Aims. How it started. Unique features. Collaboration. Innovation. Cursery at a glance. Contact. Independent Tests of Anti-Virus Software

Similar documents
Anti-Virus Comparative No.1

Grid Computing a new tool for science

Test Strategies & Common Mistakes International Antivirus Testing Workshop 2007

Anti-Virus Comparative No.8

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE

Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast

2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY

Future-proof managed hosting brings agility

We Secure The Highways. Safety comes first.with data availability and data security 24x7 Highway Monitoring and Control

NetDefend Firewall UTM Services

AT&T Endpoint Security

Defining cybersecurity.

Safe N Sec Enterprise Pro

iq.suite Watchdog - Central virus protection - Intelligent server-based virus protection and file blocking through fingerprint technology

IBM Europe, Middle East, and Africa Services Announcement ZS , dated October 6, 2009

Anti-Virus Comparative No.4

Future-ready security for small and mid-size enterprises

UNIT 2 TOPICS IN COMPUTER SCIENCE. Exploring Computer Science 2

UTM Firewall Registration & Activation Manual DFL-260/ 860. Ver 1.00 Network Security Solution

The Business of Malware IT Security Presentation

Global Manufacturer MAUSER Realizes Dream of Interconnected, Adaptive Security a Reality

Travelling securely on the Grid to the origin of the Universe

SaaS Flyer for Trend Micro

Thales Cyber Assurance Webinar Your first step to Cyber Security

Anti-Virus Comparative No.7

Botnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer

IT SUPPORT ANNUAL MAINTENANCE CONTRACT GET AN WITH US & RELAX ROUND THE CLOCK +971 (6) Server Setup. IT Services.

Implementation Strategy for Cybersecurity Workshop ITU 2016

Cyber security sector has its own laws. There is no time to relax, and certainly antivirus developers can t afford this privilege.

Securing Today s Mobile Workforce

United Automotive Electronic Systems Co., Ltd Relies on McAfee for Comprehensive Security

Post Digitization: Challenges in Managing a Dynamic Dataset. Jasper Faase, 12 April 2012

The Scottish Credit and Qualifications Framework and Chartered Banker Institute

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

A Journey Towards Digital Learning Environment

Collaboration. Tomorrow s technology...today! Contact us for a quote and more information: Largest, fastest tool for

Mobile County Public School System Builds a More Secure Future with AMP for Endpoints

Client Computing Security Standard (CCSS)

Symantec Antivirus Manual Removal Tool Corporate Edition 10.x

Networks & Data Centres

SMART. Investing in urban innovation

Anti-Virus Comparative Summary Report 2008

Grant for research infrastructure of national interest

Symantec Small Business Solutions

Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal

Network and Internet

System Requirements E 23 rd, Hutchinson KS (866)

The Eight Components of a Strong Cyber Security Defense System

UCD Centre for Cybersecurity & Cybercrime Investigation

MESSAGING SECURITY GATEWAY. Solution overview

SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT.

OPEN SOURCE LABORATORY (OSS LABORATORY)

Meridian. Technical Specifications

Single Product Review. escan Internet Security 11. Language: English September 2010 Last revision: 13 nd October

Internet and Mini.K.G Senior Scientist, FRAD, CMFRI

IT Service Upgrades Announcement

Security Policy (EN) v1.3

Five Tips to Mastering Enterprise Mobility

Data Retrieval Firm Boosts Productivity while Protecting Customer Data

Beyond Testing: What Really Matters. Andreas Marx CEO, AV-TEST GmbH


West Midlands Regional Cyber Crime Unit

Built-in functionality of CYBERQUEST

Title of the presentation Date # EU-CHINA (Qingdao) Business and Technology Cooperation Fair

FlowMon ADS implementation case study

Security by Default: Enabling Transformation Through Cyber Resilience

Performance and Sizing Guide

Hokkaido Institute of Technology

CITY MANAGER MISSION STATEMENT: DEPARTMENT ORGANIZATION B-1

Level 3 Install, configure and upgrade ICT software ( / )

VIETNAM CYBER-SAVVINESS REPORT 2015 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN VIETNAM

Key Features. DATA SHEET

COOPERATION BETWEEN INTERPOL AND THE UNITED NATIONS

Anti-Virus Comparative

Information Security Controls Policy

AlliedWare Plus UTM FIREWALL OVERVIEW

Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org

Which type of computer is used to operate large corporate systems and databases

Get BitDefender Security for File Servers 2 Years 5 PCs computer new software download ]

Certification of Physicians and Non- Physicians in the United States

Virtual Private Servers

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE

ASEAN COOPERATION ON DISASTER MANAGEMENT. Disaster Management & Humanitarian Assistance Division, ASEAN Secretariat

From Firewall to Cloud, Diocese of Brooklyn Enthusiastically Embraces Unified Sophos Security Across its Parishes and Schools

QBPC s Mission and Objectives

Benefits. Centrally managed protection of corporate networks

La Salle College PTA School Computer Purchase Programme (SCPP)

ISSP Network Security Plan

DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER

Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org

Background to Internet and the web. Simon Mahony.

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Sustainability of R&E Networks: A Bangladesh Perspective

Could the BIGGEST Threat to Your Business be INSIDE Your Company?

EMERGENCY MOBILE ALERT. Partner organisation campaign guide

Aerospace. At a Glance

Managing SonicWall Gateway Anti Virus Service

Defend what you create. Why Dr.Web

ECOWAS Regional Stakeholder Workshop on the Development of National Cooking Energy Action Plans August 2014, Banjul, The Gambia

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Transcription:

1 2 3 4 5 6 7 Aims How it started Unique features Collaboration Innovation Cursery at a glance Contact www.av-comparatives.org Independent Tests of Anti-Virus Software

Aims AV Comparatives wants to continue providing security software tests at no cost to end users. New test methods are continuously being developed and improved in cooperation with academic institutes. New technicians and testers are constantly being trained, and more employees are being recruited internationally. The University of Innsbruck provides invaluable assistance by supporting Master s Degree projects relevant research fields. AV Comparatives aim is to provide the most relevant and informative data on security software in the world. Page 2

How it started It began the way it does with so many computer users, namely with a virus infection. In 1993, Andreas Clementi was hit by a computer virus: the November 17 virus NOV_17.855. This awakened his interest. Andreas was not satisfied with the sometimes very contradictory tests of antivirus programs in computer magazines, and so began the intensive investigation of malware and antivirus software, which continues to this day. In 1999, he founded AV Comparatives as a student project at the University of Innsbruck. This was done purely out of technical interest, to see how good the products of different manufacturers actually are. Here Andreas met Peter Stelzhammer, who was also working at the University of Innsbruck. They started publishing the results at www.av comparatives.org, and continue to do so today. The response was enormous, as the manufacturers of antivirus software became aware of the duo in Innsbruck and wanted to take part in the tests. Today there are so many applications from major manufacturers that only the best products can be accepted. The test results are still freely accessible on the website, and form the basis for further reports in computer magazines. Page 3

unique features Non profit organisation Freely accessible results for everyone Journalists and magazines can publish the results free of charge Completely independent First test laboratory with fully automated Whole Product Real World Dynamic Test Comprehensive detection rate tests One of the largest sample collections worldwide Unbiased test results Reputable tests Established scientific methodology Experience beginning with the first computer viruses Oriented towards end user Multilingual (English, Chinese, other languages will follow soon) Page 4

collaboration AV Comparatives works with academic technical institutes, in particular the Institute of Computer Science at the University of Innsbruck. Cooperation with the Quality Engineering group ensures the highest quality of test methodology and results. AV Comparatives works with the Information Technology group of Standortagentur Tirol, a regional government agency that promotes business in Tirol, to exchange ideas and experience. Work is done with the Berufsschule für EDV Technik am Lohbachufer [eke] (technical college for IT) in Innsbruck. Another partner is the kompetenzzentrum IT which supports AV Comparatives with know how and applies the results of the tests to commercial consultancy with businesses. Page 5

innovation Together with the University of Innsbruck, AV Comparatives has developed a procedure for the systematic testing of antivirus software, which automatically simulates the actions of a computer user surfing the Internet, without any human intervention being required. Considering the huge number of malicious programs that appear every day, performing these tests manually with a statistically valid number of samples would not be possible. The contact with the Tirol Information Technology Group led to a joint project with the Institute of Informatics at the University of Innsbruck, to develop new test procedures. As part of a Master s Degree, sponsored by the FFG (Society for the Furthering of Research), an automated test process was developed. The project was led by AV Comparatives and automates the procedure of opening infected web pages and checking whether the PC s antivirus software can protect it against the threat. This process is logged in minute detail. It would be impossible to conduct this test manually on the required scale Page 6

cursery glance Staff the most important part 7 permanent fulltime employees (located in Innsbruck, Graz and Oxford) around 20 volunteers and part time workers (located all over the world) Data Centre 75 m² fully air conditioned fire protection entry system 24 hour CCTV coverage In General ~ 300 TB storage, 600 GB Ram, 12 km CAT7 cable, 300 computers, Technological Resources 60 Honeypots worldwide, including China and Taiwan, in cooperation with academic centers and authorities ~ 60 PCs for the Whole Product Dynamic Test ~ 40 PCs for the Detection Tests (On Demand / Retrospective) 4 Workstations for the Performance Test 3 NAS devices, each with 40 TB; geographically distributed and mirrored 2 IBM Blade Servers, total with 28 blades, for validating and sorting incoming samples ~ 80 Servers for the Corporate and other tests over 20 desktop and laptop PCs for our staff and volunteers Communications 3 Internet connections, including one with fibre optic cable direct to Backbone 72 dynamic IP addresses, 16 static IP addresses In total 100 Mbps synchronous bandwidth Page 7

Questions? Name: AV Comparatives e.v. Street: Andechsstrasse 44 ZIP: 6020 City: State: Country: Innsbruck Tyrol AUSTRIA EUROPE ZVR: 017712505 WWW: www.av comparatives.org Press Contact: E Mail: Cell Phone: p.stelzhammer@av comparatives.org +436641611444 (Timezone: CET)