查看: 2835|回复: 10
收起左侧

[分享] 最新的NSS-LABs的高级端点保护评测报告

[复制链接]
火星火星
发表于 2019-3-29 10:47:30 | 显示全部楼层 |阅读模式
分享,最新的NSS-LABs的高级端点保护评测报告,了解一下。

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
ikochina
头像被屏蔽
发表于 2019-3-29 11:23:27 | 显示全部楼层
端点保护竟然没mcafee?
灵果
发表于 2019-3-29 11:55:04 | 显示全部楼层
mcafee没参加测试吧。avast、红伞、eset这些较为常见的也没有呢。comodo和趋势在样本区感觉表现一般般(当然样本区多是个人版),倒是各大测评机构给的评价不低,尤其是趋势。
wakin
发表于 2019-3-29 12:12:51 | 显示全部楼层
好高级,看图直接没看懂
心心相印
发表于 2019-3-29 12:35:22 | 显示全部楼层
本帖最后由 心心相印 于 2019-3-29 12:47 编辑

看不明白
欧阳宣
头像被屏蔽
发表于 2019-3-29 12:52:57 | 显示全部楼层
咖啡 panda sentinelOne 这三个多半是因为横竖轴都低于平均 所以就不点名批评了 分别就是ABC三个

另外竖轴也不是检出率 而是effectiveness,效率 说起来sophos的效率还是挺高的 一般上报样本都会在一两个小时内收到单独邮件回复。
Picca
发表于 2019-3-29 14:18:25 | 显示全部楼层
本帖最后由 Karna 于 2019-3-29 14:35 编辑
欧阳宣 发表于 2019-3-29 12:52
咖啡 panda sentinelOne 这三个多半是因为横竖轴都低于平均 所以就不点名批评了 分别就是ABC三个

另外竖 ...

nss-labs-aep-comparative-report-security.pdf

”The security effectiveness of a product is determined primarily by its block rate, but calculations also take into consideration the severity of each attack used in the test.

”Block Rate is defined as the percentage of exploits and malware blocked within 15 minutes of attemptedexecution. Block Rate measures a product’s ability to block malware and exploits during download, on access, and during execution. “

● Malware Delivered over HTTP: In these web-based attacks, users click on malicious links to download andexecute malware.

● Malware Delivered over Email: In these inbound, email-based attacks, users are deceived into downloadingmalicious attachments in emails to execute malware.

● Malware Delivered by Docs and Scripts: In these attacks, malware is delivered via documents and scripts.Such attacks could be as simple as delivering malware using macros.

● Offline Threats: These attacks are performed on victim machines that are disconnected from the Internet.Attacks are delivered and executed with no cloud or backend connectivity or support. Victim machines arelater reconnected to the network.
● Unknown Threats: These threats have not previously been seen in the wild. They are either samples createdby NSS, or they are pre-existing samples that have been modified.

● Exploits: These are defined as malicious software that is designed to take advantage of existing deficiencies inhardware or software systems, such as vulnerabilities or bugs. In some cases, a user merely needs to visit aweb page hosting malicious code in order to be infected via exploits.
● Blended Threats: These threats possess the characteristics of both exploits and socially engineered malware.They attempt to make it difficult to distinguish between what is malicious and what is legitimate activity.

● Evasions: These techniques include packers, crypters, and other types of evasive techniques used to bypasstraditional antivirus signature detection.

感觉基本还是绕着弯子讲检出率,给了一定的时效性限制+攻击严重性考量。

wakin
发表于 2019-3-29 14:42:20 | 显示全部楼层
欧阳宣 发表于 2019-3-29 12:52
咖啡 panda sentinelOne 这三个多半是因为横竖轴都低于平均 所以就不点名批评了 分别就是ABC三个

另外竖 ...

你现在用的是Sophos?
灵果
发表于 2019-3-29 16:52:02 | 显示全部楼层
欧阳宣 发表于 2019-3-29 12:52
咖啡 panda sentinelOne 这三个多半是因为横竖轴都低于平均 所以就不点名批评了 分别就是ABC三个

另外竖 ...

测试是有Panda的,而且成绩不错,Panda Security Panda Adaptive Defense 360 v3.40.00。

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
lapuladuo
发表于 2019-3-29 18:38:30 | 显示全部楼层
没看懂
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-3-28 20:50 , Processed in 0.121515 second(s), 17 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表