Protect Your Entire Network

Total Page:16

File Type:pdf, Size:1020Kb

Protect Your Entire Network DATA SHEET Protect Your Entire Network Digital transformation which has been radically occurring in all aspects. Technology driven business changed the way of interaction with their customers and product development process. Mutually when organization transforms, security and protection of their data should be an integral part. As digital world changes, the way of protecting our data and securing our network has been changed enormously. With digital transformation, Cybercriminals are simultaneously growing by creating efficient threats and risk averse mode of operation. Integrated comprehensive security solutions with centralized management console is needed to decrease costs and complexity for an enterprise network. K7 Enterprise Security A Complete Enterprise solution Unsecured Network results in: Leaks of confidential information Intruders can easily hack into the network Low performance of system Malicious files like viruses, Trojan, bot, adware’s, rootkits can affect the system files K7 Enterprise security provides the complete advanced protection solution for Enterprise needs. Enterprises require sophisticated cyber security solutions, protect yourself from direct financial loss by the likes of Ransomware, indirect loss due to productivity loss, down time caused by cyber-attacks. Advanced Cerebro technology that incorporates artificial intelligence providing a proactive approach to detect and prevent the most advanced attacks ensures Zero day protection Sophisticated end-point protection is needed for every device since a single infected system can crash an entire network, which will put your organization at a loss. 1 All kinds of gateways can be sealed from intrusion attacks to prevent the leakage ofconfidential data with K7 Enterprise Security. Gear up with K7 Enterprise Security to fight against ransomware, malware, viruses, spyware, worms and hackers. Also, provides excellent support with Zero-day protection. Key Features Centralized Web Console Real time protection Proactive Defence Method With centralized console, you get Cutting edge technology engine Using concept of behavioral absolute control over all node across works constantly and protects your blocking, artificial intelligence and the entire network, giving you a high entire network without affecting machine learning we protect all your level of manageability for effective performance of any system. Instant system files from known virus and new security implementation. Customize notify if any malware threat try to ones which is yet to be discovered. security changes across your inject your file. organization with a single click. Installation Made Easy K7 Cerebro Engine Root Kit Scanner Ultrafast and Scalable scanning With most advanced detection Installation is way easier and no need engine which is capable of detecting technology detects any hidden root kit follow installation guide. Single click to not only the existing threats and also in all the clients system. It helps to get node installation setup, Silent emerging threats by using artificial prevent affecting any file by new installation and remote client intelligence and machine learning. Its rootkit though. installation made all way easy. proactive approach which can detect and prevent the most advanced attacks ensures Zero day protection. Secure File Servers Internet gateway security Email Protection We take control of your mailbox On real time it scans all files Detects the location of endpoints and filter from all unwanted malicious accessed, downloaded, created or both offline and online and combats content and spam. By using Bayesian modified across each endpoint by the hostile intruders. Pro-active filter we detect and block all emails user. Protects all the sensitive data protection for all your endpoint users contains viruses, key loggers, junks from malware threats. from potential threats and phishing attacks. 2 System Requirements Administrator Console Requirements Operating System Windows Server 2003 (SP2) – Any Edition Windows Server 2008 – Any Edition Windows Server 2008 R2 – Any Edition Windows Small Business Server 2011Any Edition Windows Server 2012 – Any Edition Windows XP (SP2 or later) Windows Vista (SP1 or later) Windows 7/ 8 / 8.1 Database K7 Business Edition includes MS-SQL Server 2008 Express Edition as built-in database (You can also use other Microsoft SQL Server Editions) Hardware 512 MB RAM (minimum), 700 MB Hard Disk Space, High resolution Video Adapter and Monitor Browsers Internet Explorer 8 or later (You can also use other web browsers such as Firefox, Google Chrome, etc.) Internet Internet connection is required for activation and updates K7 Endpoint Protection Operating System Windows XP (SP2 or later) (32 Bit Only) Windows Vista (SP1 or later) Windows 7/ 8 / 8.1 Windows Server 2003 (SP2) – Any Edition Windows Server 2008 – Any Edition Windows Server 2008 R2 – Any Edition Windows Small Business Server 2011 – Any Edition Windows Server 2012 – Any Edition Hardware 512 MB RAM (minimum), 300 MB Hard Disk Space, High resolution Video Adapter and Monitor SUPPORTED PLATFORM - Windows For more information or to purchase, Visit www.k7computing.com/product/enterprise-security Sign up with us and we provide complete enterprise protection solution. All the configurations, endpoints enrollment, polices and groups stay’s as the way it is and all additional setup comes along purchase. K7 Enterprise security gets free upgrades during license period and we provide you 24*7 technical support. K7 Computing Private Limited, www.k7computing.com 2nd Floor, Tek Towers, K7 Computing, K7 Virus Security, K7 Ultimate Security, K7 Total Security, K7 Antivirus Desktop Edition, K7 Antivirus Corporate Edition, No-11, Rajiv Gandhi Salai (OMR), K7 Enterprise Security, K7 Business Security, K7 Business Lite, K7 Endpoint Security and Vx2000+ names and Logos are the trademarks Okkiyam Thoraipakkam, of K7 Computing Private Limited. All other brand and product names are trademarks or registered trademarks of their respective Chennai – 600097. holders. © 2017 K7 Computing Pvt Ltd. All Rights Reserved. Email: [email protected] 3 .
Recommended publications
  • VB100 Certification Report February 2020
    FEBRUARY 2020 Covering the global threat landscape VB100 CERTIFICATION REPORT For full details, we refer to the VB100 methodology on the Virus Bulletin website: https://www.virusbulletin.com/testing/ FEBRUARY 2020 vb100/vb100-methodology/vb100-methodology-ver1-1/. This VB Test Team test used version 1.1 of the VB100 methodology. The VB100 award remains as relevant now as it was at its inception 22 years ago – providing a stamp of quality DIVERSITY TEST and competence for anti-malware products that satisfy a The malware part of the VB100 certifi cation uses the minimum standard of detecting malicious executables that WildList, a regularly updated list of extremely well-vetted have recently been seen in the wild, while blocking few to malware samples, guaranteed to have been spotted in the no legitimate programs. wild multiple times. This makes them very suitable for a certifi cation test like VB100. This report details the VB100 certifi cation results of 40 such products from 36 different vendors during January and The ‘Diversity Test’ looks at products’ detection of February 2020. another set of recent malware samples, to acknowledge the fact that products detect malware samples beyond a standard set of samples, and provides a measure of that THE VB100 SET-UP detection. In the VB100 test, a copy of the product to be tested is installed on two platforms: Windows 10 and Windows 7. PRODUCTS & RESULTS On each platform, and at three different times in the test, Products were allowed to download updates during the the product is asked to scan both the latest version of course of the test.
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • Summary Report 2020 Awards, Winners, Comments
    Independent Tests of Anti-Virus Software Summary Report 2020 Awards, winners, comments TEST PERIOD : 2020 LANGUAGE : ENGLISH LAST REVISION : 15TH JANUARY 2021 WWW.AV-COMPARATIVES.ORG Summary Report 2020 www.av-comparatives.org Content INTRODUCTION 3 MANAGEMENT SUMMARY 5 ANNUAL AWARDS 9 PRICING 16 USER EXPERIENCE REVIEW 18 AVAST FREE ANTIVIRUS 21 AVG ANTIVIRUS FREE 24 AVIRA ANTIVIRUS PRO 27 BITDEFENDER INTERNET SECURITY 30 ESET INTERNET SECURITY 34 F-SECURE SAFE 38 G DATA INTERNET SECURITY 41 K7 TOTAL SECURITY 45 KASPERSKY INTERNET SECURITY 48 MCAFEE TOTAL PROTECTION 52 MICROSOFT DEFENDER ANTIVIRUS 55 NORTONLIFELOCK NORTON 360 DELUXE 58 PANDA FREE ANTIVIRUS 61 TOTAL AV ANTIVIRUS PRO 64 TOTAL DEFENSE ESSENTIAL ANTI-VIRUS 67 TREND MICRO INTERNET SECURITY 70 VIPRE ADVANCED SECURITY 73 FEATURELIST COMES HERE 76 COPYRIGHT AND DISCLAIMER 77 2 Summary Report 2020 www.av-comparatives.org Introduction About AV-Comparatives We are an independent test lab, providing rigorous testing of security software products. We were founded in 2004 and are based in Innsbruck, Austria. AV-Comparatives is an ISO 9001:2015 certified organisation. We received the TÜV Austria certificate for our management system for the scope: “Independent Tests of Anti-Virus Software”. http://www.av-comparatives.org/iso-certification/ AV-Comparatives is the first certified EICAR Trusted IT-Security Lab http://www.av-comparatives.org/eicar-trusted-lab/ At the end of every year, AV-Comparatives releases a Summary Report to comment on the various consumer anti-virus products tested over the course of the year, and to highlight the high-scoring products of the different tests that took place over the twelve months.
    [Show full text]
  • Cisco Identity Services Engine Supported Windows AV/AS/PM/DE
    Cisco Identity Services Engine Supported Windows AS/AV, Patch Management and Disk Encryption Products Compliance Module Version 3.6.10363.2 This document provides Windows AS/AV, Patch Management and Disk Encryption support information on the the Cisco AnyConnect Agent Version 4.2. Supported Windows Antispyware Products Vendor_Name Product_Version Product_Name Check_FSRTP Set_FSRTP VirDef_Signature VirDef_Time VirDef_Version 360Safe.com 10.x 360安全卫士 vX X v v 360Safe.com 4.x 360安全卫士 vX X v v 360Safe.com 5.x 360安全卫士 vX X v v 360Safe.com 6.x 360安全卫士 vX X v v 360Safe.com 7.x 360安全卫士 vX X v v 360Safe.com 8.x 360安全卫士 vX X v v 360Safe.com 9.x 360安全卫士 vX X v v 360Safe.com x Other 360Safe.com Antispyware Z X X Z X Agnitum Ltd. 7.x Outpost Firewall Pro vX X X O Agnitum Ltd. 6.x Outpost Firewall Pro 2008 [AntiSpyware] v X X v O Agnitum Ltd. x Other Agnitum Ltd. Antispyware Z X X Z X AhnLab, Inc. 2.x AhnLab SpyZero 2.0 vv O v O AhnLab, Inc. 3.x AhnLab SpyZero 2007 X X O v O AhnLab, Inc. 7.x AhnLab V3 Internet Security 2007 Platinum AntiSpyware v X O v O AhnLab, Inc. 7.x AhnLab V3 Internet Security 2008 Platinum AntiSpyware v X O v O AhnLab, Inc. 7.x AhnLab V3 Internet Security 2009 Platinum AntiSpyware v v O v O AhnLab, Inc. 7.x AhnLab V3 Internet Security 7.0 Platinum Enterprise AntiSpyware v X O v O AhnLab, Inc. 8.x AhnLab V3 Internet Security 8.0 AntiSpyware v v O v O AhnLab, Inc.
    [Show full text]
  • Cisco Identity Services Engine Release 1.2 Supported Windows
    Cisco Identity Services Engine Supported Windows AV/AS Products Compliance Module Version 3.5.6317.2 This document provides Windows 8/7/Vista/XP AV/AS support information on the Cisco NAC Agent version 4.9.0.x and later. For other support information and complete release updates, refer to the Release Notes for Cisco Identity Services Engine corresponding to your Cisco Identity Services Engine release version. Supported Windows AV/AS Product Summary Added New AV Definition Support: COMODO Antivirus 5.x COMODO Internet Security 3.5.x COMODO Internet Security 3.x COMODO Internet Security 4.x Kingsoft Internet Security 2013.x Added New AV Products Support: V3 Click 1.x avast! Internet Security 8.x avast! Premier 8.x avast! Pro Antivirus 8.x Gen-X Total Security 1.x K7UltimateSecurity 13.x Kaspersky Endpoint Security 10.x Kaspersky PURE 13.x Norman Security Suite 10.x Supported Windows AntiVirus Products Product Name Product Version Installation Virus Definition Live Update 360Safe.com 360 Antivirus 1.x 4.9.0.28 / 3.4.21.1 4.9.0.28 / 3.4.21.1 yes 360 Antivirus 3.x 4.9.0.29 / 3.5.5767.2 4.9.0.29 / 3.5.5767.2 - 360杀毒 1.x 4.9.0.28 / 3.4.21.1 4.9.0.28 / 3.4.21.1 - 360杀毒 2.x 4.9.0.29 / 3.4.25.1 4.9.0.29 / 3.4.25.1 - 360杀毒 3.x 4.9.0.29 / 3.5.2101.2 - Other 360Safe.com Antivirus x 4.9.0.29 / 3.5.2101.2 - AEC, spol.
    [Show full text]
  • ESAP 1.7.4 Support Has Been Added for the Following
    ESAP 1.7.4 Support has been added for the following products in ESAP1.7.4 Antivirus Products [Avanquest Publishing USA, Inc.] SystemSuite 11.x [GData Software AG] G Data InternetSecurity 22.x [K7 Computing Pvt. Ltd.] K7 Total Security 11.x [K7 Computing Pvt. Ltd.] K7UltimateSecurity 11.x [McAfee] McAfee VirusScan 15.x [Symantec Corp.] Symantec Endpoint Protection 12.1.x [TrustPort, a.s.] TrustPort Internet Security 11.x [TrustPort, a.s.] TrustPort Total Protection 11.x Antispyware Products [Avanquest Publishing USA, Inc.] SystemSuite 11.x [GData Software AG] G Data InternetSecurity 22.x [K7 Computing Pvt. Ltd.] K7 Total Security 11.x [K7 Computing Pvt. Ltd.] K7UltimateSecurity 11.x [Symantec Corp.] Symantec Endpoint Protection 12.1.x Firewall Products [GData Software AG] G Data InternetSecurity 22.x [Kaspersky Labs] Kaspersky Internet Security 12.x [K7 Computing Pvt. Ltd.] K7 Total Security 11.x [K7 Computing Pvt. Ltd.] K7UltimateSecurity 11.x [McAfee, Inc.] McAfee Personal Firewall 12.x [TrustPort, a.s.] TrustPort Internet Security 11.x [TrustPort, a.s.] TrustPort Total Protection 11.x Issues Fixed in ESAP1.7.4: OPSWAT: 1. Check for HAURI AntiVirus VI Robot fails on Windows XP Korean OS. (602078). 2. FSRTP of Norman Endpoint Protection 7 fails. (610618). 3. Check for Virus definition files of Symantec Endpoint Protection 12.x fails. (614166). 4. Check for G Data Internet Security 2011 Japanese Edition fails. (659762). Upgrade Issues in ESAP1.7.4: OPSWAT: 1. AntiSpyware of Kaspersky Anti‐virus for Windows Workstations 6.x is renamed to Kaspersky Anti‐virus for Windows Workstations 6.x [AntiSpyware].
    [Show full text]
  • Cyber Threat Monitor
    CYBER THREAT MONITOR K7 LABS Q2 2019 - 20 1 K7 Security CYBER THREAT MONITOR - INDIA 2 K7 Security CONTENTS Cyber Threat Monitor - Q2 Painting India’s Cybersecurity Portrait ...............................................................4 Regional Infection Profile .................................................................................5 Enterprise Insecurity .......................................................................................8 Case Study 1: The Curious Case of a Coinminer Case Study 2: Anatomy of a Ransomware Outbreak Safety Recommendations Vulnerabilities Galore ....................................................................................11 Exploitation of Loopholes Unpatched Virtual Private Networks (VPNs) Under Attack!! Windows Under Siege ....................................................................................15 Windows Malware Type Breakdown Mitigation Tips The Mobile Device Story ................................................................................17 Case Study 1: Agent Smith and the Android Matrix Case Study 2: CamScanner - Unsuspecting App Turns Malicious Tips to Stay Safe Mac Attack ..................................................................................................21 Planned Coinbase Heist Foiled Prevalent PUPs Safety Guidelines Danger in the Internet of Things .....................................................................25 Mitigation Techniques Key Takeaways .............................................................................................26
    [Show full text]
  • Malware Protection Test March 2018
    Anti -Virus Comparative Malware Protection Test Consumer Products File Detection Test with Execution including false alarm test Language: English March 2018 Last Revision: 13th April 2018 www.av-comparatives.org Malware Protection Test - March 2018 www.av-comparatives.org Table of Contents Tested Products 3 Introduction 4 Detection vs. Protection 5 Offline vs. Online Detection Rates 6 Results (Online Protection Rates) 7 False positive (false alarm) test 8 Ranking system 9 Award levels reached in this test 10 Copyright and Disclaimer 11 - 2 - Malware Protection Test - March 2018 www.av-comparatives.org Test ed Products • Avast Free Antivirus 18.2 • Kaspersky Internet Security 18.0 • AVG Free Antivirus 18.2 • McAfee Internet Security 20.7 • AVIRA Antivirus Pro 15.0 • Microsoft Windows Defender 4.12 • Bitdefender Internet Security 22.0 • Panda Free Antivirus 18.03 • BullGuard Internet Security 18.0 • Quick Heal Total Security 17.0 • Emsisoft Anti-Malware 2018.2 • Symantec Norton Security 22.12 • ESET Internet Security 11.0 • Tencent PC Manager 12.3 • F-Secure SAFE 17.204 • Trend Micro Internet Security 12.0 • K7 Total Security 15.1 • VIPRE Advanced Security 10.1 - 3 - Malware Protection Test - March 2018 www.av-comparatives.org Introduction The Malware Protection Test is an enhancement of the File Detection Test which was performed years ago. Due to the increased scope of the test, readers are advised to read the methodology described below. Please note that we do not recommend purchasing a product purely on the basis of one individual test or even one type of test. Rather, we would suggest that readers consult also our other recent test reports, and consider factors such as price, ease of use, compatibility and support.
    [Show full text]
  • Supported Products for ESAP 3.7.8
    Firefox https://172.21.158.254/dana-admin/auth/listEsapProducts.cgi?versionid=... Windows ANTI-VIRUS Products PRODUCTS: Marketing Name Display Name 2345安全卫士 (3.x) 2345安全卫士 (3.x) 360 Internet Security (4.x) 360 Internet Security (4.x) 360 Internet Security (5.x) 360 Internet Security (5.x) 360 Internet Security (6.x) 360 Internet Security (6.x) 360 Total Security (4.x) 360 Total Security (4.x) 360 Total Security (5.x) 360 Total Security (5.x) 360 Total Security (6.x) 360 Total Security (6.x) 360 Total Security (8.x) 360 Total Security (8.x) 360 Total Security (9.x) 360 Total Security (9.x) 360天擎 (6.x) 360天擎 (6.x) 360安全卫士 (11.x) 360安全卫士 (11.x) 360杀毒 (1.x) 360杀毒 (1.x) 360杀毒 (3.x) 360杀毒 (3.x) 360杀毒 (5.x) 360杀毒 (5.x) ALYac Enterprise (2.x) ALYac Enterprise (2.x) ALYac Enterprise (3.x) ALYac Enterprise (3.x) AVANSI Antivirus (4.x) AVANSI Antivirus (4.x) AVG Anti-Spyware (7.x) AVG Anti-Spyware (7.x) AVG AntiVirus (10.x) AVG AntiVirus (10.x) AVG AntiVirus (15.x) AVG AntiVirus (15.x) AVG AntiVirus (16.x) AVG AntiVirus (16.x) AVG AntiVirus (2013.x) AVG AntiVirus (2013.x) AVG AntiVirus (2014.x) AVG AntiVirus (2014.x) AVG AntiVirus (2016.x) AVG AntiVirus (2016.x) AVG AntiVirus (7.x) AVG AntiVirus (7.x) AVG AntiVirus (8.x) AVG AntiVirus (8.x) AVG AntiVirus (9.x) AVG AntiVirus (9.x) AVG AntiVirus Business Edition (16.x) AVG AntiVirus Business Edition (16.x) AVG AntiVirus Free (17.x) AVG AntiVirus Free (17.x) AVG AntiVirus Free (18.x) AVG AntiVirus Free (18.x) AVG AntiVirus Free (19.x) AVG AntiVirus Free (19.x) AVG AntiVirus Free (20.x) AVG AntiVirus
    [Show full text]
  • Factsheet Real-World Protection Test February-March 2021
    Independent Tests of Anti-Virus Software Factsheet Real-World Protection Test Consumer Products TEST PERIOD : FEBRUARY-MARCH 2021 LAST REVISION : 12TH APRIL 2021 WWW.AV-COMPARATIVES.ORG Factsheet Real-World Protection Test February-March 2021 www.av-comparatives.org Introduction This fact sheet is a short overview of the Real-World Protection Test results of February and March 2021. The detailed overall result consumer product reports (covering four months each) are released in June and December. Each of the overall result reports will also contain a false-alarm test and will contain the awards the products reached based on their overall scores during the respective four- month period. For more information about this Real-World Protection Test, please read the details and previous test reports available on https://www.av-comparatives.org Testcases Our Real-World Protection Test is currently one of the most comprehensive and complex tests available, using a relatively large number of test cases. Currently, we are running this test under updated Microsoft Windows 10 Pro 64 Bit with up-to-date third-party software (such as Adobe Flash, Adobe Acrobat Reader, Java, etc.). Due to this, finding in-the-field working exploits and running malware is much more challenging than e.g. under a non-up-to-date system with unpatched/vulnerable third- party applications. Over the year we evaluate several tens of thousands malicious URLs. Unfortunately, many of these have to be discarded for various reasons. We remove duplicates such as the same malware hosted on different domains or IP addresses, sites already tested, “grey” or non-malicious sites/files, and malware/sites disappearing during the test.
    [Show full text]
  • 360-Safe-Internet-Security 360-Safe-Total-Security
    360-Safe-Internet-Security 360-Safe-Total-Security AVG-8.0 AVG-8.5 AVG-9.0 AVG-2011 AVG-2012 AVG-2013 AVG-2014 AVG-2015 AVG-2016 AVG-2017 AVG-2018 Ad-Aware-Antivirus-10 Authentium-Command-AV Authentium-Command-Anti-Malware-5.0 Avast Avast-Business-Security Avast-Endpoint-Protection-Suite Avast-Internet-Security Avast-Premier Avira-AntiVir Blink-AV BullGuard CA-Anti-Virus Carbon-Black-CB-Defense Check-Point-Endpoint-Security Cisco-AMP Cisco-CSA-AV ClamWin-AntiVirus Comodo-Antivirus CrowdStrike-Falcon Cylance-PROTECT Deep-Instinct-D-Client DrWeb ESET-Endpoint-Antivirus ESET-Endpoint-Security ESET-File-Security EZ-Trust Emsisoft-Anti-Malware Eset-NOD32 F-Prot F-Secure Faronics-Anti-Virus-Enterprise-Workstation FortiClient GDATA-AntiVirusKit GDATA-Internet-Security-2012 GDATA-Internet-Security-2013 GDATA-Total-Security-2012 GDATA-Total-Security-2013 GFI-Business-Agent GFI-Vipre-Internet-Security-2012 Grisoft-AVG K7-Total-Security Kaspersky Kaspersky-2016-Products Kaspersky-2017-Products Kaspersky-2018-Products Kaspersky-Anti-Virus-8-WSEE Kaspersky-Anti-Virus-2009 Kaspersky-Anti-Virus-2010 Kaspersky-Anti-Virus-2011 Kaspersky-Anti-Virus-2012 Kaspersky-Anti-Virus-2013 Kaspersky-Anti-Virus-2014 Kaspersky-Anti-Virus-2015 Kaspersky-Endpoint-Security-8 Kaspersky-Endpoint-Security-10 Kaspersky-Endpoint-Security-11 Kaspersky-Internet-Security Kaspersky-Internet-Security-2010 Kaspersky-Internet-Security-2011 Kaspersky-Internet-Security-2012 Kaspersky-Internet-Security-2013 Kaspersky-Internet-Security-2014 Kaspersky-Internet-Security-2015 Kaspersky-PURE
    [Show full text]
  • VB100 Certification Report June 2019
    JUNE 2019 Covering the global threat landscape VB100 CERTIFICATION REPORT For full details, we refer to the VB100 methodology on the Virus Bulletin website: https://www.virusbulletin.com/testing/ JUNE 2019 vb100/vb100-methodology/vb100-methodology-ver1-1/. This Martijn Grooten test used version 1.1 of the VB100 methodology. For more than two decades, Virus Bulletin has been testing anti-malware products, reporting on their performance as DIVERSITY TEST both the threat landscape and the products themselves have evolved, and has provided the VB100 certifi cation scheme The malware part of the VB100 certifi cation uses the as a mark of distinction for those products that live up to WildList, a regularly updated list of extremely well-vetted expectation. The VB100 logo is the ‘stamp of approval’ malware samples, guaranteed to have been spotted in the conferred on products that satisfy a minimum standard of wild multiple times. This makes them very suitable for a detecting malicious executables that have recently been certifi cation test like VB100. seen in the wild, while blocking few to no legitimate The ‘Diversity Test’ looks at products’ detection of programs. another set of recent malware samples, to acknowledge This report details the VB100 certifi cation of 34 the fact that products detect malware samples beyond a anti-malware products from 31 different vendors tested standard set of samples, and provides a measure of that during May and June 2019. detection. THE VB100 SET-UP PRODUCTS & RESULTS In the VB100 test, a copy of the product to be tested is Products were allowed to download updates during the installed on two platforms: Windows 10 and Windows 7.
    [Show full text]