180 likes | 302 Views
The Global Leader. IN REACTION TIME. to Internet Threats. About Kaspersky Lab. International leader in internet security More than 200 million protected users worldwide 5 R&D and virus labs worldwide 650 employees, 1 50 developers & engineers Direct operations in 11 countries
E N D
The Global Leader IN REACTION TIME to Internet Threats
About Kaspersky Lab • International leader in internet security • More than 200 million protected users worldwide • 5 R&D and virus labs worldwide • 650employees, 150developers & engineers • Direct operations in 11 countries • North American headquarters in Massachusetts
Kaspersky Technology Inside More than 100 OEM Partners
Internet Crime IS ON THE RISE
Data From the Lab Source: The Kaspersky Internet Security Lab
Standard Automated Hourly Updates! Source: Vendor Data
Size Does Matter Source: Av-Test.org
#1 in Virus Outbreak Response Source: Av-Test.org
#1 In Detection Rates* Kaspersky Lab is the leader in detecting viruses, spyware, and other malicious programs * www.av-comparatives.org
Advanced Virus Scanning • Scanning optimization and acceleration: iSwift™ and iChecker™ • Automated load balancing • Compound objects scanning • SafeStream™ scanning of HTTP traffic • Automated system restoration • Advanced disinfection • Self defense technology
Advanced Antivirus Updating • Synchronized antivirus database • Automatic updating mode • Automatic load balancing and update speed optimization • Update rollback technology
Proactive Protection • Anti-Rootkit detection • Behavior blocking • Roll back • Heuristic analysis • Integrity verification • Virus epidemic prevention
Spyware Protection • System restoration technology removes traces of spyware from the registry and file system • Anti-phishing technology protects against scam emails • Anti-banner technology blocks unsolicited advertising • Anti-popup technology protects against pop-ups that exploit browser vulnerabilities • JavaScript and VBScript blocking loaded from internet pages • Anti-dialer technology blocks unauthorized modem connections
Hacker Protection • Firewall technology filters all incoming and outgoing traffic at the packet and application levels • Intrusion detection system (IDS) monitors network traffic for common network attacks • Stealth Mode technology protects computers against any detection from outside the network
Spam Protection • Email dispatcher • Address and phrase black and white lists • Self-modifying spam detection • Graphics object imaging analysis • Message header analysis
The Global Leader IN REACTION TIME to Internet Threats