Security testing needs to be more realistic and subtle than just running malware
Your own network can provide everything that an attacker needs to achieve its goal. In many ways it’s impossible to tell the difference between an effective attacker and a good systems administrator.
Awards, Testing Advice and a 6-year Endpoint Protection Review
Our third annual report is now online. Free for all, it highlights the cybersecurity trends of this year. Which security products were the strongest? How are they tested? And how can you learn more about assessing security?
Annual Awards and Advanced Security Testing
It’s been six years since we started testing endpoint security. We’ve trawled through all of our previous reports to show an interesting summary of how various products have performed over a long period of time. See who has improved and what challenges caused some products to fail.
Ransomware is causing all the rage right now. That’s why we’ve tested products that offer protection from ransomware.
It’s the type of threat that gets attention because a successful attack is extremely visible (the attacker needs you to know it’s worked, or you won’t pay!) Also, there is a direct and substantial cost attached to it. In addition to paying security specialists to help, there’s a fat ransom demand sitting on your screen.
Ransomware isn’t subtle
While much hacking is subtle, stealing information silently, ransomware is in your face. It stops businesses in their tracks. It gets the attention of the finance directors. It provides powerful ammunition to security teams arguing for more resources. And, of course, it makes headlines.
SE Labs launches first public Network Detection and Response test
SE Labs tested VMware NSX Network Detection and Response against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way as criminals and other attackers breach systems and networks.
Full attack chain test in the datacentre
By running the most realistic set of attacks possible we put NDR products to a significant challenge. Can they detect real attacks in real-time, often using unique scripts and malware? If you want to know more about advanced persistent threats on the network please read past the initial graphs in this report and dig into the detail.
How SE Labs tests and scores email security services
Email security services can do a lot to protect users from online threats. This also means a lot can go wrong too. Testing and scoring these services requires a lot of attention to detail and a scoring method that takes into account all of the possible outcomes, including unexpected ones.
SE Labs announces comparative breach response testing
The next phase in our Breach Response test is to start comparing products. There has been high demand for comparative testing since we first proposed our Breach Response test back in 2016. Clients really want to see breach response products compared.
Comparing products in the Breach Response test
For the last few years our Breach Response reports have been of standalone products.
The first milestone is this summer, when we will be running a private comparative test of products. Comparatives in this space are few and far between. Good ones are even rarer. Therefore we have taken very prudent steps towards this goal over the last couple of years. We plan to publish a public comparative report in the first half of 2022.
The world of cyber security sales is unclear at best
The secret world of cyber security sales is fascinating. And shady. If you ever wondered how they sell security, and how we buy it, we have a treat for you.
Our security reports help you choose the best anti-malware solutions for your organisation and your family. These latest lab results look at how the most popular products handle the threats everyone faces on a daily basis, as well as the sort of targeted attack you hope never to encounter (but might).
Understand what a real hacking attack looks like to the attacker and defenders
The IT security world is rocked by news of breach after breach, including the shocking disclosure of the SolarWinds attack. Data is stolen, deleted or corrupted and… well you know. It’s a total mess. Journalists focus on basic outcomes, while technical blogs look at esoteric technical details. We’ve explained, in laymen’s terms, what a breach looks like from an attacker’s point of view. And from the position of the defenders.
Supporting open standards testing for firewalls and other network security devices
SE Labs has joined forces with testing standards organisation NetSecOPEN, aiming to improve the network appliance testing market. The result will be more accurate reports containing genuinely useful data.
SE Labs joins NetSecOPEN
SE Labs has always supported transparent, repeatable, standards-based testing of security products. By being the first mainstream security testing organisation to join NetSecOPEN, we are demonstrating our commitment to that purpose across all of our testing.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy policy