- Feb 17, 2018
- 870
@ForgottenSeer 58943 @mekelek Lets close this case, its just a AV package and not the end of the world.
Lets grab a beer and move on.
Lets grab a beer and move on.
Please provide comments and solutions that are helpful to the author of this topic.
i'm done, i just dont like to be marked as a shill for having different views.@ForgottenSeer 58943 @mekelek Lets close this case, its just a AV package and not the end of the world.
Lets grab a beer and move on.
I haven't known about this but I always found it weird how he plugged fortinet, then officially admit to being a fortinet engineer, then after a while hid it again.
I haven't known about this but I always found it weird how he plugged fortinet, then officially admit to being a fortinet engineer, then after a while hid it again.
I like your test but You tested it on default settings. that product is supposed to run alongside with Sophos XG firewall/UTM.its gonna protect Business Desktops(the pcs are limited via active directory) and users Cant easily run everything they want! also, an It security engineer(like cute OPcode) is there to monitor user activities. it's not like MH!since they were embarassing
Sorry @ForgottenSeer 58943 I couldn't resist that one lol.Not.
That was before I tested the integration of SHP components and how they arrive at a full protection suite and how a simple pack test wouldn't really show anything other than the strengths or weaknesses of the basic sophos signature set based on Sophos and VirusBuster.
Those basic signatures on Sophos according to my friend at Sophos, they know are generally 'average', which is what warranted their acquisition of Surfright(HMP/HMPA), Mojave Networks (Cloud Technology, Web Heuristics), and Invincea, which will be integrated into SHP over the next 6-12 months as their predictive AI and machine learning modules. But before that happens they needed to sunset Invincea customers (which happened last week).
all of you have your points
however, malwares don't necessarily come from the internet but from other places like a USB flash drive, sometimes, via messenging services such as facebook, viber,... and attachments In this case, hub results will refect the AV's real capability because web filter is ignored
While in most cases, malwares come from the internet or emails so the real-world test will refect the true result
The hub test and real-world tests have their own limitations
Hub test: mostly ignore web filter, a very important component, first-line defense. Many AVs have great web filters such as forti, kaspersky, sophos,...
The hub is not only there to test malwares but also to find the weaknesses of the AVs => patch them with other softwares
avast: weak against java and scripts
KIS: PUPs
f-secure: hit and miss
hitmanpro.alert: ransomware protection is not good enough
WD: good after being tweaked but not good in default settings. Poor signatures but great post-execution protection
forti: great web filter but the script/exploit protection failed to prevent scripts to download their payloads. Poor post-execution protection. Not effective so-called BB
Real-world: threats don't always come from the internet, maybe users ignore the block message and allow the file to download bypassing the web filter and run the files (they might think they are FPs), it depends on "luck" because we are not always clicking on zero-day malwares that are enough to trouble the AVs and it can be different on different days
When the hub and real-world results are similar => the AV is good both online and offline
When it fails in the hub but performs perfectly in realworld => the proactive components are not good enough but the web filter is extremely good and it saves the day
I have seen users with different AVs got infected
kaspersky: tons of PUPs because users didn't turn on PUP protection (default settings, expected) and we all know KIS is crap against PUPs
norton: I got infected myself years ago by plugging in a USB flash drive and the malware ran without being blocked. A right-click scan with norton detected it but not the realtime protection
MSE: infected. Confirmed only by using a second opinion scanner. The user thought he was fully protected. Another one was heavily infected with browser popping up all the time and was unbearably slow to perform a scan => re-installed the windows
ESET: infected
avast: a few PUPs and malicious toolbars. Avast has no protection against what we install via google/firefox appstore
I've installed SHP on my laptop as it's going to get more use on that than it will on my main machine with me moving to mainly GNU/Linux distros. I do genuinely really like SHP it's solid and I will be paying for a license for it when the free one I currently have runs out. I can't even notice it running on my laptops and it's web protection is definitely world class. As I mentioned on another thread I also have Sophos on my Android phone even though I've been infected with anything on my phone I do see Sophos web protection kick in for low reputation app's and, again I don't even notice it running.
Very, very nice. Thank you for the info @ForgottenSeer 58943Agreed. So far I am impressed.
In related news;
‘Deep learning’ added to anti-exploit solution | IT-Online
“Intercept X is now enabled to learn, in a very real sense, to recognise patterns in digital representations of sounds, images and other data. This results in a higher accuracy rate for the detection and remediation of both existing and zero-day malware which exploit previously unknown security vulnerabilities.”
Also they released their new XG series to coincide with the Invincea components coming live;
Small is beautiful: meet our new desktop firewall and UTM appliances
Sophos XG Firewall for Wi-Fi Access Points, Software Installation, Virtual Environments and Remote Ethernet Devices | Sophos NGFW
A big to the Sophos team. Are you still running SHP, @ForgottenSeer 58943 ?
@Evjl's Rain what tweaks do you recommend for WD?WD: good after being tweaked but not good in default settings.