1 / 18

to Internet Threats

The Global Leader. IN REACTION TIME. to Internet Threats. About Kaspersky Lab. International leader in internet security More than 200 million protected users worldwide 5 R&D and virus labs worldwide 650 employees, 1 50 developers & engineers Direct operations in 11 countries

hallie
Download Presentation

to Internet Threats

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Global Leader IN REACTION TIME to Internet Threats

  2. About Kaspersky Lab • International leader in internet security • More than 200 million protected users worldwide • 5 R&D and virus labs worldwide • 650employees, 150developers & engineers • Direct operations in 11 countries • North American headquarters in Massachusetts

  3. Kaspersky Technology Inside More than 100 OEM Partners

  4. Internet Crime IS ON THE RISE

  5. Data From the Lab Source: The Kaspersky Internet Security Lab

  6. Standard Automated Hourly Updates! Source: Vendor Data

  7. Size Does Matter Source: Av-Test.org

  8. #1 in Virus Outbreak Response Source: Av-Test.org

  9. #1 In Detection Rates* Kaspersky Lab is the leader in detecting viruses, spyware, and other malicious programs * www.av-comparatives.org

  10. Rated #1 in Spyware Detection

  11. Introducing Version 6.0

  12. Advanced Virus Scanning • Scanning optimization and acceleration: iSwift™ and iChecker™ • Automated load balancing • Compound objects scanning • SafeStream™ scanning of HTTP traffic • Automated system restoration • Advanced disinfection • Self defense technology

  13. Advanced Antivirus Updating • Synchronized antivirus database • Automatic updating mode • Automatic load balancing and update speed optimization • Update rollback technology

  14. Proactive Protection • Anti-Rootkit detection • Behavior blocking • Roll back • Heuristic analysis • Integrity verification • Virus epidemic prevention

  15. Spyware Protection • System restoration technology removes traces of spyware from the registry and file system • Anti-phishing technology protects against scam emails • Anti-banner technology blocks unsolicited advertising • Anti-popup technology protects against pop-ups that exploit browser vulnerabilities • JavaScript and VBScript blocking loaded from internet pages • Anti-dialer technology blocks unauthorized modem connections

  16. Hacker Protection • Firewall technology filters all incoming and outgoing traffic at the packet and application levels • Intrusion detection system (IDS) monitors network traffic for common network attacks • Stealth Mode technology protects computers against any detection from outside the network

  17. Spam Protection • Email dispatcher • Address and phrase black and white lists • Self-modifying spam detection • Graphics object imaging analysis • Message header analysis

  18. The Global Leader IN REACTION TIME to Internet Threats

More Related