Improvements observed compared to previous year - two outliers down!
INNSBRUCK, Austria, Jan. 24, 2022 /CNW/ -- The AV-Comparatives EPR test is the most comprehensive assessment of its kind in the world.
Like all AV-Comparatives' public test reports, the 2021 EPR Comparative Report is available for free: https://www.av-comparatives.org/wp-content/uploads/2022/01/EPR_Comparative_2021.pdf
Each of the 10 products in the test were subjected to 50 separate targeted attack scenarios.
The top Strategic Leader Award was given to Bitdefender, Palo Alto Networks, Check Point, CrowdStrike, F-Secure, Cisco and ESET. Symantec by Broadcom was awarded with the CyberRisk Visionaries award. Two further vendors reached the Strong Challengers award.
The Strategic Leader award is given to EPR products which showed a very high return on investment and a provide a very low total cost of ownership. These products demonstrate outstanding enterprise-class prevention, detection, response, and reporting capabilities, combined with optimal operational and analyst workflow features.
Peter Stelzhammer, co-founder of AV-Comparatives, said:
"Congratulations to our Strategic Leaders. These winners show others the way forward by setting and meeting ambitious targets. They develop ground-breaking ideas and implement these in their products."
"Security breaches can have significant financial impacts, with the average cost of a breach now standing at $4.24 million, according to IBM."
"An effective EPR product that minimises the negative impact of an attack can be a very good investment. If a company stands to lose $2 million if an attack, then spending half of that on security measures makes good financial sense."
Enterprises use EPR products to detect, prevent, analyse, and respond to targeted attacks such as advanced persistent threats (ATPs). They should be able to detect and block malware and network attacks on individual workstations as well as dealing with multi-stage attacks designed to infiltrate an organisation's entire network.
In addition to protecting individual devices, EPR systems should also provide detailed analysis of an attack's origin, methods and aims in order to allow security staff to understand the nature of the threat, prevent it from spreading, repair damage and take precautions to prevent similar attacks in the future.
The EPR test involves a variety of different techniques. When left unchecked, the attacks progress through three separate phases: Endpoint Compromise and Foothold; Internal Propagation and Asset Breach.
The tests determined whether the product detected the attack, took automated action to block the threat (active response), or provided information about the attack which the administrator could use to take action themselves (passive response).
If an EPR product did not block an attack at one stage, the attack would continue to the next phase.
Each tested products were given a window of 24 hours after the start of an attack. Testers examined the ability of each product to take remedial action such as isolating an endpoint from the network, restoring it from a system image, or editing the Windows Registry.
AV-Comparatives also tested every products' ability to investigate the nature of an attack, including a timeline and breakdown of phases. Finally, the ability of each product to collect and present information on indicators of compromise in an easily accessible form was assessed.
AV-Comparatives is an independent organisation offering systematic testing to examine the efficacy of security software products and mobile security solutions. Using one of the largest sample collection systems worldwide, it has created a real-world environment for truly accurate testing.
Peter Stelzhammer, email@example.com, +43 720115542
View original content to download multimedia:https://www.prnewswire.com/news-releases/the-independent-iso-certified-security-testing-lab-av-comparatives-has-released-the-results-of-its-endpoint-prevention-and-response-test-epr-301466435.html
View original content to download multimedia: http://www.newswire.ca/en/releases/archive/January2022/24/c9697.html