SlideShare a Scribd company logo
1 of 1
Runtime Packers File Infector Clustered Grafos Emulation Multi-scanner Installers Clustered Grouping Heuristics Behavioral Sandboxing Correlation Over 20.000 new files are imported every day into PandaLabs. These come from customers, competitors, honeypots, CERTs, malicious URLs, online scanners such as VirusTotal, Jotti, etc. When a PC protected by Panda encounters a new file which is not detected by local signatures, heuristics or behavioral analysis, its “behavioral traits” are extracted and analyzed remotely by the PandaLabs Collective Intelligence cloud to determine if the new file is malicious or harmless. New viruses and malware are detected and blocked remotely and automatically almost in real-time without having to send the file to the lab for manual analysis and wait for an answer. The result is that customers are protected against new malware much faster than using traditional signature update approches.

More Related Content

More from Yolanda Ruiz Hervás

Penetracion de las nuevas tecnologias en el comercio local de Alimentación y ...
Penetracion de las nuevas tecnologias en el comercio local de Alimentación y ...Penetracion de las nuevas tecnologias en el comercio local de Alimentación y ...
Penetracion de las nuevas tecnologias en el comercio local de Alimentación y ...Yolanda Ruiz Hervás
 
Informe cuatrimestral-eset-españa
Informe cuatrimestral-eset-españaInforme cuatrimestral-eset-españa
Informe cuatrimestral-eset-españaYolanda Ruiz Hervás
 
Fraude en el mercado de compra venta de segunda mano - ESET España
Fraude en el mercado de compra venta de segunda mano - ESET EspañaFraude en el mercado de compra venta de segunda mano - ESET España
Fraude en el mercado de compra venta de segunda mano - ESET EspañaYolanda Ruiz Hervás
 
Informe cuatrimestral de Seguridad ESET NOD32 Antivirus 2014 (enero-abril)
Informe cuatrimestral de Seguridad ESET NOD32 Antivirus 2014 (enero-abril)Informe cuatrimestral de Seguridad ESET NOD32 Antivirus 2014 (enero-abril)
Informe cuatrimestral de Seguridad ESET NOD32 Antivirus 2014 (enero-abril)Yolanda Ruiz Hervás
 
Guia de seguridad digital del trabajador - ESET NOD32 Antivirus
Guia de seguridad digital del trabajador - ESET NOD32 AntivirusGuia de seguridad digital del trabajador - ESET NOD32 Antivirus
Guia de seguridad digital del trabajador - ESET NOD32 AntivirusYolanda Ruiz Hervás
 
Eset nod32 antivirus_informe_cuatrimestral_seguridad_2013_mayo_agosto2
Eset nod32 antivirus_informe_cuatrimestral_seguridad_2013_mayo_agosto2Eset nod32 antivirus_informe_cuatrimestral_seguridad_2013_mayo_agosto2
Eset nod32 antivirus_informe_cuatrimestral_seguridad_2013_mayo_agosto2Yolanda Ruiz Hervás
 
Eset nod32-antivirus-consejos-seguridad-vacaciones
Eset nod32-antivirus-consejos-seguridad-vacacionesEset nod32-antivirus-consejos-seguridad-vacaciones
Eset nod32-antivirus-consejos-seguridad-vacacionesYolanda Ruiz Hervás
 
ESET NOD32 España: Informe cuatrimestral de seguridad (enero - abril 2013)
ESET NOD32 España: Informe cuatrimestral de seguridad (enero - abril 2013)ESET NOD32 España: Informe cuatrimestral de seguridad (enero - abril 2013)
ESET NOD32 España: Informe cuatrimestral de seguridad (enero - abril 2013)Yolanda Ruiz Hervás
 
ESET NOD32 Antivirus: análisis técnico de Poker Agent, troyano de Facebook
ESET NOD32 Antivirus: análisis técnico de Poker Agent, troyano de FacebookESET NOD32 Antivirus: análisis técnico de Poker Agent, troyano de Facebook
ESET NOD32 Antivirus: análisis técnico de Poker Agent, troyano de FacebookYolanda Ruiz Hervás
 
ESET NOD32 Antivirus - Informe anual de Seguridad - Facebook y Twitter, prota...
ESET NOD32 Antivirus - Informe anual de Seguridad - Facebook y Twitter, prota...ESET NOD32 Antivirus - Informe anual de Seguridad - Facebook y Twitter, prota...
ESET NOD32 Antivirus - Informe anual de Seguridad - Facebook y Twitter, prota...Yolanda Ruiz Hervás
 
Eset España NOD32 Antivirus - Informe técnico troyano para Android Boxer
Eset España NOD32 Antivirus - Informe técnico troyano para Android BoxerEset España NOD32 Antivirus - Informe técnico troyano para Android Boxer
Eset España NOD32 Antivirus - Informe técnico troyano para Android BoxerYolanda Ruiz Hervás
 
ESET España - NOD32 Antivirus - Cibercrimen 2012
ESET España - NOD32 Antivirus - Cibercrimen 2012ESET España - NOD32 Antivirus - Cibercrimen 2012
ESET España - NOD32 Antivirus - Cibercrimen 2012Yolanda Ruiz Hervás
 
Análisis técnico de Flashback, el troyano para Mac que ya ha infectado a más ...
Análisis técnico de Flashback, el troyano para Mac que ya ha infectado a más ...Análisis técnico de Flashback, el troyano para Mac que ya ha infectado a más ...
Análisis técnico de Flashback, el troyano para Mac que ya ha infectado a más ...Yolanda Ruiz Hervás
 
Eset españa informe cuatrimestral de seguridad (mayo agosto)
Eset españa informe cuatrimestral de seguridad (mayo agosto)Eset españa informe cuatrimestral de seguridad (mayo agosto)
Eset españa informe cuatrimestral de seguridad (mayo agosto)Yolanda Ruiz Hervás
 
Informe cuatrimestral de seguridad eset españa
Informe cuatrimestral de seguridad eset españaInforme cuatrimestral de seguridad eset españa
Informe cuatrimestral de seguridad eset españaYolanda Ruiz Hervás
 
Análisis técnico de win32 georbot
Análisis técnico de win32 georbotAnálisis técnico de win32 georbot
Análisis técnico de win32 georbotYolanda Ruiz Hervás
 
Informe Anual de Seguridad de ESET España
Informe Anual de Seguridad de ESET EspañaInforme Anual de Seguridad de ESET España
Informe Anual de Seguridad de ESET EspañaYolanda Ruiz Hervás
 
Estudio de seguridad en móviles - lanzamiento ESET Mobile Security para Android
Estudio de seguridad en móviles - lanzamiento ESET Mobile Security para AndroidEstudio de seguridad en móviles - lanzamiento ESET Mobile Security para Android
Estudio de seguridad en móviles - lanzamiento ESET Mobile Security para AndroidYolanda Ruiz Hervás
 
Informe tns la influencia de internet en las decisiones de compra (1)
Informe tns la influencia de internet en las decisiones de compra (1)Informe tns la influencia de internet en las decisiones de compra (1)
Informe tns la influencia de internet en las decisiones de compra (1)Yolanda Ruiz Hervás
 

More from Yolanda Ruiz Hervás (20)

Penetracion de las nuevas tecnologias en el comercio local de Alimentación y ...
Penetracion de las nuevas tecnologias en el comercio local de Alimentación y ...Penetracion de las nuevas tecnologias en el comercio local de Alimentación y ...
Penetracion de las nuevas tecnologias en el comercio local de Alimentación y ...
 
Informe cuatrimestral-eset-españa
Informe cuatrimestral-eset-españaInforme cuatrimestral-eset-españa
Informe cuatrimestral-eset-españa
 
Fraude en el mercado de compra venta de segunda mano - ESET España
Fraude en el mercado de compra venta de segunda mano - ESET EspañaFraude en el mercado de compra venta de segunda mano - ESET España
Fraude en el mercado de compra venta de segunda mano - ESET España
 
Informe cuatrimestral de Seguridad ESET NOD32 Antivirus 2014 (enero-abril)
Informe cuatrimestral de Seguridad ESET NOD32 Antivirus 2014 (enero-abril)Informe cuatrimestral de Seguridad ESET NOD32 Antivirus 2014 (enero-abril)
Informe cuatrimestral de Seguridad ESET NOD32 Antivirus 2014 (enero-abril)
 
Guia de seguridad digital del trabajador - ESET NOD32 Antivirus
Guia de seguridad digital del trabajador - ESET NOD32 AntivirusGuia de seguridad digital del trabajador - ESET NOD32 Antivirus
Guia de seguridad digital del trabajador - ESET NOD32 Antivirus
 
Eset nod32 antivirus_informe_cuatrimestral_seguridad_2013_mayo_agosto2
Eset nod32 antivirus_informe_cuatrimestral_seguridad_2013_mayo_agosto2Eset nod32 antivirus_informe_cuatrimestral_seguridad_2013_mayo_agosto2
Eset nod32 antivirus_informe_cuatrimestral_seguridad_2013_mayo_agosto2
 
Eset nod32-antivirus-consejos-seguridad-vacaciones
Eset nod32-antivirus-consejos-seguridad-vacacionesEset nod32-antivirus-consejos-seguridad-vacaciones
Eset nod32-antivirus-consejos-seguridad-vacaciones
 
ESET NOD32 España: Informe cuatrimestral de seguridad (enero - abril 2013)
ESET NOD32 España: Informe cuatrimestral de seguridad (enero - abril 2013)ESET NOD32 España: Informe cuatrimestral de seguridad (enero - abril 2013)
ESET NOD32 España: Informe cuatrimestral de seguridad (enero - abril 2013)
 
las-1000-redes-sociales-del-mundo
las-1000-redes-sociales-del-mundolas-1000-redes-sociales-del-mundo
las-1000-redes-sociales-del-mundo
 
ESET NOD32 Antivirus: análisis técnico de Poker Agent, troyano de Facebook
ESET NOD32 Antivirus: análisis técnico de Poker Agent, troyano de FacebookESET NOD32 Antivirus: análisis técnico de Poker Agent, troyano de Facebook
ESET NOD32 Antivirus: análisis técnico de Poker Agent, troyano de Facebook
 
ESET NOD32 Antivirus - Informe anual de Seguridad - Facebook y Twitter, prota...
ESET NOD32 Antivirus - Informe anual de Seguridad - Facebook y Twitter, prota...ESET NOD32 Antivirus - Informe anual de Seguridad - Facebook y Twitter, prota...
ESET NOD32 Antivirus - Informe anual de Seguridad - Facebook y Twitter, prota...
 
Eset España NOD32 Antivirus - Informe técnico troyano para Android Boxer
Eset España NOD32 Antivirus - Informe técnico troyano para Android BoxerEset España NOD32 Antivirus - Informe técnico troyano para Android Boxer
Eset España NOD32 Antivirus - Informe técnico troyano para Android Boxer
 
ESET España - NOD32 Antivirus - Cibercrimen 2012
ESET España - NOD32 Antivirus - Cibercrimen 2012ESET España - NOD32 Antivirus - Cibercrimen 2012
ESET España - NOD32 Antivirus - Cibercrimen 2012
 
Análisis técnico de Flashback, el troyano para Mac que ya ha infectado a más ...
Análisis técnico de Flashback, el troyano para Mac que ya ha infectado a más ...Análisis técnico de Flashback, el troyano para Mac que ya ha infectado a más ...
Análisis técnico de Flashback, el troyano para Mac que ya ha infectado a más ...
 
Eset españa informe cuatrimestral de seguridad (mayo agosto)
Eset españa informe cuatrimestral de seguridad (mayo agosto)Eset españa informe cuatrimestral de seguridad (mayo agosto)
Eset españa informe cuatrimestral de seguridad (mayo agosto)
 
Informe cuatrimestral de seguridad eset españa
Informe cuatrimestral de seguridad eset españaInforme cuatrimestral de seguridad eset españa
Informe cuatrimestral de seguridad eset españa
 
Análisis técnico de win32 georbot
Análisis técnico de win32 georbotAnálisis técnico de win32 georbot
Análisis técnico de win32 georbot
 
Informe Anual de Seguridad de ESET España
Informe Anual de Seguridad de ESET EspañaInforme Anual de Seguridad de ESET España
Informe Anual de Seguridad de ESET España
 
Estudio de seguridad en móviles - lanzamiento ESET Mobile Security para Android
Estudio de seguridad en móviles - lanzamiento ESET Mobile Security para AndroidEstudio de seguridad en móviles - lanzamiento ESET Mobile Security para Android
Estudio de seguridad en móviles - lanzamiento ESET Mobile Security para Android
 
Informe tns la influencia de internet en las decisiones de compra (1)
Informe tns la influencia de internet en las decisiones de compra (1)Informe tns la influencia de internet en las decisiones de compra (1)
Informe tns la influencia de internet en las decisiones de compra (1)
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Collective Intelligence

  • 1. Runtime Packers File Infector Clustered Grafos Emulation Multi-scanner Installers Clustered Grouping Heuristics Behavioral Sandboxing Correlation Over 20.000 new files are imported every day into PandaLabs. These come from customers, competitors, honeypots, CERTs, malicious URLs, online scanners such as VirusTotal, Jotti, etc. When a PC protected by Panda encounters a new file which is not detected by local signatures, heuristics or behavioral analysis, its “behavioral traits” are extracted and analyzed remotely by the PandaLabs Collective Intelligence cloud to determine if the new file is malicious or harmless. New viruses and malware are detected and blocked remotely and automatically almost in real-time without having to send the file to the lab for manual analysis and wait for an answer. The result is that customers are protected against new malware much faster than using traditional signature update approches.

Editor's Notes

  1. … I ‘ve represented here the distributed systems of our users, which interact with your infrastructure, managed by PandaLabs, so that (click forward), if a new executable appears, it will provide some basic data (click forward) , such as behavioral traces, date and time of first appearance, and so on. This information alone may not be sufficient to reach a determination, but if we see the same program (click forward) appearing in a different corner of the world, showing a different behavior, we can then correlate those two behaviors and have sufficient evidence…that the program was in fact malware (click forward), and we can instruct the agents (click forward) to block or eliminate the malicious code. Malware does not manifest its behavior all the time, so this approach allows us to become smarter and to detect malware much earlier. This is just an example of the benefits of using this approach. It is important to note that we do not collect personal information, and that based on the specific data we receive, we cannot trace users, you would always need an ISP to be able to do that… In essence, we get global visibility about the activities of malware, and by connecting sensors to our infrastructure we can continuously correlate the different pieces of data, which results in automatic classification of files in a totally transparent fashion. We believe that, most of the times, users cannot take informed decisions when security products ask them what do they want to do with a program. That is why we believe that security should become as a transparent, but always present, component in their computing experience. TRANSITION TO NEXT SLIDE: overcoming the limitations of the predominant model today, the “local” approach, is what we are doing…