You are on page 1of 9

Presented by

COMPARATIVE REVIEW

Practical Business Endpoint Security


capabilities may discover less-familiar mance—a product needs to protect
In This Review options that are a better fit for their users against Web threats and stay out
enterprises. of their way as much as possible. Then
• ESET Smart Security 4 Business we changed vantage points to the IT
Edition In our continued testing of security administrator and explored how the
• Kaspersky Business Space Security products, Cascadia Labs has found product integrates with Active Direc-
6.0 R2 (Administration Kit 8.0) significant differences in how well tory and Windows 2008 Server, and
• McAfee Total Protection for products meet various corporate goals what the product is like to manage and
Endpoint v 8.7i (ePO 4.5)
for security suites, from effectiveness at use. We continue to believe that prod-
• Sophos Endpoint Security and
Control 8 blocking threats to performance to in- ucts that are easy to manage and that
• Symantec Endpoint Protection tegration with enterprise infrastructure. provide excellent visibility into their
11.0 workings will ultimately contribute to a
• Trend Micro Worry-Free Business To evaluate the true capabilities of better security policy.
Security 6.0 Standard Edition endpoint security suites, we put six of
them to the test in our enterprise secu- Summary
rity lab. We gathered detailed quanti- We found that the products were more
The business endpoint security market tative and qualitative data about their different than similar—leading to the
is changing at a surprisingly rapid clip, capabilities in a variety of areas impor- conclusion that companies should
especially considering how relatively tant to small and midsize enterprises. carefully consider the choice they
mature it is. While established brand make.
names may provide subjective reas- We started by looking at the end-user
surance, buyers who look beyond experience with some quantitative Kaspersky, Symantec, and Trend Micro
the brands to products’ quantitative measures of effectiveness and perfor- Worry-Free made installation and

OVERALL RATINGS
Kaspersky Trend Micro
McAfee Total
ESET Smart Business Space Sophos Endpoint Symantec Worry-Free
Protection for
Category Security 4 Security 6.0 R2 Security and Endpoint Business Security
Endpoint 8.7i
Business Edition (Administration Control 8 Protection 11.0 6.0 Standard
(ePO 4.5)
Kit 8.0) Edition
Installation & Configuration SS SSSSS SS SSS SSSS SSSS
Policies & Management SS SSSS SSS SSSS SSSS SSSS
Visibility & Reporting SS SSS SSSS SSS SSSS SSS
Performance SSSS SSSSS SSS SSSSS SSS SS
Effectiveness SSS SSSS SSS S SS SSSS
OVERALL SS½ SSSS SSS SSS SSS½ SSS½
Quick Summary A fast product Nice choice for A complex Very clean and A solid product A good choice for
best suited to companies of all product best well-designed with good small companies,
smaller companies sizes given great suited for large product with management and offering solid
given its poor AD AD integration, organizations that default settings great reporting, protection against
integration, lack of speed, excellent can handle its that do little to but with some real Web threats.
a dashboard, and protection against complexity. We block Web threats. struggles against Performance can
little polish Web threats, and found slow Reporting needs our live Web be a drag.
relative to other solid manage- performance some work. threats.
products in this ment. Reporting throughout our
review. and documenta- tests.
tion can be
improved.
Key:S–PoorSS–FairSSS–GoodSSSS–VeryGoodSSSSS–Excellent

1
INSTALLATION & CONFIGURATION SUMMARY REPORT
Steps and
Product Time to Rating Pros Cons
Complete
ESET Smart Security 131 steps, SS x Very well documented: easy to follow, x Poor Active Directory integration
3-4 hours included GPO changes x Uses Microsoft Access database by
default (not documented in wizard)
Kaspersky Business 78 steps, SSSSS x No manual GPO changes required x Installation documentation could be
Space Security 3 hours x Manual firewall changes clearly clearer
documented
x Provides extensive list of product
removals
x Automatically installs database for
management server
McAfee Total 166 steps, SS x Good detection of Active Directory x Process is complex
Protection for Endpoint 4-6 hours clients and other domains on the x Product required a comparatively large
network number of downloads and was poorly
x AD sync task is easy to perform and integrated
use later x Poor documentation, with disjointed
topics
Sophos Endpoint 183 steps, SSS x Great Active Directory integration: x Requires pre-install of SQL Server
Security and Control 3-4 hours importing the AD structure is easy to 2005/2008
find and perform x Requires server reboot after disabling
UAC, forcing restart from beginning of
wizard
x Custom install of “SQL Server”
component is confusing
Symantec Endpoint 123 steps, SSSS x Documentation very thorough, easy to x Manual GPO or client configuration
Protection 3-4 hours follow required to open network for agent
x Auto-installs database for install
management server
x AD sync well documented and easy to
perform
Trend Micro Worry- 72 steps, SSSS x Least number of steps during x Requires manual GPO configuration to
Free Business Security 3 hours installation push client
x Auto-installs a database for x IIS-specific components not documented
management server until after initial IIS install is completed

configuration easy, with Kaspersky default configurations. Windows XP and Windows 7 machines,
edging out the others thanks to its Ac- configured it, and then tested its per-
tive Directory integration. These same In the end, companies will need to formance and effectiveness against
products and Sophos provided the best make a choice based on their individu- a set of Web threats to exercise the
policies and management experience; al requirements and to configure them product’s countermeasures that may
McAfee lagged due to complexity, and suitably, so it pays to look at individual include signature-based detection, URL
ESET needs better Active Directory in- ratings and reviews and not simply the and Web content filtering, behavioral
tegration to be a viable player in larger products’ overall scores. blocking, firewalls, and other protective
companies. abilities. We also performed representa-
Rating the Products tive administrative tasks such as adding
Symantec and McAfee had the best The ratings are determined based on new machines to the network, granting
visibility and reporting, with many the tests run in our labs with highlights exceptions for particular applications
options to make the administrator and shown as Pros and Cons in our summary running on individual machines, and
compliance officer happy. In terms of reports. The ratings are intended for use testing alerting and reporting capabili-
performance, Kaspersky, Sophos, and in comparing the products and should ties. We then scored each product in the
ESET all fared well, with McAfee and not be used as an absolute measure of following five categories.
Trend Micro slowing down a user’s the products’ capabilities in a given area.
experience significantly. In terms of ef- If a product truly stands out against the Installation & Configuration rates
fectiveness, Kaspersky and Trend Micro other products, it can receive 5 triangles. the experience of installing the server
Worry-Free got the best scores, with software and management console and
Symantec and Sophos not fully block- We installed each product on our test deploying the endpoint security software
ing enough of our Web threats in their network of Windows Server 2008 and to client and server machines on the

2
POLICIES & MANAGEMENT SUMMARY REPORT
Product Rating Pros Cons
ESET Smart Security SS x Policy editor includes unique “default” button to x No Active Directory integration
set any value back to the default Doesn't handle groups well; default view returns to
view without groups when restarted
Kaspersky Business SSSS x Clear, easy-to-use interface x Only one active policy of each type allowed in each
Space Security x Allows for separate workstation, server, and container
mobile policies in each group
x Uses one policy per group
x MMC interface is easier, faster than Web-based
interfaces
McAfee Total SSS x Provides very granular control over policies and x Complex: uses 11 separate anti-virus policies, plus
Protection for what users see one for the agent
Endpoint x Default install leaves clients unprotected; updates
not enabled
x Default firewall install disables all network
connectivity
Sophos Endpoint SSSS x Nice clear interface; everything you need is in x Uses five policies (Agent, Anti-Virus, Application
Security and Control one window Control, Firewall, and NAC), making creating and
deploying policies cumbersome
Symantec Endpoint SSSS x Interface is simple and straightforward x Multiple policies make client administration more
Protection x Default policies have the settings most complex than single-policy products
administrators will want
x Firewall works with enterprise apps without
modification
Trend Micro Worry- SSSS x Clean, simple interface x Default configuration leaves login Web console
Free Business x All policy changes can be made in one tab with security certificate error
Security x Easy to determine which policy applies to any
group, to create new policies or groups

network. We favored truly integrated ones make administrators’ lives easier administrative tasks such as setting
products, those with straightforward by automatically installing necessary default endpoint policy, adding a new
installation wizards, and those that auto- pre-requisites. desktop, scheduling scans, running an
discover endpoints through full Active on-demand scan, and configuring a
Directory integration, NetBIOS, or IP ad- Policies & Management covers both firewall. We also awarded higher scores
dresses. Many of these products require initial policy configuration and ongo- to products with enterprise-oriented
a database and Web server. The best ing policy management. We included features such as Active Directory integra-
VISIBILITY & REPORTING SUMMARY REPORT
Product Rating Pros Cons
ESET Smart Security SS x Lots of pre-defined reports x No dashboard
x Custom reports and alerts are difficult to set up
x No PDF format option for reports
Kaspersky Business SSS x Excellent extensible dashboard x Finding the report you’re looking for can take a
Space Security x Flexible system for both pre-defined and custom while
reports and alerts x “Custom” reports limited to pre-defined queries
x Easy to e-mail alerts and reports
McAfee Total SSSS x Large set of pre-defined reports and alerts x Complex process to create reports
Protection for x Nice dashboard, with a huge number of optional x Must navigate through multiple sections of the
Endpoint graphs that can be displayed on as many interface
different tabs as desired
Sophos Endpoint SSS x Clean interface for dashboards and reports x Reporting functionality is limited to a few
Security and Control x Setup of e-mail alerts is quick and easy categories
x No way to automatically generate weekly reports
Symantec Endpoint SSSS x Informative, well-organized dashboard x Admin console can result in very high utilization
Protection x Process of sending reports and alerts is simple levels on the server
and straightforward x Limited to HTML reports
x Alert system is complete and easy to use with
dampers
Trend Micro Worry- SSS x Dashboard is well organized and customizable x Canned reports a bit awkward to use
Free Business x Alerts and reports are simple to schedule and x Reporting is limited to 14 pre-defined reports
Security send via e-mail

3
tion and location awareness. All of the products imposed a
products support some type of push significant impact on TimetoPerformOnͲAccessScan
install to clients in a domain, as well as everyday activities— 0:00 5:00 10:00 15:00 20:00
inheritance of policies from a parent they needed more than Baseline
container to its children. We preferred double the time to copy
ESET
fewer policies to manage and products folders and open a large
Kaspersky
that could ably handle laptops, desktops, PowerPoint file as our
and server policies sensibly. baseline system (with
McAfee

no endpoint security Sophos

Visibility & Reporting examines the product). Symantec and Symantec

dashboard, reporting, and alerting Trend Micro took the TrendMicro

capabilities offered by the product. We longest to perform on-


considered the availability of a dash- demand scans. TimetoPerformOnͲDemandScan
board that provides an easy-to-compre- 0:00 5:00 10:00 15:00 20:00 25:00 30:00
hend overview of client protection status, In addition, we per-
recent events, and task-based activities formed a second on-de- Baseline

to be a major benefit. However, a dash- mand scan to determine ESET

board must be augmented by report- the maximum potential Kaspersky

ing and alerting tools to identify critical benefit of a product’s McAfee

information such as detected malware, caching mechanisms. Sophos

out-of-date signatures, and computers The Kaspersky product Symantec


lacking endpoint protection across hun- showed a much larger TrendMicro
dreds or even thousands of endpoints. improvement than
other products—but TimetoOpenLargePowerPointFile
Performance measures how well each it’s important to note
0:00 0:05 0:10 0:15 0:20
product minimizes impact on users that this test shows the
while performing common tasks such maximum possible ben- Baseline

as on-access scans, full-system scans, efit, in conditions where ESET


and opening large files. An endpoint no files had changed Kaspersky
security solution shouldn’t noticeably and no intervening McAfee
slow end-users down. The cream of the signature updates were Sophos
crop will add only minimal overhead on performed. Because Symantec
client computers for on-access and on- this second on-demand TrendMicro
demand scans. scan is so unrepresenta-
tive of real-world usage, TimetoReboot
Effectiveness rates the products’ ability we did not include it in
to block Web-based threats. To provide a our calculations of the 0:00 0:30 1:00 1:30 2:00

level playing field, we conducted testing products’ performance Baseline


using samples from our own indepen- ratings. ESET
dently-created corpus without input Kaspersky
from the vendors. We set basic settings Effectiveness McAfee
and tested the products in their default Results Sophos
configuration allowing the products to The products showed
Symantec
use their full set of countermeasures wide variation in ef-
TrendMicro
against threats. We measure the prod- fectiveness at blocking
ucts’ ability to halt threats before they the effects of drive-by
initiate processes or otherwise modify downloads and browser- TimetoPerformSecondOnͲDemandScan
the computer. borne exploits, a domi- 0:00 5:00 10:00 15:00 20:00 25:00 30:00
nant mode of threat
Performance Results
Baseline
delivery today. Kaspersky
ESET
The Sophos and Kaspersky products edged out Trend Micro
Kaspersky
were the fastest we tested. They mini- for the best outcome,
mized the overhead of on-access scans, each completely block-
McAfee

and turned in by far the shortest times to ing 80 percent or more Sophos

perform full-system on-demand scans. of the exploit campaigns Symantec

By contrast, the McAfee and Trend Micro we tested with. In Trend TrendMicro

4
face and other aspects results, but the product took longer to
WebThreatBlockingEffectiveness desirable for compa- perform full-system scans than the fastest
100%
nies. The package also products. Its effectiveness against Web
90%
80% has somewhat limited threats was middle-of-the-road.
70% policy-management
60%
features, and it was Kaspersky Business Space
Security 6.0 R2 BRIEF
50%
40% a chore to generate
30% custom reports and The Kaspersky endpoint security suite
20%
alerts. excelled on our performance and effec-
10%
0% tiveness tests and was a breeze to install.
ESET Kaspersky McAfee Sophos Symantec TrendMicro Like Kaspersky Busi- Its deployment required among the
ness Space Security, fewest steps of the products we tested,
the ESET product does and it provides flexible management and
Micro’s case, the product achieved this not require an administrator to manually reporting capabilities.
effectiveness via URL-based blocking, install either a database or Web server
reporting that it was preventing numer- prior to installation and agent deploy- The product uses several wizards to
ous malicious URLs from downloading at ment. However, before deploying the simplify the installation of the server and
all. Kaspersky’s product used a variety of agent, several modifications to Windows management components, and provides
techniques, including heuristics identify- Firewall settings in the GPO will need administrators with the option to deploy
ing malicious iframes embedded in a to be made. One challenge came when the security agent via a Windows Group
Web page’s HTML, that in most cases attempting to locate the appropriate Policy object (GPO) or via a remote
completely thwarted the exploits. Even in security components to download from push once file and print sharing ports
the cases where Kaspersky did not com- ESET’s extensive multi-language and are opened. It was the only product we
pletely block the exploit, it did at least reviewed that lets an administrator si-
report that it had detected Trojans. lently deploy agents via an automatically
created GPO, and it was among the least
ESET and McAfee were in the second tier, complicated and fastest products to de-
each blocking half of the exploits, and ploy in an Active Directory environment.
with ESET also blocking all but some file
system activity in one additional case. The Kaspersky suite does not require the
Symantec followed, with Sophos last, fully installation of a Web server, and unlike
blocking only 20 percent of the exploits. Sophos and McAfee, it does not require
Sophos’ HIPS capability frequently re- the manual installation of a database.
ported suspicious behavior and resulted Our only complaint: some sections of the
in partial but incomplete blocking of the The ESET client offers a clean, simple interface deployment documentation and admin-
malicious activity. We score incomplete with everything in a single window and most istrator’s guide could be organized better
protection—where any rogue process still administrative options hidden from the end user. and more clearly presented.
runs on the compromised system—as a multi-platform list that uses abbreviations
“miss.” rather than product names. This process Kaspersky Business Space Security allows
could be simplified by splitting the lan- three active policies per group—work-
ESET Smart Security 4 guage and platform option into separate station, server, and mobile—whereas
Business Edition BRIEF drop-down lists with better naming. the other products we looked at gener-
While the ESET product delivered good ally require separate groups for servers,
performance numbers and installation ESET doesn’t do anything fancy with Ac- workstations, and mobile systems in
was fairly straightforward—albeit with tive Directory. It uses a flat initial struc- each geographic or functional group.
poor Active Directory integration—it ture, and all workstations and servers
conspicuously lacks a dashboard inter- are imported into a single group, with
one default policy—it’s up to you to sort
things out. Needless to say, in a large
organization, this is a big disadvantage.

Creating custom reports and alerts is


complex, due to a nearly impenetrable
interface, although the product does of-
fer 17 useful canned reports and match-
ESET doesn’t offer pretty graphics, but does
provide visibility into the status of all installed
ing alerts.
Kaspersky offers an easy-to-follow tree structure
clients, as well as the ability to quickly narrow that mirrors your Active Directory architecture,
down a search for specific systems. ESET turned in speedy on-demand scan along with quick access to all the tools you need.

5
The product’s default policy settings are ferent menus to complete a single task.
very effective and generally just what Expect to consult the manual more
an administrator would want: its default frequently than with other products.
medium settings provide a balance be-
tween the highest security and the least As for performance, McAfee was no
impact on performance. Another plus is speed demon, placing last on our
that workstation or server settings for all on-access scan time test and returning
aspects of anti-virus, file, and application middle-of-the-pack on-demand scan
scanning, Web browsing, and firewall are results. Its effectiveness was middle of
in a single policy, whereas the products the pack against Web threats.
from McAfee, Symantec and Sophos
require the configuration of multiple The McAfee main dashboard offers access to Sophos Endpoint Security and
separate policies. tutorials, a view of the most recent signature and Control 8 BRIEF
engine update files, and the threat level for the all Armed with stellar performance,
managed systems.
The product uses the Microsoft Manage- relatively simple setup, and a nicely de-
ment Console (MMC) to manage the needed to be opened in the Windows signed management interface, Sophos
Firewall. Another downside is that cli- Endpoint Security and Control fared
ents aren’t set to automatically down- well in the software side of security.
load updates by default; this has to be Its performance was top notch but its
manually configured. effectiveness against Web threats was
not good.
Importing the Active Directory struc-
ture with McAfee Total Protection for The Sophos product was the only pack-
Endpoint was more cumbersome than age reviewed that allowed the creation
most. The system separates tasks and of groups within its interface and the
policies, and requires you to create a ability to synchronize those back into
task to download updates to servers Active Directory. That lets an enterprise
and another task to push new signa- maintain the same directory structure
The Kaspersky client is straightforward and easy in AD and the Sophos app—which, in
to navigate, with few options.
the right settings, can be extremely
server, rather than a Web app, making useful for maintaining a consistent
tasks easier and faster to execute. The structure.
first time the admin console is launched,
AD info is populated in the system, but The Endpoint Security and Control
computers had to be manually selected suite was among the easiest products
and added before they could be man- to install. Unfortunately, administrators
aged. need to manually install a database if
they intend to install the server and
McAfee Total Protection for console on Windows Server 2008. An
Endpoint 8.7i BRIEF additional server reboot is also re-
The McAfee product was saddled with By default, the McAfee client gives the end user quired if UAC is running. Once those
a complicated installation process, and complete access to all options and configuration hurdles are overcome, Sophos’ mul-
had among the poorest performance details through a variety of windows. tiple wizards make the installation and
results in our testing. While it offers tures to clients—McAfee doesn’t pro- deployment process quick and easy
powerful and flexible reporting fea- vide a way to execute an automated to navigate. It also features an Active
tures, they can be difficult to use. task more than once a day. In addition,
creating a task to deploy patches is
We found the McAfee installation and cumbersome; there’s no way to create
deployment to be among the more a task as a template and apply it later.
complex and time-consuming of the
products we tested. This was primar- The product’s strongest suit was its
ily because the product requires the powerful reporting and alerting tools,
manual installation of a database, as which include 14 prebuilt dashboard
well as needing to manually download consoles and the capability to build
and check in the anti-virus and anti- your own. However, while the features
spyware components. We also ran into were powerful, administrators may
Sophos gives you a nice graphical overview of
agent deployment issues from the lack struggle with the complexity of having threats detected along with an organized view of
of clear documentation on which ports to configure numerous settings on dif- the directory structure and policies.

6
Directory synchronization wizard that management.
greatly simplifies locating clients in an
AD environment. Before installing the Symantec man-
agement console and server, adminis-
In general, Sophos featured a clean trators must install a Web server. The
interface; like Kaspersky Business Space two primary challenges we encoun-
Security, it uses the Windows MMC. We tered during installation were locating
found setting up groups and policies the documentation listing the open
simple and transparent. In addition, ports needed for agent deployment to
succeed as well as properly identifying
our clients using the “Find Unmanaged
Computers” wizard. Once the product The Symantec client is simple and easy to use,
is installed, Symantec includes one of with no unnecessary options.
the easier-to-use AD synchronization downside, it provides reports only in
wizards. We found Symantec’s docu- HTML format.
mentation to be a tremendous help
and among the best structured of all While Symantec demonstrated reason-
the products. able speed on our on-access scan
and large-file-load tests, it was one
Symantec allows the creation of of the slowest products on the on-
Sophos provides separate client management policies to control every aspect of the demand scan, placing well behind
tools for the Anti-Virus and Firewall applications. anti-virus, anti-spyware, firewall, intru- Kaspersky and Sophos. Its lack of
the product uses five policies making sion prevention, application and device effectiveness against Web threats was
creating and deploying policies a bit control, LiveUpdate and exception surprising based on previous testing
more cumbersome. we’ve done on Symantec’s consumer
product.
The product’s dashboard has easy-to-
read bar graphs, and allows for useful Trend Micro Worry-Free
configuration of limits for warning and Business Security 6.0
critical thresholds. E-mail alerts can be Standard Edition BRIEF
configured directly from the dashboard Trend Micro can boast very good ef-
configuration window. But there’s no fectiveness against Web threats and a
mechanism to send reports at a regular simple, usable interface. It was, how-
interval, such as once a week—the sys- ever, the slowest product overall that
tem sends alerts only when a threshold we tested, and its reporting capabilities
is exceeded. In addition, reporting are limited.
The Symantec dashboard gives a clear picture of
functionality is very limited although it the current virus threat level along with status of
does provide control over the report- recently deployed signature files and the status Like Symantec’s product, Trend Micro
ing period. of clients. Worry-Free Business Security requires
categories, including which days of the the administrator to install a Web
Performance was a standout: Sophos week and/or times of day scans should server, such as IIS or Apache, prior to
delivered the fastest results on nearly run. product installation. The installation
all of our tests, although it scored wizard automatically installs a data-
poorly on reboot time, adding 40 The product’s home page is a nicely base on either Windows Server 2003
seconds to our test systems. Effective- organized dashboard, which can show or 2008. Trend Micro’s documentation
ness was unimpressive—although the activity over the last 12 or 24 hours. on deploying the security agent was
Sophos product would sometimes Administrators can configure the dash- slightly confusing; it listed specific re-
warn us of suspicious content, most board to auto-refresh every 3, 5, 10, or quirements for Windows Vista worksta-
exploits were at least partially success- 15 minutes as well as set thresholds for tions but not the steps for Windows XP
ful at launching rogue processes. alerts (although the product doesn’t workstations.
allow thresholds other than number of
Symantec Endpoint events in a given time). Symantec End- Viewing and creating policies worked
Protection 11.0 BRIEF point Protection provides a very broad well and was easy to do. Trend Micro
The Symantec product’s mixed per- range of pre-defined reports, with fine provides a simple way to start with a
formance results and lack of effective- granularity on time periods (from last template and easily modify it for any
ness against Web threats were offset day to last month) and filtering by OS, given group, as well as to easily deter-
by generally very good reporting and protocol, direction (in- or outbound), mine which policy applies to a specific
alerting features and robust policy severity and other metrics. On the group.

7
Finally, Trend Micro came in at or near product’s caching abilities, and did not
the bottom of our performance tests. contribute to the overall rating.
It took the longest to complete the
on-demand scan—nearly twice as long For these performance tests, Cascadia
as the two fastest packages, Kaspersky Labs used a set of identically config-
and Sophos. Trend Micro’s product also ured Dell desktop PCs with Intel Core
added substantially to reboot time. 2 Duo E4500 2.2-GHz processors, 2 GB
RAM, 160 GB hard disk, and Microsoft
How We Tested Performance Windows XP Professional Service Pack
For performance testing, we config- 2. Test tasks were automated for maxi-
ured policies to make results compara- mum repeatability.
Trend Micro makes it simple to identify ble between products. For on-demand,
unprotected clients, deploy the anti-virus full-system scans, we scanned only the How We Tested Effectiveness
software, and manage the overall process of
local hard drive and enabled scanning These effectiveness tests reflect the
protecting PCs in an organization.
within compressed and archive files. products’ effectiveness against realistic,
The product’s Live Status dashboard Our on-access tests did not include live threats using the products’ full set
provides threat status for all clients compressed or archive files. We en- of features—including Web reputation,
along with several other security- abled exceptions for our automation anti-virus and anti-malware engines,
health indicators, as well as server tools and left most other settings at and behavioral protection capabilities,
system status showing smart scan, their defaults. among others. Cascadia Labs believes
component updates, unusual system these tests to be a much more ap-
events, and license status. We ran each individual test at least propriate way to measure product
three times, restarting from a clean effectiveness than simply pointing the
Alerts are limited to 24 events—most installation each time, and averaged products’ signature engines against
with thresholds, including client status the results. We computed the overall a large number of malicious binaries.
and virus detected. Building reports performance ranking by totaling each However, this approach also requires
product’s results for our on-access readers to consider the following three
scan, on-demand scan, open Power- factors when interpreting results.
Point file, and reboot-time tests.
Product Configuration: Business end-
On-Access Scan: Time to copy and point products provide many configu-
paste a very large folder of non- ration options, both in the protection
archive file types, including Windows components they offer and the settings
system files, documents, spreadsheets, chosen for each component. Compa-
pictures, PDFs, movies, and music files. nies may choose different configura-
tions based on the strictness of their
On-Demand Scan: Time to complete a security policy, their level of expertise,
The Trend Micro client software provides a good full system scan of an uninfected com- or other specific considerations. For
basic interface for starting scans and other basic puter with default scan settings, but in these tests, we used products in their
tasks. all cases configuring products to scan default configurations.
using Trend Micro’s templates is simple, all files and scan archives.
and uses the same 24 event triggers as Samples Chosen: Threats can come
alerts. Reports can be run daily, weekly Open Large PowerPoint File: Time to from many places. For these tests, we
on any day, or monthly on any day of open a PowerPoint file (8.7 MB Power- focused on Web threats—specifically,
the month. Point photo album), demonstrating the drive-by downloads, as we believe they
impact of on-access scanning compo- represent the largest and most preva-
But the product’s reporting features are nents. lent threat to companies today. Casca-
a bit stunted. First, the reports folder dia Labs captures hundreds of threats
initially is empty: You have to create a Reboot Time: Reboot time, from per day; instead of choosing a random
new report using one of the 14 tem- specifying a reboot request through sample of Web threats, leading to tests
plates, which can’t be modified, to run power on to fully-booted Windows with a large number of very similar
a report. In a sense this is the worst of desktop with idle CPU. underlying attacks, Cascadia Labs
both worlds, in that Trend Micro pro- chose a single sample from 10 different
vides nothing you can just run to start Second On-Demand Scan: Time to campaigns with distinct exploit mecha-
with, but no way to customize what complete a subsequent full system scan nisms to provide more threat diversity.
you create. For example, the product of an uninfected computer with default
lacks a way to generate a report show- scan settings. This test shows the maxi- Scoring Mechanism: Defining a suc-
ing endpoints that are out of date. mum benefit that can be achieved by a cessful detection and creating a fair

8
scoring algorithm is harder than it may this report, products that stop a threat highest scores to products that
seem. Most would agree that stopping completely are scored as a complete blocked exploits from starting new
a threat before it exploits a computer, block and those that stop the threat processes or dropping any files on the
drops files, or runs processes is best. from running score half of a block. system; partial credit to those products
that blocked all unwanted processes;
However, shouldn’t products that stop We used our proprietary exploit cap- and no points to those products that
the threat from running—even if they ture-and-replay technology to ensure let the attack succeed, in full or in part,
allow an exploit and some dropped that each product was tested against by successfully launching rogue pro-
files—score better than a product that identical threats. For each exploit, we cesses on our test systems.
doesn’t detect the threat at all? For logged system activity and gave the

Independent evaluations of technology products


Contact: info@cascadialabs.com
www.cascadialabs.com

This comparative review, conducted independently by Cascadia Labs in November 2009, was sponsored by Kaspersky Lab.
Cascadia Labs aims to provide objective, impartial analysis of each product based on hands-on testing in its security lab.

You might also like