Vendor: Comodo
Can AI protect your Windows systems?
And are attackers using it to breach your network? Artificial Intelligence is ruling the stock market and may be on the verge of ruling the world if you believe the business influencers. If AI is as powerful as some say, surely it can protect our windows systems from hackers?
The products in this test almost certainly rely on AI-related technologies to detect and protect against attacks. These technologies have been running in the background for about 20 years. We can argue that not only does anti-virus/ endpoint protection use AI, but it’s been doing so for many years, and certainly before Cylance claimed to be the first.
But I did something sneaky there. I slid in the word ‘-related’. Because when people talk about ChatGPT and other popular ‘AI’ tools, they are usually talking about something else. They are amazed by the utility of Machine Learning (ML) systems, which appear to be able to mimic human thought in a rather magical way.
Choose your reports and reviews carefully
We pride ourselves on a level of transparency that elevates our work above the less open reports available. But don’t just take our word for it. This report has gone through the AMTSO certification process to ensure that we say what we’re going to do; do it; and can prove it. Our results help vendors improve their products and buyers choose the best for their own needs.
Four security tips to reach the top 1%
It’s a shocking statistic, but most businesses don’t have a cyber security plan. And if businesses aren’t paying attention, it’s certain that most home users also have their heads in the sand. The good news is you can get ahead of the crowd in three easy steps. Maybe four if you want to be really sure.
Consumers are everyone. We are all, with very few unfortunate exceptions, ‘home users’. Home users need security because the computer devices in our lives are more important today than they’ve ever been.
Access to the internet is crucial in modern life and anything that prevents us from accessing essential services is a serious problem for those individuals. It’s increasingly difficult to access bank accounts, healthcare and even the benefits system without internet access.
So here are four security tips to reach the top 1%
So how can we individuals, without access to cyber security teams and expensive security products, beat the hackers? You’ve probably seen these tips before, but trust us – use them all and you’ll be far ahead of most other internet users in terms of security:
- Back up your important data.
- Use multi-factor authentication.
- Use anti-virus protection.
- Apply security updates when available.
Choose your reports and reviews carefully
We pride ourselves on a level of transparency that elevates our work above the less open reports available. But don’t just take our word for it. This report has gone through the AMTSO certification process to ensure that we say what we’re going to do; do it; and can prove it. Our results help vendors improve their products and buyers choose the best for their own needs.
Essential Endpoint Security Home
Realistic attacks for useful results
Essential Endpoint Security at Home
Keeping safe from online threats requires strong endpoint protection. It’s not just important – it’s crucial. So, it’s a good idea to regularly check how well it’s working. Essential endpoint security means checking if the security tools on devices like desktops, laptops, and mobiles actually do their job. Why? Because these devices are often the target of online attacks. If they’re not protected, they can become a way for cybercriminals to get to your sensitive information.
Our reports help you choose the best home anti-malware product that can protect you from ransomware and other types of attacks.
How we test endpoint protection for small businesses
SE Labs brings a wealth of experience to the table when it comes to testing endpoint protection. We firmly believe in the necessity of conducting these tests regularly to ensure that security vendors are consistently updating and enhancing their effectiveness. Our testing approach involves recreating real-world cyberattack situations, allowing us to assess the performance of endpoint security solutions in terms of detection, prevention, and mitigation.
Choose your reports and reviews carefully
We pride ourselves on a level of transparency that elevates our work above the less open reports available. But don’t just take our word for it. This report has gone through the AMTSO certification process to ensure that we say what we’re going to do; do it; and can prove it. Our results help vendors improve their products and buyers choose the best for their own needs.
Read this SE Labs assessment of world-leading endpoint security products and discover how they handle well-known threats and targeted attacks.
Critical Endpoint Protection
Home Anti-Virus Tests Are Really Important
Critical Endpoint protection is a critical component for good home cyber security
And if it’s critical then you should test it. And have others run assessments too. Testing endpoint protection involves evaluating the effectiveness of the security solutions deployed. Such as endpoint devices like desktops, laptops and mobile devices. Endpoint protection testing is necessary because endpoints are often the target of cyberattacks. They can be used as a gateway to gain access to sensitive data.
How we test endpoint protection for home anti-virus tests
We have extensive experience in endpoint protection testing, and we have found that it is essential to conduct these tests regularly to ensure that the security vendors are keeping them up-to-date and effective. Our testing methodology involves replicating real-world cyberattack scenarios and evaluating how well the endpoint security solutions perform in detecting, preventing, and mitigating those attacks.
One of the key aspects of endpoint protection testing is the use of realistic attack scenarios. Our team of experts analyses the latest threat intelligence and creates attack scenarios that closely mimic the tactics, techniques, and procedures used by real-world cybercriminals. By doing so, we can determine how well the endpoint security solutions perform in detecting and preventing these attacks.
Choose your reports and reviews carefully
We pride ourselves on a level of transparency that elevates our work above the less open reports available. But don’t just take our word for it. This report has gone through the AMTSO certification process to ensure that we say what we’re going to do; do it; and can prove it. Our results help vendors improve their products and buyers choose the best for their own needs.
Zero to Neo
Our reports help you choose the best home anti-malware product that can protect you from ransomware and other types of attack
Choose the best home anti-malware solution
There seems to be no limit to the powers of cyber criminals. In 2021 the public became aware of the advanced capabilities of the NSO group, now infamous for helping governments spy on dissidents and others.
The SolarWinds attack compromised some of the largest organisations in the world (and my implication, their customers – and so on, down the supply chain). And the US’ largest oil pipeline company was breached, and its systems held to ransom.
Most analyses of these incidents recognise that endpoint security was attacked. As we alluded to in our annual report this year, breaches are a process. The initial stages of these famous attacks may not have involved a Windows PC but if your organisation grinds to a halt because everyone’s laptop is showing a red warning and a Bitcoin demand then the endpoint was compromised at some point. It needs protection, regardless of other security layers in play.
We include targeted attacks in our endpoint protection tests because hackers can use a variety of techniques to attack endpoints. Not all targeted attacks are as sophisticated and focussed as the automatic iPhone exploits used by the NSO Group. Sometimes a targeted attack can be as simple as someone using a basic tool downloaded from the internet. Your adversary might be your neighbour, rather than a government-backed organisation. In fact, that’s possibly more likely.
Protection is expected
It doesn’t really matter who represents a threat to you: a resourceful cyber ninja or an idiot colleague. When you or your business buys an endpoint protection product you expect it to stop attacks, sophisticated or otherwise. When you read the results in this report, remember that all it takes is one successful attack to ruin your day or your company.
We pride ourselves on a level of transparency that elevates our work above the less open reports available. But don’t just take our word for it. This report has gone through the AMTSO certification process to ensure that we say what we’re going to do; do it; and can prove it. Our results help vendors improve their products and buyers choose the best for their own needs.
2020: year of the breach
Solid endpoint protection is a bare minimum
If it feels like new breaches are reported every week it’s because they are. Attackers are taking no prisoners and are successfully breaking into businesses, political organisations and systems belonging to individuals.
Backups are important but, they are not always the perfect solution. Recent attackers have been deleting backups and there are ways to damage offline backups held securely on tape, as we discussed in our article.
You can’t rely on just one type of security solution. However, having solid endpoint protection in place is one of a few bare-minimum measures you need to take. Most of the products in this security test report are excellent at providing a much-needed level of protection on personal and business computers.
We recommend you read through our test results in detail and consider how confident you are that your current choice will stand up against real-world security threats.
Hands up, who’s been hacked?
Get ahead in the game that never ends
Have you ever been hacked? You, personally, or your business? If your answer is, “no” it would be interesting to know how you can be so sure.
Keeping your wits about you is essential, but you can’t do it all on your own. That’s why a good (anti-malware) endpoint protection solution is an essential basis for your online protection. We hope this report helps you or your business get ahead in the game that never ends.
Read this SE Labs assessment of world-leading endpoint security products and discover how they handle well-known threats and targeted attacks.
Next-gen security testing for next-gen products.
Read this SE Labs assessment of world-leading endpoint security products and discover how they handle well-known threats and targeted attacks.