SlideShare una empresa de Scribd logo
1 de 29
Alexandru LUCA – Business Developer Manager CEE, Baltics, Turkey and Israel
“Bitdefender is riding high this season”
PC MAG, Lead Security Analyst Neil J. Rubenking, January 2013

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 2
2013 starts HIGH TECH

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 3
Life 2.0+
New World. Complicated.
New Threats. Profit Driven.
New Technologies. Cost Driven.
New Devices. Connected.
New Security. Not Many Real Options.
Life 2.0+

E-Threats behind the Curtains

Teens and Geeks

WHO?

Cyber-criminals

–
–

–
–

Attention-Driven
Loner Profile

Profit-Driven
Highly Organized

High Profile Attacks

HOW?

Stealth Attacks

–
–

–
–

Social Engineering
Mass Mailers

–

Spyware/Adware
Automated Variant Creation and
Morphing
Persistent Threats

Lost productivity

WHAT?

Cyber-crime

–

–
–

–

Clogged E-mail Systems and
Networks
Help Desk and Data Loss Costs

Copyright@Bitdefender 2013/ www.Bitdefender.com

Identity Theft and Online Fraud
Highly Targeted Corporate
Information Attacks

11/21/2013 • 5
Life 2.0+

Magnitude of the Problem/Opportunity
Around 1.5M
unique
malware
samples are
discovered
every month!

Source: AV-Test Labs (www.av-test.org)

Source: av-test.org – New Malware Growth

•

“Even the best signature databases… have less than a 50% chance of catching
completely new threats. Signatures are extremely ineffective against targeted and “zero
day” threats.”
According to Gartner

•

“Nobody can win the war against malware with a signature-driven product, but more
proactive technologies are required ”

According to AV-Test’s Andreas Marx
Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 6
Life 2.0+

Are businesses or even governments protected ?


Launched in 2010 to target a nuclear power plant and an uranium enrichment facility, Stuxnet began to draw attention on
cyber-warfare.



In 2012, Flamer made headlines as it was discovered it had been in the wild for some five years.



One of the biggest and most dangerous e-threats in the world, Flamer incorporates more than 63 different files, including core
components and pluggins.



Governments admitted to having relied on malware for cyber-espionage



In 2012, Chinese cyber-criminals have attempted to hit military personnel with spam packed with 0-day Flash exploits

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 7
Market Landscape and Trends

Security Software Market Overview
New Market Trends

Freeware

•
•
•
•

•

Virtualization
The move to the cloud
BYOD
New consumer technologies and computing
models create new market opportunities
Emerging regions: Latin America, Asia/Pacific

•

Competitors
•
•

Top players: Symantec,
McAfee, TrendMicro
Market Challengers:
Kaspersky, AVG,
Bitdefender

Copyright@Bitdefender 2013/ www.Bitdefender.com

•
•
•

Free products have 20% of consumer user
base
Freeware is used for gradual monetization
IDC believes Free will become part of
Managed Security Service
Are the freeware players fighting for security
or for eyeballs (i.e. advertising revenues)?

Security Software Market
9 billion $ in 2013

Bitdefender
Technology leadership
Best products
Future Innovation

11/21/2013 • 9
Bitdefender at a Glance
Bitdefender at a Glance

A decade of innovation in technology
2000

•

First antivirus worldwide to offer intelligent updating

-

•

First antivirus product to include an application firewall

-

•

MIDAS (Malware Intrusion Detection Advanced System)- wins IST prize, “set to revolutionize AV design”

-

•

Bitdefender to release its proprietary Antispam technology

-

•

Bitdefender introduces B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments)

-

•

Spam Image Filter an important step in combating the new spamming techniques

2005

•

Bitdefender® Mobile Security to provide real-time protection for smartphones and PDAs

-

•

Bitdefender® Active Virus Control to innovate with a real time technology

-

•

60-Second QuickScan – The quickest way to find if your computer is infected by using this online scanner

-

•

Gravity Architecture enables new generation of security for highly scalable services

•

Bitdefender Safepay™ secures all e-banking and e-shopping in a separate iron-clad, secure browser

-

•

Security for Virtualized Environments – The 1st vShield 5 solution optimized for virtualized datacenters

-

•

Cloud Security for Endpoints to provide enterprise-class security with no on-site management server

2011

•

Bitdefender Clueful™, first application to show the world how iOS apps treat user's privacy

-

•

Hypervisor Agnostic Scanning Engine – allows Bitdefender to provide the best operational cost savings for virtualization
adopters

2012
•

2013

Intra-HV memory introspection engine - prototype that allows for detecting and preventing Virtual Machine kernel mode threats
across Microsoft/Linux/etc

Copyright@Bitdefender 2013/ www.Bitdefender.com
•
Bitdefender Photon™

technology boasts scanning speed and minimizes slowdowns

11/21/2013 • 11
Bitdefender at a Glance

Results in sustainable technogical leadership
 In five local offices, 250+ engineers in R&D team warrant that Bitdefender’s technology –
protecting more than 400 million users worldwide , technology partnerships included – is
the #1 Anti-Malware Security Technology in the world.
 #1 in Security Technology


In the AV-Test overall performance award for THE BEST REPAIR
IN 2012, 3 out of the first 4 rated endpoint security vendors are
using Bitdefender engines

 #1 in Antispam Technologies


Bitdefender analyzes and issues protection for 5 million
spam messages every day, or about 35 million per week.



Bitdefender has won all 24 VBSpam awards in a row in Virus
Bulletin’s (VB) antispam tests between May 2009 to March 2013

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 12
Bitdefender at a Glance

Consistent Leader in Antivirus Technology
Consumer AV Test Score: Protection, Repair, Usability (Average)
6.00

Bitdefender
5.50

Eset
McAfee

5.00

Avira
Trend Micro

4.50

4.00

Panda
Avg
Symantec

3.50

Kaspersky

3.00

2.50

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 13
Bitdefender at a Glance

Product of the Year in 2013
AV-Comparatives
•

Awarded “Product of the Year” in January 2013

•

The only AV to receive 100% in the most complex
test ran by AV-Comparatives. Apr 2013

AV-TEST
•

Leader in the 22 months endurance test!

•

Awarded “Best Repair for 2012”, in Jan 2013

PC MAG
•

Awarded “Best Antivirus of 2013” in Jan 2013.

VB100
•

Wins 12 VB100 awards in 2 years.

Approved Corporate Product for SVE & CSE

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 14
“Bitdefender clearly took the lead in the industry”
AV Comparatives, CEO Andreas Clementi, January 2013

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 15
Backup slides

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 17
Bitdefender at a Glance

Technological leadership transferred to product
 #1 in Consumer Products


First security software vendor to receive top recommendations simultaneously from the most important three
key independent organizations in the US, UK, and Germany!

 … and catching up in 2012 with the newly introduced Business Products

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 19
The New Brand

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 20
•

•
•

Dacia was a country located in Europe over the territories occupied today
by Romania, Moldova, Ukraine, Hungary and Serbia.
The “Dacian Draco” was the standard of the ancient Dacian military.
A wolf head combined with a snake body that made a whistling sound when
galloping due to the air that entered the wolf's mouth.

We have the sharp mind of the wolf, the slickness of the snake, the vigilance of
the alpha male and the indestructibility of the snake body!

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 21
Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 22
Vision

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 23
Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 24
Brand promise

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 25
Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 26
Logo

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 27
Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 28
Brand avatar

Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 29
Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 30
Copyright@Bitdefender 2013/ www.Bitdefender.com

11/21/2013 • 31

Más contenido relacionado

La actualidad más candente

Security Matters : The Evolution of Samsung KNOX™
Security Matters: The Evolution of Samsung KNOX™Security Matters: The Evolution of Samsung KNOX™
Security Matters : The Evolution of Samsung KNOX™Samsung at Work
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesWavestone
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentOnward Security
 
A History of IIoT Cyber-Attacks
A History of IIoT Cyber-Attacks A History of IIoT Cyber-Attacks
A History of IIoT Cyber-Attacks GlobalSign
 
BYOD: Bring Your Own Device or Danger?
BYOD: Bring Your Own Device or Danger?BYOD: Bring Your Own Device or Danger?
BYOD: Bring Your Own Device or Danger?Goutama Bachtiar
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...GlobalSign
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODCaston Thomas
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIPerry Lea
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Cisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalCisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalSorin Ciornei
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionEnclaveSecurity
 
Getronics enjoys higher productivity and increased mobility with Windows 8
Getronics enjoys higher productivity and increased mobility with Windows 8Getronics enjoys higher productivity and increased mobility with Windows 8
Getronics enjoys higher productivity and increased mobility with Windows 8Quadrant Communications
 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerData Con LA
 
IoT is Here. Is Your Facility Ready?
IoT is Here. Is Your Facility Ready?IoT is Here. Is Your Facility Ready?
IoT is Here. Is Your Facility Ready?Senseware
 
Apr 28-2015 vasco investor presentation
Apr 28-2015 vasco investor presentationApr 28-2015 vasco investor presentation
Apr 28-2015 vasco investor presentationVASCO Data Security
 
Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0Ishay Tentser
 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...ProductNation/iSPIRT
 
IIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingIIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingLisa Waddell
 

La actualidad más candente (20)

Security Matters : The Evolution of Samsung KNOX™
Security Matters: The Evolution of Samsung KNOX™Security Matters: The Evolution of Samsung KNOX™
Security Matters : The Evolution of Samsung KNOX™
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
 
How to Lead in IIoT
How to Lead in IIoTHow to Lead in IIoT
How to Lead in IIoT
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT Equipment
 
A History of IIoT Cyber-Attacks
A History of IIoT Cyber-Attacks A History of IIoT Cyber-Attacks
A History of IIoT Cyber-Attacks
 
BYOD: Bring Your Own Device or Danger?
BYOD: Bring Your Own Device or Danger?BYOD: Bring Your Own Device or Danger?
BYOD: Bring Your Own Device or Danger?
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYOD
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROI
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Cisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalCisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_final
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 
Getronics enjoys higher productivity and increased mobility with Windows 8
Getronics enjoys higher productivity and increased mobility with Windows 8Getronics enjoys higher productivity and increased mobility with Windows 8
Getronics enjoys higher productivity and increased mobility with Windows 8
 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry Power
 
IoT is Here. Is Your Facility Ready?
IoT is Here. Is Your Facility Ready?IoT is Here. Is Your Facility Ready?
IoT is Here. Is Your Facility Ready?
 
Apr 28-2015 vasco investor presentation
Apr 28-2015 vasco investor presentationApr 28-2015 vasco investor presentation
Apr 28-2015 vasco investor presentation
 
Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0
 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
 
IIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingIIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturing
 

Similar a Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender technologijas“ (Rumunija)

US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderBitdefender Enterprise
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorIBMGovernmentCA
 
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Lietuvos kompiuterininkų sąjunga
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxssuser365526
 
Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...Mindtree Ltd.
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Ulrich Seldeslachts
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsBitbar
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend BriefBill Chamberlin
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsBlueboxer2014
 
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...Internet 2Conf
 

Similar a Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender technologijas“ (Rumunija) (20)

US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to Bitdefender
 
Bitdefender, Ana Cobzaru
Bitdefender, Ana CobzaruBitdefender, Ana Cobzaru
Bitdefender, Ana Cobzaru
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
 
Microsoft Company
Microsoft CompanyMicrosoft Company
Microsoft Company
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
 
IBM Smarter Cities
IBM Smarter CitiesIBM Smarter Cities
IBM Smarter Cities
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
 
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
 

Más de Lietuvos kompiuterininkų sąjunga

Eimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizė
Eimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizėEimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizė
Eimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizėLietuvos kompiuterininkų sąjunga
 
B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...
B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...
B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...Lietuvos kompiuterininkų sąjunga
 
D. Dluznevskij. YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemose
D. Dluznevskij.  YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemoseD. Dluznevskij.  YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemose
D. Dluznevskij. YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemoseLietuvos kompiuterininkų sąjunga
 
I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...
I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...
I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...Lietuvos kompiuterininkų sąjunga
 
E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...
E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...
E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...Lietuvos kompiuterininkų sąjunga
 
V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...
V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...
V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...Lietuvos kompiuterininkų sąjunga
 
Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...
Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...
Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...Lietuvos kompiuterininkų sąjunga
 
Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...
Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...
Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...Lietuvos kompiuterininkų sąjunga
 
Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...
Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...
Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...Lietuvos kompiuterininkų sąjunga
 
Gražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizė
Gražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizėGražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizė
Gražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizėLietuvos kompiuterininkų sąjunga
 
Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?
Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?
Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?Lietuvos kompiuterininkų sąjunga
 
Tomas Kasperavičius. Robotikos realizacija edukacinėje erdvėje
Tomas Kasperavičius. Robotikos realizacija edukacinėje erdvėjeTomas Kasperavičius. Robotikos realizacija edukacinėje erdvėje
Tomas Kasperavičius. Robotikos realizacija edukacinėje erdvėjeLietuvos kompiuterininkų sąjunga
 
Paulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėje
Paulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėjePaulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėje
Paulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėjeLietuvos kompiuterininkų sąjunga
 

Más de Lietuvos kompiuterininkų sąjunga (20)

LIKS ataskaita 2021-2023
LIKS ataskaita 2021-2023LIKS ataskaita 2021-2023
LIKS ataskaita 2021-2023
 
Eimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizė
Eimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizėEimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizė
Eimutis KARČIAUSKAS. Informatikos mokymo pasiekimų vertinimų analizė
 
B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...
B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...
B. Čiapas. Prekių atpažinimo tyrimas naudojant giliuosius neuroninius tinklus...
 
D. Dluznevskij. YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemose
D. Dluznevskij.  YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemoseD. Dluznevskij.  YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemose
D. Dluznevskij. YOLOv5 efektyvumo tyrimas „iPhone“ palaikomose sistemose
 
I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...
I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...
I. Jakšaitytė. Nuotoliniai kursai informatikos mokytojų kvalifikacijai kelti:...
 
G. Mezetis. Skaimenines valstybes link
G. Mezetis. Skaimenines valstybes link G. Mezetis. Skaimenines valstybes link
G. Mezetis. Skaimenines valstybes link
 
E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...
E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...
E..Zikariene. Priziurima aplinkos duomenu klasifikacija, pagrista erdviniais ...
 
V. Jakuška. Ką reikėtu žinoti apie .lt domeną?
V. Jakuška. Ką reikėtu žinoti apie .lt domeną?V. Jakuška. Ką reikėtu žinoti apie .lt domeną?
V. Jakuška. Ką reikėtu žinoti apie .lt domeną?
 
V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...
V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...
V. Marcinkevičius. ARIS dirbtinio intelekto kurso mokymosi medžiaga, www.aris...
 
Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...
Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...
Jolanta Navickaitė. Skaitmeninė kompetencija ir informatikos naujovės bendraj...
 
Raimundas Matylevičius. Asmens duomenų valdymas
Raimundas Matylevičius. Asmens duomenų valdymasRaimundas Matylevičius. Asmens duomenų valdymas
Raimundas Matylevičius. Asmens duomenų valdymas
 
Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...
Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...
Romas Baronas. Tarpdisciplininiai moksliniai tyrimai – galimybė atsiverti ir ...
 
Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...
Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...
Monika Danilovaitė. Informatikos metodų taikymas balso klosčių būklei įvertin...
 
Rima Šiaulienė. IT VBE 2021 teksto maketavimo užduotis
Rima Šiaulienė. IT VBE 2021 teksto maketavimo užduotisRima Šiaulienė. IT VBE 2021 teksto maketavimo užduotis
Rima Šiaulienė. IT VBE 2021 teksto maketavimo užduotis
 
Gražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizė
Gražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizėGražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizė
Gražina Korvel. Lombardo šnekos ir jos akustinių ypatybių analizė
 
Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?
Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?
Gediminas Navickas. Ar mes visi vienodai suvokiame sintetinę kalbą?
 
Eugenijus Valavičius. Hiperteksto kelias
Eugenijus Valavičius. Hiperteksto keliasEugenijus Valavičius. Hiperteksto kelias
Eugenijus Valavičius. Hiperteksto kelias
 
Tomas Kasperavičius. Robotikos realizacija edukacinėje erdvėje
Tomas Kasperavičius. Robotikos realizacija edukacinėje erdvėjeTomas Kasperavičius. Robotikos realizacija edukacinėje erdvėje
Tomas Kasperavičius. Robotikos realizacija edukacinėje erdvėje
 
Paulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėje
Paulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėjePaulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėje
Paulius Šakalys. Robotika: sąvoka, rūšys, pritaikymas edukacinėje erdvėje
 
Olga Kurasova. Dirbtinis intelektas ir neuroniniai tinklai
Olga Kurasova. Dirbtinis intelektas ir neuroniniai tinklaiOlga Kurasova. Dirbtinis intelektas ir neuroniniai tinklai
Olga Kurasova. Dirbtinis intelektas ir neuroniniai tinklai
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 

Último (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender technologijas“ (Rumunija)

  • 1. Alexandru LUCA – Business Developer Manager CEE, Baltics, Turkey and Israel
  • 2. “Bitdefender is riding high this season” PC MAG, Lead Security Analyst Neil J. Rubenking, January 2013 Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 2
  • 3. 2013 starts HIGH TECH Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 3
  • 4. Life 2.0+ New World. Complicated. New Threats. Profit Driven. New Technologies. Cost Driven. New Devices. Connected. New Security. Not Many Real Options.
  • 5. Life 2.0+ E-Threats behind the Curtains Teens and Geeks WHO? Cyber-criminals – – – – Attention-Driven Loner Profile Profit-Driven Highly Organized High Profile Attacks HOW? Stealth Attacks – – – – Social Engineering Mass Mailers – Spyware/Adware Automated Variant Creation and Morphing Persistent Threats Lost productivity WHAT? Cyber-crime – – – – Clogged E-mail Systems and Networks Help Desk and Data Loss Costs Copyright@Bitdefender 2013/ www.Bitdefender.com Identity Theft and Online Fraud Highly Targeted Corporate Information Attacks 11/21/2013 • 5
  • 6. Life 2.0+ Magnitude of the Problem/Opportunity Around 1.5M unique malware samples are discovered every month! Source: AV-Test Labs (www.av-test.org) Source: av-test.org – New Malware Growth • “Even the best signature databases… have less than a 50% chance of catching completely new threats. Signatures are extremely ineffective against targeted and “zero day” threats.” According to Gartner • “Nobody can win the war against malware with a signature-driven product, but more proactive technologies are required ” According to AV-Test’s Andreas Marx Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 6
  • 7. Life 2.0+ Are businesses or even governments protected ?  Launched in 2010 to target a nuclear power plant and an uranium enrichment facility, Stuxnet began to draw attention on cyber-warfare.  In 2012, Flamer made headlines as it was discovered it had been in the wild for some five years.  One of the biggest and most dangerous e-threats in the world, Flamer incorporates more than 63 different files, including core components and pluggins.  Governments admitted to having relied on malware for cyber-espionage  In 2012, Chinese cyber-criminals have attempted to hit military personnel with spam packed with 0-day Flash exploits Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 7
  • 8. Market Landscape and Trends Security Software Market Overview New Market Trends Freeware • • • • • Virtualization The move to the cloud BYOD New consumer technologies and computing models create new market opportunities Emerging regions: Latin America, Asia/Pacific • Competitors • • Top players: Symantec, McAfee, TrendMicro Market Challengers: Kaspersky, AVG, Bitdefender Copyright@Bitdefender 2013/ www.Bitdefender.com • • • Free products have 20% of consumer user base Freeware is used for gradual monetization IDC believes Free will become part of Managed Security Service Are the freeware players fighting for security or for eyeballs (i.e. advertising revenues)? Security Software Market 9 billion $ in 2013 Bitdefender Technology leadership Best products Future Innovation 11/21/2013 • 9
  • 10. Bitdefender at a Glance A decade of innovation in technology 2000 • First antivirus worldwide to offer intelligent updating - • First antivirus product to include an application firewall - • MIDAS (Malware Intrusion Detection Advanced System)- wins IST prize, “set to revolutionize AV design” - • Bitdefender to release its proprietary Antispam technology - • Bitdefender introduces B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments) - • Spam Image Filter an important step in combating the new spamming techniques 2005 • Bitdefender® Mobile Security to provide real-time protection for smartphones and PDAs - • Bitdefender® Active Virus Control to innovate with a real time technology - • 60-Second QuickScan – The quickest way to find if your computer is infected by using this online scanner - • Gravity Architecture enables new generation of security for highly scalable services • Bitdefender Safepay™ secures all e-banking and e-shopping in a separate iron-clad, secure browser - • Security for Virtualized Environments – The 1st vShield 5 solution optimized for virtualized datacenters - • Cloud Security for Endpoints to provide enterprise-class security with no on-site management server 2011 • Bitdefender Clueful™, first application to show the world how iOS apps treat user's privacy - • Hypervisor Agnostic Scanning Engine – allows Bitdefender to provide the best operational cost savings for virtualization adopters 2012 • 2013 Intra-HV memory introspection engine - prototype that allows for detecting and preventing Virtual Machine kernel mode threats across Microsoft/Linux/etc Copyright@Bitdefender 2013/ www.Bitdefender.com • Bitdefender Photon™ technology boasts scanning speed and minimizes slowdowns 11/21/2013 • 11
  • 11. Bitdefender at a Glance Results in sustainable technogical leadership  In five local offices, 250+ engineers in R&D team warrant that Bitdefender’s technology – protecting more than 400 million users worldwide , technology partnerships included – is the #1 Anti-Malware Security Technology in the world.  #1 in Security Technology  In the AV-Test overall performance award for THE BEST REPAIR IN 2012, 3 out of the first 4 rated endpoint security vendors are using Bitdefender engines  #1 in Antispam Technologies  Bitdefender analyzes and issues protection for 5 million spam messages every day, or about 35 million per week.  Bitdefender has won all 24 VBSpam awards in a row in Virus Bulletin’s (VB) antispam tests between May 2009 to March 2013 Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 12
  • 12. Bitdefender at a Glance Consistent Leader in Antivirus Technology Consumer AV Test Score: Protection, Repair, Usability (Average) 6.00 Bitdefender 5.50 Eset McAfee 5.00 Avira Trend Micro 4.50 4.00 Panda Avg Symantec 3.50 Kaspersky 3.00 2.50 Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 13
  • 13. Bitdefender at a Glance Product of the Year in 2013 AV-Comparatives • Awarded “Product of the Year” in January 2013 • The only AV to receive 100% in the most complex test ran by AV-Comparatives. Apr 2013 AV-TEST • Leader in the 22 months endurance test! • Awarded “Best Repair for 2012”, in Jan 2013 PC MAG • Awarded “Best Antivirus of 2013” in Jan 2013. VB100 • Wins 12 VB100 awards in 2 years. Approved Corporate Product for SVE & CSE Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 14
  • 14. “Bitdefender clearly took the lead in the industry” AV Comparatives, CEO Andreas Clementi, January 2013 Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 15
  • 15.
  • 16. Backup slides Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 17
  • 17. Bitdefender at a Glance Technological leadership transferred to product  #1 in Consumer Products  First security software vendor to receive top recommendations simultaneously from the most important three key independent organizations in the US, UK, and Germany!  … and catching up in 2012 with the newly introduced Business Products Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 19
  • 18. The New Brand Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 20
  • 19. • • • Dacia was a country located in Europe over the territories occupied today by Romania, Moldova, Ukraine, Hungary and Serbia. The “Dacian Draco” was the standard of the ancient Dacian military. A wolf head combined with a snake body that made a whistling sound when galloping due to the air that entered the wolf's mouth. We have the sharp mind of the wolf, the slickness of the snake, the vigilance of the alpha male and the indestructibility of the snake body! Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 21
  • 23. Brand promise Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 25
  • 27. Brand avatar Copyright@Bitdefender 2013/ www.Bitdefender.com 11/21/2013 • 29

Notas del editor

  1. “Bitdefender is riding high this season”PC MAG, Lead Security Analyst Neil J. Rubenking
  2. “Bitdefender is riding high this season”PC MAG, Lead Security Analyst Neil J. Rubenking
  3. Un slide update-at e disponibil la back up slides
  4. 7 avtest in a rowAv comparatives – Advanced + - march 2012, November 2011, August 2011, February 2011, november 2010, Advanced – may 2011
  5. 7 avtest in a rowAv comparatives – Advanced + - march 2012, November 2011, August 2011, February 2011, november 2010, Advanced – may 2011
  6. “Bitdefender is riding high this season”PC MAG, Lead Security Analyst Neil J. Rubenking