Trend Micro Enterprise Endpoint Comparative Report Performed by AV-Test.org

Similar documents
Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org

Trend Micro Endpoint Comparative Report Performed by AV-Test.org

Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org

CONSUMER EPP COMPARATIVE ANALYSIS

ENTERPRISE ENDPOINT COMPARATIVE REPORT

IT Security Cost Reduction

Symantec Endpoint Protection 12

Protecting Virtual Environments

Symantec Endpoint Protection

Remediation Testing Report

Symantec Endpoint Protection 14

Invincea Endpoint Protection Test

Enterprise Anti-Virus Protection

ADVANCED ENDPOINT PROTECTION COMPARATIVE REPORT

Transparency report. Examining the AV-TEST January-February 2018 Results. Prepared by. Windows Defender Research team

MRG Effitas 360 Degree Assessment & Certification Q4 2017

Symantec Protection Suite Add-On for Hosted Security

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Anti-Virus Comparative

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates

Enterprise Anti-Virus Protection

Norton Security for Professionals Partner Deck Ingram Micro Cloud Marketplace

WHITEPAPER ENDPOINT DETECTION AND RESPONSE BEYOND ANTIVIRUS PROACTIVE THREAT HUNTING AT THE ENDPOINT

SE Labs Test Plan for Q Endpoint Protection : Enterprise, Small Business, and Consumer

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

MRG Effitas 360 Assessment & Certification Programme Q4 2015

MRG Effitas 360 Degree Assessment & Certification Q1 2018

Commtouch Messaging Security for Hosting Providers

Mapping traditional AV detection failures. October 2017

This document provides instructions for the following products.

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

Real World Testing Report

Enterprise Anti-Virus Protection

Sales Training

Qualys Indication of Compromise

Mastering The Endpoint

Building Resilience in a Digital Enterprise

Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management. SR B19: Symantec Endpoint Protection 12 Customer Panel

Securing and File Sharing in the Cloud

Advanced Malware Protection: A Buyer s Guide

MRG Effitas Trapmine Exploit Test

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE

FILELESSMALW ARE PROTECTION TEST OCTOBER2017

A Simple Guide to Understanding EDR

Symantec Endpoint Protection 11.0

CA Security Management

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

The Mimecast Security Risk Assessment Quarterly Report May 2017

Anti-Virus Comparative. Factsheet Business Test (August-September 2018) Last revision: 11 th October

THREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156

MRG Effitas 360 Degree Assessment & Certification Q MRG Effitas 360 Assessment & Certification Programme Q2 2017

MRG Effitas Online Banking Browser Security Assessment Project Q Q1 2014

Anti-Virus Testing and AMTSO

Trend Micro OfficeScan Client User Guide

Anti-Virus Comparative No.4

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

FIREWALL BEST PRACTICES TO BLOCK

Kaspersky Security Network

INTRODUCING SECURITYPLUS FOR MDAEMON

Small Business Anti-Virus Protection

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Security Gap Analysis: Aggregrated Results

TOMORROW S SECURITY, DELIVERED TODAY. Protection Service for Business

Real Security. In Real Time. White Paper. Preemptive Malware Protection through Outbreak Detection

DATA SHEET RSA NETWITNESS ENDPOINT DETECT UNKNOWN THREATS. REDUCE DWELL TIME. ACCELERATE RESPONSE.

Trend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data

Testing Exploit-Prevention Mechanisms in Anti-Malware Products

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Endpoint Security Transformed. Isolation: A Revolutionary New Approach

A Guide to Closing All Potential VDI Security Gaps

MRG Effitas Online Banking / Browser Security Assessment Project Q Results

Presentation by Brett Meyer

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

SecureAnywhere TM. Business Endpoint Protection

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

TOP 10 Vulnerability Trends for By Nevis Labs

9 Steps to Protect Against Ransomware

etrust Antivirus Release 7.1

CONSUMER AV / EPP COMPARATIVE ANALYSIS

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

McAfee Endpoint Security

Security Industry Market Share Analysis

How To Manually Uninstall Symantec Antivirus Corporate Edition 10.x Client

The 2017 State of Endpoint Security Risk

SO YOU THINK YOU ARE PROTECTED? THINK AGAIN! NEXT GENERATION ENDPOINT SECURITY

COMPARATIVE MALWARE PROTECTION ASSESSMENT

Maximum Security with Minimum Impact : Going Beyond Next Gen

Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation

UTM Firewall Registration & Activation Manual DFL-260/ 860. Ver 1.00 Network Security Solution

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

ONLINE BANKING: PROTECTION NEEDED INTRODUCING KASPERSKY FRAUD PREVENTION PLATFORM

Intel Security Advanced Threat Defense Threat Detection Testing

Home Anti-Virus Protection

Cyber Security Solutions Mitigating risk and enhancing plant reliability

Copyright 2011 Trend Micro Inc.

Transcription:

Trend Micro Enterprise Comparative Report Performed by AV-Test.org Results from October 2010 Executive Summary In October of 2010, AV-Test.org performed endpoint security benchmark testing on five marketleading Enterprise endpoint solutions from Symantec, McAfee, Microsoft, Sophos and Trend Micro. AV-Test.org tested zero-day attacks actually occurring in the wild by sourcing malicious URLs which have malware associated with them. The testing occurred simultaneously across all vendors platforms to ensure no biases during the test runs. Products were configured to block or detect the threats at multiple levels, thereby giving each vendor maximum ability to protect against these threats. In these tests, Trend Micro emerged as the clear overall winner blocking over 97% of the threats initially and 99% after 1 hour, a full 16% higher than the next competitor. Trend Micro also demonstrated a decided advantage in blocking these threats at their source, the URL, by blocking over 84% of the threats at this layer. Overview Traditionally, endpoint testing has been done by updating each product s signatures, removing the device from the network, and then copying a test set of malicious files onto the device to determine how many can be caught. That was fine when only a small number of malicious files were being introduced to the world, but today, according to the latest statistics from AV- Test.org, we re seeing over 1.5 million unique samples every month.

Exposure Layer Detection and Blocking Reduces Risk This threat of volume is creating issues for all vendors who attempt to keep up with these new emerging threats simply using file-based detection methods. File-based detection requires that each threat have an analogous signature file created and distributed by the antivirus company. Additionally, the majority of threats now come from the Internet via compromised webpages, BSEO (Blackhat Search Engine Optimization) and the use of social engineering. New technologies need to be used to combat these new threat vectors. As such, AV-Test.org performed a more real-world test of endpoint solutions that doesn t just score how well a product can detect file-based threats (Infection Layer), but includes the ability to block the threat at its source (Exposure Layer) and detect/block the threat during execution (Dynamic Layer). The ability of a solution to source, analyze and block new threats that it cannot identify is becoming critical, due to the rapid rise in the amount of threats being released in the wild. Exposure Layer blocking reduces the risk to the network because fewer threats will impact network bandwidth, or require computing resources to block them at the endpoint. In this test, only threats that were not blocked by a previous layer were tested against the next layer, and so on. Another aspect of the test performed by AV-Test.org is retesting after 1 hour to determine if any vendors have added new protection for threats missed in the initial run (a.k.a. Time to Protect ). In October 2010, AV-Test.org tested five market-leading Enterprise endpoint solutions from Symantec, McAfee, Microsoft, Sophos and Trend Micro. The results of the test showed that 2 of 6

Trend Micro was the overall winner, with a decided advantage in both Exposure layer protection and time to protect. As shown below, Trend Micro OfficeScan ranked #1 in Overall Protection against these leading vendors in number of threats blocked. Overall Protection Total Percentage of threats blocked by all layers: Exposure, Infection, Dynamic 99.0% 100.0% 90.0% 80.0% 70.0% 60.0% 50.0% 40.0% 30.0% 20.0% 10.0% 0.0% 63.5% 64.0% 82.5% 71.0% Trend Micro OfficeScan Symantec Protection McAfee VirusScan Microsoft Forefront Sophos Security Note: Results are based on the T+60 minute results Products Tested AV-Test.org tested the following five products during October 2010: Trend Micro OfficeScan v10.5.1083 Symantec Protection v12.0.1001.95 McAfee VirusScan Enterprise v8.7.0.570 Microsoft Forefront Client Security v1.5.1981.0 Sophos Security and Control v9.5.3 3 of 6

Results and Analysis Trend Micro received the top rankings among all products. Note: Results are based on the T+60 minutes result. Prevention percentages at each layer do not add up to overall score. For example, with Trend Micro OfficeScan: Exposure layer prevented 169 of 200 threats (85%); Infection layer prevented 21 of 31 threats (68%); Dynamic layer prevented 8 of 10 threats; Overall prevented 198 of 200 threats (99%). Trend Micro appears to have the most robust technology to block threats at their source (23.5% higher than closest competitor), thereby, ensuring no file is downloaded prior to detection. This ensures these threats do not require bandwidth to download them, nor does the threat need to use computer resources to identify or execute the malicious code. Microsoft performed the best at the Infection layer, which helped their overall score, but also with a low Exposure score means they are still focused on blocking threats using their signaturebased or behavior-based detection methods. This could cause issues as more malicious files are released to the wild. Depending on file- and signature-based methods requires more work to 4 of 6

create the signature files, distribute and update these files on each endpoint. As a result, the network and the endpoint computer resources will be increasingly used for protection, as threats multiply. Overall, the scores are lower than you would normally see in many of today s tests. This may be due to the fact that the corpus of URLs and files were sourced very shortly prior to the test, thereby not allowing the vendors much time to obtain the samples through the normal industry sharing process. The amount of threats today requires vendors to improve their ability to source, analyze and block unknown threats. For this reason, the methodology utilized by AV-Test.org in this test is to re-run the samples again after 1 hour. This gives vendors products a chance to automatically source the threats which bypassed their technologies in the first run, analyze each of the URLs and files and ultimately provide protection prior to the next run. The plus one-hour tests should have improved if the products have built in automation to manage this process. Time To Protect Improvement Percentage % of previously unknown threats blocked at T=60minutes 70.0% 60.0% 50.0% 40.0% 30.0% 20.0% 10.0% 0.0% 60.0% Trend Micro OfficeScan Symantec Protection 1.4% 0.0% 0.0% 0.0% McAfee VirusScan Microsoft Forefront Sophos Security NOTE: Time-to-protect improvement is the percentage of threats missed at T=0min that are subsequently prevented at T=60min. For example, with Trend Micro OfficeScan: At T=0min, 195 threats were prevented while 5 threats were missed. Of the 5 threats missed at T=0min, 3 were prevented at T=60min (3 of 5 equals 60%). Trend Micro again proved it does an excellent job in this area with OfficeScan improving 60% from the first test run. The other vendors averaged 0.35% improvement. This means that of the total number of threats undetected during the first run, 60% of them were blocked during the T+60 run. 5 of 6

Rankings, Corpus, and Methodology Scoring and Rankings The overall scores were derived by adding up the total number of threats blocked by each solution, regardless of which layer blocked it. Note that these rankings do not consider performance, scalability, user interface, features, or functionality only protection effectiveness against the October 2010 corpus. The Corpus AV-Test.org compiled the corpus for testing by searching the Internet for malicious URLs that have associated malware. For this test they sourced 200 malicious URL samples and the associated 200 malicious file samples to conduct the test. The URLs/files that AV-Test.org uses for testing are gathered from sites in the wild, using a variety of proprietary discovery, analysis, and verification techniques. They are neither supplied by, nor known to, any of the companies whose products were tested. Test Methodology The test methodology can be found at the following webpage. http://www.av-test.org/services_and_testing In Summary Some conclusions we can make from the data presented here. 1. Vendors like Trend Micro that have invested in and provided solutions that block threats at multiple layers (Exposure, Infection & Dynamic) provide better overall security against the new threats propagating today. They improve protection by keeping threats completely off the network or computer using proactive technologies like Web reputation instead of waiting for malicious files to be downloaded. 2. Zero-day threats are more difficult to defend against, which is why the overall scores are lower than traditional detection rate tests, and why the Time to Protect factor has to be included in any real-world tests. This shows the effectiveness of a vendor at sourcing, analyzing and providing protection for any previously unobserved threats. This comparative review, conducted independently by AV-Test.org in October 2010, was sponsored by Trend Micro. AV-Test.org aims to provide objective, impartial analysis of each product based on hands-on testing in its security lab. 6 of 6