SlideShare a Scribd company logo
ESET NOD32
The beginnings of ESET


The beginnings of ESET date back to 1987 when two young programming 
enthusiasts, Peter Paško and Miroslav Trnka, discovered one of the early 
computer viruses. They dubbed it “Vienna” and wrote a program for its 
detection. 
 
Many other virus discoveries quickly followed, which sparked the idea to 
devise a universal software solution to counter these then relatively 
unknown computer threats. 
  
 
   
Global Headquarters


           Bratislava, Slovakia
Regional Centers
Research and Development Centers
Presence in more than




countries worldwide
growth over the past 5 years
Protecting




Crore users worldwide
and it means




combined ESS/NOD32 installation
  share on all PCs and laptops
ESET India growth in 2010




 
More than 22 00 000 Indian users trust ESET* 
 
* Total number of Installations 
ESET World Map 2011
Countries where the brand ranks among top 3 (Online Security Brand Tracker 2011 survey)
Top 10 ESET Performance Markets 
  Russia                                                   49,850,000

   Brazil                                31,137,000

  Turkey                                30,415,000

Argentina                  22,782,000

  Mexico                  22,185,000

    India                21,222,000

    USA           18,182,000

Colombia     15,200,000

 Thailand    14,967,000                               Total Brand 
 Ukraine    14,000,000
                                                      Awareness 
ESET in India


 
ESET India growth in last two 
years 300% 
 
MORE than 22 00 000 Indian 
users trust ESET* 
 
* Total number of Installations 
  
ESET Technology
Real-Time Adaptive Scanning Technology


• Engineered to be fast, light and accurate
• ESET solutions are among most effective malware scanners in
  the industry.
• The ThreatSense® technology.
• Combined with global malware intelligence and unobtrusive
  updates
• ESET users get maximum protection at all times.
Real-Time Adaptive Scanning Technology




   VIRUS SIGNATURES       GENERIC SIGNATURES
    Common protection     Future mutations


      CODE ANALYSIS       EMULATION
        Static analysis   Advanced detection
ESET Heuristics
• Heuristics is a technique that implements a set of guidelines or
  rules to solve the problem of detecting known and unknown
  malicious program s. Heuristics helps to detect malware
  behavior, without need to uniquely identify the specific threat
  .
• ESET Smart Security and ESET NOD32 Antivirus use heuristics
  to detect both known and unknown threats and malware.
  Two forms of heuristics are used, passive and active.
Heuristic
Effectiveness
AV-comparatives.org retrospective
testing with detection and false
positives results (May 2007)
Passive heuristics
• Passive heuristics analyze a potential threat as it is scanned, tracing through
  the instructions in the program before passing the code to the processor for
  execution. Passive heuristics look for patterns, routines or program calls that
  indicate malicious behavior. Though an important tool, passive heuristics alone
  are only part of the solution, as there is no single action that a malicious
  program can perform that is not also allowed in a legitimate program. This is
  why the simultaneous use of active heuristics is important.
Active heuristics
• ESET's active heuristic technology creates a virtual computer within the
  scanning engine that allows the scanner to observe what the program might
  do if allowed to run on a real computer. This can reveal potentially malicious
  activities that other detection techniques would not identify.
ESET Live Grid




 Long before cloud computing gained traction in the antimalware industry,
ESET developed a unique cloud-based technology. ESET Live Grid serves as an
early warning system that intercepts hundreds of thousands of new threats
 daily across the globe to keep our clients secure in face of emerging threats.
LIVE GRID
UNILICENSE




ESET Unilicense – allows protecting multiple platforms with a
  single license. ESET security solutions can be deployed on
  operating systems of choice in a mix-and-match fashion.
UNILICENSE:
Multi-Platform Support
ESET for Consumers




 Smart Detection
 Small System Footprint
 Optimized Startup Procedure
V5 Security Features


Advanced HIPS Functionality customize the behavior of the system in greater
detail:
Out of Home Network Detection Alerts the user when connecting to an
unknown network prompting to switch to the Strict Protection mode
Parental Control Protects your family from potentially offensive web content
Enhanced Media Control Automatically scans all USB flash discs, memory cards
and CDs/DVDs for threats.
Gamer Mode Streamlines protection during online sessions for continual security
Putting the user in Control the tools pane view is highly intuitive and
transparent, allowing for quick navigation.
ESET Smart Security 5
 All-in-one internet security suite



      Feature Highlights

      •   Antispam
      •   Antispyware
      •   Anti-rootkit
      •   Personal Firewall
      •   Parental Control
      •   Host Intrusion Prevention System
      •   Gamer Mode
      •   Available in 1 user & 3 user pack
      •   ESET Smart Security 1 user: MRP : Rs. 999
      •   ESET Smart Security 3 user: MRP : Rs. 1999
ESET NOD32 Antivirus 5
Professional Protection for Home Computer, Notebook or Workstation!




                       Feature Highlights

                       •   Antispyware
                       •   Anti-rootkit
                       •   Cloud-Powered Scanning
                       •   Removable Media Management
                       •   Host Intrusion Prevention System
                       •   Gamer Mode
                       •   Low System Footprint
                       •   Available in 3 user pack
                       •   MRP : Rs. 1699
ESET NOD32 Antivirus vs.
                            ESET Smart Security

                                           Safer Malware Protection
Antivirus (ThreatSense® technology)

Antispyware

Host-Based Intrusion Prevention System (HIPS)

Cloud-Enhanced Whitelisting

Removable Media Control

Antirootkit

                                            Smarter Online Safety

Antispam

Intelligent Firewall

Gamer Mode

                                  Stronger Parental Controls and Education

Parental Controls
ESET Mobile Security
Key Features

    ANTI‐THEFT FEAUTRES 
     Remote Lock 
     Remote Wipe 
     GPS Localization 
     SIM Matching 
     Trusted Friend 
     Call Blocking 
     Uninstall Protection 
     
    SECURITY FEATURES 
     SMS/MMS Antispam 
     Realtime Protection 
     Security Audit 
     Onaccess Scanning 
     On demand Scanning 
ESET: SOLUTION FOR SMB

  -- NEW LAUNCH -- 




           18 months of validity 
Eset India General Presentation
Endpoint Solutions comes in two versions:
                     ESET Endpoint Security
              ESET Endpoint Antivirus (Lighter version)

  Both solutions combine cloud-powered scanning technology and the
award-winning ThreatSense scanning engine for optimized performance.
Key Features




ESET Remote Administrator: centralized and remote
management software, with role-based privileges,
dynamic client groups, remote installation, notifications,
updates management, web dashboard, and everything the
IT administrator need to keep the endpoints secure and up-   ESET provides Endpoint Security software for Windows, Mac
to-date!                                                     and Linux under the Unilicense concept
ESET Gateway/ File/ Mail Security
                   for Windows/ Linux




Provides proactive and              Delivers comprehensive             Safeguards your email 
lightweight security as your        antimalware protection for your    communication channels with 
business network’s first line of    vital business data in a small     award‐winning antivirus and 
defense against malware and         footprint that ensures             antispam technology that 
other cyberthreats                  optimal server performance         proactively detects known and 
                                                                       emerging malware  
Technology Quadrants

                                                                                                                Extensive Proactive Protection
                             Unreliable Technology                 Well-balanced Protection
  High 




                                                                                                                Detecting Unknown Threats

                                                                                                                False positives <–> High Detection
  Proactive Detection Rate




                                                                                                                Rate

                                              BitDefender                                                       Technologically superior product
                                     GDATA 

                                              Alwil                            Kaspersky           Microsoft 
                                                                                               McAfee 
                                                                    Grisoft AVG 
                                                       Norman                               Symantec 
                                                                                      F‐Secure 
                                                                                             Norman 
  Low 




                             Poor Technology                               Inefficient Technology

                             High                        False Positives                           Low 



Source: AV-Comparatives 2008-2011
 
Virus Bulletin VB100 Awards
Long track record of excellent results Highest Number of VB100 Awards
Highest Number of Advance+ Awards
Performance Overhead

          Superior performance and small footprint at the same time

                                                                                                                                                 Boot Time Test        File Copying         Encoding/Transcoding




                                                                                                            106%




                                                                                                                                                                                                     161%
                                                                                60%
                                            66%




                                                                                                                                                     49%




                                                                                                                                                                         58%




                                                                                                                                                                                               56%
                          45%




                                                                                                 39%




                                                                                                                                                                               63%
                                                                                                                               29%
                                                                                                                   28%
                                                        70%




                                                                          70%




                                                                                                                                     35%
                                                              53%
                                      25%




                                                                                                                                                           52%
                                                                                           32%
                    22%




                                                                                                                         10%




                                                                                                                                                                                      10%
                                                                                                                                           19%
                                                  16%




                                                                    14%
         31%




                                                                                                                                                                                                            31%
                                13%
   12%




                                                                                      9%




                                                                                                                                                                  6%
               3%




                                                                                                       7%




Source: AV-Comparatives 2004-2011
Latest Awards and Achievements




The only company with unbroken             All certification from AV-Test and TUV,
string of 49 VB100 awards (70 overall)   first and only certified Mac OS X product




      Scores high in all tests                Second in Stiftung Warentest
      14 Advanced+ Awards                         and Consumer Reports
Thank You

More Related Content

PPTX
Security Operation Center - Design & Build
Sameer Paradia
 
PPTX
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
PDF
Palo Alto Networks CASB
Alberto Rivai
 
PDF
Cyber Security For Organization Proposal Powerpoint Presentation Slides
SlideTeam
 
PPTX
Cyber security: A roadmap to secure solutions
Schneider Electric
 
PPTX
Security Operation Center Fundamental
Amir Hossein Zargaran
 
PDF
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Enterprise Management Associates
 
PDF
Datwyler data center presentation info tech middle east
Ali Shoaee
 
Security Operation Center - Design & Build
Sameer Paradia
 
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
Palo Alto Networks CASB
Alberto Rivai
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
SlideTeam
 
Cyber security: A roadmap to secure solutions
Schneider Electric
 
Security Operation Center Fundamental
Amir Hossein Zargaran
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Enterprise Management Associates
 
Datwyler data center presentation info tech middle east
Ali Shoaee
 

What's hot (20)

PDF
Cyber Security 2017 Challenges
Leandro Bennaton
 
PPTX
Importance of data centers
Tyrone Systems
 
PPTX
DATA CENTER
Shekar Reddy
 
PPTX
Security operation center (SOC)
Ahmed Ayman
 
PDF
HOW AI CAN HELP IN CYBERSECURITY
Priyanshu Ratnakar
 
PPTX
Data Loss Prevention
Reza Kopaee
 
PPT
Security patterns and model driven architecture
bdemchak
 
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
PPTX
What is zero trust model (ztm)
Ahmed Banafa
 
PPT
1 security goals
drewz lin
 
PPTX
information security awareness course
Abdul Manaf Vellakodath
 
PDF
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
PPTX
Palo Alto strata NGFW overview-deck.pptx
zaidmutawe2000
 
PPT
Tia 942 Data Center Standards
Sri Chalasani
 
PDF
Journey to the Center of Security Operations
♟Sergej Epp
 
PPTX
Cybersecurity Awareness Session by Adam
Mohammed Adam
 
PPTX
Technology Overview - Symantec Data Loss Prevention (DLP)
Iftikhar Ali Iqbal
 
PPTX
Data center presentation toi -28022013
Sanjay Belulkar
 
PDF
introduction to Azure Sentinel
Robert Crane
 
PDF
Network security
Christalin Nelson
 
Cyber Security 2017 Challenges
Leandro Bennaton
 
Importance of data centers
Tyrone Systems
 
DATA CENTER
Shekar Reddy
 
Security operation center (SOC)
Ahmed Ayman
 
HOW AI CAN HELP IN CYBERSECURITY
Priyanshu Ratnakar
 
Data Loss Prevention
Reza Kopaee
 
Security patterns and model driven architecture
bdemchak
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
What is zero trust model (ztm)
Ahmed Banafa
 
1 security goals
drewz lin
 
information security awareness course
Abdul Manaf Vellakodath
 
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Palo Alto strata NGFW overview-deck.pptx
zaidmutawe2000
 
Tia 942 Data Center Standards
Sri Chalasani
 
Journey to the Center of Security Operations
♟Sergej Epp
 
Cybersecurity Awareness Session by Adam
Mohammed Adam
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Iftikhar Ali Iqbal
 
Data center presentation toi -28022013
Sanjay Belulkar
 
introduction to Azure Sentinel
Robert Crane
 
Network security
Christalin Nelson
 
Ad

Similar to Eset India General Presentation (20)

PDF
ESET Technology: The multi-layered approach and its effectiveness
ESET Middle East
 
PPTX
ESET Business Deck cyber security partner
Steventech1
 
PPTX
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET
 
PDF
Product overview-eset-file-security
Üstün Koruma
 
PDF
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET Belgique & Luxembourg
 
PPTX
IT security for busines
Adi Saputra
 
PPTX
ESET: Delivering Benefits to Medium and Large Businesses
ESET
 
PDF
Svarbiausios ESET technologijos
Baltimax
 
PPTX
ESET: Delivering Benefits to Enterprises
ESET
 
PDF
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
ESET Belgique & Luxembourg
 
PDF
CEBIT 2013 - Workshop Presentation
TI Safe
 
PDF
Avc fdt 201303_en
Anatoliy Tkachev
 
PDF
ESET_SECURE_ENTERPRISE_DATASHEET
ESET Belgique & Luxembourg
 
PPTX
Is Anti-Virus Dead?
ESET
 
PPTX
Top 10 antiviruses
university of education,Lahore
 
PDF
Market Share Report December2010
Jeff Garon
 
PDF
Stay Secure: Unveiling the Power of Antivirus Software
SoftwareDeals
 
PPTX
Microsoft-Defender-for-Business-Customer-Ready-Deck copy.pptx
NhanT3
 
PDF
NIC2012 - System Center Endpoint Protection 2012
Nicolai Henriksen
 
PPT
Software Vendor (Norton Anti-Virus)
John Joseph San Juan
 
ESET Technology: The multi-layered approach and its effectiveness
ESET Middle East
 
ESET Business Deck cyber security partner
Steventech1
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET
 
Product overview-eset-file-security
Üstün Koruma
 
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET Belgique & Luxembourg
 
IT security for busines
Adi Saputra
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET
 
Svarbiausios ESET technologijos
Baltimax
 
ESET: Delivering Benefits to Enterprises
ESET
 
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
ESET Belgique & Luxembourg
 
CEBIT 2013 - Workshop Presentation
TI Safe
 
Avc fdt 201303_en
Anatoliy Tkachev
 
ESET_SECURE_ENTERPRISE_DATASHEET
ESET Belgique & Luxembourg
 
Is Anti-Virus Dead?
ESET
 
Top 10 antiviruses
university of education,Lahore
 
Market Share Report December2010
Jeff Garon
 
Stay Secure: Unveiling the Power of Antivirus Software
SoftwareDeals
 
Microsoft-Defender-for-Business-Customer-Ready-Deck copy.pptx
NhanT3
 
NIC2012 - System Center Endpoint Protection 2012
Nicolai Henriksen
 
Software Vendor (Norton Anti-Virus)
John Joseph San Juan
 
Ad

Eset India General Presentation

  • 2. The beginnings of ESET The beginnings of ESET date back to 1987 when two young programming  enthusiasts, Peter Paško and Miroslav Trnka, discovered one of the early  computer viruses. They dubbed it “Vienna” and wrote a program for its  detection.    Many other virus discoveries quickly followed, which sparked the idea to  devise a universal software solution to counter these then relatively  unknown computer threats.          
  • 3. Global Headquarters Bratislava, Slovakia
  • 6. Presence in more than countries worldwide
  • 7. growth over the past 5 years
  • 9. and it means combined ESS/NOD32 installation share on all PCs and laptops
  • 10. ESET India growth in 2010   More than 22 00 000 Indian users trust ESET*    * Total number of Installations 
  • 11. ESET World Map 2011 Countries where the brand ranks among top 3 (Online Security Brand Tracker 2011 survey)
  • 12. Top 10 ESET Performance Markets  Russia 49,850,000 Brazil 31,137,000 Turkey 30,415,000 Argentina 22,782,000 Mexico 22,185,000 India 21,222,000 USA 18,182,000 Colombia 15,200,000 Thailand 14,967,000 Total Brand  Ukraine 14,000,000 Awareness 
  • 15. Real-Time Adaptive Scanning Technology • Engineered to be fast, light and accurate • ESET solutions are among most effective malware scanners in the industry. • The ThreatSense® technology. • Combined with global malware intelligence and unobtrusive updates • ESET users get maximum protection at all times.
  • 16. Real-Time Adaptive Scanning Technology VIRUS SIGNATURES GENERIC SIGNATURES Common protection Future mutations CODE ANALYSIS EMULATION Static analysis Advanced detection
  • 17. ESET Heuristics • Heuristics is a technique that implements a set of guidelines or rules to solve the problem of detecting known and unknown malicious program s. Heuristics helps to detect malware behavior, without need to uniquely identify the specific threat . • ESET Smart Security and ESET NOD32 Antivirus use heuristics to detect both known and unknown threats and malware. Two forms of heuristics are used, passive and active.
  • 18. Heuristic Effectiveness AV-comparatives.org retrospective testing with detection and false positives results (May 2007)
  • 19. Passive heuristics • Passive heuristics analyze a potential threat as it is scanned, tracing through the instructions in the program before passing the code to the processor for execution. Passive heuristics look for patterns, routines or program calls that indicate malicious behavior. Though an important tool, passive heuristics alone are only part of the solution, as there is no single action that a malicious program can perform that is not also allowed in a legitimate program. This is why the simultaneous use of active heuristics is important. Active heuristics • ESET's active heuristic technology creates a virtual computer within the scanning engine that allows the scanner to observe what the program might do if allowed to run on a real computer. This can reveal potentially malicious activities that other detection techniques would not identify.
  • 20. ESET Live Grid Long before cloud computing gained traction in the antimalware industry, ESET developed a unique cloud-based technology. ESET Live Grid serves as an early warning system that intercepts hundreds of thousands of new threats daily across the globe to keep our clients secure in face of emerging threats.
  • 22. UNILICENSE ESET Unilicense – allows protecting multiple platforms with a single license. ESET security solutions can be deployed on operating systems of choice in a mix-and-match fashion.
  • 24. ESET for Consumers  Smart Detection  Small System Footprint  Optimized Startup Procedure
  • 25. V5 Security Features Advanced HIPS Functionality customize the behavior of the system in greater detail: Out of Home Network Detection Alerts the user when connecting to an unknown network prompting to switch to the Strict Protection mode Parental Control Protects your family from potentially offensive web content Enhanced Media Control Automatically scans all USB flash discs, memory cards and CDs/DVDs for threats. Gamer Mode Streamlines protection during online sessions for continual security Putting the user in Control the tools pane view is highly intuitive and transparent, allowing for quick navigation.
  • 26. ESET Smart Security 5 All-in-one internet security suite Feature Highlights • Antispam • Antispyware • Anti-rootkit • Personal Firewall • Parental Control • Host Intrusion Prevention System • Gamer Mode • Available in 1 user & 3 user pack • ESET Smart Security 1 user: MRP : Rs. 999 • ESET Smart Security 3 user: MRP : Rs. 1999
  • 27. ESET NOD32 Antivirus 5 Professional Protection for Home Computer, Notebook or Workstation! Feature Highlights • Antispyware • Anti-rootkit • Cloud-Powered Scanning • Removable Media Management • Host Intrusion Prevention System • Gamer Mode • Low System Footprint • Available in 3 user pack • MRP : Rs. 1699
  • 28. ESET NOD32 Antivirus vs. ESET Smart Security Safer Malware Protection Antivirus (ThreatSense® technology) Antispyware Host-Based Intrusion Prevention System (HIPS) Cloud-Enhanced Whitelisting Removable Media Control Antirootkit Smarter Online Safety Antispam Intelligent Firewall Gamer Mode Stronger Parental Controls and Education Parental Controls
  • 30. Key Features ANTI‐THEFT FEAUTRES   Remote Lock   Remote Wipe   GPS Localization   SIM Matching   Trusted Friend   Call Blocking   Uninstall Protection    SECURITY FEATURES   SMS/MMS Antispam   Realtime Protection   Security Audit   Onaccess Scanning   On demand Scanning 
  • 31. ESET: SOLUTION FOR SMB -- NEW LAUNCH --  18 months of validity 
  • 33. Endpoint Solutions comes in two versions:  ESET Endpoint Security  ESET Endpoint Antivirus (Lighter version) Both solutions combine cloud-powered scanning technology and the award-winning ThreatSense scanning engine for optimized performance.
  • 34. Key Features ESET Remote Administrator: centralized and remote management software, with role-based privileges, dynamic client groups, remote installation, notifications, updates management, web dashboard, and everything the IT administrator need to keep the endpoints secure and up- ESET provides Endpoint Security software for Windows, Mac to-date! and Linux under the Unilicense concept
  • 35. ESET Gateway/ File/ Mail Security for Windows/ Linux Provides proactive and  Delivers comprehensive  Safeguards your email  lightweight security as your  antimalware protection for your  communication channels with  business network’s first line of  vital business data in a small  award‐winning antivirus and  defense against malware and  footprint that ensures  antispam technology that  other cyberthreats   optimal server performance  proactively detects known and  emerging malware  
  • 36. Technology Quadrants Extensive Proactive Protection Unreliable Technology Well-balanced Protection High  Detecting Unknown Threats False positives <–> High Detection Proactive Detection Rate Rate BitDefender  Technologically superior product GDATA  Alwil  Kaspersky  Microsoft  McAfee  Grisoft AVG  Norman  Symantec  F‐Secure  Norman  Low  Poor Technology Inefficient Technology High  False Positives Low  Source: AV-Comparatives 2008-2011  
  • 37. Virus Bulletin VB100 Awards Long track record of excellent results Highest Number of VB100 Awards
  • 38. Highest Number of Advance+ Awards
  • 39. Performance Overhead Superior performance and small footprint at the same time Boot Time Test File Copying Encoding/Transcoding 106% 161% 60% 66% 49% 58% 56% 45% 39% 63% 29% 28% 70% 70% 35% 53% 25% 52% 32% 22% 10% 10% 19% 16% 14% 31% 31% 13% 12% 9% 6% 3% 7% Source: AV-Comparatives 2004-2011
  • 40. Latest Awards and Achievements The only company with unbroken All certification from AV-Test and TUV, string of 49 VB100 awards (70 overall) first and only certified Mac OS X product Scores high in all tests Second in Stiftung Warentest 14 Advanced+ Awards and Consumer Reports