Cyber Transparency Audit

a review of developer backends and their endpoint protection

Companies in every sector, private and public, fall victim to cyberattacks which is why IT vendors who take proactive measures to protect data, systems, and endpoints are seen as responsible and trustworthy.

The Cyber Transparency Audit report is our opinion and analysis of telemetry data that is provided by developers of Endpoint Protection software.

As part of these analyses, we gain access to the developer infrastructure to independently audit anonymized information about files, threats, and secured devices by the developer software against cyberattacks.

What steps do we take when conducting the audit?

Verifying

We verify the information obtained about files and secured devices in terms of compliance with specific guidelines that are conditioned by the established audit procedure.

Emphasizing

We highlight strengths through data analysis, so that the developer can gain more trust from partners and business customers.

Indicating

We highlight aspects that a developer can consider to ensure that the solution provides effective protection of systems, data, and users.

Paying attention

When auditing a project, we pay attention to its advantages and disadvantages that go beyond the methodology, because the pursuit of cybersecurity is a process, not a once delineated scheme.

We obtain data from the developer’s static infrastructure via API or graphical interface. The scope of this data and its details is discussed during the initial audit preparation. The auditor can verify developer’s data using test malware which should be included in telemetry.

In order to obtain the transparency certificate, it is necessary to meet all data compliance requirements in the audited period. During the audit, the developer must cooperate with the auditor, and answer all his questions.

The certificate is valid for one year from the date of its award. Historical telemetry data after such a long time may differ significantly from the initial state, so continued use of the certificate will require data validation to be performed again.

The Cyber Transparency Forum working group brings together leading security software developers who work together to increase transparency, and find ways to communicate telemetry data to the entire Internet community.

If you are a developer of security software, please contact the Cyber Transparency Forum group. Joining requires meeting certain conditions, including: 100 000 protected devices, and sharing telemetry data obtained from them.

Of course! Read the methodology on our website.

Who is the audit service addressed to?

The audit is addressed to developers and vendors of IT solutions (mainly Endpoint Protection software) who want to make sure that their solution is properly designed, configured, and operates in accordance with the idea of transparency.

Company Managers

The management board will learn about the condition and quality of security measures offered to end customers, and know recommendations for increasing transparency which will have a positive impact on the company image.

Business Partners

The audit can provide independent confirmation that a developers adheres to certain safety standards, and sets new standards for transparency.

Security Analysts

The audit can help identify security weaknesses and strengths that in a broader perspective allows for better protection of users against threats.

Benefits of a published audit

Independent evaluation of telemetry data can bring tangible benefits to your customers.

Disclosing certain data is a great way to show that as a developer, you are helping to minimize the risk of a cyberattack, and building trust in your company that is essential for long-term business relationships. In addition, such activities allow your employees to be sure that they work for a company that focuses on the quality of service.

The audit can help raise awareness of the solutions you offer.

Regular auditing of incident information from endpoint devices by external auditors can increase trust in your company.
An external auditor helps you look at telemetry differently, and indicate which ones should be publicly available to increase trust in your solution.
The result of the audit can indicate the strengths of the product, and whether the solution meets certain standards. This will have a positive impact on the customer's decisions.
Conducting the audit will reveal whether you take the protection of customer data seriously, and you are taking appropriate measures to keep it safe.

Cyber Transparency Audit Certificate

The audit ends with a certificate recognized in the cybersecurity industry which you can use to stamp your solution.

The Cyber Transparency Audit Certified is valid for 12 months from its award. Historical telemetry data after such a long time may differ significantly from the initial state, so continued use of the certificate will require data validation to be performed again.

Cooperation

How to proceed with the audit?

1

Initial Conversation / Mail

Setting priorities, presenting our capabilities, and terms of cooperation.

3

Technical Data

Determination of the technical data necessary to conduct the audit. Preliminary details are available in the methodology.

2

Delegation of Access

At this stage, we verify the authenticity of the data that we will analyze.

4

Auditing

We audit the data, and actively cooperate to get the maximum benefit out of the analysis.

5

Output Information

Provide detailed data from the analysis and discuss the results.

6

Obtaining Certification

Possibility to use the awarded certificate.

What are your guarantees
of a reliable test?

We have been dealing with testing and cybersecurity since 2012. During this time, we have performed hundreds of tests that have allowed us to improve the products of the largest developers on the market.

We are affiliated with the prestigious AMTSO (Anti-Malware Testing Standards Organization) which upholds the standards of conducting security tests. As part of our functions in the international community of experts, we work on improving the transparency, objectivity, and quality of security software tests.

View one of AMTSO’s latest compliance reports

avlab cybersecurity foundation
Contact with AVLab

Cooperation & Contact

We invite all interested developers and providers of security solutions for individual customers and for medium and large companies to work with us. We encourage you to get familiar with our offer and opportunities for cooperation.