ESET a pioneer of IT security since 1987



Similar documents
Customer Value Enhancement, Endpoint Security Products Global, 2011

Global Endpoint Security Market

ESET Security Solutions for Your Business

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

Trend Micro Endpoint Comparative Report Performed by AV Test.org

How To Buy Nitro Security

Anti-Virus Comparative

Global Security Software Market

KASPERSKY ENDPOINT SECURITY FOR BUSINESS: TECHNOLOGY IN ACTION

Anti-Virus Comparative

KASPERSKY LAB TECHNOLOGY LEADERSHIP

Endpoint Buyers Guide

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

Fully supported Antivirus software (Managed Antivirus)

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Global Antivirus Software Package Market

PCSL. PCSL IT Consulting Institute 机 安 全 软 件 病 毒 检 测 率 测 试

Cyber Security Solutions:

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Supported Anti Virus from ESAP 2-6-1

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

ENTERPRISE EPP COMPARATIVE REPORT

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

The Antivirus Industry: Quo Vadis? VirusBulletin

Security Industry Market Share Analysis

Security Industry Market Share Analysis

HRizons Human Capital Management

What Do You Mean My Cloud Data Isn t Secure?

Microsoft s cybersecurity commitment

Secure Your Success. Intel Security Partner Program

Comparing Antivirus Business Solutions. A small business running 25 work stations and 2 servers require an antivirus solution that

Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis

Total Protection for Compliance: Unified IT Policy Auditing

T r a n s f o r m i ng Manufacturing w ith the I n t e r n e t o f Things

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Henry Ford Health System Remote Access Support Details

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

How To Test For Performance On A 64 Bit Computer (64 Bit)

Protecting Your Roaming Workforce With Cloud-Based Security

Cisco Security Intelligence Operations

CORPORATE AV / EPP COMPARATIVE ANALYSIS

2011 NATIONAL SMALL BUSINESS STUDY

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

IT Security Survey 2014

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Online Payments Threats

I D C A N A L Y S T C O N N E C T I O N

KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE

Agnitum SMB Solutions. Outpost Network Security Version 3.2 Securing your network

MRG Effitas Online Banking / Browser Security Assessment Project Q Results

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Global Security Testing Market

Symantec Endpoint Protection

Anti-Virus Comparative

INDEPENDENT VALIDATION OF FORTINET SOLUTIONS. NSS Labs Real-World Group Tests

Symantec Endpoint Protection Integration Component 7.5 Release Notes

PCSL. PCSL IT Consulting Institute 手 机 安 全 软 件 病 毒 检 测 率 测 试. Malware Detection Test. Celebrating Technology Innovation

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Symantec Endpoint Protection

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Sophos Acquires Cyberoam

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

ANITIAN INTELLIGENT INFORMATION SECURITY INTELLIGENT INFORMATION SECURITY

The Protection Mission a constant endeavor

Transcription:

ESET a pioneer of IT security since 1987

ESET Growth 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014

Gross Revenue for the last 12 years in Million USD 450 400 350 300 250 200 150 100 50 0 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014

Worldwide Endpoint Security Revenue by Vendor, 2013, $M 2766,8 1369,6 855,9 667 392,1 311,1 250,6 189,8 173,5 146,6 Symantec McAfee Trend Micro Kaspersky ESET Sophos AVG IBM F-Secure Panda Security Source: IDC Worldwide Endpoint Security 2014 2018 Forecast and 2013 Vendor Shares

ESET Is A Major Player ESET was ranked #5 by IDC by Worldwide Endpoint Security Revenue for 2012 and 2013

ESET is protecting millions of users in more than 180 countries worldwide

As the Internet has grown, so has ESET 1000 EMPLOYEES 2015 4 FOUNDERS 135 EMPLOYEES 2006 1987

ESET s worldwide presence HEADQUARTERS Bratislava, SK REGIONAL CENTERS AND OFFICES San Diego (USA) Buenos Aires (ARG) Sao Paulo (BRA) Sydney (AUS) Jena (GER) Prague (CZE) Singapore MALWARE RESEARCH AND TECHNOLOGY CENTERS Bratislava (SVK) Moscow (RUS) Košice (SVK) Buenos Aires (ARG) San Diego (USA) Prague (CZE) Montreal (CAN) Jablonec nad Nisou (CZE) Krakow (POL) Singapore

Awards ESET product is the leader in lowest system-resource consumption by testing authority AV-Comparatives ESET has received the most "Advanced+" awards in proactive tests from AV-Comparatives ESET Business products get the approved award from AV-Comparatives The only vendor with record-breaking protection ESET achieves 100% protection in Dennis Technology labs independent test, topping the list of IT security vendors

Awards We give the 2014 ESET NOD32 Antivirus 10 out of 10 stars and a 2014 Best Buy Award. ESET Wins PCMag Consumer recommended Award for Security Suites and Stand Alone Antivirus Software Nikkei Computer is a large IT magazine in Japan and in August 2014 published results of Nikkei Computer Customer Satisfaction Survey 2014/2015 where Nikkei have surveyed more than 10,000 different organizations in Japan on ESET s business products and related services. ESET were ranked the highest for its installation, configuration, performance, available features, usability and overall customer satisfaction. ESET has scored between 5 and 17 more points compared to the 2nd-placed competitor in all of those categories.

Nikkei Customer Survey 2014 We outperformed the competition by a big margin.

Leading enterprises entrust their IT security to ESET

Go Explore Consumer Products

Do More With Business Products

Values Enjoy Safer Technology Vision We will enable everyone to enjoy the full potential of themselves and their technology in a secure digital world. Mission Working with ethical and passionate people we are building a safer technology environment for everyone to enjoy. We are doing this through education and our commitment to research and development. Courage. We don t take the easy way. We constantly push boundaries and are determined to make a difference. Integrity. We encourage fairness and honesty in everything we do. Reliability. People can count on us. We work hard to live up to our promises, and to build trust and rapport. Passion. We believe in ourselves and in what we do. We re driven to shape a better future for everyone. With a passion.

Product Principles PROACTIVE DETECTION at the core is our award-winning ESET NOD32 malware detection technology SPEED our technology works fast, and has the lowest possible impact on your systems USABILITY designed by IT professionals for ultimate ease of use

Layered Security Model

Moving to IoT: Detecting Compromised Routers

In depth research is crucial to stay on top

In-depth Research And Threats Monitoring Knowing how to tune our detection/protection strategy best Learning when new attack comes or a new campaign is launched Understanding the ecosystem and learning how to disrupt it Hunting down cybercriminals, working with Law Enforcement Recognizing targets of attacks Speaking at Technical Forums Sharing our knowledge and educating everyone

ESET Intelligence Services Helping corporate clients in need Mostly banks Incident response, providing Indicators of Compromise Providing automated analytics Submitted samples are automatically replicated and metadata provided Early warning system Brand monitoring/keyword monitoring

Péter Szőr Award from Virus Bulletin We sent these nominations to the VB Advisory Board for their consideration, and 'Operation Windigo' was the clear winner.