SlideShare a Scribd company logo
1 of 33
Spring Launch
March 2009


Con Mallon, Director Regional Product
Marketing, Consumer Division
Evasion & Deception Techniques Driving
  Massive Amounts of New Malware
                   # of New Malware by Year
1200000


1000000
                                                               In 2008
                         In 2000
 800000
                                                               12,000
                         5
 600000
                                                               detections a day
                         detections a day

 400000


 200000


            0
             2002                 2003               2004   2005         2006     2007   2008
Source: Symantec Global Intelligence Network 10/08
Threat Landscape Updates: Web Based
Attacks
• Web Based Attack Trends: March 2009
Misleading Applications
• 23 Million Infection Attempts in 6
months *Norton Community Watch




                                  • Installed along with a Trojan horse
                                    program
                                  • Produce false or misleading results
                                  • Hold PC hostage to remedy
                                    pretend threats
Norton 360 v3.0
& Norton Safe Web
Norton 360 v3.0 – What’s New?
Norton 360 v3.0 sets the industry standard by being the
fastest, lightest, most comprehensive and most usable all-in-one suite in
the market.


 • Performance
   Enhancements
 • Security Innovations
   & Norton Safe Web
 • Friendlier & More
   Flexible Backup
 • Get the Most Out of
   Your PC with Tuneup
   & Diagnostic Features
Consumers Demand High Performance




     1M                 40%                 31%
 Many people have under-powered systems & already have
                  performance problems.
   People contact      Have less than 512 Have 1 GB of RAM
    Norton technical   MB of RAM & 75%       & 57% memory
  support each month   memory utilization       utilization
Norton 360 v3.0 Performance Targets

                                        Install Time:
                                       ~60 seconds
 • 1x10x110 Internal Challenge
  – Install Time: One Minute
  – Memory Usage: < 10MB at Idle
  – Reduced Install Size: 110MB


 • Tracking Dozens of
   Performance Metrics                 Memory at Idle:
  – Initial and Subsequent Scan Time     <10 MB
  – Boot Time Impact
  – # of Processes
  – Streamlined Install Steps




                                                         8
Beyond Whitelisting: Norton Insight
New Security Model That Dramatically Reduces Scanning


 • Less Scanning Needed
   – Only un-trusted applications
     are analyzed by Norton
 • Behavioral Safety Scoring
   – Programs are also rated by
     SONAR’s behavior analysis to
     determine their trust level
 • Driven by Online
   Intelligence
   – A program may be considered
     trusted based on the Norton
     Community or Norton
     Research
Pulse Updates

  Norton is updated nearly 5 times more often than the nearest competitor
   AV-Test, Sep. 2008



     A new definition every 5-15 minutes on average
Listening to Our Users


• Silent Mode
• Advanced Firewall
  Settings options
• Detailed Activity History
  for security, backup and
  tuneup tasks
• Backup Source Selection
• Custom File Type
  Management
Robust Identity Protection


• Simplified & Robust
 – Simplified toolbar and
   new settings options
 – Online tutorial
 – Import logins from IE
 – Ability to clone cards
Norton Safe Web
 A Web site rating service that extends protection to everyday
 consumer online activities – search, browse, transact, and interact



                 Provides a trusted visual indicator



                 Protects consumers from sites that can infect them



                 Protects consumers from sites that might misuse
                 their personal information


                 Helps consumers identify sites they can
                 safely transact with
How Safe Web Works

 • Adds site safety ratings to Google, Yahoo! and Live.com search results
 • Integrates current page rating into the Norton toolbar with roll-over summarizing the
   site safety profile
 • Provides easy access to the detailed site rating report and community feedback
Ecommerce Safety

  • Safe Web includes key ecommerce safety indictors to help users make
    information decisions when shopping and transacting online
    – 85% of U.S Internet users surveyed said being able to trust websites with their confidential
      information was the most important factor when transacting online1
    – More than 2/3 of users indicated that ecommerce reputation would be extremely useful to them2




1 eMarketer, September2008
2 Symantec Primary Research, June 2007
Friendly, Flexible Backup


• Friendly
 – Backup Tutorial
 – Tabbed Backup Settings
 – Portable Restore for
   Optical and
   Removable Media
• Flexible
 – Norton Backup Drive
 – Backup History
 – Multiple Backup Sets
 – Backup Source Support
 – File Type Management
 – 25GB for N360 Premier
PC TuneUp – Smart Startup Manager
Turns off unnecessary programs to speed up startup time

• Easy to Use
 – Program Name and
   Publisher described
 – On/Off/Delay options
 – Sortable Columns
• Smart
 – Performance Impact
   measured
 – Users notified about
   new startup items
PC Tuneup: Diagnostic Report


• Thorough
 – Comprehensive system
   snapshot
 – 10 point check for
   troubleshooting
 – Recommends
   appropriate fixes
• Easy
 – Can be printed, saved,
   or emailed to friends,
   family, or technicians
 – Collapsible and
   expandable sections
PC Tuneup – Monthly Report


• Activity Summary
 – Automatically generated
 – Highlights
   subscription status
• User Guidance
 – Tips about new or
   advanced features
 – Additional support
   options through
   NortonLive
Feature Overview: Norton 360 3.0




                                                                      Backup Tutorial                  Smart Startup Manager
    One-Minute Install, Norton    Norton Safe Web
    Insight, & Pulse Updates                                          Norton Backup Drive              Diagnostic Report
                                   Shopping Safety
    Low System Resource                                              Backup History                   Monthly Activity Report
                                   Identity Safe Usability
    Utilization                    Enhancements                       Multiple Backup Sets             Tuneup History
    Browser Protection for IE     Identity Safe Tutorial            File Type Management             File & Browser Cleanup
    and Firefox
                                   Login Import from IE              Automatic Content                Registry Cleanup
    Antispam
                                                                      Detection & Categorization
                                   Identity Safe Password                                              Disk Defragmentation
    Antivirus and Antispyware     Management                         Backup Status Overlays
    SONAR Behavioral              Phishing Protection for IE        Secure Online Backup
    Detection                      and Firefox
    Two-way Firewall              Web Site Authentication for
    Intrusion Prevention          IE and Firefox

                             Silent Mode, Enhanced Backup Usability, Updated QuickTasks Menus and Quick Controls Panel,
              Usability:     Idle Scheduler, Streamlined Navigation, Activity-Based Messaging
Norton Online Backup
March 2009
Backup by the numbers




95%     Fear losing their PC data
         more than a tax audit




53%         Annual growth in
           consumer storage




  2%         Back up online
What is Norton Online Backup?

        Norton Online Backup: secure, automatic protection of
           your cherished digital photos and important files

• Key Benefits
 – Single secure dashboard to manage
   backups for all your photos and files
   across all your family PCs
 – Protects important files against loss,
   damage, and other disasters
 – Quickly restores lost or deleted files
   to any web-enabled computer
 – Automatic backup lets you install it
   and forget it




                                                                2
How Norton Online Backup Works



        1                    2                3                4

   Login from any     Manage all of the     Manage      Restore your data
internet connection   computers in your   backup jobs
                      household from a
                      single dashboard




                                                                            24
Norton Online Backup
                  Keep your digital photos and files safe and secure



                                                                 Highly Available
                                          Easy
         Secure

                                                             • Secure web portal
• Block-level                  • Automatic backup
  incremental backups                                        • Restore to any PC with
                               • One backup location for
• 256-bit AES                                                  supported Web browser
                                 multiple household PCs
  encryption on servers                                      • Protect on the go
                               • Use existing
• 128-bit SSL encryption         Norton account              • Access multiple PCs
  in transfer                  • Automatic scheduling          data via Web
• Data compression               to just let it run
• File redundancy between      • 1-click “Backup Now”
  data centers                 • Status reporting
• Professional managed,
  highly secure data centers



                                                                                        25

                                                                                         2
Norton Utilities
Friday, March 27, 2009
Why A New Norton Utilities?




                              9
Today’s Norton Utilities

 Norton Utilities is designed for people who want to extend the life of a
 struggling or troubled PC. Situations where this may be the case
 include;

      An older PC is struggling to run software that
      used to run when the PC was newer.

      A heavily used PC has slowed down after a
      particular activity (such as installing
      software).

      A PC is experiencing instability such as
      hanging or freezing.

      An underpowered PC (slow disk drives or low
      amount of memory) runs sluggishly.
Norton Utilities @ a Glance




                                         Stability          Privacy
                    Performance
   Boot Time




               Reduce theperformance through the PC by
                 Increase time itstability through
                         Improve takes to start increased
                available memory andthrough removal of
                Improve your privacy and optimization of
                 repair, maintenance optimized disks and
               better managing startup applications and
                   user histories, logs and deleted files
                                    registry
                         your computer’s registry
                                 services
Norton
Internet
Security per
Mac
Why Norton Internet Security for Mac?
• The Web is now the primary conduit for
attack activity.

• Threats are targeting people and their
information, NOT a particular operating
system or type of computer.

• Attackers are targeting confidential
information for financial gain.

• Users of any platform or operating system
are susceptible to identity theft through social
engineering attacks sometimes without
malware (e.g. Nigerian spam scams).
Norton Internet Security for Mac
• A next generation security suite that integrates an all-new firewall
and antivirus protection with tools to help protect against identity
theft.

• About one minute installation and an improved user interface
with fast, unobtrusive updates.

• Fully configurable settings for more technical users.

KEY TECHNOLOGIES
Antivirus                   Vulnerability protection
Antiphishing                Intrusion protection
                            Norton DeepSight™
Identity protection
Internet worm protection    Browser protection
Two-way firewall            File protection
Thank You!



Copyright © 2007 Symantec Corporation. All rights reserved. Symantec and the
Symantec Logo are trademarks or registered trademarks of Symantec Corporation
or its affiliates in the U.S. and other countries. Other names may be trademarks of
their respective owners.
This document is provided for informational purposes only and is not intended as
advertising. All warranties relating to the information in this document, either
express or implied, are disclaimed to the maximum extent allowed by law. The
information in this document is subject to change without notice

More Related Content

What's hot

Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Wen-Pai Lu
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Controlrkoscak
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentationdavebrosnan
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolationSierraware
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC PresentationCloudComputing
 
Zero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenZero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenBitdefender Enterprise
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General PresentationKsenia Kondratieva
 
US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderBitdefender Enterprise
 
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Lietuvos kompiuterininkų sąjunga
 
Browser Compete - IE8 FireStarter
Browser Compete - IE8 FireStarterBrowser Compete - IE8 FireStarter
Browser Compete - IE8 FireStarterMithun T. Dhar
 

What's hot (11)

Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Control
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolation
 
RSA SecurID Access
RSA SecurID AccessRSA SecurID Access
RSA SecurID Access
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
Zero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenZero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xen
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General Presentation
 
US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to Bitdefender
 
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
 
Browser Compete - IE8 FireStarter
Browser Compete - IE8 FireStarterBrowser Compete - IE8 FireStarter
Browser Compete - IE8 FireStarter
 

Viewers also liked

Lending To Automobile Dealers Credit Risk Issues
Lending To Automobile Dealers   Credit Risk IssuesLending To Automobile Dealers   Credit Risk Issues
Lending To Automobile Dealers Credit Risk Issueserikday
 
Power Point Bueno
Power Point BuenoPower Point Bueno
Power Point Buenotoni92
 
Judy Dandridge[1]
Judy Dandridge[1]Judy Dandridge[1]
Judy Dandridge[1]joshue2309
 
The Most Powerful Online Tool For Influencing B2 B Technology Buyers
The Most Powerful Online Tool For Influencing B2 B Technology BuyersThe Most Powerful Online Tool For Influencing B2 B Technology Buyers
The Most Powerful Online Tool For Influencing B2 B Technology BuyersMarCom Ink
 
Engl 701 (Spring 2009)
Engl 701 (Spring 2009)Engl 701 (Spring 2009)
Engl 701 (Spring 2009)samplereality
 
The Open Source Professor: Teaching, Research, and Transparency
The Open Source Professor: Teaching, Research, and TransparencyThe Open Source Professor: Teaching, Research, and Transparency
The Open Source Professor: Teaching, Research, and Transparencysamplereality
 
Judy Dandridge[2]
Judy Dandridge[2]Judy Dandridge[2]
Judy Dandridge[2]joshue2309
 
How B2B Technology Companies Effectively Syndicate White Papers for Lead Gene...
How B2B Technology Companies Effectively Syndicate White Papers for Lead Gene...How B2B Technology Companies Effectively Syndicate White Papers for Lead Gene...
How B2B Technology Companies Effectively Syndicate White Papers for Lead Gene...MarCom Ink
 
Get In The Drivers Seat Of Lending To Automobile Dealerships
Get In The Drivers Seat Of Lending To Automobile DealershipsGet In The Drivers Seat Of Lending To Automobile Dealerships
Get In The Drivers Seat Of Lending To Automobile Dealershipserikday
 
What Is Alfresco
What Is AlfrescoWhat Is Alfresco
What Is Alfrescofosulliv
 
Social media! are you ready?
Social media! are you ready?Social media! are you ready?
Social media! are you ready?Ayman Hindam
 

Viewers also liked (16)

Lending To Automobile Dealers Credit Risk Issues
Lending To Automobile Dealers   Credit Risk IssuesLending To Automobile Dealers   Credit Risk Issues
Lending To Automobile Dealers Credit Risk Issues
 
Power Point Bueno
Power Point BuenoPower Point Bueno
Power Point Bueno
 
Judy Dandridge[1]
Judy Dandridge[1]Judy Dandridge[1]
Judy Dandridge[1]
 
The Most Powerful Online Tool For Influencing B2 B Technology Buyers
The Most Powerful Online Tool For Influencing B2 B Technology BuyersThe Most Powerful Online Tool For Influencing B2 B Technology Buyers
The Most Powerful Online Tool For Influencing B2 B Technology Buyers
 
целина
целинацелина
целина
 
Engl 701 (Spring 2009)
Engl 701 (Spring 2009)Engl 701 (Spring 2009)
Engl 701 (Spring 2009)
 
The Open Source Professor: Teaching, Research, and Transparency
The Open Source Professor: Teaching, Research, and TransparencyThe Open Source Professor: Teaching, Research, and Transparency
The Open Source Professor: Teaching, Research, and Transparency
 
Judy Dandridge[2]
Judy Dandridge[2]Judy Dandridge[2]
Judy Dandridge[2]
 
Coca-Cola
Coca-ColaCoca-Cola
Coca-Cola
 
целина
целинацелина
целина
 
How B2B Technology Companies Effectively Syndicate White Papers for Lead Gene...
How B2B Technology Companies Effectively Syndicate White Papers for Lead Gene...How B2B Technology Companies Effectively Syndicate White Papers for Lead Gene...
How B2B Technology Companies Effectively Syndicate White Papers for Lead Gene...
 
Get In The Drivers Seat Of Lending To Automobile Dealerships
Get In The Drivers Seat Of Lending To Automobile DealershipsGet In The Drivers Seat Of Lending To Automobile Dealerships
Get In The Drivers Seat Of Lending To Automobile Dealerships
 
What Is Alfresco
What Is AlfrescoWhat Is Alfresco
What Is Alfresco
 
Social media! are you ready?
Social media! are you ready?Social media! are you ready?
Social media! are you ready?
 
Infinitivo
InfinitivoInfinitivo
Infinitivo
 
Saga Processes
Saga ProcessesSaga Processes
Saga Processes
 

Similar to Spring Launch Highlights New Norton 360 Features

ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...Robert Conti Jr.
 
Ajax World West I Phone Summit
Ajax World West I Phone SummitAjax World West I Phone Summit
Ajax World West I Phone Summitrajivmordani
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-usPelos TCHIKAYA
 
Learn About Disaster Recovery Services
Learn About Disaster Recovery ServicesLearn About Disaster Recovery Services
Learn About Disaster Recovery ServicesBradley Smith
 
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessWebinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessStorage Switzerland
 
Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.Webroot
 
cWizard Overview
cWizard OverviewcWizard Overview
cWizard Overviewbwarrick
 
Penetration Testing as an auditing tool
Penetration Testing as an auditing toolPenetration Testing as an auditing tool
Penetration Testing as an auditing toolsyrinxtech
 
Webinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A RealityWebinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A RealityStorage Switzerland
 
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...Symantec
 
Bryan Jones - Resume
Bryan Jones - ResumeBryan Jones - Resume
Bryan Jones - ResumeBryan Jones
 
Next Generation Datacenter Oracle - Alan Hartwell
Next Generation Datacenter Oracle - Alan HartwellNext Generation Datacenter Oracle - Alan Hartwell
Next Generation Datacenter Oracle - Alan HartwellHPDutchWorld
 
Oracle - Next Generation Datacenter - Alan Hartwell
Oracle - Next Generation Datacenter - Alan HartwellOracle - Next Generation Datacenter - Alan Hartwell
Oracle - Next Generation Datacenter - Alan HartwellHPDutchWorld
 

Similar to Spring Launch Highlights New Norton 360 Features (20)

ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
 
Ajax World West I Phone Summit
Ajax World West I Phone SummitAjax World West I Phone Summit
Ajax World West I Phone Summit
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Desk Maintenance
Desk MaintenanceDesk Maintenance
Desk Maintenance
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-us
 
Becoming a Power User
Becoming a Power UserBecoming a Power User
Becoming a Power User
 
Learn About Disaster Recovery Services
Learn About Disaster Recovery ServicesLearn About Disaster Recovery Services
Learn About Disaster Recovery Services
 
sym
symsym
sym
 
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessWebinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
 
Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.
 
cWizard Overview
cWizard OverviewcWizard Overview
cWizard Overview
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
Monitis Internal Monitoring
Monitis Internal MonitoringMonitis Internal Monitoring
Monitis Internal Monitoring
 
Penetration Testing as an auditing tool
Penetration Testing as an auditing toolPenetration Testing as an auditing tool
Penetration Testing as an auditing tool
 
Webinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A RealityWebinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A Reality
 
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
 
Bryan Jones - Resume
Bryan Jones - ResumeBryan Jones - Resume
Bryan Jones - Resume
 
Returnil 2010
Returnil 2010Returnil 2010
Returnil 2010
 
Next Generation Datacenter Oracle - Alan Hartwell
Next Generation Datacenter Oracle - Alan HartwellNext Generation Datacenter Oracle - Alan Hartwell
Next Generation Datacenter Oracle - Alan Hartwell
 
Oracle - Next Generation Datacenter - Alan Hartwell
Oracle - Next Generation Datacenter - Alan HartwellOracle - Next Generation Datacenter - Alan Hartwell
Oracle - Next Generation Datacenter - Alan Hartwell
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Spring Launch Highlights New Norton 360 Features

  • 1. Spring Launch March 2009 Con Mallon, Director Regional Product Marketing, Consumer Division
  • 2. Evasion & Deception Techniques Driving Massive Amounts of New Malware # of New Malware by Year 1200000 1000000 In 2008 In 2000 800000 12,000 5 600000 detections a day detections a day 400000 200000 0 2002 2003 2004 2005 2006 2007 2008 Source: Symantec Global Intelligence Network 10/08
  • 3. Threat Landscape Updates: Web Based Attacks • Web Based Attack Trends: March 2009
  • 4. Misleading Applications • 23 Million Infection Attempts in 6 months *Norton Community Watch • Installed along with a Trojan horse program • Produce false or misleading results • Hold PC hostage to remedy pretend threats
  • 5. Norton 360 v3.0 & Norton Safe Web
  • 6. Norton 360 v3.0 – What’s New? Norton 360 v3.0 sets the industry standard by being the fastest, lightest, most comprehensive and most usable all-in-one suite in the market. • Performance Enhancements • Security Innovations & Norton Safe Web • Friendlier & More Flexible Backup • Get the Most Out of Your PC with Tuneup & Diagnostic Features
  • 7. Consumers Demand High Performance 1M 40% 31% Many people have under-powered systems & already have performance problems. People contact Have less than 512 Have 1 GB of RAM Norton technical MB of RAM & 75% & 57% memory support each month memory utilization utilization
  • 8. Norton 360 v3.0 Performance Targets Install Time: ~60 seconds • 1x10x110 Internal Challenge – Install Time: One Minute – Memory Usage: < 10MB at Idle – Reduced Install Size: 110MB • Tracking Dozens of Performance Metrics Memory at Idle: – Initial and Subsequent Scan Time <10 MB – Boot Time Impact – # of Processes – Streamlined Install Steps 8
  • 9. Beyond Whitelisting: Norton Insight New Security Model That Dramatically Reduces Scanning • Less Scanning Needed – Only un-trusted applications are analyzed by Norton • Behavioral Safety Scoring – Programs are also rated by SONAR’s behavior analysis to determine their trust level • Driven by Online Intelligence – A program may be considered trusted based on the Norton Community or Norton Research
  • 10. Pulse Updates Norton is updated nearly 5 times more often than the nearest competitor AV-Test, Sep. 2008 A new definition every 5-15 minutes on average
  • 11. Listening to Our Users • Silent Mode • Advanced Firewall Settings options • Detailed Activity History for security, backup and tuneup tasks • Backup Source Selection • Custom File Type Management
  • 12. Robust Identity Protection • Simplified & Robust – Simplified toolbar and new settings options – Online tutorial – Import logins from IE – Ability to clone cards
  • 13. Norton Safe Web A Web site rating service that extends protection to everyday consumer online activities – search, browse, transact, and interact Provides a trusted visual indicator Protects consumers from sites that can infect them Protects consumers from sites that might misuse their personal information Helps consumers identify sites they can safely transact with
  • 14. How Safe Web Works • Adds site safety ratings to Google, Yahoo! and Live.com search results • Integrates current page rating into the Norton toolbar with roll-over summarizing the site safety profile • Provides easy access to the detailed site rating report and community feedback
  • 15. Ecommerce Safety • Safe Web includes key ecommerce safety indictors to help users make information decisions when shopping and transacting online – 85% of U.S Internet users surveyed said being able to trust websites with their confidential information was the most important factor when transacting online1 – More than 2/3 of users indicated that ecommerce reputation would be extremely useful to them2 1 eMarketer, September2008 2 Symantec Primary Research, June 2007
  • 16. Friendly, Flexible Backup • Friendly – Backup Tutorial – Tabbed Backup Settings – Portable Restore for Optical and Removable Media • Flexible – Norton Backup Drive – Backup History – Multiple Backup Sets – Backup Source Support – File Type Management – 25GB for N360 Premier
  • 17. PC TuneUp – Smart Startup Manager Turns off unnecessary programs to speed up startup time • Easy to Use – Program Name and Publisher described – On/Off/Delay options – Sortable Columns • Smart – Performance Impact measured – Users notified about new startup items
  • 18. PC Tuneup: Diagnostic Report • Thorough – Comprehensive system snapshot – 10 point check for troubleshooting – Recommends appropriate fixes • Easy – Can be printed, saved, or emailed to friends, family, or technicians – Collapsible and expandable sections
  • 19. PC Tuneup – Monthly Report • Activity Summary – Automatically generated – Highlights subscription status • User Guidance – Tips about new or advanced features – Additional support options through NortonLive
  • 20. Feature Overview: Norton 360 3.0  Backup Tutorial  Smart Startup Manager  One-Minute Install, Norton  Norton Safe Web Insight, & Pulse Updates  Norton Backup Drive  Diagnostic Report  Shopping Safety  Low System Resource  Backup History  Monthly Activity Report  Identity Safe Usability Utilization Enhancements  Multiple Backup Sets  Tuneup History  Browser Protection for IE  Identity Safe Tutorial  File Type Management  File & Browser Cleanup and Firefox  Login Import from IE  Automatic Content  Registry Cleanup  Antispam Detection & Categorization  Identity Safe Password  Disk Defragmentation  Antivirus and Antispyware Management  Backup Status Overlays  SONAR Behavioral  Phishing Protection for IE  Secure Online Backup Detection and Firefox  Two-way Firewall  Web Site Authentication for  Intrusion Prevention IE and Firefox Silent Mode, Enhanced Backup Usability, Updated QuickTasks Menus and Quick Controls Panel, Usability: Idle Scheduler, Streamlined Navigation, Activity-Based Messaging
  • 22. Backup by the numbers 95% Fear losing their PC data more than a tax audit 53% Annual growth in consumer storage 2% Back up online
  • 23. What is Norton Online Backup? Norton Online Backup: secure, automatic protection of your cherished digital photos and important files • Key Benefits – Single secure dashboard to manage backups for all your photos and files across all your family PCs – Protects important files against loss, damage, and other disasters – Quickly restores lost or deleted files to any web-enabled computer – Automatic backup lets you install it and forget it 2
  • 24. How Norton Online Backup Works 1 2 3 4 Login from any Manage all of the Manage Restore your data internet connection computers in your backup jobs household from a single dashboard 24
  • 25. Norton Online Backup Keep your digital photos and files safe and secure Highly Available Easy Secure • Secure web portal • Block-level • Automatic backup incremental backups • Restore to any PC with • One backup location for • 256-bit AES supported Web browser multiple household PCs encryption on servers • Protect on the go • Use existing • 128-bit SSL encryption Norton account • Access multiple PCs in transfer • Automatic scheduling data via Web • Data compression to just let it run • File redundancy between • 1-click “Backup Now” data centers • Status reporting • Professional managed, highly secure data centers 25 2
  • 27. Why A New Norton Utilities? 9
  • 28. Today’s Norton Utilities Norton Utilities is designed for people who want to extend the life of a struggling or troubled PC. Situations where this may be the case include; An older PC is struggling to run software that used to run when the PC was newer. A heavily used PC has slowed down after a particular activity (such as installing software). A PC is experiencing instability such as hanging or freezing. An underpowered PC (slow disk drives or low amount of memory) runs sluggishly.
  • 29. Norton Utilities @ a Glance Stability Privacy Performance Boot Time Reduce theperformance through the PC by Increase time itstability through Improve takes to start increased available memory andthrough removal of Improve your privacy and optimization of repair, maintenance optimized disks and better managing startup applications and user histories, logs and deleted files registry your computer’s registry services
  • 31. Why Norton Internet Security for Mac? • The Web is now the primary conduit for attack activity. • Threats are targeting people and their information, NOT a particular operating system or type of computer. • Attackers are targeting confidential information for financial gain. • Users of any platform or operating system are susceptible to identity theft through social engineering attacks sometimes without malware (e.g. Nigerian spam scams).
  • 32. Norton Internet Security for Mac • A next generation security suite that integrates an all-new firewall and antivirus protection with tools to help protect against identity theft. • About one minute installation and an improved user interface with fast, unobtrusive updates. • Fully configurable settings for more technical users. KEY TECHNOLOGIES Antivirus Vulnerability protection Antiphishing Intrusion protection Norton DeepSight™ Identity protection Internet worm protection Browser protection Two-way firewall File protection
  • 33. Thank You! Copyright © 2007 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice