This website uses cookies to ensure you get the best experience on our website.
Please note that by continuing to use this site you consent to the terms of our Privacy and Data Protection Policy .
Some of our partner services are located in the United States. According to the case law of the European Court of Justice, there is currently no adequate data protection in the USA. There is a risk that your data will be controlled and monitored by US authorities. You cannot bring any effective legal remedies against this.
Accept

Tag: certification

AV-Comparatives Renews ISO 9001:2015 Certification for Independent Testing of Anti-Virus Software

AV-Comparatives is pleased to announce the renewal of its ISO 9001:2015 certification for the independent testing of anti-virus software. TÜV Austria has reaffirmed AV-Comparatives’ commitment to provide “Independent Tests of Anti-Virus Software” by extending the certification, validating the organization’s dedication to delivering high-quality evaluations in the field of IT security.

Continue reading…

Upcoming AV-Comparatives’ Certification Tests 2024

Anti-virus test

As in previous years, we will be running certification tests for the following products:

We also offer comprehensive security assessments exclusively for enterprise products, covering enterprise security tests, EPR/XDR tests, and penetration/red-teaming evaluations.

Security vendors interested in participating in any of the aforementioned tests or seeking more details are invited to contact us by 31st of March 2024.

NGFW Egress C2 Test: Assessing the Effectiveness of Outgoing Network Traffic Prevention and Detection Capabilities

In June 2023, AV-Comparatives conducted an NGFW Egress C2 Test to evaluate the effectiveness of NGFW products in detecting and preventing malicious traffic. In targeted attacks, one of the goals of APT groups is to establish control over a compromised system by opening a command-and-control channel (C2) to the command-and-control server operated by the attacker. If the attacker has already gained access to the system via a trusted relationship, or has delivered malware using phishing or USB drives, they can use C2 malware to open the C2 channel.

Continue reading…