Kaspersky - Anti Virus

In: Business and Management

Submitted By inesjoaquim
Words 1105
Pages 5
INTERNATIONAL BUSINESS

LJUBLJANA, 5TH MARCH 2013

1.

PERFORM A SWOT ANALYSIS FOR KL.

SWOT stands for Strengths, Weaknesses, Opportunities, and Threats. By definition, Strengths (S) and Weaknesses (W) are considered to be internal factors over which you have some measure of control. Also, by definition, Opportunities (O) and Threats (T) are considered to be external factors over which you have essentially no control.

2. FROM

THE

KL'S STANDPOINT, HOW WOULD YOU SEGMENT THE POTENTIAL

MARKET FOR ANTI-VIRUS PRODUCTS? EVALUATE KL'S PERFORMANCES IN EACH OF THE SEGMENTS.

Market segmentation is a marketing strategy that involves dividing a broad target market into subsets of consumers who have common needs and applications for the relevant goods and services. In relation to KL brand, their customer’s needs are similar, despite the country they live in. However, their behaviour can be different due to demographic reasons and therefore the brand should approach the consumers from different continents and countries differently, in order to not only meet their demand but also to know better each kind of customer. Its objective is Student’s name: Inês Joaquim, number 19562374 Teacher’s name: Gregor Pfajfar Page | 1

INTERNATIONAL BUSINESS

LJUBLJANA, 5TH MARCH 2013

precisely match the expectations of customers to identify market niches. Despite almost every anti-virus products are similar to each other, by adopting this attitude, the company shows that they care about matching their consumer’s expectations. Beyond of geographical and demographical reasons the brand should also consider those customers who are experts or interested in software and anti-virus issues, these may represent a segment of the potential market. For those kinds of customers their marketing strategy as well as way to approach them must be surely distinct from other kinds of…...

Similar Documents

Virus Technology

... to the host etc. At last we covered the solution for the virus i.e. Anti-virus. In this topic we covered how to detect the computer virus, how anti-virus works.   AN INTRODUCTION TO VIRUSES In the mid-eighties, so legend has it, the Amjad brothers of Pakistan ran a computer store. Frustrated by computer piracy, they wrote the first computer virus, a boot sector virus called Brain. From those simple beginnings, an entire counter-culture industry of virus creation and distribution emerged, leaving us today with several tens of thousands of viruses. In just over a decade, most of us have been familiar with the term computer virus. Even those of us who don’t know how to use a computer have heard about viruses through Hollywood films such as Independence Day or Hackers (though Hollywood’s depiction of viruses is usually highly inaccurate). International magazines and newspapers regularly have virus-scares as leading stories. There is no doubt that our culture is fascinated by the potential danger of these viruses. Many people believe the worst a virus can do is format your hard disk. In fact, this type of payload is now harmless for those of us who back up our important data. Much more destructive viruses are those which subtly corrupt data. Consider, for example, the effects of a virus that randomly changes numbers in spreadsheet applications by plus or minus 10% at a stockbroker. Other nasty viruses post company confidential documents in your own name to some of the...

Words: 5536 - Pages: 23

Virus

... software should also be installed and explained in grave detail how to be used and how to make it work best for the company so that any critical information is not getting in the hands of a competitor for use to better their business. Approach First determine what type of anti-virus and encryption software is the best match for the company. Once decided upon install the appropriate software and set aside a time where all employees whom will be using the software can attend a class to help them learn the software and allow them to ask any and all questions before leaving the meeting. It is imperative that everyone involved is on the same page, understands the importance and can use the programs freely without any interruptions or problems. Wing Warehouse systems Before this incident had happened Wing Warehouse did not see the importance of encryption software, and did not do the research on what anti-virus software that they should implement in to their business. They used normal e-mail services such as yahoo mail, G-mail and so on to communicate freely. Also text messages on their phones were being used as well. They have no anti-virus software on their phones and as for sending emails with no encryption they were leaving themselves wide open to the problem they ended up having when the business had to close for a three day period due to a virus and hacker incident. Details about Virus and encryption A computer virus is created when a programmer creates computer...

Words: 2674 - Pages: 11

Kaspersky Lab

...CASE ANALYSIS: KASPERSKY LAB: FROM RUSSIA WITH ANTI-VIRUS   Marketing Management Company Profile Kaspersky Lab (KL) is the largest antivirus company in Europe. It provides some of the world’s most immediate protection against IT security threats, including viruses, spyware, hackers, phishing, and spam. The Company is ranked among the world’s top four vendors of security solutions for endpoint users. KL products provide superior detection rates and one of the industry’s fastest outbreak response times for home users, large enterprises and the mobile computing environment. KL continues to further improve its market position, demonstrating significant growth in all regions. According to the company’s 2011 financial results, KL’s global revenue grew by 14% compared to the previous year and exceeded US $600 million. KL is an international group that operates in more than 100 countries worldwide. The company’s headquarters are located in Moscow, Russia, from which it oversees global operations and business development. KL currently (when?) employs over 2,400 highly qualified specialists. The company has its own territory offices in 29 countries and its products and technologies provide protection for over 300 million users worldwide. Analysis of the Company growth The most profitable area for KL in 2010 has been the IT security software and the enterprise endpoint protection which continues to play a growing role in the achievement of strong performances. The fast growth...

Words: 2240 - Pages: 9

Kaspersky - Anti Virus

... they care about matching their consumer’s expectations. Beyond of geographical and demographical reasons the brand should also consider those customers who are experts or interested in software and anti-virus issues, these may represent a segment of the potential market. For those kinds of customers their marketing strategy as well as way to approach them must be surely distinct from other kinds of customers, since they understand a lot more about the subject and they are also attracted by different kinds of publicity and promoting strategies. On the other hand, those who are not interested in the issue, the most important thing to do is attract them by the efficiency of the product in order to promote is the company quality and highlight their competence. This segment may become the most important target market. There is also the possibility of create another segment of the market composed of the users who do not care about quality and seek only for free products. Thus, knowing that Kaspersky Lab has only trial versions of free antivirus, would be a good bet investing in this market to attract this target population. As the text says, the company provides a great working environment in every city it is settled, suiting their marketing strategy according to the different countries (different segments). The fact that the firm has incredible reputation in many countries means that they are aware of each kind of client’s expectations (each segment). 3. DID KL'S RUSSIAN ORIGIN......

Words: 1105 - Pages: 5

Virus

...Infectious Disease/Viruses As of September 7, 2012 there has been a total of 95 cases of West Nile and 5 deaths in the state of Michigan alone. Out of the 44 states that were involved in a breakdown of statewide reported infections, there were a total of 1,992 cases and 87 deaths reported. The Centers for Disease Control and Prevention (CDC) stated that there is a fatality rate that ranges from 3 to 15% and the first case reported of human infection was in 1999. The topics will discuss history, transmission, treatment, and prevention of the virus. West Nile Virus (WNV) is a virus that is normally seen in the Middle East, Africa, and West Asia through a patient located in Uganda (Henley, 2003). WNV can infect dogs, birds, horses, squirrels, mosquitos, humans, and other mammals. It was thought to have evolved from Israel, and has spread swiftly throughout the United States. The numbers of cases reported were from 20 to 60 per year, until in 2002 when the number rose to above 4,000 (Henley, 2003). The virus exhibits in various ways such as asymptomatic, mild, and severe infections that demonstrate specific outcomes. When the individual is asymptomatic there are no signs or symptoms of the virus. Mild infection or West Nile Fever carries symptoms of nausea and emesis, rash, muscle pain, enlarged lymph nodes, headaches, anorexia, and discomfort (Google, 2012). According to the Journal of Family Practice approximately 20% of individuals that are infected show these...

Words: 1005 - Pages: 5

Virus Attacks

... challenge for every IR team is determining whether an event is the product of routine systems use or an actual incident. Incident classification is the process of examining a possible incident, or incident candidate, and determining whether or not it constitutes an actual incident. Initial reports from end users, intrusion detection systems, host- and network-based virus detection software, and systems administrators are all ways to track and detect incident candidates. Careful training in the reporting of an incident candidate allows end users, the help desk staff, and all security personnel to relay vital information to the IR team. Possible indicators: • Presence of unfamiliar files. • Presence or execution of unknown programs or processes. • Unusual consumption of computing resources. • Unusual system crashes. Probable indicators: • Activities at unexpected times. • Presence of new accounts. • Reported attacks. • Notification from IDS. Definite indicators: • Use of dormant accounts. • Changes to logs. • Presence of hacker tools. • Notifications by partner or peer. • Notification by hacker. Occurrences of Actual Incidents: • Loss of availability. • Loss of integrity. • Loss of confidentiality. • Violation of policy. • Violation of law. Incident Response Once an actual incident has been confirmed and properly classified, the IR team moves from the detection phase to the...

Words: 3573 - Pages: 15

Ebola Virus

...Anatomy and Physiology II 25 April 2013 Ebola According to Aubrey Stimola, author of Ebola, it all started in the town of Yambuku, Zaire, which is now known as the Democratic Republic of Congo. A two week trip to a northern, African jungle had led forty-four year old Mabalo Lokela. All of a sudden, he began experiencing a headache. He stopped by a mission hospital, which was run by nuns. After examining him, they concluded it to be malaria, gave him a quinine injection with one of their five needles, and sent him on his way. Two days later, another man came in with bizarre symptoms, including diarrhea and a heavily bleeding nose, which no amount of anti-biotic would cure. Little did the nuns know, this was the start of a viral epidemic (Stimola 22). Unfortunately for Mabalo, he was the index case for the Ebola Zaire Hemorrhagic Fever (Stimola 27). Since its discovery in 1976, the medical world has been trying to discover what the natural reservoir of this virus is. Some research, reported by Baylor College of Medicine (DMVM,) states that Ebola naturally occurs in fruit bats. In some cases, the three species of bats showed no symptoms of the fever (DMVM). This would, in turn, cause it to become the perfect reservoir for the virus. Incubation of the virus happens within 2-21 days. Initial symptoms of the virus are simple, and seemingly non-life threatening; a mild headache and high fever accompanied by nausea and vomiting cause it to be mistaken for malaria...

Words: 1126 - Pages: 5

Computer Virus

...In this assignment, I will be addressing a few topics about computer virus . I will explain the difficulty of creating a computer virus and its frequency and also explaining the differences between a virus and a worm, along with their threat level. According to Microsoft, computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation (Microsoft, 2013). Computer viruses are difficult to create because you have to know the proper coding and determine what you are trying to attack. Many computer programmers or hackers have coding set up online as a start up, but majority of them don’t function correctly. There is constantly many people trying to hack into computers on a daily. Some are fortunate to succeed and some are not. A virus consists of self-propagating program codes that’s triggered by a specific time or event (Bidgoli, 2012). A virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Viruses can be transmitted through an email attachment or through a network. A computer virus severity varies. It can be mild like a prank, displaying images on a user’s screen or while others can damage your hardware, software or files. According to Cisco, all viruses are attached to an executable file, which means the virus may exist on a system but will not be able to active until a user runs or opens the malicious host file...

Words: 568 - Pages: 3

Firewalls & Anti Virus

...Firewalls help protect a network from malicious intent that can disrupt/totally destroy data or even your hard drive. There are hardware and software versions of firewalls. • Software firewalls – programs that examine data pockets on a network to determine whether to forward them to their destination or block them. An example of this is two-way firewall is Zone Alarm. • Hardware firewalls – protect the entire network typically found in broadband routers. It uses packet filtering to examine the header of the packet to determine its source and destination. This information is compared to a set of pre-defined or user created rules which determine whether the packet is to be forwarded or dropped. An example of a hardware firewalls are Linksys and Cisco routers. Anti-virus software is software used to prevent, detect and remove malware such as worms, Trojan horses, computer viruses and hijackers. Examples include Microsoft Security Essentials and Windows Defender. Disaster recovery is a process, policy, and/or procedure related to preparing for recovery or continuation of the technology infrastructure. This is vital to an organization after a natural or human-induced disaster. It is a subset of business continuity, focuses on the IT or technology systems that support business functions. The most common strategies for data protection are: 1. Backup recorded to a tape and sent off-site at regular intervals. 2. Backups make to a disk on site and automatically copied to...

Words: 943 - Pages: 4

Trojan Virus

... do this to look around your hard drive for information, but may also use this to send spam with your email client, from your email address. It is important to note that not all hackers are bad. Many of them are quite reputable, and would never harm a system, or use it for devious purposes. In fact, many financial institutions hire hackers in order to find security holes in their system to make it safer. Crackers on the other hand, are a danger. This group of people do indeed break into systems with the intent of causing harm, and they often write malicious programs as well. Again, trojans may be distributed via free software downloads, but they can also arrive via email attachments, just as other viruses and worms do. You should also be careful about opening attachments from unknown sources, and also from downloading free software from unknown sources. If the software has a .exe extension in the file name, be especially careful. These days, trojan horses can even be embedded in image files. People commonly send photos to each other online, and this is dangerous in every aspect, unless you know the person, and you know that they take precautions against viruses, worms, and trojan horses as well. Even then, you still run a risk. One of the most well-known trojan horses is called Sub7. Sub7 will allow you to remotely control your own computer, but it allows others to as well. Never install any such software on your computer! Some of the better brands of......

Words: 573 - Pages: 3

Zika Virus

...Facts about the Zika virus: Surge in birth defects- microcephaly suspected to be from Mosquito borne Zika virus in South America Suspected up to 4 million causes on this continent May also cause Guillian Barre – 2.3 cases per 1000 Zika cases Need a vaccine for Zika- can take over a year to develop Transmitted by Aedes aegypti mosquito – also transmits dengue fever and chikangunya virus WHO to determine if it should be considered a “public health emergency of international concern” No treatment Flu like symptoms- low fever, headache, joint pain, rashes Red Cross asking people who have traveled overseas to wait at least 4 weeks before donating blood (Larson, 2016) After watching the movie Contagion and researching articles on the Zika virus, I noticed some similarities and some differences. The virus in the movie was much more deadly and acute than the Zika virus, it was spread through human contact, and it caused worldwide panic. The Zika virus is being linked to other serious health concerns and in most cases only presents with mild symptoms. In both instances the WHO and CDC are scrambling for a vaccine. Both can be considered pandemics because they are infectious and affecting multiple continents. Primary prevention refers to the measures taken to prevent the disease or injury (Stanhope & Lancaster, 2014). Primary prevention in the case of Zika would be getting rid of stagnant water, using insect repellent, restricting...

Words: 377 - Pages: 2

Kaspersky Lab

...Kaspersky Lab: from Russia with anti-virus I will analyze the study case by putting focus on three important questions and points. First I will perform the internal and external environment analysis that Kaspersky Lab faced in year 2011. The internal environment can further be categorized in strengths and weaknesses of the company. It is inevitably that such a successful, fast growing company relies on many strengths. KL had initiatives and tendency to attract and retain qualified employees. Their skills and competences helped to delivering high-quality services and products. The products and services offered are technologically superior. Beside quality, their abilities also contribute to early detection of various threats. It was the first company to identify major shift in hackers behavior. The company ability to motivate and reward its employees is just a one piece of the strength puzzle. Another key strength is innovation. The constant updates and their pace with the changes and trends in the market is a key advantage over the other competitors. Furthermore, KL was the first company to introduce hourly anti-virus updates, leaving the competitors lacking with only daily updates. An important strength which helped KL to be successful in foreign emerging markets were the localized solutions. KL has great ability to launch products which will satisfy the needs of a certain market. Another strength is their webpage, which offers free trials, information and guidance for the...

Words: 1437 - Pages: 6

Virus Titration

... takes days for results to show. Hemagglutination assays are very inexpensive to carry out, the equipment used is readily available, and it is also a simple process to carry out. However, the end point dilution assay method, there is a higher risk of contamination, as the assay is left for longer than the hemagglutination assay which results can be seen within 30 minutes (Kumar P, 2013). Also the determination of the cytopathic effect is subjective, as the infected cells can be difficult to visualise, where as the hemagglutination assay the results are quite conclusive (Bradley C. Long et al, 2004). References Bradley C. Long, Tony L. Goldberg, Sabrina L. Swenson, Gene Erickson, Gail Scherba (2004) Adaptation and limitations of established hemagglutination inhibition assays for the detection of porcine anti–swine influenza virus H1N2 antibodies Kumar, P. (2013) Methods for Rapid Virus Identification and Quantification Smither SJ, Lear-Rooney C, Biggins J, Pettitt J, Lever MS, Olinger GG Jr. (2013) Comparison of the plaque assay and 50% tissue culture infectious dose assay as methods for measuring filovirus infectivity. Willey, J.M., Sherwood, L. and Woolverton, C. (2014) Prescott’s microbiology. 9th edition. New York: McGraw Hill Higher Education...

Words: 982 - Pages: 4

Computer Virus

...Donovan F. Gaston Ms. Squibb E.D.D. CTC 109 February 8, 2012 Computer Virus: Do you own a laptop or a desktop computer? Have you ever experienced different weird action from it? Have you ever started writing a document, and it looks different, some chapters might be missing or something else abnormal has happened. For instance getting slow or when you turn the computer on, it says that all the data has been erased. NOOOO!! The first thing you do in situations like this is panic. You might think all that hard work you’ve done is all down the drain. That could be true, but in most cases viruses have not done any harm jet, but when some people try to get rid of viruses they delete files or they might even format the whole hard disk. Doing such isn’t the best thing to do when you think you have a virus infection. A good analogy to best explain what viruses are like is when people gets sick and you don’t know what’s wrong what do they do? They go to see a doctor to find out what’s wrong with them. It’s the same way with viruses, if you don’t know what to do you call someone who knows about viruses and get professional help. It is concluded that computer viruses is an important research area with potential applications to other fields, that current systems offer little or no protection from viral attack. (Fred). A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also used to refer to other types of malicious......

Words: 310 - Pages: 2

Computer Virus

... connected to a network, or if the computer gets connected to infected media such as a USB drive or a CD. Although there are many viruses, the main problems are caused by a handful of very familiar one such as cascade, form, Jerusalem and stoned. Since these viruses have been around for some time, they are well understood and easy to remove from computers using anti-virus software. Viruses are quite common, especially in the situations where there is a large number of users such as in a school or college. History: The Rise of Viruses The first known computer virus was written in 1982 by a man named Rich Skrenta. This virus was termed Elk Cloner, and was the first computer virus to show up outside of the computer it was created in. Elk Cloner worked by attaching itself to the Apple DOS operating system and was spread to other computers by means of a floppy disk. Another first computer virus popularly known as the 'Brain virus' was created in 1986 by two Pakistani brothers, Amjad and Basit Farooq Alvi. This virus, which spread via floppy disks, was known only to infect boot records and not computer hard drives like most viruses today. The virus also known as the Lahore, Pakistani, Pakistani Brain, Brain-A and UIUC would occupy unused space on the floppy disk so that it could not be used and would hide from detection. It would also disguise itself by displaying the uninfected bootsector on the disk. In 1987, the Lehigh virus was discovered at Lehigh......

Words: 2136 - Pages: 9