Proactive Rootkit Protection Comparison Test
|
|
|
- Bathsheba Williamson
- 10 years ago
- Views:
Transcription
1 Proactive Rootkit Protection Comparison Test A test commissioned by McAfee and performed by AV-TEST GmbH Date of the report: February 2 th, 213 Executive Summary In January 213, AV-TEST performed a comparative review of McAfee Deep Defender, Microsoft System Center Endpoint Protection and Symantec Endpoint Protection to determine their capabilities to pro-actively protect against kernel-mode and MBR rootkits, so called day zero attacks. Two individual tests have been performed. The first was a test that used frozen updates (from October 1 st 212) to perform the test against 48 rootkits that were discovered after that date. The second test was done with disabled on-access components, so that only behavioral detection was in place against 48 rootkits as well. To perform the test runs, a clean Windows 7 image was used on several identical PCs. On this image, the security software was installed. Access to the cloud was disabled for all products, in order to prevent any static detection and test the protection against new, unknown threats for which there is no signature. The rootkits have then been executed and any detections from the security product were noted. In Test 2, not only the detection but also the protection/remediation has been tested. If a disinfection/blocking routine was started, then this was executed as part of the test as well. Finally the resulting system state has been captured to determine whether the rootkit was successfully blocked. While retrospective tests are not always considered a wholly accurate form of testing, they do nonetheless provide a simulation of zero day proactive protection and are much simpler to run in a controlled manner than attempting to discover and test zero day threats (especially rootkits) as they are delivered into the wild. As such, this style of test can provide a useful baseline for information purposes. The result of this test shows, that the pro-active approach of McAfee Deep Defender is capable of providing a very good level of protection against kernel-mode and MBR rootkits. It detected and successfully blocked all 48 tested rootkits in the test. None of the other products was able to match this result. See details of the test results in the table below. (Test 1) (Test 2) Remediated rootkits (Test 2) Reference McAfee Deep Defender Microsoft System Center Endpoint Protection Not tested Not tested 18 Symantec Endpoint Protection 1
2 Overview With the increasing number of threats that is being released and spreading through the Internet these days, the danger of getting infected is increasing as well. A few years back there were new viruses released every few days. This has grown to several thousand new threats per hour. Total number of unique samples included in AV-TEST's malware repository (2-213) 12,, 1,, 8,, 6,, 4,, 2,, * 213* Figure 1: New samples added per year In early 213 the AV-TEST collection of malware exceeded 1.. unique samples and the growth rates are getting worse and worse. In the year 2, AV-TEST received more than 17, new samples, and in 21 and 211, the number of new samples grew to nearly 2,, samples each. The numbers continue to grow with about 3 million new files in 212 alone. These growth rates clearly show the need for pro-active protection measures, as static protection is not good enough to protect against all threats. This is especially important for rootkits, since it becomes a lot harder to detect them once they are successfully installed on the system. McAfee Deep Defender is a product that aims to protect here using McAfee DeepSAFE technology operating beyond the operating system, designed to detect, block and remediate advanced stealth attacks. Products Tested The testing occurred in January 213. AV-TEST used the latest releases available at the time of the test of the following products: McAfee Deep Defender Microsoft System Center 212 Endpoint Protection Symantec Endpoint Protection
3 Methodology and Scoring Platform All tests have been performed on identical PCs equipped with the following hardware: Intel i ,4Ghz CPU 16 GB DDR3 16-Ram 48 GB SATA III SSD (Intel) The operating system was Windows 7 Ultimate, SP1 in default settings. Testing methodology General 1. Clean system for each sample. The test systems should be restored to a clean state before being exposed to each malware sample. 2. Physical Machines. The test systems used should be actual physical machines. No Virtual Machines were used. 3. Product Cloud/Internet Connection. Products were not allowed to query to cloud (in order to prevent static detection). 4. Product Configuration. All products were run with their default, out-of-the-box configuration, despite for Test 2 where the on-access detection has been switched off.. Sample Cloud/Internet Accessibility. If the malware uses the cloud/internet connection to reach other sites in order to download other files and infect the system, care should be taken to make sure that the cloud access is available to the malware sample in a safe way such that the testing network is not under the threat of getting infected. 6. Allow time for sample to run. Each sample should be allowed to run on the target system for 1 minutes to exhibit autonomous malicious behavior. This may include initiating connections to systems on the internet, or installing itself to survive a reboot. The procedures below are carried out on all tested programs and all test cases at the same time in order to ensure that all protection programs have the exact same test conditions. If a test case is no longer working or its behavior varies in different protection programs (which can be clearly determined using the Sunshine analyses), the test case is deleted. This ensures that all products were tested in the exact same test scenarios. All test cases are solely obtained from internal AV-TEST sources and are always fully analyzed by AV-TEST. We never resort to using test cases or analyses provided by manufacturers or other external sources. Test 1 1. The products are installed and signatures are dated back to October 1 st 212. Products are started up using standard/default settings. 2. AV-TEST attempts to execute the rootkit with Administrator rights 3. If execution is blocked, this is documented 4. If execution is not blocked, the system will be rebooted. If further detections occur this will be documented 6. If no detection occurred it is verified that the rootkit successfully infected the system 3
4 Test 2 1. The products are installed and updated. Products are started with disabled on-access protection. 2. AV-TEST attempts to execute the rootkit with Administrator rights 3. If execution is blocked, this is documented 4. If execution is not blocked, the system will be rebooted. If further detections occur this will be documented 6. If no detection occurred it is verified that the rootkit successfully infected the system 7. If there was a detection it is documented whether the rootkit was successfully disabled/blocked The malware set for both tests consisted of 48 kernel-mode and MBR rootkits collected in the time frame between October 1 st and January 31 st. The 48 rootkits were from 23 different families. 4
5 Test Results The results of the first test (Figure 2) show that McAfee Deep Defender was able to detect all 48 rootkits used in the test, while Microsoft failed to detect 8 out of them and Symantec didn t detect 1. Test 1: Behavioral Protection test with backdated signatures out of 48 1% 4 out of % McAfee Deep Defender Microsoft System Center 212 Endpoint Protection 32 out of % Symantec Endpoint Protection Figure 2: Test 1 Behavioral Protection test with back-dated signatures These results show that the pro-active (non signature dependent) approach of Deep Defender is indeed capable of providing a very good detection level against current high profile rootkits. The results of Microsoft and Symantec also show where these products have their strengths. Microsoft relies a lot on generic signatures (which allow detection of samples from the same family, even without prior knowledge of all specific samples) and is able to detect 4 out of 48 rootkits even if they haven t seen them before thanks to their generic signatures. Symantec on the other hand relies a lot on cloud lookups and reputation. Since this was not allowed during the test, their results are lower than Microsoft s. The detections that occurred were partly because of generic signatures, but heuristic and behavioral detections as well. The results of test 2 show a similar picture. Deep Defender again is able to detect against all 48 rootkits. Symantec managed to detect 2 rootkits. The problem for Symantec is again that they rely a lot on their cloud which was not allowed in this test. So these detections are solely from heuristic/behavioral components. While the cloud adds another layer of security and helps in many cases, it may not be available all the time. Either because there are problems on the vendor side, in the local network or because the malware disables or limits access to the internet. It was not possible to include the Microsoft product in this test, since it is not possible to just disable the on-access guard and leave the behavior guard enabled.
6 Test 2: Behavioral Protection test with no signature based protection out of 48 1% McAfee Deep Defender 2 out of % Symantec Endpoint Protection Figure 3: Test 2 Behavioral Protection test with no signature based protection (Detection) Further to the detection part it was also checked whether the installation of the rootkit was indeed prevented resp. if the detection took place after the installation if the the rootkit was successfully disabled. The results are shown in Figure 4. Test 2: Behavioral Protection test with no signature based protection out of 48 1% McAfee Deep Defender 18 out of % Symantec Endpoint Protection Rootkit disabled Figure 4: Test 2 Behavioral Protection test with no signature based protection (Removal) 6
7 McAfee was able to successfully block/remediate all rootkits that they detected. For McAfee several detections took place during the installation of the rootkit, which is more difficult to deal with, but Deep Defender still managed to block/remediate all tested rootkits. In case of Symantec two detected rootkits were not successfully disabled. This is because the behavioral detection took place during or after installation where the rootkit already has control over the system and this makes it more difficult to deal with the threats. Appendix Version information of the tested software Developer, Distributor Product name Program version McAfee Deep Defender Microsoft Microsoft System Center 212 Endpoint Protection Symantec Symantec Endpoint Protection Copyright 213 by AV-TEST GmbH, Klewitzstr. 7, Magdeburg, Germany Phone +49 () , Fax +49 () , Web 7
Windows 8 Malware Protection Test Report
Windows 8 Malware Protection Test Report A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: January 11 th, 2013, last update: January 11 th, 2013 Executive Summary In
Virtual Desktops Security Test Report
Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January
Real World and Vulnerability Protection, Performance and Remediation Report
Real World and Vulnerability Protection, Performance and Remediation Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: September 17 th, 2014, last update:
Endpoint Business Products Testing Report. Performed by AV-Test GmbH
Business Products Testing Report Performed by AV-Test GmbH January 2011 1 Business Products Testing Report - Performed by AV-Test GmbH Executive Summary Overview During November 2010, AV-Test performed
Zscaler Cloud Web Gateway Test
Zscaler Cloud Web Gateway Test A test commissioned by Zscaler, Inc. and performed by AV-TEST GmbH. Date of the report: April15 th, 2016 Executive Summary In March 2016, AV-TEST performed a review of the
McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012
McAfee Deep Safe Security beyond the OS Kai-Ping Seidenschnur Senior Security Engineer October 16, 2012 Intel/McAfee Initiatives: epo Deep Command and Deep Defender McAfee epo Deep Command Security Management
Trend Micro Endpoint Comparative Report Performed by AV Test.org
Trend Micro Endpoint Comparative Report Performed by AV Test.org Results from December 2009 Executive Summary In December of 2009, AV Test.org performed endpoint security benchmark testing on five market
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
Kaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test
Kaspersky Security for Virtualization 1.1 and Deep Security 8.0 virtual environment detection rate and performance testing by AV-Test Kaspersky Security for Virtualization, Kaspersky Lab s corporate security
CORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,
McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software
McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee
Total Defense Endpoint Premium r12
DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious
Security Consultant Scenario INFO 517-900 Term Project. Brad S. Brady. Drexel University
Security Consultant Scenario INFO 517-900 Term Project Drexel University Author Note This paper was prepared for INFO-517-900 taught by Dr. Scott White. Table of Contents ABSTRACT.1 THE INTERVIEW...2 THE
Symantec Endpoint Protection 12.1.5 Datasheet
Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that
Symantec Endpoint Protection Analyzer Report
Symantec Endpoint Protection Analyzer Report For Symantec Customer Table of Contents Statement of Confidentiality... 3 1. Introduction... 4 2. Environmental Analysis Overview... 5 2.1 Findings Overview...
How To Test For Performance On A 64 Bit Computer (64 Bit)
Anti-Virus Comparative Performance Test Impact of Security Software on System Performance Language: English May 2015 Last Revision: 30 th June 2015 Table of Contents 1. Introduction 3 2. Tested products
AVG File Server. User Manual. Document revision 2015.08 (23.3.2015)
AVG File Server User Manual Document revision 2015.08 (23.3.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents
How To Install Avira Small Business Security Suite (Small Business) On A Microsoft Microsoft Server (Small Bserver) For A Small Business (Small) Computer (Small Server)
Avira Small Business Security Suite HowTo Table of Contents 1. Introduction... 3 2. Product Information... 3 2.1 Operation mode...3 2.2 Scope of services...3 2.3 Optimum protection. Fast updates. Efficient
Avira Small Business Security Suite Avira Endpoint Security. Quick Guide
Avira Small Business Security Suite Avira Endpoint Security Quick Guide Table of Contents 1. Introduction... 3 2. Product Information... 3 2.1 Operation mode...3 2.2 Scope of services...3 2.3 Optimum protection.
Are free Android virus scanners any good?
Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends
Avira Small Business Security Suite. HowTo
Avira Small Business Security Suite HowTo Table of contents 1. Introduction... 3 2. Product Information... 3 2.1 Operation mode... 3 2.2 Scope of services... 3 2.3 Optimum protection. Fast updates. Efficient
SIMATIC. Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Preface 1. Virus scanner administration 2.
Preface 1 Virus scanner administration 2 SIMATIC Configuration 3 Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Commissioning Manual 04/2013 A5E03874574-02 Legal information
Avira Endpoint and Email Security. HowTo
Avira Endpoint and Email Security HowTo Table of contents 1. Introduction... 3 2. Product Information... 3 2.1 Operation mode... 3 2.2 Scope of services... 3 2.3 Optimum protection. Fast updates. Efficient
VESZPROG ANTI-MALWARE TEST BATTERY
VESZPROG ANTI-MALWARE TEST BATTERY 2012 The number of threats increased in large measure in the last few years. A set of unique anti-malware testing procedures have been developed under the aegis of CheckVir
Kaspersky Whitelisting Database Test
Kaspersky Whitelisting Database Test A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: February 14 th, 2013, last update: April 4 th, 2013 Summary During November 2012
First Look Trend Micro Deep Discovery Inspector
First Look Trend Micro Deep Discovery Inspector By looking for correlations in attack patterns, Trend Micro s Deep Discovery Inspector has the ability to protect networks against customised attacks and
ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper
ADVANCED THREATS IN THE ENTERPRISE Finding an Evil in the Haystack with RSA ECAT White Paper With thousands of workstations and servers under management, most enterprises have no way to effectively make
AVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis
Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis Vendors Tested: McAfee Sophos Symantec Trend Micro Executive Summary Indusface was commissioned by Trend Micro Inc.
How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform
How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform McAfee Endpoint Security 10 provides customers with an intelligent, collaborative framework, enabling endpoint defenses to
AVG File Server 2013. User Manual. Document revision 2013.03 (11/13/2012)
AVG File Server 2013 User Manual Document revision 2013.03 (11/13/2012) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com
Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two
Enterprise Anti-Virus Protection
Enterprise Anti-Virus APRIL - JUNE 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security companies.
KASPERSKY ENDPOINT SECURITY FOR BUSINESS: TECHNOLOGY IN ACTION
KASPERSKY ENDPOINT SECURITY FOR BUSINESS: TECHNOLOGY IN ACTION For the threats you can see and those you can t kaspersky.com/business #Securebiz CONTENTS Protect your business from the threats you can
Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System
Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System Dipl.-Inform. Rolf Haas Principal Security Engineer, S+,CISSP
AVG File Server 2012. User Manual. Document revision 2012.03 (8/19/2011)
AVG File Server 2012 User Manual Document revision 2012.03 (8/19/2011) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
How To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook
SEP 12.1 Best Practices in a Virtual Environment The document is intended to capture the complete set of best practices for installation and configuration of SEP in a virtual environment. 1 Table of Contents
McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
Microsoft Forefront Endpoint Protection 2010 Evaluation Guide
Forefront Endpoint Protection 2010, the next version of Forefront Client Security, enables businesses to simplify and improve endpoint protection while greatly reducing infrastructure costs. It builds
Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support [email protected]
Microsoft Software Update Services and Managed Symantec Anti-virus Michael Satut TSS/Crown IT Support [email protected] Introduction The recent increase in virus and worm activity has created the
Performance test November 2014 / www.avlab.pl 1 INTRODUCTION... 1 TESTED PROGRAM VERSIONS..2 WHAT AND HOW WE TESTED. 3 OTHER PRINCIPLES...
PE RF ORMANCET E S TOFF RE E ANT I VI RUSS OF T WARE ANDI NT E RNE TS E CURI T YS UI T E S NOVE MBE R14 Per f or medt estdat e: Oct ober-november14 Performance test November 14 / www.avlab.pl 1 INTRODUCTION...
McAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center
Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center Reviewer s Guide Contents Introduction / Solution Headlines... 3 Getting Started... 4 Deployment... 4 Installation on an Infected
McAfee Endpoint Security 10.0.0 Software
Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without
Information Technology
Information Technology Symantec Endpoint Protection Download and Installation The packages on the web include virus and spyware protection for 32 and 64 bit Microsoft Windows systems. Minimum system requirements:
Microsoft Dynamics NAV 2013 R2 Sizing Guidelines for Multitenant Deployments
Microsoft Dynamics NAV 2013 R2 Sizing Guidelines for Multitenant Deployments February 2014 Contents Microsoft Dynamics NAV 2013 R2 3 Test deployment configurations 3 Test results 5 Microsoft Dynamics NAV
Tracking Anti-Malware Protection 2015
Tracking Anti-Malware Protection 2015 A TIME-TO-PROTECT ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to measure
Symantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
Anti-Virus Comparative
Anti-Virus Comparative Performance Test (Suite Products) Impact of Internet Security Software on System Performance Language: English October 2013 Last Revision: 19 th November 2013 Table of Contents 1.
Symantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
McAfee MOVE AntiVirus (Agentless) 3.6.0
Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
Best Practices for Deploying Behavior Monitoring and Device Control
Best Practices for Deploying Behavior Monitoring and Device Control 1 Contents Overview... 3 Behavior Monitoring Overview... 3 Malware Behavior Blocking... 3 Event Monitoring... 4 Enabling Behavior Monitoring...
Core Protection Module 1.6 for Mac powered by. User s Guide
Core Protection Module 1.6 for Mac July, 2010 Copyright All rights reserved. Copyright 1998-2010 Trend Micro Incorporated. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
Anti-Virus Comparative - Performance Test (AV Products) May 2014
Anti-Virus Comparative Performance Test (AV Products) Impact of Anti-Virus Software on System Performance Language: English May 2014 Last Revision: 10 th June 2014 Table of Contents 1. Introduction 3 2.
Understanding the Total Cost of Ownership for Endpoint Security Solutions. A TCO White Paper
Understanding the Total Cost of Ownership for Endpoint Security Solutions A TCO White Paper Author: Kara Casten Hobson & Company March 2009 Executive Summary Organizations considering moving to an endpoint
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
Anti-Virus Comparative
Anti-Virus Comparative File Detection Test of Malicious Software including false alarm test Language: English September 2015 Last Revision: 15 th October 2015 Table of Contents Tested Products 3 Introduction
Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.
Norton 360 Our ultimate protection, now even more so. Introducing the new Norton 360. Our ultimate Internet and antivirus protection for all you do online Provides proactive protection, so you can do what
Software Asset Management (SWAM) Capability Description
Software Asset Management (SWAM) Capability Description Purpose Provides an organization visibility into the software installed and operating on their network(s) so they can appropriately manage authorized
IBM Endpoint Manager for Core Protection
IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network Data Sheet: Advanced Threat Protection The Problem Today s advanced attacks hide themselves on legitimate websites, leverage new and unknown vulnerabilities,
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
