G data 10 nov 2010
-
Upload
agora-group -
Category
Documents
-
view
191 -
download
1
description
Transcript of G data 10 nov 2010
G Data Presentation
Bucharest 2010
Welcome.
Costin PecinginaG Data Representative
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
• Founded 1985 in Germany
• 300 employees world wide
• Offices in 13 countries: Germany (HQ), USA, Canada, Japan, China, UK, France, Italy, Spain, BeNeLux, Poland and Russia
• Sales Partners in more than 90 countries
• G Data solutions globally available
G Data Overview
The IT-Security Pioneer
1987 First AntiVirus world wide
1990 First AV with graphical user interface
1995 First AV Hardware Protection
1999 First Linux based BootScan
2005 First AV with Cloud Security
2007 First Silent Firewall
2008 First Fingerprinting for top performance
Member of the ITSMIG association
Under the patronage of
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
• DoubleScan: 2 independent Scanning Enginesfor unique 99+ Warantee
• Fastest reaction time on new threats
• Fingerprinting prevents from unnecessaryscans to save performance
• Whitelisting of known files prevents from False Positives
Reactive Protection
Jan
08
Fe
b 0
8M
ar
08
Ap
r 0
8M
ay 0
8Ju
n 0
8Ju
n 0
8Ju
l 0
8A
ug
08
Se
p 0
8O
ct 0
8N
ov 0
8D
ec
08
Jan
09
Fe
b 0
9M
ar
09
Ap
r 0
9M
ay 0
9Ju
n 0
9Ju
l 0
9A
ug
09
Se
p 0
9O
ct 0
9N
ov 0
9D
ec
09
Jan
10
Jan
10
Ma
r 1
0M
ar
10
Ap
r 1
0M
ay 1
0Ju
n 1
0Ju
l 1
0A
ug
10
90%
92%
94%
96%
98%
100%
G Data
Kaspersky
Symantec
Mc Afee
Trend Micro
Reactive detection(Source: AV-Test)
G DataKaspersky
SymantecMc Afee
Trend Micro
0
100
200
300
400
500
600
Average reaction time on new threats(Source: Computer BILD)
7h 11min
9h 19min
55min19min
3h 20min
• Proactive Protection with Behaviour Blockingand several heuristics methods
• OutbreakShield: Mail based cloud security detects mass mailings such as virus outbreaks or spam attacks using statistical methodology
• Web based Cloud Security: server based URLblack lists for real time protection
Real Time Protection
Mc AfeeSymantec
KasperskyF-Secure
MS Forefront
AVG Trustport
Sophos
Redstone
Avira
G Data
80,00%
85,00%
90,00%
95,00%
100,00%
40,00% 50,00% 60,00% 70,00% 80,00% 90,00% 100,00%
Reactive Detection vs. Proactive Detection(Source: Virus Bulletin)
Reac
tive
Det
ectio
n Ra
te
Proactive Detection Rate
Certifications achieved
Awards
Certifications and Awards
G Data is the world‘s leading test winner
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
G Data Desktop Solutions
AntiMalware / AntiSpyware
Firewall / AntiSpam
Parental Control
Backup / Tuning
G Data Desktop Solutions
Available now
GfK TrendSetter - Germany
Computer-Software
Period : 11. - 17. October 2010 (Week 41)
GfK-TOP 10
NON-GAMES
Rank
Previous Current
Week Week Title Brand
1 1 OFFICE HOME AND STUDENT 2010 MICROSOFT
4 2 INTERNET SECURITY 2011 3 USER 25th ANNIVERSARY VERSION G DATA
3 3 INTERNET SECURITY 2011 KASPERSKY LAB
6 4 WINDOWS 7 HOME PREMIUM 64-BIT SB-VERSION MICROSOFT
5 5 INTERNET SECURITY 2011 UPDATE KASPERSKY LAB
8 6 INTERNET SECURITY 2011 3 USER UPDATE KASPERSKY LAB
10 7 WINDOWS 7 HOME PREMIUM 32-BIT SB-VERSION MICROSOFT
7 8 NORTON INTERNET SECURITY 2011 3 USER SYMANTEC
9 9 NORTON INTERNET SECURITY 2011 SYMANTEC
2 10 ANTI-VIRUS 2011 3 USER LIMITED EDITION KASPERSKY LAB
G Data Business Solutions
Management Server
AntiVirus Client
Firewall and AntiSpam Client
Mail Security
Remote control: installation, virus scans, updates, settingsFully automated virus scans and updates (pull-push)Fully invisible malware protection – no client interactionFor Windows and Linux2 way Firewall: Invisible protection against hacker attacksAntiSpam: Content independent real time protectionMail server independent mail gatewayProtection against malware, spam and phishing
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
IT Security strikes out in a new direction.
Web 2.0 platforms (blogs, forum entries)
Social networks (Facebook, MySpace, Twitter)
Manipulated hot topic search results
Links in instant messengers and chats
Phishing through online auctions
File sharing and file hosting
Modern Sources of attack
Web 2.0 platforms (blogs, forum entries)
Social networks (Facebook, MySpace, Twitter)
Manipulated hot topic search results
Links in instant messengers and chats
Phishing through online auctions
File sharing and file hosting
Modern Souces of attack
No problem for companies…??
2/3 of all Internet use in the workplace is for private reasons.(Source: Berlin Audit Court)
Financial harm
Loss of manpowerEconomic damage in Germany:Over 50 billion euros(Source: Berlin Audit Court)
Security risks
Infiltration of new malware
IT infrastructure damage due to unauthorised software
Loss / theft of sensitive data
Legal risks (German Law)
Joint responsibility for copyright infringements (pirate copies, MP3…)
If trade secrets are published
If personal data is made accessible to the public
ESSENTIAL: the policy
Written definition of the content and extent of private Internet use
Use of software to ensure adherence to the policy
AntiVirus / Firewall / AntiSpam
PolicyManager:
Device controlApplication controlContent FilterInternet use control
G Data EndpointProtection
USB mass storage devices / hard disks
CD- / DVD- / floppy drives
Can be certified by administrator
Device control
Whitelist or blacklist
Many applications predefined (file sharing, games, Messenger, etc.)
Application control
80 different categories, e.g.:Chats / forums / blogsOnline auctions / job search sitesGambling / gaming…
Content Filter
Definable Internet lock out times
Usage times can be limited per day, week and month
Internet use control
Market survey
Device control
Application control
Web / URL filter
Internet use control
Symantec Endpoint Protection
Sophos Endpoint
Security & Control
Kaspersky Antivirus
6.0
McAfee Protection
for Endpoint
Trend Micro Worry Free Business Security
G Data Endpoint Protection
Only Whitelist
Only Whitelist
Only Blacklist
Best protection against malware, hackers and spam
Legal security for usage of corporate PCs
Significant improve of productivity
Easy administration thanks to unique all-in-one solution
G Data EndpointProtection advantages
Thank you.