App Review ZoneAlarm Extreme Security Next Gen 2024 - With Malware Tests

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.
Product name
ZoneAlarm Extreme Security Next Gen 2024
Installation (rating)
5.00 star(s)
User interface (rating)
5.00 star(s)
Accessibility notes
ZoneAlarm emulation detects stuff like phishing pdf documents, simple PowerShell keyloggers and many others. Stuff that nobody else would detect. At the same time, anti-phishing with real time analysis blocks more pages than big brands like Norton ever will.

Components like Anti-Bot and Behavioural Guard block advanced attacks, the behavioural blocking is based around Mitre tactics and techniques and not just around profiles, like SONAR or ATD (Bitdefender). The level of cleanup after a threat is amazing too, if you have a look at the forensic reports.
Performance (rating)
5.00 star(s)
Core Protection (rating)
5.00 star(s)
Proactive protection (rating)
5.00 star(s)
Additional Protection notes
After alot of testing this is one of the toughest, most realiable AV i ever used.
Browser protection (rating)
5.00 star(s)
Positives
    • Many features
    • Minimal setup required
    • Low impact on system resources
    • Lightning fast scans
    • Easy to use
    • Simple and non-intrusive
    • Ransomware protection
    • Strong and reliable protection
    • Detects or blocks in the wild malware
    • Consistently high test scores
    • Accurate results and reliable antivirus engine
    • Effective malicious URL blocking
    • Virus signatures are updated daily
    • Great value for money
    • Effective malware removal
    • Well designed, clear and easy to use interface
    • Multi-layer protection approach
Negatives
    • Can be costly to run
Time spent using product
Reviewed between 1 to 7 days
Computer specs


System Manufacturer Dazen
System Model Dazen Laptop X86
System Type x64-based PC
Processor Intel(R) Celeron(R) N5095 @ 2.00GHz, 1997 Mhz, 4 Core(s), 4 Logical Processor(s)
BIOS Version/Date American Megatrends International, LLC. 5.19, 3/23/2022
Installed Physical Memory (RAM) 12.0 GB
Recommended for
  1. All types of users
Overall rating
5.00 star(s)

TuxTalk

Level 13
Thread author
Verified
Top Poster
Well-known
Nov 9, 2022
649
With a little hindsight, the home screen only appeared until the first scan was done. Otherwise, still light and also at a very cheap price (€15.95 for 3 devices - €16.95 for 5 devices). Few false positives fixed once and for all.
Where did you find this price ?
 
  • Like
Reactions: Trident and vonvon

vonvon

Level 3
Verified
Well-known
Nov 25, 2014
121
Here :

They send a new 6 digits code.
You can directly desactivate automatic renewal.
 
Last edited:
  • Like
Reactions: Trident

Trident

Level 34
Verified
Top Poster
Well-known
Feb 7, 2023
2,349
Well, I have to disagree here. Trend Micro offers great protection. I know it's got mediocre signatures, but Hypersensitive mode, though it generates a high number of FPs, offers great protection. Its phishing protection is great too.
That’s how I tested it recently and it failed miserably too, just like it has always been failing. On shadowra’s test it failed to block old ransomware with detection on VT 50/70. It did not offer to perform remediation for the ransomware.
 

Divine_Barakah

Level 33
Verified
Top Poster
Well-known
May 10, 2019
2,289
That’s how I tested it recently and it failed miserably too, just like it has always been failing. On shadowra’s test it failed to block old ransomware with detection on VT 50/70. It did not offer to perform remediation for the ransomware.
Well, it would be interesting to see TM fail when Hypersensitive mode is enabled.

Regarding Shadowra's tests. They're doing a great job but I have my reservations.

Anyway, I am eagerly waiting for your vids.
 
  • Like
Reactions: Dave Russo
F

ForgottenSeer 114834

It includes the promoted evasion shield, which was set to “detect and remediate”. Webroot does not reveal the technicalities around it, but the 2 scripts were detected as PS/ObfuscatedURL.A which suggests that the shield looks at
  • Unable to read a URL through regex (script is obfuscated) +
  • Script interpreter connects to the network (observed either through user-mode hook or kernel driver, not sure).
Third one was not detected.
Unknown files undergo real-time analysis and scrutiny.

Suspicious files are executed in a controlled, isolated environment (semi-sandbox) to observe their behavior without affecting the system.
 
Last edited by a moderator:
  • Like
Reactions: Divine_Barakah

Divine_Barakah

Level 33
Verified
Top Poster
Well-known
May 10, 2019
2,289
Unknown files undergo real-time analysis and scrutiny.

Suspicious files are executed in a controlled, isolated environment (sandbox) to observe their behavior without affecting the system.
Supposing the infection bypassed the web filter (or browser extension) in the first place.

Honestly I find it amusing how almost all those who test antivirus products come up with a 500 or so samples store on a Network drive and they test them in bulk. I don't know how on earth this is supposed to reflect a real world scenario.
 
  • Like
Reactions: simmerskool

Trident

Level 34
Verified
Top Poster
Well-known
Feb 7, 2023
2,349
Supposing the infection bypassed the web filter (or browser extension) in the first place.

Honestly I find it amusing how almost all those who test antivirus products come up with a 500 or so samples store on a Network drive and they test them in bulk. I don't know how on earth this is supposed to reflect a real world scenario.
I tested Trend with 4 downloaded samples and it did not detect 3 of them, which were also posted with their hashes here, I can’t be looking for the post now. So not sure that it is an amazing product. One of them was very widely known.
It was in hypersensitive mode as always.
 

Divine_Barakah

Level 33
Verified
Top Poster
Well-known
May 10, 2019
2,289
I tested Trend with 4 downloaded samples and it did not detect 3 of them, which were also posted with their hashes here, I can’t be looking for the post now. So not sure that it is an amazing product. One of them was very widely known.
It was in hypersensitive mode as always.
Downloaded from where? I am not defending TM here or any other product. What I am trying to express is the fact that almost all security products behave in a way that would happen in a real world scenario.

It would be great to conduct ur tests. Waiting to see the vids.
 

Trident

Level 34
Verified
Top Poster
Well-known
Feb 7, 2023
2,349
Downloaded from where? I am not defending TM here or any other product. What I am trying to express is the fact that almost all security products behave in a way that would happen in a real world scenario.

It would be great to conduct ur tests. Waiting to see the vids.
They were downloaded through a sharing site, as I get them on my mac and upload them. This is very valid, users will be going around and downloading stuff. Attackers very frequently abuse trusted sharing websites to host their payloads.

Furthermore, malware with VT 50/70 should be detected no matter where it comes from. Otherwise, I’m sure we can all argue how effective the product is.
 

Smoke

Level 4
Verified
Well-known
Dec 7, 2014
181
Is there a way to make the Firewall/Application Control default block with user prompt? I can't seem to find anything.
 
  • Like
Reactions: Trident

Vitali Ortzi

Level 26
Verified
Top Poster
Well-known
Dec 12, 2016
1,580
symantec lists zonealarm as filtering provider so checkpoint has accesses to symantec inteliigence?
Capture.PNG
 
Last edited:
  • Like
Reactions: simmerskool

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top