„I got Peter as a recommendation from a good colleague. One month ago I ordered a server for my personal SharePoint playground, which really rocks :). Peter helped me taking the right key decisions for investing my money in the best way possible. Hence, I can only recommend Peter and his team if you are looking for a competent partner for purchasing hardware.“
Info
Founder, kompetenzzentrum.IT / ITSEC
Member Board of…
Aktivitäten
-
As CrowdStrike continues to work with customers and partners to resolve this incident, our team has written a technical overview on today’s events…
As CrowdStrike continues to work with customers and partners to resolve this incident, our team has written a technical overview on today’s events…
Beliebt bei Peter Stelzhammer
-
Yeah, we got it, CrowdStrike’s bad update is causing issues worldwide and YOUR competitive solution is the alternative we should consider 🤦♂️ I…
Yeah, we got it, CrowdStrike’s bad update is causing issues worldwide and YOUR competitive solution is the alternative we should consider 🤦♂️ I…
Beliebt bei Peter Stelzhammer
-
Tapping into your retirement savings and mortgaging your house to self-fund the development of a commercial product is no easy task. The stress level…
Tapping into your retirement savings and mortgaging your house to self-fund the development of a commercial product is no easy task. The stress level…
Beliebt bei Peter Stelzhammer
Berufserfahrung und Ausbildung
Veröffentlichungen
-
Mobile Security Products for Android: Security for the Android Platform
Once again we tested security products for smartphones running Google's Android operating system. The report covers details of the products made by leading manufacturers. Smartphones represent the future of modern communications. In 2013, more than 1 billion smartphones were sold, a further milestone in the advance of these devices1. A study published by Facebook emphasises the importance of smartphones in our lives; about 80% of users make use of their smartphone within 15 minutes of waking up…
Once again we tested security products for smartphones running Google's Android operating system. The report covers details of the products made by leading manufacturers. Smartphones represent the future of modern communications. In 2013, more than 1 billion smartphones were sold, a further milestone in the advance of these devices1. A study published by Facebook emphasises the importance of smartphones in our lives; about 80% of users make use of their smartphone within 15 minutes of waking up each day. At the same time, the traditional function of a telephone is becoming less and less important. The high quality of integrated cameras means that the smartphone is increasingly used for photography. As well as with photos, users trust their devices with their most personal communications, such as Facebook, WhatsApp and email. This brings some risks with it, as such usage makes the smartphone interesting for criminals, who attempt to infect the device with malware or steal personal data. There is also the danger brought by phishing attacks. These days, the use of security software on a PC or laptop is seen as essential. However, many smartphone users do not yet have the same sense of responsibility, even though their devices store personal data, private photos, Internet banking information or even company data. As modern smartphones are often expensive to buy, they are also an attractive target for thieves. Top-quality smartphones cost several hundred Euros. As it is not possible to physically prevent them from being stolen, they must be made less attractive to thieves. Consequently, many of today's security products contain not only malware protection, but also highly developed theft-protection functions, which make the device less attractive to thieves (e.g. by locking the device), and help the owner to find it again.
Andere Autor:innenVeröffentlichung anzeigen -
Free Antivirus and its Market Implementation
The study analyzed the business model of two selected Chinese AV-vendors, Qihoo 360 and Baidu, from the perspective of their product development model, revenue model, marketing and distribution, and services and implementation. Furthermore, market research was conducted to compare the Chinese and Western users in order to investigate the influential factors on users' choice of security software. This study was initiated for the purpose of investigating the business model which supports Chinese…
The study analyzed the business model of two selected Chinese AV-vendors, Qihoo 360 and Baidu, from the perspective of their product development model, revenue model, marketing and distribution, and services and implementation. Furthermore, market research was conducted to compare the Chinese and Western users in order to investigate the influential factors on users' choice of security software. This study was initiated for the purpose of investigating the business model which supports Chinese "free" AV-vendors to offer free fully-functional security software.
Andere Autor:innenVeröffentlichung anzeigen -
Efficient Malware Detection: by a Honeypot Network
Akademikerverlag
Testing and comparing antivirus software necessitates the availability of malware samples. An efficient way to detect malware is the use of honeypots. There exist honeypots which passively wait for automated attacks in order to capture the malicious binaries. Other types of honeypots crawl the web, and, by being attacked, can identify malicious websites. The goal was to create an efficient, easily manageable and adaptable network of honeypots, distributed worldwide, which automatically collects…
Testing and comparing antivirus software necessitates the availability of malware samples. An efficient way to detect malware is the use of honeypots. There exist honeypots which passively wait for automated attacks in order to capture the malicious binaries. Other types of honeypots crawl the web, and, by being attacked, can identify malicious websites. The goal was to create an efficient, easily manageable and adaptable network of honeypots, distributed worldwide, which automatically collects and handles malware from the web. For this purpose, existing honeypots were investigated and compared extensively. The findings were incorporated in the design of specialized, user-friendly honeynets, capable of automatically collecting malware samples and handling already known and unknown (zero-day) attacks. Additionally, an efficient sorting mechanism for large amounts of malware files was developed in order to create useful test sets.
Andere Autor:innen -
IT Security Products for Corporate Users [Paperback]
Most organizations are aware of the risks threatening their IT environment. Viruses, trojans, worms, exploits and many other threats represent a serious danger for the IT department. A collapse of the IT system could mean grave financial losses right up to insolvency for a company. The IT departments of companies are conscious of this problem. Getting the best protection against these threats is the only issue. A simple file antivirus solution alone is totally inade-quate, as there are too many…
Most organizations are aware of the risks threatening their IT environment. Viruses, trojans, worms, exploits and many other threats represent a serious danger for the IT department. A collapse of the IT system could mean grave financial losses right up to insolvency for a company. The IT departments of companies are conscious of this problem. Getting the best protection against these threats is the only issue. A simple file antivirus solution alone is totally inade-quate, as there are too many threats from contaminated e-mails, exploits etc. What is re-quired is a comprehensive suite that provides protection against all of these. Functional Diversity Because of the immense functional diversity of various antivirus suites and corporate prod-ucts, it is becoming increasingly difficult for decision-makers in the IT sector to get a proper overview. Which product should one opt for and for which areas of protection? During these tests our main focus has not been on malware detection rates, but on the prod-ucts' handling and user-friendliness, and the scope of functionality. We have compiled the functional scope of various products in a detailed table. For malware detection rates of indi-vidual products please refer to the tests of our website: http://www.av-comparatives.org
Andere Autor:innenVeröffentlichung anzeigen -
Energieeffizienz und Kostenoptimierung in der IT: Total Cost of Ownership (TCO) & Green-IT [Broschiert]
BoD
Die Studie „Total Cost of Ownership (TCO) & Green-IT – Energieeffizienz und Kostenoptimierung“ befasst sich mit der Fragestellung, ob es für eine bestimmte Unternehmensgröße ökonomisch und/oder ökologisch effizienter ist in einem Zyklus von 3 Jahren auf einen Gesamtbetrachtungsrahmen von 9 Jahren die gesamte IT-Landschaft eines Unternehmens gegen ein energieeffizienteres Pendant auszutauschen oder die bestehende aufzurüsten.
Auszeichnungen/Preise
-
Tyrol's most family-friendly company
Government Tyrol / Austria
-
Best Paper Award - Malwareconference 2014
-
Best Paper Award at the www.malwareconference.com 2014
Paper: Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative protection testing by Andreas Clementi and Peter Stelzhammer, AV-Comparatives, Austria. -
Innovationspreis IT - "Best Of"
Initiative Mittelstand Deutschland
-
Constantinus Award - Special Award International Project
Government of Austria
The Constantinus Award is the highest award which is given by Austrian Government (Chamber of Commerce) for international projects in management consulting.
-
Constantinus Award in Computer Science, 1st Place
Government of Austria
The Constantinus Award is the highest award which is given by Austrian Government (Chamber of Commerce) for projects in computer science.
-
Cluster Award 2012
Standortagentur Tirol
AV-Comparatives' Real World Protection Test was awarded as the best IT innovation 2012 in the Tyrol.
-
Austrian eAward 2012
Report.at
-
Nomination T-System Innovation Award 2012
-
-
Austrias top cycle-friendly company
Chamber of Commerce Austria
-
Tirolissimo (6 times as subcontractor)
Chamber of Commerce - Tyrol
2003, 2004, 2005, 2006, 2008, 2009
Sprachen
-
Deutsch
Muttersprache oder zweisprachig
-
Englisch
Verhandlungssicher
Erhaltene Empfehlungen
1 Person hat Peter Stelzhammer empfohlen
Jetzt anmelden und ansehenWeitere Aktivitäten von Peter Stelzhammer
-
In my last post, I shared that my family and I are about to embark on a new chapter in our lives. I thrive on change and have embraced it throughout…
In my last post, I shared that my family and I are about to embark on a new chapter in our lives. I thrive on change and have embraced it throughout…
Beliebt bei Peter Stelzhammer
-
🇩🇪Heute auf der PITS 2024 in Berlin!🇩🇪 Ich freue mich sehr, heute auf der Public IT Security (PITS) 2024 in Berlin im Hotel Adlon Kempinski…
🇩🇪Heute auf der PITS 2024 in Berlin!🇩🇪 Ich freue mich sehr, heute auf der Public IT Security (PITS) 2024 in Berlin im Hotel Adlon Kempinski…
Beliebt bei Peter Stelzhammer
-
I’m happy to share that I’m starting a new position as Founder/CEO of a stealth startup!
I’m happy to share that I’m starting a new position as Founder/CEO of a stealth startup!
Beliebt bei Peter Stelzhammer
-
NetSecurity shining at #InfoSecurityEurope2024 in London! 👉 Our team at NetSecurity, including our CEO and Founder Inno Eroraha [NetSecurity] were…
NetSecurity shining at #InfoSecurityEurope2024 in London! 👉 Our team at NetSecurity, including our CEO and Founder Inno Eroraha [NetSecurity] were…
Beliebt bei Peter Stelzhammer
-
More action at #GartnerSEC booth #1048, where you can learn how SlashNext’s Cloud Email+ Security advanced AI platform is purpose-built to anticipate…
More action at #GartnerSEC booth #1048, where you can learn how SlashNext’s Cloud Email+ Security advanced AI platform is purpose-built to anticipate…
Beliebt bei Peter Stelzhammer
-
We spoke to Microsoft's Glaucia Faria Young, who is an AMTSO board member, about how the meaning of #cybersecurity has changed within Microsoft the…
We spoke to Microsoft's Glaucia Faria Young, who is an AMTSO board member, about how the meaning of #cybersecurity has changed within Microsoft the…
Beliebt bei Peter Stelzhammer
Weitere ähnliche Profile
-
Sabine Singer, MBA 💎
Vernetzen -
Martin Hairer
Vernetzen -
Lukas Huber
Head of AI and Advanced Analytics at roosi
Vernetzen -
Fritz Fahringer
Partner finden - Digitalisierungen vorantreiben - unternehmerisch denken und umsetzen
Vernetzen -
Meet Narkhede
Founder - Cyberfinity | Security Researcher | VAPT | OSINT | Ethical Hacker | Acknowledged By Apple, Upstox, Oracle, NVIDIA, United Nations & So on | Web Developer | Crypto & Web3 Enthusiast
Vernetzen -
Georg Ogris
Data & AI
Vernetzen -
Theresa Huber (vorm. Neuner)
Teamleiterin Gründerservice I Teamleiterin Technologie & Digitalisierung bei Wirtschaftskammer Tirol
Vernetzen -
Marina Scherz
Vernetzen -
Reinhard Palaver
Management-Consulting und Strategieentwicklung im digitalen Zeitalter für ihr Unternehmen | Speaker und Author
Vernetzen -
Stefan B. J. Aigner
AI Consultant | Entrepreneur | Investor
Vernetzen
Weitere Mitglieder namens Peter Stelzhammer in Österreich
-
Peter Stelzhammer
Technische Assistentz, Postproduktion & Multimedia
-
Peter Stelzhammer
--
-
Peter Stelzhammer
--
-
Hans-Peter Stelzhammer
Kfz-Mechaniker bei BRP
Es gibt auf LinkedIn 4 weitere Personen namens Peter Stelzhammer, die sich in Österreich befinden.
Weitere Mitglieder anzeigen, die Peter Stelzhammer heißen