Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Bitdefender 2013 Bitdefender 2014 “What business are we really in?” 1.Theodore Levitt.

Similar presentations


Presentation on theme: "1 Bitdefender 2013 Bitdefender 2014 “What business are we really in?” 1.Theodore Levitt."— Presentation transcript:

1 1 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014 www.bitdefender.com/enterprise “What business are we really in?” 1.Theodore Levitt

2 2 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014 www.bitdefender.com/enterprise DATA Endpoint protection * APPS Operating system Traditional antimalware Signature based scanning and protection Heuristic detection Firewalll Advanced antimalware HIPS – host based intrusion prevention Web protection Application whitelisting Vulnerability Management Assessment Patch Management Anti-malware with advanced server support Specialized servers (e.g. email) virtual server environments Endpoint security Data Security Encryption Device control DLP - data loss prevention MDM – mobile application management

3 3 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014 www.bitdefender.com/enterprise ENDPOINT SECURITY is our business

4 4 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014 www.bitdefender.com/enterprise Understanding The Impact of Virtualization Security

5 5 Copyright @ Bitdefender 2013 E-Threats behind the Curtains Teens and Geeks –Attention-Driven –Loner Profile Cyber-criminals –Profit-Driven –Highly Organized High Profile Attacks –Social Engineering –Mass Mailers Stealth Attacks –Spyware/Adware –Automated Variant Creation and Morphing –Persistent Threats Lost productivity –Clogged E-mail Systems and Networks –Help Desk and Data Loss Costs Cyber-crime –Identity Theft and Online Fraud –Highly Targeted Corporate Information Attacks WHO? HOW? WHAT?

6 6 Copyright @ Bitdefender 2013 Magnitude of the Problem/Opportunity “ Even the best signature databases… have less than a 50% chance of catching completely new threats. Signatures are extremely ineffective against targeted and “zero day” threats.” According to Gartner “Nobody can win the war against malware with a signature-driven product, but more proactive technologies are required ” According to AV-Test’s Andreas Marx Source: AV-Test Labs (www.av-test.org) Around 1.5M unique malware samples are discovered every month! Source: av-test.org – New Malware Growth

7 7 Copyright @ Bitdefender 2013 Virtualization market drivers and adoption X Traditional Antimalware

8 8 Copyright @ Bitdefender 2013 Antivirus Impact: 200 MB of memory per VM 200+ MB of disk per VM The antimalware agent adds : Scan Engines – Signatures - Databases… to each VM

9 9 Copyright @ Bitdefender 2013 Creating The Perfect Storm Each with its own I/O Stream Physical Server Can Support 50-70 Virtual Desktops Virtual Desktops 8-12 Virtual Servers Virtual Servers 1

10 10 Copyright @ Bitdefender 2013 Creating The Perfect Storm Scan Simultaneous Update AV STORM

11 11 Copyright @ Bitdefender 2013 Capacity Impact: VS SecurityCapacity Impact #1

12 12 Copyright @ Bitdefender 2013 Security Gaps: Boot latency & Boot time gaps System are vulnerable to attacks during AV loading, updates and during backup recovery Impact #2

13 13 Copyright @ Bitdefender 2013 Lack of intelligent co-ordination o Integrate with virtualization management o Non-existent VMs remain o Serialize full system scans o Policy applied to groups Impact #3

14 14 Copyright @ Bitdefender 2013 Secure Virtual Appliance the Impact: Security & Capacity Remote Scanning New Security Strategies

15 15 Copyright @ Bitdefender 2013 Secure Virtual Appliance Deduplicate and Centralize +30% saving on CPU impact +10% saving on Memory impact

16 16 Copyright @ Bitdefender 2013 Traditional AV VS. BD Tools) - impact on host  Host running 72 virtual machines  Local cache and server cache used At least 10% saving on Memory impact At least 30% saving on CPU impact

17 17 Copyright @ Bitdefender 2013 Approach: VMware integration  VMware vShield Endpoint  VMware vCenter integration  BD Tools  “Agentless”?

18 18 Copyright @ Bitdefender 2013 Approach: Bitdefender Technology o Any hypervisor o SVA redundancy o Performance and simplicity

19 19 Copyright @ Bitdefender 2013 Comparison of Approaches ElementVMware vShield EndpointBitdefender Technology Centralize, deduplicate Inspection through VMware API’s Inspection using security vendor technology Hypervisor requirements ESXi (vSphere) environment with vShield Endpoint license, vShield Manager installed ESXi, Xen, Hyper-V, KVM, etc., and any mix thereof Endpoint footprint vShield Endpoint driver embedded in VMware Tools. Optional BD Tools (GUI, memory & process scanning) BD Tools (GUI, memory & process scanning) Virtual Appliance Tied to ESXi hypervisor; one per host, no host migration Independent of hypervisor; fail-over between hosts, migration a non-issue Operating SystemsWindowsWindows, Linux, Solaris (x86) Public cloudNot technically practical/possibleYes

20 20 Copyright @ Bitdefender 2013 Security reinvented o Hypervisor agnostic; Supports VMware, Citrix, Microsoft, AWS, Oracle, and Red Hat virtualization o OS agnostic; Windows, Linux and Solaris servers as well as VDI instances o Integrated management; VMware, Citrix, Amazon Web Services o 30% more VMs per physical host; Increased server consolidation ratios with centralized antimalware o Tiny footprint on the VMs: 60 MB of disk and 30 MB of memory in non-VMware environments

21 21 Copyright @ Bitdefender 2013 Built with Virtualization Built for Virtualization

22 22 Copyright @ Bitdefender 2013 Virtualization is another disruptive technology take advantage of your chance to improve security ! o Virtualization needs purpose-built security o Two approaches today; vShield and Bitdefender o Management must be integrated (vCenter, XenServer, AD) o Avoid YAPS (Yet Another Point Solution) o Future-proof (OS & hypervisor, private & public, mobile) o Traditional endpoint and management architectures will fail

23 23 Copyright @ Bitdefender 2013

24 24 Copyright @ Bitdefender 2013 Gravity Zone Security for Endpoints On Premise orCloud-based Simple to deploy, install & manage Secures: Windows MAC Servers Exchange (roadmap) Mobile (roadmap) Comprehensive Security from one dashboard Secures: Physical devices (windows, MACS, Servers) Mobile Devices Virtualized Environments (VMware. Citrix Xen, Hyper V and more) OR

25 25 Copyright @ Bitdefender 2013 Control Center ConsoleEndpoint Security (EPS) The New Business Portfolio is entirely based on the Bitdefender GravityZone Architecture

26 26 Copyright @ Bitdefender 2013 Bitdefender at a Glance Consistent Leader

27 27 Copyright @ Bitdefender 2013 Advanced protection through proactive detection Active Virus Control leverages advanced heuristic methods to detect new potential threats in real time It monitors all application activity throughout the lifecycle of the application processes B-HAVE analyzes the behavior of potentially malicious codes inside a secure virtual computer environment It eliminates false positives and significantly increasing detection rates for new and unknown malware

28 28 Copyright @ Bitdefender 2013  The #1 Anti-Malware Security Technology in the world  First security software vendor to receive top recommendations simultaneously from the most important three key independent organizations in the US, UK, and Germany!  Only security company to receive 14 VB Antispam awards in a row  BitDefender protects more than 500 million people worldwide (including technology partnerships)  Nine international sales offices with ~ 475 employees worldwide  260+ technical people and engineers in R&D team  Products localized in more than 20 languages.  120 OEM Partners and Growing  Trusted by top security companies globally: F-Secure, G-Data, Trustport, e-Scan, Qihoo, Bullguard, Acronis IBM, etc Bitdefender at-a-glance

29 29 Copyright @ Bitdefender 2013 Copyright @ Bitdefender 2014 www.bitdefender.com/enterprise Questions and Thank-you


Download ppt "1 Bitdefender 2013 Bitdefender 2014 “What business are we really in?” 1.Theodore Levitt."

Similar presentations


Ads by Google