Preview

Kaspersky Lab

Best Essays
Open Document
Open Document
3561 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Kaspersky Lab
Introduction & Industry Analysis
All security software is not created equal. Like all consumer products, antivirus software has the good, the bad, and the mediocre. The choices for antivirus protection are many and varied. Purchasing antivirus software can be an especially daunting task, especially for anyone who isn 't specifically tech-savvy. Most consumers want to get the best possible protection, but they also want to make sure that they are getting the best bang for their buck (ConsumerRankings.com). When it really comes down to it, effectiveness and usability can either make or break the success antivirus software. In addition, anti-virus software is an inexpensive solution to protect your computer from potential online risks. It is easy to install and can usually be purchased at a retail store or online from a name brand company for under $50. The leading suppliers of security software by revenue as of 2011 are Symantec, Trend Micro, McAfee, and Kaspersky (Kooten, 2011). Furthermore, according to PC Magazine, April 2012, the following were listed as the best security software for 2012: Webroot Secure Anywhere Antivirus, Norton Antivirus 2012, Bitdefender Antivirus Plus 2012, and Kaspersky Anti-Virus 2012. However, it is important to note that various sites and websites ranked the software differently. Kaspersky, more so than its competition, was consistently in the top 3 amongst the various review sites PC World, devduff.com, and pcantivirusreviews.com.
The future of Antivirus software sales is expected to continue to be strong especially when you consider emerging markets like China and India. The prevalence with which hackers are dishing out obstacles to IT security pros will mean a big positive for vendors in 2012 (Kirk, 2011). Today, an unprotected computer isn’t just vulnerable, it’s probably already infected. New viruses, spyware, trojans, worms and other malware debut every day. New threats are disguised to bypass other security



References: Dunn, E. John. (2012, February 6). Kaspersky Lab CEO backs out of IPO plan. Retrieved from, www.Techworld.com. Holt, Kris. (2012, May 15). Apple Makes Strong Showing in American Customer Satisfaction Index Debut. Retrieved from, www.tmcnet.com/topics/articles/2012/05/15/290472-apple-makes-strong-showing-american-customer-satisfaction-index.htm#ixzz1waQbDofn www. Jahangiri, Bonnie. (2008). The History of Ahmad Tea. Retrieved from, www.ehow.com. Kaspersky.com. (2012, March 23). Kaspersky Lab shows 864% growth in 5 year EMEA. King, Mike. (2012, May11). The world Cyber Security market set to reach $80 billion by 2017. Retrieved from, http://www.companiesandmarkets.com/News/Information-Technology/The-world-Cyber-Security-market-set-to-reach-80-billion-by-2017/NI3010 Kirk, Jeremy Ragan, Steve. (2012, February 13). Kaspersky maintains profitability and control as they move into 2012. The Tech Herald. Kshetri, Nir. (2001). Kaspersky Lab: from Russia with anti-virus. Emerald Emerging Markets Case Studies: Vol. 1NO. 3, pp. 1-10. Menon, V. (2010). Kaspersky Lab eyes no. 3 position in endpoint security. Retrieved from, www.itp.net/579148-kaspersky-lab-eyes-no-3-position-in-endpoint-security Munsen, Lee Palmer, Maija. (2012, February 6). Kaspersky rules out IPO – Should the others? Retrieved from ft.com Peterson, D.J Roll, Martin. (2011, January 23). Country of Origin Carries Weight In the Globalized Marketplace. Retrieved from, www.jakeartaglobe.com Surveymethods.com (2009) Van Kooten, Michael. (2011). Global Software Top 100 Edition. Retrieved from, www.Partnerpedia.com.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

     Lateral information • Information gathered from other bidders  Procurement • Process of acquiring (purchasing)  Contracts • Legal agreements between provider and client IS4799 Information Systems and Cybersecurity Capstone Project © ITT Educational Services, Inc. All rights reserved.…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Riordan Manufacturing

    • 549 Words
    • 3 Pages

    Doidge, C., Karolyi, G. A., & Stulz, R. M. (2011, August 3). The US left Behind: The rise of IPO activity around the world. Retrieved from http://www.voxeu.org/article/us-left-behind-rise-ipo-activity-around-world…

    • 549 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    Ghosh, A., & Cigital, M. An Approach to Defending Against New and Unknown Malicious Software. Retrieved Feb 16, 2012, from http://www.cigital.com/resources/papers/…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Better Essays

    Jetblue Ipo

    • 1236 Words
    • 5 Pages

    Draho, J. (2004). “The IPO Decision: Why and How Companies Go Public”. Cheltenham, UK: Edward Elgar Publishing.…

    • 1236 Words
    • 5 Pages
    Better Essays
  • Good Essays

    - Endpoint security market in constant growth : lots of customers agree to pay an expensive software if it’s very efficient, because the number of malicious programs is increasing and they want to have a total protection…

    • 872 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Whoriskey, P., & Hilzenrath, D. (2012, May). Investors sue Facebook, advisers as scrutiny of IPO hype intensifies. Retrieved from…

    • 1875 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Cybersecurity Trends

    • 530 Words
    • 3 Pages

    Every year, millions of viruses are released through the Internet. The FBI reports that there are a variety of cyber-threats, such as identify theft, Internet fraud and cyber-crimes related crimes like terrorism.…

    • 530 Words
    • 3 Pages
    Good Essays
  • Best Essays

    It checks for connection speed and static on the line to ascertain the best route for the packet to take to reach its destination. Acting as a gateway between networks, routers make sure that data is delivered to its proper destination. The second purpose of a router is to ensure that data does not go where it is not permitted. By acting as a virtual network traffic cop, routers keep data and specifically large files from being distributed to all machines on a network, which could potentially cripple the network (Hill,…

    • 4393 Words
    • 18 Pages
    Best Essays
  • Powerful Essays

    abortions

    • 3722 Words
    • 15 Pages

    infection at any time before completion of pregnancy.” Abortions have always been and will probably always be a controversial…

    • 3722 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Danger of Malware

    • 839 Words
    • 4 Pages

    Computer worms and viruses pose a clear and present danger for corporate and public information security in that as time and technology progress, the damaging effects this "malware" has on the network increases. Throughout this paper the term "malware" is used to define software that damages your system, causes instability, or exhibits antisocial behavior such as changing settings or interfering with a computer's registry and security settings. Typical examples include computer viruses or worms.…

    • 839 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Ktm Case Report

    • 2977 Words
    • 12 Pages

    Kelley, J., Burke, R., & Markham, J. (2011). Is Your Company IPO-Ready?. Corporate Finance Review, 15(5), 23-27.…

    • 2977 Words
    • 12 Pages
    Better Essays
  • Better Essays

    Computer Fraud and Crimes

    • 1013 Words
    • 5 Pages

    amounts of memory being used and the file usage if something is going on that…

    • 1013 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Antivirus Research Lab

    • 1090 Words
    • 5 Pages

    When researching the internet I stumbled across free anti-virus software that I hadn’t heard of or ever used. I chose to compare this one, AVG Antivirus Free Edition with Avast, one that I currently use because I do know about Avast Anti-virus from using the free edition. Avast was recommended to me by a previous co-worker, also I just received my computer back from a repair shop who also recommended Avast. Not to mention, Avast has high ratings online as the best free edition of anti-virus programs.…

    • 1090 Words
    • 5 Pages
    Good Essays