Security Suites for Mac OS X: For on-demand detection, only four products achieved the 100-percent mark (AV-TEST August 2014).

Size: px
Start display at page:

Download "Security Suites for Mac OS X: For on-demand detection, only four products achieved the 100-percent mark (AV-TEST August 2014)."

Transcription

1 18th September 2014 created by Markus Selinger Mac OS X in the Crosshairs 18 Malware Scanners Put to the Test For a long time, Mac OS users believed they were safe, that there was no malware for their system. As recent as April 2012 and the flashback attack on over 700,000 Apple PCs, it is clear that attackers also have the Macintosh in their crosshairs. AV-TEST has tested 18 antivirus products for Mac and finds some of them truly superb others are really horrible. The universe of known threats for the Mac OS is still not terribly large. This easily leads to the assumption that Mac users don't have to worry about the topic of security software. What's more, tests published on the Web with 1 to 20 known Mac intruders, all of which were naturally detected, don't make the situation any better. In the meantime, however, there are already a few hundred current threats specially targeting the Mac that in particular seek to exploit the security gaps of software add-ons. Everyone says: Mac OS X can protect itself To be sure, since OS X 10.7 or 10.8 there are some good internal security systems such as Gatekeeper, Sandbox and Xprotect. Xprotect, for example, checks the mail and browser downloads. USB sticks, CDs or DVDs, however, are not inspected. The Flashback attack of 2012 caught many users flat-footed, and over 700,000 Macs were infected in a flash. Up to that time, there was a consensus that an antivirus application for a Mac was merely ballast. An opinion that persists to this day, except probably among the some 700,000 Flashback victims. 18 Security suites for Mac put to the test For the maximum protection under OS X 10.9, the AV-TEST lab inspected 18 currently available Internet security suites in terms of their protection function, system load and false positives. In addition, the features of the protection packages were listed. In the first part of the test, 117 specimens of malware targeting the Mac were inspected in the so-called on-demand test. This is the normal scanning routine of security tools for malware. In the second part, the on-access test, the quality of the background antivirus watchdog was inspected. In doing so, an additional 84 infected files in the system were copied into another folder. In this case, the watchdog must respond and block access to the infected file. Partially very weak malware detection Only the packages from Bitdefender, G Data and Norman were able to complete both parts each with 100 percent detection. This is followed by a wide midfield with 10 products that achieved between 82.1 and 100 percent in the on-demand test. In the on-access test, the scores were only between 70.2 and 100 percent. The last four products from Symantec, Trend Micro, McAfee and Webroot exhibited very poor results. In the on-demand test, detection was only between 19.7 and 54.7 percent. Also in the on-access test, the four products only achieved 21.4 to 50 percent. The weakest product from Webroot thus only caught every fifth intruder. If you're a drag, you're out The biggest problem with antivirus applications on the Mac is that they are a drag on the system. In order to measure the burden posed by system watchdogs, the laboratory measured the time it took to copy over 7 GB of data on the reference system: 17.2 seconds. Afterwards, all the products were installed, the copy routine was repeated and the time was clocked. Half the tested products only slowed down the system by a factor between 1.5 and 10 percent. Regardless of their flawless detection performance, Bitdefender and Norman hardly slowed down the system at all: 17.5 and 18.1 seconds respectively were measured during copying. The strong detection package from G Data slowed down the system slightly more: 19.1 seconds. Of the initial 16 solutions, with 20.8 seconds the package from Intego marked the threshold to the programs that slowed down the system. Prior to that, a security solution thus slowed down the copying routine by a maximum of 3.6 seconds that's not anything the user would notice in everyday use.

2 Far above this threshold were the packages from Microworld with 40.4 seconds and Trend Micro tested multiple times at seconds instead of 17.2 that is a 27-fold time lag. Identification friend or foe All the system watchdogs were tested for false positives. While protection was active, 100 popular software packages from the Mac App Store were each installed. Among them, for example, were tools such as the VLC Media Player, Open Office or Java, for instance. None of the security packages sounded a false alarm here. For this test, the security software had a somewhat easier job under Mac than under Windows, as the volume of available software is considerably smaller. Often bare-bones features In addition to the normal security functions, the packages offer only selective additional functions. Avast offers an anti-spam function. ESET, G Data and Trend Micro an anti-phishing tool. Not even half the packages throw in a safe-browsing function for the user. There are only additional protection modules, such as a personal firewall, child protection, a backup function or encryption tools on selective products. And this despite the fact that most of the protection packages require payment of an annual license. Conclusion: More protection is possible Private Mac users can depend on the internal security systems of the current OS X. But in case a Trojan such as Flashback should ever manage to penetrate the system again, then it will be all over but the shouting. Companies in particular should not incur this risk for corporate and customer data. Because the firm's existence could easily be at stake. In the test, the solution of Bitdefender found all malware specimens error-free and did not measurably slow down the system in its routines. G Data and Norman are also reliable security partners. In doing their job, they put an undiscernible additional burden on the system. The solution from avast! offered the best freeware product in the test. While the system watchdog did not work completely without a glitch, it still performed well, and it was quite economical with resources. Here's another tip: Users should definitely have the appropriate security software factory-installed or buy an off-the-shelf version. Because the versions from the Mac App Store have restrictions in their functions!

3 Security Suites for Mac OS X: For on-demand detection, only four products achieved the 100-percent mark (AV-TEST August 2014).

4 Security Suites for Mac OS X: A few of the products slow down the system when copying. The strong detection package from Bitdefender hardly slows down the system at all (AV-TEST August 2014).

5 Bitdefender for Mac: The security package detected all the malware sought in the test and, in doing so, hardly strained the System.

6 avast! Free Antivirus for Mac: The freeware for Mac users did a good job, though not a great job, at recognizing the intruders. Copyright 2015 by AV-TEST GmbH, Klewitzstr. 7, Magdeburg, Germany Phone +49 (0) , Fax +49 (0) ,

10 Security Packages for Mac OS X: No less than 5 products achieved a perfect score of 100 percent in detection (AV-TEST April 2015).

10 Security Packages for Mac OS X: No less than 5 products achieved a perfect score of 100 percent in detection (AV-TEST April 2015). 28th April 2015 created by Markus Selinger Mac OS X under attack 10 security packages put to the test The legend that Mac OS X is supposedly invincible is not borne out by the facts. In the aftermath of

More information

Endurance Test: Does antivirus software slow

Endurance Test: Does antivirus software slow 23rd April 2015 created by Markus Selinger Endurance Test: Does antivirus software slow down PCs? Critics maintain that protection software for Windows really puts the brakes on PCs. In a 14-month, extremely

More information

26 Protection Programs Undergo Our First Test Using Windows 8

26 Protection Programs Undergo Our First Test Using Windows 8 Test: Internet Security Packages 1/2013 26 Protection Programs Undergo Our First Test Using Windows 8 Windows 8 is considered to be a secure system thanks to its internal protection package containing

More information

AV-TEST Examines 22 Antivirus Apps for Android Smartphones and Tablets

AV-TEST Examines 22 Antivirus Apps for Android Smartphones and Tablets Protection Apps for Android Feb. 2013 AV-TEST Examines 22 Antivirus Apps for Android Smartphones and Tablets Millions of Android smartphones are currently accessing the Internet without any protection.

More information

Test of the Antivirus Software For antivirus solutions, the test was divided up into two typical infection scenarios.

Test of the Antivirus Software For antivirus solutions, the test was divided up into two typical infection scenarios. 29th July 2014 created by Markus Selinger 17 software packages in a repair performance test after malware attacks Can antivirus software packages or recovery/clean-up tools completely clean and repair

More information

Detection of Linux malware

Detection of Linux malware 5th October 2015 created by Markus Selinger Linux: 16 Security Packages Against Windows and Linux Malware Put to the Test As Linux PCs are increasingly used to connect Windows PCs, they ought to use a

More information

Endpoint Business Products Testing Report. Performed by AV-Test GmbH

Endpoint Business Products Testing Report. Performed by AV-Test GmbH Business Products Testing Report Performed by AV-Test GmbH January 2011 1 Business Products Testing Report - Performed by AV-Test GmbH Executive Summary Overview During November 2010, AV-Test performed

More information

Director Test Research: David Walkiewicz

Director Test Research: David Walkiewicz 7th August 2015 created by Markus Selinger Test: Parental control software for Windows and Mac OS X Those who don't want their children to be exposed to early unattended lessons in the birds and the bees

More information

MRG Effitas 360 Assessment & Certification Programme Q4 2014

MRG Effitas 360 Assessment & Certification Programme Q4 2014 MRG Effitas 360 Assessment & Certification Programme Q4 2014 1 Contents Introduction... 3 Executive summary... 3 Certification... 4 The purpose of this report... 5 Tests employed... 6 Security Applications

More information

Banker Malware Protection Test Report

Banker Malware Protection Test Report Banker Malware Protection Test Report A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: April 10 th,, last update: April 10 th, Executive Summary In March, AV-Test

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

AV-Comparatives. Mobile Security Test. Language: English. February 2015 Last revision: 30 th March 2015. www.av-comparatives.org

AV-Comparatives. Mobile Security Test. Language: English. February 2015 Last revision: 30 th March 2015. www.av-comparatives.org AV-Comparatives Mobile Security Test Language: English February 2015 Last revision: 30 th March 2015-1- Introduction This test covers security products for smartphones and tablets running Google's Android

More information

DETERMINATION OF THE PERFORMANCE

DETERMINATION OF THE PERFORMANCE DETERMINATION OF THE PERFORMANCE OF ANDROID ANTI-MALWARE SCANNERS AV-TEST GmbH Klewitzstr. 7 39112 Magdeburg Germany www.av-test.org 1 CONTENT Determination of the Performance of Android Anti-Malware Scanners...

More information

Mobile Security Apps. Hendrik Pilz Director Technical Lab / Mobile Security hpilz@av-test.de

Mobile Security Apps. Hendrik Pilz Director Technical Lab / Mobile Security hpilz@av-test.de Hendrik Pilz Director Technical Lab / Mobile Security hpilz@av-test.de The test report is also available on About AV-TEST 24 employees in Magdeburg and Leipzig Tests of security solutions for consumers

More information

In addition, all versions were examined in terms of whether the PE files are signed with a valid certificate.

In addition, all versions were examined in terms of whether the PE files are signed with a valid certificate. 20th November 2015 created by Markus Selinger Self-Protection in Windows Applications: How Secure are PDF Readers, Java and Browsers? Well-known Windows software is repeatedly criticized for being an Achilles'

More information

KASPERSKY LAB PROVIDES BEST IN THE INDUSTRY PROTECTION*

KASPERSKY LAB PROVIDES BEST IN THE INDUSTRY PROTECTION* Score of TOP 3 places KASPERSKY LAB PROVIDES BEST IN THE INDUSTRY PROTECTION* 100% In 2013 Kaspersky Lab products participated in 79 independent tests and reviews. Our products were awarded 41 firsts and

More information

Windows 8 Malware Protection Test Report

Windows 8 Malware Protection Test Report Windows 8 Malware Protection Test Report A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: January 11 th, 2013, last update: January 11 th, 2013 Executive Summary In

More information

Real World and Vulnerability Protection, Performance and Remediation Report

Real World and Vulnerability Protection, Performance and Remediation Report Real World and Vulnerability Protection, Performance and Remediation Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: September 17 th, 2014, last update:

More information

Anti-Virus Comparative - Proactive/retrospective test May 2009

Anti-Virus Comparative - Proactive/retrospective test May 2009 Anti-Virus Comparative Proactive/retrospective test (on-demand detection of virus/malware) Language: English May 2009 Last revision: 27 th May 2009 1 - Content 1. Introduction 3 2. Description 3 3. Test

More information

Patch Management Solutions Test

Patch Management Solutions Test Patch Management Solutions Test A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: 5 th June, 2013, last update: 19 th July, 2013 Executive Summary From May to July

More information

Willem Wiechers 3 rd March 2015

Willem Wiechers 3 rd March 2015 Willem Wiechers 3 rd March 2015 1 Why do we want Malware & Virus Protection? To make our computers save Wish to keep our data private Wish to have a safe environment to do our online banking, shopping,

More information

Zscaler Cloud Web Gateway Test

Zscaler Cloud Web Gateway Test Zscaler Cloud Web Gateway Test A test commissioned by Zscaler, Inc. and performed by AV-TEST GmbH. Date of the report: April15 th, 2016 Executive Summary In March 2016, AV-TEST performed a review of the

More information

IT Security Survey 2015

IT Security Survey 2015 IT Security Survey 2015 Language: English Last Revision: 18 th March 2015 Overview Use of the Internet by home and business users continues to grow in all parts of the world. How users access the Internet

More information

Anti-Virus Comparative

Anti-Virus Comparative Anti-Virus Comparative On-demand Detection of Malicious Software includes false alarm and on-demand scanning speed test Language: English August 2010 Last Revision: 5 th October 2010 Table of Contents

More information

Whole Product Real World Dynamic Protection Test (August November) 2011

Whole Product Real World Dynamic Protection Test (August November) 2011 Whole Product Real-World Dynamic Protection Test August-November 2011 Language: English December 2011 Last revision: 16 th December 2011 www.av-comparatives.org 1 Content Introduction... 3 Test Procedure...

More information

Proactive Rootkit Protection Comparison Test

Proactive Rootkit Protection Comparison Test Proactive Rootkit Protection Comparison Test A test commissioned by McAfee and performed by AV-TEST GmbH Date of the report: February 2 th, 213 Executive Summary In January 213, AV-TEST performed a comparative

More information

Emsi Software a-squared Anti-Malware 4.5

Emsi Software a-squared Anti-Malware 4.5 Quick Test Emsi Software a-squared Anti-Malware 4.5 Up to 3,000 new software pests per day are now appearing on computers and threatening data. The security software manufacturers must create a new signature

More information

Virtual Environment Protection Test Report

Virtual Environment Protection Test Report Virtual Environment Protection Test Report A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: May 10 th, 2012, last update: May 14 th, 2012 Executive Summary In March

More information

Anti-Virus Protection and Performance

Anti-Virus Protection and Performance Anti-Virus Protection and Performance ANNUAL REPORT 2015 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com CONTENTS Annual Report 2015... 1 Contents... 2 Introduction...

More information

Tracking Anti-Malware Protection 2015

Tracking Anti-Malware Protection 2015 Tracking Anti-Malware Protection 2015 A TIME-TO-PROTECT ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to measure

More information

Avira Server Security. HowTo

Avira Server Security. HowTo Avira Server Security HowTo Table of Contents 1. Setup Modes... 3 1.1. Complete...3 1.2 Custom...3 2. Configuration... 8 2.1 Update configuration for the Avira Update Manager...8 2.2 Configuration of product

More information

Security Industry Market Share Analysis

Security Industry Market Share Analysis Security Industry Market Share Analysis September 2011 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

IT Security Survey 2014

IT Security Survey 2014 IT Security Survey 2014 Language: English Last Revision: 28 th February 2014-1 - Overview Use of the Internet by home and business users continues to grow in all parts of the world. How users access the

More information

Global Antivirus Software Package Market 2015-2019

Global Antivirus Software Package Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3498718/ Global Antivirus Software Package Market 2015-2019 Description: About antivirus software package An antivirus scans the

More information

Home Anti-Virus Protection

Home Anti-Virus Protection Home Anti-Virus Protection JANUARY - MARCH 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

KASPERSKY LAB PROVIDES BEST IN THE INDUSTRY PROTECTION*

KASPERSKY LAB PROVIDES BEST IN THE INDUSTRY PROTECTION* KASPERSKY LAB PROVIDES BEST IN THE INDUSTRY PROTECTION* 100% 80% 60% Score of TOP 3 places In 2014 Kaspersky Lab products participated in 93 independent tests and reviews. Our products were awarded 51

More information

Information Security Recommendation Report

Information Security Recommendation Report Information Security Recommendation Report Prepared for Baker and Company Prepared by Alma Ruiz May 3, 2013 Table of Contents ii Table of Contents Introduction... 1 Methods for Evaluation... 3 Results

More information

Anti-Virus Comparative

Anti-Virus Comparative Anti-Virus Comparative File Detection Test of Malicious Software including false alarm test Language: English March 2016 Last Revision: 14 th April 2016 Table of Contents Tested Products 3 Introduction

More information

B-HAVE the road to success

B-HAVE the road to success B-HAVE the road to success A case study in the successful deployment of new anti-malware technology Speed is the name of the game In October 2004, AV-Test, an independent testing organization based in

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

PC/Tablet/Smartphone Security & Password Managers

PC/Tablet/Smartphone Security & Password Managers PC/Tablet/Smartphone Security & Password Managers What you should do to keep your PC secure. Does the type of PC you use matter? What to do to keep your smartphone secure does the brand matter, why? Tablet

More information

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 BACKUP SECURITY AND THE CLOUD BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF

More information

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide 1 Introduction Welcome to avast! Free Antivirus for Mac. avast! Free Antivirus for Mac contains the same ICSA Certified scan engine as all avast! antivirus

More information

Home Anti-Virus Protection

Home Anti-Virus Protection Home Anti-Virus Protection APRIL - JUNE 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security companies.

More information

INSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015

INSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015 INSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015 CHERYL HARRIS, PH.D. DECISIVE ANALYTICS LLC 575 MADISON AVENUE, 10 TH FL NEW YORK, NY 10022 917.628.6167 14. January 2015

More information

Anti-Virus Comparative

Anti-Virus Comparative Anti-Virus Comparative Performance Test Impact of Security Software on System Performance Language: English April 2016 Last Revision: 23 th May 2016 Table of Contents 1. Introduction 3 2. Tested products

More information

Are free Android virus scanners any good?

Are free Android virus scanners any good? Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)

More information

Home Anti-Virus Protection

Home Anti-Virus Protection Home Anti-Virus Protection JULY - SEPTEMBER 2013 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware

More information

Performance test November 2014 / www.avlab.pl 1 INTRODUCTION... 1 TESTED PROGRAM VERSIONS..2 WHAT AND HOW WE TESTED. 3 OTHER PRINCIPLES...

Performance test November 2014 / www.avlab.pl 1 INTRODUCTION... 1 TESTED PROGRAM VERSIONS..2 WHAT AND HOW WE TESTED. 3 OTHER PRINCIPLES... PE RF ORMANCET E S TOFF RE E ANT I VI RUSS OF T WARE ANDI NT E RNE TS E CURI T YS UI T E S NOVE MBE R14 Per f or medt estdat e: Oct ober-november14 Performance test November 14 / www.avlab.pl 1 INTRODUCTION...

More information

IT Security Survey 2016

IT Security Survey 2016 IT Security Survey 2016 Language: English Last Revision: 15 th February 2016-1 - Security Survey 2016 We conducted our annual survey to improve our service to the end-user community. Respondents were asked

More information

Anti-Virus Comparative No.22

Anti-Virus Comparative No.22 Anti-Virus Comparative No.22 Retrospective/Proactive test Heuristic and behavioural protection against new/unknown malicious software Language: English March 2015 Last revision: 26 th June 2015-1 - Contents

More information

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect

More information

Windows Updates vs. Web Threats

Windows Updates vs. Web Threats Windows Updates vs. Web Threats HOW WELL DO WINDOWS UPDATES PROTECT AGAINST MALWARE? Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This test explores how much

More information

avast! Business products 2014 Introducing the new features and technologies in the latest lineup of avast! security solutions for business.

avast! Business products 2014 Introducing the new features and technologies in the latest lineup of avast! security solutions for business. avast! Business products 2014 Introducing the new features and technologies in the latest lineup of avast! security solutions for business. Content 1. 2. 3. 4. 5. 6. 7. 8. 11. 14. 15. 16. 17. Why avast!

More information

USB flash drive (128MB,256MB,512MB,1GB,2GB,4GB)

USB flash drive (128MB,256MB,512MB,1GB,2GB,4GB) USB flash drive (128MB,256MB,512MB,1GB,2GB,4GB) Despite the different brands and names you've heard for USB flash drives JumpDrives, Pocket drives, Pen drives, and Thumb drives they all pretty much operate

More information

Security Industry Market Share Analysis

Security Industry Market Share Analysis Security Industry Market Share Analysis December Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This report includes both worldwide

More information

26.6% 20.2% 28% 70% 67% Market Share Analysis of Antivirus & Operating Systems. Contents. Report Highlights. Introduction.

26.6% 20.2% 28% 70% 67% Market Share Analysis of Antivirus & Operating Systems. Contents. Report Highlights. Introduction. Market Share Analysis of Antivirus & Operating Systems Contents Antivirus Vendor Market Share Antivirus Product Market Share Antivirus Product Market Share by Operating System Operating System Updates

More information

Product Guide. McAfee Endpoint Security 10

Product Guide. McAfee Endpoint Security 10 Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,

More information

Anti-Virus Comparative

Anti-Virus Comparative Anti-Virus Comparative File Detection Test of Malicious Software including false alarm test Language: English September 2015 Last Revision: 15 th October 2015 Table of Contents Tested Products 3 Introduction

More information

Home Anti-Virus Protection

Home Anti-Virus Protection Home Anti-Virus Protection JULY - SEPT 2015 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware products

More information

Anti-Virus Comparative

Anti-Virus Comparative Anti-Virus Comparative Malware Removal Test Language: English September 2009 Last Revision: 24 th October 2009 Table of Contents Tested Products 3 Conditions for participation and test methodology 4 Introduction

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

Anti-Virus Comparative

Anti-Virus Comparative Anti-Virus Comparative File Detection Test of Malicious Software including false alarm test Language: English March 2014 Last Revision: 22 nd April 2014 Table of Contents Tested Products 3 Introduction

More information

How to prevent computer viruses in 10 steps

How to prevent computer viruses in 10 steps How to prevent computer viruses in 10 steps Following on from our advice on how to keep your online data secure, we ve created a follow-up outlining how you can keep your computer itself safe. Not only

More information

computer support & information systems C O L L E G E O F F I N E A R T S Norton Anti-Virus 9.0.2 Anti-Virus 3.8.7 VirusBarrier X 10.1.

computer support & information systems C O L L E G E O F F I N E A R T S Norton Anti-Virus 9.0.2 Anti-Virus 3.8.7 VirusBarrier X 10.1. Antivirus Software Review (part 1) Company ClamXAV Symantec Sophos Intego McAfee Product ClamXav.org? Norton Anti-Virus 9.0.2 Anti-Virus 3.8.7 VirusBarrier X 10.1.1 Virex 7.5.1 Objective: Specify Antivirus

More information

C&G FLUX MARKET Internet Safety

C&G FLUX MARKET Internet Safety Internet Safety Introduction Viruses, Trojan horses, worms, and spyware are all threats that can damage our computer systems. We know we need to protect our computers, but with so many antivirus programs

More information

HOME COMPUTER SECURITY AWARENESS

HOME COMPUTER SECURITY AWARENESS HOME COMPUTER SECURITY AWARENESS Sponsoring faculty: Dr Rose Shumba Students: Melissa A Karolewski, Alicia Coon, Sara Raffensperger, Louisa Ehinlaiye Ometere Computer Science Department Indiana University

More information

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information

Secondly, if your device is running a Microsoft Windows or Macintosh OS X operating system you will also need to:

Secondly, if your device is running a Microsoft Windows or Macintosh OS X operating system you will also need to: What is Safe Connect and why is it being used? Safe Connect is part of TAMUK's effort to help keep computers on its network as free as possible from viruses, spyware, and operating system security holes.

More information

Virtual Desktops Security Test Report

Virtual Desktops Security Test Report Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January

More information

Endpoint Buyers Guide

Endpoint Buyers Guide Endpoint Buyers Guide It takes more than antivirus to stop today s advanced threats. Protecting corporate assets requires a complete security solution that includes anti-malware, hostbased intrusion prevention

More information

Anti-Virus Comparative

Anti-Virus Comparative Anti-Virus Comparative File Detection Test of Malicious Software includes false alarm test Language: English September 2013 Last Revision: 10 th October 2013 Table of Contents Tested Products 3 Introduction

More information

FORBIDDEN - Ethical Hacking Workshop Duration

FORBIDDEN - Ethical Hacking Workshop Duration Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once

More information

Symantec Endpoint Protection 12.1.5 Datasheet

Symantec Endpoint Protection 12.1.5 Datasheet Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that

More information

Reducing the cost and complexity of endpoint management

Reducing the cost and complexity of endpoint management IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and

More information

Enterprise Anti-Virus Protection

Enterprise Anti-Virus Protection Enterprise Anti-Virus Protection JAN - MAR 2015 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware products

More information

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop. Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop. Our aim is to address the students apprehensions and anxieties regarding their career prospects in Ethical

More information

TURNING SECURITY COSTS INTO PROFITS MANAGED SECURITY SERVICES FOR PROVIDERS. www.antispameurope.com

TURNING SECURITY COSTS INTO PROFITS MANAGED SECURITY SERVICES FOR PROVIDERS. www.antispameurope.com TURNING SECURITY COSTS INTO PROFITS MANAGED SECURITY SERVICES FOR PROVIDERS www.antispameurope.com FALLING PRICES There s little difference between the various market offerings so no wonder price has become

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

Northwestern IT Tech Talk

Northwestern IT Tech Talk Northwestern IT Tech Talk Top 5 Tools for Securing Your Devices Mary Carp Data Security Analyst Northwestern Information Technology Information and Systems Security/Compliance May 19, 2016 Antimalware

More information

Whole Product Dynamic Real-World Protection Test (February-June 2016)

Whole Product Dynamic Real-World Protection Test (February-June 2016) Whole Product Dynamic Real-World Protection Test February-June 2016 Language: English July 2016 Last revision: 7 th July 2016-1 - Content Introduction... 2 Content... 2 Test Procedure... 4 Settings...

More information

The Future of Business IT Support

The Future of Business IT Support The Future of Business IT Support Hertscom deliver best of breed hosted IT solutions as a fully managed service all under a single umbrella, leaving you to run your business. We believe IT should be easy,

More information

Sophos Anti-Virus for Mac OS X Help

Sophos Anti-Virus for Mac OS X Help Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

BUSINESS SURVEYS 2015

BUSINESS SURVEYS 2015 February 2016 BUSINESS SURVEYS 2015 The state of information security in companies in the EMEA region, and the attitudes of their IT experts and managers CONTENTS Executive summary............................

More information

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011. NetSafe/ AVG New Zealand Contents Page 1. Objectives and Methodology 3 2. Summary and Conclusions 6 3. Main Findings 8 Online security a serious issue 9 Concern about online challenges 11 Most important

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

PC Anti-Malware Protection 2015

PC Anti-Malware Protection 2015 PC Anti-Malware Protection 2015 A DYNAMIC ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness

More information

ESET SMART SECURITY 6

ESET SMART SECURITY 6 ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art

More information

Basic PC Maintenance. Instructors. Action Center

Basic PC Maintenance. Instructors. Action Center Basic PC Maintenance The St. Edward's University workshop "Basic PC Maintenance" addresses best practices for maintaining your (Windows 7) PC at home. This document includes notes and recommendations for

More information

Citrix : Remediation - MAC

Citrix : Remediation - MAC Citrix : Remediation - MAC Key Points: 1. 2. 3. 4. 5. 6. 7. Understanding End Point Scan Analysis Supported anti-virus and firewall products Configuring AVAST/SOPHOS and the Mac OS X Firewall Installing

More information

UP L13: Leveraging the full protection of SEP 12.1.x

UP L13: Leveraging the full protection of SEP 12.1.x UP L13: Leveraging the full protection of SEP 12.1.x Martial RICHARD Principal Field Enablement Manager Endpoint Security UP L13 1 Threat landscape (ISTR Vol.18 April 2013) http://www.symantec.com/threatreport/

More information

Firewall Test. Firewall protection in public networks. Commissioned by CHIP. Language: English. Last Revision: 11 th April 2014

Firewall Test. Firewall protection in public networks. Commissioned by CHIP. Language: English. Last Revision: 11 th April 2014 Firewall Test Firewall protection in public networks Commissioned by CHIP Language: English Last Revision: 11 th April 2014 www.av-comparatives.org Commissioned by - 1 - Contents Firewall protection in

More information

Student Tech Security Training. ITS Security Office

Student Tech Security Training. ITS Security Office Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with

More information

What's the difference between spyware and a virus? What is Scareware?

What's the difference between spyware and a virus? What is Scareware? What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Sophos Anti-Virus for Mac OS X: Home Edition Help

Sophos Anti-Virus for Mac OS X: Home Edition Help Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

Michelle Vonderhaar June 23, 2010

Michelle Vonderhaar June 23, 2010 Michelle Vonderhaar June 23, 2010 PC Maintenance Checklist Back up any data BEFORE you perform any PC maintenance Check Hard Drive for free space (for comparison after clean up) Perform Disk Clean-up (use

More information