![]() ![]() But the lab does not simply go through the motions. In the May-June test under Windows 10, this amounted to 5 scenarios with data stealers and 5 with ransomware. The lab evaluated each of the 27 products for consumer users and corporate users in 10 special scenarios. That is why an attack may be fended off in later steps, although the detection did not trigger in the initial step. For in addition to basic detection, the products use sophisticated techniques for detection and defense, such as EDR, Endpoint Detection and Response, for example. In doing so, the experts went far beyond the classic detection test – just as a protection solution does as well. In its May-June test, AV-TEST examined 27 products under laboratory conditions in its Advanced Threat Protection test. Data stealers, ransomware and many dangerous methods Yes: The security manufacturers deliver the performance customers can count on. But who has the upper hand in this competition? Can the security suppliers react quickly enough, and do they actually detect all methods of attack? This test provides at least a significant partial answer from the series of Advanced Threat Protection tests. On the opposing side – among the security suppliers – people are working just as feverishly on the detection of and defense against the insidious attack techniques of the cybercriminals. Rather, the perpetrators behind the attack groups are partly well-organized companies that continuously invest in the further development of their malware and steer the attacks. Developers of malware and cyber attackers don't sit in dark cellars, launching attacks haphazardly. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |