BREACH DETECTION SYSTEMS COMPARATIVE ANALYSIS
|
|
- Iris Robbins
- 6 years ago
- Views:
Transcription
1 BREACH DETECTION SYSTEMS COMPARATIVE ANALYSIS Security Thomas Skybakmoen, Jason Pappalexis Tested Products AhnLab MDS Fidelis XPS Direct 1000 FireEye Web MPS 4310 and MPS 5300 Fortinet FortiSandbox 3000D Sourcefire (Cisco) Advanced Malware Protection 1 Trend Micro Deep Discovery Inspector Model 1000 Environment Breach Detection Systems: Test Methodology Sourcefire is now part of Cisco.
2 Overview Implementation of breach detection systems (BDS) can be a complex process with multiple factors affecting the overall security effectiveness of the solution. These should be considered over the course of the useful life of the solution, and include: 1. Detection rate 2. Device stability and reliability In order to determine the relative security effectiveness of devices on the market and facilitate accurate product comparisons, NSS Labs has developed a unique metric: Security Effectiveness = Detection Rate 2 x Stability & Reliability Figure 1 Security Effectiveness Formula By focusing on overall security effectiveness instead of the detection rate alone, NSS is able to factor in the ease with which defenses can be bypassed, as well as the reliability of the device. Product Detection Rate Stability & Reliability Security Effectiveness AhnLab MDS 94.7% 100% 94.7% Fidelis XPS Direct % 100% 98.4% FireEye Web MPS 4310 and MPS % 100% 94.5% Fortinet FortiSandbox 3000D 99.0% 100% 99.0% Sourcefire Advanced Malware Protection 99.0% 100% 99.0% Trend Micro Deep Discovery Inspector Model % 100% 99.1% Figure 2 Security Effectiveness Because enterprise users consider effective management to be a critical component of any enterprise security deployment, this also should be factored into total cost of ownership (TCO) and overall product selection. This is outside the scope of this report, however, for more information, refer to the TCO CAR. For a complete view of Security Effectiveness mapped against Value, refer to the Security Value Map (SVM) CAR. As part of the initial BDS test setup devices are configured/tuned as deemed necessary by the vendor. Every effort is made to deploy policies that ensure the optimal combination of security effectiveness and performance, as would be the aim of a typical customer deploying the device in a live network environment. This provides readers with the most useful information on key BDS security effectiveness and performance capabilities based upon their expected usage. This chart depicts the relationship between protection and performance when tuned policies are used. Farther up indicates better security effectiveness, and farther to the right indicates higher throughput. The maximum throughput shown is the first stage at which one or more attacks are not detected. 2 Detection Rate is defined as the number of malware detected under test within the 48- hour window.
3 100%' Trend'Micro'Deep'Discovery'Inspector' Model'1000' ) 99%' ForAnet'ForASandbox'3000D' Sourcefire'Advanced'Malware'ProtecAon' Security)Effec,veness) 98%' 97%' 96%' Fidelis'XPS 'Direct'1000' 95%' FireEye'Web'MPS'4310' and' 'mps'5300' AhnLab'MDS' 94%' 500' 600' 700' 800' 900' 1,000' 1,100' 1,200' NSS1Tested)Throughput)(Mbps)) Figure 3 Security Effectiveness and Performance When selecting products, those along the top line of the chart (closer to 100% security effectiveness) should be prioritized. The throughput is a secondary consideration and will be dependent on enterprise- specific deployment requirements.
4 Table of Contents Tested Products... 1 Environment... 1 Overview... 2 Analysis... 5 Tuning... 5 Detection Rate... 5 Malware Delivered over HTTP... 6 Malware Delivered over E- mail... 6 Malware Delivered by Exploits... 7 False Positive... 7 Stability & Reliability... 8 Security Effectiveness... 8 Contact Information... 9 Table of Figures Figure 1 Security Effectiveness Formula... 2 Figure 2 Security Effectiveness... 2 Figure 3 Security Effectiveness and Performance... 3 Figure 4 Malware Delivered over HTTP... 6 Figure 5 Malware Delivered over E- mail... 6 Figure 6 Malware Delivered using Exploits... 7 Figure 7 False Positive... 7 Figure 8 Stability and Reliability... 8 Figure 9 Security Effectiveness... 8
5 Analysis The threat landscape is evolving constantly; attackers are refining their strategies and increasing both the volume and intelligence of their attacks. Enterprises now must defend against targeted persistent attacks (TPA). In the past, servers were the main target; attacks against desktop client applications are now mainstream and present a clear danger to organizations. Through constant analysis of suspicious code and identification of communications with malicious hosts, breach detection systems claim to providing enhanced detection of advanced malware, zero- day and targeted attacks that could bypass traditional defenses. Tuning Security products are often complex, and vendors are responding by simplifying the user interface and security policy selection to meet the usability needs of a broadening user base. Indeed, many organizations accept and deploy the default settings, understanding these to be the best recommendations from the vendor. NSS research has found that BDS systems often require little or no tuning. In fact, several vendors come with little or no tuning options as standard. However, where possible all BDS products are tuned prior to testing to eliminate false positives and provide the most appropriate coverage for the systems to be protected. Typically, tuning is carried out by experienced system engineers from the vendor company, but where this is not possible, NSS engineers will perform the necessary tuning. NSS engineers may also amend the configuration of a device under test (DUT), where specific characteristics of the DUT or its configuration interfere with the normal operation of any of the tests, or where the results obtained from those tests would, in the opinion of those engineers, misrepresent the true capabilities of the DUT. Every effort is made to ensure the optimal combination of security effectiveness and performance, as would be the aim of a typical customer deploying the DUT in a live network environment. Detection Rate NSS security effectiveness testing leverages the deep expertise of our engineers to generate the same types of attacks used by modern cyber criminals, utilizing multiple commercial, open source, and proprietary tools as appropriate. With over 1800 live exploits and malware samples, this is the industry s most comprehensive test to date. Most notable, all of the live exploits in these tests have been validated such that: A reverse shell is returned A bind shell is opened on the target allowing the attacker to execute arbitrary commands A malicious payload is installed The system is rendered unresponsive 5
6 Malware Delivered over HTTP Figure 4 depicts how each product was able to detect socially engineered malware using the HTTP protocol as its transport mechanism, i.e., it is downloaded through a web browser. 0%% 10%% 20%% 30%% 40%% 50%% 60%% 70%% 80%% 90%% 100%% AhnLab%MDS% Fidelis%XPS %Direct%1000% 97.7%% FireEye%Web%MPS%4310%and% %MPS%5300% 95.1%% ForHnet%ForHSandbox%3000D% 98.7%% Sourcefire%Advanced%Malware%ProtecHon% 98.7%% Trend%Micro%Deep%Discovery%Inspector%Model%1000% 97.3%% Trend%Micro%Deep% Discovery%Inspector% Model%1000% 97.3%% Sourcefire%Advanced% Malware%ProtecHon% ForHnet%ForHSandbox% 3000D% FireEye%Web%MPS%4310% and% %mps%5300% Fidelis%XPS %Direct%1000% AhnLab%MDS% Malware%Delivered%over%HTTP% 98.7%% 98.7%% 95.1%% 97.7%% Figure 4 Malware Delivered over HTTP Malware Delivered over E- mail Figure 5 depicts how each product was able to detect socially engineered malware that uses (SMTP/IMAP) as its transport mechanism; for example, a malicious attachment. 0%& 10%& 20%& 30%& 40%& 50%& 60%& 70%& 80%& 90%& 100%& AhnLab&MDS& 94.0%& Fidelis&XPS &Direct&1000& 97.6%& FireEye&Web&MPS&4310&and& &MPS&5300& 96.0%& ForHnet&ForHSandbox&3000D& 98.4%& Sourcefire&Advanced&Malware&ProtecHon& 98.4%& Trend&Micro&Deep&Discovery&Inspector&Model&1000& 100.0%& Trend&Micro&Deep& Discovery&Inspector& Model&1000& Sourcefire&Advanced& Malware&ProtecHon& ForHnet&ForHSandbox& 3000D& FireEye&Web&MPS&4310& Fidelis&XPS &Direct&1000& and& &mps&5300& AhnLab&MDS& Malware&Delivered&over&EQmail& 100.0%& 98.4%& 98.4%& 96.0%& 97.6%& 94.0%& Figure 5 Malware Delivered over E- mail 6
7 Malware Delivered by Exploits Figure 6 depicts how each product was able to detect malware delivered by exploits. Exploits are defined as malicious software that is designed to take advantage of an existing deficiency in a hardware or software system, be it a vulnerability or a bug. 0%% 10%% 20%% 30%% 40%% 50%% 60%% 70%% 80%% 90%% 100%% AhnLab%MDS% 90.0%% Fidelis%XPS %Direct%1000% FireEye%Web%MPS%4310%and% %MPS%5300% 92.5%% ForHnet%ForHSandbox%3000D% Sourcefire%Advanced%Malware%ProtecHon% Trend%Micro%Deep%Discovery%Inspector%Model%1000% Trend%Micro%Deep% Discovery%Inspector% Model%1000% Sourcefire%Advanced% Malware%ProtecHon% ForHnet%ForHSandbox% 3000D% FireEye%Web%MPS%4310% and% %mps%5300% Fidelis%XPS %Direct%1000% AhnLab%MDS% Malware%Delivered%by%Exploits% 92.5%% 90.0%% Figure 6 Malware Delivered using Exploits False Positive The ability of the product to identify and pass legitimate traffic while maintaining detection of threats and breaches is as important as detection rate alone. There is commonly a trade- off between detection accuracy and performance; a product s detection accuracy should be evaluated within the context of its performance and vice versa. For more information, please refer to the Comparative Analysis Performance on Figure 7 shows the results of this test. Product % False Positive Samples Detected AhnLab MDS 7% Fidelis XPS Direct % FireEye Web MPS 4310 and MPS % Fortinet FortiSandbox 3000D 0% Sourcefire Advanced Malware Protection 0% Trend Micro Deep Discovery Inspector Model % Figure 7 False Positive 7
8 Stability & Reliability Long- term stability is particularly important for an in- line device, where failure can produce network outages. These tests verify the stability of the DUT along with its ability to maintain security effectiveness while under normal load and while passing malicious traffic. Products that are not able to sustain legitimate traffic (or that crash) while under hostile attack will not pass. The DUT is required to remain operational and stable throughout these tests, and it is required to operate at 100% scanning capability, raising an alert for each detection. If any malicious traffic passes undetected, caused by either the volume of traffic or by the BDS failing for any reason, this will result in a FAIL. Product Detection Under Extended Attack Attack Detection - Normal Load Protocol Fuzzing and Mutation Detection Ports Protocol Fuzzing and Mutation Management Port Power Fail Redundancy Persistence of Data AhnLab MDS PASS PASS PASS PASS PASS PASS PASS Fidelis XPS Direct 1000 PASS PASS PASS PASS PASS PASS PASS FireEye Web MPS 4310 and MPS 5300 PASS PASS PASS PASS PASS PASS PASS Fortinet FortiSandbox 3000D PASS PASS PASS PASS PASS PASS PASS Sourcefire Advanced Malware Protection Trend Micro Deep Discovery Inspector Model 1000 PASS PASS PASS PASS PASS PASS PASS PASS PASS PASS PASS PASS PASS PASS Figure 8 Stability and Reliability Security Effectiveness The security effectiveness of a device is determined by factoring the results of stability & reliability testing into the detection rate. Figure 9 depicts the security effectiveness of each device. Product Detection Rate Stability & Reliability Security Effectiveness AhnLab MDS 94.7% 100% 94.7% Fidelis XPS Direct % 100% 98.4% FireEye Web MPS 4310 and MPS % 100% 94.5% Fortinet FortiSandbox 3000D 99.0% 100% 99.0% Sourcefire Advanced Malware Protection 99.0% 100% 99.0% Trend Micro Deep Discovery Inspector Model % 100% 99.1% Figure 9 Security Effectiveness 8
9 Test Methodology Breach Detection Systems: Test Methodology 1.5 A copy of the test methodology is available on the NSS Labs website at Contact Information NSS Labs, Inc. 206 Wild Basin Rd Building A, Suite 200 Austin, TX (512) info@nsslabs.com This and other related documents available at: To receive a licensed copy or report misuse, please contact NSS Labs at +1 (512) or sales@nsslabs.com 2014 NSS Labs, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the authors. Please note that access to or use of this report is conditioned on the following: 1. The information in this report is subject to change by NSS Labs without notice. 2. The information in this report is believed by NSS Labs to be accurate and reliable at the time of publication, but is not guaranteed. All use of and reliance on this report are at the reader s sole risk. NSS Labs is not liable or responsible for any damages, losses, or expenses arising from any error or omission in this report. 3. NO WARRANTIES, EXPRESS OR IMPLIED ARE GIVEN BY NSS LABS. ALL IMPLIED WARRANTIES, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON- INFRINGEMENT ARE DISCLAIMED AND EXCLUDED BY NSS LABS. IN NO EVENT SHALL NSS LABS BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL OR INDIRECT DAMAGES, OR FOR ANY LOSS OF PROFIT, REVENUE, DATA, COMPUTER PROGRAMS, OR OTHER ASSETS, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 4. This report does not constitute an endorsement, recommendation, or guarantee of any of the products (hardware or software) tested or the hardware and software used in testing the products. The testing does not guarantee that there are no errors or defects in the products or that the products will meet the reader s expectations, requirements, needs, or specifications, or that they will operate without interruption. 5. This report does not imply any endorsement, sponsorship, affiliation, or verification by or with any organizations mentioned in this report. 6. All trademarks, service marks, and trade names used in this report are the trademarks, service marks, and trade names of their respective owners. 9
ENTERPRISE ENDPOINT COMPARATIVE REPORT
ENTERPRISE ENDPOINT COMPARATIVE REPORT SECURITY STACK: EXPLOITS Authors Randy Abrams, Thomas Skybakmoen Tested Products Bitdefender Endpoint Security v5.3 ESET Endpoint Antivirus v6.1 Fortinet FortiClient
More informationDATA CENTER IPS COMPARATIVE ANALYSIS
DATA CENTER IPS COMPARATIVE ANALYSIS Performance 2014 Jason Pappalexis, Thomas Skybakmoen Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview Implementation
More informationNEXT GENERATION FIREWALL. Tested Products. Environment. SonicWall Security Value Map (SVM) JULY 11, 2017 Author Thomas Skybakmoen
NEXT GENERATION FIREWALL SonicWall Security Value Map (SVM) JULY 11, 2017 Author Thomas Skybakmoen Tested Products NGFW Group Test: SonicWall NSA 6600 SonicOS Enhanced 6.2.5.10-70n Dynamic signature database
More informationADVANCED ENDPOINT PROTECTION TEST REPORT
ADVANCED ENDPOINT PROTECTION TEST REPORT SentinelOne Endpoint Protection Platform v1.8.3#31 FEBRUARY 14, 2017 Authors Thomas Skybakmoen, Morgan Dhanraj Overview NSS Labs performed an independent test of
More informationBREACH DETECTION SYSTEM PRODUCT ANALYSIS
BREACH DETECTION SYSTEM PRODUCT ANALYSIS Sourcefire (Cisco) Advanced Malware Protection 1 v4.5.2 Bhaarath Venkateswaran, Jayendra Pathak, Ahmed Garhy, Ryan Liles 1 Sourcefire is now part of Cisco. Overview
More informationWEB APPLICATION FIREWALL COMPARATIVE ANALYSIS
WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS Performance Author Thomas Skybakmoen Tested Products Barracuda Networks Web Application Firewall 960 Citrix NetScaler AppFirewall MPX 11520 Fortinet FortiWeb
More informationTHREAT ISOLATION TECHNOLOGY PRODUCT ANALYSIS
THREAT ISOLATION TECHNOLOGY PRODUCT ANALYSIS v1.1.0.3568 2013 Jayendra Pathak, Ken Baylor, Ph.D Overview NSS Labs performed an independent test of the 1.1.0.3568 threat isolation technology. The product
More informationNEXT GENERATION FIREWALL COMPARATIVE REPORT
NEXT GENERATION FIREWALL COMPARATIVE REPORT Security Value Map (SVM) Authors Thomas Skybakmoen, Christopher Conrad Tested Products Barracuda Networks F600.E20 v6.1.1-071 Check Point Software Technologies
More informationTEST METHODOLOGY. SSL/TLS Performance. v1.0
TEST METHODOLOGY SSL/TLS Performance v1.0 Table of Contents 1 Introduction... 3 1.1 The Need for SSL/TLS Performance Testing... 3 1.2 About This Test Methodology... 3 1.3 Inclusion Criteria... 3 2 SSL/TLS
More informationADVANCED ENDPOINT PROTECTION COMPARATIVE REPORT
ADVANCED ENDPOINT PROTECTION COMPARATIVE REPORT Total Cost of Ownership () MARCH 10, 2017 Authors Jason Brvenik, Thomas Skybakmoen, Morgan Dhanraj Tested Products Carbon Black Cb Protection v7.2.3.3106
More informationCONSUMER EPP COMPARATIVE ANALYSIS
CONSUMER EPP COMPARATIVE ANALYSIS Socially Engineered Malware Randy Abrams, Jayendra Pathak, Mohamed Saher, Ahmed Garhy Tested Vendors AVG, F- Secure, Kaspersky, McAfee, Microsoft, Symantec, Trend Micro
More informationQuick Start Guide for Administrators and Operators Cyber Advanced Warning System
NSS Labs Quick Start Guide for Administrators and Operators Cyber Advanced Warning System Introduction to the Cyber Advanced Warning System and RiskViewer... 1 Activating Your Account... 2 Adding a New
More informationCONSUMER AV / EPP COMPARATIVE ANALYSIS
CONSUMER AV / EPP COMPARATIVE ANALYSIS Exploits Evasion Defenses 2012 Randy Abrams, Nathan Taylor Tested Vendors Avast, AVG, Avira, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Norton, Panda,
More informationTEST METHODOLOGY. Breach Detection Systems (BDS) v5.0 MARCH 5, 2018
TEST METHODOLOGY Breach Detection Systems (BDS) MARCH 5, 2018 v5.0 Table of Contents 1 Introduction... 3 1.1 The Need for Breach Detection... 3 1.2 About This Test Methodology... 3 1.3 Inclusion Criteria...
More informationTEST METHODOLOGY. Breach Detection Systems (BDS) v3.0
TEST METHODOLOGY Breach Detection Systems (BDS) v3.0 Table of Contents 1 Introduction... 4 1.1 The Need for Breach Detection... 4 1.2 About This Test Methodology... 4 1.3 Inclusion Criteria... 5 1.4 Deployment...
More informationThey Call It Stormy Monday
ANALYST BRIEF They Call It Stormy Monday MOVE TO THE CLOUD REQUIRES FULL LIFE CYCLE MANAGEMENT Author Rob Ayoub Overview The revelation on September 17, 2013 that the cloud storage company Nirvanix would
More informationTEST METHODOLOGY. Virtual Firewall. v2.1 MARCH 13, 2017
TEST METHODOLOGY Virtual Firewall MARCH 13, 2017 v2.1 Table of Contents 1 Introduction... 4 1.1 The Need for Virtual Firewalls... 4 1.2 About This Test Methodology... 4 1.3 Inclusion Criteria... 5 2 Product
More informationBREACH DETECTION SYSTEMS TEST REPORT
BREACH DETECTION SYSTEMS TEST REPORT Lastline Enterprise v7.10 Authors Dipti Ghimire, Jessica Williams, Ahmed Garhy Overview NSS Labs performed an independent test of the Lastline Enterprise v7.10. The
More informationMaturing VARs Offer New Outsourcing Option
ANALYST BRIEF Maturing VARs Offer New Outsourcing Option VALUE- ADDED RESELLERS SHIFT TO OFFERING MANAGED SECURITY SERVICES Author Rob Ayoub Overview Security equipment vendors have found managed security
More informationTEST METHODOLOGY. Breach Detection Systems (BDS) v4.0
TEST METHODOLOGY Breach Detection Systems (BDS) v4.0 Table of Contents 1 Introduction... 3 1.1 The Need for Breach Detection... 3 1.2 About This Test Methodology... 3 1.3 Inclusion Criteria... 4 1.4 Deployment...
More informationKemp Technologies LM-3600 IPv4 and IPv6 Performance Report
Kemp Technologies LM-3600 IPv4 and IPv6 Performance Report A Broadband-Testing Report By Steve Broadhead, Founder & Director, BB-T First published April 2012 (V1.0) Published by Broadband-Testing A division
More informationAdvanced Malware Protection. Dan Gavojdea, Security Sales, Account Manager, Cisco South East Europe
Advanced Malware Protection Dan Gavojdea, Security Sales, Account Manager, Cisco South East Europe How would you do security differently if you knew you were going to be hacked? Security Challenges Changing
More informationCAWS CONTINUOUS SECURITY VALIDATION PLATFORM API GUIDE VERSION 3.0
CAWS CONTINUOUS SECURITY VALIDATION PLATFORM API GUIDE VERSION 3.0 Version 3.3, 10/6/2017 NSS Labs, Inc. 206 Wild Basin Road Building A, Suite 200 Austin, TX 78746 US info@nsslabs.com www.nsslabs.com 2017
More informationMarket Analysis. Overview 2013 INTRUSION PREVENTION SYSTEMS. Authors: Rob Ayoub, Andrew Braunberg, Jason Pappalexis
Market Analysis 2013 INTRUSION PREVENTION SYSTEMS Authors: Rob Ayoub, Andrew Braunberg, Jason Pappalexis Overview Prior to 2013, the intrusion prevention system (IPS) market was viewed as heading towards
More informationNEXT GENERATION INTRUSION PREVENTION SYSTEM (NGIPS) TEST REPORT
NEXT GENERATION INTRUSION PREVENTION SYSTEM (NGIPS) TEST REPORT Trend Micro TippingPoint 7500NX v3.8.4.4525 Tuned Policy SEPTEMBER 28, 2016 Author Tim Otto Overview NSS Labs performed an independent test
More informationHYCU SCOM Management Pack for F5 BIG-IP
HYCU SCOM Management Pack for F5 BIG-IP Product version: 5.3 Product release date: March 2018 Document edition: Second Legal notices Copyright notice 2015-2018 HYCU. All rights reserved. This document
More informationDBAM Systems EP60 Test Executive Summary
Test Executive Summary A Broadband-Testing Report First published February 2007 (V1.0) Published by Broadband-Testing La Calade, 11700 Moux, Aude, France Tel : +33 (0)4 68 43 99 70 Fax : +33 (0)4 68 43
More informationTEST METHODOLOGY. Data Center Firewall. v2.2
TEST METHODOLOGY Data Center Firewall v2.2 Table of Contents 1 Introduction... 4 1.1 The Need for Firewalls in the Data Center... 4 1.2 About This Test Methodology... 4 1.3 Inclusion Criteria... 5 2 Product
More informationCAWS CYBER THREAT PROTECTION PLATFORM API GUIDE. Version 2.3
CAWS CYBER THREAT PROTECTION PLATFORM API GUIDE Version 2.3 Version 2.3, 6/29/2017 NSS Labs, Inc. 206 Wild Basin Road Building A, Suite 200 Austin, TX 78746 US info@nsslabs.com www.nsslabs.com 2017 NSS
More informationNEXT GENERATION INTRUSION PREVENTION SYSTEM (NGIPS) TEST REPORT
NEXT GENERATION INTRUSION PREVENTION SYSTEM (NGIPS) TEST REPORT Check Point Software Technologies, Ltd. 13800 Next Generation Firewall Appliance vr77.20 Recommended Policy SEPTEMBER 22, 2016 Author Tim
More informationThe Forcepoint NGFW should be on every company s short list.
Dear Sir/Madam, I m very excited to tell you that for the fifth straight test, Forcepoint Next Generation Firewall (NGFW) achieved NSS Labs Recommended rating - the highest level possible! More NSS Labs
More informationTEST METHODOLOGY. Breach Prevention Systems (BPS) V2.0 MARCH 5, 2018
TEST METHODOLOGY Breach Prevention Systems (BPS) MARCH 5, 2018 V2.0 Table of Contents 1 Introduction... 4 1.1 The Need for Breach Prevention... 4 1.2 About This Test Methodology... 4 1.3 Inclusion Criteria...
More informationSKD Labs Test Report. A Comparative Test on Anti-Malware Products in the China Region
Test Report 2013 No.3 A Comparative Test on Anti-Malware Products in the China Region SKD Labs is a leading independent testing facility in the China market and specializes in functionality testing, performance
More informationTEST METHODOLOGY. Wireless Networking. v1.0 DECEMBER 5, 2016
TEST METHODOLOGY Wireless Networking DECEMBER 5, 2016 v1.0 Table of Contents 1 Introduction... 4 1.1 The Need for Wireless Networking... 4 1.2 About This Test Methodology and Report... 4 1.3 Inclusion
More informationAchieve deeper network security
Achieve deeper network security SonicWall next-generation firewalls Abstract Next-generation firewalls (NGFWs) have become the new norm in network security for organizations of all sizes. Unlike their
More informationSUPPORT MATRIX. HYCU OMi Management Pack for Citrix
HYCU OMi Management Pack for Citrix : 2.0 Product release date: October 2017 Document release data: April 2018 Legal notices Copyright notice 2014-2018 HYCU. All rights reserved. This document contains
More informationCAWS CONTINUOUS SECURITY VALIDATION PLATFORM API GUIDE VERSION 3.0
CAWS CONTINUOUS SECURITY VALIDATION PLATFORM API GUIDE VERSION 3.0 Version 3.0, 7/17/2017 NSS Labs, Inc. 206 Wild Basin Road Building A, Suite 200 Austin, TX 78746 US info@nsslabs.com www.nsslabs.com 2017
More informationEXECUTIVE BRIEF: WHY NETWORK SANDBOXING IS REQUIRED TO STOP RANSOMWARE
EXECUTIVE BRIEF: WHY NETWORK SANDBOXING IS REQUIRED TO STOP RANSOMWARE Why you need to use sandboxing as well as signatures and heuristics Abstract Next-gen firewalls leverage signatures and heuristics
More informationSONICWALL SECURITY HEALTH CHECK SERVICE
SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service is designed to provide customers
More informationAdvanced Endpoint Protection
BEST PRACTICES Advanced Endpoint Protection ENTERPRISE SELF-TESTING BEST PRACTICES PUBLISH DATE TBD Author NSS Labs Overview Security effectiveness refers to the ability of security devices to respond
More informationIT S NOT ABOUT THE 98 PERCENT YOU CATCH, IT S ABOUT THE 2 PERCENT YOU MISS.
ANALYST BRIEF Cyber Resilience IT S NOT ABOUT THE 98 PERCENT YOU CATCH, IT S ABOUT THE 2 PERCENT YOU MISS. Authors Bob Walder, Chris Morales Overview Where the goal of cyberprevention has been to reduce
More informationTerms of Use. Changes. General Use.
Terms of Use THESE TERMS AND CONDITIONS (THE TERMS ) ARE A LEGAL CONTRACT BETWEEN YOU AND SPIN TRANSFER TECHNOLOGIES ( SPIN TRANSFER TECHNOLOGIES, STT, WE OR US ). THE TERMS EXPLAIN HOW YOU ARE PERMITTED
More informationSecuring Your Environment with Dell Client Manager and Symantec Endpoint Protection
Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Altiris, Now Part of Symantec Copyright 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
More informationEU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux
EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider
More informationPRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT
PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 12/20/17 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of
More informationMERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS
MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS Introduction This document sets forth the terms and conditions ("Terms and Conditions") governing your use of the MeridianHealth.com Web site ("Web Site")
More informationSUPPORT MATRIX. Comtrade OMi Management Pack for Citrix
Comtrade OMi Management Pack for Citrix : 2.0 Product release date: December 2016 Document release date: July 2017 Legal notices Copyright notice 2017 Comtrade Software. All rights reserved. This document
More informationROBOCYBERWALL INC. External Penetration Test Report. September 13, 2017
ROBOCYBERWALL INC. September 13, 2017 Presented To: John Martinson Jr RoboCyberWall Inc. 5555 Del Monte Dr, Unit 2004 Houston, Texas 77056 admin@robocyberwall.com 713.589.2537 Submitted By: Jules Carter
More informationKeeping the Doors Open and the Lights On
ANALYST BRIEF Keeping the Doors Open and the Lights On PROTECTING AGAINST DISTRIBUTED DENIAL- OF- SERVICE ATTACKS Authors Rob Ayoub and David DeSanto Overview Over the past decade, the threat landscape
More informationMeeting PCI DSS 3.2 Compliance with RiskSense Solutions
Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business
More informationSOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM
SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM OVERVIEW The Verizon 2016 Data Breach Investigations Report highlights that attackers are regularly outpacing the defenders.
More informationTERMS & CONDITIONS. Complied with GDPR rules and regulation CONDITIONS OF USE PROPRIETARY RIGHTS AND ACCEPTABLE USE OF CONTENT
TERMS & CONDITIONS www.karnevalkings.com (the "Site") is a website and online service owned and operated by the ViisTek Media group of companies (collectively known as "Karnevalkings.com", "we," "group",
More informationPolicies & Medical Disclaimer
Policies & Medical Disclaimer Money Back Guarantee Heather Woodruff Nutrition proudly stands behind its programs. To help you feel comfortable we offer a Money-Back Guarantee* If you are not absolutely
More informationHUAWEI TECHNOLOGIES CO., LTD. Huawei FireHunter6000 series
HUAWEI TECHNOLOGIES CO., LTD. Huawei 6000 series Huawei 6000 series can detect APT (Advanced Persistent Threat) attacks, which altogether exploit multiple techniques (including zero-day vulnerabilities
More informationCisco Advanced Malware Protection (AMP) for Endpoints Security Testing
Cisco Advanced Malware Protection (AMP) for Endpoints Security Testing 7 September 2018 DR180821E Miercom.com www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Test Summary... 4 3.0 Product Tested...
More information10 ways to securely optimize your network. Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control
10 ways to securely optimize your network Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control Table of Contents Secure network optimization 3 #1. Application
More informationAvast Customer & Technical Support Policy
Avast Customer & Technical Support Policy PLEASE READ THE TERMS AND CONDITIONS OF THIS SUPPORT POLICY ( SUPPORT POLICY ). THIS SUPPORT POLICY IS PROVIDED BY AVAST SOFTWARE s.r.o., A COMPANY DULY ORGANIZED
More informationWireless Clients and Users Monitoring Overview
Wireless Clients and Users Monitoring Overview Cisco Prime Infrastructure 3.1 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT
More informationLOGO LICENSE AGREEMENT(S) CERTIPORT AND IC³
LOGO LICENSE AGREEMENT(S) CERTIPORT AND IC³ EXHIBIT B-2 LICENSEE: Address: Attention: Phone: Fax: Email: Account #: CERTIPORT LOGO LICENSE AGREEMENT Authorized Testing Centers This Logo License Agreement
More informationBCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding)
BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding) CLAUSE 13 ON-LINE BIDDING 13.1 ON-LINE BIDDING.1 Definitions: Owner means the party and/or their agent designated to receive on-line
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More informationCALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS
CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS INTRODUCTION: Before the California State Teachers Retirement System (hereinafter "CalSTRS," "We," or "Us") will provide services found at mycalstrs.com (the
More informationAnti-Virus Comparative. Factsheet Business Test (August-September 2018) Last revision: 11 th October
Anti-Virus Comparative Factsheet Business Test Language: English August-September 2018 Last revision: 11 th October 2018 https:// - 1 - Introduction This is a short fact sheet for our Business Main-Test
More informationTERMS OF USE Effective Date: January 1, 2015 To review material modifications and their effective dates scroll to the bottom of the page. 1.Parties.
TERMS OF USE Effective Date: January 1, 2015 To review material modifications and their effective dates scroll to the bottom of the page. 1.Parties. The parties to these Terms of Use are you, and the owner
More informationNEXT GENERATION FIREWALL PRODUCT ANALYSIS
NEXT GENERATION FIREWALL PRODUCT ANALYSIS Cisco FirePOWER 8350 v5.3 Authors Ryan Liles, Christopher Conrad Overview NSS Labs performed an independent test of the Cisco FirePOWER 8350 v5.3. The product
More informationKaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia
Kaspersky Cloud Security for Hybrid Cloud Diego Magni Presales Manager Kaspersky Lab Italia EXPERTISE 1/3 of our employees are R&D specialists 323,000 new malicious files are detected by Kaspersky Lab
More information4. Save as expressly set out herein no license is granted in respect of any intellectual property rights vested in F1000 or other third parties.
Legal information The website F1000.com is operated by Faculty of 1000 Limited, a company registered in England and Wales with Company Number 3739756, with registered offices at Middlesex House, 34-42
More informationTEST METHODOLOGY. Next Generation Intrusion Prevention System (NGIPS) V4.0 FEBRUARY 2, 2018
TEST METHODOLOGY Next Generation Intrusion Prevention System (NGIPS) FEBRUARY 2, 2018 V4.0 Table of Contents 1 Introduction... 4 1.1 The Need for Next Generation Intrusion Prevention Systems... 4 1.2 About
More informationCommercial Product Matrix
PRODUCT MATRIX 1H2016 FOR INTERNAL USE ONLY Trend Micro Commercial Product Matrix SELLING TREND MICRO SECURITY SOLUTIONS Small Business or /Medium Business? < 100 Users > 100 Users Trend Micro Customer
More information1. License Grant; Related Provisions.
IMPORTANT: READ THIS AGREEMENT CAREFULLY. THIS IS A LEGAL AGREEMENT BETWEEN AVG TECHNOLOGIES CY, Ltd. ( AVG TECHNOLOGIES ) AND YOU (ACTING AS AN INDIVIDUAL OR, IF APPLICABLE, ON BEHALF OF THE INDIVIDUAL
More informationSecurity Advisory Relating to the Speculative Execution Vulnerabilities with some microprocessors
SECURITY ADVISORY Processor based Speculative Execution Vulnerabilities AKA Spectre and Meltdown Version 1.6 Security Advisory Relating to the Speculative Execution Vulnerabilities with some microprocessors
More informationInternet Scanner 7.0 Service Pack 2 Frequently Asked Questions
Frequently Asked Questions Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions April 2005 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Internet Security Systems (ISS)
More informationSecurity Advisory Relating to the Speculative Execution Vulnerabilities with some microprocessors
SECURITY ADVISORY Processor based Speculative Execution Vulnerabilities AKA Spectre and Meltdown Version 1.4 Security Advisory Relating to the Speculative Execution Vulnerabilities with some microprocessors
More informationThe Top 6 WAF Essentials to Achieve Application Security Efficacy
The Top 6 WAF Essentials to Achieve Application Security Efficacy Introduction One of the biggest challenges IT and security leaders face today is reducing business risk while ensuring ease of use and
More informationRelease Information. Revision History. Version: build 018 Release Date: 23 rd November 2011
Version: 02.00.2 build 018 Release Date: 23 rd November 2011 Release Date Version 02.00.2 Build 018 23 rd November 2011 Release Information Release Type: General Availability Supported Cyberoam Versions:
More informationThese terms and conditions outline the rules and regulations for the use of Duxbury Networking's Website.
Welcome to Duxbury Networking! Introduction These terms and conditions outline the rules and regulations for the use of Duxbury Networking's Website. Duxbury Networking is located at: Block 1 Riviera Office
More informationInformation Security Specialist. IPS effectiveness
Information Security Specialist IPS effectiveness IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions An Intrusion Prevention System (IPS) is a critical layer of
More informationCyberArk Privileged Threat Analytics
CyberArk Privileged Threat Analytics Table of Contents The New Security Battleground: Inside Your Network 3 Privileged account security 3 Collect the right data 4 Detect critical threats 5 Alert on critical
More informationeguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments
eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments Today s PCI compliance landscape is one of continuing change and scrutiny. Given the number
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationAgile Security Solutions
Agile Security Solutions Piotr Linke Security Engineer CISSP CISA CRISC CISM Open Source SNORT 2 Consider these guys All were smart. All had security. All were seriously compromised. 3 The Industrialization
More informationTEST METHODOLOGY. Next Generation Intrusion Prevention System (NGIPS) v2.0
TEST METHODOLOGY Next Generation Intrusion Prevention System (NGIPS) v2.0 Table of Contents 1 Introduction... 4 1.1 The Need for Next Generation Intrusion Prevention Systems... 4 1.2 About This Test Methodology...
More informationRSA NetWitness Suite Respond in Minutes, Not Months
RSA NetWitness Suite Respond in Minutes, Not Months Overview One can hardly pick up a newspaper or turn on the news without hearing about the latest security breaches. The Verizon 2015 Data Breach Investigations
More informationIPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions
IPS Effectiveness IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions An Intrusion Prevention System (IPS) is a critical layer of defense that helps you protect
More informationENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE
ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE TABLE OF CONTENTS Overview...3 A Multi-Layer Approach to Endpoint Security...4 Known Attack Detection...5 Machine Learning...6 Behavioral Analysis...7 Exploit
More informationOCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA)
OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA) This is a License Agreement (the "Agreement") for certain code (the Software ) owned by Akamai Technologies, Inc. ( Akamai ) that is useful in connection
More informationAdvanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector
Advanced Threat Defense Certification Testing Report Trend Micro Deep Discovery Inspector ICSA Labs Advanced Threat Defense July 12, 2016 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg,
More informationWired Network Summary Data Overview
Wired Network Summary Data Overview Cisco Prime Infrastructure 3.1 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE.
More informationCorrelation and Phishing
A Trend Micro Research Paper Email Correlation and Phishing How Big Data Analytics Identifies Malicious Messages RungChi Chen Contents Introduction... 3 Phishing in 2013... 3 The State of Email Authentication...
More informationINCLUDING MEDICAL ADVICE DISCLAIMER
Jordan s Guardian Angels Terms and Conditions of Use INCLUDING MEDICAL ADVICE DISCLAIMER Your use of this website and its content constitutes your agreement to be bound by these terms and conditions of
More informationBarracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper
Barracuda Advanced Threat Protection Bringing a New Layer of Security for Email White Paper Evolving Needs for Protection Against Advanced Threats IT security threats are constantly evolving and improving,
More informationBlackBerry Enterprise Server Express for Microsoft Exchange
BlackBerry Enterprise Server Express for Microsoft Exchange Compatibility Matrix March 25, 2013 2013 Research In Motion Limited. All rights reserved. www.rim.com Page: 1 Operating Systems: BlackBerry Enterprise
More informationBlackBerry Java Development Environment (JDE)
1 BlackBerry Java Applications for Accessing SAP Applications BlackBerry Java Development Environment The BlackBerry Java Development Environment (JDE) is a fully integrated development and simulation
More informationPC SECURITY LABS COMPARATIVE TEST. Microsoft Office. Flash. August Remote code execution exploit. mitigations for popular applications
August 2014 PC SECURITY LABS COMPARATIVE TEST Remote code execution exploit mitigations for popular applications Microsoft Office Flash Silverlight QuickTime Internet Explorer Java Adobe Content 1. BACKGROUND...2
More informationHealthfirst Website Privacy Policy
Healthfirst Website Privacy Policy We value your relationship with us and have detailed our privacy objectives for our website below. Please be sure to read this notice as it covers the terms and conditions
More informationWindows Security Updates for August (MS MS06-051)
Windows Security Updates for August 2006 - (MS06-040 - MS06-051) Original Release Date: August 8, 2006 Last Revised: November 22, 2006 Number: ASA-2006-154 Risk Level: High Advisory Version: 3.0 Advisory
More informationPrivileged Account Security: A Balanced Approach to Securing Unix Environments
Privileged Account Security: A Balanced Approach to Securing Unix Environments Table of Contents Introduction 3 Every User is a Privileged User 3 Privileged Account Security: A Balanced Approach 3 Privileged
More informationTrend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data
Trend Micro Deep Discovery for Education Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data 1 Computers, the Internet, and portable devices are now
More informationHYCU SCOM Management Pack for F5 BIG-IP
USER GUIDE HYCU SCOM Management Pack for F5 BIG-IP Product version: 5.5 Product release date: August 2018 Document edition: First Legal notices Copyright notice 2015-2018 HYCU. All rights reserved. This
More informationStreaming Prevention in Cb Defense. Stop malware and non-malware attacks that bypass machine-learning AV and traditional AV
Streaming Prevention in Cb Defense Stop malware and non-malware attacks that bypass machine-learning AV and traditional AV 2 STREAMING PREVENTION IN Cb DEFENSE OVERVIEW Over the past three years, cyberattackers
More information