This website uses cookies to ensure you get the best experience on our website.
Please note that by continuing to use this site you consent to the terms of our Privacy and Data Protection Policy .
Some of our partner services are located in the United States. According to the case law of the European Court of Justice, there is currently no adequate data protection in the USA. There is a risk that your data will be controlled and monitored by US authorities. You cannot bring any effective legal remedies against this.
Accept

Tag: certification

Upcoming AV-Comparatives’ Certification Tests 2024

Anti-virus test

As in previous years, we will be running certification tests for the following products:

We also offer comprehensive security assessments exclusively for enterprise products, covering enterprise security tests, EPR/XDR tests, and penetration/red-teaming evaluations.

Security vendors interested in participating in any of the aforementioned tests or seeking more details are invited to contact us by 31st of March 2024.

NGFW Egress C2 Test: Assessing the Effectiveness of Outgoing Network Traffic Prevention and Detection Capabilities

In June 2023, AV-Comparatives conducted an NGFW Egress C2 Test to evaluate the effectiveness of NGFW products in detecting and preventing malicious traffic. In targeted attacks, one of the goals of APT groups is to establish control over a compromised system by opening a command-and-control channel (C2) to the command-and-control server operated by the attacker. If the attacker has already gained access to the system via a trusted relationship, or has delivered malware using phishing or USB drives, they can use C2 malware to open the C2 channel.

Continue reading…

Anti-Phishing Certification Test 2023

Anti-Phishing test: security products published passing the 2023 test

Every year we publish the results of our phishing protection certification test. These tests evaluate the protection provided against phishing websites. These deceptive websites can pose a real threat to Internet users, as they attempt to steal sensitive information such as usernames, passwords, and credit card details.

Continue reading…