Online Banking and Endpoint Security Report October 2012
|
|
|
- Joanna Douglas
- 9 years ago
- Views:
Transcription
1 Online Banking and Endpoint Security Report October
2 Contents: Introduction 3 The Purpose of this Report 3 Security Applications Tested 5 Methodology Used in the Test 5 Test Results 7 Analysis of the Results 8 Conclusions 8 2
3 Introduction: This is the fourth Online Banking Browser Security report we have published. These reports have all had the same core purpose, this being to assess the efficacy of range of products against a man in the browser (MitB) attack, as used by real financial malware. The stimulus for publishing these reports stems from the evidence we gain from our private research which suggests that most endpoint security solutions offer minimal to no protection against early life financial malware. In previous reports we have included graphs from Zeustracker i, like the one below, to illustrate the poor detection of Zeus. Our research has shown that detection of Zeus can be much lower and for binaries aged from zero to twelve hours varies between 5% to 20% ii, a statistic substantiated by research by our friends at NSS Labs, whose independent testing indicates detection being between 5% and 7%.The variation in detection rate can partly be explained by binary age. The older the binary, by which is meant, the longer it has been in the wild, iii the greater the likelihood is that vendors will have been able to capture it and create signatures to detect it. The Purpose of this Report: Whilst this report centres about the same theme as our previous reports, it differs in that it is designed to illustrate the difference between in the wild threats (ITW) and custom crimeware, which is not ITW. Earlier this year, the BBC broadcast a programme iv we made with them based on our work on browser security and financial malware. The programme featured a test we conducted using one of our financial malware simulators which employed a verified v MitB attack as used by financial malware such as Zeus and SpyEye. We created the simulator to demonstrate the fact that very few security solutions had any dedicated protection against this type of attack and that relying on behavioural or blacklisting technology vi was ineffective against new threats. The test used in the programme was representative of a targeted attack using custom crimeware, exactly the same kind of attack a well-funded, technically sophisticated criminal group could use against an individual or corporation. To illustrate the difference between an attack using ITW crimeware and a custom engineered tool intended for a focused, targeted breach, we used three simulated attacks. The first, which represents an ITW tool is conducted using a variant vii of the simulator we created for the BBC. As part of the BBCs policy, it offered the simulator to all the vendors featured in the programme, thus allowing them to analyse it. In addition to this, MRG Effitas anonymously submitted a further six variants to all the vendors over a six month period. viii 3
4 The BBC simulator uses a MitB attack to capture user credentials entered in to SSL protected sites such as PayPal, facebook and most banking sites. Once captured, the data is sent in real-time to an external URL where it can be viewed. The second and third attacks are performed using custom crimeware tools ix created by our engineering team. Each of these tools, like the BBC simulator, employs a unique x MitB attack to capture user credentials entered in to SSL protected sites. These tools are designed to be installed on to systems locally via USB xi like Stuxnet, and store data captured from the browser on the local system, which can be retrieved by the attacker at a later date. These simulators were not exposed to any antimalware products during their development or testing and so were not ITW. As the variants of the BBC simulator were submitted to vendors over a long period of time, we felt there would be a reasonable chance they would detect it in the test. This simulator is designed to be detectable after exposure as it contains unencrypted code which is clearly suspicious and performs highly malicious actions. The second and third simulators were designed to be more stealthy and since they were effectively zero hour, we anticipated that most traditional endpoint protection technologies would not alert or block them. MRG Effitas has conducted in-depth testing and research in to targeted attacks, looking at evidence from real world accounts such as Stuxnet and the private work conducted by our team. It is our position that any endpoint can be compromised and that for the technically proficient attacker, this can go undetected for months. xiixiii Given the fact that it is possible to get malicious code to execute undetected on most protected endpoints, we believe a new set of testing metrics is needed to assess product efficacy in a way that maps meaningfully to real world scenarios. Simple detection tests, weather static or dynamic are not enough. The metrics we suggest will serve us best in the future are as follows: 1. Time taken to detect malware or attack (How long does it take a solution to detect malware or an attack) 2. Time to remediate (How long does it take to remediate in cases where it is possible) 3. Determination of breach (Measure if a data breach has occurred as the execution of malware on a system does not necessarily mean it has been able to effect a data breach) 4. Assessment of breach (Determine what was breached, for how long and possible assessment of impact) In 2013, MRG Effitas will be conducting a number of on-going public projects based on the above, starting with a Time to Detect project which will run alongside our Flash Tests. For the purposes of this report, our primary concern is metric 3, determination of breach. We measure if the simulators are blocked from being executed, either by detection, hips (which may or may not involve a user input request) but our main focus is on measuring if the simulators are prevented from performing the data breach and the simulators allow us to do this. 4
5 Security Applications Tested: Endpoint Financial Fraud Prevention and Anti-Keylogging Applications: Aplin Software Neo's SafeKeys 3 Comitari Technologies Web Protector Global Information Technology PrivacyKeyboard Network Intercept Keystroke Interference 2.9 Prevx SafeOnline 3.0 QFX KeyScrambler Quarri Protect On Q 3.0 Sandboxie 3.74 Secure Banking Secure Banking SentryBay DataProtection Suite 5.6 SoftSphere DefenseWall 3.19 xiv StrikeForce Technologies GuardedID 3.01 Threatmetrix TrustDefender Pro Gold Edition 3.0 Trusteer Rapport Trustware BufferZone Pro 4.02 Webroot SecureAnywhere 8.0 Zemana AntiLogger 1.9 Anti Malware and Internet Security Applications: avast! Internet Security 7.0 Avira Internet Security 2013 BullGuard Internet Security 2013 Comodo Internet Security Pro 2012 Emsisoft Anti-Malware 7.0 ESET Smart Security 5.2 F-Secure Internet Security 2013 GFI Vipre Internet Security 2013 Ikarus Virus Utilities 2.2 Immunet Protect Plus 3.1 Kaspersky Internet Security 2013 McAfee Internet Security 2012 Microsoft Security Essentials 4.1 Norton Internet Security 2013 Trend Micro Titanium Internet Security 2013 Methodology Used in the Test: 1. Windows 7 Ultimate Service Pack 1 64 bit operating system is installed on a virtual machine and all updates are applied. 2. An image of the operating system is created. 3. A clone of the imaged systems is made for each of the 32 security applications to be used in the test. 4. An individual security application is installed using default settings on each of the systems created in 4 and then, where applicable, is updated. 5. A clone of the system as it is at the end of 4 is created. 6. The BBC Simulator test is conducted by: 5
6 a. Downloading the simulator using Internet Explorer to the desktop, closing Internet Explorer and then executing the simulator. b. Starting a new instance of Internet Explorer and navigating to xv c. Text is entered into the Account login page of using the keyboard, or using a virtual keyboard if the application under test provides such functionality and then the log in button is pressed. 7. The test using simulators 2 and 3 is conducted by: a. Performing steps 1-6 above with the exception of 6a, but infecting the system with the simulator via a USB flash drive. 8. A test is deemed to have been passed by the following criteria: a. The security application detects the simulator whilst it is being downloaded to the desktop, when the USB drive is inserted or when copied to the desktop. b. The security application detects the simulator when it is executed according to the following criteria: i. It identifies the simulator as being malicious and either automatically blocks it or postpones its execution and warns the user that the file is malicious and awaits user input. ii. It identifies the simulator as suspicious or unknown and gives the option to run in a sandbox or safe restricted mode and when run in this mode it meets the criteria c or d below. c. The security application prevents the simulator from capturing and sending the logon data to the MRG results page or local store location, whilst giving no alerts or informational alerts only. d. The security application intercepts the installation/action of the simulator and displays warnings and user action input requests that are clearly different to those displayed in response to legitimate applications, when they are executed or installed on that system. 9. A test is deemed to have been failed by the following criteria: a. The security application fails to detect the simulator when it is executed and then: i. The security application fails to prevent the simulator from capturing and sending the logon data to the MRG results page or local store location and gives no, or informational alerts only. ii. The security application intercepts the installation/action of the simulator but displays warnings and user action input requests that are indistinguishable in meaning from those displayed in response to legitimate applications, when they are executed or installed on that system. b. The security application identifies the simulator as suspicious or unknown and gives the option to run in a sandbox or safe restricted mode and when run in this mode it: i. Fails to prevent the simulator from capturing and sending the logon data to the MRG results page or local store and gives no, or informational alerts only. ii. Displays warnings and user action input requests that are indistinguishable in meaning from those displayed in response to legitimate applications, when they are executed or installed on that system. 10. Testing is conducted with all systems having internet access. 11. Each individual test for each security application is conducted from a unique IP address. 12. All security applications are fully functional unregistered versions or versions registered anonymously, with no connection to MRG Effitas. 13. All testing was conducted on the 28 th of October
7 Test Results: The table below shows the results for the Endpoint Financial Fraud Prevention and Anti-Keylogging Applications The table below shows the results for the Anti Malware and Internet Security Applications. BBC Sim Sim 2 Sim 3 Overall Application Name Aplin Software Neo's SafeKeys F F F Comitari Technologies Web Protector F P F Global Information Technology PrivacyKeyboard F F F Network Intercept Keystroke Interference F F F Prevx SafeOnline F F F QFX KeyScrambler F F F Quarri Protect On Q P P P Sandboxie F P P Secure Banking Secure Banking F F F SentryBay DataProtection Suite F F F SoftSphere DefenseWall P P P StrikeForce Technologies GuardedID F F F Threatmetrix TrustDefender Pro Gold Edition F F F Trusteer Rapport P P P Trustware BufferZone Pro F P P Webroot SecureAnywhere P F F Zemana AntiLogger P U U BBC Sim Sim 2 Sim 3 Overall Application Name avast! Internet Security P P P Avira Internet Security D F F BullGuard Internet Security D F F Comodo Internet Security Pro D D U Emsisoft Anti-Malware D D D ESET Smart Security F F F F-Secure Internet Security F F F GFI Vipre Internet Security 2013 D F F Ikarus Virus Utilities D F F Immunet Protect D F F Kaspersky Internet Security 2013 P P P McAfee Internet Security D F F Microsoft Security Essentials F F F Norton Internet Security D F F Trend Micro Titanium Internet Security D F F 7
8 P D U F The application prevented the active simulator from capturing data The application detected and automatically blocked the execution of the simulator The application detected and intercepted the execution of the simulator and presented a user input request with guidance that the simulator was attempting to perform a potentially malicious action The application did not detect the simulator or prevent it from capturing data Analysis of the Results: As mentioned at the start of this report, based on the evidence and data we have seen on targeted attacks, we expected the vast majority of applications to fail and the testing vindicates this. We were surprised to see how badly the dedicated Endpoint Financial Fraud Prevention and Anti-Keylogging Applications performed, with only Quarri Protect On Q, SoftSphere DefenseWall, Trusteer Rapport and Zemana Antilogger fully protecting the system. We were pleased to see that both Avast and Kaspersky have chosen to implement a secure browser functionality and that these proved effective against the MitB attacks. Congratulations to Comodo Internet Security Pro and Emsisoft Anti-Malware for their excellent performance which was as a result of good detection and layered protection. Conclusions: We expected most applications in these tests to fail and it should be noted that many of those that did are just one element of protection provided by those vendors and We acknowledge that many vendors do have other product and technologies that would help detect these sorts of attacks in the real world and this is what our work in 2013 will be focusing on. We hope our tests in 2013 will assess in a meaningful way, the efficacy of a range of security technologies and help both the consumers and the vendors themselves. i Reproduced with permission. See ii Based on testing conducted over a three month period iii The actual age as measured from when a binary is crated is largely irrelevant. For the purpose of testing and research, age is measuring the time binaries are in the wild iv See v The simulator and all testing was independently monitored and verified by S21sec vi Blacklisting encompasses malicious URL lists and binary signatures vii MRG Effitas does not weaponise its simulators, they rely on manual morphing, instigated by our engineering team. viii This included vendors in this report which were not included in the BBC programme, but only those whose applications have the ability to detect malware or have telemetry functionality which would allow them to capture or submit unknown or suspicious code ix All simulators are designed to be neutral. None are designed to bypass any specific vendor or product x Whilst all three simulators use a MitB attack, each attack is unique and makes use of different mechanisms xi Although they are effective when installed via any vector xii We have conducted tests which involve compromising ten different systems with a malicious simulator. These systems were tested daily for a period of twelve months and none of them detected or blocked the malicious activity. xiii It is also the position of the EU that all banks in the region should assume their customers PCs are compromised by financial malware xiv This application operates on 32 bit OS only and was therefore tested on Windows 7 32 xv Where the security application offers a secured or dedicated banking browser, this is used 8
MRG Effitas Online Banking / Browser Security Assessment Project Q2 2013 Results
MRG Effitas Online Banking / Browser Security Assessment Project Q2 2013 Results 1 Contents: Introduction 3 The Purpose of this Project 3 Tests employed 3 Security Applications Tested 4 Methodology Used
Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?
ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security
Online Payments Threats
July 3, 2012 Introduction...2 Tested Products...2 Used Configuration...3 Real Malware Inspiration...3 Total Scores Chart...4 Conclusion...4 About matousec.com...4 Detailed Descriptions of Tests...5 Detailed
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Fully supported Antivirus software (Managed Antivirus)
You are here: Antivirus > Managed Antivirus Vendors Fully supported Antivirus software (Managed Antivirus) Antivirus (AV) vendors often release software updates. We hard-code the update into our RMM agent
26 Protection Programs Undergo Our First Test Using Windows 8
Test: Internet Security Packages 1/2013 26 Protection Programs Undergo Our First Test Using Windows 8 Windows 8 is considered to be a secure system thanks to its internal protection package containing
Anti-Virus Protection and Performance
Anti-Virus Protection and Performance ANNUAL REPORT 2015 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com CONTENTS Annual Report 2015... 1 Contents... 2 Introduction...
PCSL. PCSL IT Consulting Institute 机 安 全 软 件 病 毒 检 测 率 测 试
2014 IT Consulting Institute ⓫ 手 机 安 全 软 件 病 毒 检 测 率 测 试 报 告 目 录 Table of Contents P1 P2 P3 测 试 背 景 测 试 流 程 待 测 软 件 P4 P6 P7 测 试 结 果 月 度 奖 项 相 关 信 息 P8 权 利 说 明 P9 免 责 声 明 CHAP. 1 Background 1 CHAP. 2 Test
Supported Anti Virus from ESAP 2-6-1
Supported Anti Virus from ESAP 2-6-1 avast! Antivirus (4.8.x) avast! Antivirus (4.x) avast! Antivirus (managed) (4.x) avast! Antivirus Professional (4.8.x) avast! Antivirus Professional (4.x) avast! Business
Anti-Virus Comparative
Anti-Virus Comparative File Detection Test of Malicious Software including false alarm test Language: English September 2015 Last Revision: 15 th October 2015 Table of Contents Tested Products 3 Introduction
Securing Your Business s Bank Account
Commercial Banking Customers Securing Your Business s Bank Account Trusteer Rapport Resource Guide For Business Banking January 2014 Table of Contents 1. Introduction 3 Who is Trusteer? 3 2. What is Trusteer
Enterprise Anti-Virus Protection
Enterprise Anti-Virus Protection JAN - MAR 2015 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware products
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Anti-Virus Comparative
Anti-Virus Comparative File Detection Test of Malicious Software including false alarm test Language: English March 2015 Last Revision: 30 th April 2015 Table of Contents Tested Products 3 Introduction
Tracking Anti-Malware Protection 2015
Tracking Anti-Malware Protection 2015 A TIME-TO-PROTECT ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to measure
Global Antivirus Software Package Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3498718/ Global Antivirus Software Package Market 2015-2019 Description: About antivirus software package An antivirus scans the
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com 2 Fraud Prevention for Endpoints KASPERSKY FRAUD PREVENTION 1. Ways of Attacking The prime motive behind cybercrime is making money, and today
Trend Micro Endpoint Comparative Report Performed by AV Test.org
Trend Micro Endpoint Comparative Report Performed by AV Test.org Results from December 2009 Executive Summary In December of 2009, AV Test.org performed endpoint security benchmark testing on five market
Five Trends to Track in E-Commerce Fraud
Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other
Security Industry Market Share Analysis
Security Industry Market Share Analysis September 2011 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes
KASPERSKY ENDPOINT SECURITY FOR BUSINESS: TECHNOLOGY IN ACTION
KASPERSKY ENDPOINT SECURITY FOR BUSINESS: TECHNOLOGY IN ACTION For the threats you can see and those you can t kaspersky.com/business #Securebiz CONTENTS Protect your business from the threats you can
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Real World and Vulnerability Protection, Performance and Remediation Report
Real World and Vulnerability Protection, Performance and Remediation Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: September 17 th, 2014, last update:
Transaction Anomaly Protection Stopping Malware At The Door. White Paper
Transaction Anomaly Protection Stopping Malware At The Door White Paper Table of Contents Overview 3 Programmable Crime Logic Alter Web Application Flow & Content 3 Programmable Crime Logic Defeats Server-Side
Firewall Test. Firewall protection in public networks. Commissioned by CHIP. Language: English. Last Revision: 11 th April 2014
Firewall Test Firewall protection in public networks Commissioned by CHIP Language: English Last Revision: 11 th April 2014 www.av-comparatives.org Commissioned by - 1 - Contents Firewall protection in
Nessus and Antivirus. January 31, 2014 (Revision 4)
Nessus and Antivirus January 31, 2014 (Revision 4) Table of Contents Introduction... 3 Standards and Conventions... 3 Overview... 3 A Note on SCAP Audits... 4 Microsoft Windows Defender... 4 Kaspersky
Home Anti-Virus Protection
Home Anti-Virus Protection APRIL - JUNE 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security companies.
CORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,
Security Bank of California Internet Banking Security Awareness
Security Bank of California Internet Banking Security Awareness INTRODUCTION Fraudsters are using increasingly sophisticated and malicious techniques to thwart existing authentication controls and gain
Proactive Rootkit Protection Comparison Test
Proactive Rootkit Protection Comparison Test A test commissioned by McAfee and performed by AV-TEST GmbH Date of the report: February 2 th, 213 Executive Summary In January 213, AV-TEST performed a comparative
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
Performance test November 2014 / www.avlab.pl 1 INTRODUCTION... 1 TESTED PROGRAM VERSIONS..2 WHAT AND HOW WE TESTED. 3 OTHER PRINCIPLES...
PE RF ORMANCET E S TOFF RE E ANT I VI RUSS OF T WARE ANDI NT E RNE TS E CURI T YS UI T E S NOVE MBE R14 Per f or medt estdat e: Oct ober-november14 Performance test November 14 / www.avlab.pl 1 INTRODUCTION...
Kaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test
Kaspersky Security for Virtualization 1.1 and Deep Security 8.0 virtual environment detection rate and performance testing by AV-Test Kaspersky Security for Virtualization, Kaspersky Lab s corporate security
Enterprise Anti-Virus Protection
Enterprise Anti-Virus JULY - SEPTEMBER 2013 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware products
Enterprise Anti-Virus Protection
Enterprise Anti-Virus APRIL - JUNE 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security companies.
Henry Ford Health System Remote Access Support Details
Henry Ford Health System Remote Access Support Details Last Updated: March 5 th, 2014 Access Disclaimer: This document assumes that you already have an ID to access the Henry Ford Health System (HFHS)
Security Evaluation CLX.Sentinel
Security Evaluation CLX.Sentinel October 15th, 2009 Walter Sprenger [email protected] Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41
Trusteer Rapport. User Guide. Version 3.5.1307 April 2014
Trusteer Rapport User Guide Version 3.5.1307 April 2014 Contents About this Guide 1 Need More Information about Trusteer Rapport? 1 Sending us Feedback 1 1. What is Trusteer Rapport? 3 Antivirus: A False
Enterprise Anti-Virus Protection
Enterprise Anti-Virus Protection APRIL - JUNE 2014 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware
ESAP 2.7.4 Release Notes
ESAP 2.7.4 Release Notes SDK Version: Mac and Windows 3.6.9845.2 (V2 Unified + V3). Note: The SDK embedded in this ESAP version has been tested and qualified to interoperate with a limited list of end
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
How To Test For Performance On A 64 Bit Computer (64 Bit)
Anti-Virus Comparative Performance Test Impact of Security Software on System Performance Language: English May 2015 Last Revision: 30 th June 2015 Table of Contents 1. Introduction 3 2. Tested products
Electronic Fraud Awareness Advisory
Electronic Fraud Awareness Advisory Indiana Bankers Association Fraud Awareness Task Force February, 2012 Electronic Fraud Awareness Advisory Purpose/Summary The Indiana Bankers Association (IBA) was involved
Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath
ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
Small Business Anti-Virus Protection
Small Business Anti-Virus Protection OCT - DEC 2014 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware
ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper
ADVANCED THREATS IN THE ENTERPRISE Finding an Evil in the Haystack with RSA ECAT White Paper With thousands of workstations and servers under management, most enterprises have no way to effectively make
AV-TEST Examines 22 Antivirus Apps for Android Smartphones and Tablets
Protection Apps for Android Feb. 2013 AV-TEST Examines 22 Antivirus Apps for Android Smartphones and Tablets Millions of Android smartphones are currently accessing the Internet without any protection.
WHITE PAPER SPON. The Cloud Advantage: Increased Security and Lower Costs for SMBs. Published August 2012 SPONSORED BY
WHITE PAPER N Increased Security and Lower Costs for SMBs An Osterman Research White Paper Published August 2012 sponsored by SPONSORED BY! SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black
How To Test For Security Protection
False Sense of Security: New Anti-Virus Testing Methodologies are Critical to Educate Customers Charlotte Dunlap Independent Security Analyst Charlotte Dunlap is an independent security analyst and regular
User Guide for the Identity Shield
User Guide for the Identity Shield Copyright Webroot SecureAnywhere User Guide for the Identity Shield January, 2013 2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and
Security Industry Market Share Analysis
Security Industry Market Share Analysis December Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This report includes both worldwide
Small Business Anti-Virus Protection
Small Business Anti-Virus Protection JULY - SEPTEMBER 2013 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware
Small Business Anti-Virus Protection
Small Business Anti-Virus Protection JANUARY - MARCH 2014 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2
FAQ WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 WHAT IS UPTIME AND SPEED MONITORING 2 WHEN I TRY TO SELECT A SERVICE FROM
Security Analytics The Beginning of the End(Point)
Security Analytics The Beginning of the End(Point) Arie Joosse [email protected] It s 10am, what do you know about your endpoints? What applications are running? New ones that you didn t deploy
VESZPROG ANTI-MALWARE TEST BATTERY
VESZPROG ANTI-MALWARE TEST BATTERY 2012 The number of threats increased in large measure in the last few years. A set of unique anti-malware testing procedures have been developed under the aegis of CheckVir
Client Manager for Endpoint Protection (CMEP) User s Guide
Client Manager for Endpoint Protection (CMEP) July, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product
Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
User Manual. HitmanPro.Kickstart User Manual Page 1
User Manual HitmanPro.Kickstart User Manual Page 1 Table of Contents 1 Introduction to HitmanPro.Kickstart... 3 2 What is ransomware?... 4 3 Why do I need HitmanPro.Kickstart?... 6 4 Creating a HitmanPro.Kickstart
Endpoint Security and the Case For Automated Sandboxing
WHITE PAPER Endpoint Security and the Case For Automated Sandboxing https://enterprise.comodo.com A World of Constant Threat We live in a world of constant threat. Hackers around the globe work every hour
Keystroke Encryption Technology Explained
Keystroke Encryption Technology Explained Updated February 9, 2008 [email protected] (800) 650-3670 www.bluegemsecurity.com Executive Summary BlueGem Security is introducing keystroke encryption
