Kaspersky Security for Mac
  Comprehensive Protection for the Mac OS X Environment




Vartan Minasyan, Head of Product Management, KAV/KIS


Kaspersky Security for Mac Launch Event, Moscow, 14-16, May 2012
PAGE 1 |
Introduction

           Web Security

           Parental Controls

           Mac Look and Feel




PAGE 2 |
Introduction




1 2 3 4 5
Threats for Mac. They are a reality.
                       Rootkit.OSX.Weapox
           IM-Worm.OSX.Leap MacLocker
               MAC Defender
              OSX/iWorkS-A MacSweeper

              Flashfake botnet
   Mac OS X SMS ransomware Backdoor.OSX.Reshe.a (HellRTS.D)

                          OSX/RSPlug-A
            Virus.OSX.Macarena ZeoBit MacKeeper
                  OSX.Trojan.iServices
PAGE 4 |   1 2 3 4 5
Vectors of infection

How malware can end up on a Mac:


  When downloading programs and files (as in the case of Leap worm).
  Via vulnerabilities in apps (Safari, PDF, etc.).
  By installing illegal software or using “pirate” keygens for legal software
  (as in the case of OSX.Trojan.iServices).
  Fraudulent programs that ask users to enter their password and then gain
  access to the computer.
  Via fake antivirus software.




PAGE 5 |   1 2 3 4 5
Why advanced security is needed

 Apple‟s standard security levels protect you from a limited cybercrime threat



 As Apple has gained market share we have seen an increase in cybercriminal
 activity targeting Mac enthusiasts


 Even if Macintosh computers are not vulnerable to most malware in circulation,
 they are an effective way of transferring viruses to colleagues and friends


 Kaspersky Lab has the infrastructure, experience and know-how to protect our
 customers from over 70,000 new threats per day – the kind of protection only a
 devoted specialist company can offer




PAGE 6 |   1 2 3 4 5
Best security solution for Mac
Kaspersky Security for Mac ensures you and your
children are always safe with advanced, real-time
protection from viruses, phishing, dangerous websites and
more.

           Protects against Mac and PC malware in real-time
           Detects phishing and dangerous websites
           Keeps your children safe online
           Safeguards your private data
           Stops PC malware from being passed on to friends and colleagues
           Has familiar Mac „look and feel‟




PAGE 7 |     1 2 3 4 5
Where is Kaspersky Anti-Virus for Mac?

 Kaspersky Security for Mac is the successor to Kaspersky
                Anti-Virus 2011 for Mac.



                                     Latest protection technologies
                                     Improved Web Antivirus
                                                                                                     Kaspersky
                                     Improved anti-phishing technologies                             Security for
                                     Parental controls                                                      Mac
                                     Sensitive data protection




     However, not all the features that would move the product into the “Internet Security” category are there.
     Therefore, we have given the product the somewhat more generic name of Kaspersky Security for Mac.




PAGE 8 |      1 2 3 4 5
Latest Kaspersky Lab technologies

     Real-time Protection
                       Web Anti-Virus
  File Anti-Virus
                      Heuristics



 Kaspersky Security Network (KSN)


    Anti-Phishing
                       URL Advisor




PAGE 9 |   1 2 3 4 5
Web Security




1 2 3 4 5
Online monitor

  Internet and Network Security
       File Anti-Virus scans files for the presence of malware whenever they are
       opened, saved or executed on the computer, and on any associated drives
       Improved!
       Scans web traffic and checks the website against a database of phishing sites
       and dangerous URLs New!
       Kaspersky URL Advisor alerts about suspicious and phishing links Improved!

  Email Protection (scans email messages and attachments)
  All identified threats are blocked
  and you are alerted.




PAGE 11 |   1 2 3 4 5
Private data protection

                        New! Virtual Keyboard defeats keyloggers
                        and screen-capture malware




                                                 Virtual keyboard
                                                 opens
                                                 automatically
                                                 when user wants
                                                 to enter login
                                                 and password




PAGE 12 |   1 2 3 4 5
Private data protection
  New! Prevents children
  from sharing personal
    information (phone
  numbers, addresses or
 banking details) over the
          Internet




PAGE 13 |   1 2 3 4 5
Parental Controls




1 2 3 4 5
Extended parental controls
  New! Parental controls
  include:
  • Internet time control
  • Blocking of unwanted
    websites (plus white &
    blacklists)
  • Restricting downloads by
    file type
  • Safe search
  • Social networking control
    (Facebook, Twitter)
  • Blocking of personal data
    sharing
  • Detailed reports




PAGE 15 |   1 2 3 4 5
Control of social networking




PAGE 16 |   1 2 3 4 5
Mac Look and Feel




1 2 3 4 5
Product look & feel
  User-friendly and intuitive interface
  Protection status in the main window
  Access to all key features from the main
  window New!
  Welcome page to greet the user and provide
  guidance for the program New!




                                               Easy to set-up preferences
                                               Fast access to statistics on all detected
                                               and neutralized threats




PAGE 18 |      1 2 3 4 5
On-demand scanner

  Shows the bar with current
  scanning process
  Choose between:
  • Full scan
  • Quick scan
  • Virus scan of any object

  Choose between:
  • Manual
  • Automatically scheduled

  Adds drag and drop scan for files
  and folders




PAGE 19 |    1 2 3 4 5
Protection center
  If threats are found, the user will be
  alerted and the status in the main
  window changes




                                           The user can eliminate
                                           threats in Protection Center




PAGE 20 |   1 2 3 4 5
Conclusion

  The latest technologies protect against
  emerging Mac threats
  Improved Web Anti-Virus provides
  efficient protection against harmful and
  phishing websites
  Virtual Keyboard safeguards the most
  sensitive data
  Parental controls protect kids from
  harmful websites and deliver a controlled
  experience on social networks
  A revamped and simple-to-use interface
  provides all necessary data at a glance,
  with a Mac look and feel

PAGE 21 |   1 2 3 4 5
Thank you!



Vartan Minasyan, Head of Product Management, KAV/KIS


Kaspersky Security for Mac Launch Event, Moscow, 14-16, May 2012


PAGE 22 |

More Related Content

PPTX
Kaspersky endpoint security business presentation
PDF
Kaspersky Endpoint Overview
PDF
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
PDF
Kaspersky Lab new Enterprise Portfolio
PDF
Kaspersky Endpoint Security for Business 2015
PPTX
Kaspersky
PPTX
Windows 10 and the cloud: Why the future needs hybrid solutions
PPTX
Pegasus Spyware - What You Need to Know
Kaspersky endpoint security business presentation
Kaspersky Endpoint Overview
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Kaspersky Lab new Enterprise Portfolio
Kaspersky Endpoint Security for Business 2015
Kaspersky
Windows 10 and the cloud: Why the future needs hybrid solutions
Pegasus Spyware - What You Need to Know

What's hot (19)

PPTX
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
PPTX
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
PPTX
Accessibility Clickjacking, Devastating Android Vulnerability
PDF
Eset India General Presentation
PPTX
How to Add Advanced Threat Defense to Your EMM
PDF
Office 365 smb guidelines for pure bookkeeping (slideshare)
PDF
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
PPTX
Supply Chain Threats to the US Energy Sector
PDF
Disaster recovery glossary
PDF
Microsoft Defender and Azure Sentinel
PDF
Top Application Security Threats
PDF
Akila srinivasan microsoft-bug_bounty-(publish)
PDF
Web App Attacks - Stats & Remediation
PDF
Cloud Security Myths Vs Facts
PDF
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
PDF
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'ts
PDF
Complete Endpoint protection
PPTX
How to Predict, Detect and Protect Against Mobile Cyber Attacks
PPTX
Automating Critical Security Controls for Threat Remediation and Compliance
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Accessibility Clickjacking, Devastating Android Vulnerability
Eset India General Presentation
How to Add Advanced Threat Defense to Your EMM
Office 365 smb guidelines for pure bookkeeping (slideshare)
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Supply Chain Threats to the US Energy Sector
Disaster recovery glossary
Microsoft Defender and Azure Sentinel
Top Application Security Threats
Akila srinivasan microsoft-bug_bounty-(publish)
Web App Attacks - Stats & Remediation
Cloud Security Myths Vs Facts
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'ts
Complete Endpoint protection
How to Predict, Detect and Protect Against Mobile Cyber Attacks
Automating Critical Security Controls for Threat Remediation and Compliance
Ad

Viewers also liked (7)

PDF
Astaro IT-Security-Lösungen
PDF
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3
PDF
SMS PASSCODE: Authentifizierung per Handy
PDF
Einführung in die VPN Standortvernetzung
PDF
Astaro Security Wall - Sechs Schritte zur sicheren IT
KEY
FLOW3: Security mit AOP
PDF
TYPO3 Neos and Flow - Security 2.0
Astaro IT-Security-Lösungen
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3
SMS PASSCODE: Authentifizierung per Handy
Einführung in die VPN Standortvernetzung
Astaro Security Wall - Sechs Schritte zur sicheren IT
FLOW3: Security mit AOP
TYPO3 Neos and Flow - Security 2.0
Ad

Similar to Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Environment (20)

PDF
Kaspersky Anti-Virus for Macintosh - Technical Presentation
PDF
Kaspersky Internet Security Multi-Device 2015
PDF
Mac review 2012_en
PDF
Kaspersky 2017 Thailand Launch
PPTX
Protecting the Mac Environment: Technical Insight
PDF
Predstavitev Kaspersky PURE 3.0 Total Security
PDF
KAV KIS 2015 Product Presentation
PPTX
Cybercrime Threats in 2012 - What You Need to Know
PPT
Os x security basics for keeping your mac safe final
PDF
Internet Security in corporate environment
PDF
Security on the Mac
PPTX
2011 training presentation
PDF
2009 Kl Cybercrime Kaspersky
PPTX
Antivirus
PPTX
Computer Security and Ethics
PDF
Kaspersky Endpoint Security and Control - ENGLISH
PDF
Predstavitev Kaspersky Small Office Security za mala podjetja
PPTX
Kaseya Connect 2012 - Kaseya Security Solutions Update
PPT
How to install Kaspersky Antivirus.ppt
PPTX
Internet security
Kaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Internet Security Multi-Device 2015
Mac review 2012_en
Kaspersky 2017 Thailand Launch
Protecting the Mac Environment: Technical Insight
Predstavitev Kaspersky PURE 3.0 Total Security
KAV KIS 2015 Product Presentation
Cybercrime Threats in 2012 - What You Need to Know
Os x security basics for keeping your mac safe final
Internet Security in corporate environment
Security on the Mac
2011 training presentation
2009 Kl Cybercrime Kaspersky
Antivirus
Computer Security and Ethics
Kaspersky Endpoint Security and Control - ENGLISH
Predstavitev Kaspersky Small Office Security za mala podjetja
Kaseya Connect 2012 - Kaseya Security Solutions Update
How to install Kaspersky Antivirus.ppt
Internet security

Recently uploaded (20)

PPT
What is a Computer? Input Devices /output devices
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Build Your First AI Agent with UiPath.pptx
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Architecture types and enterprise applications.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PPT
Geologic Time for studying geology for geologist
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
2018-HIPAA-Renewal-Training for executives
DOCX
search engine optimization ppt fir known well about this
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
What is a Computer? Input Devices /output devices
Convolutional neural network based encoder-decoder for efficient real-time ob...
Microsoft Excel 365/2024 Beginner's training
UiPath Agentic Automation session 1: RPA to Agents
Module 1.ppt Iot fundamentals and Architecture
Build Your First AI Agent with UiPath.pptx
Custom Battery Pack Design Considerations for Performance and Safety
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Improvisation in detection of pomegranate leaf disease using transfer learni...
Architecture types and enterprise applications.pdf
Developing a website for English-speaking practice to English as a foreign la...
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Geologic Time for studying geology for geologist
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
2018-HIPAA-Renewal-Training for executives
search engine optimization ppt fir known well about this
A proposed approach for plagiarism detection in Myanmar Unicode text
Credit Without Borders: AI and Financial Inclusion in Bangladesh

Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Environment

  • 1. Kaspersky Security for Mac Comprehensive Protection for the Mac OS X Environment Vartan Minasyan, Head of Product Management, KAV/KIS Kaspersky Security for Mac Launch Event, Moscow, 14-16, May 2012 PAGE 1 |
  • 2. Introduction Web Security Parental Controls Mac Look and Feel PAGE 2 |
  • 4. Threats for Mac. They are a reality. Rootkit.OSX.Weapox IM-Worm.OSX.Leap MacLocker MAC Defender OSX/iWorkS-A MacSweeper Flashfake botnet Mac OS X SMS ransomware Backdoor.OSX.Reshe.a (HellRTS.D) OSX/RSPlug-A Virus.OSX.Macarena ZeoBit MacKeeper OSX.Trojan.iServices PAGE 4 | 1 2 3 4 5
  • 5. Vectors of infection How malware can end up on a Mac: When downloading programs and files (as in the case of Leap worm). Via vulnerabilities in apps (Safari, PDF, etc.). By installing illegal software or using “pirate” keygens for legal software (as in the case of OSX.Trojan.iServices). Fraudulent programs that ask users to enter their password and then gain access to the computer. Via fake antivirus software. PAGE 5 | 1 2 3 4 5
  • 6. Why advanced security is needed Apple‟s standard security levels protect you from a limited cybercrime threat As Apple has gained market share we have seen an increase in cybercriminal activity targeting Mac enthusiasts Even if Macintosh computers are not vulnerable to most malware in circulation, they are an effective way of transferring viruses to colleagues and friends Kaspersky Lab has the infrastructure, experience and know-how to protect our customers from over 70,000 new threats per day – the kind of protection only a devoted specialist company can offer PAGE 6 | 1 2 3 4 5
  • 7. Best security solution for Mac Kaspersky Security for Mac ensures you and your children are always safe with advanced, real-time protection from viruses, phishing, dangerous websites and more. Protects against Mac and PC malware in real-time Detects phishing and dangerous websites Keeps your children safe online Safeguards your private data Stops PC malware from being passed on to friends and colleagues Has familiar Mac „look and feel‟ PAGE 7 | 1 2 3 4 5
  • 8. Where is Kaspersky Anti-Virus for Mac? Kaspersky Security for Mac is the successor to Kaspersky Anti-Virus 2011 for Mac. Latest protection technologies Improved Web Antivirus Kaspersky Improved anti-phishing technologies Security for Parental controls Mac Sensitive data protection However, not all the features that would move the product into the “Internet Security” category are there. Therefore, we have given the product the somewhat more generic name of Kaspersky Security for Mac. PAGE 8 | 1 2 3 4 5
  • 9. Latest Kaspersky Lab technologies Real-time Protection Web Anti-Virus File Anti-Virus Heuristics Kaspersky Security Network (KSN) Anti-Phishing URL Advisor PAGE 9 | 1 2 3 4 5
  • 11. Online monitor Internet and Network Security File Anti-Virus scans files for the presence of malware whenever they are opened, saved or executed on the computer, and on any associated drives Improved! Scans web traffic and checks the website against a database of phishing sites and dangerous URLs New! Kaspersky URL Advisor alerts about suspicious and phishing links Improved! Email Protection (scans email messages and attachments) All identified threats are blocked and you are alerted. PAGE 11 | 1 2 3 4 5
  • 12. Private data protection New! Virtual Keyboard defeats keyloggers and screen-capture malware Virtual keyboard opens automatically when user wants to enter login and password PAGE 12 | 1 2 3 4 5
  • 13. Private data protection New! Prevents children from sharing personal information (phone numbers, addresses or banking details) over the Internet PAGE 13 | 1 2 3 4 5
  • 15. Extended parental controls New! Parental controls include: • Internet time control • Blocking of unwanted websites (plus white & blacklists) • Restricting downloads by file type • Safe search • Social networking control (Facebook, Twitter) • Blocking of personal data sharing • Detailed reports PAGE 15 | 1 2 3 4 5
  • 16. Control of social networking PAGE 16 | 1 2 3 4 5
  • 17. Mac Look and Feel 1 2 3 4 5
  • 18. Product look & feel User-friendly and intuitive interface Protection status in the main window Access to all key features from the main window New! Welcome page to greet the user and provide guidance for the program New! Easy to set-up preferences Fast access to statistics on all detected and neutralized threats PAGE 18 | 1 2 3 4 5
  • 19. On-demand scanner Shows the bar with current scanning process Choose between: • Full scan • Quick scan • Virus scan of any object Choose between: • Manual • Automatically scheduled Adds drag and drop scan for files and folders PAGE 19 | 1 2 3 4 5
  • 20. Protection center If threats are found, the user will be alerted and the status in the main window changes The user can eliminate threats in Protection Center PAGE 20 | 1 2 3 4 5
  • 21. Conclusion The latest technologies protect against emerging Mac threats Improved Web Anti-Virus provides efficient protection against harmful and phishing websites Virtual Keyboard safeguards the most sensitive data Parental controls protect kids from harmful websites and deliver a controlled experience on social networks A revamped and simple-to-use interface provides all necessary data at a glance, with a Mac look and feel PAGE 21 | 1 2 3 4 5
  • 22. Thank you! Vartan Minasyan, Head of Product Management, KAV/KIS Kaspersky Security for Mac Launch Event, Moscow, 14-16, May 2012 PAGE 22 |

Editor's Notes

  • #5: Зловредов для Маков на данные момент известно около сотни.По сравнению с количеством угроз для пользователей ПК (около 5 млн) цифра незначительна.