SlideShare a Scribd company logo
1 of 19
Protecting the Mac Environment:
 Technical insight



Nikolay Grebennikov, CTO, Kaspersky Lab


Kaspersky Security for Mac Launch Event, Moscow, 14-16 May 2012
PAGE 1 |
Such a lovely device

100

 80
   100     85%
                        Million users
                              84%


 60
                      56%
 40   5%                Market share
                                   50%


 20


  14%
  0
       Desktop
                    US market share
                  Apple Mac    Laptop       Apple
                                           MacBook



  Anti-virus software users
  According to Harris Interactive research, March 2012
PAGE 2 |
Protection with
    Kaspersky Lab
    technologies




1
Kaspersky Lab technologies for Mac


                       File             Heuristic AV &
                       Anti-Virus       Script Emulator




               NEW              Kaspersky
               WEB              Security
               Anti-Virus       Network           NEW
                                Enhanced          Parental
                                                  Control



                     NEW                    URL
                     Virtual Keyboard       Advisor




PAGE 4 |   1
Benefits of the Cloud                         KSN
                                              Enhanced




Blocking new threats       Minimal reaction time


                    Services


    Kaspersky                       Kaspersky
 Security for MAC                Security Network

                    Statistics




PAGE 5 |   1
Kaspersky Security Network services       KSN
                                          Enhanced




Millions of users from 213 countries



   Urgent updates regarding new threats
   File reputation
   URL reputation
   Malware detection statistics




PAGE 6 |   1
Cloud protection: how it works                           KSN
                                                         Enhanced




                             Update
                            ready for
                            download

                                           Update
                                        downloaded, cu
                 Update
                                           stomer
                 created
                                          protected




 Malware
discovered                 No Cloud


                                         Seconds
                                         Hours
PAGE 7 |     1
Effective Hybrid Approach                                  KSN
                                                           Enhanced




   Cloud based                                 Mac based
   technologies                               technologies
                              Hybrid
                             approach

o Collects malware data                 o Works when you are
  from PCs                                offline
o Reacts fast to new                    o Analyzes and collects
  threats                                 behavior patterns
o No need to store data on              o Remediates and rolls
  PC                                      back malware actions




PAGE 8 |   1
Even better than just a cloud            KSN
                                         Enhanced




 Faster protection against new threats
 Limited data transfers to the cloud
 Limited number of updates
 Fastest possible reaction time




PAGE 9 |   1
Application control with Traffic Monitor              NEW
                                                      WEB Anti-
                                                      Virus




                  TCP connect
    Application                            Internet server
                         Traffic monitor

                            Redirection




                                 Proxy



                                Protocol
                                parsing
PAGE 10 |   1
Traffic Monitor - an essential part of protection

  Network connections intercepted in kernel mode
  Routed to local proxy
  Protocol parsing
  File and URL verification




PAGE 11 |   1
Safe Internet with Web anti-virus          NEW
                                           WEB Anti-
                                           Virus




        URL       WEB anti-virus

                   Verification in   KSN
                     the cloud


                   Offline bases
                      verified


                     Heuristic
                     scanning


                     Signature
                     scanning
PAGE 12 |   1
Rich, Effective Web anti-virus functionality

  Multi-level checking in the Cloud
  Advanced heuristic engine
  Complete signature bases with the full set of known malicious
  scripts




PAGE 13 |   1
Script emulation for safe browsing         Heuristic AV&
                                           Script
                                           Emulator




                 Script emulation
    Web page
                    JavaScript       Web page
     open
                      engine          ready
   Java script

                    Signature
                    database




PAGE 14 |   1
Emulation technology: Key elements

  Specialized virtual environment
  JavaScript emulation
  Iframe content verification
  Utilization of signature database




PAGE 15 |   1
Backed up by even more technologies …

                         Traffic monitor



                               Protocol
                               parsing




   •   Web control                           •   AV bases
   •   Time control                          •   PE emulator
                         •   Anti-phishing
   •   Personal data         bases           •   Script emulator
       protection                            •   iSwift
                         •   Heuristics
   •   Social networks                       •   UDS for files
       protection        •   UDS for URLs

PAGE 16 |    1
Efficient technologies = Efficient protection

  Defense against new threats
  Minimum reaction time
  Network connection interception
  Keeps your children safe online
  Safeguards your private data




PAGE 17 |   1
The better the user understands the protection concept,
                  the better that user is protected
                This applies to Mac users as well




PAGE 18 |
Thank you!
Questions?




Nikolay Grebennikov, CTO, Kaspersky Lab

Kaspersky Security for Mac Launch Event, Moscow, 14-16 May 2012

PAGE 19 |

More Related Content

What's hot

Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...Amazon Web Services
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage OverviewCloudPassage
 
Scaling Security in the Cloud With Open Source
Scaling Security in the Cloud With Open SourceScaling Security in the Cloud With Open Source
Scaling Security in the Cloud With Open SourceCloudVillage
 
Lacework for AWS Security Overview
Lacework for AWS Security OverviewLacework for AWS Security Overview
Lacework for AWS Security OverviewLacework
 
Your Blacklist is Dead: Why the Future of Command and Control is the Cloud
Your Blacklist is Dead: Why the Future of Command and Control is the CloudYour Blacklist is Dead: Why the Future of Command and Control is the Cloud
Your Blacklist is Dead: Why the Future of Command and Control is the CloudCloudVillage
 
AWS August Webinar Series - DDoS Resiliency
AWS August Webinar Series - DDoS ResiliencyAWS August Webinar Series - DDoS Resiliency
AWS August Webinar Series - DDoS ResiliencyAmazon Web Services
 
Pragmatic Cloud Security Automation
Pragmatic Cloud Security AutomationPragmatic Cloud Security Automation
Pragmatic Cloud Security AutomationCloudVillage
 
Your First Hour on AWS: Building the Foundation for Large Scale AWS Adoption
Your First Hour on AWS: Building the Foundation for Large Scale AWS AdoptionYour First Hour on AWS: Building the Foundation for Large Scale AWS Adoption
Your First Hour on AWS: Building the Foundation for Large Scale AWS AdoptionAmazon Web Services
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Deivid Toledo
 
Security for AWS: Journey to Least Privilege
Security for AWS: Journey to Least PrivilegeSecurity for AWS: Journey to Least Privilege
Security for AWS: Journey to Least PrivilegeLacework
 
Lacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security ThreatsLacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security ThreatsLacework
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedJason Chan
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
DEVNET-1158 Cognitive Threat Analytics - Behavioral Breach Detection & Securi...
DEVNET-1158	Cognitive Threat Analytics - Behavioral Breach Detection & Securi...DEVNET-1158	Cognitive Threat Analytics - Behavioral Breach Detection & Securi...
DEVNET-1158 Cognitive Threat Analytics - Behavioral Breach Detection & Securi...Cisco DevNet
 
Containers at risk a review of 21,000 cloud environments
Containers at risk  a review of 21,000 cloud environmentsContainers at risk  a review of 21,000 cloud environments
Containers at risk a review of 21,000 cloud environmentsdhubbard858
 
CloudFlare DDoS attacks 101: what are they and how to protect your site?
CloudFlare DDoS attacks 101: what are they and how to protect your site?CloudFlare DDoS attacks 101: what are they and how to protect your site?
CloudFlare DDoS attacks 101: what are they and how to protect your site?Cloudflare
 
Cloud Resilience and Container Workload Automation
Cloud Resilience and Container Workload AutomationCloud Resilience and Container Workload Automation
Cloud Resilience and Container Workload AutomationOK2OK
 
Phishing in the cloud era
Phishing in the cloud eraPhishing in the cloud era
Phishing in the cloud eraCloudVillage
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOpsAlert Logic
 

What's hot (20)

Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
 
Scaling Security in the Cloud With Open Source
Scaling Security in the Cloud With Open SourceScaling Security in the Cloud With Open Source
Scaling Security in the Cloud With Open Source
 
Lacework for AWS Security Overview
Lacework for AWS Security OverviewLacework for AWS Security Overview
Lacework for AWS Security Overview
 
Your Blacklist is Dead: Why the Future of Command and Control is the Cloud
Your Blacklist is Dead: Why the Future of Command and Control is the CloudYour Blacklist is Dead: Why the Future of Command and Control is the Cloud
Your Blacklist is Dead: Why the Future of Command and Control is the Cloud
 
AWS August Webinar Series - DDoS Resiliency
AWS August Webinar Series - DDoS ResiliencyAWS August Webinar Series - DDoS Resiliency
AWS August Webinar Series - DDoS Resiliency
 
Pragmatic Cloud Security Automation
Pragmatic Cloud Security AutomationPragmatic Cloud Security Automation
Pragmatic Cloud Security Automation
 
Your First Hour on AWS: Building the Foundation for Large Scale AWS Adoption
Your First Hour on AWS: Building the Foundation for Large Scale AWS AdoptionYour First Hour on AWS: Building the Foundation for Large Scale AWS Adoption
Your First Hour on AWS: Building the Foundation for Large Scale AWS Adoption
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)
 
Security for AWS: Journey to Least Privilege
Security for AWS: Journey to Least PrivilegeSecurity for AWS: Journey to Least Privilege
Security for AWS: Journey to Least Privilege
 
Lacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security ThreatsLacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security Threats
 
DDoS Protection
DDoS ProtectionDDoS Protection
DDoS Protection
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons Learned
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
DEVNET-1158 Cognitive Threat Analytics - Behavioral Breach Detection & Securi...
DEVNET-1158	Cognitive Threat Analytics - Behavioral Breach Detection & Securi...DEVNET-1158	Cognitive Threat Analytics - Behavioral Breach Detection & Securi...
DEVNET-1158 Cognitive Threat Analytics - Behavioral Breach Detection & Securi...
 
Containers at risk a review of 21,000 cloud environments
Containers at risk  a review of 21,000 cloud environmentsContainers at risk  a review of 21,000 cloud environments
Containers at risk a review of 21,000 cloud environments
 
CloudFlare DDoS attacks 101: what are they and how to protect your site?
CloudFlare DDoS attacks 101: what are they and how to protect your site?CloudFlare DDoS attacks 101: what are they and how to protect your site?
CloudFlare DDoS attacks 101: what are they and how to protect your site?
 
Cloud Resilience and Container Workload Automation
Cloud Resilience and Container Workload AutomationCloud Resilience and Container Workload Automation
Cloud Resilience and Container Workload Automation
 
Phishing in the cloud era
Phishing in the cloud eraPhishing in the cloud era
Phishing in the cloud era
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
 

Viewers also liked

UMiP推廣手冊V1.1
UMiP推廣手冊V1.1UMiP推廣手冊V1.1
UMiP推廣手冊V1.1Mu Chun Wang
 
What is innova lab?
What is innova lab?What is innova lab?
What is innova lab?Greg Rivera
 
120404 소셜
120404 소셜120404 소셜
120404 소셜minnie03
 
交點台中Vol.17 - 李芷綾 - 往垃圾回收看見改變社會的力量
交點台中Vol.17 - 李芷綾 - 往垃圾回收看見改變社會的力量交點台中Vol.17 - 李芷綾 - 往垃圾回收看見改變社會的力量
交點台中Vol.17 - 李芷綾 - 往垃圾回收看見改變社會的力量交點
 
[2012 체인지온] 농사가 진화한다 - 박호진
[2012 체인지온] 농사가 진화한다 - 박호진[2012 체인지온] 농사가 진화한다 - 박호진
[2012 체인지온] 농사가 진화한다 - 박호진daumfoundation
 
Aaa sassy explorers-2013
Aaa sassy explorers-2013Aaa sassy explorers-2013
Aaa sassy explorers-2013MediaLink
 
Международные программы AIESEC
Международные программы AIESECМеждународные программы AIESEC
Международные программы AIESECAIESEC Odessa
 
201204 簡介
201204 簡介201204 簡介
201204 簡介Gooder Do
 
18april 2009 Pr Environmentalists Call On Govt To Stop Destructive Projects
18april 2009 Pr Environmentalists Call On Govt To Stop Destructive Projects18april 2009 Pr Environmentalists Call On Govt To Stop Destructive Projects
18april 2009 Pr Environmentalists Call On Govt To Stop Destructive Projectslisa.ito
 
AIESEC Explore Program at a Glance
AIESEC Explore Program at a GlanceAIESEC Explore Program at a Glance
AIESEC Explore Program at a GlanceCurtis Voisin
 
《氪月报》2012年06月
《氪月报》2012年06月《氪月报》2012年06月
《氪月报》2012年06月xiaoswift
 
다음 브랜드텍스트북
다음 브랜드텍스트북다음 브랜드텍스트북
다음 브랜드텍스트북명근 박
 
Folleto Juan Felipe Giraldo Aristizábal
Folleto Juan Felipe Giraldo AristizábalFolleto Juan Felipe Giraldo Aristizábal
Folleto Juan Felipe Giraldo Aristizábalpipegiraldo91
 
Informatica 104 equipo16
Informatica 104 equipo16Informatica 104 equipo16
Informatica 104 equipo16somoscacahuates
 

Viewers also liked (20)

mengukur_maturity_cobit
mengukur_maturity_cobitmengukur_maturity_cobit
mengukur_maturity_cobit
 
Act.in.ua
Act.in.uaAct.in.ua
Act.in.ua
 
UMiP推廣手冊V1.1
UMiP推廣手冊V1.1UMiP推廣手冊V1.1
UMiP推廣手冊V1.1
 
What is innova lab?
What is innova lab?What is innova lab?
What is innova lab?
 
120404 소셜
120404 소셜120404 소셜
120404 소셜
 
交點台中Vol.17 - 李芷綾 - 往垃圾回收看見改變社會的力量
交點台中Vol.17 - 李芷綾 - 往垃圾回收看見改變社會的力量交點台中Vol.17 - 李芷綾 - 往垃圾回收看見改變社會的力量
交點台中Vol.17 - 李芷綾 - 往垃圾回收看見改變社會的力量
 
[2012 체인지온] 농사가 진화한다 - 박호진
[2012 체인지온] 농사가 진화한다 - 박호진[2012 체인지온] 농사가 진화한다 - 박호진
[2012 체인지온] 농사가 진화한다 - 박호진
 
Aaa sassy explorers-2013
Aaa sassy explorers-2013Aaa sassy explorers-2013
Aaa sassy explorers-2013
 
Международные программы AIESEC
Международные программы AIESECМеждународные программы AIESEC
Международные программы AIESEC
 
Webquest
WebquestWebquest
Webquest
 
201204 簡介
201204 簡介201204 簡介
201204 簡介
 
18april 2009 Pr Environmentalists Call On Govt To Stop Destructive Projects
18april 2009 Pr Environmentalists Call On Govt To Stop Destructive Projects18april 2009 Pr Environmentalists Call On Govt To Stop Destructive Projects
18april 2009 Pr Environmentalists Call On Govt To Stop Destructive Projects
 
AIESEC Explore Program at a Glance
AIESEC Explore Program at a GlanceAIESEC Explore Program at a Glance
AIESEC Explore Program at a Glance
 
Tata india
Tata  indiaTata  india
Tata india
 
Parksoehee
ParksoeheeParksoehee
Parksoehee
 
Euro l
Euro lEuro l
Euro l
 
《氪月报》2012年06月
《氪月报》2012年06月《氪月报》2012年06月
《氪月报》2012年06月
 
다음 브랜드텍스트북
다음 브랜드텍스트북다음 브랜드텍스트북
다음 브랜드텍스트북
 
Folleto Juan Felipe Giraldo Aristizábal
Folleto Juan Felipe Giraldo AristizábalFolleto Juan Felipe Giraldo Aristizábal
Folleto Juan Felipe Giraldo Aristizábal
 
Informatica 104 equipo16
Informatica 104 equipo16Informatica 104 equipo16
Informatica 104 equipo16
 

Similar to Protecting the Mac Environment: Technical Insight

Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKirill Kertsenbaum
 
AWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud InnovationsAWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud InnovationsAmazon Web Services
 
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...imagazinepl
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionF5 Networks
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudTrend Micro (EMEA) Limited
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 
Mykonos Media Presentation
Mykonos Media PresentationMykonos Media Presentation
Mykonos Media PresentationMykonos Software
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADFF5 Networks
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Cybercrime Threats in 2012 - What You Need to Know
Cybercrime Threats in 2012 - What You Need to KnowCybercrime Threats in 2012 - What You Need to Know
Cybercrime Threats in 2012 - What You Need to KnowKaseya
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introductionJimmy Saigon
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceAberla
 
Tenzin thiley bhutia
Tenzin thiley bhutiaTenzin thiley bhutia
Tenzin thiley bhutiaTenzin Thiley
 
Application security vision - John b
Application security vision - John bApplication security vision - John b
Application security vision - John bRoopa Nadkarni
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 
AIIM Cloud Webinar - EMC Corporation
AIIM Cloud Webinar - EMC CorporationAIIM Cloud Webinar - EMC Corporation
AIIM Cloud Webinar - EMC CorporationShadrach White
 

Similar to Protecting the Mac Environment: Technical Insight (20)

Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISH
 
AWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud InnovationsAWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud Innovations
 
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi VerzeNebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
 
Mykonos Media Presentation
Mykonos Media PresentationMykonos Media Presentation
Mykonos Media Presentation
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADF
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Cybercrime Threats in 2012 - What You Need to Know
Cybercrime Threats in 2012 - What You Need to KnowCybercrime Threats in 2012 - What You Need to Know
Cybercrime Threats in 2012 - What You Need to Know
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
Tenzin thiley bhutia
Tenzin thiley bhutiaTenzin thiley bhutia
Tenzin thiley bhutia
 
Application security vision - John b
Application security vision - John bApplication security vision - John b
Application security vision - John b
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
AIIM Cloud Webinar - EMC Corporation
AIIM Cloud Webinar - EMC CorporationAIIM Cloud Webinar - EMC Corporation
AIIM Cloud Webinar - EMC Corporation
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Protecting the Mac Environment: Technical Insight

  • 1. Protecting the Mac Environment: Technical insight Nikolay Grebennikov, CTO, Kaspersky Lab Kaspersky Security for Mac Launch Event, Moscow, 14-16 May 2012 PAGE 1 |
  • 2. Such a lovely device 100 80 100 85% Million users 84% 60 56% 40 5% Market share 50% 20 14% 0 Desktop US market share Apple Mac Laptop Apple MacBook Anti-virus software users According to Harris Interactive research, March 2012 PAGE 2 |
  • 3. Protection with Kaspersky Lab technologies 1
  • 4. Kaspersky Lab technologies for Mac File Heuristic AV & Anti-Virus Script Emulator NEW Kaspersky WEB Security Anti-Virus Network NEW Enhanced Parental Control NEW URL Virtual Keyboard Advisor PAGE 4 | 1
  • 5. Benefits of the Cloud KSN Enhanced Blocking new threats Minimal reaction time Services Kaspersky Kaspersky Security for MAC Security Network Statistics PAGE 5 | 1
  • 6. Kaspersky Security Network services KSN Enhanced Millions of users from 213 countries Urgent updates regarding new threats File reputation URL reputation Malware detection statistics PAGE 6 | 1
  • 7. Cloud protection: how it works KSN Enhanced Update ready for download Update downloaded, cu Update stomer created protected Malware discovered No Cloud Seconds Hours PAGE 7 | 1
  • 8. Effective Hybrid Approach KSN Enhanced Cloud based Mac based technologies technologies Hybrid approach o Collects malware data o Works when you are from PCs offline o Reacts fast to new o Analyzes and collects threats behavior patterns o No need to store data on o Remediates and rolls PC back malware actions PAGE 8 | 1
  • 9. Even better than just a cloud KSN Enhanced Faster protection against new threats Limited data transfers to the cloud Limited number of updates Fastest possible reaction time PAGE 9 | 1
  • 10. Application control with Traffic Monitor NEW WEB Anti- Virus TCP connect Application Internet server Traffic monitor Redirection Proxy Protocol parsing PAGE 10 | 1
  • 11. Traffic Monitor - an essential part of protection Network connections intercepted in kernel mode Routed to local proxy Protocol parsing File and URL verification PAGE 11 | 1
  • 12. Safe Internet with Web anti-virus NEW WEB Anti- Virus URL WEB anti-virus Verification in KSN the cloud Offline bases verified Heuristic scanning Signature scanning PAGE 12 | 1
  • 13. Rich, Effective Web anti-virus functionality Multi-level checking in the Cloud Advanced heuristic engine Complete signature bases with the full set of known malicious scripts PAGE 13 | 1
  • 14. Script emulation for safe browsing Heuristic AV& Script Emulator Script emulation Web page JavaScript Web page open engine ready Java script Signature database PAGE 14 | 1
  • 15. Emulation technology: Key elements Specialized virtual environment JavaScript emulation Iframe content verification Utilization of signature database PAGE 15 | 1
  • 16. Backed up by even more technologies … Traffic monitor Protocol parsing • Web control • AV bases • Time control • PE emulator • Anti-phishing • Personal data bases • Script emulator protection • iSwift • Heuristics • Social networks • UDS for files protection • UDS for URLs PAGE 16 | 1
  • 17. Efficient technologies = Efficient protection Defense against new threats Minimum reaction time Network connection interception Keeps your children safe online Safeguards your private data PAGE 17 | 1
  • 18. The better the user understands the protection concept, the better that user is protected This applies to Mac users as well PAGE 18 |
  • 19. Thank you! Questions? Nikolay Grebennikov, CTO, Kaspersky Lab Kaspersky Security for Mac Launch Event, Moscow, 14-16 May 2012 PAGE 19 |