SlideShare una empresa de Scribd logo
1 de 10
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 2
2011
2000
2005
-
-
-
2012
2013
-
-
-
-
-
-
-
-
-
The beginning…
-
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 3
 First antivirus worldwide to offer intelligent updating
 First antivirus product to include an application firewall
 MIDAS (Malware Intrusion Detection Advanced System)- wins IST prize, “set to revolutionize AV design”
 Bitdefender to release its proprietary Antispam technology
 Bitdefender introduces B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments)
 Spam Image Filter an important step in combating the new spamming techniques
 Bitdefender® Mobile Security to provide real-time protection for smartphones and PDAs
 Bitdefender® Active Virus Control to innovate with a real time technology
 60-Second QuickScan – The quickest way to find if your computer is infected by using this online scanner
 Gravity Architecture enables new generation of security for highly scalable services
 Bitdefender Safepay™ secures all e-banking and e-shopping in a separate iron-clad, secure browser
 Security for Virtualized Environments – The 1st vShield 5 solution optimized for virtualized datacenters
 Bitdefender Clueful™, first application to show the world how iOS apps treat user's privacy
 Bitdefender Photon™ technology boasts scanning speed and minimizes slowdowns
 Cloud Security for Endpoints to provide enterprise-class security with no on-site management server
 Hypervisor Agnostic Scanning Engine – allows Bitdefender to provide the best operational cost savings for virtualization adopters
 Intra-HV memory introspection engine - prototype that allows for detecting and preventing Virtual Machine kernel mode threats
across Microsoft/Linux/etc
2011
2001
2005
-
-
-
2012
2013
-
-
-
-
-
-
-
-
-
A decade of innovation in technology
-
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 4
 #1 in Security Technology
 Bitdefender wins both AV-Test awards for Home Users: Best
Protection and Best Performance in 2013.
 3 out of the first 4 rated endpoint security vendors are using
Bitdefender engines
 #1 in Antispam Technologies
 Bitdefender analyzes and issues protection for 5 million
spam messages every day, or about 35 million per week.
 Bitdefender has won all 30 VBSpam awards in a row in Virus
Bulletin’s (VB) antispam tests between May 2009 to March 2014
 In five local offices, 250+ engineers in R&D team warrant that Bitdefender’s technology –
protecting more than 400 million users worldwide , technology partnerships included – is
the #1 Anti-Malware Security Technology in the world.
Results in sustainable technogical leadership
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 5
AV-TEST
 Awarded “Best Protection” and “Best Performance” in
January 2014
PC MAG
 Awarded “Best Antivirus of 2014” in Jan 2013
 Winner of 3 Editor’s Choice awards in 2013
AV-COMPARATIVES
 Winner of Gold Award for Proactive Malware Protection
 The only AV to receive 100% in the most complex test
ran by AV-Comparatives. Apr 2013
VB100
 Owner of 14 VB100 certifications in 2 years for corporate
products
Approved Corporate Product for SVE & CSE
Awarded “Best Antivirus of 2014”
Copyright@Bitdefender 2013/ www.Bitdefender.com 5/27/2014 • 6
Shiftworks Co Ltd
100 + OEM partnerships
UNDER THE SIGN OF THE
DACIAN WOLF
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 9
• The “Dacian Draco” was the standard of the
ancient Dacian military.
• A wolf head combined with a snake body
that made a whistling sound when galloping
due to the air that entered the wolf's mouth.
Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 10
Welcome to the GravityZone
Security for Virtualized Environments, Security for
Endpoints and Security for Mobile Devices
Bitdefender, Ana Cobzaru

Más contenido relacionado

La actualidad más candente

Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTIoT613
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkClearnetwork
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns Exosite
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemKaspersky Lab
 
Secured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant AssetsSecured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant AssetsYokogawa
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityZymbian
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks
 
Stc 2016 regional-round-iot testing in agile.
Stc 2016 regional-round-iot testing in agile.Stc 2016 regional-round-iot testing in agile.
Stc 2016 regional-round-iot testing in agile.Archana Krushnan
 
Contributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity StandardsContributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity StandardsYokogawa1
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
Outpost24 webinar - preventing wireless attacks with device visibility and t...
Outpost24 webinar -  preventing wireless attacks with device visibility and t...Outpost24 webinar -  preventing wireless attacks with device visibility and t...
Outpost24 webinar - preventing wireless attacks with device visibility and t...Outpost24
 

La actualidad más candente (20)

Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating System
 
Secured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant AssetsSecured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant Assets
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 security
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Stc 2016 regional-round-iot testing in agile.
Stc 2016 regional-round-iot testing in agile.Stc 2016 regional-round-iot testing in agile.
Stc 2016 regional-round-iot testing in agile.
 
Contributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity StandardsContributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity Standards
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
 
IoT security
IoT securityIoT security
IoT security
 
Outpost24 webinar - preventing wireless attacks with device visibility and t...
Outpost24 webinar -  preventing wireless attacks with device visibility and t...Outpost24 webinar -  preventing wireless attacks with device visibility and t...
Outpost24 webinar - preventing wireless attacks with device visibility and t...
 

Destacado

How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...Moldova ICT Summit
 
How to build successful IT start-up for world market from Eastern Europe, Rag...
How to build successful IT start-up for world market from Eastern Europe, Rag...How to build successful IT start-up for world market from Eastern Europe, Rag...
How to build successful IT start-up for world market from Eastern Europe, Rag...Moldova ICT Summit
 
TypeScript vs. CoffeeScript, Vlad Iliescu
TypeScript vs. CoffeeScript, Vlad IliescuTypeScript vs. CoffeeScript, Vlad Iliescu
TypeScript vs. CoffeeScript, Vlad IliescuMoldova ICT Summit
 
Estonian Experience in Robotics, Heilo Altin
Estonian Experience in Robotics, Heilo AltinEstonian Experience in Robotics, Heilo Altin
Estonian Experience in Robotics, Heilo AltinMoldova ICT Summit
 
The Third Platform Technologies - Accelerating the Curve, Laurentiu Popescu
The Third Platform Technologies - Accelerating the Curve, Laurentiu PopescuThe Third Platform Technologies - Accelerating the Curve, Laurentiu Popescu
The Third Platform Technologies - Accelerating the Curve, Laurentiu PopescuMoldova ICT Summit
 

Destacado (7)

How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...
 
1C - AccountTimbal
1C - AccountTimbal1C - AccountTimbal
1C - AccountTimbal
 
Privesc.eu - Vitalie Esanu
Privesc.eu - Vitalie EsanuPrivesc.eu - Vitalie Esanu
Privesc.eu - Vitalie Esanu
 
How to build successful IT start-up for world market from Eastern Europe, Rag...
How to build successful IT start-up for world market from Eastern Europe, Rag...How to build successful IT start-up for world market from Eastern Europe, Rag...
How to build successful IT start-up for world market from Eastern Europe, Rag...
 
TypeScript vs. CoffeeScript, Vlad Iliescu
TypeScript vs. CoffeeScript, Vlad IliescuTypeScript vs. CoffeeScript, Vlad Iliescu
TypeScript vs. CoffeeScript, Vlad Iliescu
 
Estonian Experience in Robotics, Heilo Altin
Estonian Experience in Robotics, Heilo AltinEstonian Experience in Robotics, Heilo Altin
Estonian Experience in Robotics, Heilo Altin
 
The Third Platform Technologies - Accelerating the Curve, Laurentiu Popescu
The Third Platform Technologies - Accelerating the Curve, Laurentiu PopescuThe Third Platform Technologies - Accelerating the Curve, Laurentiu Popescu
The Third Platform Technologies - Accelerating the Curve, Laurentiu Popescu
 

Similar a Bitdefender, Ana Cobzaru

Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Lietuvos kompiuterininkų sąjunga
 
US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderBitdefender Enterprise
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Trend Micro Antivirus.pdf
Trend Micro Antivirus.pdfTrend Micro Antivirus.pdf
Trend Micro Antivirus.pdfCloudtechtiq
 
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...Kaspersky
 
Av is dead long live managed endpoint security
Av is dead   long live managed endpoint securityAv is dead   long live managed endpoint security
Av is dead long live managed endpoint securitySolarwinds N-able
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityOnward Security
 
Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up ICS
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfSetiya Nugroho
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microTheInevitableCloud
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonDigital Catapult
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)Carla Nadin
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for BusinessRobert Crane
 
sb-checkpoint-matrix42
sb-checkpoint-matrix42sb-checkpoint-matrix42
sb-checkpoint-matrix42Wayne Phillips
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxssuser365526
 

Similar a Bitdefender, Ana Cobzaru (20)

Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
 
US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to Bitdefender
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Trend Micro Antivirus.pdf
Trend Micro Antivirus.pdfTrend Micro Antivirus.pdf
Trend Micro Antivirus.pdf
 
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
 
Av is dead long live managed endpoint security
Av is dead   long live managed endpoint securityAv is dead   long live managed endpoint security
Av is dead long live managed endpoint security
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
Dtl 2012 q4_home.1
Dtl 2012 q4_home.1Dtl 2012 q4_home.1
Dtl 2012 q4_home.1
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
sb-checkpoint-matrix42
sb-checkpoint-matrix42sb-checkpoint-matrix42
sb-checkpoint-matrix42
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 

Más de Moldova ICT Summit

TrackDuck - Edmundas Balčikonis
TrackDuck - Edmundas BalčikonisTrackDuck - Edmundas Balčikonis
TrackDuck - Edmundas BalčikonisMoldova ICT Summit
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaMoldova ICT Summit
 
Talentalism and its impact on education in ICT sector by Diana Bocaneala Endava
Talentalism and its impact on education in ICT sector by Diana Bocaneala EndavaTalentalism and its impact on education in ICT sector by Diana Bocaneala Endava
Talentalism and its impact on education in ICT sector by Diana Bocaneala EndavaMoldova ICT Summit
 
Agile methodologies based on BDD and CI by Nikolai Shevchenko
Agile methodologies based on BDD and CI by Nikolai ShevchenkoAgile methodologies based on BDD and CI by Nikolai Shevchenko
Agile methodologies based on BDD and CI by Nikolai ShevchenkoMoldova ICT Summit
 
Hitachi Unified Compute Platform by Cornel Tutuianu
Hitachi Unified Compute Platform by Cornel TutuianuHitachi Unified Compute Platform by Cornel Tutuianu
Hitachi Unified Compute Platform by Cornel TutuianuMoldova ICT Summit
 
Enterprise Architecture supporting the change by Vladimir Calmic Endava
Enterprise Architecture supporting the change by Vladimir Calmic EndavaEnterprise Architecture supporting the change by Vladimir Calmic Endava
Enterprise Architecture supporting the change by Vladimir Calmic EndavaMoldova ICT Summit
 
Strategia de crestere a competitivitatii industriei TI
Strategia de crestere a competitivitatii industriei TIStrategia de crestere a competitivitatii industriei TI
Strategia de crestere a competitivitatii industriei TIMoldova ICT Summit
 
The business of innovation by W.Grommen
The business of innovation by W.GrommenThe business of innovation by W.Grommen
The business of innovation by W.GrommenMoldova ICT Summit
 
European Experience developing Business Angel Ecosystem by Paulo Andrez
European Experience developing Business Angel Ecosystem by Paulo AndrezEuropean Experience developing Business Angel Ecosystem by Paulo Andrez
European Experience developing Business Angel Ecosystem by Paulo AndrezMoldova ICT Summit
 
HR: What industry thinks of by Olivier Prado
HR: What industry thinks of by Olivier PradoHR: What industry thinks of by Olivier Prado
HR: What industry thinks of by Olivier PradoMoldova ICT Summit
 
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015Moldova ICT Summit
 

Más de Moldova ICT Summit (15)

TrackDuck - Edmundas Balčikonis
TrackDuck - Edmundas BalčikonisTrackDuck - Edmundas Balčikonis
TrackDuck - Edmundas Balčikonis
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov Endava
 
Talentalism and its impact on education in ICT sector by Diana Bocaneala Endava
Talentalism and its impact on education in ICT sector by Diana Bocaneala EndavaTalentalism and its impact on education in ICT sector by Diana Bocaneala Endava
Talentalism and its impact on education in ICT sector by Diana Bocaneala Endava
 
Agile methodologies based on BDD and CI by Nikolai Shevchenko
Agile methodologies based on BDD and CI by Nikolai ShevchenkoAgile methodologies based on BDD and CI by Nikolai Shevchenko
Agile methodologies based on BDD and CI by Nikolai Shevchenko
 
Hitachi Unified Compute Platform by Cornel Tutuianu
Hitachi Unified Compute Platform by Cornel TutuianuHitachi Unified Compute Platform by Cornel Tutuianu
Hitachi Unified Compute Platform by Cornel Tutuianu
 
Enterprise Architecture supporting the change by Vladimir Calmic Endava
Enterprise Architecture supporting the change by Vladimir Calmic EndavaEnterprise Architecture supporting the change by Vladimir Calmic Endava
Enterprise Architecture supporting the change by Vladimir Calmic Endava
 
Bina systems Cloud Applications
Bina systems Cloud ApplicationsBina systems Cloud Applications
Bina systems Cloud Applications
 
Strategia de crestere a competitivitatii industriei TI
Strategia de crestere a competitivitatii industriei TIStrategia de crestere a competitivitatii industriei TI
Strategia de crestere a competitivitatii industriei TI
 
BAIT MD infoDev
BAIT MD infoDevBAIT MD infoDev
BAIT MD infoDev
 
Customs presentation
Customs presentationCustoms presentation
Customs presentation
 
White Book presentation
White Book presentationWhite Book presentation
White Book presentation
 
The business of innovation by W.Grommen
The business of innovation by W.GrommenThe business of innovation by W.Grommen
The business of innovation by W.Grommen
 
European Experience developing Business Angel Ecosystem by Paulo Andrez
European Experience developing Business Angel Ecosystem by Paulo AndrezEuropean Experience developing Business Angel Ecosystem by Paulo Andrez
European Experience developing Business Angel Ecosystem by Paulo Andrez
 
HR: What industry thinks of by Olivier Prado
HR: What industry thinks of by Olivier PradoHR: What industry thinks of by Olivier Prado
HR: What industry thinks of by Olivier Prado
 
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015
Planul de dezvoltare al Serviciului Fiscal de Stat 2011-2015
 

Último

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Último (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Bitdefender, Ana Cobzaru

  • 1.
  • 2. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 2 2011 2000 2005 - - - 2012 2013 - - - - - - - - - The beginning… -
  • 3. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 3  First antivirus worldwide to offer intelligent updating  First antivirus product to include an application firewall  MIDAS (Malware Intrusion Detection Advanced System)- wins IST prize, “set to revolutionize AV design”  Bitdefender to release its proprietary Antispam technology  Bitdefender introduces B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments)  Spam Image Filter an important step in combating the new spamming techniques  Bitdefender® Mobile Security to provide real-time protection for smartphones and PDAs  Bitdefender® Active Virus Control to innovate with a real time technology  60-Second QuickScan – The quickest way to find if your computer is infected by using this online scanner  Gravity Architecture enables new generation of security for highly scalable services  Bitdefender Safepay™ secures all e-banking and e-shopping in a separate iron-clad, secure browser  Security for Virtualized Environments – The 1st vShield 5 solution optimized for virtualized datacenters  Bitdefender Clueful™, first application to show the world how iOS apps treat user's privacy  Bitdefender Photon™ technology boasts scanning speed and minimizes slowdowns  Cloud Security for Endpoints to provide enterprise-class security with no on-site management server  Hypervisor Agnostic Scanning Engine – allows Bitdefender to provide the best operational cost savings for virtualization adopters  Intra-HV memory introspection engine - prototype that allows for detecting and preventing Virtual Machine kernel mode threats across Microsoft/Linux/etc 2011 2001 2005 - - - 2012 2013 - - - - - - - - - A decade of innovation in technology -
  • 4. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 4  #1 in Security Technology  Bitdefender wins both AV-Test awards for Home Users: Best Protection and Best Performance in 2013.  3 out of the first 4 rated endpoint security vendors are using Bitdefender engines  #1 in Antispam Technologies  Bitdefender analyzes and issues protection for 5 million spam messages every day, or about 35 million per week.  Bitdefender has won all 30 VBSpam awards in a row in Virus Bulletin’s (VB) antispam tests between May 2009 to March 2014  In five local offices, 250+ engineers in R&D team warrant that Bitdefender’s technology – protecting more than 400 million users worldwide , technology partnerships included – is the #1 Anti-Malware Security Technology in the world. Results in sustainable technogical leadership
  • 5. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 5 AV-TEST  Awarded “Best Protection” and “Best Performance” in January 2014 PC MAG  Awarded “Best Antivirus of 2014” in Jan 2013  Winner of 3 Editor’s Choice awards in 2013 AV-COMPARATIVES  Winner of Gold Award for Proactive Malware Protection  The only AV to receive 100% in the most complex test ran by AV-Comparatives. Apr 2013 VB100  Owner of 14 VB100 certifications in 2 years for corporate products Approved Corporate Product for SVE & CSE Awarded “Best Antivirus of 2014”
  • 6. Copyright@Bitdefender 2013/ www.Bitdefender.com 5/27/2014 • 6 Shiftworks Co Ltd 100 + OEM partnerships
  • 7. UNDER THE SIGN OF THE DACIAN WOLF
  • 8. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 9 • The “Dacian Draco” was the standard of the ancient Dacian military. • A wolf head combined with a snake body that made a whistling sound when galloping due to the air that entered the wolf's mouth.
  • 9. Copyright@Bitdefender 2014/ www.bitdefender.com 5/27/2014 • 10 Welcome to the GravityZone Security for Virtualized Environments, Security for Endpoints and Security for Mobile Devices