09.02.2015 Views

Platinum Product Test Report Kaspersky Lab Anti ... - West Coast Labs

Platinum Product Test Report Kaspersky Lab Anti ... - West Coast Labs

Platinum Product Test Report Kaspersky Lab Anti ... - West Coast Labs

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

TEST REPORT December 2010<br />

<strong>Kaspersky</strong> <strong>Lab</strong><br />

Performance Validation <strong>Test</strong>ing<br />

<strong>Kaspersky</strong> Corporate Solutions


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Commissioning Vendor<br />

<strong>Kaspersky</strong> <strong>Lab</strong>, 97 Milton Park, Abingdon, Oxon, OX14 4RY, UK.<br />

WCL Corporate Offices and <strong>Test</strong> Facilities<br />

USA Headquarters and <strong>Test</strong> Facility<br />

<strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s, 16842 Von Karman Avenue, Suite 125, Irvine, CA 92606, U.S.A. Tel:<br />

+1 (949) 870 3250, Fax: +1 (949) 251 1586<br />

European Headquarters and <strong>Test</strong> Facility<br />

<strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s, Unit 9 Oak Tree Court, Mulberry Drive, Cardiff Gate Business Park,<br />

Cardiff, CF23 8RS, UK.<br />

Tel: +44 (0) 29 2054 8400, Fax: +44 (0) 29 2054 8401<br />

Asia Headquarters and <strong>Test</strong> Facility<br />

<strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s, A2/9 Lower Ground Floor, Safdarjung Enclave, Main Africa Avenue<br />

Road, New Delhi 110 029, India. Tel: +91 (0) 11 4602 0622, Fax: +91 (0) 11 4602 0633<br />

Date: 8th December 2010 Version: 1.0<br />

Authors: Richard Thomas, Lysa Myers, Michael Parsons, Matt Garrad, Mark Thomas,<br />

Chris Thomas<br />

Page 2 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Contents<br />

Changing Malware Threats in Corporate Networks 4<br />

<strong>Test</strong> Objectives 9<br />

Comparative <strong>Product</strong> <strong>Test</strong>ing 11<br />

<strong>Test</strong> Network 12<br />

<strong>Test</strong> Methodology 14<br />

<strong>Test</strong> Results 16<br />

Checkmark <strong>Product</strong> <strong>Test</strong>ing and Certification 17<br />

Baseline and Static Certification <strong>Test</strong>ing<br />

Dynamic <strong>Test</strong>ing and Certification<br />

Real Time <strong>Product</strong> <strong>Test</strong>ing and Certification<br />

<strong>Kaspersky</strong> <strong>Lab</strong> Certifications in Checkmark 19<br />

<strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s’ Conclusion 20<br />

Appendix<br />

<strong>Product</strong> Feature Set Comparisons 22<br />

Malware <strong>Test</strong> Suites 33<br />

Disclaimer 38<br />

Revision History 39<br />

Page 3 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Changing Malware Threats in Corporate Networks<br />

The evolution of Malware, Security Technologies and Services<br />

By Lysa Myers, director of research, <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s.<br />

There are few who are unaware of the malware landscape changing since the<br />

release of the first few viruses decades ago. But it seems there are just as few people<br />

outside the computer security industry who understand the nature of that change.<br />

No longer is malware as ethereal a threat as an urban legend, and no longer is the<br />

virus outbreak of the day making the evening news. Threats now come not by ones<br />

and twos but by the many tens of thousands each day with the known total<br />

hovering in the tens of millions. And threats come quietly, remaining as far below the<br />

radar as possible to maximize their stay on an affected machine. Corporations are<br />

now victims of targeted attacks, as well as the regular masses of malware and have<br />

specific needs for the protection of corporate information assets.<br />

While malware activity has increased, security budgets certainly have not. Many<br />

corporate security staff find themselves facing a tidal wave of new threats without<br />

extra personnel or resources. They need security software to work faster, harder and<br />

require less manual interaction while providing detailed reports as to what actions<br />

have been taken. Machines which are infected need to be cleaned completely so<br />

as to get systems back up and running quickly and painlessly. <strong>Anti</strong>-Malware<br />

software is only as good as its research and support departments. They are vital in<br />

order to have excellent response times to new threats and to provide top-notch<br />

customer assistance. As focus in corporate networks shifts away from the desktop,<br />

into mobile, cloud and virtual computing resources, security software needs to<br />

protect these environments too.<br />

Page 4 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Changing Malware Threats in Corporate Networks<br />

The way malware spreads has also changed – there is less concern for infecting<br />

oneself with a floppy disk (how many of us even have a floppy disk drive now) or<br />

via poorly worded and spelled mass-mailer viruses. When malware authors<br />

discovered there was profit to be had in spreading their malicious wares, they<br />

began to take many of the tactics used by Search Engine Optimizers and improved<br />

their social engineering craft, placing files where people were most likely to run<br />

across them. Consequently, the Web is now where the majority of people become<br />

infected with malware and, given the extent to which the internet is such an integral<br />

part of all corporations’ business activities, the Web is a potent threat vector.<br />

Company’s websites are regularly targeted for defacement or infected to spread<br />

malware to the site’s visitors.<br />

Given that the Internet is operating system agnostic and because current scripting<br />

languages allow for queries of the specific browser version of each visitor, malware<br />

can be spread which in a manner which infects any particular visit. In the last few<br />

years, this has been a tactic which has proved increasingly popular with malware<br />

authors, increasing their reach as the market share of new technology increases.<br />

Obviously, anti-malware products had to change with the times as the onslaught of<br />

malware has increased and the tactics of malware authors has shifted. The first antimalware<br />

products were designed strictly as signature scanners, which only ran when<br />

a user specifically initiated a scan. In short order, this was changed to allow the<br />

scanner to run continuously in the background so that each file was examined as it<br />

was accessed, without users having to think about it. This approach has become<br />

more widespread over time, so that products require little interaction – users can<br />

automatically have the most up-to-date protection running at all times.<br />

Page 5 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Changing Malware Threats in Corporate Networks<br />

Another thing which has changed with the times is the complexity of the scanning<br />

processes. No longer are anti-malware products simply signature-based scanners.<br />

They now include advanced heuristic technologies and generic signatures which<br />

can proactively detect new variants of existing families and new malware families.<br />

The best products include a variety of security features such as web or spam filtering,<br />

behavioural analysis or a firewall technology which can help protect against brand<br />

new threats. With these new, intensive scanning technologies, vendors have come<br />

up with many ways to decrease the overall processing load, so that scanning will<br />

not noticeably decrease access times or interrupt workflow.<br />

As both the malware landscape and anti-malware products have changed, so has<br />

the security testing industry. When products under test were updated periodically,<br />

used on-demand scanning and the total known malware was in the thousands, it<br />

made sense to have only a single pass or fail test which was performed a few times<br />

a year over a static test-bed of samples. This is no longer the reality of the current<br />

user experience. While it can be a meaningful baseline test of anti-malware<br />

functionality, it is far from a complete picture of overall product performance.<br />

In order to accurately reflect a user’s experience with malware, it is important to<br />

gather the full spectrum of malware from a variety of sources from throughout the<br />

internet, which circulate on various protocols. This means including not just emailbased<br />

malware, but malicious files on P2P networks, as well as on the Web and other<br />

attack vectors. Because malware does not stop when the work day ends nor does it<br />

recognize geographic boundaries, threats must be collected all day from around<br />

the world.<br />

Page 6 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Changing Malware Threats in Corporate Networks<br />

As anti-malware products have begun to include more wide-ranging technologies<br />

including ones which are initiated upon execution of a file, testing must incorporate<br />

dynamic functionality by running threats on test machines. This naturally takes more<br />

time than scanning an immobile directory of files, so one must take care to select<br />

the most relevant sample set which a customer is most likely to encounter. This takes<br />

into account not just prevalence, but attack vector popularity on which it is spread,<br />

potential for damage on an infected system, as well as geography.<br />

Malware authors are always abreast of technology trends – how people share their<br />

information, how they share files. At <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s we’ve already begun to see<br />

an increase of attacks on things like digital picture frames, USB thumb drives, mobile<br />

phones and on popular Web 2.0 sites. So, suffice to say, if you know a few people<br />

who use one or other or all – malware authors are looking to exploit them for<br />

financial gain. Likewise, anti-malware vendors are developing technologies to<br />

protect them and testers like <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s are developing methodologies to<br />

mirror the user’s risk and potential infection experience. In order to keep up to date<br />

on the evolving malware landscape, one need only see which new widgets are<br />

being used in home and business network environments.<br />

But in the corporate world, keeping updated on the latest threats and technologies<br />

is not enough – TCO and ROI need to be considered. How well do advanced<br />

technologies proactively detect How quickly are new threats added How is<br />

customer support response How easily can the solution be managed remotely<br />

How much CPU time is used for scanning To find the answers to many of these<br />

questions, take a look at product performance data from leading independent test<br />

organisations such as <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s and the performance validation programmes<br />

they deliver – such as Real Time <strong>Test</strong>ing.<br />

Page 7 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Changing Malware Threats in Corporate Networks<br />

You can also take a close look at how individual vendors are responding to the<br />

changing threat landscape and the implications for the security of corporate<br />

networks. Nowadays, vendors are defining ‘Protection’ differently. No longer is it just<br />

product performance-related but also related to business and customer service<br />

issues, delivering a higher value overall service to meet not just security, but also<br />

business needs.<br />

When considering product performance in a corporate network environment,<br />

‘Protection’ is more than current malware detection capabilities, it’s also about the<br />

extent of a vendor’s product research and development strategy that anticipates<br />

threats and trends to ensure proactive network protection. It can be further defined<br />

as the extent to which malware protection is delivered for a multi-platform<br />

infrastructure through efficient and easily managed solutions with wide interoperability<br />

capabilities. ‘Protection’ is also about the extent to which business<br />

interests are protected through vendor service strategies that now include optimised<br />

and cost-effective security plans tailored to individual corporations’ needs for<br />

maximising business productivity, lowering the total cost of ownership and<br />

maximising the return on investment. Also, given that corporations are operating in a<br />

worldwide ‘e-economy’ all this needs to be supported by trusted and responsive<br />

global support plans.<br />

Yes, the threat landscape is continuing to evolve with new malware threats<br />

spawned at an alarming rate, but no longer is malware protection and information<br />

security in general just a technical issue - it is a business issue. That is why vendors’<br />

product and service solutions are evolving to suit these changing needs and <strong>West</strong><br />

<strong>Coast</strong> <strong>Lab</strong>s is developing independent product performance programmes that<br />

ensure that these products and services are tested and validated accordingly.<br />

Page 8 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

The <strong>Test</strong> Objectives<br />

<strong>Kaspersky</strong> <strong>Lab</strong> commissioned <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s to carry out the following testing:<br />

• Checkmark Certification for the Baseline, Dynamic and Real Time testing<br />

programme on seven corporate security solutions:<br />

o <strong>Kaspersky</strong> Security 8.0 for Exchange Servers<br />

o <strong>Kaspersky</strong> <strong>Anti</strong>-Virus 8.0 for Windows Servers Enterprise Edition<br />

o <strong>Kaspersky</strong> <strong>Anti</strong>-Virus 8.0 for Linux File Server<br />

o <strong>Kaspersky</strong> <strong>Anti</strong>-Virus 8.0 for Lotus Domino<br />

o <strong>Kaspersky</strong> <strong>Anti</strong>-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition<br />

o <strong>Kaspersky</strong> Endpoint Security 8 for Mac<br />

o <strong>Kaspersky</strong> Endpoint Security 8 for Linux<br />

• Comparative testing of selected <strong>Kaspersky</strong> products against a range of<br />

competitor products in a “static” test environment (See following page).<br />

• A comparison of product feature sets using publicly available information on<br />

vendor websites and marketing collateral.<br />

The <strong>Kaspersky</strong> <strong>Lab</strong> applications included in the test program are:<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

<strong>Kaspersky</strong> Security 8.0 for Exchange Servers<br />

<strong>Kaspersky</strong> <strong>Anti</strong>-Virus 8.0 for Windows Servers Enterprise Edition<br />

<strong>Kaspersky</strong> <strong>Anti</strong>-Virus 8.0 for Linux File Server<br />

<strong>Kaspersky</strong> <strong>Anti</strong>-Virus 8.0 for Lotus Domino<br />

<strong>Kaspersky</strong> <strong>Anti</strong>-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition<br />

<strong>Kaspersky</strong> <strong>Anti</strong>-Virus 6.0 for Windows Workstations<br />

• Windows XP<br />

• Windows Vista<br />

• Windows 7<br />

<strong>Kaspersky</strong> Endpoint Security 8 for Mac<br />

<strong>Kaspersky</strong> Endpoint Security 8 for Linux<br />

A comprehensive list of all <strong>Kaspersky</strong> <strong>Lab</strong> Checkmark Certifications and Checkmark<br />

<strong>Platinum</strong> <strong>Product</strong> Awards can be found on page 19.<br />

Page 9 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

The <strong>Test</strong> Objectives<br />

For the Comparative <strong>Test</strong>ing and the Comparison of <strong>Product</strong> Feature Sets, five<br />

technology groups and a selection of comparable competitor products were<br />

identified by <strong>Kaspersky</strong> <strong>Lab</strong>. These were purchased in the way that any ordinary<br />

corporation would buy them – commercially off the shelf, and are detailed below.<br />

Microsoft Exchange <strong>Test</strong><br />

<strong>Kaspersky</strong> Security 8.0 Symantec Mail Security Trend Micro ScanMail<br />

McAfee GroupShield Sophos E-mail Security ESET Mail Security<br />

Lotus Domino <strong>Test</strong><br />

<strong>Kaspersky</strong> <strong>Anti</strong>-Virus 8.0 Symantec Mail Security Trend Micro ScanMail<br />

McAfee GroupShield Sophos E-mail Security ESET Mail Security<br />

MS ISA Server (replaced<br />

by Forefront TMG 2010)<br />

<strong>Test</strong><br />

<strong>Kaspersky</strong> <strong>Anti</strong>-Virus 8.0 Forefront TMG 2010<br />

Windows Server <strong>Test</strong><br />

<strong>Kaspersky</strong> <strong>Anti</strong>-Virus 8.0<br />

Symantec Endpoint<br />

Protection<br />

Trend Micro Officescan server<br />

edition<br />

McAfee VirusScan<br />

Enterprise and<br />

VirusScan for storages Sophos Endpoint security ESET File Security<br />

Linux <strong>Test</strong><br />

<strong>Kaspersky</strong> <strong>Anti</strong>-Virus 8.0<br />

Symantec Endpoint<br />

Protection<br />

Trend Micro ServerProtect<br />

McAfee VirusScan<br />

Enterprise Sophos Endpoint security ESET File Security<br />

Page 10 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Comparative <strong>Product</strong> <strong>Test</strong>ing<br />

The comparative testing comprised a basic evaluation of each product’s malware<br />

detection capability in a static test environment. WCL built a test suite of 100,000 live<br />

malware samples* from its own independent resources that covered all appropriate<br />

attack vectors.<br />

Each solution was installed to a server running the appropriate and commonly<br />

supported Operating System and software detailed in the next section of this report.<br />

During installation, all default values were kept and, where a choice was required,<br />

the course of action recommended by the solution and/or the attendant product<br />

documentation was adhered to.<br />

Each solution was updated to the latest available definition, engine, and signature<br />

releases before a forensic image was taken and stored for later use. Updates were<br />

allowed during the test period through any normal scheduled and automatically<br />

enabled update mechanism present in the product, and a further forensic image<br />

was taken on the last day of testing for each combination of products.<br />

Each solution was tested against an appropriate test set extracted from the 100,000<br />

samples mentioned above and made up of real-world, “solution capability specific”<br />

samples taken from <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s’ collections, including samples received in the<br />

<strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s Global Honeypot Network. For example, the Exchange-based<br />

solutions were tested against malware known to propagate over email. <strong>Test</strong> sets and<br />

the methodologies were constructed so as to mirror the experience of a real-life<br />

installation as far as possible and not to advantage any one vendor over the others.<br />

*For a description of the malware used in this test programme, refer to Appendix 1 of this<br />

report.<br />

Page 11 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Comparative <strong>Product</strong> <strong>Test</strong>ing – <strong>Test</strong> Network<br />

<strong>Test</strong>ing was carried out on distinct networks which comprised various server and<br />

client machines needed to run the respective technologies and operating systems.<br />

In order to provide a balanced reporting process, <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s recommended<br />

that all client machines should run Windows XP and Service Pack 3 and that server<br />

platforms ran the highest OS version commonly supported across each of the<br />

solutions.<br />

In some cases this meant that they may not have been running on the latest version<br />

of a particular operating system, but this method meant that any testing carried out<br />

was more directly comparable. Details of highest levels of common operating<br />

systems per component available at the time of testing are as follows:<br />

Network 1 – Microsoft Exchange<br />

This network comprised 12 systems – 6 desktops and 6 servers (one of each for each<br />

solution). Each of the desktop machines were paired up with a server system in order<br />

to allow an Exchange Server and Outlook client configuration.<br />

Server OS: Windows 2003 Server 64 bit, Exchange Release: 2007 64 bit.<br />

Network 2 – Windows Server<br />

This network comprised 12 systems – 6 desktops and 6 servers (one of each for each<br />

solution). Each of the desktop machines were paired up with a server system in order<br />

to allow a server/client configuration.<br />

Server OS: Windows 2008 64 bit<br />

Page 12 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Comparative <strong>Product</strong> <strong>Test</strong>ing – <strong>Test</strong> Network<br />

Network 3 – Linux<br />

This network comprised 6 systems running the Red Hat Enterprise release 5 version of<br />

Linux.<br />

Network 4 – Lotus Domino<br />

This network comprised 12 systems – 6 desktops and 6 servers (one of each for each<br />

solution). Each of the desktop machines were paired up with a server system in order<br />

to allow a Lotus Domino server and Lotus Notes client configuration.<br />

Server OS: Windows 2003 32 bit, Lotus Domino Release: R8<br />

Network 5 – Microsoft ISA Server (Forefront TMG 2010)<br />

This network comprised 4 systems – 2 desktop and 2 servers (one of each for each<br />

solution). Each of the desktop machines were paired up with a server system in order<br />

to allow a server/client configuration.<br />

Server OS: Windows 2008 64 bit, Forefront TMG 2010<br />

Supporting these five networks there were a number of servers designed to collect<br />

data from each of the tests, along with desktop machines to act as remote points of<br />

control and for test management.<br />

Page 13 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Comparative <strong>Product</strong> <strong>Test</strong>ing – <strong>Test</strong> Methodology<br />

In each test case, the protocol most likely to be used was employed to test the<br />

solutions – these are detailed as below.<br />

Microsoft Exchange testing: <strong>Test</strong>ing was conducted on an “On Access” basis. All<br />

samples were sent via email from accounts on a real-life, resolvable domain owned<br />

and controlled by <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s to the products under test over a live internet<br />

connection with appropriate firewall rules in place to allow only communication<br />

between the hosts used in the testing. This enabled <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s to report on<br />

those emails that were stopped at the Exchange Server and track those emails that<br />

were bounced to allow for resending to ascertain the gateway protection offered.<br />

Windows Server testing: <strong>Test</strong>ing was conducted on an “On Demand” basis. All<br />

samples were copied on to the appropriate server in a number of directories. The<br />

solution under test was asked to scan the server Operating System to report any<br />

infections it found.<br />

Linux testing: <strong>Test</strong>ing was conducted on an “On Demand” basis. All samples were<br />

copied on to the appropriate server in a number of directories. The solution under<br />

test was asked to scan the server Operating System to report any infections it found.<br />

Lotus Domino testing: <strong>Test</strong>ing was conducted on an “On Access” basis. All samples<br />

were sent via email from accounts on a real-life, resolvable domain owned and<br />

controlled by <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s to the products under test over a live internet<br />

connection with appropriate firewall rules in place to allow only communication<br />

between the hosts used in the testing. This enabled <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s to report on<br />

those emails that were stopped at the Domino Server and track those emails that<br />

Page 14 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Comparative <strong>Product</strong> <strong>Test</strong>ing – <strong>Test</strong> Methodology<br />

might get bounced to allow for resending to ascertain the gateway protection<br />

offered.<br />

ISA Server/Forefront TMG testing: <strong>Test</strong>ing was conducted on an “On Access” basis.<br />

All samples were provided from a real-life resolvable web and FTP server on a<br />

domain wholly owned and controlled by <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s.<br />

Attempts were made to download the samples over a live internet connection with<br />

appropriate firewall rules in place to allow only communication between the hosts<br />

used in the testing using HTTP and FTP to ascertain the gateway protection offered.<br />

Page 15 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Comparative <strong>Product</strong> <strong>Test</strong>ing – <strong>Test</strong> Results<br />

Malware Detection <strong>Test</strong> Results<br />

TEST 1 - Microsoft Exchange<br />

Total Malware Samples - 8042 <strong>Test</strong> Date Detection Rate <strong>Test</strong> Location<br />

<strong>Kaspersky</strong> Security 8.0 16/09/2009 - 23/09/2010 100% ** WCL UK <strong>Lab</strong><br />

<strong>Product</strong> Performance Average* 100%** WCL UK <strong>Lab</strong><br />

<strong>Product</strong> A 16/09/2009 - 23/09/2010 100% ** WCL UK <strong>Lab</strong><br />

<strong>Product</strong> B 16/09/2009 - 23/09/2010 100% ** WCL UK <strong>Lab</strong><br />

<strong>Product</strong> C 16/09/2009 - 23/09/2010 100% ** WCL UK <strong>Lab</strong><br />

<strong>Product</strong> D 16/09/2009 - 23/09/2010 100% ** WCL UK <strong>Lab</strong><br />

<strong>Product</strong> E 16/09/2009 - 23/09/2010 100% ** WCL UK <strong>Lab</strong><br />

TEST 2 - Windows Server Enterprise<br />

Total Malware Samples - 25640 <strong>Test</strong> Date Detection Rate <strong>Test</strong> Location<br />

<strong>Kaspersky</strong> <strong>Anti</strong> Virus 8.0 20/09/2010 - 23/09/2010 99.68% WCL USA <strong>Lab</strong><br />

<strong>Product</strong> Performance Average* 99.54% WCL USA <strong>Lab</strong><br />

<strong>Product</strong> A 20/09/2010 - 23/09/2010 99.45% WCL USA <strong>Lab</strong><br />

<strong>Product</strong> B 20/09/2010 - 23/09/2010 99.50% WCL USA <strong>Lab</strong><br />

<strong>Product</strong> C 20/09/2010 - 23/09/2010 99.36% WCL USA <strong>Lab</strong><br />

<strong>Product</strong> D 20/09/2010 - 23/09/2010 99.69% WCL USA <strong>Lab</strong><br />

<strong>Product</strong> E 20/09/2010 - 23/09/2010 99.57% WCL USA <strong>Lab</strong><br />

TEST 3 - Linux<br />

Total Malware Samples - 25640 <strong>Test</strong> Date Detection Rate <strong>Test</strong> Location<br />

<strong>Kaspersky</strong> <strong>Anti</strong> Virus 8.0 05/10/2010 - 08/10/2010 99.95% WCL USA <strong>Lab</strong><br />

<strong>Product</strong> Performance Average* 99.59% WCL USA <strong>Lab</strong><br />

<strong>Product</strong> A 05/10/2010 - 08/10/2010 99.64% WCL USA <strong>Lab</strong><br />

<strong>Product</strong> B 05/10/2010 - 08/10/2010 99.24% WCL USA <strong>Lab</strong><br />

<strong>Product</strong> C 05/10/2010 - 08/10/2010 99.40% WCL USA <strong>Lab</strong><br />

<strong>Product</strong> D 05/10/2010 - 08/10/2010 99.80% WCL USA <strong>Lab</strong><br />

<strong>Product</strong> E 05/10/2010 - 08/10/2010 99.53% WCL USA <strong>Lab</strong><br />

TEST 4 - Lotus Domino<br />

Total Malware Samples - 8042 <strong>Test</strong> Date Detection Rate <strong>Test</strong> Location<br />

<strong>Kaspersky</strong> <strong>Anti</strong> Virus 8.0 06/10/2010 - 10/10/2010 100% ** WCL UK <strong>Lab</strong><br />

<strong>Product</strong> Performance Average* 100%** WCL UK <strong>Lab</strong><br />

<strong>Product</strong> A 06/10/2010 - 10/10/2010 100% ** WCL UK <strong>Lab</strong><br />

<strong>Product</strong> B 06/10/2010 - 10/10/2010 100% ** WCL UK <strong>Lab</strong><br />

<strong>Product</strong> C 06/10/2010 - 10/10/2010 100% ** WCL UK <strong>Lab</strong><br />

<strong>Product</strong> D 06/10/2010 - 10/10/2010 100% ** WCL UK <strong>Lab</strong><br />

<strong>Product</strong> E 06/10/2010 - 10/10/2010 100% ** WCL UK <strong>Lab</strong><br />

TEST 5 - ISA Server (Forefront TMG)<br />

Total Malware Samples - 18680 <strong>Test</strong> Date Detection Rate <strong>Test</strong> Location<br />

<strong>Kaspersky</strong> <strong>Anti</strong> Virus 8.0 14/10/2010 - 19/10/2010 99% ** WCL UK <strong>Lab</strong><br />

<strong>Product</strong> A 14/10/2010 - 19/10/2010 99% ** WCL UK <strong>Lab</strong><br />

*Defined as the performance average of the products included in the tests, which are deemed to be leading solutions in their own rights.<br />

** Samples used in these tests are those found to be in circulation on <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s’ SMTP malware feeds immediately prior to the<br />

commencement of testing. Although appearing unusual, the 100% detection rates are indicative of two key facts. Firstly, the paranoid<br />

behaviour of email protection systems and the degree of protection extended to vital communication systems such as these, Secondly, this<br />

reflects the changing nature of attempts to compromise end users over this vector. Whilst executables and binaries travelling over this<br />

vector are still highly prevalent, they are becoming less diverse, there are not as many frequent outbreaks of email‐based malware as there<br />

were and it is becoming more likely to that targeted accounts will receive phishing emails and links to websites rather than files.<br />

Page 16 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Checkmark <strong>Product</strong> <strong>Test</strong>ing and Certification<br />

The Checkmark Certification System is recognised globally as probably the most<br />

comprehensive independent functionality and performance validation program of<br />

its kind.<br />

With three tiers of certification – Baseline, Dynamic and Real Time testing – vendors<br />

have the opportunity to commit to the System at a level that suits the performance<br />

of their products and services in the real-world.<br />

The Baseline certifications comprise a series of static benchmarking tests that<br />

measure detection capability against a finite suite of known malware threats.<br />

Whereas the addition of Dynamic and Real Time testing transforms this certification<br />

program into a threefold process that results in the most complete evaluation of an<br />

<strong>Anti</strong>-Malware vendor’s products available.<br />

• Static <strong>Test</strong>ing – baseline tests that measure detection capabilities against<br />

known threats.<br />

• Dynamic <strong>Test</strong>ing – measures product performance in relation to malware<br />

executing as end users and corporations experience them in the real world .<br />

• Real Time <strong>Test</strong>ing – measures critical performance characteristics in a network<br />

environment 24x7x365. The testing provides results in metrics including;<br />

performance in relation to time, attack vectors, heuristic behavior analysis,<br />

signature update and vendor research effectiveness.<br />

The combination of these three, distinct test programs provide the highest level<br />

certification of product performance available.<br />

Page 17 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Checkmark <strong>Product</strong> <strong>Test</strong>ing and Certification<br />

All the <strong>Kaspersky</strong> <strong>Lab</strong> products that form part of this test program<br />

are registered in the Checkmark System for all three levels of<br />

testing – Baseline, Dynamic (where appropriate) and Real Time.<br />

www.westcoastlabs.com<br />

In Real Time, the products are<br />

tested 24x7x365 against live<br />

malware in a range of attack vectors are relevant to<br />

each product. These include FTP, HTTP, P2P, SMTP and<br />

Malicious Web Sites. Given the nature of the Real Time<br />

testing program and the fact that it is probably the most<br />

rigorous product performance validation of its kind, the<br />

products registered for Real Time testing are eligible for<br />

the Checkmark <strong>Platinum</strong> <strong>Product</strong><br />

Award. Far more than just a measure<br />

of product performance it also acts as recognition of the<br />

vendor’s commitment to the highest level of independent<br />

product validation and a measure of the vendor’s responsiveness<br />

to emerging threats.<br />

The <strong>Kaspersky</strong> <strong>Lab</strong> products holding the Checkmark <strong>Platinum</strong> <strong>Product</strong> Awards are:<br />

• <strong>Kaspersky</strong> <strong>Anti</strong>-Virus 8.0 for Windows Servers Enterprise Edition<br />

• <strong>Kaspersky</strong> <strong>Anti</strong>-Virus 8.0 for Linux File Server<br />

• <strong>Kaspersky</strong> <strong>Anti</strong>-Virus 8.0 for Lotus Domino<br />

• <strong>Kaspersky</strong> <strong>Anti</strong>-Virus 6.0 for Windows Workstations<br />

• <strong>Kaspersky</strong> <strong>Anti</strong>-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition<br />

• <strong>Kaspersky</strong> Security 8.0 for Microsoft Exchange Server<br />

• <strong>Kaspersky</strong> Endpoint Security 8 for Linux<br />

Page 18 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

<strong>Kaspersky</strong> <strong>Lab</strong> Certifications in Checkmark<br />

Checkmark Certification Profile for <strong>Kaspersky</strong> <strong>Lab</strong><br />

Awards<br />

Checkmark Certifications <strong>Anti</strong> Virus <strong>Anti</strong> Virus Trojan Spyware <strong>Anti</strong> <strong>Anti</strong> <strong>Anti</strong> Malware<br />

Detection Disinfection Malware Spam Dynamic<br />

<strong>Kaspersky</strong> <strong>Lab</strong> Applications<br />

<strong>Kaspersky</strong> <strong>Anti</strong> Virus 8.0 for Windows Servers Enterprise x x x x<br />

<strong>Kaspersky</strong> <strong>Anti</strong> Virus 8.0 for Linux File Servers x x x x<br />

<strong>Kaspersky</strong> <strong>Anti</strong> Virus 8.0 for Lotus Domino x x x x<br />

<strong>Kaspersky</strong> <strong>Anti</strong> Virus 8.0 for ISA/TMG x x x x<br />

<strong>Kaspersky</strong> Security 8.0 for Exchange x x x x x<br />

<strong>Kaspersky</strong> <strong>Anti</strong> Virus 6.0 for Windows Workstations<br />

Windows XP x x x x x x<br />

Windows Vista x x x x x x<br />

Windows 7 x x x x x x<br />

<strong>Kaspersky</strong> Endpoint Security 8 for Mac<br />

x<br />

<strong>Kaspersky</strong> Endpoint Security 8 for Linux x x x x x<br />

<strong>Kaspersky</strong> <strong>Anti</strong> Spam<br />

x<br />

Awards<br />

Checkmark Certifications Real Time Real Time Real Time Real Time Real Time Real Time<br />

FTP HTTP SMTP P2P Mal URL Spam<br />

<strong>Kaspersky</strong> <strong>Lab</strong> Applications<br />

<strong>Kaspersky</strong> <strong>Anti</strong> Virus 8.0 for Windows Servers Enterprise x x<br />

<strong>Kaspersky</strong> <strong>Anti</strong> Virus 8.0 for Linux File Servers x x<br />

<strong>Kaspersky</strong> <strong>Anti</strong> Virus 8.0 for Lotus Domino<br />

x<br />

<strong>Kaspersky</strong> <strong>Anti</strong> Virus 8.0 for ISA/TMG x x x x x<br />

<strong>Kaspersky</strong> Security 8.0 for Exchange x x<br />

<strong>Kaspersky</strong> <strong>Anti</strong> Virus 6.0 for Windows Workstations<br />

Windows XP x x x<br />

Windows Vista x x x<br />

Windows 7 x x x<br />

<strong>Kaspersky</strong> Endpoint Security 8 for Linux x x<br />

Page 19 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

<strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s’ Conclusion<br />

In this test programme, <strong>Kaspersky</strong> <strong>Lab</strong> products have undergone probably the most<br />

extensive testing carried out by <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s against a single corporate solution.<br />

These tests range from <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>’s established Checkmark Certification to<br />

ongoing performance validation the Real Time system and the custom malware<br />

comparative testing. This programme also includes the first ever product to be<br />

awarded the Checkmark <strong>Anti</strong>-Malware Macintosh certification.<br />

Upon completion of the tests covered in this report it can clearly be seen that<br />

<strong>Kaspersky</strong> are offering an extremely competitive and thorough security package to<br />

businesses and corporate organisations.<br />

For mail-based systems, <strong>Kaspersky</strong> recorded a 100% detection rate on both<br />

Exchange and Lotus against samples which propagate over the SMTP protocol.<br />

While this is an impressive detection rate, it should be noted that the other vendors<br />

also recorded the same detection levels*. This should be an indicator to the level of<br />

importance of email coverage and the perceived threat to business<br />

communications that is held by the security industry as a whole.<br />

On file server-type systems, in this case Windows 2008 and Red Hat Enterprise 5, there<br />

is a differential in detection levels. On the Linux OS, <strong>Kaspersky</strong> recorded the highest<br />

detection rate amongst the solutions on test, whilst on the Windows OS <strong>Kaspersky</strong><br />

recorded the second-highest detection rate. It should be noted that the difference<br />

between first and second in the Windows OS test was just 1/100 th of a percent, thus<br />

putting <strong>Kaspersky</strong> above the Industry Average as defined in the test results.<br />

Page 20 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

<strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s’ Conclusion<br />

From the results of the test programme it can be concluded that not only do the<br />

<strong>Kaspersky</strong> solutions offer comparative detection rates to offerings from other<br />

vendors, it is clear that the level of protection afforded by <strong>Kaspersky</strong> <strong>Lab</strong>s solutions is<br />

consistently high across the range of platforms.<br />

Whether corporate organisations require protection for the desktop environment, a<br />

file server, Microsoft Exchange email server, an Apple Mac client, or a server running<br />

Lotus Domino, the <strong>Kaspersky</strong> <strong>Lab</strong> performance is consistent throughout.<br />

Prospective users of <strong>Kaspersky</strong> <strong>Lab</strong> products, and specifically those featured in this<br />

report, can take confidence from the fact that the solutions are rigorously tested on<br />

an ongoing basis through the Checkmark certification system and the Real Time<br />

testing programme to ensure independent validation of a consistently high standard<br />

of product performance.<br />

*Please see footnote on page 16.<br />

Page 21 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Appendix 1- <strong>Product</strong> Feature Set Comparisons<br />

<strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s were asked to compile a comparative feature list for each of the<br />

products included in this test. This information has been gathered from freely<br />

available marketing literature of those companies included in this test.<br />

As this information is gathered from marketing and other such materials, the<br />

information contained within the following tables should be taken as a high level<br />

overview and does not constitute a comparison of those features that were<br />

examined as part of the extended malware testing.<br />

Research was carried out during September and October 2010 using the reference<br />

points detailed on the following pages.<br />

Page 22 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Page 23 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Page 24 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Page 25 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Page 26 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Page 27 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

<strong>Product</strong> Feature Set Comparison References<br />

Reference Points for Comparison on Linux - 6 th October 2010<br />

Symantec Endpoint Protection<br />

http://www.symantec.com/business/endpoint-protection<br />

http://www.symantec.com/business/products/newfeatures.jsppcid=pcat_security&pvid=endpt_prot_1<br />

http://eval.symantec.com/mktginfo/enterprise/fact_sheets/b-endpoint_protection_DS_12836807-7.en-us.pdf<br />

Trend Micro ServerProtect for Linux<br />

http://us.trendmicro.com/us/products/enterprise/serverprotect-for-linux/<br />

http://us.trendmicro.com/imperia/md/content/us/pdf/products/enterprise/serverprotectforlinux/ds07_splx_060308us.<br />

pdf<br />

McAfee VirusScan Enterprise<br />

http://www.mcafee.com/us/enterprise/products/system_security/servers/linuxshield.html<br />

http://www.mcafee.com/us/local_content/datasheets/ds_virusscan_linux.pdf<br />

Sophos Endpoint Security<br />

http://www.sophos.com/products/enterprise/endpoint/security-and-control/linux/<br />

http://www.sophos.com/products/enterprise/endpoint/security-and-control/linux/sysreqs.html<br />

http://www.sophos.com/sophos/docs/eng/factshts/sophos-sav-linux-dsna.pdf<br />

http://www.sophos.com/products/enterprise/endpoint/security-and-control/management/<br />

ESET File Security for Linux/BSD/Solaris<br />

http://www.eset.com/business/server-security/linux-file<br />

http://www.eset.com/business/remote-administrator<br />

Page 28 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

<strong>Product</strong> Feature Set Comparison References<br />

Reference Points for Comparison on Lotus Domino - 7 th October 2010<br />

Symantec Mail Security for Lotus Domino (Multi-platform edition)<br />

http://www.symantec.com/business/mail-security-for-domino<br />

http://www.symantec.com/business/products/sysreq.jsppcid=pcat_security&pvid=848_1<br />

http://www.symantec.com/content/en/us/enterprise/fact_sheets/b-prot_suite_abe_DS_21025217-1.en-us.pdfTrend<br />

Micro ScanMail<br />

http://us.trendmicro.com/us/products/enterprise/scanmail-for-lotus-domino/index.html<br />

http://us.trendmicro.com/us/products/enterprise/scanmail-for-lotus-domino/ system-requirements/index.html<br />

http://us.trendmicro.com/imperia/md/content/us/pdf/products/enterprise/scanmailforlotusdomino/scanmail_for_lot<br />

us_domino_datasheet.pdf<br />

McAfee GroupShield<br />

http://www.mcafee.com/us/enterprise/products/email_and_web_security/email/security_email_servers.html<br />

http://www.mcafee.com/us/local_content/datasheets/ds_security_email_servers_domino.pdf<br />

Sophos E-mail Security<br />

http://www.sophos.com/products/enterprise/email/security-and-control/lotus-domino/<br />

http://www.sophos.com/products/enterprise/email/security-and-control/lotus-domino/sysreqs.html<br />

http://www.sophos.com/sophos/docs/eng/factshts/sophos-puremessage-lotus-domino-dsna.pdf<br />

ESET Mail Security for Lotus Domino Server<br />

http://www.eset.com/business/server-security/domino-mail<br />

Page 29 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

<strong>Product</strong> Feature Set Comparison References<br />

Reference Points for Comparison on Microsoft Exchange Server - 13 th October 2010<br />

Symantec Mail Security<br />

http://www.symantec.com/business/mail-security-for-microsoft-exchange<br />

http://eval.symantec.com/mktginfo/enterprise/fact_sheets/bmail_security_for_microsoft_exchange_DS-1207718-<br />

3.en-us.pdf<br />

Trend Micro ScanMail<br />

http://us.trendmicro.com/us/products/enterprise/scanmail-for-microsoft-exchange/index.html<br />

http://us.trendmicro.com/imperia/md/content/us/pdf/products/enterprise/scanmailformicrosoftexchange/ds07_sm<br />

ex10_091021us.pdf<br />

http://us.trendmicro.com/us/products/enterprise/scanmail-for-microsoft-exchange/system-requirements/index.html<br />

McAfee GroupShield<br />

http://www.mcafee.com/us/enterprise/products/email_and_web_security/email/security_email_servers.html<br />

http://www.mcafee.com/us/local_content/datasheets/ds_security_email_servers_exchange.pdf<br />

Sophos PureMessage<br />

http://www.sophos.com/products/enterprise/email/security-and-control/microsoft-exchange/<br />

http://www.sophos.com/products/enterprise/email/security-and-control/microsoft-exchange/sysreqs.html<br />

http://www.sophos.com/sophos/docs/eng/factshts/sophos-puremessage-exchange-dsna.pdf<br />

ESET Mail Security 4<br />

http://www.eset.eu/products/eset-mail-security-for-microsoft-exchange-server<br />

http://www.eset.eu/products/system-requirements-eset-mail-security-for-microsoft-exchange<br />

http://download.eset.com/manuals/ESET_EMSX_4_UserGuide_ENU.pdf<br />

Page 30 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

<strong>Product</strong> Feature Set Comparison References<br />

Reference Points for Comparison on Windows Server Enterprise -16-24 th October 2010<br />

Symantec Endpoint Protection<br />

http://www.symantec.com/business/endpoint-protection 16/09/2010<br />

http://www.symantec.com/business/products/newfeatures.jsppcid=pcat_security&pvid=endpt_prot_1 24/09/2010<br />

http://eval.symantec.com/mktginfo/enterprise/fact_sheets/b-endpoint_protection_DS_12836807-7.en-us.pdf<br />

24/09/2010<br />

Trend Micro Officescan server edition<br />

http://us.trendmicro.com/us/products/enterprise/officescan/ 16/09/2010<br />

http://us.trendmicro.com/imperia/md/content/us/pdf/products/enterprise/officescan/ds04_os10.5_100603us.pdf<br />

24/09/2010<br />

McAfee VirusScan Enterprise and VirusScan for storages<br />

http://www.mcafee.com/us/enterprise/products/system_security/servers/virusscan_enterprise.html 16/09/2010<br />

http://www.mcafee.com/us/local_content/datasheets/ds_vse.zip 16/09/2010<br />

Sophos Endpoint Security<br />

http://www.sophos.com/products/enterprise/endpoint/security-and-control/ 16/09/2010<br />

http://www.sophos.com/sophos/docs/eng/factshts/sophos-endpoint-security-and-data-protection-dsna.pdf<br />

16/09/2010<br />

http://www.sophos.com/sophos/docs/eng/factshts/sophos-endpoint-security-and-data-protection-rgna.pdf<br />

24/09/2010<br />

ESET File Security for Windows File Server<br />

http://www.eset.com/business/server-security/windows-file23/09/2010<br />

Page 31 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

<strong>Product</strong> Feature Set Comparison References<br />

Reference Points for Comparison on ISA/TMG - 8 th October 2010<br />

Microsoft Forefront Threat Management Gateway<br />

http://www.microsoft.com/forefront/threat-management-gateway/en/us/<br />

http://www.microsoft.com/forefront/threat-management-gateway/en/us/overview.aspx<br />

http://www.microsoft.com/forefront/threat-management-gateway/en/us/features.aspx<br />

http://www.microsoft.com/forefront/threat-management-gateway/en/us/system-requirements.aspx<br />

Page 32 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Malware <strong>Test</strong> Suites<br />

<strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s puts considerable effort into ensuring the relevance of samples<br />

used in testing.<br />

There are three key components to this process. The company’s research facilities<br />

continuously monitor the malware attacks and intercept attempts to attack the<br />

corporate network of a global company with thousands of users spread over 4<br />

continents.<br />

WCL also has the advantage of an international system of honeypots, machines<br />

based in many countries on most continents that sit on open networks waiting to be<br />

attacked. When attacks occur the malware is intercepted and reported back to a<br />

central repository, where it is de-duped, checked for corruption and validity, stored<br />

and can then be used as a sample for testing products.<br />

In the Real Time <strong>Test</strong>ing System, which forms one component of the Checkmark<br />

<strong>Platinum</strong> <strong>Product</strong> Award, the malware is sent through the test network almost<br />

immediately and is subsequently considered to be eligible for inclusion in other test<br />

collections.<br />

Another method of collection and validation is through honeyclients. Located in<br />

Europe, Asia and the USA, these are systems designed to trawl the Internet to<br />

discover “drive-by downloads” (where malware is downloaded in the background<br />

unknown to the user who is looking at an otherwise perfectly acceptable web site),<br />

and to download files by visiting these websites and capturing the output. Again, this<br />

malware is sent through the Real Time system almost immediately and is eligible for<br />

inclusion in other collections.<br />

Page 33 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Malware <strong>Test</strong> Suites<br />

Malware in Real Time <strong>Test</strong>ing<br />

In Real Time testing and the Checkmark <strong>Platinum</strong> <strong>Product</strong> Award programme, both<br />

new and older malware still circulating (providing that it has been received in the<br />

recent past) are used, being tested within a few minutes of their arrival at WCL.<br />

Malware is transmitted through the appropriate attack vectors in which they are<br />

received – FTP, HTTP, SMTP, Mal URL or P2P.<br />

Malware in Checkmark Baseline <strong>Test</strong>ing<br />

WCL’s static Checkmark malware certifications normally use both Real Time samples<br />

and also slightly older malware, sometimes derived from sources such as the Wildlist<br />

but usually being malware that was received in recent months and chosen from the<br />

most prevalent receipts.<br />

Malware in Custom <strong>Test</strong>ing<br />

For a custom test larger quantities of malware are used, including some older<br />

malware to verify that the users are still protected against historical samples, and<br />

showing no bias in favour of or against any particular product under test, including<br />

any regional bias (unless the terms of the test so require). It is necessary to have a<br />

balance of malware from around the world because a predominance of malware<br />

obtained in one area of the world will discriminate against those companies with less<br />

exposure to that market. This is ensured through WCL’s corporate network research<br />

plus receipts from WCL’s honeypot and honeyclient networks across the globe.<br />

Page 34 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Malware <strong>Test</strong> Suites<br />

With so much new malware appearing each day, it is necessary to concentrate on<br />

that malware that is most frequently found (or prevalent), and that attacks via the<br />

methods protected by the system under test; it is, for example, pointless sending<br />

“drive-by” malware through an email security product - it would never normally be<br />

spread by email and so the product will never be expected to deal with it.<br />

It is also important to make certain that the malware used reflects what users are<br />

genuinely seeing. Older malware endures in the real world for years after its<br />

appearance, and products must therefore maintain defences against it. It is<br />

tempting to reduce system overheads by removing older definitions, but this must<br />

not be done if the user is then left at risk. All WCL’s static collections therefore<br />

include an element of malware that is not new but that is still bombarding<br />

honeypots and users’ systems, to confirm that protection against it is still effective.<br />

There are many sorts of malware, including (though not exclusively) viruses of a<br />

number of types, worms (spreading both by email and across networks), bots,<br />

downloaders, backdoors, Trojans and keyloggers. The Checkmark certifications<br />

divide them into three large groups, Trojans, Spyware and Viruses. Real Time testing<br />

covers any malware using the diffusion methods under test, and a custom test will<br />

include whatever may be required by the specifications of the test.<br />

The collation of <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s’ test suites also includes a number of processes<br />

ensuring that samples used are viable, valid and appropriate – any samples found<br />

to be unusable are discarded unless there is a specific reason for them being in the<br />

test suite, for example, testing against samples reported as corrupted.<br />

Page 35 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Malware <strong>Test</strong> Suites<br />

<strong>Kaspersky</strong> <strong>Lab</strong>s Comparative <strong>Test</strong> Project<br />

For this particular custom test, testing takes place in five different operating<br />

environments, namely Microsoft Exchange, Lotus Domino, MS ISA (TMG 2010) Server,<br />

Windows Server Enterprise Edition and Linux File Servers. The main test suite is divided<br />

into separate sub-suites used for each environment (although some sub-suites are<br />

used more than once).<br />

For both Microsoft Exchange and Lotus Domino, the main component of the test<br />

suite is a group of malware that spreads itself via SMTP. Of course, many different<br />

files and types of malware can be attached to emails, and therefore the test suite<br />

also includes malware gathered internationally that can be sent by email. Types of<br />

malware used in this part of the test include viruses, bots, Trojans, and especially<br />

those worms designed to spread by email, all of which have been found in the email<br />

intercepts delivered to WCL.<br />

Windows Server Enterprise Edition acts as a network server and repository and so the<br />

appropriate test sub-suites include not only those sub-suites as used elsewhere but<br />

also network worms as being the malware most likely to infect and spread via these<br />

environments.<br />

MS ISA Server acts as a network edge gateway and so the suites considered when<br />

testing this include a wide range of malware concentrating on network traffic<br />

including HTTP, FTP, and Peer to Peer malware as well as network worms – malware<br />

transported by the sort of traffic flow that would be associated with a corporate<br />

network.<br />

Page 36 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Malware <strong>Test</strong> Suites<br />

Linux has a small selection of malware especially designed to run in that<br />

environment, but also needs to recognise Windows malware; although this cannot<br />

run natively in this environment, many companies include both Windows and Linux<br />

machines on the same networks and any failure to recognise Windows malware<br />

might lead to infection of central or shared servers and leave the whole network<br />

vulnerable. For this reason the test sub-suites used in this environment include Linux<br />

malware but also Windows malware as used in some of the other tests.<br />

Page 37 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

<strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s Disclaimer<br />

While <strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s is dedicated to ensuring the highest standard of security<br />

product testing in the industry, it is not always possible within the scope of any given<br />

test to completely and exhaustively validate every variation of the security<br />

capabilities and/or functionality of any particular product tested and/or guarantee<br />

that any particular product tested is fit for any given purpose.Therefore, the test<br />

results published within any given report should not be taken and accepted in<br />

isolation.<br />

Potential customers interested in deploying any particular product tested by <strong>West</strong><br />

<strong>Coast</strong> <strong>Lab</strong>s are recommended to seek further confirmation that the said product will<br />

meet their individual requirements, technical infrastructure and specific security<br />

considerations.All test results represent a snapshot of security capability at one point<br />

in time and are not a guarantee of future product effectiveness and security<br />

capability.<br />

<strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s provide test results for any particular product tested, most relevant<br />

at the time of testing and within the specified scope of testing and relative to the<br />

specific test hardware, software, equipment, infrastructure, configurations and tools<br />

used during the specific test process.<br />

<strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s is unable to directly endorse or certify the overall worthiness and<br />

reliability of any particular product tested for any given situation or deployment.<br />

Page 38 of 40


<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Revision History<br />

Issue Description of Changes Date Issued<br />

1.0 <strong>Test</strong> <strong>Report</strong> Version 1.0 29/10/2010<br />

Page 39 of 40


USA SALES<br />

<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

T +1 (949) 870 3250<br />

EUROPE SALES<br />

T +44 (0) 2920 548400<br />

CHINA, KOREA, JAPAN, TAIWAN SALES<br />

T +86 1 343 921 7464<br />

REST OF THE WORLD SALES<br />

T +44 (0) 2920 548400<br />

CORPORATE OFFICES AND TEST FACILITIES<br />

US Headquarters and <strong>Test</strong> Facility<br />

<strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s<br />

16842 Von Karman Avenue, Suite 125,<br />

Irvine, California, CA92606, USA<br />

T +1 (949) 870 3250, F +1 (949) 251 1586<br />

European Headquarters and <strong>Test</strong> Facility<br />

<strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s<br />

Unit 9, Oak Tree Court, Mulberry Drive<br />

Cardiff Gate Business Park, Cardiff CF23 8RS, UK<br />

T +44 (0) 2920 548400, F +44 (0) 2920 548401<br />

Asia Headquarters and <strong>Test</strong> Facility<br />

A2/9 Lower Ground floor, Safdarjung Enclave,<br />

Main Africa Avenue Road, New Delhi 110 029, India.<br />

T +91 (0) 11 4602 0622, F +44 (0) 11 4602 0633<br />

E info@westcoast.com<br />

W www.westcoastlabs.com<br />

Page 40 of 40

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!