SlideShare uma empresa Scribd logo
1 de 38
G Data
Presentation
Bucharest 2010
Welcome.
Costin Pecingina
G Data Representative
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
• Founded 1985 in Germany
• 300 employees world wide
• Offices in 13 countries: Germany (HQ),
USA, Canada, Japan, China, UK,
France, Italy, Spain, BeNeLux, Poland and
Russia
• Sales Partners in more than 90 countries
• G Data solutions globally available
G Data Overview
The IT-Security Pioneer
1987 First AntiVirus world wide
1990 First AV with graphical user interface
1995 First AV Hardware Protection
1999 First Linux based BootScan
2005 First AV with Cloud Security
2007 First Silent Firewall
2008 First Fingerprinting for top performance
Member of the ITSMIG association
Under the patronage of
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
• DoubleScan: 2 independent Scanning
Engines
for unique 99+ Warantee
• Fastest reaction time on new threats
• Fingerprinting prevents from unnecessary
scans to save performance
• Whitelisting of known files prevents from
False Positives
Reactive Protection
90%
92%
94%
96%
98%
100% Jan08
Mar08
May08
Jul08
Sep08
Nov08
Jan09
Mar09
May09
Jul09
Sep09
Nov09
Jan10
Mar10
May10
Jul10
G Data
Kaspersky
Symantec
Mc Afee
Trend Micro
Reactive detection
(Source: AV-Test)
0
100
200
300
400
500
600
G Data
Kaspersky
Symantec
Mc Afee
Trend Micro
Average reaction time on new threats
(Source: Computer BILD)
7h 11min
9h 19min
55min19min
3h 20min
• Proactive Protection with Behaviour
Blocking
and several heuristics methods
• OutbreakShield: Mail based cloud security
detects mass mailings such as virus
outbreaks or spam attacks using statistical
methodology
• Web based Cloud Security: server based
URL
black lists for real time protection
Real Time Protection
McAfee
Symantec
Kaspersky
F-Secure
MSForefront
AVG
Trustport
Sophos
Redstone
Avira
GData
80,00%
85,00%
90,00%
95,00%
100,00%
40,00% 50,00% 60,00% 70,00% 80,00% 90,00% 100,00%
ReactiveDetectionvs. Proactive Detection
(Source:VirusBulletin)
ReactiveDetectionRate
Proactive Detection Rate
Certifications achieved
Awards
Certifications and Awards
G Data is the world‘s leading test winner
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
G Data Desktop Solutions
AntiMalware /
AntiSpyware
Firewall /
AntiSpam
Parental
Control
Backup /
Tuning
G Data Desktop Solutions
Available now
GfK TrendSetter - Germany
Computer-Software
Period : 11. - 17. October 2010 (Week 41)
GfK-TOP 10
NON-GAMES
Rank
Previous Current
Week Week Title Brand
1 1 OFFICE HOME AND STUDENT 2010 MICROSOFT
4 2 INTERNET SECURITY 2011 3 USER 25th ANNIVERSARY VERSION G DATA
3 3 INTERNET SECURITY 2011 KASPERSKY LAB
6 4 WINDOWS 7 HOME PREMIUM 64-BIT SB-VERSION MICROSOFT
5 5 INTERNET SECURITY 2011 UPDATE KASPERSKY LAB
8 6 INTERNET SECURITY 2011 3 USER UPDATE KASPERSKY LAB
10 7 WINDOWS 7 HOME PREMIUM 32-BIT SB-VERSION MICROSOFT
7 8 NORTON INTERNET SECURITY 2011 3 USER SYMANTEC
9 9 NORTON INTERNET SECURITY 2011 SYMANTEC
2 10 ANTI-VIRUS 2011 3 USER LIMITED EDITION KASPERSKY LAB
G Data Business Solutions
Management
Server
AntiVirus
Client
Firewall and
AntiSpam Client
Mail
Security
Remote control: installation, virus scans, updates,
settings
Fully automated virus scans and updates (pull-push)
Fully invisible malware protection – no client
interaction
For Windows and Linux
2 way Firewall: Invisible protection against hacker
attacks
AntiSpam: Content independent real time protection
Mail server independent mail gateway
Protection against malware, spam and
phishing
G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
IT Security strikes out in a new direction.
Web 2.0 platforms (blogs, forum entries)
Social networks (Facebook, MySpace, Twitter)
Manipulated hot topic search results
Links in instant messengers and chats
Phishing through online auctions
File sharing and file hosting
Modern Sources of attack
Web 2.0 platforms (blogs, forum entries)
Social networks (Facebook, MySpace, Twitter)
Manipulated hot topic search results
Links in instant messengers and chats
Phishing through online auctions
File sharing and file hosting
Modern Souces of attack
Financial harm
Loss of manpower
Security risks
Infiltration of new malware
IT infrastructure damage due to
unauthorised software
Loss / theft of sensitive data
Legal risks (German Law)
Joint responsibility for copyright
infringements (pirate copies, MP3…)
If trade secrets are published
If personal data is made accessible to
the public
ESSENTIAL: the policy
Written definition of the content and
extent of private Internet use
Use of software to ensure adherence
to the policy
AntiVirus / Firewall / AntiSpam
PolicyManager:
Device control
Application control
Content Filter
Internet use control
G Data EndpointProtection
USB mass storage devices / hard
disks
CD- / DVD- / floppy drives
Can be certified by administrator
Device control
Whitelist or blacklist
Many applications predefined (file
sharing, games, Messenger, etc.)
Application control
80 different categories, e.g.:
Chats / forums / blogs
Online auctions / job search sites
Gambling / gaming…
Content Filter
Definable Internet lock out times
Usage times can be limited per
day, week and month
Internet use control
Market survey
Device control
Application
control
Web / URL filter
Internet use
control
Symantec
Endpoint
Protection
Sophos
Endpoint
Security &
Control
Kaspersky
Antivirus 6.0
McAfee
Protection
for Endpoint
Trend Micro
Worry Free
Business
Security
G Data
Endpoint
Protection
Only
Whitelist
Only
Whitelist
Only
Blacklist
Best protection against malware,
hackers and spam
Legal security for usage of
corporate PCs
Significant improve of productivity
Easy administration thanks to
unique all-in-one solution
G Data EndpointProtection advantages
Thank you.

Mais conteúdo relacionado

Mais procurados

Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
Chapter 8 security tools ii
Chapter 8   security tools iiChapter 8   security tools ii
Chapter 8 security tools iiSyaiful Ahdan
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
 
The Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoThe Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoMike Chapple
 
Collaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar caseCollaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar caseValdes Nzalli
 
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...AlienVault
 

Mais procurados (10)

Kal i linux
Kal i linuxKal i linux
Kal i linux
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
Chapter 8 security tools ii
Chapter 8   security tools iiChapter 8   security tools ii
Chapter 8 security tools ii
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
IoT security
IoT securityIoT security
IoT security
 
The Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoThe Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and Careto
 
Collaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar caseCollaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar case
 
CV | Michele Spagnuolo
CV | Michele SpagnuoloCV | Michele Spagnuolo
CV | Michele Spagnuolo
 
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
 

Semelhante a G data 10 nov 2010

G Data Retail 2011 English
G  Data  Retail 2011 EnglishG  Data  Retail 2011 English
G Data Retail 2011 EnglishDaniel Chee
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Nancy Nimmegeers
 
Sichere Anmeldung im UCS Netzwerk – Multifaktor Authentisierung mit RCDevs Op...
Sichere Anmeldung im UCS Netzwerk – Multifaktor Authentisierung mit RCDevs Op...Sichere Anmeldung im UCS Netzwerk – Multifaktor Authentisierung mit RCDevs Op...
Sichere Anmeldung im UCS Netzwerk – Multifaktor Authentisierung mit RCDevs Op...Univention GmbH
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsAndris Soroka
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011EASTWEST Public Relations
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for BusinessRobert Crane
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinJoe Sarno
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014Andris Soroka
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseSafeNet
 
Outpost Security Pro 7.5: What's Inside?
Outpost Security Pro 7.5: What's Inside?Outpost Security Pro 7.5: What's Inside?
Outpost Security Pro 7.5: What's Inside?Lubov Putsko
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 

Semelhante a G data 10 nov 2010 (20)

Core Values Decision Sept
Core Values Decision SeptCore Values Decision Sept
Core Values Decision Sept
 
G Data Retail 2011 English
G  Data  Retail 2011 EnglishG  Data  Retail 2011 English
G Data Retail 2011 English
 
sym
symsym
sym
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
 
Sichere Anmeldung im UCS Netzwerk – Multifaktor Authentisierung mit RCDevs Op...
Sichere Anmeldung im UCS Netzwerk – Multifaktor Authentisierung mit RCDevs Op...Sichere Anmeldung im UCS Netzwerk – Multifaktor Authentisierung mit RCDevs Op...
Sichere Anmeldung im UCS Netzwerk – Multifaktor Authentisierung mit RCDevs Op...
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the Enterprise
 
Outpost Security Pro 7.5: What's Inside?
Outpost Security Pro 7.5: What's Inside?Outpost Security Pro 7.5: What's Inside?
Outpost Security Pro 7.5: What's Inside?
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 

Mais de Agora Group

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...Agora Group
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseAgora Group
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftAgora Group
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Agora Group
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital ForensicsAgora Group
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMAgora Group
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the EnterpriseAgora Group
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateAgora Group
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessAgora Group
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu DopAgora Group
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru paciențiAgora Group
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...Agora Group
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Agora Group
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateAgora Group
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wireAgora Group
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileAgora Group
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Group
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LANAgora Group
 

Mais de Agora Group (20)

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe procese
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms Shift
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004
 
Curs OSINT
Curs OSINTCurs OSINT
Curs OSINT
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital Forensics
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPM
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the Enterprise
 
ABPMP Romania
ABPMP RomaniaABPMP Romania
ABPMP Romania
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de Sănătate
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent Business
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu Dop
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru pacienți
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatate
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wire
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobile
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorni
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
 

G data 10 nov 2010

  • 3. G Data Overview1 G Data‘s Unique Technologies2 G Data Solutions3 New: G Data EndpointProtection4
  • 4. G Data Overview1 G Data‘s Unique Technologies2 G Data Solutions3 New: G Data EndpointProtection4
  • 5. • Founded 1985 in Germany • 300 employees world wide • Offices in 13 countries: Germany (HQ), USA, Canada, Japan, China, UK, France, Italy, Spain, BeNeLux, Poland and Russia • Sales Partners in more than 90 countries • G Data solutions globally available G Data Overview
  • 6. The IT-Security Pioneer 1987 First AntiVirus world wide 1990 First AV with graphical user interface 1995 First AV Hardware Protection 1999 First Linux based BootScan 2005 First AV with Cloud Security 2007 First Silent Firewall 2008 First Fingerprinting for top performance
  • 7. Member of the ITSMIG association Under the patronage of
  • 8. G Data Overview1 G Data‘s Unique Technologies2 G Data Solutions3 New: G Data EndpointProtection4
  • 9. • DoubleScan: 2 independent Scanning Engines for unique 99+ Warantee • Fastest reaction time on new threats • Fingerprinting prevents from unnecessary scans to save performance • Whitelisting of known files prevents from False Positives Reactive Protection 90% 92% 94% 96% 98% 100% Jan08 Mar08 May08 Jul08 Sep08 Nov08 Jan09 Mar09 May09 Jul09 Sep09 Nov09 Jan10 Mar10 May10 Jul10 G Data Kaspersky Symantec Mc Afee Trend Micro Reactive detection (Source: AV-Test) 0 100 200 300 400 500 600 G Data Kaspersky Symantec Mc Afee Trend Micro Average reaction time on new threats (Source: Computer BILD) 7h 11min 9h 19min 55min19min 3h 20min
  • 10. • Proactive Protection with Behaviour Blocking and several heuristics methods • OutbreakShield: Mail based cloud security detects mass mailings such as virus outbreaks or spam attacks using statistical methodology • Web based Cloud Security: server based URL black lists for real time protection Real Time Protection McAfee Symantec Kaspersky F-Secure MSForefront AVG Trustport Sophos Redstone Avira GData 80,00% 85,00% 90,00% 95,00% 100,00% 40,00% 50,00% 60,00% 70,00% 80,00% 90,00% 100,00% ReactiveDetectionvs. Proactive Detection (Source:VirusBulletin) ReactiveDetectionRate Proactive Detection Rate
  • 11. Certifications achieved Awards Certifications and Awards G Data is the world‘s leading test winner
  • 12. G Data Overview1 G Data‘s Unique Technologies2 G Data Solutions3 New: G Data EndpointProtection4
  • 13. G Data Desktop Solutions
  • 15. G Data Desktop Solutions Available now
  • 16. GfK TrendSetter - Germany Computer-Software Period : 11. - 17. October 2010 (Week 41) GfK-TOP 10 NON-GAMES Rank Previous Current Week Week Title Brand 1 1 OFFICE HOME AND STUDENT 2010 MICROSOFT 4 2 INTERNET SECURITY 2011 3 USER 25th ANNIVERSARY VERSION G DATA 3 3 INTERNET SECURITY 2011 KASPERSKY LAB 6 4 WINDOWS 7 HOME PREMIUM 64-BIT SB-VERSION MICROSOFT 5 5 INTERNET SECURITY 2011 UPDATE KASPERSKY LAB 8 6 INTERNET SECURITY 2011 3 USER UPDATE KASPERSKY LAB 10 7 WINDOWS 7 HOME PREMIUM 32-BIT SB-VERSION MICROSOFT 7 8 NORTON INTERNET SECURITY 2011 3 USER SYMANTEC 9 9 NORTON INTERNET SECURITY 2011 SYMANTEC 2 10 ANTI-VIRUS 2011 3 USER LIMITED EDITION KASPERSKY LAB
  • 17. G Data Business Solutions
  • 18. Management Server AntiVirus Client Firewall and AntiSpam Client Mail Security Remote control: installation, virus scans, updates, settings Fully automated virus scans and updates (pull-push) Fully invisible malware protection – no client interaction For Windows and Linux 2 way Firewall: Invisible protection against hacker attacks AntiSpam: Content independent real time protection Mail server independent mail gateway Protection against malware, spam and phishing
  • 19. G Data Overview1 G Data‘s Unique Technologies2 G Data Solutions3 New: G Data EndpointProtection4
  • 20. IT Security strikes out in a new direction.
  • 21.
  • 22. Web 2.0 platforms (blogs, forum entries) Social networks (Facebook, MySpace, Twitter) Manipulated hot topic search results Links in instant messengers and chats Phishing through online auctions File sharing and file hosting Modern Sources of attack
  • 23. Web 2.0 platforms (blogs, forum entries) Social networks (Facebook, MySpace, Twitter) Manipulated hot topic search results Links in instant messengers and chats Phishing through online auctions File sharing and file hosting Modern Souces of attack
  • 24.
  • 25.
  • 27. Security risks Infiltration of new malware IT infrastructure damage due to unauthorised software Loss / theft of sensitive data
  • 28. Legal risks (German Law) Joint responsibility for copyright infringements (pirate copies, MP3…) If trade secrets are published If personal data is made accessible to the public
  • 29. ESSENTIAL: the policy Written definition of the content and extent of private Internet use Use of software to ensure adherence to the policy
  • 30. AntiVirus / Firewall / AntiSpam PolicyManager: Device control Application control Content Filter Internet use control G Data EndpointProtection
  • 31. USB mass storage devices / hard disks CD- / DVD- / floppy drives Can be certified by administrator Device control
  • 32. Whitelist or blacklist Many applications predefined (file sharing, games, Messenger, etc.) Application control
  • 33. 80 different categories, e.g.: Chats / forums / blogs Online auctions / job search sites Gambling / gaming… Content Filter
  • 34. Definable Internet lock out times Usage times can be limited per day, week and month Internet use control
  • 36. Device control Application control Web / URL filter Internet use control Symantec Endpoint Protection Sophos Endpoint Security & Control Kaspersky Antivirus 6.0 McAfee Protection for Endpoint Trend Micro Worry Free Business Security G Data Endpoint Protection Only Whitelist Only Whitelist Only Blacklist
  • 37. Best protection against malware, hackers and spam Legal security for usage of corporate PCs Significant improve of productivity Easy administration thanks to unique all-in-one solution G Data EndpointProtection advantages