Emsisoft Anti-Malware triumphed in two of the latest MRG Effitas assessments, achieving a perfect score, and once again proving its reliability in online security.
1) MRG Effitas Time to Detect Assessment Q2 & Q3 2013
The MRG Effitas “Time to Detect Assessment” examines which antivirus products are able to prevent infections of 300 brand new malware samples as well as the time to accomplish a 100% detection rate within a 24 hour period. 275 of the attempts to infect the system were performed using live URLs via Internet Explorer and 25 via a USB stick.
Amongst all 17 participants, Emsisoft Anti-Malware was one of the few to pass the MRG Effitas Time to Detect Assessment with a detection rate of 100% on the first run!
Read the complete report at the MRG Effitas website.
2) MRG Effitas “Time to Detect & Remediate Assessment” Project Q2 2013
The latest MRG Effitas “Time to Detect & Remediate Assessment” focuses on core financial malware such as ZeuS and Torpig, which are still one of the most active and widespread malware families worldwide. All 17 tested antivirus products were challenged to prevent infections of 250 brand new banking trojans from live URLs. In addition, for security applications that were not able to prevent the infections initially, the time until the vendors reacted to new appearances (remediation performance) was also taken into consideration for the final rating.
Emsisoft Anti-Malware passed the MRG Effitas “Time to Detect & Remediate Assessment” with a score of 100% out of the box and was certified with the MRG Online Banking Security Assessment Q2 2013 award.
The complete report is available for download at the MRG Effitas website.
About MRG Effitas
MRG is assessing the ability of a cohort of security products to prevent an endpoint from being infected by live, ITW malware. The two metrics MRG Effitas believes are most relevant are:
1. The time taken to protect a system. There are two sub elements to this metric:
- Time to detect
- Time to remediate
2. Assessment of data exfiltration. There are three sub elements to this metric:
- Determination as to whether a data breach has occurred or not (uncorrupted data)
- Calculation of what was breached
- Measurement of how long the breach occurred