Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
HOME ANTI- MALWARE PROTECTION JUL - SEP 2018
Message
<blockquote data-quote="vtqhtr413" data-source="post: 773720" data-attributes="member: 65229"><p>2.5 Target System details</p><p></p><p>The Target Systems are identical Windows systems specified as below.</p><p></p><p>Each system is disconnected from the internet and is isolated from other Target Systems using Virtual Local Area Networks (VLANs).</p><p>Each system runs Windows 7 (64-bit), updated with security patches available up to Service Pack 1.</p><p>Popular but vulnerable third-party applications installed include Adobe Flash Player, Adobe Reader, Apple QuickTime and Oracle Java (32-bit). </p><p>If a security product requires an updated file from Microsoft the tester will install the necessary file.</p><p>Products run with the default settings. Additional logging may be enabled if requested by the vendor of the product in question. Vendors of business software are invited to make configuration recommendations. </p><p>All products are deployed with the appropriate state and/ or version according to the time period being simulated in the test.</p><p></p><p>2.6 Target System specification</p><p></p><p>Specification: Virtualised; 4GB RAM</p><p></p><p></p><p>Q&A</p><p></p><p><strong>Q</strong> I am a security vendor. How can I include my product in your tests?</p><p></p><p><strong>A</strong> Please contact us at <a href="mailto:info@SELabs.uk">info@SELabs.uk</a>. We will be happy to arrange a phone call to discuss our methodologies and the suitability of your product for inclusion.</p><p></p><p><strong>Q </strong>I am a security vendor. Does it cost money to have my product tested?</p><p><strong>A</strong> We do not charge directly for testing products in public tests. We do charge for private tests.</p><p></p><p><strong>Q</strong> What is a partner organisation? Can I become one to gain access to the threat data used in your tests?</p><p><strong>A</strong> Partner organisations support our tests by paying for access to test data after each test has completed but before publication. Partners can dispute results and use our award logos for marketing purposes. We do not share data on one partner with other partners. We do not currently partner with organisations that do not engage in our testing.</p><p></p><p><strong>Q </strong>So you don’t share threat data with test participants before the test starts?</p><p><strong>A</strong> No, this would bias the test and make the results unfair and unrealistic.</p><p></p><p><strong>Q</strong> I am a security vendor and you tested my product without permission. May I access the threat data to verify that your results are accurate?</p><p><strong>A </strong>We are willing to share small subsets of data with non-partner participants at our discretion. A small administration fee is applicable.</p></blockquote><p></p>
[QUOTE="vtqhtr413, post: 773720, member: 65229"] 2.5 Target System details The Target Systems are identical Windows systems specified as below. Each system is disconnected from the internet and is isolated from other Target Systems using Virtual Local Area Networks (VLANs). Each system runs Windows 7 (64-bit), updated with security patches available up to Service Pack 1. Popular but vulnerable third-party applications installed include Adobe Flash Player, Adobe Reader, Apple QuickTime and Oracle Java (32-bit). If a security product requires an updated file from Microsoft the tester will install the necessary file. Products run with the default settings. Additional logging may be enabled if requested by the vendor of the product in question. Vendors of business software are invited to make configuration recommendations. All products are deployed with the appropriate state and/ or version according to the time period being simulated in the test. 2.6 Target System specification Specification: Virtualised; 4GB RAM Q&A [B]Q[/B] I am a security vendor. How can I include my product in your tests? [B]A[/B] Please contact us at [email]info@SELabs.uk[/email]. We will be happy to arrange a phone call to discuss our methodologies and the suitability of your product for inclusion. [B]Q [/B]I am a security vendor. Does it cost money to have my product tested? [B]A[/B] We do not charge directly for testing products in public tests. We do charge for private tests. [B]Q[/B] What is a partner organisation? Can I become one to gain access to the threat data used in your tests? [B]A[/B] Partner organisations support our tests by paying for access to test data after each test has completed but before publication. Partners can dispute results and use our award logos for marketing purposes. We do not share data on one partner with other partners. We do not currently partner with organisations that do not engage in our testing. [B]Q [/B]So you don’t share threat data with test participants before the test starts? [B]A[/B] No, this would bias the test and make the results unfair and unrealistic. [B]Q[/B] I am a security vendor and you tested my product without permission. May I access the threat data to verify that your results are accurate? [B]A [/B]We are willing to share small subsets of data with non-partner participants at our discretion. A small administration fee is applicable. [/QUOTE]
Insert quotes…
Verification
Post reply
Top