Platinum Product Test Report Kaspersky Lab Anti ... - West Coast Labs
Platinum Product Test Report Kaspersky Lab Anti ... - West Coast Labs
Platinum Product Test Report Kaspersky Lab Anti ... - West Coast Labs
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />
Validation <strong>Test</strong>ing & Certification<br />
Malware <strong>Test</strong> Suites<br />
<strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s puts considerable effort into ensuring the relevance of samples<br />
used in testing.<br />
There are three key components to this process. The company’s research facilities<br />
continuously monitor the malware attacks and intercept attempts to attack the<br />
corporate network of a global company with thousands of users spread over 4<br />
continents.<br />
WCL also has the advantage of an international system of honeypots, machines<br />
based in many countries on most continents that sit on open networks waiting to be<br />
attacked. When attacks occur the malware is intercepted and reported back to a<br />
central repository, where it is de-duped, checked for corruption and validity, stored<br />
and can then be used as a sample for testing products.<br />
In the Real Time <strong>Test</strong>ing System, which forms one component of the Checkmark<br />
<strong>Platinum</strong> <strong>Product</strong> Award, the malware is sent through the test network almost<br />
immediately and is subsequently considered to be eligible for inclusion in other test<br />
collections.<br />
Another method of collection and validation is through honeyclients. Located in<br />
Europe, Asia and the USA, these are systems designed to trawl the Internet to<br />
discover “drive-by downloads” (where malware is downloaded in the background<br />
unknown to the user who is looking at an otherwise perfectly acceptable web site),<br />
and to download files by visiting these websites and capturing the output. Again, this<br />
malware is sent through the Real Time system almost immediately and is eligible for<br />
inclusion in other collections.<br />
Page 33 of 40