- Apr 9, 2018
- 211
Dear MalwareTips Users and Community,
We already have the results for January 2023 published. By the way - thank You for voting us in AV-Comparatives Survey! We took place 3rd! Amazing
Remediation Time in test
Starting from this edition, in order to stand out more from other testing laboratories as precursors in the security industry, we introduce a new comparative feature – the so-called “response time to a threat and resolve security incident” – Remediation Time. We will measure it for each tested product for home and business to further highlight the differences between protection software when confronted with threats in the wild (coming from the Internet).
In other words: in the Sysmon logs we have the UTC time logged for:
1. Downloading malware via Firefox.
2. If the product doesn't stop it at an early stage, a run occurs. If a threat detection by any technology has occurred, we have such a time logged, e.g. as "moved to quarantine", or "blocked on firewall" or different method.
From point 1 to point 2 this is known as a Remediation Time.
Remediation Time Average reports on the Recent Results webpage. From the next edition onwards, each product will have its own website with more detailed technical information and awards won. Give us some more time, please
Threat Landscape in January 2023
We have prepared the following summary based on the logs collected from the Sysmon tool in Windows 10 and database with collected information from the test:
We already have the results for January 2023 published. By the way - thank You for voting us in AV-Comparatives Survey! We took place 3rd! Amazing
Remediation Time in test
Starting from this edition, in order to stand out more from other testing laboratories as precursors in the security industry, we introduce a new comparative feature – the so-called “response time to a threat and resolve security incident” – Remediation Time. We will measure it for each tested product for home and business to further highlight the differences between protection software when confronted with threats in the wild (coming from the Internet).
In other words: in the Sysmon logs we have the UTC time logged for:
1. Downloading malware via Firefox.
2. If the product doesn't stop it at an early stage, a run occurs. If a threat detection by any technology has occurred, we have such a time logged, e.g. as "moved to quarantine", or "blocked on firewall" or different method.
From point 1 to point 2 this is known as a Remediation Time.
Remediation Time Average reports on the Recent Results webpage. From the next edition onwards, each product will have its own website with more detailed technical information and awards won. Give us some more time, please
Threat Landscape in January 2023
We have prepared the following summary based on the logs collected from the Sysmon tool in Windows 10 and database with collected information from the test:
- 11 security solutions took part in the test.
- Ultimately, we used 447 unique URLs with malware.
- Exactly 381 malware samples were hosted with HTTP.
- Websites encrypted with HTTPS (in theory – safe) contained 66 malware samples.
- During the analysis, each malware samples took on average 28 potentially harmful actions in Windows 10.
- Most malware originated from servers located in the Netherlands, Russia and USA.
- .com, .org, .za domains were mostly used to host malware.
- The average detection of URLs or malicious files at the PRE-Launch level was 58%.
- At the POST-Launch level, file detection was on average 38%.
Attachments
Last edited: