SlideShare uma empresa Scribd logo
1 de 34
Norton 2008 Product Overview Rowan Trollope Senior Vice President, Consumer Products
Norton 2008 Product Focus Areas
Shattering Norton’s Negative Performance Perception
Performance Improvements Boot Time Memory UI Launch Download Scan Time IE Launch Install Time 1-2 Minutes (MSI Install) 10 Seconds (Impact) Current 29-30 MB < 2 Seconds 3:15 (mm:ss) 9 Seconds (Impact) < 4 Seconds (Impact) 2.25 Minutes (MSI Install) 14-25 Seconds (Impact) 2007 10-15 MB 1.7 Seconds 2:15 (mm:ss) 7 Seconds (Impact) 1.8 Seconds (Impact) 3.2 Minutes < 10 Seconds (Impact) 08 Target 10 MB < 2 Seconds 1:55 (mm:ss) 3-7 Seconds (Impact) < 1.8 Seconds (Impact) Industry 16 Seconds (Impact) 43 MB 3 Seconds 2:35 (mm:ss) 60 Seconds 1.5 - 5 Seconds 1:30-4:00 Minutes
Norton 2008 Product Focus Areas
New Threats - The Botnet Crisis ,[object Object],[object Object],[object Object],* Source:  Symantec ISTR XI Botherders:  The Black Market Spam Phishing Messages Fraud Websites Adware & Spyware Fraudsters Spammers Distributors Keylogging / ID Theft Denial of Service
[object Object],[object Object],[object Object],Example of a Botnet Infection Symantec Confidential What the User Sees What’s Actually Happening CSmith ,[object Object],[object Object],[object Object],******** Threat is dropped on machine via invisible iFrame in page C S m i t h 1 0 0 2 1 9 5 9
Scale of the Botnet Crisis Symantec Confidential
Scale of the Botnet Crisis Symantec Confidential
Symantec Confidential Scale of the Botnet Crisis
Symantec Confidential Scale of the Botnet Crisis Six million hijacked consumer PCs
Norton AntiBot
Norton AntiBot Performance Fast Boot Low Memory Footprint Fast Install Low CPU Overhead 2 Second Overhead to System Boot 1 – 2  Minutes 10 MB Less than 2%  Compatible with all major endpoint security products
New Threats – Drive-by Downloads ,[object Object],[object Object],[object Object],[object Object],[object Object]
Browser Exploits are Everywhere February 2, 2007 Super Bowl Weekend Dolphin Stadium  web site hacked A program that records  keystrokes was  automatically downloaded  to each visitor’s machine
New Browser Protection Codename “Canary” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Only Canary Has  Strong Browser Protection % of attacks blocked, out of  36 Internet Explorer vulnerabilities  (includes all known exploited vulnerabilities) Source:  Symantec internal lab testing 0 50 100 Canary Product A Product B Product C Product D Product E Product F Product G Product H 100% 17% 14% 14% 11% 8% 6% 3% 3%
Only Canary is Resilient to Obfuscation % of  obfuscated  attacks blocked, out of  36 Internet Explorer vulnerabilities  (includes all known exploited vulnerabilities) Source:  Symantec internal lab testing 0 50 100 Canary Product B Product A Product C Product D Product E Product F Product G Product H 100% 6%
Norton 2008 Product Focus Areas
Protection beyond the PC -  Security That Revolves Around You
Perfect Storm for Smartphone Security Need for Smartphone Security Now : Users and experts are increasingly realizing that smartphones need to be protected just like PCs $1B in mobile security and  AV in 2008  (Source: IDC) Increasing Smartphone Threats :  Mobile virus variants have almost doubled every 6 months from 2004-2006 PC:Mobile Viruses = 450:1 (Source: Symantec Security Response) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Fastest Growing Device Segment :  Smart phone growth = 31% (IDC) Other mobiles = 7% (IDC) Mobiles out ship PC’s 5:1 in 2006 By 2008, smartphones are expected to out ship laptops (Gartner) Vulnerabilities :  mWindows = PC Windows 6 years ago (WinNT) Smartphones are the next destination for hackers
Norton Smartphone Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Security Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Norton 2008 Product Focus Areas
Identity Theft is Consumers’ #1 Fear ,[object Object],[object Object],[object Object],[object Object],Sources: Gartner, Cyber Security Industry Alliance, FTC
Norton Identity Safe Provides a safe and convenient way to manage identities online ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],* Included in Norton Internet Security & Norton 360v2 New Product New Product
Product Portfolio Norton SmartPhone Security * Mobile Security Products Market Category Norton SystemWorks Norton Save & Restore Norton Ghost Norton Confidential Norton Confidential Online Edition * Norton AntiVirus Transaction Security  Security Backup & Recovery Norton Internet Security PC Tuneup Norton 360 PC Security Point Products Comprehensive Protection * Future Product Norton AntiBot *
Thank you
Norton Internet Security
Embedded and Enhanced Support ,[object Object],[object Object],[object Object],Note: Product Features not yet committed
Norton AntiVirus 2008 Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Norton Internet Security 2008 Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
Samsung knox and android for work
Samsung knox and android for workSamsung knox and android for work
Samsung knox and android for work
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Aca presentation arm_
Aca presentation arm_Aca presentation arm_
Aca presentation arm_
 
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsBlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaper
 

Semelhante a sym

Software Vendor (Norton Anti-Virus)
Software Vendor (Norton Anti-Virus)Software Vendor (Norton Anti-Virus)
Software Vendor (Norton Anti-Virus)
John Joseph San Juan
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
ssuser57b3e5
 
Norton Presentation - Homework
Norton Presentation - HomeworkNorton Presentation - Homework
Norton Presentation - Homework
Loïc Naga
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Nancy Nimmegeers
 

Semelhante a sym (20)

Effective
EffectiveEffective
Effective
 
Effective
EffectiveEffective
Effective
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Software Vendor (Norton Anti-Virus)
Software Vendor (Norton Anti-Virus)Software Vendor (Norton Anti-Virus)
Software Vendor (Norton Anti-Virus)
 
Materi cyber sec.pdf
Materi cyber sec.pdfMateri cyber sec.pdf
Materi cyber sec.pdf
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
COMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptxCOMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptx
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Norton Presentation - Homework
Norton Presentation - HomeworkNorton Presentation - Homework
Norton Presentation - Homework
 
Android security - an enterprise perspective
Android security -  an enterprise perspectiveAndroid security -  an enterprise perspective
Android security - an enterprise perspective
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

sym

  • 1. Norton 2008 Product Overview Rowan Trollope Senior Vice President, Consumer Products
  • 2. Norton 2008 Product Focus Areas
  • 3. Shattering Norton’s Negative Performance Perception
  • 4. Performance Improvements Boot Time Memory UI Launch Download Scan Time IE Launch Install Time 1-2 Minutes (MSI Install) 10 Seconds (Impact) Current 29-30 MB < 2 Seconds 3:15 (mm:ss) 9 Seconds (Impact) < 4 Seconds (Impact) 2.25 Minutes (MSI Install) 14-25 Seconds (Impact) 2007 10-15 MB 1.7 Seconds 2:15 (mm:ss) 7 Seconds (Impact) 1.8 Seconds (Impact) 3.2 Minutes < 10 Seconds (Impact) 08 Target 10 MB < 2 Seconds 1:55 (mm:ss) 3-7 Seconds (Impact) < 1.8 Seconds (Impact) Industry 16 Seconds (Impact) 43 MB 3 Seconds 2:35 (mm:ss) 60 Seconds 1.5 - 5 Seconds 1:30-4:00 Minutes
  • 5. Norton 2008 Product Focus Areas
  • 6.
  • 7.
  • 8. Scale of the Botnet Crisis Symantec Confidential
  • 9. Scale of the Botnet Crisis Symantec Confidential
  • 10. Symantec Confidential Scale of the Botnet Crisis
  • 11. Symantec Confidential Scale of the Botnet Crisis Six million hijacked consumer PCs
  • 13. Norton AntiBot Performance Fast Boot Low Memory Footprint Fast Install Low CPU Overhead 2 Second Overhead to System Boot 1 – 2 Minutes 10 MB Less than 2% Compatible with all major endpoint security products
  • 14.
  • 15. Browser Exploits are Everywhere February 2, 2007 Super Bowl Weekend Dolphin Stadium web site hacked A program that records keystrokes was automatically downloaded to each visitor’s machine
  • 16.
  • 17. Only Canary Has Strong Browser Protection % of attacks blocked, out of 36 Internet Explorer vulnerabilities (includes all known exploited vulnerabilities) Source: Symantec internal lab testing 0 50 100 Canary Product A Product B Product C Product D Product E Product F Product G Product H 100% 17% 14% 14% 11% 8% 6% 3% 3%
  • 18. Only Canary is Resilient to Obfuscation % of obfuscated attacks blocked, out of 36 Internet Explorer vulnerabilities (includes all known exploited vulnerabilities) Source: Symantec internal lab testing 0 50 100 Canary Product B Product A Product C Product D Product E Product F Product G Product H 100% 6%
  • 19. Norton 2008 Product Focus Areas
  • 20. Protection beyond the PC - Security That Revolves Around You
  • 21.
  • 22.
  • 23.
  • 24. Norton 2008 Product Focus Areas
  • 25.
  • 26.
  • 28.
  • 29. Product Portfolio Norton SmartPhone Security * Mobile Security Products Market Category Norton SystemWorks Norton Save & Restore Norton Ghost Norton Confidential Norton Confidential Online Edition * Norton AntiVirus Transaction Security Security Backup & Recovery Norton Internet Security PC Tuneup Norton 360 PC Security Point Products Comprehensive Protection * Future Product Norton AntiBot *
  • 32.
  • 33.
  • 34.