App Review ZoneAlarm Extreme Security Next Gen 2024 - With Malware Tests

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.
Status
Not open for further replies.
Product name
ZoneAlarm Extreme Security Next Gen 2024
Installation (rating)
5.00 star(s)
User interface (rating)
5.00 star(s)
Accessibility notes
ZoneAlarm emulation detects stuff like phishing pdf documents, simple PowerShell keyloggers and many others. Stuff that nobody else would detect. At the same time, anti-phishing with real time analysis blocks more pages than big brands like Norton ever will.

Components like Anti-Bot and Behavioural Guard block advanced attacks, the behavioural blocking is based around Mitre tactics and techniques and not just around profiles, like SONAR or ATD (Bitdefender). The level of cleanup after a threat is amazing too, if you have a look at the forensic reports.
Performance (rating)
5.00 star(s)
Core Protection (rating)
5.00 star(s)
Proactive protection (rating)
5.00 star(s)
Additional Protection notes
After alot of testing this is one of the toughest, most realiable AV i ever used.
Browser protection (rating)
5.00 star(s)
Positives
    • Many features
    • Minimal setup required
    • Low impact on system resources
    • Lightning fast scans
    • Easy to use
    • Simple and non-intrusive
    • Ransomware protection
    • Strong and reliable protection
    • Detects or blocks in the wild malware
    • Consistently high test scores
    • Accurate results and reliable antivirus engine
    • Effective malicious URL blocking
    • Virus signatures are updated daily
    • Great value for money
    • Effective malware removal
    • Well designed, clear and easy to use interface
    • Multi-layer protection approach
Negatives
    • Can be costly to run
Time spent using product
Reviewed between 1 to 7 days
Computer specs


System Manufacturer Dazen
System Model Dazen Laptop X86
System Type x64-based PC
Processor Intel(R) Celeron(R) N5095 @ 2.00GHz, 1997 Mhz, 4 Core(s), 4 Logical Processor(s)
BIOS Version/Date American Megatrends International, LLC. 5.19, 3/23/2022
Installed Physical Memory (RAM) 12.0 GB
Recommended for
  1. All types of users
Overall rating
5.00 star(s)
ZangClean cleans everything, even the license information, so if you reinstall some time later, a new license is used, customer support quickly fixes this little problem.
It is best to first uninstall the product, which frees up the license seat and then run the tool to clean up the gunk.
 
Here :

They send a new 6 digits code.
You can directly desactivate automatic renewal.
 
Last edited:
  • Like
Reactions: Trident
I think only AVG and Avast offer custom installation. This is a big PLUS if someone want to try 3rd party antivirus.
Avg, Avast and G Data offer custom installation. I am not aware of any other solutions that offers that. Norton does not offer custom installation.

Emsisoft is bloat-free. Webroot is too.
 
Well, I have to disagree here. Trend Micro offers great protection. I know it's got mediocre signatures, but Hypersensitive mode, though it generates a high number of FPs, offers great protection. Its phishing protection is great too.
That’s how I tested it recently and it failed miserably too, just like it has always been failing. On shadowra’s test it failed to block old ransomware with detection on VT 50/70. It did not offer to perform remediation for the ransomware.
 
That’s how I tested it recently and it failed miserably too, just like it has always been failing. On shadowra’s test it failed to block old ransomware with detection on VT 50/70. It did not offer to perform remediation for the ransomware.
Well, it would be interesting to see TM fail when Hypersensitive mode is enabled.

Regarding Shadowra's tests. They're doing a great job but I have my reservations.

Anyway, I am eagerly waiting for your vids.
 
It includes the promoted evasion shield, which was set to “detect and remediate”. Webroot does not reveal the technicalities around it, but the 2 scripts were detected as PS/ObfuscatedURL.A which suggests that the shield looks at
  • Unable to read a URL through regex (script is obfuscated) +
  • Script interpreter connects to the network (observed either through user-mode hook or kernel driver, not sure).
Third one was not detected.
Unknown files undergo real-time analysis and scrutiny.

Suspicious files are executed in a controlled, isolated environment (semi-sandbox) to observe their behavior without affecting the system.
 
Last edited by a moderator:
  • Like
Reactions: Divine_Barakah
Unknown files undergo real-time analysis and scrutiny.

Suspicious files are executed in a controlled, isolated environment (sandbox) to observe their behavior without affecting the system.
Supposing the infection bypassed the web filter (or browser extension) in the first place.

Honestly I find it amusing how almost all those who test antivirus products come up with a 500 or so samples store on a Network drive and they test them in bulk. I don't know how on earth this is supposed to reflect a real world scenario.
 
Supposing the infection bypassed the web filter (or browser extension) in the first place.

Honestly I find it amusing how almost all those who test antivirus products come up with a 500 or so samples store on a Network drive and they test them in bulk. I don't know how on earth this is supposed to reflect a real world scenario.
I tested Trend with 4 downloaded samples and it did not detect 3 of them, which were also posted with their hashes here, I can’t be looking for the post now. So not sure that it is an amazing product. One of them was very widely known.
It was in hypersensitive mode as always.
 
I tested Trend with 4 downloaded samples and it did not detect 3 of them, which were also posted with their hashes here, I can’t be looking for the post now. So not sure that it is an amazing product. One of them was very widely known.
It was in hypersensitive mode as always.
Downloaded from where? I am not defending TM here or any other product. What I am trying to express is the fact that almost all security products behave in a way that would happen in a real world scenario.

It would be great to conduct ur tests. Waiting to see the vids.
 
Downloaded from where? I am not defending TM here or any other product. What I am trying to express is the fact that almost all security products behave in a way that would happen in a real world scenario.

It would be great to conduct ur tests. Waiting to see the vids.
They were downloaded through a sharing site, as I get them on my mac and upload them. This is very valid, users will be going around and downloading stuff. Attackers very frequently abuse trusted sharing websites to host their payloads.

Furthermore, malware with VT 50/70 should be detected no matter where it comes from. Otherwise, I’m sure we can all argue how effective the product is.
 
Is there a way to make the Firewall/Application Control default block with user prompt? I can't seem to find anything.
 
symantec lists zonealarm as filtering provider so checkpoint has accesses to symantec inteliigence?
Capture.PNG
 
Last edited:
  • Like
Reactions: simmerskool
Status
Not open for further replies.