This website uses cookies to ensure you get the best experience on our website.
Please note that by continuing to use this site you consent to the terms of our Privacy and Data Protection Policy.
Accept

Advanced Endpoint Protection Test

AV-Comparatives has published the findings of an Advanced Endpoint Protection Test, consisting of the following component tests:

  • PowerShell-based file-less attacks and file-based exploits test, including false alarm test
  • Proactive Protection Test, including false alarm test
  • Real-World Protection Test, including false alarm test
  • Ransomware test

The tests were performed between November 2017 and January 2018. The primary goal was to compare the automatic prevention and detection capabilities of different endpoint protection solutions. The test was commissioned by Bitdefender. Products by the following vendors were tested (please note that the results apply only to the specific program versions and settings that are described in the report): Bitdefender, Carbon Black, CrowdStrike, Cylance, Kaspersky Lab, McAfee, SentinelOne, Sophos and Symantec. The full report can be downloaded from here (PDF).

AV-Comparatives’ Awards Ceremony 2017

AV-Comparatives’ 2017 Awards Ceremony and security conference was held on 6th February in Innsbruck. 35 security specialists from twelve different countries, representing four continents, attended the event. Awards for the best products in AV-Comparatives’ 2017 antivirus main test series were presented to their respective vendors, and some important current IT topics were discussed.

Continue reading…

Follow Us

Twitter

Facebook

Tags

Real-World Protection Test test results wpdt False Alarm Malware Protection hacking deepweb iot fileless powershell security video youtube test zero day cryptography deception social engineering bug hunting antivirus security review business security corporate enterprise products incident response nextgen android review netapp certification mac anti-phishing amtso protection rttl performance anti-spam spam-test commissioned malware file detection microsoft prevalence telemetry hotline phone support detection fdt dynamic wildlist poll survey summary report whole-product testing certified eicar testing labs trusted it-security linkedin social media windows 10 false alarms false positives apt cyberwar cheating david harley schneier testing detection test antivirus handbook malware analysis certificates fraud netcraft phishing ssl saas small business smb EU NSA privacy safe harbor 10-Years awards Participation av comparatives comparison Virus Bulletin conference disinfection remediation removal VB2015 child protection content filtering parental control mobile tools antispy metadata spyware online sandbox jotti metascan multiscanner online scan virustotal market share OPSWAT blogs news malicious URLs malware sources websites honeypots forensics rootkit malware scam url reverse engineering penetration testing exploit python memory network botnet windows metasploit fiddler sandbox honeypot disassembler IDA browser apple email spam linux story statistics 10 Years AV-Comparatives anniversary greenwald Hero snowden surveillance Whistleblower 1984 NSA Handbook orwell pc mark speed windows 8.1 behavioral behavioural heuristics proactive retrospective ubuntu list of mobile security vendors list of security vendors for Mac list of security vendors for PC archive reports best paper award Malware Conference file-detection ISO certification data leakage data transmission award constantinus it security tips knowledgebase