R
Rod McCarthy
Thread author
FREE SCAN.... You Do NOT have to giver personal information to run the free test.
http://www.cyren.com/security-test....utm_medium=banner&utm_source=website_homepage
This Company Sales AV products / software and are members of AV Comparatives.
In fact I went to AV Comparatives and these people are on their approved vendor list....
NOTE: This company is really someone you all know....It's F-Prot as described by CMLew... I found some interesting comments about this antivirus, and the price is incredible.
Do the test with IE, Firefox does not work. I had to turn Off Ad Blocker.
Is your web security really working?
Try our free online web security test to identify gaps in your web security. In less than 30 seconds, you will know if you may be vulnerable to cyber threats – from malware to phishing attacks to botnets. You can also have a diagnostic report of the results emailed to you.
Here is some info about this company.
Answers to the most common questions we receive
http://www.cyren.com/security-test....utm_medium=banner&utm_source=website_homepage
This Company Sales AV products / software and are members of AV Comparatives.
In fact I went to AV Comparatives and these people are on their approved vendor list....
NOTE: This company is really someone you all know....It's F-Prot as described by CMLew... I found some interesting comments about this antivirus, and the price is incredible.
Do the test with IE, Firefox does not work. I had to turn Off Ad Blocker.
Is your web security really working?
Try our free online web security test to identify gaps in your web security. In less than 30 seconds, you will know if you may be vulnerable to cyber threats – from malware to phishing attacks to botnets. You can also have a diagnostic report of the results emailed to you.
Here is some info about this company.
Answers to the most common questions we receive
- How long has the company been around and involved in the AV Industry?
We have been in this business since the very first days viruses appeared on micro-computers, now referred to as PCs. We have been processing virus samples since about 1988.
- What is special about CYRENs vs. other AV SDKs?
Award-winning, multi-layered detection – The SDK is based on a unified platform with multiple detection technologies for maximum protection. Zero-hour detection is ensured by the flexible architecture that enables fast reaction to new threat types. CYREN AV continually proves its superior detection in product evaluations. For this reason it has been selected by industry leaders, such as Google, Websense and Microsoft.
Industry leading performance & scalability – The SDK excels at rapid object processing (particularly clean files which are the majority on most systems) and consumes very low resources. The CYREN engine has numerous proven deployments requiring less than half the servers compared to other solutions. This advantage is especially clear on sites where CYREN runs alongside a second AV engine. A complete evaluation of CYREN’s AV benefits from integration of the SDK into the OEM environment to illustrate this large resource saving.
Maximum operational flexibility – The SDK is easily integrated as a standalone AV or with multiple engines. Additionally the tiny SDK footprint supports deployment on a wide range of platforms and environments. These advantages have convinced vendors such as McAfee to deploy CYREN alongside their own solutions. The flexibility of implementation has made CYREN the choice for a wide range of solutions, from the smallest network appliances and desktop clients to carrier-grade network clouds.
- How do you name malware?
As far as naming is concerned we try to be as close as possible to the CARO naming convention. We may append the name of the heuristic detection mini-engine. Therefore the name could be CARO_name!generic or CARO_name!heuristic_mini-engine. - The CYREN solutions we know are all based in the cloud. Is antivirus a cloud-based solution?
Most virus detections are handled by the SDK, which resides locally on the server or device. The SDK utilizes multiple engines to detect viruses based on heuristics, file signatures and other proprietary techniques. However, in some cases the SDK will query the cloud for final verification.
Last edited by a moderator: