MRG Effitas Online Banking / Browser Security Assessment Project Q Results
|
|
|
- Tyler Dorsey
- 10 years ago
- Views:
Transcription
1 MRG Effitas Online Banking / Browser Security Assessment Project Q Results 1
2 Contents: Introduction 3 The Purpose of this Project 3 Tests employed 3 Security Applications Tested 4 Methodology Used in the Test 4 Test Results 6 Certifications 7 2
3 Introduction: MRG Effitas has published an Online Banking Browser Security report every year for the last four years. In 2013 and beyond, this single report is replaced by quarterly assessments. This report is the assessment for Q2 2013, with the programme running from start of Q to end of Q Whilst, this report sits in much the same space as our previous annual reports, it is hoped that in being quarterly, we will be able to give more up to date information and assessments against threats that are prevalent during that particular period. The Purpose of this Report: What is at the core of our testing and on-going research is the belief that cybercrime is the most significant threat faced by nation states and the most prevalent crime affecting corporations and individuals. This fact has recently been acknowledged by the governments of all major countries and most are now implementing strategies, policies and allocating resources in order to counter these threats. To put the scale of the problem in perspective, cybercrime is now estimated to have an annual global value of $250 billion and is set to overtake the revenues of all international drug crime which currently has the highest turnover. Another metric we can use is the drastic increase in the volume and diversity of malware found in the wild. MRG Effitas is currently processing over 350,000 unique malicious binaries and up to 500,000 malicious URLs every day and supplying these to our clients and other testing labs in an attempt to protect against them. Aside from supplying zero day threats to clients and labs, our belief is that the most significant way in which we can help in the fight against cybercrime is in the accurate and relevant assessment of product efficacy. MRG Effitas has been working with the IEEE, other testing labs and universities in an attempt to devise a set of testing standards that will allow the accurate and relevant measurement of today s security products and also those that will be released in the next ten years in the new emerging computing model. It is vitally important that protection technologies evolve and improve but how are we to achieve this if we are unable to accurately measure their efficacy against current and emerging threats? Product improvement can t be achieved without the ability to measure real world performance. The purpose of this and our other reports is to be part of that process of measurement for the sake of improvement and efficacy assurance. Tests Employed: Applied metrology is complicated and imprecise science and in the light of this, we position this and all our other work as the best assessments we can currently perform and not as an absolute or definitive determination. In this quarters report, we ran two types of test: Detection and blocking of Zeus. Zeus is still by far and away the most prevalent type of financial malware and is continually evolving to avoid detection and circumvent countermeasures employed by banks and security vendors. Over the Q2 period, we tested a total of 100 Zeus samples, all from live URLs, which were in three main strains that emerged over the period. Prevention of data exfiltration from ssl protected banking sites. Whilst detection is still a valuable metric, in itself it is not enough to determine real world efficacy as there will be instances where a system is compromised 3
4 before a security solution is installed or occasions where malware will bypass a preinstalled product. In these cases we need to be able to measure if active malware is able to perform data exfiltration or not. MRG Effitas has a range of simulators which employ MitB attacks which have been used by financial malware and wider crimeware that we have reverse engineered. i Over the Q2 period, we used our simulators to test the security products in the cohort against four unique MitB attacks. Security Applications Tested: avast! Internet Security 8.0 AVG Internet Security 2013 BitDefender Internet Security 2013 Emsisoft Anti-Malware 8.0 ESET Smart Security 6.0 F-Secure Internet Security 2013 GFI VIPRE Internet Security 2013 Kaspersky Internet Security 2013 McAfee Internet Security 2013 Microsoft Security Essentials 4.2 Panda Internet Security 2013 Quarri Protect on Q 3.2 SoftSphere DefenseWall 3.22 ii SourceFire Immunet Antivirus Plus 3.1 Symantec Norton Internet Security 2013 Threatmetrix TrustDefender Pro Gold Edition Trend Micro Titanium Internet Security 2013 Trusteer Rapport Emerald Build Webroot SecureAnywhere 8.02 Wontok SafeCentral 3.0 Zemana AntiLogger 1.92 Methodology Used in the Test: 1. Windows 7 Ultimate Service Pack 1 64 bit operating system is installed on a virtual machine and all updates are applied and third party applications installed and updated according to our Average Endpoint Specification iii 2. An image of the operating system is created. 3. A clone of the imaged systems is made for each of the security applications to be used in the test. 4. An individual security application is installed using default settings on each of the systems created in 4 and then, where applicable, is updated. 5. A clone of the system as it is at the end of 4 is created. 6. Each Simulator test is conducted by: a. Downloading the simulator using Internet Explorer to the desktop, closing Internet Explorer and then executing the simulator. b. Starting a new instance of Internet Explorer and navigating to iv c. Text is entered into the Account login page of using the keyboard, or using a virtual keyboard if the application under test provides such functionality and then the log in button is pressed. 7. A test is deemed to have been passed by the following criteria: a. The security application detects the simulator whilst it is being downloaded to the desktop. 4
5 b. The security application detects the simulator when it is executed according to the following criteria: i. It identifies the simulator as being malicious and either automatically blocks it or postpones its execution and warns the user that the file is malicious and awaits user input. ii. It identifies the simulator as suspicious or unknown and gives the option to run in a sandbox or safe restricted mode and when run in this mode it meets the criteria c or d below. c. The security application prevents the simulator from capturing and sending the logon data to the MRG results page or local store location, whilst giving no alerts or informational alerts only. d. The security application intercepts the installation/action of the simulator and displays warnings and user action input requests that are clearly different to those displayed in response to legitimate applications, when they are executed or installed on that system. 8. A test is deemed to have been failed by the following criteria: a. The security application fails to detect the simulator when it is executed and then: i. The security application fails to prevent the simulator from capturing and sending the logon data to the MRG results page or local store location and gives no, or informational alerts only. ii. The security application intercepts the installation/action of the simulator but displays warnings and user action input requests that are indistinguishable in meaning from those displayed in response to legitimate applications, when they are executed or installed on that system. b. The security application identifies the simulator as suspicious or unknown and gives the option to run in a sandbox or safe restricted mode and when run in this mode it: i. Fails to prevent the simulator from capturing and sending the logon data to the MRG results page or local store and gives no, or informational alerts only. ii. Displays warnings and user action input requests that are indistinguishable in meaning from those displayed in response to legitimate applications, when they are executed or installed on that system. 9. Each Zeus test is conducted by: a. Downloading the Zeus binary from its native URL using Internet Explorer to the desktop, closing Internet Explorer and then executing the binary 10. A test is deemed to have been passed by the following criteria: a. The security application blocks the URL where the Zeus binary is located. b. The security application detects and blocks the simulator whilst it is being downloaded to the desktop. c. the security application detects the simulator when it is executed according to the following criteria: i. It identifies the simulator as being malicious and either automatically blocks it or postpones its execution and warns the user that the file is malicious and awaits user input. ii. In the case of products that only provide a secure browser, the security application alerts that the system is compromised and will not allow the user to initiate a banking session at the location detailed in 6c above. 11. A test is deemed to have been failed by the following criteria: a. The security application fails to detect or block the binary at any stage in 9a and allows it to be executed. 12. A test result is deemed to be undetermined by the following criteria: a. In the case of products that only provide a secure browser or secure desktop, the security application does not alert that the system is compromised and will allow the user to initiate a banking session at the location detailed in 6c above. v 5
6 13. Testing is conducted with all systems having internet access. 14. Each individual test for each security application is conducted from a unique IP address. 15. All security applications are fully functional unregistered versions or versions registered anonymously, with no connection to MRG Effitas. 16. All testing was conducted during Q Test Results: The table below shows the results of testing using the simulators employing reverse engineered MitB Attacks FMA01 FMA02 FMA03 FMA04 Overall Security Application Avast P P P P AVG P F F F BitDefender P P P P DefenseWall P P P P Emsisoft P P P P ESET F F F F F-Secure F F F F GFI P F F F Kaspersky P P P P McAfee P F F F Microsoft F F F F Panda F F F F Quarri P P P P SourceFire P F F F Symantec P F F P TrendMicro P F F P ThreatMetrix F F F F Trusteer P P P P Webroot P P P P Wontok P P P F Zemana P P P P P F The application prevented the simulator from capturing data The application failed to prevent the simulator from capturing data 6
7 The graph below shows the detection / blocking results for the 100 ITW Zeus samples used Security Application Detection % Avast 100 BitDefender 100 DefenseWall 100 Emsisoft 100 Kaspersky 100 Quarri 100 TrendMicro 100 Trusteer 100 Webroot 100 Zemana 100 F-Secure 98 SourceFire 98 Symantec 98 ESET 96 AVG 93 GFI 92 Panda 91 McAfee 89 Microsoft 74 Note, ThreatMetrix and Wontok are not included in this test as neither offers detection. Certification: In order to be attain the MRG Online Banking Browser Security Certification, a product must pass every test during the quarter. Applications which meet this specification will be given the certification for that quarter. The MRG Effitas Online Banking Browser Security Certification for Q is awarded to the following products: avast! Internet Security 8.0 BitDefender Internet Security 2013 SoftSphere DefenseWall 3.22 Emsisoft Anti-Malware 8.0 Kaspersky Internet Security 2013 Quarri Protect on Q 3.2 Trusteer Rapport Webroot SecureAnywhere 8.02 Zemana AntiLogger 1.92 Certifications for Q will be announced in the second week of Q4 when our second report will be published. 7
8 i It is necessary to use simulators with reverse engineered MitB attacks as testing using real financial malware which rely on ITW C&C servers is unlawful under the Computer Misuse act in the UK as it requires that malicious code is run on a third parties computer without their knowledge or consent. ii DefenseWall was tested on Windows 7 32 bit. iii AES includes Adobe Flash, Reader, Microsoft Office 2007 & Firefox, all fully updated. iv Where the security application offers a secured or dedicated banking browser, this is used v Note, this classification does not represent a failure. 8
Online Banking and Endpoint Security Report October 2012
Online Banking and Endpoint Security Report October 2012 1 Contents: Introduction 3 The Purpose of this Report 3 Security Applications Tested 5 Methodology Used in the Test 5 Test Results 7 Analysis of
Fully supported Antivirus software (Managed Antivirus)
You are here: Antivirus > Managed Antivirus Vendors Fully supported Antivirus software (Managed Antivirus) Antivirus (AV) vendors often release software updates. We hard-code the update into our RMM agent
Online Payments Threats
July 3, 2012 Introduction...2 Tested Products...2 Used Configuration...3 Real Malware Inspiration...3 Total Scores Chart...4 Conclusion...4 About matousec.com...4 Detailed Descriptions of Tests...5 Detailed
26 Protection Programs Undergo Our First Test Using Windows 8
Test: Internet Security Packages 1/2013 26 Protection Programs Undergo Our First Test Using Windows 8 Windows 8 is considered to be a secure system thanks to its internal protection package containing
Anti-Virus Protection and Performance
Anti-Virus Protection and Performance ANNUAL REPORT 2015 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com CONTENTS Annual Report 2015... 1 Contents... 2 Introduction...
Supported Anti Virus from ESAP 2-6-1
Supported Anti Virus from ESAP 2-6-1 avast! Antivirus (4.8.x) avast! Antivirus (4.x) avast! Antivirus (managed) (4.x) avast! Antivirus Professional (4.8.x) avast! Antivirus Professional (4.x) avast! Business
Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?
ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security
Anti-Virus Comparative
Anti-Virus Comparative File Detection Test of Malicious Software including false alarm test Language: English September 2015 Last Revision: 15 th October 2015 Table of Contents Tested Products 3 Introduction
Anti-Virus Comparative
Anti-Virus Comparative File Detection Test of Malicious Software including false alarm test Language: English March 2015 Last Revision: 30 th April 2015 Table of Contents Tested Products 3 Introduction
Henry Ford Health System Remote Access Support Details
Henry Ford Health System Remote Access Support Details Last Updated: March 5 th, 2014 Access Disclaimer: This document assumes that you already have an ID to access the Henry Ford Health System (HFHS)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
PCSL. PCSL IT Consulting Institute 机 安 全 软 件 病 毒 检 测 率 测 试
2014 IT Consulting Institute ⓫ 手 机 安 全 软 件 病 毒 检 测 率 测 试 报 告 目 录 Table of Contents P1 P2 P3 测 试 背 景 测 试 流 程 待 测 软 件 P4 P6 P7 测 试 结 果 月 度 奖 项 相 关 信 息 P8 权 利 说 明 P9 免 责 声 明 CHAP. 1 Background 1 CHAP. 2 Test
Nessus and Antivirus. January 31, 2014 (Revision 4)
Nessus and Antivirus January 31, 2014 (Revision 4) Table of Contents Introduction... 3 Standards and Conventions... 3 Overview... 3 A Note on SCAP Audits... 4 Microsoft Windows Defender... 4 Kaspersky
Security Industry Market Share Analysis
Security Industry Market Share Analysis September 2011 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes
Home Anti-Virus Protection
Home Anti-Virus Protection APRIL - JUNE 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security companies.
Real World and Vulnerability Protection, Performance and Remediation Report
Real World and Vulnerability Protection, Performance and Remediation Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: September 17 th, 2014, last update:
ESAP 2.7.4 Release Notes
ESAP 2.7.4 Release Notes SDK Version: Mac and Windows 3.6.9845.2 (V2 Unified + V3). Note: The SDK embedded in this ESAP version has been tested and qualified to interoperate with a limited list of end
Firewall Test. Firewall protection in public networks. Commissioned by CHIP. Language: English. Last Revision: 11 th April 2014
Firewall Test Firewall protection in public networks Commissioned by CHIP Language: English Last Revision: 11 th April 2014 www.av-comparatives.org Commissioned by - 1 - Contents Firewall protection in
Enterprise Anti-Virus Protection
Enterprise Anti-Virus Protection JAN - MAR 2015 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware products
Tracking Anti-Malware Protection 2015
Tracking Anti-Malware Protection 2015 A TIME-TO-PROTECT ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to measure
Anti-Virus Comparative
Anti-Virus Comparative Performance Test (Suite Products) Impact of Internet Security Software on System Performance Language: English October 2013 Last Revision: 19 th November 2013 Table of Contents 1.
Global Antivirus Software Package Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3498718/ Global Antivirus Software Package Market 2015-2019 Description: About antivirus software package An antivirus scans the
Installation Instructions for SAS Enterprise Miner and Text Miner Workstation 12.3 on Windows.
Installation Instructions for SAS Enterprise Miner and Text Miner Workstation 12.3 on Windows. 1. Before you begin installing the SAS software, ensure that there are no antivirus or firewall services running
How To Test For Performance On A 64 Bit Computer (64 Bit)
Anti-Virus Comparative Performance Test Impact of Security Software on System Performance Language: English May 2015 Last Revision: 30 th June 2015 Table of Contents 1. Introduction 3 2. Tested products
Countermeasures against Spyware
(2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?
Transaction Anomaly Protection Stopping Malware At The Door. White Paper
Transaction Anomaly Protection Stopping Malware At The Door White Paper Table of Contents Overview 3 Programmable Crime Logic Alter Web Application Flow & Content 3 Programmable Crime Logic Defeats Server-Side
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Remote Access Using The New York Eye & Ear Infirmary of Mount Sinai Secure Web VPN
Remote Access Using The New York Eye & Ear Infirmary of Mount Sinai Secure Web VPN OVERVIEW The New York Eye & Ear Infirmary of Mount Sinai Remote Access (VPN) home page allows remote access to the Infirmary
Five Trends to Track in E-Commerce Fraud
Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other
ENTERPRISE EPP COMPARATIVE REPORT
ENTERPRISE EPP COMPARATIVE REPORT Security Stack: Socially Engineered Malware Authors Bhaarath Venkateswaran, Randy Abrams, Thomas Skybakmoen Tested Products Bitdefender Endpoint Security v5.3.15.539 ESET
Performance test November 2014 / www.avlab.pl 1 INTRODUCTION... 1 TESTED PROGRAM VERSIONS..2 WHAT AND HOW WE TESTED. 3 OTHER PRINCIPLES...
PE RF ORMANCET E S TOFF RE E ANT I VI RUSS OF T WARE ANDI NT E RNE TS E CURI T YS UI T E S NOVE MBE R14 Per f or medt estdat e: Oct ober-november14 Performance test November 14 / www.avlab.pl 1 INTRODUCTION...
KASPERSKY ENDPOINT SECURITY FOR BUSINESS: TECHNOLOGY IN ACTION
KASPERSKY ENDPOINT SECURITY FOR BUSINESS: TECHNOLOGY IN ACTION For the threats you can see and those you can t kaspersky.com/business #Securebiz CONTENTS Protect your business from the threats you can
CORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,
Securing Your Business s Bank Account
Commercial Banking Customers Securing Your Business s Bank Account Trusteer Rapport Resource Guide For Business Banking January 2014 Table of Contents 1. Introduction 3 Who is Trusteer? 3 2. What is Trusteer
Secondly, if your device is running a Microsoft Windows or Macintosh OS X operating system you will also need to:
What is Safe Connect and why is it being used? Safe Connect is part of TAMUK's effort to help keep computers on its network as free as possible from viruses, spyware, and operating system security holes.
IT Security Survey 2014
IT Security Survey 2014 Language: English Last Revision: 28 th February 2014-1 - Overview Use of the Internet by home and business users continues to grow in all parts of the world. How users access the
Enterprise Anti-Virus Protection
Enterprise Anti-Virus JULY - SEPTEMBER 2013 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware products
DSD230001 avast! Pro Antivirus 1-PC 1 jaar 33,99 41,13 DSD230002 avast! Pro Antivirus 3-PC 1 jaar 42,99 52,02
ABBYY DSD310010 ABBYY FineReader Pro for MAC 81,82 99,00 DSD310011 ABBYY PDF Transformer+ 57,02 68,99 DSD310006 ABBYY Business Card Reader 2.0 20,62 24,95 DSD310008 ABBYY Screenshot Reader 8,22 9,95 DSD310012
Enterprise Anti-Virus Protection
Enterprise Anti-Virus APRIL - JUNE 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security companies.
ABBYY Référence Nom Prix HTVA Prix TVAC DSD310010 ABBYY FineReader Pro for Mac 73,55 89 DSD310011 ABBYY PDF Transformer+ 57,02 68,99 DSD310006 ABBYY
ABBYY DSD310010 ABBYY FineReader Pro for Mac 73,55 89 DSD310011 ABBYY PDF Transformer+ 57,02 68,99 DSD310006 ABBYY Business Card Reader 2.0 20,62 24,95 DSD310008 ABBYY Screenshot Reader 8,22 9,95 DSD310012
Security Industry Market Share Analysis
Security Industry Market Share Analysis December Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This report includes both worldwide
AV-Comparatives. Support-Test (UK) Test of English-Language Telephone Support Services for Windows Consumer Security Software 2016
AV-Comparatives Support-Test (UK) Test of English-Language Telephone Support Services for Windows Consumer Security Software 2016 Language: English March 2016 Last Revision: 14 th April 2016 Commissioned
Trend Micro Endpoint Comparative Report Performed by AV Test.org
Trend Micro Endpoint Comparative Report Performed by AV Test.org Results from December 2009 Executive Summary In December of 2009, AV Test.org performed endpoint security benchmark testing on five market
Global Endpoint Security Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3097865/ Global Endpoint Security Market 2015-2019 Description: About Endpoint Security Endpoint security is a methodology that
AV-TEST Examines 22 Antivirus Apps for Android Smartphones and Tablets
Protection Apps for Android Feb. 2013 AV-TEST Examines 22 Antivirus Apps for Android Smartphones and Tablets Millions of Android smartphones are currently accessing the Internet without any protection.
Small Business Anti-Virus Protection
Small Business Anti-Virus Protection JULY - SEPTEMBER 2013 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware
Enterprise Anti-Virus Protection
Enterprise Anti-Virus Protection APRIL - JUNE 2014 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware
Anti-Virus Comparative - Performance Test (AV Products) May 2014
Anti-Virus Comparative Performance Test (AV Products) Impact of Anti-Virus Software on System Performance Language: English May 2014 Last Revision: 10 th June 2014 Table of Contents 1. Introduction 3 2.
PCSL. PCSL IT Consulting Institute 手 机 安 全 软 件 病 毒 检 测 率 测 试. Malware Detection Test. Celebrating Technology Innovation
2015 IT Consulting Institute ❹ Android Malware Detection Test 手 机 安 全 软 件 病 毒 检 测 率 测 试 Celebrating Technology Innovation 报 告 目 录 Table of Contents P1 P2 P3 测 试 背 景 Background 测 试 流 程 Test Process 待 测
List of Products supported by ESAP 2.2.1
List of Products supported by ESAP 2.2.1 Table of Contents Products supported on:... 2 Junos Pulse Secure Access Service 7.2Rx / Junos Pulse Access Control Service 4.2Rx... 2 Products supported on:...
ESAP 2.5.2 Release Notes. SDK Version: Windows 3.6.8649.2 (V2 Unified + V3), Mac 3.6.8470.2
ESAP 2.5.2 Release Notes SDK Version: Windows 3.6.8649.2 (V2 Unified + V3), Mac 3.6.8470.2 ESAP 2.5.2 and Junos Pulse Secure Access/Access Control Service Compatibility Chart: This ESAP package can be
ODOT UAG Tips/Troubleshooting Guide
ODOT UAG Tips/Troubleshooting Guide These helpful tips are provided by ODOT Computer Support to help those using a non-odot PC and running into issues with connecting the UAG/VPN. This is a best-effort
MRG Effitas Real World Enterprise Security Exploit Prevention March 2015. Real World Enterprise Security Exploit Prevention Test.
Real World Enterprise Security Exploit Prevention Test March 2015 1 1 Executive summary...3 2 Certifications...6 3 Test methodology...7 3.1 Source of exploits...9 3.2 False positive test... 10 3.3 0-day
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
Small Business Anti-Virus Protection
Small Business Anti-Virus Protection OCT - DEC 2014 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware
ESAP 2.8.6 Release Notes. SDK Version: Mac and Windows 3.6.10173.2 (V2 Unified + V3).
ESAP 2.8.6 Release Notes SDK Version: Mac and Windows 3.6.10173.2 (V2 Unified + V3). Note: The SDK embedded in this ESAP version has been tested and qualified to interoperate with an extensive list of
Small Business Anti-Virus Protection
Small Business Anti-Virus Protection JANUARY - MARCH 2014 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware
