3. Novidades
• Detecta e elimina automaticamente
as ameaças com tecnologia de
proteção premiada;
• Avisa se o download contém uma
ameaça ou um crimeware, antes que
você o instale no PC;
• Verifica arquivos compactados;
• Tem a verificação mais rápida do
mercado;
• É mais simples e fácil de usar.
TM
4. Novidades
• Bloqueia e remove vírus de forma
automática;
• Verifica cada download para você
não se preocupar com ameaças;
• Controla o uso do computador pelo
seus filhos;
• Protege o acesso à bancos e sites de
compras de forma segura na Web;
• Alerta de performance quando algum
programa utiliza muitos recursos.
TM
5. Novidades
• Downloads, compras, acesso a
bancos, de forma segura;
• Bloqueia e remove ameaças
automaticamente;
• Faz backup de forma simples e
automática online, em mídias ou
dispositivos móveis;
• Otimiza o computador para o uso
melhor da performance.
TM
6. Cartões de Renovação
• Economia de 25%
• Oportunidade de
venda casada com
Notebooks e Norton
OEM
6
TM
7. Norton Mobile Security
Protege seu dispositivo, suas informações e sua identidade.
Você não perde só o seu celular ou tablet, mas suas informações pessoais,
sua identidade e dinheiro.
7
TM
8. Norton 2012 - Poder contra as ameaças
• 4 linhas de proteção exclusiva com o poder da comunidade Norton
– 210 Milhões de Máquinas contribuindo com informações
– Analisando mais de 3.1 Bilhões de arquivos Executaveis
– 210,000 Arquivos malicosos detectados todos os dias
Comporta-
Redes Arquivos Reputação
mento
Norton 2012 TM
9. Norton 2012 - Poder em Números
A maior rede de detecção de ameaças do Mundo,
Atividade Inteligengia Vunerabilidades Spam/Phishing
o 240,000 sensores o 133M servidores, clientes o 40,000+ vunerabilidades o 8B+ email mensagens/dia
o 200+ paises e gateways monitorados o 14,000 fornecedores o 1B+ pesquisas na web/dia
o Cobertura Global o 105,000 tecnologias
TM
So to wrap up, for 2012 we areStaying focused like a laser on performance and protectionAdding significant protection advances to keep 2012 leading in detection and effectiveness against malwareEvolving the Norton experience with DI 2.0, IDSafe 2.0 & Bandwidth throttlingWith 2012, we’ve got products with innovative new technology that is helping us stay one step ahead of both the bad guys and other vendors in the marketplace!
We all spend our time talking about “anti-virus”, but the reality is that our products are so much more. It might surprise you to know this, but 50% of all threats we blockwere detected through our network protection technology. In fact, each copy of a Norton product is actually running a full-scale, enterprise-quality version of our Network Intrusion Prevention technology. (IPS) Yes, we still invest heavily in anti-virus, but this 50% tells us that scanning for viruses is only about half of the story.Beyond traditional signatures and even our IPS engine, we’ve invested heavily in other core protection technology. Greatly enhanced in 2012 is SONAR, our behavioral engine.With 2012, we now have the ability to convict suspicious behavior based on a behavioral “profile” – or if it is easier to think of it this way, a “signature”. What happens is an analyst will look at the 500+ attributes that SONAR tracks and make a series of associations. As an example, let’s say a particular processtried to access thesystem folder, andtried to call home, but it does not have any running UI, and it downloaded over 15 files yesterday. Any one of these things alone may not be enough to be “bad” but taken as a whole, the behavioral profile is bad, and the analyst will therefore make a rule that says if you see all this string of behaviors, then Norton will stop the process from executing. Doing all this is a big deal. We aren’t just looking at what the process does on the machine, we are actually looking at its communication characteristics!The enforcement is achieved by our SONAR policy enforcement capability, which is also new for 2012 . Let’s drill in a bit more, specifically for one of the most annoying threats – Fake AV programs.This new combination of Behavioral Rules and Policy Enforcement together are powerful enough to detect and remove theFake AV programs we have observed since 2010. Fake AV, which netted over $150M in 2009 alone from unsuspecting victims, is a prime target for our 2012 products to be able to detect based on these advances in SONAR. In the past, most of our protection from non-process threats or in-memory threats was left to the network technology. Also new for 2012, SONAR has the ability to not only examine active processes, but it also has the ability to look at non-process threats, or NPTs. These are files that are not in themselves active processes, but which call on another running process (i.e. a dll), which are often legitimate applications. These particular threats are quite possibly the most difficult to detect but SONAR will now be able to that in 2012. The big advantage is that NPT detection gives us the ability to much more aggressively remove threats on PRE-INFECTED machines.
Security Technology and Response (STAR)3 time zones13 locations550 employees