Reviewers Guides

Our guides include the full list of our public testing methodologies and supporting documentation for testing partners.

Use the testing methodologies to understand our public reports. If you need to know more detail about how we tested, the formal methodology documentation should help.

Clients can use the Handling Test Data guides and Testing FAQs to gain a better understanding of the data that we provide after a test. If you still need help please contact your account manager.

Testing methodologies

Stay up to date with the latest methodologies and other updates with our newsletter. If you want faster updates you can find us on Twitter and LinkedIn.

Testing Methodologies (How we test)

Enterprise Advanced Security Methodology 1.02
(Formerly Breach Response)
DOWNLOAD

Email Security Services Methodology 2.21
DOWNLOAD

Email Security Services Methodology 2.2 (newer version available)
DOWNLOAD

Network Security Appliance (Performance) Methodology 1.0
DOWNLOAD

Breach Response Methodology 1.01 (newer version available)
DOWNLOAD

Endpoint Protection Methodology 1.2
DOWNLOAD

Web Security Gateway Methodology 1.0
DOWNLOAD

Predictive Malware Response Methodology 1.0
DOWNLOAD

Email Security Services Methodology 2.0 (newer version available)
DOWNLOAD

Memory Exploitation Methodology 1.0
DOWNLOAD

Network Security Appliance Methodology 1.0 (deprecated)
DOWNLOAD

On-Demand Malware Detection Methodology 1.0
DOWNLOAD

Handling Test Data

Targeted Attack Replay Guide 2.0
DOWNLOAD

Data Decryption Guide 1.01
DOWNLOAD

Data Log Guide 1.01
DOWNLOAD

Testing FAQs

FAQs
READ MORE