SlideShare a Scribd company logo
KASPERSKY LAB
ENTERPRISE PORTFOLIO
Vladimir Zapolyansky
Head of Product &Technology Marketing
KEY FOCUS AREAS FOR CIOs
MOBILITY DATA
BUSINESS
CONTINUITY
DATA PROTECTION
DATA
LOSS
DATA
LEAKAGE
CYBER
THREATS
The average cost of a serious
breach may reach up to $1.6 mln
of organizations lost
business-sensitive data28%
Source: Corporate IT Security Risks Survey 2014, Kaspersky Lab & B2B International
BUSINESS CONTINUITY
65% 35% malware attack
60%
<4h.
22%
4-24h.
18%
>24h.
• Software errors
• SCADA failure
• Operator mistakes
• Other
Source: Repository of Industrial Security Incidents (RISI)
BUSINESS CONTINUITY – RISK FACTORS
EXTERNAL
FACTORS
INTERNAL
FACTORS
BUSINESS CRITICAL
INFRASTRUCTURE
ONLINE
SERVICES
MALWARE
OUTBREAK
EMPLOYEE
AWARENESS
DARK HOTEL
A story of unusual hospitality
MOBILITY
Sources: 1 - Forrester Research, 2 – Gartner, 3 - Corporate IT Security Risks Survey 2014, Kaspersky Lab & B2B International
of the world’s workforce
is mobile1
Today,
~37% of all companies
worldwide are
expected to adopt
the BYOD model2
By 2017,
50% devices is among
the top priorities for
the corporate IT
security function3
Security of
mobile/
portable
REPUTATIONAL IMPACT
IT’S TIME TO RETHINK YOUR IT SECURITY
MOBILITY DATA
BUSINESS
CONTINUITY
SECURITY
INTELLIGENCE
TRUSTED
PARTNER
COMPREHENSIVE
PROTECTION
TO PREPARE FOR THE INEVITABLE!
SECURITY INTELLIGENCE:
DOES IT MAKE A DIFFERENCE?
KNOWN
THREATS
UNKNOWN &
ADVANCED
THREATS
70% 30%
KASPERSKY LAB THREAT INTELLIGENCE
INSIGHT AND EXPERTISE GAINED THROUGH A HISTORY OF DISCOVERIES
2014
REGIN
THE MASK
TURLA
ENERGETIC BEAR/
CROUCHING YETI
DARKHOTEL
2013
RED
OCTOBER
WINNTI
NETTRAVELER
ICEFOG
KIMSUKI
2012
FLAME
GAUSS
MINIFLAME
2011
DUQU
DESERT
FALCONS
EQUATION
CARBANAK
Q1 2015
LEADING THREAT RESEARCH
EXPERTS
THREAT DISCOVERY
CULTURE
ACCUMULATED
KNOWLEDGE
AUTOMATED
SYSTEMS
SECURITY EXPERTISE FROM THE TOP DOWN
• More than 3,000 employees
globally
• More than 1/3 of the company’s
employees are R&D experts
• We are an independent company,
our R&D resources are quick
and flexible
BEST PROTECTION
FROM KNOWN, UNKNOWN AND ADVANCED THREATS
Source: Top-3 metrics by Kaspersky Lab
0%
20%
40%
60%
80%
100%
20 40 60 80 100
N of independent tests/reviews
ScoreofTOP3places
Bitdefender
Sophos
G DATA
Symantec
F-Secure Intel Security (McAfee)
Trend Micro
Avira
Avast
BullGuard
AVG
ESET
AhnLab
Microsoft
Panda Security
In 2014:
•  93 independent tests and reviews
•  51 first and 66 Top-3 places
ThreatTrack (VIPRE)
Qihoo 360
Kingsoft
Tencent
Kaspersky Lab
1st places – 51
Participation in 93
tests/reviews
TOP 3 = 71%
KASPERSKY LAB’S ENTERPRISE SOLUTIONS PORTFOLIO
BUILT TO ADDRESS KEY CUSTOMER NEEDS
ENDPOINT
SECURITY
MOBILE
SECURITY
VIRTUALIZATION
SECURITY
SECURTY
INTELLIGENCE
DDOS
PROTECTION
SOLUTIONS FOR
DATA CENTERS
INDUSTRIAL
SECURITY
FRAUD
PREVENTION
ANTI-APT
MOBILITY DATA
BUSINESS
CONTINUITY
KASPERSKY FRAUD PREVENTION
PREVENTION DETECTION INVESTIGATION LEGAL ACTION
TIME
COST
EFFICIENCY
PREVENTION DETECTION
KASPERSKY INDUSTRIAL SECURITY
Level 4
Corporate IT Network
Level 3
Manufacturing Operations Management
Level 2
SCADA Control
Level 1
Operations Control
Level 0
Physical
KASPERSKY ANTI-APT
MITIGATION
Minimize the risk
of penetration
DETECTION
Detect suspicious
activity as early
as possible
FORENSICS
Discover and
remediate damage
KASPERSKY SECURITY INTELLIGENCE SERVICES
INVESTIGATION
•  Malware analysis
•  Digital forensics
•  Incident investigation
EDUCATION
•  Cybersecurity
fundamentals
•  Digital forensics
•  Malware analysis &
reverse engineering
THREAT
INTELLIGENCE
•  Threat data feeds
•  Botnet threat tracking
•  Intelligence reports
KASPERSKY SECURITY INTELLIGENCE SERVICES
We are trusted by:
•  Law enforcement agencies: INTERPOL, Europol, City of London Police etc.
•  Government agencies, national banks, international associations
•  xSP’s: Telefonica
KASPERSKY LAB IS A TRUSTED BUSINESS PARTNER
users worldwide
Over
400 mln corporate clients worldwide
Over
270,000
KASPERSKY LAB IS RECOGNIZED BY ANALYSTS
Magic Quadrant for Endpoint Protection Platforms
Source: Gartner (January 2013)
KASPERSKY LAB IS RECOGNIZED BY ANALYSTS
Forester WaveTM: Endpoint Security, Q1 2013
Source: Forester (Q1 2013)
KASPERSKY LAB IS RECOGNIZED BY ANALYSTS
IDC MarketScape Endpoint Security – Western Europe
Source: IDC (2013)
THANK YOU!
Vladimir Zapolyansky
Head of Product &Technology Marketing

More Related Content

PPTX
Supply Chain Threats to the US Energy Sector
PDF
The Motives, Means and Methods of Cyber-Adversaries
PPTX
Kaspersky endpoint security business presentation
PDF
Introduction to Kaspersky Endpoint Security for Businesss
PDF
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
PDF
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
PPTX
Kaspersky
PDF
Kaspersky Endpoint Security for Business 2015
Supply Chain Threats to the US Energy Sector
The Motives, Means and Methods of Cyber-Adversaries
Kaspersky endpoint security business presentation
Introduction to Kaspersky Endpoint Security for Businesss
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky
Kaspersky Endpoint Security for Business 2015

What's hot (20)

PPTX
Introducing Kaspersky Security for Virtualization - Light Agent
PDF
Kaspersky Endpoint Security and Control - ENGLISH
PDF
kaspersky presentation for palette business solution June 2016 v1.0.
PDF
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
PPTX
Mobile Security: 2016 Wrap-Up and 2017 Predictions
PDF
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
PDF
The Four Horsemen of Mobile Security
PPTX
Tools for Evaluating Mobile Threat Defense Solutions
PPTX
How Aetna Mitigated 701 Malware Infections on Mobile Devices
PPTX
Accessibility Clickjacking, Devastating Android Vulnerability
PPT
Top Tactics For Endpoint Security
PPTX
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
PDF
Data Center Server security
PPTX
How to Add Advanced Threat Defense to Your EMM
PPTX
Cloud Security Strategy by McAfee
PPT
Panda Security2008
PDF
KASPERSKY SECURITY CENTER IMPLEMENTATION
PDF
Eset India General Presentation
PPTX
Check Point Solutions Portfolio- Detailed
PDF
Cisco Security Presentation
Introducing Kaspersky Security for Virtualization - Light Agent
Kaspersky Endpoint Security and Control - ENGLISH
kaspersky presentation for palette business solution June 2016 v1.0.
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Mobile Security: 2016 Wrap-Up and 2017 Predictions
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
The Four Horsemen of Mobile Security
Tools for Evaluating Mobile Threat Defense Solutions
How Aetna Mitigated 701 Malware Infections on Mobile Devices
Accessibility Clickjacking, Devastating Android Vulnerability
Top Tactics For Endpoint Security
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Data Center Server security
How to Add Advanced Threat Defense to Your EMM
Cloud Security Strategy by McAfee
Panda Security2008
KASPERSKY SECURITY CENTER IMPLEMENTATION
Eset India General Presentation
Check Point Solutions Portfolio- Detailed
Cisco Security Presentation
Ad

Similar to Kaspersky Lab new Enterprise Portfolio (20)

PDF
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
PDF
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
PDF
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
PPTX
Cyber risks in supply chains
PDF
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
PPSX
IBM: Cognitive Security Transformation for the Enrgy Sector
PDF
Data security in cloud
PDF
Conférence ENGIE ACSS 2018
PPTX
What i learned at issa international summit 2019
PPTX
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
PDF
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
PPTX
Cyber Security – Challenges [Autosaved].pptx
PDF
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
PPTX
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
PDF
IBM Qradar & resilient
PDF
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
PDF
IBM InterConnect 2013 Security Keynote
PDF
End Your Security Nightmares with ePlus and Cisco
PDF
Future of Penetration Testing Trends to Watch.
PPTX
Gartner technologies for Infosec 2014-2015
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cyber risks in supply chains
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
IBM: Cognitive Security Transformation for the Enrgy Sector
Data security in cloud
Conférence ENGIE ACSS 2018
What i learned at issa international summit 2019
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Cyber Security – Challenges [Autosaved].pptx
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
IBM Qradar & resilient
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
IBM InterConnect 2013 Security Keynote
End Your Security Nightmares with ePlus and Cisco
Future of Penetration Testing Trends to Watch.
Gartner technologies for Infosec 2014-2015
Ad

More from Kaspersky (20)

PPTX
A look at current cyberattacks in Ukraine
PPTX
The Log4Shell Vulnerability – explained: how to stay secure
PDF
The Log4Shell Vulnerability – explained: how to stay secure
PDF
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
PDF
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
PDF
Кирилл Набойщиков. Системный подход к защите КИИ
PDF
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
PDF
Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...
PDF
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
PDF
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
PDF
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
PDF
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
PDF
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
PDF
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
PDF
Марина Сорокина. Криптография для промышленных систем
PDF
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
PDF
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
PDF
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
PDF
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
PDF
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
A look at current cyberattacks in Ukraine
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secure
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Кирилл Набойщиков. Системный подход к защите КИИ
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Марина Сорокина. Криптография для промышленных систем
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз

Recently uploaded (20)

PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Electronic commerce courselecture one. Pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
KodekX | Application Modernization Development
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
NewMind AI Monthly Chronicles - July 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Per capita expenditure prediction using model stacking based on satellite ima...
Electronic commerce courselecture one. Pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
cuic standard and advanced reporting.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Mobile App Security Testing_ A Comprehensive Guide.pdf
KodekX | Application Modernization Development
Big Data Technologies - Introduction.pptx
Encapsulation theory and applications.pdf
MYSQL Presentation for SQL database connectivity
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Dropbox Q2 2025 Financial Results & Investor Presentation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

Kaspersky Lab new Enterprise Portfolio

  • 1. KASPERSKY LAB ENTERPRISE PORTFOLIO Vladimir Zapolyansky Head of Product &Technology Marketing
  • 2. KEY FOCUS AREAS FOR CIOs MOBILITY DATA BUSINESS CONTINUITY
  • 3. DATA PROTECTION DATA LOSS DATA LEAKAGE CYBER THREATS The average cost of a serious breach may reach up to $1.6 mln of organizations lost business-sensitive data28% Source: Corporate IT Security Risks Survey 2014, Kaspersky Lab & B2B International
  • 4. BUSINESS CONTINUITY 65% 35% malware attack 60% <4h. 22% 4-24h. 18% >24h. • Software errors • SCADA failure • Operator mistakes • Other Source: Repository of Industrial Security Incidents (RISI)
  • 5. BUSINESS CONTINUITY – RISK FACTORS EXTERNAL FACTORS INTERNAL FACTORS BUSINESS CRITICAL INFRASTRUCTURE ONLINE SERVICES MALWARE OUTBREAK EMPLOYEE AWARENESS
  • 6. DARK HOTEL A story of unusual hospitality
  • 7. MOBILITY Sources: 1 - Forrester Research, 2 – Gartner, 3 - Corporate IT Security Risks Survey 2014, Kaspersky Lab & B2B International of the world’s workforce is mobile1 Today, ~37% of all companies worldwide are expected to adopt the BYOD model2 By 2017, 50% devices is among the top priorities for the corporate IT security function3 Security of mobile/ portable
  • 9. IT’S TIME TO RETHINK YOUR IT SECURITY MOBILITY DATA BUSINESS CONTINUITY SECURITY INTELLIGENCE TRUSTED PARTNER COMPREHENSIVE PROTECTION TO PREPARE FOR THE INEVITABLE!
  • 10. SECURITY INTELLIGENCE: DOES IT MAKE A DIFFERENCE? KNOWN THREATS UNKNOWN & ADVANCED THREATS 70% 30%
  • 11. KASPERSKY LAB THREAT INTELLIGENCE INSIGHT AND EXPERTISE GAINED THROUGH A HISTORY OF DISCOVERIES 2014 REGIN THE MASK TURLA ENERGETIC BEAR/ CROUCHING YETI DARKHOTEL 2013 RED OCTOBER WINNTI NETTRAVELER ICEFOG KIMSUKI 2012 FLAME GAUSS MINIFLAME 2011 DUQU DESERT FALCONS EQUATION CARBANAK Q1 2015
  • 12. LEADING THREAT RESEARCH EXPERTS THREAT DISCOVERY CULTURE ACCUMULATED KNOWLEDGE AUTOMATED SYSTEMS
  • 13. SECURITY EXPERTISE FROM THE TOP DOWN • More than 3,000 employees globally • More than 1/3 of the company’s employees are R&D experts • We are an independent company, our R&D resources are quick and flexible
  • 14. BEST PROTECTION FROM KNOWN, UNKNOWN AND ADVANCED THREATS Source: Top-3 metrics by Kaspersky Lab 0% 20% 40% 60% 80% 100% 20 40 60 80 100 N of independent tests/reviews ScoreofTOP3places Bitdefender Sophos G DATA Symantec F-Secure Intel Security (McAfee) Trend Micro Avira Avast BullGuard AVG ESET AhnLab Microsoft Panda Security In 2014: •  93 independent tests and reviews •  51 first and 66 Top-3 places ThreatTrack (VIPRE) Qihoo 360 Kingsoft Tencent Kaspersky Lab 1st places – 51 Participation in 93 tests/reviews TOP 3 = 71%
  • 15. KASPERSKY LAB’S ENTERPRISE SOLUTIONS PORTFOLIO BUILT TO ADDRESS KEY CUSTOMER NEEDS ENDPOINT SECURITY MOBILE SECURITY VIRTUALIZATION SECURITY SECURTY INTELLIGENCE DDOS PROTECTION SOLUTIONS FOR DATA CENTERS INDUSTRIAL SECURITY FRAUD PREVENTION ANTI-APT MOBILITY DATA BUSINESS CONTINUITY
  • 16. KASPERSKY FRAUD PREVENTION PREVENTION DETECTION INVESTIGATION LEGAL ACTION TIME COST EFFICIENCY PREVENTION DETECTION
  • 17. KASPERSKY INDUSTRIAL SECURITY Level 4 Corporate IT Network Level 3 Manufacturing Operations Management Level 2 SCADA Control Level 1 Operations Control Level 0 Physical
  • 18. KASPERSKY ANTI-APT MITIGATION Minimize the risk of penetration DETECTION Detect suspicious activity as early as possible FORENSICS Discover and remediate damage
  • 19. KASPERSKY SECURITY INTELLIGENCE SERVICES INVESTIGATION •  Malware analysis •  Digital forensics •  Incident investigation EDUCATION •  Cybersecurity fundamentals •  Digital forensics •  Malware analysis & reverse engineering THREAT INTELLIGENCE •  Threat data feeds •  Botnet threat tracking •  Intelligence reports
  • 20. KASPERSKY SECURITY INTELLIGENCE SERVICES We are trusted by: •  Law enforcement agencies: INTERPOL, Europol, City of London Police etc. •  Government agencies, national banks, international associations •  xSP’s: Telefonica
  • 21. KASPERSKY LAB IS A TRUSTED BUSINESS PARTNER users worldwide Over 400 mln corporate clients worldwide Over 270,000
  • 22. KASPERSKY LAB IS RECOGNIZED BY ANALYSTS Magic Quadrant for Endpoint Protection Platforms Source: Gartner (January 2013)
  • 23. KASPERSKY LAB IS RECOGNIZED BY ANALYSTS Forester WaveTM: Endpoint Security, Q1 2013 Source: Forester (Q1 2013)
  • 24. KASPERSKY LAB IS RECOGNIZED BY ANALYSTS IDC MarketScape Endpoint Security – Western Europe Source: IDC (2013)
  • 25. THANK YOU! Vladimir Zapolyansky Head of Product &Technology Marketing