Performance Validation Testing. Kaspersky Lab Corporate Security Solutions. 1 of 24

Size: px
Start display at page:

Download "Performance Validation Testing. Kaspersky Lab Corporate Security Solutions. 1 of 24"

Transcription

1 Performance Validation Testing Kaspersky Lab Corporate Security Solutions 1 of 24

2 Contents Changing Malware Threats in Corporate Networks 3 The Test Objectives 6 Malware Test Suites 8 Malware Detection Test Results 9 Kaspersky Lab Corporate Security Solutions 10 Checkmark Certifications for Kaspersky 14 Checkmark Certification Profile for Kaspersky Lab 15 Conclusion 16 Product Feature Comparisons 17 Kaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition 18 Kaspersky Security 8.0 for Microsoft Exchange Servers 19 Kaspersky Anti-Virus 8.0 for Linux File Server 20 Kaspersky Anti-Virus 8.0 for Lotus Domino 21 Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition 22 Disclaimer 23 Contact Information 24 2 of 24

3 Changing Malware Threats in Corporate Networks The Evolution of Malware, Security Technologies and Services By Lysa Myers, director of research, West Coast Labs There are few who are unaware of the malware landscape changing since the release of the first few viruses decades ago. But it seems there are just as few people outside the computer security industry who understand the nature of that change. No longer is malware as ethereal a threat as an urban legend, and no longer is the virus outbreak of the day making the evening news. Threats now come not by ones and twos but by the many tens of thousands each day with the known total hovering in the tens of millions. And threats come quietly, remaining as far below the radar as possible to maximize their stay on an affected machine. Corporations are now victims of targeted attacks, as well as the regular masses of malware and have specific needs for the protection of corporate information assets. While malware activity has increased, security budgets certainly have not. Many corporate security staff find themselves facing a tidal wave of new threats without extra personnel or resources. They need security software to work faster, harder and require less manual interaction while providing detailed reports as to what actions have been taken. Machines which are infected need to be cleaned completely so as to get systems back up and running quickly and painlessly. Anti-Malware software is only as good as its research and support departments. They are vital in order to have excellent response times to new threats and to provide top-notch customer assistance. As focus in corporate networks shifts away from the desktop, into mobile, cloud and virtual computing resources, security software needs to protect these environments too. The way malware spreads has also changed there is less concern for infecting oneself with a floppy disk (how many of us even have a floppy disk drive now?) or via poorly worded and spelled mass-mailer viruses. When malware authors discovered there was profit to be had in spreading their malicious wares, they began to take many of the tactics used by Search Engine Optimizers and improved their social engineering craft, placing files where people were most likely to run across them. Consequently, the Web is now where the majority of people become infected with malware and, given the extent to which the internet is such an integral part of all corporations business activities, the Web is a potent threat vector. Company s websites are regularly targeted for defacement or infected to spread malware to the site s visitors. Given that the Internet is operating system agnostic and because current scripting languages allow for queries of the specific browser version of each visitor, malware can be spread which in a manner which 3 of 24

4 infects any particular visit. In the last few years, this has been a tactic which has proved increasingly popular with malware authors, increasing their reach as the market share of new technology increases. Obviously, anti-malware products had to change with the times as the onslaught of malware has increased and the tactics of malware authors has shifted. The first anti-malware products were designed strictly as signature scanners, which only ran when a user specifically initiated a scan. In short order, this was changed to allow the scanner to run continuously in the background so that each file was examined as it was accessed, without users having to think about it. This approach has become more widespread, so that products require little interaction users can automatically have the most up-to-date protection running at all times. Another thing which has changed with the times is the complexity of the scanning processes. No longer are anti-malware products simply signature-based scanners. They now include advanced heuristic technologies and generic signatures which can proactively detect new variants of existing families and new malware families. The best products include a variety of security features such as web or spam filtering, behavioural analysis or a firewall technology which can help protect against brand new threats. With these new, intensive scanning technologies, vendors have come up with many ways to decrease the overall processing load, so that scanning will not noticeably decrease access times or interrupt workflow. As both the malware landscape and anti-malware products have changed, so has the security testing industry. When products under test were updated periodically, used on-demand scanning and the total known malware was in the thousands, it made sense to have only a single pass or fail test which was performed a few times a year over a static test-bed of samples. This is no longer the reality of the current user experience. While it can be a meaningful baseline test of anti-malware functionality, it is far from a complete picture of overall product performance. In order to accurately reflect a user s experience with malware, it is important to gather the full spectrum of malware from a variety of sources from throughout the internet, which circulate on various protocols. This means including not just -based malware, but malicious files on P2P networks, as well as on the Web and other attack vectors. Because malware does not stop when the work day ends nor does it recognize geographic boundaries, threats must be collected all day from around the world. As anti-malware products have begun to include more wide-ranging technologies including ones which are initiated upon execution of a file, testing must incorporate dynamic functionality by running threats on test machines. This naturally takes more time than scanning an immobile directory of files, so one must take care to select the most relevant sample set which a customer is most likely to encounter. This takes into account not just prevalence, but attack vector popularity on which it s spread, potential for damage on an infected system, as well as geography. Malware authors are always abreast of technology trends where do people share their information, how do people share files? At West Coast Labs we ve already begun to see an increase of attacks on things 4 of 24

5 like digital picture frames, USB thumb drives, mobile phones and on popular Web 2.0 sites. So, suffice to say, if you know a few people who use one or other or all malware authors are looking to exploit them for financial gain. Likewise, anti-malware vendors are developing technologies to protect them and testers like West Coast Labs are developing methodologies to mirror the user s risk and potential infection experience. In order to keep up to date on the evolving malware landscape, one need only see which new widgets are being used in home and business network environments. But in the corporate world, keeping updated on the latest threats and technologies is not enough TCO and ROI need to be considered. How well do advanced technologies proactively detect? How quickly are new threats added? How is customer support response? How easily can the solution be managed remotely? How much CPU time is used for scanning? To find the answers to many of these questions, take a look at product performance data from leading independent test organisations such as West Coast Labs and the performance validation programmes they deliver such as Real Time Testing. You can also take a close look at how individual vendors are responding to the changing threat landscape and the implications for the security of corporate networks. Nowadays, vendors are defining Protection differently. No longer is it just product performance-related but also related to business and customer service issues, delivering a higher value It s also about the extent of a vendor s product research and development strategy that anticipates threats and trends to ensure proactive network protection. overall service to meet not just security, but also business needs. When considering product performance in a corporate network environment, Protection is more than current malware detection capabilities, it s also about the extent of a vendor s product research and development strategy that anticipates threats and trends to ensure proactive network protection. It can be further defined as the extent to which malware protection is delivered for a multi-platform infrastructure through efficient and easily managed solutions with wide inter-operability capabilities. Protection is also about the extent to which business interests are protected through vendor service strategies that now include optimised and costeffective security plans tailored to individual corporations needs for maximising business productivity, lowering the total cost of ownership and maximising the return on investment. Also, given that corporations are operating in a worldwide e-economy all this needs to be supported by trusted and responsive global support plans. Yes, the threat landscape is continuing to evolve with new malware threats spawned at an alarming rate, but no longer is malware protection and information security in general just a technical issue - it s a business issue. That s why vendors product and service solutions are evolving to suit these changing needs and West Coast Labs is developing independent product performance programmes that ensure that these products and services are tested and validated accordingly. 5 of 24

6 The Test Objectives Kaspersky Lab commissioned West Coast Labs to carry out the following testing: Checkmark Certification for the Baseline, Dynamic and Real Time testing programme on seven corporate security solutions: Kaspersky Security 8.0 for Microsoft Exchange Servers Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition Kaspersky Anti-Virus 8.0 for Linux File Server Kaspersky Anti-Virus 8.0 for Lotus Domino Kaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition Kaspersky Endpoint Security 8 for Mac Kaspersky Endpoint Security 8 for Linux Comparative testing of selected Kaspersky products against a range of competitor products in a static test environment (see below). A comparison of product feature sets using publicly available information on vendor websites and marketing collateral. A comprehensive list of all Kaspersky Lab Checkmark Certifications and Checkmark Platinum Product Awards can be found on page 15. The Comprative Product Testing The comparative testing comprised a basic evaluation of each product s malware detection capability in a static test environment. WCL built a test suite of 100,000 live malware samples* from its own independent resources that covered all appropriate attack vectors. Each solution was installed to a server running the appropriate and commonly supported Operating System and software detailed in the next section of this report. During installation, all default values were kept and, where a choice was required, the course of action recommended by the solution and/or the attendant product documentation was adhered to. Each solution was updated to the latest available definition, engine, and signature releases before a forensic image was taken and stored for later use. Updates were allowed during the test period through any normal scheduled and automatically enabled update mechanism present in the product, and a further forensic image was taken on the last day of testing for each combination of products. Each solution was tested against an appropriate test set extracted from the 100,000 samples mentioned above and made up of real-world, solution capability specific samples taken from West Coast Labs collections, including samples received in the West Coast Labs Global Honeypot Network. For example, the Exchange-based solutions were tested against malware known to propagate over . Test sets and the methodologies were constructed so as to mirror the experience of a real-life installation as far as possible and not to advantage any one vendor over the others. *For a description of the malware used in this test programme, refer to Appendix 1 of this report. Comparative Product Testing Test Network Testing was carried out on distinct networks which comprised various server and client machines needed to run the respective technologies and operating systems. Corporate Security Solutions Used in the Comparative Product Testing Microsoft Exchange Test Kaspersky Security 8.0 Symantec Mail Security Trend Micro ScanMail McAfee GroupShield Sophos Security ESET Mail Security Lotus Domino Test Kaspersky Anti-Virus 8.0 Symantec Mail Security Trend Micro ScanMail McAfee GroupShield Sophos Security ESET Mail Security Microsoft ISA Server (replaced by Forefront TMG 2010) Test Kaspersky Anti-Virus 8.0 Forefront TMG 2010 Windows Server Test Kaspersky Anti-Virus 8.0 Symantec Endpoint Protection Trend Micro Officescan Server McAfee VirusScan Enterprise and VirusScan for Storages Sophos Endpoint Security ESET File Security Linux Test Kaspersky Anti-Virus 8.0 Symantec Endpoint Protection Trend Micro ServerProtect McAfee VirusScan Enterprise Sophos Endpoint Security ESET File Security 6 of 24

7 In order to provide a balanced reporting process, West Coast Labs recommended that all client machines should run Windows XP and Service Pack 3 and that server platforms ran the highest OS version commonly supported across each of the solutions. In some cases this meant that they may not have been running on the latest version of a particular operating system, but this method meant that any testing carried out was more directly comparable. Details of highest levels of common operating systems per component available at the time of testing are as follows: Network 1 Microsoft Exchange This network comprised 12 systems 6 desktops and 6 servers (one of each for each solution). Each of the desktop machines were paired up with a server system in order to allow an Exchange Server and Outlook client configuration. Server OS: Windows 2003 Server 64 bit, Exchange Release: bit. Network 2 Windows Server This network comprised 12 systems 6 desktops and 6 servers (one of each for each solution). Each of the desktop machines were paired up with a server system in order to allow a server/client configuration. Server OS: Windows bit Network 3 Linux This network comprised 6 systems running the Red Hat Enterprise release 5 version of Linux. Network 4 Lotus Domino This network comprised 12 systems 6 desktops and 6 servers (one of each for each solution). Each of the desktop machines were paired up with a server system in order to allow a Lotus Domino server and Lotus Notes client configuration. Server OS: Windows bit, Lotus Domino Release: R8 Network 5 Microsoft ISA Server (Forefront TMG 2010) This network comprised 4 systems 2 desktop and 2 servers (one of each for each solution). Each of the desktop machines were paired up with a server system in order to allow a server/client configuration. Server OS: Windows bit, Forefront TMG 2010 Supporting these five networks there were a number of servers designed to collect data from each of the tests, along with desktop machines to act as remote points of control and for test management. Comparative Product Testing Test Methodology In each test case, the protocol most likely to be used was employed to test the solutions detailed below. Microsoft Exchange testing: Testing was conducted on an On Access basis. All samples were sent via from accounts on a real-life, resolvable domain owned and controlled by West Coast Labs to the products under test over a live internet connection with appropriate firewall rules in place to allow only communication between the hosts used in the testing. This enabled West Coast Labs to report on those s that were stopped at the Exchange Server and track those s that were bounced to allow for resending to ascertain the gateway protection offered. Windows Server testing: Testing was conducted on an On Demand basis. All samples were copied on to the appropriate server in a number of directories. The solution under test was asked to scan the server Operating System to report any infections it found. Linux testing: Testing was conducted on an On Demand basis. All samples were copied on to the appropriate server in a number of directories. The solution under test was asked to scan the server Operating System to report any infections it found. Lotus Domino testing: Testing was conducted on an On Access basis. All samples were sent via from accounts on a real-life, resolvable domain owned and controlled by West Coast Labs to the products under test over a live internet connection with appropriate firewall rules in place to allow only communication between the hosts used in the testing. This enabled West Coast Labs to report on those s that were stopped at the Domino Server and track those s that might get bounced to allow for resending to ascertain the gateway protection offered. TMG 2010 testing: Testing was conducted on an On Access basis. All samples were provided from a real-life resolvable web, FTP and P2P server on a domain wholly owned and controlled by West Coast Labs. Attempts were made to download the samples over a live internet connection with appropriate firewall rules in place to allow only communication between the hosts used in the testing using HTTP, FTP and P2P to ascertain the gateway protection offered. 7 of 24

8 Malware Test Suites West Coast Labs puts considerable effort into ensuring the relevance of samples used in testing. There are three key components to this process. The company s research facilities continuously monitor malware attacks and intercept attempts to attack the corporate network of a global company with thousands of users spread over four continents. WCL also has the advantage of an international system of honeypots, machines based in many countries on most continents that sit on open networks waiting to be attacked. When attacks occur the malware is intercepted and reported back to a central repository, where it is de-duped, checked for corruption and validity, stored and can then be used as a sample for testing products. Another method of collection and validation is through honeyclients; systems designed to trawl the Internet to discover drive-by downloads (where malware is downloaded in the background unknown to the user who is looking at an otherwise perfectly acceptable web site), and to download files by visiting these websites and capturing the output. Comparative Test Project Malware Samples For this particular custom test, testing takes place in five different operating environments, namely Microsoft Exchange, Lotus Domino, MS ISA (TMG 2010) Server, Windows Server and Linux File Server. The main test suite is divided into separate sub-suites used for each environment (although some sub-suites are used more than once). For both Microsoft Exchange and Lotus Domino, the main component of the test suite is a group of malware that spreads itself via SMTP. Of course, many different files and types of malware can be attached to s, and therefore the test suite also includes malware gathered internationally that can be sent by . Types of malware used in this part of the test include viruses, bots, Trojans, and especially those worms designed to spread by , all of which have been found in the intercepts delivered to WCL. Windows Server acts as a network server and repository and so the appropriate test sub-suites include not only those sub-suites as used elsewhere but also network worms as being the malware most likely to infect and spread via these environments. MS ISA Server acts as a network edge gateway and so the suites considered when testing this include a wide range of malware concentrating on network traffic including HTTP, FTP, malware as well as network worms malware transported by the sort of traffic flow that would be associated with a corporate network. Linux has a small selection of malware especially designed to run in that environment, but also needs to recognize Windows malware; although this cannot run natively in this environment, many companies include both Windows and Linux machines on the same networks and any failure to recognize Windows malware might lead to infection of central or shared servers and leave the whole network vulnerable. For this reason the test sub-suites used in this environment include Linux malware but also Windows malware as used in some of the other tests. 8 of 24

9 Malware Detection Test Results TEST 1 Microsoft Exchange Total Malware Samples 8042 Test Date Detection Rate Test Location Kaspersky Security /09/ /09/ %HH WCL UK Lab Product Performance AverageH 100%HH WCL UK Lab Product A 16/09/ /09/ %HH WCL UK Lab Product B 16/09/ /09/ %HH WCL UK Lab Product C 16/09/ /09/ %HH WCL UK Lab Product D 16/09/ /09/ %HH WCL UK Lab Product E 16/09/ /09/ %HH WCL UK Lab TEST 2 Windows Server Enterprise Total Malware Samples Test Date Detection Rate Test Location Kaspersky Anti-Virus /09/ /09/ % WCL USA Lab Product Performance AverageH 99.54% WCL USA Lab Product A 20/09/ /09/ % WCL USA Lab Product B 20/09/ /09/ % WCL USA Lab Product C 20/09/ /09/ % WCL USA Lab Product D 20/09/ /09/ % WCL USA Lab Product E 20/09/ /09/ % WCL USA Lab TEST 3 Linux Total Malware Samples Test Date Detection Rate Test Location Kaspersky Anti-Virus /10/ /10/ % WCL USA Lab Product Performance AverageH 99.59% WCL USA Lab Product A 05/10/ /10/ % WCL USA Lab Product B 05/10/ /10/ % WCL USA Lab Product C 05/10/ /10/ % WCL USA Lab Product D 05/10/ /10/ % WCL USA Lab Product E 05/10/ /10/ % WCL USA Lab TEST 4 Lotus Domino Total Malware Samples 8042 Test Date Detection Rate Test Location Kaspersky Anti-Virus /10/ /10/ %HH WCL UK Lab Product Performance AverageH 100%HH WCL UK Lab Product A 06/10/ /10/ %HH WCL UK Lab Product B 06/10/ /10/ %HH WCL UK Lab Product C 06/10/ /10/ %HH WCL UK Lab Product D 06/10/ /10/ %HH WCL UK Lab Product E 06/10/ /10/ %HH WCL UK Lab TEST 5 ISA Server (Forefront TMG) Total Malware Samples Test Date Detection Rate Test Location Kaspersky Anti-Virus /10/ /10/ %HH WCL UK Lab Product A 14/10/ /10/ %HH WCL UK Lab HDefined as the performance average of the products included in the tests, which are deemed to be leading solutions in their own rights. HHSamples used in these tests are those found to be in circulation on West Coast Labs SMTP malware feeds immediately prior to the commencement of testing. Although appearing unusual, the 100% detection rates are indicative of two key facts. Firstly, the paranoid behaviour of protection systems and the degree of protection extended to vital communication systems such as these, Secondly, the changing nature of attempts to compromise end users over this vector. Whilst executables and binaries travelling over this vector are still highly prevalent, they are becoming less diverse, ie that there are not as many frequent outbreaks of based malware as there were and that the targets are more likely to receive phishing s and links to websites rather than files. 9 of 24

10 Kaspersky Lab Corporate Security Solutions Kaspersky Lab Statement Kaspersky Lab has developed highly-effective anti-malware solutions for use in medium and large-scale corporate networks with complex topologies and heavy loads. Combining ease of use with high standards of performance across multiple attack vectors, the products are cost effective solutions which meet both business and technical needs worldwide. West Coast Labs Executive Summary Report The launch of the Kaspersky Lab s range of anti-malware products for the corporate network environment provides security managers with an extended choice of effective solutions for dealing with threats in attack vectors across multiple operating systems. West Coast Labs independent testing and performance validation of the products confirm that they combine ease of use and management with high levels of performance, all of which is driven by Kaspersky Lab s own research, development and customer support programmes. Kaspersky Lab has made a significant commitment to the independent validation of its products efficacy and performance through West Coast Labs Checkmark Certification System. This provides a range of static, dynamic and real-time tests which make these Kaspersky solutions possibly the most intensively tested corporate anti-malware solutions available anywhere in the world today. Details of the specific tests to which the products are exposed are published elsewhere in this report, but the overall outcome of the certification testing is the achievement of the Platinum Product Award for these products, which is the highest level of independent validation from West Coast Labs possible for an anti-malware solution. This is complemented by very respectable malware detection test results which position the performance of Kaspersky Lab products very favourably alongside more widely recognised corporate security solutions. The specific malware detection capability testing of both Kaspersky Lab and a number of competitive anti-malware solutions was carried out in September and October 2010 while the Checkmark Certification testing of its products is performed on an ongoing basis. Custom test reports and details of certification testing are available at Kaspersky Security 8.0 for Microsoft Exchange Servers (Kaspersky Security 8.0). Kaspersky Security 8.0 provides anti-malware and anti-spam protection for mail traffic on corporate networks. Its integration with Exchange allows for detection and removal of malware and spam at the gateway level. The product is easy to install and its user-friendly interface, flexible administration and straightforward configuration and reporting system does not place excessive demand upon Administrator s time. No extra setup is required on Exchange and malware protection began immediately. Management of the solution is simple as Kaspersky Security 8.0 employs a Microsoft Management Console (MMC) snap-in, providing an intuitive interface with full access to all features. Database and signature updates run automatically, as often as every two hours, but if required may be run on-demand. Although there are fewer options available compared to other corporate products on the market, it can be argued that all the necessary options are available thus leading to a streamlined user experience. In the ongoing Checkmark Certification Static and Real Time tests, like all the Kaspersky products, this solution has achieved high consistently standards of performance. For the comparative performance testing to measure the product s detection capability of malware t t 10 of 24

11 known to propagate over SMTP, Kaspersky Security 8.0 achieved 100% detection rate of the 8042 malware samples used in the test. This performance is equivalent to and matches that of the competitor products included in the test. We also test HTTPS. Kaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition Kaspersky Anti-Virus 8.0 sits on top of Microsoft Forefront TMG While TMG acts as a standalone security solution in its own right, the addition of Kaspersky Anti-Virus 8.0 provides a multi-layered security solution. Installation of Kaspersky Anti- Virus 8.0 is simple, using a standard Windows Installer and settings imported from TMG during the install process. The default settings provide fast protection, but a more tailored installation can be achieved if required. The solution is managed via MMC with an additional central monitoring screen and network policies which can be be added to complement those of TMG; making the whole process of management, administration and ongoing use very straightforward. Kaspersky Security 8.0 Update Process Kaspersky Anti-Virus 8.0 allows permission or denial of various traffic types HTTP, FTP, SMTP and POP3 plus the ability to define what, if any, of the protocols should be subject to scanning. Data on network status including the protocols which are being blocked, numbers of files scanned, and the number of resulting infections is readily available. In the performance testing over the HTTP and FTP attack vectors, the combination of Kaspersky Anti-Virus 8.0 and TMG provided 99% detection of the range of malware samples which were included in the test. Kaspersky Anti-Virus 8.0 for Linux File Server Kaspersky Anti-Virus 8.0 for Linux installs from the command line, using a shell-script installer. Although some degree of familiarity with Linux is required, even junior network administrators with a basic t t Test Networks and Methodology In a heterogeneous network situation it is important to know that a security solution is both compliant and compatible. Throughout the comparative test programme for ISA/TMG, Linux, Lotus Domino and WSEE, WCL utilised the following network configuration to simulate a corporate network environment: 64-bit Windows 2008 machine running as a gateway/dns server hosting Forefront TMG/ISA Server 32-bit Windows 2003 machine running Lotus Domino mail server 64-bit servers running Linux and Windows 2008, both acting as file servers While each of the solutions were tested independently of one another, results of these tests and the observations made point to the various Kaspersky Lab solutions providing a multi-faceted security framework for a corporate network. Taking a hypothetical network into account, as below, one can see how each of the solutions would interact with and secure the network. Anti-malware protection, at the gateway level, is provided by scanning coming into the corporate network over SMTP with an initial scan by Kaspersky Anti- Virus 8.0 sitting on the TMG server. In turn, the is then received by the Exchange or Domino server and a further scan conducted by the appropriate solution. Should any user require the downloading of from an external POP3 server, the Kaspersky for TMG solution scans the traffic as it passes through the gateway. When dealing with files any that are downloaded over HTTP/FTP are scanned on the TMG/KAV combined server. Should any network user then attempt to upload any files to either a Windows or Linux based file server then here the respective Kaspersky Lab solution will provide further defense-in-depth. 11 of 24

12 KAV 8.0 for Linux File Server interface. Application interface of KAV for ISA understanding of Linux should be comfortable with the process. Managed via a web-based GUI running on a non-standard port, Kaspersky Anti-Virus 8.0 is configured from the GUI. No secondary interfaces or files need to be changed and updates are either scheduled or run on-demand. For security admin staff who may be familiar with a file-server anti-malware product, the make-up of the interface is very familiar it is both clear and intuitive. On-Access and On-demand protection are available as standard. Administrators can browse the Quarantine folder from within the product interface to review any malware logged and thus decide what actions to take. Given the complexities involved with porting anti-malware solutions to Linux, it is not always possible to ensure consistency of performance. However, Kaspersky Anti- Virus 8.0 sets itself apart in this regard. It is well implemented, as demonstrated in the comparative performance tests where it led with a 99.95% detection rate on the malware samples tested compared to an average performance rate of 99.52% for 5 other leading corporate solutions. Kaspersky Anti-Virus 8.0 for Lotus Domino Anyone familiar with Lotus Domino will find the installation straightforward. It is performed using a Lotus.nsf database file which is opened through Lotus Notes to run. Administrators can set various actions to be performed when malware is detected, however they will need to be familiar with Lotus in order to get the best out of the solution when rolling Kaspersky Anti-Virus 8.0 out to a Domino server. Delete or quarantine actions are easily defined for detected malware and for deleting infected attachments. Unlike some of the other vendor prod- Licensing process on Kaspersky Anti-Virus for Lotus t t 12 of 24

13 ucts included in the comparative performance review, Kaspersky Anti-Virus 8.0 does not need the installation of a desktop antimalware product to be able to use the desktop product s scanning engine signature files. In the comparative testing against 5 other leading corporate solutions, the test methodology employed a sender machines running a Linux distribution. Scripts developed by WCL were used to send the s that contained infected attachments over a live Internet connection. s were sent to servers running Lotus Domino 8.5 on Windows 2003 that each picked up s for a FQDN owned and controlled by WCL. Client machines running Lotus Notes 8.5 were used to pick-up the messages from the Domino servers and analysed the attachments to aid calculation of the overall detection rate which for Kaspersky Anti-Virus 8.0 was of a particularly high standard which mirrored that of the competitor products included in the test programme. All solutions attained a 100% detection rate during the test period. Kaspersky Anti- Virus 8.0 for Windows Servers Enterprise Edition Kaspersky Anti-Virus 8.0 for WSEE uses the standard Windows Installer interface. Two installations are required, one for the Administration tools and one for the solution itself. However, importing an existing configuration file to keep existing settings is possible when upgrading a previous version. Installation is quick and trouble-free. Managed through an MMC snap-in, the product allows product updates to be rolled-back if needed. It provides a quarantine area and a backup facility just in case the Administrator deletes a file that needs to be restored. The interface, as a whole, provides a rapid means of implementing malware security policies on the solution. All of the available features are easy to locate without the need for drilling down through multiple options screens or hunting for a Update Process on Kaspersky Anti-Virus WSEE required setting. On Demand scans can be set to a pre-defined security level or customized to meet the demands of the organisation. Similarly, On Access protection can be set with a preference for either high speed scans or high protection levels. Throughout the comparative test programme, WCL found the scans ran quickly with an overall detection rate for Kaspersky Anti-Virus 8.0 of 99.68% compared to an average performance of 99.51% for the other 5 security solutions included. WEST COAST LABS VERDICT Combining ease of use with high levels of performance, the Kaspersky Lab solutions under test have delivered comparable and at times, better detection rates to equivalent products. With a consistent level of anti-malware protection across the network topology, users of the Kaspersky Lab products featured in this report can be confident that they are all rigorously tested through the Checkmark Certification and the Real Time testing programme to provide ongoing independent validation on performance. 13 of 24

14 Checkmark Certifications for Kaspersky The Checkmark Certification System is recognised globally as probably the most comprehensive independent functionality and performance validation program of its kind. With three tiers of certification Baseline, Dynamic and Real Time testing vendors have the opportunity to commit to the System at a level that suits the performance of their products and services in the realworld. The Baseline certifications comprise a series of static benchmarking tests that measure detection capability against a finite suite of known malware threats. Whereas the addition of Dynamic and Real Time testing transforms this certification program into a threefold process that results in the most complete evaluation of an Anti-Malware vendor s products available. Static Testing baseline tests that measure detection capabilities against known threats. Dynamic Testing measures product performance in relation to malware executing as end users and corporations experience them in the real world. Real Time Testing measures critical performance characteristics in a network environment 24x7x365. The testing provides results in metrics including; performance in relation to time, attack vectors, heuristic behavior analysis, signature update and vendor research effectiveness. The combination of these three, distinct test programs provide the highest level certification of product performance available. All the Kaspersky Lab products that form part of this test program are registered in the Checkmark System for all three levels of testing Baseline, Dynamic (where appropriate) and Real Time. In Real Time, the products are tested 24x7x365 against live malware in a range of attack vectors are relevant to each product. These include FTP, HTTP, P2P, SMTP and Malicious Web Sites. Given the nature of the Real Time testing program and the fact that it is probably the most rigorous product performance validation of its kind, the products registered for Real Time testing are eligible for the Checkmark Platinum Product Award. Far more than just a measure of product performance it also acts as recognition of the vendor s commitment to the highest level of independent product validation and a measure of the vendor s responsiveness to emerging threats. The Kaspersky Lab products holding the Checkmark Platinum Product Awards are: Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition Kaspersky Anti-Virus 8.0 for Linux File Server Kaspersky Anti-Virus 8.0 for Lotus Domino Kaspersky Anti-Virus 6.0 for Windows Workstations Kaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition Kaspersky Security 8.0 for Microsoft Exchange Server Kaspersky Endpoint Security 8 for Linux 14 of 24

15 Checkmark Certification Profile Checkmark Anti Virus Anti Virus Trojan Spyware Anti Anti Anti Malware Certifications Detection Disinfection Malware Spam Dynamic Kaspersky Lab Applications Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Editon l l l l Kaspersky Anti-Virus 8.0 for Linux File Server l l l l Kaspersky Anti-Virus 8.0 for Lotus Domino l l l l Kaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition l l l l Kaspersky Security 8.0 for Microsoft Exchange Servers l l l l l Kaspersky Anti-Virus 6.0 for Windows Workstations Windows XP l l l l l l Windows Vista l l l l l l Windows 7 l l l l l l Kaspersky Endpoint Security 8 for Mac l Kaspersky Endpoint Security 8 for Linux l l l l l Kaspersky Anti Spam l Checkmark Real Time Real Time Real Time Real Time Real Time Real Time Certifications FTP HTTP SMTP P2P Mal URL Spam Kaspersky Lab Applications Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition l l Kaspersky Anti-Virus 8.0 for Linux File Server l l Kaspersky Anti-Virus 8.0 for Lotus Domino l Kaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition l l l l l Kaspersky Security 8.0 for Microsoft Exchange Servers l l Kaspersky Anti-Virus 6.0 for Windows Workstations Windows XP l l l Windows Vista l l l Windows 7 l l l Kaspersky Endpoint Security 8 for Linux l l The above chart denotes those certifications in which the respective Kaspersky solutions are currently enrolled. It is not reflective of each solution s test results or full protection capabilities. 15 of 24

16 Conclusion In this test programme, Kaspersky Lab products have undergone probably the most extensive testing carried out by West Coast Labs against a single corporate solution. These tests range from West Coast Labs established Checkmark Certification to ongoing performance validation the Real Time system and the custom malware comparative testing. This programme also includes the first ever product to be awarded the Checkmark Anti-Malware Macintosh certification. Upon completion of the tests covered in this report it can clearly be seen that Kaspersky are offering an extremely competitive and thorough security package to businesses and corporate organisations. For mail-based systems, Kaspersky recorded a 100% detection rate on both Exchange and Lotus against samples which propagate over the SMTP protocol. While this is an impressive detection rate, it should be noted that the other vendors also recorded the same detection levels. This should be an indicator to the level of importance of coverage and the perceived threat to business communications that is held by the security industry as a whole. On file server-type systems, in this case Windows 2008 and Red Hat Enterprise 5, there is a differential in detection levels. On the Linux OS, Kaspersky recorded the highest detection rate amongst the solutions on test, whilst on the Windows OS Kaspersky recorded the second-highest detection rate. It should be noted that the difference between first and second in the Windows OS test was just 1/100th of a percent, thus putting Kaspersky above the Industry Average as defined in the test results. From the results of the test programme it can be concluded that not only do the Kaspersky solutions offer comparative detection rates to offerings from other vendors, it is clear that the level of protection afforded by Kaspersky Lab solutions is consistently high across the range of platforms. Whether corporate organisations require protection for the desktop environment, a file server, Microsoft Exchange server, an Apple Mac client, or a server running Lotus Domino, the Kaspersky Lab performance is consistent throughout. Prospective users of Kaspersky Lab products and specifically those featured in this report, can take confidence from the fact that the solutions are rigorously tested on an ongoing basis through the Checkmark certification system and the Real Time testing programme to ensure independent validation of a consistently high standard of product performance. The full West Coast Labs Test Report for this project is available online at producttestreports/ 16 of 24

17 Product Feature Set Comparisons West Coast Labs was asked to compile a comparative feature list for each of the products included in this test. This information has been gathered from freely available marketing literature of those companies included in this test. As this information is gathered from marketing and other such materials, the information contained within the following tables should be taken as a high level overview and does not constitute a comparison of those features that were examined as part of the extended malware testing. Research was carried out during September and October 2010 using the reference points detailed on the following pages. 17 of 24

18 Kaspersky Product Comparison Kaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition 1. System Requirements 2. Operating Systems Supported 2. 3rd party platforms/software supported 3. Security Technology components 4. Key Product Features Anti-Virus engine Scanning traffic Anti-Virus Settings Administration Performance Feature KAV 8.0 for Microsoft ISA/TMG SE Microsoft Forefront Threat Management Gateway 2010 Minimum Processor Spec: Minimum RAM Spec: 1 GHz processor for ISA Server 2006 Standard Edition and 64-bit dual-core processor for Forefront TMG Standard Edition Not specified 1 GB RAM for ISA Server 2006 Standard Edition and 2 GB RAM for Forefront TMG Standard Edition 2 GB Minimum available Hard Disk Space 2.5 GB 2.5 GB Supports Windows 2008 R2 Yes Yes Windows 2008 SP2 Yes Yes Microsoft Windows Server 2003 SP2 Yes Yes Microsoft Windows Server 2003 R2 Yes Yes Supports Microsoft Forefront TMG Yes Yes Compatibility with VMware (Vmware Ready) Yes Anti-Virus detection Yes Yes Detected objects: viruses, mass-mailer worms, Trojan horses, spam, spyware Yes Yes Real-time antivirus protection Yes Yes Update rate anti-virus every 1-2 hours not specified Creation of backup copies Yes Yes* Scanning of HTTP and FTP traffic Yes Yes Scanning of HTTPS traffic (Forefront TMG only) Yes Yes Scanning of POP3 and SMTP traffic Yes Provides management, but needs separate product for Exchange Scanning of HTTP and FTP traffic from published servers Yes Yes Scanning of VPN connections Yes Yes Exclusions from scanning Yes Yes Flexible policy settings Yes Yes Management via MMC Yes Yes Monitoring of application status through the administration console Yes Yes Flexible policy management Yes Yes Support for non-standard FTP commands Yes Yes Export and import of settings details Yes Yes Notification system Yes Yes Logging system Yes Yes Detailed reports Yes Yes Control over performance through the Windows Performance Monitor Yes Yes Automatic scalability Yes Yes Server load balancing Yes not specified Optimal use of system resources Yes Yes *This solution offers a comparable technology but is not referred to specifically by this name, or this technology is not specifically documented in the publicly available literature. 18 of 24

19 Kaspersky Product Comparison Kaspersky Security 8.0 for Microsoft Exchange Servers Feature Kaspersky Security Symantec Mail Security Trend Micro ScanMail McAfee GroupShield Sophos PureMessage ESET Mail Security 4 1. System Requirements RAM 256 MB 1 GB 1GB RAM, 2GB RAM 512 MB minimum, 1 GB 256 MB to 2 GB 2 GB recommended (5MB of recommended recommended (services) RAM per mailboyes) Available disk space required 512? MB 352 MB 1GB 740 MB minimum Console: 150 MB 1.9 GB Services: up to 2 GB 2. Operating Systems Supported Microsoft Exchange Server 2010 Yes Yes Yes Yes Yes Yes Microsoft Exchange Server 2007 Yes Yes Yes Yes Yes Yes Microsoft Windows Server 2008 R2 Yes Yes Yes Yes Other Software Information Microsoft Exchange 2003 is supported by Exchange 2010, 64 bit Native 64-bit support for Windows Windows Windows another version Kaspersky Security for Windows, VMware and Hyper-V Exchange 2010 and 2007; Microsoft Exchange 2003 Virtualized environments 32-bit support for Exchange 2003/ Security Technology components Anti-Virus detection Yes Yes Yes Yes Yes Yes Anti-Spam detection Yes Yes Yes Yes Yes Yes Heuristic analyzer Yes Yes Yes Yes Yes Yes Linguistic analyzer Yes not specified Yes* not specified Yes No Real-time UDS requests Yes not specified not specified Yes* not specified No Graphical signature analyzer Yes not specified Yes No Yes No SPF and SURBL technologies Yes No No No No No 4. Key Product Features Anti-Virus engine Detected objects: viruses, mass-mailer worms, Trojan horses, spam, spyware Yes Yes Yes Yes Yes Yes Real-time antivirus protection Yes Yes Yes Yes Yes Yes Background on-demand scanning Yes Yes Yes Yes Yes Yes Update rate anti-virus every 1-2 hours rapid release definitions immediate protection AutoUpdate Updates automatically No Anti-Spam engine Classification of incoming messages Yes Yes Yes Yes Yes Yes Spam detection for different languages Yes No* No* No Yes No Update rate antispam every 5 min not specified not specified not specified constantly No Anti-Spam settings Intensity level Yes Yes Yes Yes Yes Yes Black and white listing Yes Yes Yes Yes Yes Yes Configurable scanning eyesceptions Yes Yes* Yes Yes Yes* Yes Anti-Virus Settings Configurable scanning eyesceptions Yes Yes Yes Yes Yes Yes Whitelisting Yes No Yes Yes No No Creation of backup copies Yes No In-memory scanning Yes No No Yes No* No* Administration and notifications via MMC Yes No No No No No Notification system Yes Yes Yes Yes Yes Yes Logging system Yes Yes Yes Yes Yes Yes Detailed reports Yes Yes Yes Yes Yes No* Performance Automatic scalability Yes No No No No No Optimal use of system resources Yes Yes Yes Yes Yes Yes Server Architecture Clusters support Yes Yes Yes Yes No No Compatibility with DAG in Microsoft Exchange 2010 Yes Yes Yes* Yes Yes No VMware ready Yes Yes No No No No *This solution offers a comparable technology but is not referred to specifically by this name, or this technology is not specifically documented in the publicly available literature. 19 of 24

20 Kaspersky Product Comparison Kaspersky Anti-Virus 8.0 for Linux File Server 1. System Requirements 2. Operating Systems Supported Feature KAV 8.0 for Linux FS Symantec Endpoint Protection Trend Micro Server Protect for Linux t McAfee VirusScan Enterprise Sophos Anti-Virus for Linuxt ESET File Security for Linux/BSD/ Solaris Intel Pentium II processor 400 MHz or higher Intel Pentium processor or compatible) Inte Pentium II 266 MHz or higher Intel x86 or x64; AMD x64 no information i386 (Intel 80386), AMD64 (x86_64) architecture (32-bit and 64-bit 512 MB RAM 1 GB RAM 256 MB min 256 MB min 256 MB 32 MB Cache size 1GB or higher 2 GB hard disk space for installation and 4 GB 50 MB for /opt + 50 MB for /tmp 500 MB 100 MB min 32 MB temporary files. Red Hat Enterprise Linux 5.5 Server Red Hat Enterprise Linux 3.x, 4.x, 5.x Red Hat Enterprise Linux (AS, ES, WS) 4.0 Red Hat Enterprise 4.x, 5.x Red Hat Enterprise 3, 4, 5 Linux Kernel version 2.2.x, 2.4.x or 2.6.x; glibc or higher; Fedora 13 Fedora Core 10, 11, and 12 CentOS-5.5 CentOS 4.x, 5.x SUSE Linux Enterprise Server 10 SP3, 11 SP1 SuSE Linux Enterprise (server/desktop) SuSE Linux Enterprise Server 9 SuSE Linux Enterprise Server/Desktop 9.x, 10x, 11 SuSE Linux Enterprise Server 8, 9, 10, 11; 9.x, 10.x Desktop 10 Sun Solaris 10 Novell OES 2 SP2 Novell Open Enterprise Server (OES/OES2) Novell Linux Desktop 9 opensuse Linux 11.3 opensuse Linux 10/10.1 Mandriva Enterprise Server 5.1 (32 bit only) TurboLinux 10/11 Server Ubuntu 9.10 Server Edition Ubuntu 7.x, 8.x Ubuntu 8.04, 9.04, 9.10 Ubuntu LTS Server Edition 6.06/8.04 Ubuntu LTS Server Edition Debian GNU/Linux Debian 4.x Debian 3.1 FreeBSD 7.3, 8.1 FreeBSD: Version 5.x, 6.x, 7.x Miracle Linux 4.0 Dazuko kernel module or higher (optional) Asianux 2.0/3.0 NetBSD 4.x 2. Security Technology components Anti-Virus detection Yes Yes Yes Yes Yes Yes Backup/Quarantine Yes Yes Yes Yes Yes Yes 3. Key Product Features Anti-Virus engine Detected objects: viruses, Trojan horses, spyware Yes Yes Yes Yes Yes Yes Real-time antivirus protection Yes Yes Yes Yes Yes Yes Background on-request or on-demand scanning Yes Yes* Yes Yes* Yes Yes Update rate anti-virus every 1-2 hours daily every 1 hour every 1 hour as often as every 10 minutes daily Creation of backup copies Yes No* No* No* No* No* Scanning of critical system areas Yes Yes Yes Yes Yes Yes* Scans and treats archived files Yes Yes Yes Yes Yes Yes Anti-Virus Settings Assigning trusted zones /users Yes Yes No* No* Yes No* Flexible setting of scan times Yes No* Yes No* Yes No* Additional settings for Samba servers Yes No* No* No* Yes No* Administration Centralized administration Yes Yes Yes Yes Yes Yes Administration via Kaspersky Web Management Console Yes n/a n/a n/a n/a n/a Command line administration Yes Yes No* No* Yes Yes Notification system Yes Yes Yes Yes Yes Yes Logging system Yes Yes Yes Yes Yes Yes Detailed reports (PDF, XLS, CSV, etc.) Yes Yes Yes Yes Yes Yes Performance Automatic scalability Yes Yes Yes* Yes* Yes* Yes* Optimal use of system resources Yes Yes* Yes* Yes* Yes* Yes* Server load balancing Yes Yes* Yes* Yes* Yes* Yes* Continuous server operation Yes Yes Yes Yes Yes Yes t The McAfee and Sophos products support other Linux implementations but only for on-demand scanning, not on-access scanning *This solution offers a comparable technology but is not referred to specifically by this name, or this technology is not specifically documented in the publicly available literature. 20 of 24

BitDefender Client Security Workstation Security and Management

BitDefender Client Security Workstation Security and Management BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from

More information

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE A P P L I C A T I O N V E R S I O N : 8. 0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

Symantec AntiVirus Enterprise Edition

Symantec AntiVirus Enterprise Edition Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise

More information

Business Products 2 0 0 8

Business Products 2 0 0 8 Business Products 2 0 0 8 CONTENTS Kaspersky Lab: Experts in Data Security 2 Advanced Technologies from Kaspersky Lab 3 Corporate Network Protection Today 4 PRODUCTS Kaspersky Work Space Security 6 Kaspersky

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

How To Protect Your Computer From A Malicious Virus

How To Protect Your Computer From A Malicious Virus Trusted protection from malware and email-borne threats for multiplatform environments Overview safeguards enterprise assets and lowers risk by providing unmatched protection against threats for laptops,

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

How To Write A Test Drive For Kaspersky Anti Virus 6.0 For Windows Server (For Windows)

How To Write A Test Drive For Kaspersky Anti Virus 6.0 For Windows Server (For Windows) Kaspersky Anti-Virus >> Enterprise Proof of Concept (PoC) Request Form Dear Kaspersky Lab Prospect, To facilitate the proof of concept (PoC) process, we require the following form which documents your

More information

Ad-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment...

Ad-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment... Table of Contents Using This Guide... 9 Purpose and Intended Audience... 9 How to Use This Guide... 9 Conventions Used in This Guide... 10 Typographical Conventions... 10 Admonitions... 10 About Ad-Aware

More information

Symantec Endpoint Protection 12.1.5 Datasheet

Symantec Endpoint Protection 12.1.5 Datasheet Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that

More information

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business is an easyto-use, all-in-one suite that secures your critical business assets and information against today s complex

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easy-to-use, all-in-one suite that secures your critical business assets and information against

More information

Information Security Recommendation Report

Information Security Recommendation Report Information Security Recommendation Report Prepared for Baker and Company Prepared by Alma Ruiz May 3, 2013 Table of Contents ii Table of Contents Introduction... 1 Methods for Evaluation... 3 Results

More information

BITDEFENDER ENDPOINT SECURITY TOOLS

BITDEFENDER ENDPOINT SECURITY TOOLS BITDEFENDER ENDPOINT SECURITY TOOLS Beta Version Testing Guide Bitdefender Endpoint Security Tools Beta Version Testing Guide Publication date 2014.11.26 Copyright 2014 Bitdefender Legal Notice All rights

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

for businesses with more than 25 seats

for businesses with more than 25 seats for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use

More information

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage PRODUCT BRIEF: CA ANTI-VIRUS CA Anti-Virus r8.1 CA ANTI-VIRUS IS THE NEXT GENERATION IN COMPREHENSIVE ANTI-VIRUS SECURITY FOR BUSINESS PCS, SERVERS AND PDAS. IT COMBINES PROACTIVE PROTECTION AGAINST MALWARE

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easyto-use, all-in-one suite that secures your critical business assets and information against today

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Virtual Desktops Security Test Report

Virtual Desktops Security Test Report Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January

More information

avast! Business products 2012

avast! Business products 2012 avast! Business products 2012 Introducing the new features and technologies in the latest lineup of avast! security solutions for business. Content 1. Why avast! is different 2. avast! business software

More information

World-class security solutions for your business. Business Products. C a t a l o g u e

World-class security solutions for your business. Business Products. C a t a l o g u e World-class security solutions for your business Business Products C a t a l o g u e About Kaspersky Lab Kaspersky Lab is the largest developer of secure content management systems in Europe and is among

More information

Forefront Protection 2010 for Exchange Server Overview

Forefront Protection 2010 for Exchange Server Overview Forefront Protection 2010 for Exchange Server Overview Fast and effective protection against malware and spam Forefront Protection 2010 for Exchange Server provides fast and effective detection of viruses,

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

BitDefender for Microsoft ISA Servers Standard Edition

BitDefender for Microsoft ISA Servers Standard Edition BitDefender for Microsoft ISA Servers Standard Edition Copyright 2006 SOFTWIN Edition 1. How Does It Work? As content entering or leaving your company must meet security policies, it is crucial to choose

More information

Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis

Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis Vendors Tested: McAfee Sophos Symantec Trend Micro Executive Summary Indusface was commissioned by Trend Micro Inc.

More information

Novell Open Workgroup Suite

Novell Open Workgroup Suite Novell Open Workgroup Suite Small Business Edition QUICK START GUIDE September 2007 v1.5 Page 1 Introduction This Quick Start explains how to install the Novell Open Workgroup Suite software on a server.

More information

avast! Business products 2014 Introducing the new features and technologies in the latest lineup of avast! security solutions for business.

avast! Business products 2014 Introducing the new features and technologies in the latest lineup of avast! security solutions for business. avast! Business products 2014 Introducing the new features and technologies in the latest lineup of avast! security solutions for business. Content 1. 2. 3. 4. 5. 6. 7. 8. 11. 14. 15. 16. 17. Why avast!

More information

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions. PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information

More information

Symantec Mail Security for Microsoft Exchange Getting Started Guide

Symantec Mail Security for Microsoft Exchange Getting Started Guide Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide

Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide A P P L I C A T I O N V E R S I O N : 8. 0 M P 2 C F 2 Dear User! Thank you for choosing our product. We hope that this documentation will

More information

STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg. STPIC/Admin/002/2009-2010/ Date: 18.06.09 Sub: Quotation for purchase/renewal of Anti Virus Software Reg. Software Technology Parks of India (STPI), an autonomous Society under Ministry of Communication

More information

AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution

AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution The present document offers a comprehensive analysis of the ways to secure corporate email systems. It provides an expert opinion on

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Comparing Free Virtualization Products

Comparing Free Virtualization Products A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this

More information

A progressive and integrated approach to protecting corporate networks

A progressive and integrated approach to protecting corporate networks A progressive and integrated approach to protecting corporate networks Kaspersky Open Space Security is a suite of products that offers security coverage for all types of network endpoints, from mobile

More information

For Businesses with more than 25 seats. www.eset.com

For Businesses with more than 25 seats. www.eset.com For Businesses with more than 25 seats www.eset.com ESET Endpoint Protection Standard Whether your business is just starting or Simple and Straightforward established, there are a few things you expect

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity

More information

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008 ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning

More information

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book

More information

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center Reviewer s Guide Contents Introduction / Solution Headlines... 3 Getting Started... 4 Deployment... 4 Installation on an Infected

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

ESET Security Solutions for Your Business

ESET Security Solutions for Your Business ESET Security Solutions for Your Business It Is Our Business Protecting Yours For over 20 years, companies large and small have relied on ESET to safeguard their mission-critical infrastructure and keep

More information

The Advantages of Using AVG Identity Protection

The Advantages of Using AVG Identity Protection Reviewer s Guide AVG Identity Protection 8.5 1 Contents Who is AVG?... 3 What is AVG 8.5 Identity Protection?... 3 A Layered Security Approach... 4 The Changing Internet Security Landscape... 4 Identity

More information

Kaspersky Security 8.0 for Microsoft Exchange Servers AD Administrator's Guide

Kaspersky Security 8.0 for Microsoft Exchange Servers AD Administrator's Guide Kaspersky Security 8.0 for Microsoft Exchange Servers AD Administrator's Guide P R O G R A M V E R S I O N : 8. 0 M A I N T E N A N C E P A C K 1 Dear User! Thank you for choosing our product. We hope

More information

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide APPLICATION VERSION: 9.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition Getting Started Guide The software described in this book is furnished

More information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information Getting started Symantec AntiVirus Business Pack Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 Symantec and the Symantec logo are U.S. registered trademarks of Symantec

More information

QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10

QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10 QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10 About This Guide The intention of this guide is to provide a step through of the initial installation of Kaspersky Security

More information

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide APPLICATION VERSION: 9.0 MAINTENANCE RELEASE 1 Dear User! Thank you for choosing our product. We hope that this document will

More information

Kaspersky Security 8.0 for Microsoft Exchange Servers Installation Guide

Kaspersky Security 8.0 for Microsoft Exchange Servers Installation Guide Kaspersky Security 8.0 for Microsoft Exchange Servers Installation Guide APPLICATION VERSION: 8.0 MAINTENANCE RELEASE 2 CRITICAL FIX 1 Dear User! Thank you for choosing our product. We hope that this document

More information

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,

More information

Total Defense Endpoint Premium r12

Total Defense Endpoint Premium r12 DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious

More information

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems Symantec Endpoint Protection.cloud Employing cloud-based technologies to address security risks to endpoint systems White Paper: Endpoint Protection.cloud - Symantec Endpoint Protection.cloud Contents

More information

How To Test For Security Protection

How To Test For Security Protection False Sense of Security: New Anti-Virus Testing Methodologies are Critical to Educate Customers Charlotte Dunlap Independent Security Analyst Charlotte Dunlap is an independent security analyst and regular

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Getting Started Symantec Mail Security for Microsoft Exchange About Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange is a complete, customizable, and scalable

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Client Server Messaging Security3

Client Server Messaging Security3 Client Server Messaging Security3 for Small and Medium Business Getting Started Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without

More information

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide A P P L I C A T I O N V E R S I O N : 9. 0 Dear User! Thank you for choosing our product. We hope that this document will help

More information

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT Open Space Security Cyber-attacks are real. Today alone, Lab technology prevented nearly 3 million of them aimed at our customers worldwide.

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

Endpoint Business Products Testing Report. Performed by AV-Test GmbH

Endpoint Business Products Testing Report. Performed by AV-Test GmbH Business Products Testing Report Performed by AV-Test GmbH January 2011 1 Business Products Testing Report - Performed by AV-Test GmbH Executive Summary Overview During November 2010, AV-Test performed

More information

VMware vcenter Update Manager Administration Guide

VMware vcenter Update Manager Administration Guide VMware vcenter Update Manager Administration Guide Update 1 vcenter Update Manager 4.0 This document supports the version of each product listed and supports all subsequent versions until the document

More information

McAfee VirusScan Enterprise for Linux 1.7.0 Software

McAfee VirusScan Enterprise for Linux 1.7.0 Software Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved.

Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved. Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved. Release date: August 28, 2014 This build was developed and tested on: -

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

Using VMware Player. VMware Player. What Is VMware Player?

Using VMware Player. VMware Player. What Is VMware Player? VMWARE APPLICATION NOTE VMware Player Using VMware Player This document contains the following sections: Work and Play in a Virtual World on page 1 Options and Features in VMware Player on page 4 Installing

More information

WHITE PAPER. Understanding How File Size Affects Malware Detection

WHITE PAPER. Understanding How File Size Affects Malware Detection WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through

More information

How To Install Avira Small Business Security Suite (Small Business) On A Microsoft Microsoft Server (Small Bserver) For A Small Business (Small) Computer (Small Server)

How To Install Avira Small Business Security Suite (Small Business) On A Microsoft Microsoft Server (Small Bserver) For A Small Business (Small) Computer (Small Server) Avira Small Business Security Suite HowTo Table of Contents 1. Introduction... 3 2. Product Information... 3 2.1 Operation mode...3 2.2 Scope of services...3 2.3 Optimum protection. Fast updates. Efficient

More information

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

escan Corporate Edition User Guide

escan Corporate Edition User Guide Anti-Virus & Content Security escan Corporate Edition (with Hybrid Network Support) User Guide www.escanav.com sales@escanav.com The software described in this guide is furnished under a license agreement

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

Avira Small Business Security Suite Avira Endpoint Security. Quick Guide

Avira Small Business Security Suite Avira Endpoint Security. Quick Guide Avira Small Business Security Suite Avira Endpoint Security Quick Guide Table of Contents 1. Introduction... 3 2. Product Information... 3 2.1 Operation mode...3 2.2 Scope of services...3 2.3 Optimum protection.

More information

MRG Effitas 360 Assessment & Certification Programme Q4 2014

MRG Effitas 360 Assessment & Certification Programme Q4 2014 MRG Effitas 360 Assessment & Certification Programme Q4 2014 1 Contents Introduction... 3 Executive summary... 3 Certification... 4 The purpose of this report... 5 Tests employed... 6 Security Applications

More information

Kaspersky Security 8.0 for Microsoft Exchange Servers Administrator s Guide

Kaspersky Security 8.0 for Microsoft Exchange Servers Administrator s Guide Kaspersky Security 8.0 for Microsoft Exchange Servers Administrator s Guide APPLICATION VERSION: 8.0 MAINTENANCE RELEASE 2 CRITICAL FIX 1 Dear User! Thank you for choosing our product. We hope that this

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0.2 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

ADMINISTRATOR'S GUIDE

ADMINISTRATOR'S GUIDE KASPERSKY LAB Kaspersky Security 5.5 for Microsoft Exchange Server 2003 ADMINISTRATOR'S GUIDE KASPERSKY SECURITY 5.5 FOR MICROSOFT EXCHANGE SERVER 2003 Administrator's Guide Kaspersky Lab http://www.kaspersky.com

More information

Kaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition

Kaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition Kaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition ADMINISTRATOR'S GUIDE PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this document

More information

INTRODUCING KERIO WINROUTE FIREWALL

INTRODUCING KERIO WINROUTE FIREWALL KERIO TECHNOLOGIES, INC. KERIO WINROUTE FIREWALL 6.1 REVIEWER S GUIDE JUNE 2005 WHAT IS KERIO? Kerio Technologies, Inc. provides Internet messaging and firewall software solutions for small to medium sized

More information

Total Protection for Enterprise-Advanced

Total Protection for Enterprise-Advanced System Requirements Total Protection for Enterprise-Advanced One integrated solution, one console, proven comprehensive protection McAfee Alert Manager 4.7.1 Free disk space 1.5 MB (complete installation)

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

World-class security solutions for your business. Kaspersky. OpenSpaceSecurity

World-class security solutions for your business. Kaspersky. OpenSpaceSecurity World-class security solutions for your business Kaspersky Open Open Kaspersky Open Space Security is a suite of products that offers security coverage for all types of network endpoints, from mobile devices

More information

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach 100% Malware-Free E-mail: A Guaranteed Approach 2 100% Malware-Free E-mail: A Guaranteed Approach Panda Security's Mail Filtering Managed Service Guarantees Clean E-mail Table of Contents Table of Contents...

More information

Endpoint Security Solutions Comparative Analysis Report

Endpoint Security Solutions Comparative Analysis Report Endpoint Security Solutions Comparative Analysis Report (Physical Environment) Vendors Tested Trend Micro McAfee Symantec Sophos Microsoft To: Trend Micro Indusface Contact Kandarp Shah Vice President

More information

Kaspersky Small Office Security User Guide

Kaspersky Small Office Security User Guide Kaspersky Small Office Security User Guide APPLICATION VERSION: 4.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information