CORPORATE AV / EPP COMPARATIVE ANALYSIS
|
|
|
- Melina Stokes
- 10 years ago
- Views:
Transcription
1 CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Protection 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos, Symantec, Trend Micro
2 Overview Endpoint Protection Products (EPP) are designed to protect against a broad spectrum of threats. Products originally developed to detect self- replicating code (viruses and worms) have added protection against adware, spyware, rootkits, bootkits, phishing attacks, and exploits, in addition to providing firewall capabilities and more. The ability to block exploits is one of the most significant tasks required of EPP products. When a new vulnerability is exploited, not only can malware, known or unknown, be silently installed, criminals can take over the exploited computer manually, thereby evading signatures and heuristics designed to detect malicious code. If an EPP can block an exploit, it has effectively blocked any and all malware that the exploit may attempt to execute or install. The ability to catch the payload an exploit delivers has value but provides far less protection than blocking the exploit itself. Exploit kits such as Blackhole have essentially made the mass exploitation of websites a low cost franchise operation with a low buy- in and an immediate lucrative return. Software such as Oracle s Java, Adobe s Flash and Reader/Acrobat, in addition to web browsers, keep a fresh supply of exploitable vulnerabilities available even as old exploits continue to plague consumers and corporations alike. The exploitation of vulnerabilities in common software programs enables attackers to breach networks, steal intellectual property, hijack and social network accounts, and engaging in several other types cybercrimes. NSS vulnerability research reveals that the number of reported vulnerabilities rose significantly in 2012 and the vulnerability landscape is going through significant transformations 1. Enterprises have several tools to help prevent the exploitation of vulnerabilities. Patching is one of the most important defenses. However many corporations fail to patch all of the applications on their desktops and often are slow to deploy the most current software versions. Intrusion prevention systems (IPS), and in some scenarios next generation firewalls (NGFW), can provide a valuable line of defense against exploits for enterprises. NSS provides extensive comparative testing for IPS and NGFW products. The use of current web browsers is another line of defense. The most widely used browsers have added features such as reputation systems and application blocking to help defend against the exploitation of vulnerabilities. The use of endpoint protection products, colloquially known as antivirus, is also a common defense. NSS tested 11 popular enterprise EPP products to measure their effectiveness in protecting Windows computers against exploits. All of the exploits used during this test have been publicly available for months (and sometimes years) prior to the test, and have also been observed in use on the Internet. Enterprises, especially those employing the BYOD model, that seek protection from exploit driven attacks against desktop PCs and laptops should closely examine results from this test. 1 threat- trends 2013 NSS Labs, Inc. All rights reserved. 2
3 McAfee Kaspersky Symantec Sophos AVG F- Secure Trend ESET Microsod Norman 97% 92% 91% 88% 79% 76% 73% 71% 65% 47% Panda 41% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Figure 1 - Combined Block Rates (including alternate vectors) Figure 1 combines 203 exploit download and payload execution tests with 30 alternate vector attacks to provide the overall exploit protection rate for the tested EPP products. Key Findings: With a few notable exceptions, endpoint products are not providing adequate protection from exploits. Enterprise EPP products differ up to 53% in effectiveness at blocking exploits, with protection levels varying between 44% and 97% Keeping AV software up- to- date does not yield adequate protection against exploits, as evidenced by gaps in coverage for vulnerabilities found to be several years old. Java is a significant attack vector 2013 NSS Labs, Inc. All rights reserved. 3
4 Table of Contents Analysis... 5 Test Background Threat Landscape... 5 Stages of Protection... 6 How This Test Was Conducted... 7 Protection From Exploits Across Protocols... 7 Exploit Blocking Results... 8 Alternative Attack Vectors Test Methodology The Tested Products Client Host Description The Vulnerabilities Appendix A: Definitions Vulnerability Exploit Payload Contact Information Table of Figures Figure 1 - Combined Block Rates (including alternate vectors)... 3 Figure 2 - How a desktop/laptop computer is exploited... 5 Figure 3 - HTTP vs. HTTPS block rates... 8 Figure 4 - Non- IE6 Overall Exploit Block Rate... 9 Figure 5 - IE6 Overall Block Rate Figure 6 - Overall Exploit Block Rate NSS Labs, Inc. All rights reserved. 4
5 Analysis The results of NSS in- depth testing of 41 individual exploits and over 200 attack scenarios revealed significant differences in the defensive capabilities of 11 leading endpoint protection solutions. Results are provided for exploits that require Internet Explorer 6 and those that do not. Given that many enterprises are forced to support IE6 because of legacy applications, this capability may be a determining factor in selecting an EPP product. Excluding exploits requiring IE6, the average block rate was 77%, with the weakest product blocking 44% and the best product blocking 98% of the attacks. For exploits requiring IE6 to execute, the average blocking ability was 65%, with the weakest performer blocking 20% of the attacks and the top products blocking 100% of the attacks. Enterprises rely on endpoint security products to help provide a virtual shield against exploits. The number of potentially vulnerable applications that need to be patched taxes the resources of most IT departments and may allow vulnerabilities to persist longer than they ordinarily might on a consumer computer. NSS testing shows that the majority of EPP products fail to block some of the most widely used and dangerous exploits from recent years. Given the importance and growing prevalence of this class of threat, NSS recommends that enterprises give appropriate weight to the quality of exploit prevention technology, as well as performance and threat detection, when selecting EPP products. Test Background Threat Landscape The layers of defense used in enterprises vary widely. The extent to which technologies such as IPS, NGFW, web and application whitelisting, thin clients, and other measures are employed will affect how critical it is that an EPP product is capable of blocking exploits. Where employees work from home, or the bring your own device (BYOD) model is adopted, the importance of exploit prevention in EPP products may be significantly increased. Exploit detection and prevention is a difficult problem and requires a different set of skills and focus than traditional malware protection. In this test NSS demonstrates the capabilities of 11 popular enterprise- level endpoint protection products. Figure 2 - How a desktop/laptop computer is exploited 2013 NSS Labs, Inc. All rights reserved. 5
6 Stages of Protection The following table outlines pros and cons of stopping the threat at the various stages. Stage of Protection Pros Cons Stage Ø Vulnerability Stage 1 Exploit Stage 2 Payload Provides the best protection prevents the vulnerability from triggering 90% proactive: Can develop protection before exploits based upon the vulnerability are released ALL alternate exploit variants of the vulnerability are blocked Nearly impossible to evade Very accurate Generates the least false positives Offers targeted protection prevents the (known) exploit No need to understand the vulnerability or the protocol beyond a cursory level Can be done easily through regular expression matching Fast Generates few false positives Focuses on the malicious payload (malware) Detects malware that is delivered by other means (i.e. USB) Simple pattern matching Fast Based on mature technology Requires a lot of work and is hard to do 10% reactive: Must know vulnerability Requires complex application or protocol decoding Must understand the vulnerability Most processor- intensive Provides limited targeted protection 50% reactive: Must see the exploit first Only prevents the specific (known) exploit Easy for attackers to find alternatives to bypass Maximum coverage = many signatures Requires tuning to prevent false positives Detection occurs after a successful attack has put malicious code on an endpoint 100% reactive: Must see the payload first Does not detect non- standard attacks Easy for attackers to obfuscate attacks and bypass Requires the most signatures + constant updates to be effective Only provides limited protection 2013 NSS Labs, Inc. All rights reserved. 6
7 How This Test Was Conducted Between October and December 2012, NSS tested 11 enterprise endpoint protection products, assessing their respective protection capabilities against exploits. Vulnerabilities used in this test were exploited when a user visited an infected web page hosting the attack code. The attacks occurred in two stages: 1. The attacker caused a specially crafted stream of data and code to be delivered to a precise location. This exploited the victim s computer, gaining the attacker the ability to perform arbitrary code execution. 2. Malicious code was silently executed on the victim s computer. If the attack can be thwarted in stage one (successful exploit), then it cannot progress to stage two. As long as the exploit is not defeated, then installing malware is just one of many possible actions the attacker can take. Prior to exploiting a vulnerability, attackers have the ability to use services such as Google s VirusTotal and even the products themselves, to ensure the payload will not be detected by any antivirus product. Since cybercriminals have the time and resources to ensure custom malware will go undetected, it is imperative that attacks be defeated in the earliest possible stage. Those products that are unable to prevent the exploitation of vulnerabilities are also unable to provide significant protection against the infinite number of payloads that can be delivered. Protection From Exploits Across Protocols The Firefox add- on, Firesheep, brought substantial media attention to session hijacking attacks, and forced many social media sites to implement encrypted sessions. Today, Gmail, Twitter, and Facebook all offer end- to- end HTTPS sessions, as does virtually every financial site. When trusted SSL sites are compromised, products that cannot penetrate SSL encryption are blind to the attacks and to the malware being delivered through the HTTPS transport protocol. Detection of exploits delivered across HTTP versus HTTPS protocols can vary by as much a 39% in a single product NSS Labs, Inc. All rights reserved. 7
8 Kaspersky McAfee 100% 97% 97% 95% Symantec 87% 95% Trend Sophos 50% 89% 87% 89% AVG F- Secure 71% 79% 82% 87% HTTP HTTPS ESET 74% 74% Microsod 66% 66% Norman Panda 50% 50% 42% 47% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Figure 3 - HTTP vs. HTTPS block rates NSS protocol testing utilized a payload that was proven to be detectable by all products in at least some cases. The payload was delivered via both HTTP and HTTPS leveraging 39 different exploits. Browsers used in the protocol testing included multiple versions of Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, and Google Chrome. Vulnerable applications included versions of.net, Flash, Java, Office, Shockwave, RealPlayer, Reader, QuickTime, WMItools, and WMP. To provide the best protection, security products should ideally protect against all exploits for a given vulnerability, regardless of transport protocol. Exploit Blocking Results In the non- IE6 tests, no product was able to block all of the exploits, and only three products, Kaspersky (98%), McAfee (96%) and Symantec (92%) were able to block more than 90% of the exploits. Four products, ESET (74%), Microsoft (66%), Norman (52%), and Panda 44% failed to block at least 75% of the exploits. For most products, the problem was not whether or not the traffic was encrypted, but rather a failure to detect exploits at all (over both HTTP and HTTPS). A few products even demonstrated more effective exploit blocking performance over HTTPS than over HTTP. On average, there was a 7% difference in the ability of products across the board to block HTTPS versus HTTP exploit attacks NSS Labs, Inc. All rights reserved. 8
9 Trend Micro blocked 39% fewer attacks delivered via HTTPS than through HTTP and AVG blocked 16% fewer attacks when SSL was used. Only ESET, Microsoft, and Norman consistently blocked the same attacks delivered through HTTPS as they did when SSL was not used. The overall effectiveness of the 11 products in blocking (non- IE6) exploits is as follows: Kaspersky McAfee 96% 98% Symantec Sophos 88% 92% AVG Trend F- Secure ESET 82% 81% 78% 74% Microsod 66% Norman 52% Panda 44% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Figure 4 - Non- IE6 Overall Exploit Block Rate When testing protection against exploits that require the use of Internet Explorer 6.0, three products, McAfee, Sophos, and Symantec were able to block 100% of the exploits. The average detection of these exploits was 65%. Among the IE6 driven attacks that Microsoft failed to block was an exploit that affects Microsoft Office There were 5 products that able to block more than 75% of the attacks. Five products failed to block 50% of the exploits that affect IE6 uses NSS Labs, Inc. All rights reserved. 9
10 Symantec Sophos McAfee Kaspersky F- Secure AVG Trend 100% 100% 100% 88% 80% 56% 48% Panda Microsod ESET 40% 40% 40% Norman 20% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Figure 5 - IE6 Overall Block Rate The combined exploit protection of figures 4 and 5 are shown in figure 6 below. Kaspersky McAfee Symantec Sophos 97% 97% 93% 89% AVG F- Secure Trend 79% 78% 77% ESET 70% Microsod 63% Norman 48% Panda 44% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Figure 6 - Overall Exploit Block Rate 2013 NSS Labs, Inc. All rights reserved. 10
11 Alternative Attack Vectors In testing EPP products against exploits the primary tests were performed using a variety of web browsers. NSS engineers also performed a few tests using alternate attack vectors. However the sample set was too small to present qualitative product differences on those criteria alone, but did reveal some gaps in protection. NSS engineers tested 5 exploits, each executed from an Outlook message, executed from a network share, and copied from a network share and executed from the desktop. Most products would block the exploits when delivered from alternate vectors if they blocked the exploit on download. There were a couple of notable and interesting exceptions, however. For one exploit Kaspersky failed to block an exploit when run from alternate vectors. On further inspection it was determined that the initial block when a browser was used was based upon a heuristic that detected the exploit script rather than the exploit itself. F- Secure failed to block two exploits if they were executed from a network share but detected the exploits when downloaded, opened from or opened from the desktop. Trend Micro blocked an exploit on download and when opened from Outlook, but not when executed from a network share or the desktop. The small sample set precludes conclusions that the other products would not have similar issues if a statistically significant sample set were used in these tests. However the testing does conclusively demonstrate that the ability to block an exploit on download does not automatically translate to protection against alternate delivery methods. NSS engineers noted other disconcerting behaviors while conducting the tests. There were several instances where products flagged an exploit but the payload was still executed. These cases were tabulated as failures. Initial indications point to a probable race condition where a temp file is written to disc and sometimes the EPP detects prior to payload execution and sometimes the payload wins the race. The standard NSS testing methodology calls for the use of standard ports for browsing and exploit delivery. However, when NSS engineers tried the same tests over non- standard ports, Kaspersky failed to detect the exploits. This may be attributable to configuration options and underscores the need to block unused ports at the firewall as well as the need to test implementations of security products in the actual enterprise environment. In testing exploits delivered over HTTPS, NSS engineers noted that the browser would often crash when testing the Kaspersky product. While this did prevent the payload from executing, it is not the ideal approach to exploit protection and can result in excessive helpdesk calls NSS Labs, Inc. All rights reserved. 11
12 Test Methodology Methodology Version: Endpoint Protection Test Methodology v3.0 This test report is one of a series of several tests in our Whole Product Test series. The scope of this particular report is limited to Host Intrusion Prevention vs. Exploits. No Zero- Day exploits against unknown vulnerabilities were included in this test. Other tests in this series include: 1. Socially engineered Malware Web- based malware that tricks users into downloading and installing it. 2. Host Intrusion Prevention This report 3. Evasion Defenses Preventing attempts to circumvent AV and HIPS 4. Anti- Malware (classic) , Network Share, and USB infection vectors 5. Live Web- Based Drive- By Exploits Live testing using Internet- borne exploits that insert malware payloads. Also known as Drive- by or non- consensualǁ downloads 6. Performance Increase in Memory, CPU, Boot Time, and Application Load Time. The Tested Products The following is a current list of the products that were tested and are sorted alphabetically: 1. AVG Internet Security Business Edition ESET Endpoint Security F- Secure Client Security Kaspersky Endpoint Security (a) 5. McAfee Endpoint Protection MS System Center 2012 Endpoint Protection Norman Endpoint Protection Panda Cloud Antivirus Pro Sophos Endpoint Security & Control Symantec Endpoint Protection RU1 MP1 11. Trend Micro Office Scan Service Pack 1 Vendors were allowed to make configuration changes if it was determined that the default settings were not optimal. Product settings were verified by browsing to real websites on the Internet that utilize common applications used during the test. This ensured vendors applied realistic policies and did not skew the test by simply setting their product to block all NSS Labs, Inc. All rights reserved. 12
13 Products were connected to the live Internet, and had access to vendor cloud services. Updates were enabled with whatever frequency was set by the manufacturer. Once testing began, the product version was frozen, in order to preserve the integrity of the test. Given the nature of endpoint protection platforms, virus signatures and definition updates as well as HIPS updates were enabled with whatever frequency was set by the manufacturer. Client Host Description All tested software was installed on identical machines, with the following specifications: Microsoft Windows XP SP3, and Windows bit operating systems 2 GB RAM (XP SP3), 4 GB RAM (Windows 7) 20 GB HD (XP SP3), 40 GB HD (Windows 7) The Vulnerabilities Vulnerabilities were primarily selected based upon their severity and prevalence. They include vulnerabilities found in Microsoft Windows Internet Explorer, Mozilla Firefox, Adobe Acrobat, Apple QuickTime and other widely used applications. All of the vulnerabilities selected by NSS had been public for several months (or years). The test set did not contain any zero- day vulnerabilities. Each of the selected vulnerabilities permitted arbitrary code execution. All exploits were validated on vulnerable systems. The following list contains some examples of the vulnerabilities tested (this list is not exhaustive, and is provided only to give an indication of the types of vulnerabilities used in testing): Vulnerabilities CVE CVE CVE Descriptions Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Same ID Property Remote Code Execution Vulnerability." Buffer overflow in Microsoft Excel 2002 SP3, 2003 SP3, and 2007 SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Excel spreadsheet, related to improper validation of record information, aka "Excel Buffer Overrun Vulnerability." Integer overflow in the Array.reduceRight method in Mozilla Firefox before and 4.x through 4.0.1, Thunderbird before , and SeaMonkey through allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object NSS Labs, Inc. All rights reserved. 13
14 CVE CVE CVE CVE CVE CVE CVE CVE Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting. Adobe Flash Player before and 10.x before ; Adobe AIR before ; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June Unspecified vulnerability in the Java Deployment Toolkit component in Oracle Java SE and Java for Business JDK and JRE 6 Update 10 through 19 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. Use- after- free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in the wild in March 2010, aka "Uninitialized Memory Corruption Vulnerability." Stack- based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3, and 7 before allows remote attackers to execute arbitrary code Microsoft Internet Explorer 7 does not properly handle errors during attempted access to deleted objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to CFunctionPointer and the appending of document objects, aka "Uninitialized Memory Corruption Vulnerability." The Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier does not properly enforce context of ZoneInfo objects during deserialization, which allows remote attackers to run untrusted applets and applications in a privileged context, as demonstrated by "deserializing Calendar objects" Use- after- free vulnerability in mshtml.dll in Microsoft Internet Explorer 5.01, 6, and 7 on Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to execute arbitrary code via a crafted XML document containing nested SPAN elements, as exploited in the wild in December Further information about vulnerabilities can be found at a public, government- funded web site established as a clearinghouse for vulnerability information NSS Labs, Inc. All rights reserved. 14
15 Appendix A: Definitions The following definitions and analogies are provided in an effort to provide clarification, as well as to bridge an ongoing communication gap between security vendors and their customers. Arbitrary Malicous Payloads Shell code Virus/Trojan etc. Exploits Java Reader Browser Vulnerability (e.g. CVE ) Vulnerability A perfect lock can only be opened by a key with a specific pattern. If a lock can be opened with a different key then it has a vulnerability. If nobody can actually build the alternate key that will open the lock then the vulnerability cannot be exploited. An example of a software vulnerability is an improperly defined memory usage within a function that enables unauthorized content to be sent to a specific memory location and then executed with privileged rights. Exploit An exploit is a specially crafted code sequence which can trigger or unlock a vulnerability within an application, such as a heap spray, buffer overflow attack, etc. In the context of the above vulnerability example, an exploit is using an incorrect key to unlock the vulnerable lock. When such a key is built exclusively to prove that lock is vulnerable it is called a proof of concept. When such a key is used to criminally exploit systems it is said to be in the wild. Practically speaking, virtually any exploit for which there is a viable proof of concept is being exploited in the wild and poses a threat to consumers, corporations and governments. An exploit can be planted in a compromised website where it silently infects visiting computers, can be embedded in an attachment delivered though , or can be launched from an another computer (remote attack) automatically via software or manually by a hacker. Payload The payload is the content that is delivered once the vulnerable application has been exploited. Payloads can range from inactive political or religious statements to the complete remote control of the affected computer. For automated attacks the payload maybe something as relatively innocuous as adware or as costly as a rootkit combined with a banking or gaming password- stealing trojan. For a manual attack the payload may provide a remote hacker with complete control of the compromised system and access to all information on the system. In a home environment the payload may result in identity theft, or compromise of or social networking accounts. In a business environment, including those allowing BYOD network access, compromise of a workstation may allow an attacker to tunnel deeper into a network NSS Labs, Inc. All rights reserved. 15
16 Contact Information NSS Labs, Inc. 206 Wild Basin Road, Suite 200A Austin, TX (512) This and other related documents available at: To receive a licensed copy or report misuse, please contact NSS at +1 (512) or [email protected] NSS Labs, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the authors. Please note that access to or use of this report is conditioned on the following: 1. The information in this report is subject to change by NSS without notice. 2. The information in this report is believed by NSS to be accurate and reliable at the time of publication, but is not guaranteed. All use of and reliance on this report are at the reader s sole risk. NSS is not liable or responsible for any damages, losses, or expenses arising from any error or omission in this report. 3. NO WARRANTIES, EXPRESS OR IMPLIED ARE GIVEN BY NSS. ALL IMPLIED WARRANTIES, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON- INFRINGEMENT ARE DISCLAIMED AND EXCLUDED BY NSS. IN NO EVENT SHALL NSS BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL OR INDIRECT DAMAGES, OR FOR ANY LOSS OF PROFIT, REVENUE, DATA, COMPUTER PROGRAMS, OR OTHER ASSETS, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 4. This report does not constitute an endorsement, recommendation, or guarantee of any of the products (hardware or software) tested or the hardware and software used in testing the products. The testing does not guarantee that there are no errors or defects in the products or that the products will meet the reader s expectations, requirements, needs, or specifications, or that they will operate without interruption. 5. This report does not imply any endorsement, sponsorship, affiliation, or verification by or with any organizations mentioned in this report. 6. All trademarks, service marks, and trade names used in this report are the trademarks, service marks, and trade names of their respective owners NSS Labs, Inc. All rights reserved. 16
CORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,
Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?
ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
DATA CENTER IPS COMPARATIVE ANALYSIS
DATA CENTER IPS COMPARATIVE ANALYSIS Security 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Data Center Overview
TEST METHODOLOGY. Endpoint Protection Evasion and Exploit. v4.0
TEST METHODOLOGY Endpoint Protection Evasion and Exploit v4.0 Table of Contents 1 Introduction... 3 1.1 Inclusion Criteria... 3 2 Product Guidance... 5 2.1 Recommended... 5 2.2 Neutral... 5 2.3 Caution...
ENTERPRISE EPP COMPARATIVE REPORT
ENTERPRISE EPP COMPARATIVE REPORT Security Stack: Socially Engineered Malware Authors Bhaarath Venkateswaran, Randy Abrams, Thomas Skybakmoen Tested Products Bitdefender Endpoint Security v5.3.15.539 ESET
Evolutions in Browser Security
ANALYST BRIEF Evolutions in Browser Security TRENDS IN BROWSER SECURITY PERFORMANCE Author Randy Abrams Overview This analyst brief aggregates results from NSS Labs tests conducted between 2009 and 2013
SSL Performance Problems
ANALYST BRIEF SSL Performance Problems SIGNIFICANT SSL PERFORMANCE LOSS LEAVES MUCH ROOM FOR IMPROVEMENT Author John W. Pirc Overview In early 2013, NSS Labs released the results of its Next Generation
Breach Found. Did It Hurt?
ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many
An Old Dog Had Better Learn Some New Tricks
ANALYST BRIEF An Old Dog Had Better Learn Some New Tricks PART 2: ANTIVIRUS EVOLUTION AND TECHNOLOGY ADOPTION Author Randy Abrams Overview Endpoint protection (EPP) products are ineffective against many
Internet Advertising: Is Your Browser Putting You at Risk?
ANALYST BRIEF Is Your Browser Putting You at Risk? PART 2: CLICK FRAUD Authors Francisco Artes, Stefan Frei, Ken Baylor, Jayendra Pathak, Bob Walder Overview The US online advertising market in 2011 was
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
BROWSER SECURITY COMPARATIVE ANALYSIS
BROWSER SECURITY COMPARATIVE ANALYSIS Privacy Settings 2013 Randy Abrams, Jayendra Pathak Tested Vendors Apple, Google, Microsoft, Mozilla Overview Privacy is an issue on the front lines of the browser
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
IBM Protocol Analysis Module
IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community A Sampling of Cyber Security Solutions Designed for the
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
How to Protect against the Threat of Spearphishing Attacks
ANALYST BRIEF How to Protect against the Threat of Spearphishing Attacks Author Randy Abrams Overview NSS Labs researchers have identified spearphishing as the most common targeted method sophisticated
MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director
MALWARE THREATS AND TRENDS Chris Blow, Director Dustin Hutchison, Director WHAT IS MALWARE? Malicious Software Viruses Worms Trojans Rootkits Spyware Ransomware 2 MALWARE ORIGINS Users bring it from home
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Sophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0
Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
IBM Endpoint Manager for Core Protection
IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
PROACTIVE PROTECTION MADE EASY
PROACTIVE PROTECTION AUTHOR: ANDREW NIKISHIN KASPERSKY LAB Heuristic Analyzer Policy-Based Security Intrusion Prevention System (IPS) Protection against Buffer Overruns Behaviour Blockers Different Approaches
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Tracking Anti-Malware Protection 2015
Tracking Anti-Malware Protection 2015 A TIME-TO-PROTECT ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to measure
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
Cyber Security Solutions:
ThisIsCable for Business Report Series Cyber Security Solutions: A Sampling of Cyber Security Solutions Designed for the Small Business Community Comparison Report Produced by BizTechReports.com Editorial
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Getting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
Accelerate Patching. the Enterprise. Wolfgang Kandek Qualys, Inc. Session ID: STAR-301 Session Classification: Intermediate
Accelerate Patching Progress Title of in Presentation the Enterprise the Enterprise Wolfgang Kandek Qualys, Inc. Session ID: STAR-301 Session Classification: Intermediate Insert presenter logo here on
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide
Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition Getting Started Guide The software described in this book is furnished
Symantec Endpoint Protection Getting Started Guide
Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS
NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS Security Author Thomas Skybakmoen Tested Products Barracuda F800b Check Point 13500 Cisco ASA 5525-X Cisco ASA 5585-X SSP60 Cisco FirePOWER 8350 Cyberoam CR2500iNG-XP
Endpoint Business Products Testing Report. Performed by AV-Test GmbH
Business Products Testing Report Performed by AV-Test GmbH January 2011 1 Business Products Testing Report - Performed by AV-Test GmbH Executive Summary Overview During November 2010, AV-Test performed
DATA CENTER IPS COMPARATIVE ANALYSIS
DATA CENTER IPS COMPARATIVE ANALYSIS Security Value Map (SVM) 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview
Security Industry Market Share Analysis
Security Industry Market Share Analysis December Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This report includes both worldwide
Why The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
Sage HRMS 2014 Sage Employee Self Service
Sage HRMS 2014 Sage Employee Self Service Pre-Installation Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All rights
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Kaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions
The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
Real World and Vulnerability Protection, Performance and Remediation Report
Real World and Vulnerability Protection, Performance and Remediation Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: September 17 th, 2014, last update:
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices
350 PIERS Proceedings, Cambridge, USA, July 5 8, 2010 Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices Dung Vu Pham 1, Malka N. Halgamuge 2, Ali Syed 1, and Priyan
How To Sell Security Products To A Network Security Company
Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that
The Importance of Patching Non-Microsoft Applications
The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
Background. How much does EMET cost? What is the license fee? EMET is freely available from Microsoft without material cost.
Microsoft s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director [email protected]
The Fundamental Failures of End-Point Security Stefan Frei Research Analyst Director [email protected] Agenda The Changing Threat Environment Malware Tools & Services Why Cybercriminals Need No 0-Days
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Security Industry Market Share Analysis
Security Industry Market Share Analysis September 2011 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes
Accelerate Patching Progress in the Enterprise. Wolfgang Kandek CTO Qualys, Inc.
Accelerate Patching Progress in the Enterprise Wolfgang Kandek CTO Qualys, Inc. Introduction Patch Management Patch Progress Data Common Steps Case Studies Actions Summary References Q&A 2 Patch Management
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Desktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Agnitum SMB Solutions. Outpost Network Security Version 3.2 Securing your network
Agnitum SMB Solutions Outpost Network Security Version 3.2 Securing your network November 2011 Contents Outpost Network Security 3.2 1. IT threats landscape 2. Solution at a glance 3. Key benefits 4. Why
White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks
White Paper Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks White Paper Executive Summary Around the world, organizations are investing massive amounts of their budgets
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
How To Test For Performance On A 64 Bit Computer (64 Bit)
Anti-Virus Comparative Performance Test Impact of Security Software on System Performance Language: English May 2015 Last Revision: 30 th June 2015 Table of Contents 1. Introduction 3 2. Tested products
Desktop Security. Overview and Technology Guidance. Michael Ramsey Network Specialist, NC DPI
Desktop Security Overview and Technology Guidance Michael Ramsey Network Specialist, NC DPI Desktop Security Best practices for both the technical type and the typical user Defensive Layering Top Vulnerabilities
Intrusion Defense Firewall
Intrusion Defense Firewall Available as a Plug-In for OfficeScan 8 Network-Level HIPS at the Endpoint A Trend Micro White Paper October 2008 I. EXECUTIVE SUMMARY Mobile computers that connect directly
Advanced Persistent Threats
White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which
Seven for 7: Best practices for implementing Windows 7
Seven for 7: Best practices for implementing Windows 7 The early reports are in, and it s clear that Microsoft s Windows 7 is off to a fast start thanks in part to Microsoft s liberal Windows 7 beta program
11.0. Symantec Endpoint Protection 11.0 Reviewer s Guide
TECHNOLOGY BRIEF: ENDPOINT Symantec PROTECTION endpoint protection 11.0 11.0 Symantec Endpoint Protection 11.0 Reviewer s Guide Technology Brief: Symantec Endpoint Protection Symantec Endpoint Protection
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
