N
Noxx
Great test. I love both products, but I use Norton and it's nice to see it doing so well.
i know all of MT members want to see this battleYup, that exactly what I was thinking before
you mean is Kaspersky?
safe1st,
Liked the test.
IMO both are good products & both did well.
Norton has PUP detection enabled by default. Kaspersky have PUP disabled by default. You have to enable it under additional protection or settings. Ondemand scanners detected PUP. So I guess Kaspersky would have detected those if PUP detection was enabled.
But it was a test at default settings & good.
I think will special request you to test Kaspersky Endpoint as I use KES & there are no test available. So If you accept my special request to test KES will PM you little details on install, settings, etc..
I too like default settings test.Actually some people want me to use default settings.
But you said earlier on other detection test battle, I need to change to 'delete' (only that)
I think so, maybe Kaspersky would have detected those
I didn't know Norton has Malware action Rollback feature.Malware action Rollback feature : Both has this feature but Norton's implementation is much much better
I didn't know Norton has Malware action Rollback feature.
Little detail plzz...
Behavioral Policy Enforcement (BPE) Signatures
Being able to evolve with the continually changing threat landscape is the essential part of our SONAR technology and our protection is expanded with the ability to target tomorrow’s threats as well. When a new family of threats is seen, such as a new rootkit, Trojan, FakeAV or other type of malware, we can now create new behavioral signatures in order to detect a new family of threats and release them without having to do code updates to the product. These are called SONAR Behavioral Policy Enforcement signatures. These signatures are fast to write, test, and deploy and they give SONAR the flexibility and adaptability to respond to certain classes of emerging threats with a very low false-positive rate. We have many SONAR BPE signatures targeting FakeAV misleading apps to specific malware threats and rootkits like Graybird, Tidserv, ZeroAccess and Gammima.
So how do the BPE Signatures work?
Let’s take a look at an application that gets executed.
Any one of these behaviors alone may not be “bad”, but taken as a whole the behavioral profile is bad. Our STAR analyst creates a rule that says if we see this sequence of behaviors with executables with certain Insight Reputation characteristics, then we should stop the process from executing and roll-back the changes – SONAR has the ability to implement a virtual sandbox around the infected but legitimate application and by doing so can prevent the infected application from taking any malicious actions that might harm a user’s computer. This is quite a new paradigm in endpoint security protection by leveraging what the application does and how it behaves rather than what it looks like.
- It drops certain components in the windows temp directory
- It adds a bunch of registry entries
- It changes the hosts file
- It doesn’t have a user interface
- And it opens up communications on high ports
Automation Remediation of malicious files with sandboxing
Real-time behavioral protection engine monitors and sandboxes applications, process and events as they are happening instead of statically. System changes can be rolled-back to prevent the malicious activity from impacting the system.