AV-TEST The best antivirus according to CheckLab – A new testing organization

Disclaimer
  1. This test shows how an antivirus behaves with certain threats, in a specific environment and under certain conditions.
    We encourage you to compare these results with others and take informed decisions on what security products to use.
    Before buying an antivirus you should consider factors such as price, ease of use, compatibility, and support. Installing a free trial version allows an antivirus to be tested in everyday use before purchase.

stefanos

Level 28
Verified
Top Poster
Well-known
Oct 31, 2014
1,712
F

ForgottenSeer 58943

Can anyone please tell me why Gdata"s endpoint or any endpoint does so much better than there total security?

Two things probably made Endpoint score better.. Endpoint version had Deepray before the consumer. This test was likely conducted before full implementation of Deepray. Also, the Endpoint version has full application whitelist/blacklist technology and a form of SRP which the consumer version does not have.
 

Mahesh Sudula

Level 17
Verified
Top Poster
Well-known
Sep 3, 2017
818
Can anyone please tell me why Gdata"s endpoint or any endpoint does so much better than there total security?
++
Also G data Endpoint uses CYREN based layer to better detect outbreaks and respond accordingly
Though consumer side version don't support this feature,, indirectly Engine B signatures are released with same time frame
Ever wondered Engine B signatures had become much faster and smarter over Bit defender from the recent years. Thanks to CYREN
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top