Security Tests
WE USE REAL TECHNIQUES OF BYPASSING SECURITY
Authoring Tools
OUR ALGORITHMS DETECT A RESPONSE OF TESTED PRODUCTS TO MALWARE
Honeypots Network
MALWARE IS OBTAINED FROM A NETWORK OF HONEYPOTS INSTALLED ON EVERY CONTINENT
Trusted Lab
AVLAB IS ONE OF THE LEADERS OF TRUSTED TESTING LABORATORIES IN EUROPE AND WORDWIDE
MITRE ATT&CK
OUR TESTS ARE COMPLIANT WITH PROCEDURES, TACTICS AND TECHNIQUES BASED ON REAL-WORLD OBSERVATIONS
Previous
Next

AVLab

CYBERSECURITY FOUNDATION

The AVLab organization was founded since 2012 in the industry of informatics security. One of the primary objective of the AVLab organization is to test security usefulness, and issuing certificates confirming the protection effectiveness against cyber attacks, malware, and also provide results to public information while ensuring the maximum transparency of the tests.

Tests & Awards

Solutions to protect workstations tested against malicious software receive special certificates that prove protection suitability against malware and new generation cyberattacks. Obtaining certificates is a confirmation for a producer of having a reputable security product in a given edition of the test.

recent results

Presenting the latest results of comparison of tested solutions to protect workstations against malware.

LATEST PUBLICATIONS

Recent articles, reports, tests, comparisons related to antivirus products and cybersecurity industry.

methodology

Detailed information about our methodology: collecting, analysing, testing malware samples.

How to get the certificate?

Essential information about awards and a procedure of obtaining certificates.

AVLab Cybersecurity Foundation - awards

CERTIFICATES GRANTED TO TESTED SOLUTIONS

See which security products have been awarded the AVLab certificates in the particular edition of The Advanced In The Wild Malware Test compliant with MITRE ATT&CK procedures, tactics and techniques based on real-world observations.

Cooperation

We invite interested developers and providers of security solutions for individual customers and for medium
and large companies to work with us. We encourage you to get familiar with our offer and opportunities for cooperation.

Performing
THOUSANDS ANALYSES
OF MALWARE SAMPLES
Honeypots
COLLECTING MALWARE
FROM A NETWORK OF HONEYPOTS
No SHA collision
TESTING ONLY UNIQUE
MALWARE SAMPLES
Used Tools
We use Linux, NodeJS and Sysmon
with MITRE ATT&CK configuration
Previous
Next