|
Register for our Free Newsletters |
|
 |
|
|
|
|
|
|
|
|
Other Carouselweb publications |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Another Virus Bulletin Award For ESET
|
ESET
: 11 June, 2010 (Company News) |
|
100 percent detection performance for viruses in the wild combined with no false positives brings 62nd consecutive VB100 award for ESET from Virus Bulletin |
|
ESET has secured its 62nd VB100 award from Virus Bulletin, the widely-respected independent comparative testing group, and leads all antivirus vendors with a record-setting 45 straight VB100 awards. June's Virus Bulletin report focused on the Windows Server 2008 R2 platform; of the 33 products participating, 24 succeeded and 9 failed.
Virus Bulletin introduced its first VB100 award in 1998, and conducts several comparatives every year, rotating its platforms between Linux, Windows, Windows servers and Novell Netware. In order to display the VB100 logo, an antivirus product must meet two criteria: (1) Demonstrate it detects all "In-the-Wild" viruses during both on-demand and on-access scanning; and, (2) Generate no false positives when scanning a set of clean files. Since the inception of the VB100 awards in 1998, ESET's antivirus products continue to boast a success rate of over 97 percent - the industry's highest. Most antivirus vendors have success ratios in the 50 - 75 percent range.
"Detection rates were excellent, showing a continuation of the upward trend seen in the last few tests," said John Hawes, Virus Bulletin. "No false alarms were noted and the WildList was handled flawlessly, earning ESET yet another VB100 award."
ESET is powered by ThreatSense technology, an advanced heuristics engine that enables proactive detection of malware not covered by even the most frequently updated signature-based products. Unlike traditional approaches, ESET solutions decode and analyze executable code in real-time, using an emulated environment. By allowing malware to execute in a secure virtual world, ESET is able to clearly differentiate between benign files and even the most sophisticated and cleverly-disguised malware.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|