Vendor: Trend Micro
Put your focus on Business Email Compromise (BEC) scenarios
Don’t ignore Business Email Compromise test cases
Good security testing is realistic, using the kinds of threats customers see in real life. This is why we put a lot of focus on Business Email Compromise (BEC) scenarios, rather than just more conventional threat types (like generic phishing and malware).
Put focus on Business Email Compromise (BEC) scenarios
Many organisations focus on blocking spam and detecting malware, but BEC attacks present a different kind of threat. BEC targets the human element of email communication. Attackers craft convincing, fraudulent emails that appear to come from legitimate sources, tricking recipients into transferring money, sharing sensitive information or performing other actions that compromise the organisation. BEC cases are not about malware detection or basic spam filtering. Instead, they exploit trust and authority.
These attacks may bypass traditional security mechanisms because they often don’t contain malicious links or attachments. Instead, they rely on social engineering, making them incredibly dangerous and quite hard to spot by either people or technology.
The cyber security industry refers to this sequence of steps as the ‘attack chain.’ The MITRE organization has documented these stages in its ATT&CK framework. While this framework doesn’t provide an exact blueprint for real-world attacks, it offers a structured guide that testers, security vendors, and customers (like you!) can use to conduct tests and interpret the results.
How we test
SE LABS Ⓡ tested three email security services, one that is commercial, the other open-source. We also tested a commercial email platform. Each service was exposed to the same threats, which were a mixture of targeted attacks using well-established techniques and public attacks that were found to be live on the internet at the time of the test.
The results indicate how effectively the services were at detecting and/or protecting against those threats in real-time and shortly after the attacks took place.
Choose your reports and reviews carefully
We pride ourselves on a level of transparency that elevates our work above the less open reports available. But don’t just take our word for it. Our results help vendors improve their products and buyers choose the best for their own needs.
How they sell security (and we buy it)
The world of cyber security sales is unclear at best
Our reports help you choose the best home anti-malware solution. This latest one looks at how the most popular products handle the threats everyone faces on a daily basis, as well as the sort of targeted attack you hope never to encounter (but might).
There aren’t many resources available to help make such buying decisions. Security marketing is fraught with misleading claims. That’s not just our opinion. “Snake oil” is a common refrain among attendees of security conferences and the large companies that buy security to the tune of over one trillion dollars a year.
Choose the best home anti-malware solution
SE Labs is particularly well connected in the security world. It’s partially how we have gained the trust of the security vendors themselves, and their own customers. We sit right in the middle of things, alongside the analysts who help businesses choose which vendors to work with. This is why your favourite reviewers use SE Labs lab data to help them with their anti-virus reviews and other security articles. Very few organisations get to see under the hood of personal security products. We’re here to help, and provide that insight.
We pride ourselves on a level of transparency that elevates our work above the less open reports available. But don’t just take our word for it. This report has gone through the AMTSO certification process to ensure that we say what we’re going to do; do it; and can prove it. Our results help vendors improve their products and buyers choose the best for their own needs.
Read this SE Labs assessment of world-leading endpoint security products and discover how they handle well-known threats and targeted attacks.
2020: year of the breach
Solid endpoint protection is a bare minimum
If it feels like new breaches are reported every week it’s because they are. Attackers are taking no prisoners and are successfully breaking into businesses, political organisations and systems belonging to individuals.
Backups are important but, they are not always the perfect solution. Recent attackers have been deleting backups and there are ways to damage offline backups held securely on tape, as we discussed in our article.
You can’t rely on just one type of security solution. However, having solid endpoint protection in place is one of a few bare-minimum measures you need to take. Most of the products in this security test report are excellent at providing a much-needed level of protection on personal and business computers.
2020: year of the breach
Solid endpoint protection is a bare minimum
If it feels like new breaches are reported every week it’s because they are. Attackers are taking no prisoners and are successfully breaking into businesses, political organisations and systems belonging to individuals.
Backups are important but, they are not always the perfect solution. Recent attackers have been deleting backups and there are ways to damage offline backups held securely on tape, as we discussed in our article.
You can’t rely on just one type of security solution. However, having solid endpoint protection in place is one of a few bare-minimum measures you need to take. Most of the products in this security test report are excellent at providing a much-needed level of protection on personal and business computers.
We recommend you read through our test results in detail and consider how confident you are that your current choice will stand up against real-world security threats.
Hands up, who’s been hacked?
Get ahead in the game that never ends
Have you ever been hacked? You, personally, or your business? If your answer is, “no” it would be interesting to know how you can be so sure.
Keeping your wits about you is essential, but you can’t do it all on your own. That’s why a good (anti-malware) endpoint protection solution is an essential basis for your online protection. We hope this report helps you or your business get ahead in the game that never ends.
Read this SE Labs assessment of world-leading endpoint security products and discover how they handle well-known threats and targeted attacks.
Hands up, who’s been hacked?
Get ahead in the game that never ends
Have you ever been hacked? You, personally, or your business? If your answer is, “no” it would be interesting to know how you can be so sure.
Keeping your wits about you is essential, but you can’t do it all on your own. That’s why a good (anti-malware) endpoint protection solution is an essential basis for your online protection. We hope this report helps you or your business get ahead in the game that never ends.
Read this SE Labs assessment of world-leading endpoint security products and discover how they handle well-known threats and targeted attacks.
Next-gen security testing for next-gen products.
Read this SE Labs assessment of world-leading endpoint security products and discover how they handle well-known threats and targeted attacks.
Next-gen security testing for next-gen products.
Read this SE Labs assessment of world-leading endpoint security products and discover how they handle well-known threats and targeted attacks.