
MITRE EVENT
TAGGING
SANDBOX
INVESTIGATION
GLOBAL
THREAT
INTELLIGENCE
MANAGED
DETECTION &
RESPONSE
(MDR)
PROFESSIONAL
SERVICES
THREAT
INTELLIGENCE
SERVICE
PREMIUM SUPPORT
THREAT HUNTING PROACTIVE
REMEDIATION
LOCAL & CLOUD
MACHINE
LEARNING
AUTOMATIC
SANDBOX
ANALYZER
HYPERDETECT™
(TUNABLE MACHINE
LEARNING)
EXPLOIT DEFENSE
FILELESS ATTACK
DEFENSE
NETWORK
ATTACK DEFENSE
PATCH
MANAGEMENT
ENDPOINT RISK
ANALYTICS
FULL DISK
ENCRYPTION
WEB THREAT
PROTECTION
DEVICE
CONTROL
FIREWALL
HUMAN RISK
ANALYTICS
EXTENDED
DETECTION AND
RESPONSE
PROCESS
INSPECTOR
APPLICATION
CONTROL
RANSOMWARE
MITIGATION
53. Components Business Security Business Security
Premium
Business Security
Enterprise
A-la-Cart
Console-Delivery Options On-Premises / Cloud On-Premises / Cloud On-Premises / Cloud On-Premises
Endpoint Security Yes Endpoint Security HD Endpoint Security xEDR Yes
Mobile Security On-Premises On-Premises Yes
Security for Virtualized Environments Yes Yes Yes
Server/ WorkStation /Per-CPU
Licensing
Security for Exchange Yes Yes Yes
Hypervisor Introspection (HVI) Per-CPU Licensing (On-Prem) Per-CPU Licensing (On-Prem) Per-CPU Licensing
Coverage
Machine Learning Yes Yes Yes Yes
Advanced Anti-Exploit Yes Yes Yes Yes
Sandbox Analyzer Yes Yes HD Add-on
HyperDetect (Tunable ML) Yes Yes HD Add-on
Process Inspector (ATC) Yes Yes Yes Yes
Network Attack Defense Yes Yes Yes Yes
Fileless Attack Defense Yes Yes Yes
Central Scanning (Offloaded to an SVA) Yes Yes Yes
Visibility into Suspicious Activities Yes Yes Report Builder
Application Control Blacklisting Blacklisting
Whitelisting (On-Prem)
Blacklisting Blacklisting
Whitelisting
EDR Root Cause Analysis Yes (Full xEDR) Yes (EDR)
ERA (Endpoint Risk Analytics) Yes Yes Yes
Add-On
Full-Disk Encryption Yes Yes Yes Yes
Patch Management Yes Yes Yes Yes
Email Security Yes Yes Yes
Security for Storage Yes Yes Yes
Licensing
License Type and Term Bundle. Yearly License Bundle, Yearly License Bundle, Yearly License
Restrictions Up to 30% of Devices
Can Be Servers
Up to 35% of Devices
Can Be Servers
Up to 35% of Devices
Can Be Servers
54.
55. October 20, 2023
55
source: skyboxsecurity.com
VULNERABILITY AND THREAT TRENDS
• Almost all malware types have seen an
increase over the first six months of 2020
• Cryptocurrency miners and worms being the
only malware that have had fewer
occurrences when compared to 2019
• Ransomware is increasing in usage
because it is also increasing in sophistication
- Human-operated ransomware attacks
• Exploits taking advantage of Remote Desktop
Protocol (RDP).
New post-exploitation malware
56. OCTOBER 20, 2023
Endpoint Risk
Management and
Analytics
Key Features:
View your overall Company Risk Score and
understand how various misconfigurations
and application vulnerabilities contribute to
it
Assess prioritized misconfigurations and
application vulnerabilities across your
organization’s endpoint estate
Get a risk snapshot for servers and end-user
devices, and review the most-exposed
endpoints
Fully native to all GravityZone Cloud
products
Powered by Bitdefender Labs global threat
research
Actively reduce your organization’s attack surface by continuously assessing,
prioritizing, and addressing endpoint risk coming from misconfigurations and
application vulnerabilities.
57. OCTOBER 20, 2023
Misconfigurations
Endpoint Risk
Management and
Analytics
59. OCTOBER 20, 2023
Endpoint Risk
Management and
Analytics
• Quickly identify and patch
vulnerabilities that pose a great
threat to a company
• Find details about CVEs on
cvedetails.com
• Remediate with integrated
Patch Management
Vulnerabilities
60. OCTOBER 20, 2023
Endpoint Risk
Management and
Analytics
• Get full focus on users that
have the highest risk within an
organization
Human Risk
61. Helps improve security posture by expediently
discovering and eliminating vulnerabilities
Provides the widest range of security- and
non-security patches for operating systems,
third-party applications and golden images
Covers Windows-based physical, virtual on-
prem and cloud-based endpoints and servers
Is deployed and managed from the
GravityZone console and integrated into its
agent
INTEGRATED PATCH MANAGEMENT (ADD-ON)
62. Helps improve security posture by
expediently discovering and eliminating
vulnerabilities
Provides the widest range of security-
and non-security patches for operating
systems, third-party applications and
golden images
Covers Windows-based physical, virtual
on-prem and cloud-based endpoints
and servers
Is deployed and managed from the
GravityZone console and integrated
into its agent
INTEGRATED PATCH MANAGEMENT (ADD-ON)
64. GRAVITYZONE™
THE SECURITY PLATFORM FOR
END-TO-END BREACH AVOIDANCE
OCTOBER 20, 2023
Endpoint Hardening and Control Technologies
Application Control – On premises only
• Supports both “Default Deny” and
“Blacklisting”
• Audit or Enforcement mode
• Trusted Updater
Web Threat Protection
• Scans incoming traffic and emails
• Blocks URLs based on behavior and machine
learning
• Web category filter
Firewall
Fully featured two-way personal firewall with
host-based intrusion detection and prevention
controls
Device Control
Allows administrators to manage permissions
for external devices such as USB Flash drives,
Bluetooth devices and others
Full-Disk Encryption (add-on)
Windows BitLocker and Mac OS FileVault native
encryption with centralized deployment,
management and key recovery from
GravityZone
Patch Management (add-on)
Provides widest range of security and non-
security patches for Windows operating
systems and third party applications
65. Network Level
On-Access Level
On-Execution
Attacker
Endpoint
Run Malware
FIREWALL
WEB THREAT
PROTECTION
DEVICE
CONTROL
NETWORK ATTACK
DEFENSE
LOCAL & CLOUD
MACHINE LEARNING
EXPLOIT
DEFENSE
PROCESS INSPECTOR
LOCAL & CLOUD
MACHINE LEARNING
Pre-Hardenened
ANTIMALWARE
(Signature-Based)
FULL DISK
ENCRYPTION
PATCH
MANAGEMENT
ENDPOINT RISK
ANALYTICS
EMAIL SECURITY
DEVICE
CONTROL
OVERVIEW OF THE
BEST’s PROTECTION
LAYERS – Securely
Everywhere
Dashboard and Report
Report
66. October 20, 2023
66
ADVANCED ATTACKS REQUIRE DETECTION AND
RESPONSE
Known Threats
Evasive Malware
Zero-day attacks
Fileless attacks
Targeted attacks, Low and slow, Insider Threats
99% of the
attacks can
be prevented
with the
right tools
< 1% require
analysis over
time across
layers with ML
HARDER
TO
EXECUTE
SOPHISTICATION
DAMAGING
67. GRAVITYZONE™
THE SECURITY PLATFORM FOR
END-TO-END BREACH AVOIDANCE
OCTOBER 20, 2023
GravityZone Prevention Technologies
Dynamic Machine Learning – Pre/On/Post-Execution
Predict and block advanced attacks, learning and adapting
since 2008 with one of the world’s largest Global
Protective Networks to deliver top efficacy with low false
positives
Network Attack Defense
• ID and categorize network behaviors
• Several ML algorithms are used against specific
attack vectors, like protocol and device specific
anomaly detection
HyperDetect – Pre-Execution
Tunable machine learning and behavior-analysis
models trained to detect advanced, sophisticated
threats at pre-execution
Sandbox Analyzer – Pre/Post-Execution
Automatic submission of suspicious files from
endpoints to a cloud-based sandbox for detonation
and behavioral analysis
Exploit Defense
Anti-Exploit protection designed to tackle evasive
exploits, to help reduce the ATP attack surface and
minimize the risk of being targeted.
Process Inspector – On/Post-Execution
A behavior anomaly detection technology that
provides protection against never-before-seen
threats in on-execution stage
Fileless Attack Defense – Pre-Execution
Detects and blocks fileless malware - terminate
PowerShell running malicious command line,
blocking malicious traffic, block code injection
process into memory buffer
68. Network Level
On-Access Level
Pre-Execution
On-Execution
Attacker
Endpoint
Run Malware
FIREWALL
WEB THREAT
PROTECTION
DEVICE
CONTROL
NETWORK ATTACK
DEFENSE
HYPERDETECT™
(TUNABLE MACHINE
LEARNING)
LOCAL & CLOUD
MACHINE LEARNING
FILELESS ATTACK
DEFENSE
AUTOMATIC SANDBOX
ANALYZER
EXPLOIT
DEFENSE
PROCESS INSPECTOR
INCIDENT
VISUALIZATION
ROOT CAUSE
ANALYSIS
MITRE EVENT
TAGGING
SANDBOX
INVESTIGATION
LOCAL & CLOUD
MACHINE LEARNING
Pre-Hardenened
ANTIMALWARE
(Signature-Based)
LOCAL & CLOUD
MACHINE LEARNING
FULL DISK
ENCRYPTION
PATCH
MANAGEMENT
ENDPOINT RISK
ANALYTICS
EMAIL SECURITY
DEVICE
CONTROL
Visibility &
Response
OVERVIEW OF THE
BEST’s PROTECTION
LAYERS – Securely
Everywhere
69.
70. OCTOBER 20, 2023
Ransomware Mitigation
Ransomware mitigation helps
organizations recover files after a
blocked ransomware attack – without
any downtime.
Gain peace of mind with fast recovery
of encrypted files affected by
ransomware
• Tamper-proof, secure backup
copies to ensure data is protected
• Stop attacks coming from
endpoints not protected by
Bitdefender
• Add more value with affordable,
advanced security features – no
upcharges for Ransomware
Mitigation
74. HYPERDETECT – TUNABLE MACHINE LEARNING
Protects from:
• Ransomware
• Exploits
• Fileless attacks
• Script-based attacks
Provides maximum
detection accuracy
without false positives
Delivers full visibility
into suspicious
activities
Set the detection-aggressiveness level…
…to counter relevant threats
Gain full visibility and enable automatic action
75. SANDBOX ANALYZER
Uses machine learning and behavioral
analysis to assess suspicious files
Runs in blocking or monitoring mode
Provides a verdict in near-real-time
and takes policy-based remediation
action
Delivers in-depth reporting on malware
behavior
Protects against:
• Advanced targeted
attacks
• Custom malware
• Unknown packers
76.
77.
78. SANDBOX ANALYZER
Streamlines investigation,
enabling live tracking of
attacks and lateral
movement
Facilitates rapid
resolution, containment
and remediation
Provides real-time
endpoint visibility and
insight into suspicious
activities
Simplifies alert triage
and incident-analysis
visualization
79. SANDBOX ANALYZER
Streamlines investigation,
enabling live tracking of
attacks and lateral
movement
Facilitates rapid
resolution, containment
and remediation
Provides real-time
endpoint visibility and
insight into suspicious
activities
Simplifies alert triage
and incident-analysis
visualization
80. SANDBOX ANALYZER
Streamlines investigation,
enabling live tracking of
attacks and lateral
movement
Facilitates rapid
resolution, containment
and remediation
Provides real-time
endpoint visibility and
insight into suspicious
activities
Simplifies alert triage
and incident-analysis
visualization
81. SANDBOX ANALYZER
Streamlines investigation,
enabling live tracking of
attacks and lateral
movement
Facilitates rapid
resolution, containment
and remediation
Provides real-time
endpoint visibility and
insight into suspicious
activities
Simplifies alert triage
and incident-analysis
visualization
82. SANDBOX ANALYZER
Streamlines investigation,
enabling live tracking of
attacks and lateral
movement
Facilitates rapid
resolution, containment
and remediation
Provides real-time
endpoint visibility and
insight into suspicious
activities
Simplifies alert triage
and incident-analysis
visualization
85. W W W . B I T D E F E N D E R . C O M
ENDPOINT DETECTION AND
RESPONSE (EDR)
86. October 20, 2023
86
INTEGRATED ENDPOINT DETECTION AND RESPONSE
(EDR)
Minimizes infection
exposure and stops
breaches
Enables one-click
automated detection,
easy investigation and
in-place remediation
Reduces requirements
for resources and skills
to perform early
detection and incident
response
87. INTEGRATED EPP AND EDR SOLUTION
Streamlines investigation,
enabling live tracking of
attacks and lateral
movement
Facilitates rapid
resolution, containment
and remediation
Provides real-time
endpoint visibility and
insight into suspicious
activities
Simplifies alert triage
and incident-analysis
visualization
88. Detection and Response
MITRE attack techniques and indicators of compromise provide up to the minute insights
into named threats and other malware that may be involved.
Pre and Post Compromise
attack forensics – Root
Cause Analysis
Easy to understand visual guides highlight critical attack paths, easing burdens on IT
staff.
The end-to-end attack forensics provides visibility into past actions covering the
entire lifecycle of an attack (before, during and after). It covers both blocked attacks
and suspicious activities (EDR specific detections)
89. ADVANCED ATTACK DETECTION
AND RESPONSE
• Uncoversuspicious activity
• Machine-learning, cloud scanning
and sandbox
• MITRE ATT&CK and IoC search
• Response actions
› Killor Block Process
› Isolate Host
› Start Sandbox Analysis
› Block Hash
› Remote Connection
90. INTEGRATED EPP AND EDR SOLUTION
Streamlines investigation,
enabling live tracking of
attacks and lateral
movement
Facilitates rapid
resolution, containment
and remediation
Provides real-time
endpoint visibility and
insight into suspicious
activities
Simplifies alert triage
and incident-analysis
visualization
91. INTEGRATED EPP AND EDR SOLUTION
Streamlines investigation,
enabling live tracking of
attacks and lateral
movement
Facilitates rapid
resolution, containment
and remediation
Provides real-time
endpoint visibility and
insight into suspicious
activities
Simplifies alert triage
and incident-analysis
visualization
96. W W W . B I T D E F E N D E R . C O M
ENDPOINT NETWORK CLOUD HUMAN
BITDEFENDER EXTENDED EDR (XEDR)
GET READY FOR THE NEW STAGE OF EDR EVOLUTION
October 20, 2023
96
97. OCTOBER 20, 2023
Options to address the problems
Technical
Challenge
eXtended Detection
and Response (XDR)
Human
Resource
Challenge
Managed Detection and
Response (MDR)
Technical
Solution
Outsource eXtended EDR (XEDR)
98. OCTOBER 20, 2023
98
• Cyber-criminals increasingly difficult to detect
• Techniques individually look like routine behavior
• EDR solutions can be complex and qualified staff difficult to find
• Solutions need to be lightweight, flexible and easy-to-deploy
ADVANCED THREAT CHALLENGES
RECONNAISSANCE WEAPONISATION DELIVERY EXPLOITATION INSTALLATION COMMAND
AND CONTROL
ACTION ON
OBJECTIVES
Prevention Detection and Response
99.
100. OCTOBER 20, 2023
10
WHAT ARE THE BENEFITS OF BITDEFENDER
EDR?
Either stand-alone or part of a full-stack security package, Bitdefender Endpoint Detection and Response (EDR) quickly and effectively strengthens your security
operations.
REDUCING
OPERATIONAL BURDEN
DETERMINING
ORGANIZATIONAL RISK
BRIDGING THE CYBER SECURITY
SKILLS GAP
ADVANCED ATTACK
DETECTION AND RESPONSE
101. OCTOBER 20, 2023
MORE THAN EDR: eXtended EDR* (XEDR)
The cross-endpoint event correlation technology, the eXtended EDR (XEDR), takes threat detection and visibility to a new level by combining the granularity and rich
security context of EDR with the cross-endpoint event correlation of XDR (eXtended Detection and Response).
ORGANIZATION-LEVEL INCIDENT
VISIBILITY
(EXTENDED VISIBILITY)
CROSS-ENDPOINT EVENT
CORRELATION
(EXTENDED DETECTIONS)
*XEDR is available only for cloud-deployed solutions. Standard EDR is available for on-premises deployments.
107. October 20, 2023 107
BRIDGING THE
CYBER SECURITY
SKILLS GAP
• Respond, limit spread, stop attacks
• Threat visualizations
• Understand complex detections
• Identify root cause
• Prioritized alerts
• Respond with one click
108.
109. W W W . B I T D E F E N D E R . C O M
SECURITY FOR VIRTUALIZED
ENVIRONMENTS
110. Public cloud IaaS
(AWS, Azure)
Any hypervisor
VM 1 VM 2 VM 3
VM 1 VM 2 VM 3
SVA
Physical endpoints
Control
Center
Bitdefender
Global Protective
Network
On-premises infrastructure
OCTOBER 20, 2023
MAXIMIZES VISIBILITY AND MANAGEABILITY
111. Featherweight agent
Offloaded scanning, threat database
Any hypervisor
VMware ESXi, Citrix Xen, Microsoft Hyper-V,
Red Hat KVM, Oracle VM
SVA not required on each host
SVA redundancy
Security Server
GravityZone
Control Center
VM VM VM VM
BEST with Central Scan
OCTOBER 20, 2023
HOW DOES SVE WORK?
112. Two-level caching on both the virtual machine (VM) and the
security virtual appliance (SVA) enables high antimalware
efficiency
The SVA inspects each file only once even if it appears on
multiple VMs
This helps avoid redundant scanning, significantly reducing
CPU, RAM, IO, and network load
Security Virtual Appliance
VM1
Local Cache
Central Cache
VM2
Local Cache
TCP/IP
Update
Local
Cache
Update Central
Cache
SVE CACHING ARCHITECTURE
OCTOBER 20, 2023
113. OCTOBER 20, 2023
One or more GravityZone Security Virtual Appliances (SVA) perform the role
of ICAP server(s) providing antimalware-analysis services to Network-
Attached Storage (NAS) and file-sharing solutions compliant with the
Internet Content Adaptation Protocol
The GravityZone Control
Center acts as a central
management console for
Security for Storage
GRAVITYZONE
SECURITY
FOR
STORAGE
115. GRAVITYZONE
THE ENTERPRISE SECURITY PLATFORM
FOR THE BEST BREACH AVOIDANCE
BITDEFENDER
GRAVITYZONE®
Unified Prevention, Detection, Response and
Hardening Across Endpoint, Network and Cloud
LAPTOPS AND
WORKSTATIONS
MOBILE
DEVICES
VIRTUAL
DESKTOPS
VDI / DAAS
SERVERS
EMAIL
Hosted or On-prem
STORAGE
ICAP Compatible
PUBLIC, PRIVATE &
HYBRID CLOUD
SOFTWARE-DEFINED &
HYPERCONVERGED
INFRASTRUCTURE
116. Bitdefender
Global Protective
Network
GRAVITYZONE ARCHITECTURE AND PRODUCTS
SVA
Any hypervisor
VM 1 VM 2 VM 3
On-premises infrastructure
GZ Security for Endpoints GZ Security for Virtualized Environments (SVE)
ENTERPRISE HQ AND
DATACENTER
Firewall
GZ Security for Virtualized Environments; Security for AWS
SVA*
VM 1 VM 2 VM 3
Public-cloud infrastructure (AWS, Azure)
PUBLIC-CLOUD ESTATE
Firewall
Threat dbase update
False positive checks
Malware algorithm- and threat-feed updates
Policy updates Reporting System software updates
GravityZone
Control Center
GZ Security for Endpoints
Firewall
REMOTE / HOME OFFICE
Relay
117. Components Business Security Business Security
Premium
Business Security
Enterprise
A-la-Cart
Console-Delivery Options On-Premises / Cloud On-Premises / Cloud On-Premises / Cloud On-Premises
Endpoint Security Yes Endpoint Security HD Endpoint Security xEDR Yes
Mobile Security On-Premises On-Premises Yes
Security for Virtualized Environments Yes Yes Yes
Server/ WorkStation /Per-CPU
Licensing
Security for Exchange Yes Yes Yes
Hypervisor Introspection (HVI) Per-CPU Licensing (On-Prem) Per-CPU Licensing (On-Prem) Per-CPU Licensing
Coverage
Machine Learning Yes Yes Yes Yes
Advanced Anti-Exploit Yes Yes Yes Yes
Sandbox Analyzer Yes Yes HD Add-on
HyperDetect (Tunable ML) Yes Yes HD Add-on
Process Inspector (ATC) Yes Yes Yes Yes
Network Attack Defense Yes Yes Yes Yes
Fileless Attack Defense Yes Yes Yes
Central Scanning (Offloaded to an SVA) Yes Yes Yes
Visibility into Suspicious Activities Yes Yes Report Builder
Application Control Blacklisting Blacklisting
Whitelisting (On-Prem)
Blacklisting Blacklisting
Whitelisting
EDR Root Cause Analysis Yes (Full xEDR) Yes (EDR)
ERA (Endpoint Risk Analytics) Yes Yes Yes
Add-On
Full-Disk Encryption Yes Yes Yes Yes
Patch Management Yes Yes Yes Yes
Email Security Yes Yes Yes
Security for Storage Yes Yes Yes
Licensing
License Type and Term Bundle. Yearly License Bundle, Yearly License Bundle, Yearly License
Restrictions Up to 30% of Devices
Can Be Servers
Up to 35% of Devices
Can Be Servers
Up to 35% of Devices
Can Be Servers
120. 120
GravityZone – the next level
of agile cybersecurity
• Centralized management - security policies, configurations, and
updates across multiple endpoints and locations
• Real-time threat detection and response - advanced machine
learning and behavior analysis techniques to detect and
respond to threats in real-time
• Cloud-based or on-premise security that can be deployed
quickly and easily, and is scalable to meet the changing needs
of an organization
• Advanced endpoint and network protection features such as
anti-malware, anti-phishing, and anti-ransomware, as well as
device control and web filtering, sandbox, hyper detect, EDR,
XDR and more
• Integrated risk management includes vulnerability assessment,
compliance management, and security audits
121. 121
Bitdefender
support for
partners
• Free certification training for
partners (sales and technical)
• Second level support from our local
distributors and help desk technical
support from our office in Bangkok
• GOV/EDU/NGO and business
discounts on request
• Account protection for registered
and verified projects
• Free pre-sales support including
trials and POC deployment
• Free online user training
• MDF, discounts for partners at the
gold level or higher