[1] The number of harmful changes made to Windows during dynamic analysis of the malware sample. [2] Average blocking of malware by all tested solutions, regardless of level of prevention or protection. Remember! HTTPS protocol can be used to host malware! SSL certificate and the so-called padlock at the web address does not certify safety of the website.
TOP 3
HIJACKED SERVERS LOCATION
0
0
0
TOP 3
TLD COMPROMISED DOMAINS
0
.com
0
.org
0
.su
0
DOMAINS WITH MALICIOUS FILES
0
IP ADDRESSES WITH MALICIOUS FILES
Malware Comparison Table in March 2023
The following summary shows a comparison of tested solutions to protect workstations against malware. We encourage you to become familiar with a detailed description and read our testing methodology in order to understand the results.
PRE-LAUNCH: The classification concerns detecting malware samples before they are launched in the system. POST-LAUNCH: The analysis level, i.e. a virus has been run and blocked by a tested product. FAIL: The failure, i.e. a virus hasn’t been blocked and it has infected a system. Sandbox Column: Number of indicators, i.e. malicious changes made to the system without the anti-virus installed.
Remediation Time Average (RT): The time expressed in seconds from the introduction of malware into the system by a browser, through the launch to detecting and resolving security incident. Occurs only at the POST-Launch level.
You can always go back in time and check how each individual security product performed during previous editions of the test. We make the results from all previous tests available to you to verify if your favorite developer has improved protection against latest malware in his security software.