“I got Peter as a recommendation from a good colleague. One month ago I ordered a server for my personal SharePoint playground, which really rocks :). Peter helped me taking the right key decisions for investing my money in the best way possible. Hence, I can only recommend Peter and his team if you are looking for a competent partner for purchasing hardware.”
About
Founder, kompetenzzentrum.IT / ITSEC
Member Board of…
Activity
-
In my last post, I shared that my family and I are about to embark on a new chapter in our lives. I thrive on change and have embraced it throughout…
In my last post, I shared that my family and I are about to embark on a new chapter in our lives. I thrive on change and have embraced it throughout…
Liked by Peter Stelzhammer
-
🇩🇪Heute auf der PITS 2024 in Berlin!🇩🇪 Ich freue mich sehr, heute auf der Public IT Security (PITS) 2024 in Berlin im Hotel Adlon Kempinski…
🇩🇪Heute auf der PITS 2024 in Berlin!🇩🇪 Ich freue mich sehr, heute auf der Public IT Security (PITS) 2024 in Berlin im Hotel Adlon Kempinski…
Liked by Peter Stelzhammer
-
I’m happy to share that I’m starting a new position as Founder/CEO of a stealth startup!
I’m happy to share that I’m starting a new position as Founder/CEO of a stealth startup!
Liked by Peter Stelzhammer
Experience & Education
Publications
-
Mobile Security Products for Android: Security for the Android Platform
Once again we tested security products for smartphones running Google's Android operating system. The report covers details of the products made by leading manufacturers. Smartphones represent the future of modern communications. In 2013, more than 1 billion smartphones were sold, a further milestone in the advance of these devices1. A study published by Facebook emphasises the importance of smartphones in our lives; about 80% of users make use of their smartphone within 15 minutes of waking up…
Once again we tested security products for smartphones running Google's Android operating system. The report covers details of the products made by leading manufacturers. Smartphones represent the future of modern communications. In 2013, more than 1 billion smartphones were sold, a further milestone in the advance of these devices1. A study published by Facebook emphasises the importance of smartphones in our lives; about 80% of users make use of their smartphone within 15 minutes of waking up each day. At the same time, the traditional function of a telephone is becoming less and less important. The high quality of integrated cameras means that the smartphone is increasingly used for photography. As well as with photos, users trust their devices with their most personal communications, such as Facebook, WhatsApp and email. This brings some risks with it, as such usage makes the smartphone interesting for criminals, who attempt to infect the device with malware or steal personal data. There is also the danger brought by phishing attacks. These days, the use of security software on a PC or laptop is seen as essential. However, many smartphone users do not yet have the same sense of responsibility, even though their devices store personal data, private photos, Internet banking information or even company data. As modern smartphones are often expensive to buy, they are also an attractive target for thieves. Top-quality smartphones cost several hundred Euros. As it is not possible to physically prevent them from being stolen, they must be made less attractive to thieves. Consequently, many of today's security products contain not only malware protection, but also highly developed theft-protection functions, which make the device less attractive to thieves (e.g. by locking the device), and help the owner to find it again.
Other authorsSee publication -
Free Antivirus and its Market Implementation
The study analyzed the business model of two selected Chinese AV-vendors, Qihoo 360 and Baidu, from the perspective of their product development model, revenue model, marketing and distribution, and services and implementation. Furthermore, market research was conducted to compare the Chinese and Western users in order to investigate the influential factors on users' choice of security software. This study was initiated for the purpose of investigating the business model which supports Chinese…
The study analyzed the business model of two selected Chinese AV-vendors, Qihoo 360 and Baidu, from the perspective of their product development model, revenue model, marketing and distribution, and services and implementation. Furthermore, market research was conducted to compare the Chinese and Western users in order to investigate the influential factors on users' choice of security software. This study was initiated for the purpose of investigating the business model which supports Chinese "free" AV-vendors to offer free fully-functional security software.
Other authorsSee publication -
Efficient Malware Detection: by a Honeypot Network
Akademikerverlag
Testing and comparing antivirus software necessitates the availability of malware samples. An efficient way to detect malware is the use of honeypots. There exist honeypots which passively wait for automated attacks in order to capture the malicious binaries. Other types of honeypots crawl the web, and, by being attacked, can identify malicious websites. The goal was to create an efficient, easily manageable and adaptable network of honeypots, distributed worldwide, which automatically collects…
Testing and comparing antivirus software necessitates the availability of malware samples. An efficient way to detect malware is the use of honeypots. There exist honeypots which passively wait for automated attacks in order to capture the malicious binaries. Other types of honeypots crawl the web, and, by being attacked, can identify malicious websites. The goal was to create an efficient, easily manageable and adaptable network of honeypots, distributed worldwide, which automatically collects and handles malware from the web. For this purpose, existing honeypots were investigated and compared extensively. The findings were incorporated in the design of specialized, user-friendly honeynets, capable of automatically collecting malware samples and handling already known and unknown (zero-day) attacks. Additionally, an efficient sorting mechanism for large amounts of malware files was developed in order to create useful test sets.
Other authors -
-
IT Security Products for Corporate Users [Paperback]
Most organizations are aware of the risks threatening their IT environment. Viruses, trojans, worms, exploits and many other threats represent a serious danger for the IT department. A collapse of the IT system could mean grave financial losses right up to insolvency for a company. The IT departments of companies are conscious of this problem. Getting the best protection against these threats is the only issue. A simple file antivirus solution alone is totally inade-quate, as there are too many…
Most organizations are aware of the risks threatening their IT environment. Viruses, trojans, worms, exploits and many other threats represent a serious danger for the IT department. A collapse of the IT system could mean grave financial losses right up to insolvency for a company. The IT departments of companies are conscious of this problem. Getting the best protection against these threats is the only issue. A simple file antivirus solution alone is totally inade-quate, as there are too many threats from contaminated e-mails, exploits etc. What is re-quired is a comprehensive suite that provides protection against all of these. Functional Diversity Because of the immense functional diversity of various antivirus suites and corporate prod-ucts, it is becoming increasingly difficult for decision-makers in the IT sector to get a proper overview. Which product should one opt for and for which areas of protection? During these tests our main focus has not been on malware detection rates, but on the prod-ucts' handling and user-friendliness, and the scope of functionality. We have compiled the functional scope of various products in a detailed table. For malware detection rates of indi-vidual products please refer to the tests of our website: http://www.av-comparatives.org
Other authorsSee publication -
Energieeffizienz und Kostenoptimierung in der IT: Total Cost of Ownership (TCO) & Green-IT [Broschiert]
BoD
Die Studie „Total Cost of Ownership (TCO) & Green-IT – Energieeffizienz und Kostenoptimierung“ befasst sich mit der Fragestellung, ob es für eine bestimmte Unternehmensgröße ökonomisch und/oder ökologisch effizienter ist in einem Zyklus von 3 Jahren auf einen Gesamtbetrachtungsrahmen von 9 Jahren die gesamte IT-Landschaft eines Unternehmens gegen ein energieeffizienteres Pendant auszutauschen oder die bestehende aufzurüsten.
Honors & Awards
-
Tyrol's most family-friendly company
Government Tyrol / Austria
-
Best Paper Award - Malwareconference 2014
-
Best Paper Award at the www.malwareconference.com 2014
Paper: Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative protection testing by Andreas Clementi and Peter Stelzhammer, AV-Comparatives, Austria. -
Innovationspreis IT - "Best Of"
Initiative Mittelstand Deutschland
-
Constantinus Award - Special Award International Project
Government of Austria
The Constantinus Award is the highest award which is given by Austrian Government (Chamber of Commerce) for international projects in management consulting.
-
Constantinus Award in Computer Science, 1st Place
Government of Austria
The Constantinus Award is the highest award which is given by Austrian Government (Chamber of Commerce) for projects in computer science.
-
Cluster Award 2012
Standortagentur Tirol
AV-Comparatives' Real World Protection Test was awarded as the best IT innovation 2012 in the Tyrol.
-
Austrian eAward 2012
Report.at
-
Nomination T-System Innovation Award 2012
-
-
Austrias top cycle-friendly company
Chamber of Commerce Austria
-
Tirolissimo (6 times as subcontractor)
Chamber of Commerce - Tyrol
2003, 2004, 2005, 2006, 2008, 2009
Languages
-
Deutsch
Native or bilingual proficiency
-
Englisch
Full professional proficiency
Recommendations received
1 person has recommended Peter
Join now to viewMore activity by Peter
-
NetSecurity shining at #InfoSecurityEurope2024 in London! 👉 Our team at NetSecurity, including our CEO and Founder Inno Eroraha [NetSecurity] were…
NetSecurity shining at #InfoSecurityEurope2024 in London! 👉 Our team at NetSecurity, including our CEO and Founder Inno Eroraha [NetSecurity] were…
Liked by Peter Stelzhammer
-
More action at #GartnerSEC booth #1048, where you can learn how SlashNext’s Cloud Email+ Security advanced AI platform is purpose-built to anticipate…
More action at #GartnerSEC booth #1048, where you can learn how SlashNext’s Cloud Email+ Security advanced AI platform is purpose-built to anticipate…
Liked by Peter Stelzhammer
-
We spoke to Microsoft's Glaucia Faria Young, who is an AMTSO board member, about how the meaning of #cybersecurity has changed within Microsoft the…
We spoke to Microsoft's Glaucia Faria Young, who is an AMTSO board member, about how the meaning of #cybersecurity has changed within Microsoft the…
Liked by Peter Stelzhammer
-
If you’re by chance at Infosecurity Europe In London, England, do feel free to stop and see first-hand how we PREDICT, STOP, and INVESTIGATE ADVANCED…
If you’re by chance at Infosecurity Europe In London, England, do feel free to stop and see first-hand how we PREDICT, STOP, and INVESTIGATE ADVANCED…
Liked by Peter Stelzhammer
-
AV-Comparatives unveils the outcomes of its Process Injection Evaluation, a pivotal examination of cybersecurity products’ resilience against process…
AV-Comparatives unveils the outcomes of its Process Injection Evaluation, a pivotal examination of cybersecurity products’ resilience against process…
Liked by Peter Stelzhammer
-
So. This just happened. I'm proud to reveal my next step: going back to my roots! 😊 I'll update my profile soon, but bear with me, it's my first…
So. This just happened. I'm proud to reveal my next step: going back to my roots! 😊 I'll update my profile soon, but bear with me, it's my first…
Liked by Peter Stelzhammer
Other similar profiles
-
Sabine Singer, MBA 💎
Connect -
Martin Hairer
Connect -
Meet Narkhede
Founder - Cyberfinity | Security Researcher | VAPT | OSINT | Ethical Hacker | Acknowledged By Apple, Upstox, Oracle, NVIDIA, United Nations & So on | Web Developer | Crypto & Web3 Enthusiast
Connect -
Lukas Huber
Head of AI and Advanced Analytics at roosi
Connect -
Fritz Fahringer
Project Manager at Standortagentur Tirol
Connect -
Georg Ogris
Data & AI
Connect -
Theresa Huber (vorm. Neuner)
Teamleiterin Gründerservice I Teamleiterin Technologie & Digitalisierung bei Wirtschaftskammer Tirol
Connect -
Marina Scherz
Connect -
Reinhard Palaver
Management consulting and strategy development in the digital age for your company | Speaker and Author
Connect -
Stefan B. J. Aigner
AI Consultant | Entrepreneur | Investor
Connect
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Peter Stelzhammer in Austria
-
Peter Stelzhammer
Technische Assistentz, Postproduktion & Multimedia
-
Peter Stelzhammer
--
-
Peter Stelzhammer
--
-
Hans-Peter Stelzhammer
Kfz-Mechaniker bei BRP
4 others named Peter Stelzhammer in Austria are on LinkedIn
See others named Peter Stelzhammer