Throughout the calendar year, developers of modern endpoint security solutions update their software several times, fixing bugs, and adding new features. Thanks to the in-depth Advanced In-The-Wild Malware Tests, it is possible to check the effectiveness of protection on an ongoing basis throughout the year.
Advanced In-The-Wild Malware Test is a long-term series (6 editions per year) that consists in mapping user behavior when working with a browser. The primary objective of the test is to identify the security products that best respond to threats throughout the year. We avoid issuing opinions on the basis of a single test, because the final and reliable result is influenced by the diverse landscape of in-the-wild threats.
We put emphasis on mapping the real scenario of using the system, applications, and the Internet. This is not a simulation, but a faithful representation of the user’s behavior: browsing the web, downloading files from links, running files. This allows to test solutions to protect workstations, mobile devices, personal computers, and various types of cybersecurity services in the best way.
WE USE REAL TECHNIQUES OF BYPASSING SECURITY
OUR ALGORITHMS DETECT A RESPONSE OF TESTED PRODUCTS TO MALWARE
MALWARE IS OBTAINED FROM A NETWORK OF HONEYPOTS LOCATED ON EVERY CONTINENT
AVLAB IS ONE OF THE LEADERS OF TRUSTED TESTING LABORATORIES IN EUROPE AND WORLDWIDE
OUR TESTS ARE COMPLIANT WITH PROCEDURES, TACTICS AND TECHNIQUES BASED ON REAL-WORLD OBSERVATIONS
OUR TESTS MEET ALL THE TECHNICAL REQUIREMENTS OF ANTI-MALWARE TESTING STADARDS ORGANISATION
If you are a developer or distributor of anti-malware software, and your software is designed to protect Windows workstations and servers, then this test may be suitable for you.
The Advanced In-The-Wild Malware Test is also tailored to more specialized solutions with EDR and XDR modules for larger environments.
By participating in the tests, developers have a chance to learn about potential risks that may have been overlooked, or not taken into account.
Error Elimination
By engaging in cooperation, you will receive information about errors already at the investigation stage. This will help you take the right steps faster to fix potential bugs in software.
Acquiring Customers
The research results we publish reach potential customers who are looking for solutions to ensure their safety.
Product Certification
You can receive internationally recognized certificates that prove effective protection and reliable neutralization of threats throughout the year.
Example use of telemetry data from a test:
We report in detail telemetry data on each malware sample, broken down into pre_launch and post_launch classification. They concern the identification of the threat before it is launched on the system, or after it runs in the configured environment.
This is the most dangerous situation that can happen to anyone as a result of an unknown file getting into the system. We provide detailed data about each sample along with the product’s response to a threat.
We measure the so-called Remediation Time. The value given in seconds can tell you more about the differences between developers. It also helps in debugging incidents which are the most different from the average.
Thanks to proprietary testing methods, we define technology divided into the cloud, proactive, and sandbox, which contributes to data and system security.
We report the test telemetry data in detail and explicitly to developers and readers who are involved in the testing process.
Based on the telemetry data from the test, awarded certificates confirm the effectiveness of protection against malware, cyberattacks, as well as threat removal. The tested solutions receive a certificate after meeting certain conditions.
Certificate is granted to solutions that are characterized by a high level of security in a single edition of the Advanced In The Wild Malware Test.
Once all testing rounds have been completed in a calendar year, we award a special Product of the Year certificate.
The certificate is awarded for quick blocking of potential malware, and for flawless neutralization of malware.
Join the developers certificated by the independent organization.
Use the certificate for marketing purposes, e.g. place it on your website, promote your company in a magazine, allow potential customers to see that you own a reputable solution.
Safely test out your solution in a controlled environment.
Receive feedback and improve the effectiveness of security product.
Setting priorities, presenting our capabilities, and terms of cooperation.
If the solution requires a license or appropriate configuration, the developer must provide details.
Establish the technical data necessary to identify and neutralize threats in order to automate tests.
Testing a product in a configured Windows environment.
Provide detailed telemetry data from the test and discuss the results.
We have been dealing with testing and cybersecurity since 2012. During this time, we have performed hundreds of tests that have allowed us to improve the products of the largest developers on the market.
We are affiliated with the prestigious AMTSO (Anti-Malware Testing Standards Organization) which upholds the standards of conducting security tests. As part of our functions in the international community of experts, we work on improving the transparency, objectivity, and quality of security software tests.
View one of AMTSO’s latest compliance reports
We invite all interested developers and providers of security solutions for individual customers, and for medium and large companies to work with us. We encourage you to get familiar with our offer and opportunities for cooperation.