Trend Micro Endpoint Comparative Report Performed by AV-Test.org
Traditionally, endpoint testing has been done by updating each product’s signatures, removing the device from the network, and then copying a test set of malicious files onto the device to determine how many can be caught. That was fine when only a small number of malicious files were being introduced to the world, but today, according to the latest statistics from AV-Test.org, we’re seeing over 1.5 million unique samples every month.
Please supply your email address to access the content.
- IT staff bearing brunt of EU General Data Protection Regulation planning
- Industry calls for more proportional limits to metadata retention
- How three small credit card transactions could reveal your identity
- Reflection techniques comprise nearly half of surging DDoS volumes: PLXsert
- Hackers shakedown businesses by encrypting their websites
- Report: Marketing teams must be restructured
- How virtual reality stole the show at Sundance Film Festival
- Qantas tests virtual reality for in-flight entertainment
- Report: Data-driven marketing the norm as marketers aim for 1-to-1 customer connections
- Updated: Jeanswest sets sights on customer growth with new omni-channel capabilities