Comp-analysys Ts2008 Feb2008

  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Comp-analysys Ts2008 Feb2008 as PDF for free.

More details

  • Words: 4,753
  • Pages: 20
BitDefender Total Security 2008

COMPARATIVE ANALYSIS

The comparative test this document is based on was carried out by the BitDefender Team for information supply purposes. Document date: February 2008

BitDefender Total Security 2008 | Comparative Analysis

Document Overview The purpose of this document is to provide marketers and partners with the information needed to support marketing actions connected to BitDefender Total Security 2008. The document is structured as follows: - BitDefender Total Security overview - Summary Comparative Table - Feature-Based Comparative Table - Features Description - Conclusions

BitDefender Total Security BitDefender Total Security 2008 provides PCs with the ultimate proactive protection against viruses, spyware, hackers, spam and other Internet security threats. Moreover, its system maintenance and PC backup tools keep PCs running fast and protected from data loss.

Key features • •

• • • • •

State-of-the-art proactive protection against new viruses Protects against phishing attacks by filtering all accessed web pages for fraud attempts Helps prevent unauthorized access to users’ Wi-Fi network New adaptive engines detect & block spam faster and more reliably than ever Parental control blocks access to inappropriate websites and e-mail Through its automated incremental backup feature copies users’ data to local or removable drives for safekeeping Tune-up module improves PC performance

Certifications and awards The BitDefender 2008 products have earned top marks from independent testing organizations and the recognition of top industry publications.

2

Summary Comparative Table  

BitDefender Total Security 2008

Symantec Norton 360

McAfee Total Protection 2008

Microsoft OneCare v2

Trend Micro Internet Security 2008

Kaspersky Internet Security 7

F-Secure Internet Security 2008

Norton Internet Security 2008

Panda Internet Security 2008

Eset Smart Security v3

G Data Total Care 2008

99.51%

96.75%

93.71%

96.42%

88.85%

98.86%

97.93%

96.75%

90.15%

94.26%

99.88%

63%

38%

43%

n/a

30%

45%

36%

38%

24%

59%

n/a

hourly

2-4/day

2-3/day

2-6/day

2-4/day

hourly

2-7/day

2-4/day

daily

hourly

hourly

/

/

/

/

/

/

/

/

/

/

/

Antivirus Firewall Wi-Fi management Antispam Anti-phishing Anti-rootkit Parental control Web time limiter Gamer mode Settings protection Trace clean-up Registry cleaner Duplicate finder Data backup Detection rate* Proactive detection** Update frequency Rescue CD Checkmark Antimalware / Firewall *

According to Av-test.org, August 2007

** According to Anti-Malware Test Lab, January 2008

3

BitDefender Total Security 2008 | Comparative Analysis

Feature-Based Comparative Table (Part 1) Ctrl+Click links for more info

=

Symantec Norton 360

McAfee Total Protection 2008

Microsoft Onecare v2

Trend Micro Internet Security Pro 2008

Kaspersky Internet Security 7.0

99.51%

96.75%

93.71%

96.42%

88.85%

98.86%

63%

38%

43%

N/A

30%

45%

Hourly

2-4/day

2-3/day

2-6/day

2-4/day

hourly

ALL

arj, cab, rar, zip

arj, cab, rar, zip, arc

ace, arj, cab, arc, gzip, rar, zip

ace, arj, cab, rar, zip, lha

ace, arj, cab, ha, rar, zip

zip, tar, czip, gzip, rpm

zip

zip

zip, lha

zip, arj, cab, rar, lha

/ /

/ /

/ /

/ /

/ /

BitDefender Total Security 2008

Antivirus & Antispyware Real-time antivirus and antispyware protection Detection rate (av-test.org, August 2007) Proactive detection (Antimalware Test, Jan 2008) Update frequency Detect viruses in archives (ace, arc, arj, cab, gz, ha, imp, rar, tar, zip) Clean archived files Detect and remove rootkits Preset security levels Scan e-mail traffic Scan web(HTTP) traffic Narrow on-access scanning target Run scan tasks at low priority Scheduled scan tasks

Anti-phishing Filter phishing e-mails Web anti-phishing

Antispam Antispam filter Integration with Outlook / Outlook Express / Thunderbird

/ /

Wizard to train the antispam filter Charset block NeuNet (Neural network) Image filter

4

BitDefender Total Security 2008 | Comparative Analysis

=

BitDefender Total Security 2008

Symantec Norton 360

McAfee Total Protection 2008

Microsoft Onecare v2

Trend Micro Internet Security Pro 2008

Kaspersky Internet Security 7.0

Firewall Two-way firewall Stealth mode Database of known applications Predefined network types Different firewall profiles for different networks Wi-Fi management Firewall zones

Parental control Keyword filter Privacy protection Web time limiter Application control Website filter

TuneUp Find duplicate files Clean temporary internet files and cookies Trace clean-up Registry cleaner

Backup Local backup Backup scheduler

Usability Protection status for each module ‘Fix all issues’ option Multi user support

Compatibility Unicode support Windows 64b support Windows Vista support

5

BitDefender Total Security 2008 | Comparative Analysis

Symantec Norton 360

McAfee Total Protection 2008

Microsoft Onecare v2

Trend Micro Internet Security Pro 2008

31,55

9,04

97,49

89,07

69,51

24,7

53,12

n/a

139,67

91,88

109,84

45,7

163

173

446

n/a

271

521

28

40

38

n/a

31

30

BitDefender Total Security 2008

=

Kaspersky Internet Security 7.0

Performance Average memory consumption – on-access (MB, lower is better)* Average memory – on-demand (MB, lower is better)* Scan speed (in seconds, lower is better)** Boot speed (in seconds, lower is better)**

Others Rescue CD (boxed products)

(Requires BartPE)

Gamer mode Settings protection Update on-the-fly Password-protected settings Scan during installation

* **

according to tests carried out by BitDefender according to the CNET 2008 antivirus performance test (http://reviews.cnet.com/)

6

BitDefender Total Security 2008 | Comparative Analysis

Feature-Based Comparative Table (Part 2) BitDefender Total Security 2008

F-Secure Internet Security 2008

Norton Internet Security 2008

Panda Internet Security 2008

Eset Smart Security v3

G Data Total Care 2008

99.51%

97.93%

96,75%

90,15%

94,26%

99.88%

63%

36%

38%

24%

59%

n/a

hourly

2-7/day

2-4/day

daily

hourly

hourly

arj, cab, rar, zip

arj, cab, rar, zip

arc, arj, cab, rar, zip, lha

arj, cab, tar, gzip, rar, zip

ace, arc, arj, cab, ha, rar

zip

zip, arj, lha

arj

/ /

/ /

/ /

Antivirus Real-time antivirus and antispyware protection Detection rate (avtest.org, August 2007) Proactive detection (Antimalware Test, Jan 2008) Update frequency Detect archived files (ace, arc, arj, cab, gz, ha, imp, rar, tar, zip) Clean archived files

zip,tar, czip, gzip, rpm

Detect and remove rootkits Preset security levels Scan e-mail traffic Scan web(HTTP) traffic Narrow on-access scanning target Run scan tasks at low priority Scheduled scan tasks

Anti-phishing Filter phishing e-mails Web anti-phishing

Antispam Antispam filter Integration with Outlook / Outlook Express / Thunderbird

/ /

/ /

/ /

Wizard to train the antispam filter Charset block NeuNet (Neural network) Image filter

7

BitDefender Total Security 2008 | Comparative Analysis

BitDefender Total Security 2008

F-Secure Internet Security 2008

Norton Internet Security 2008

Panda Internet Security 2008

Eset Smart Security v3

G Data Total Care 2008

Firewall Two-way firewall Stealth mode Database of known applications Predefined network types Different firewall profiles for different networks Wi-Fi management Firewall zones

Parental control Keyword filter Privacy protection Web time limiter Application control Website filter

TuneUp Find duplicate files Clean temporary internet files and cookies Trace clean-up Registry cleaner

BackUp Local backup Backup scheduler

Usability Protection status for each module ‘Fix all issues’ option Multi user support

Compatibility Unicode support Windows 64b support Windows Vista support

8

BitDefender Total Security 2008 | Comparative Analysis

BitDefender Total Security 2008

F-Secure Internet Security 2008

Norton Internet Security 2008

Panda Internet Security 2008

Eset Smart Security v3

G Data Total Care 2008

31,55

54,97

11,55

184,74

33,44

116,99

51,55

62,28

68,25

205,03

37,49

185,67

163

n/a

173

135

n/a

n/a

28

n/a

40

39

n/a

n/a

Performance Average memory consumption – on-access (MB, lower is better)* Average memory – on-demand (lower is better, MB)* Scan speed (in seconds, lower is better)** Boot speed (in seconds, lower is better)**

Others Rescue CD (boxed products) Gamer mode Settings protection Update on-the-fly Password-protected settings Scan during installation

* **

according to tests carried out by BitDefender according to the CNET 2008 antivirus performance test (http://reviews.cnet.com/)

9

BitDefender Total Security 2008 | Comparative Analysis

Features Description Antivirus and Antispyware Real-time antivirus and antispyware protection A real-time virus and spyware scanner (virus shield) blocks infected or suspect files onaccess (copy, move, edit).

Detection rate Detection rate is an indicator of how many viruses an antivirus detects out of a chosen set of virus samples. According to the independent test lab AV-Test (www.av-test.org) in Germany, BitDefender is the most reliable single-engine product in point of protection against Internet threats, with a 99.51% detection rate. The test was performed in August 2007 on a number of 874,822 virus samples including bots, backdoors, Trojans and worms.

Proactive detection Proactivity is a measure of how well an antivirus copes with new and previouslyunknown threats. The chart below represents the percentage of threats detected exclusively based on their behavior (rather than on the traditional virus signature method)

The test was performed by Anti-Malware Test Lab in January 2008 (http://www.anti-malware-test.com/?q=node/39) .

10

BitDefender Total Security 2008 | Comparative Analysis

Update frequency Traditional virus detection consists of identifying infected files based on signatures which are gradually stored in a constantly updated database. The more frequently the database is updated, the higher the chance of new viruses being detected. BitDefender is updated hourly so that users are protected against the latest threats without pushing a button.

Virus detection and cleaning of archived files This is a very important feature when it comes to disinfecting and repairing archives which include important information only part of which is infected. BitDefender can disinfect files located inside the following types of archives: zip, tar, czip, gzip and rpm.

Rootkit detection and removal Rootkits are malicious pieces of software designed to control a PC while staying hidden. As this kind of threats are identified based on their traces, BitDefender comes with a special rootkit removal tool which practically detects such traces.

Pre-set security levels

Having different preset security levels allows users to choose the protection level that better fits their security needs, with a click.

Scan incoming and outgoing email (POP3 and SMTP) BitDefender filters incoming and outgoing e-mail messages, regardless of the e-mail client used (OutlookTM, Outlook ExpressTM, The Bat!TM, Netscape®, etc.), without any additional configuration.

Scan web (HTTP) traffic A web traffic filter blocks viruses even before they reach the browser, reducing the risk of infections.

Narrow on-access scanning target This feature refers to the possibility of scanning only specific drives, folders or even files. BitDefender Total Security 2008 allows defining custom scanning tasks that will only apply to user-selected items.

Run scan tasks at low priority This option decreases the priority of the scan process, allowing other programs to run faster. However, a low priority scan process will take longer to complete.

Scheduled scan tasks A task scheduler enables users to plan ahead and schedule full system/drive scans in the off hours, when the computer is not used.

Anti-phishing Filter phishing emails BitDefender’s new phishing detector keeps the computer clear of malicious e-mails trying to trick people into giving away their bank account information or other sensitive data.

11

BitDefender Total Security 2008 | Comparative Analysis

Web Anti-phishing Protects against phishing attempts by filtering all accessed web pages. BitDefender Total Security 2008 will notify and prompt the user for action when a web site is detected as phished.

Antispam Antispam filter Antispam filters keep the inbox free of unsolicited mail by classifying messages based on various techniques and patterns.

Integration with Outlook, Outlook Express and Thunderbird While the antispam usually filters messages regardless of the email client used, some products have a deeper integration with programs like Microsoft OutlookTM or Outlook ExpressTM, which allows users to fine tune the antispam filter.

Wizard to train the antispam filter To further improve the efficiency of its antispam module and eliminate false positives, BitDefender Total Security 2008 includes a wizard that helps train the Bayesian filter to recognize spam based on the messages already received.

Charset block The Charset Filter blocks any e-mail written in "strange" characters, a very well known characteristic of spam.

NeuNet (Neural network) The new antispam filter available in BitDefender Total Security 2008 uses a Neural Network (a concept borrowed from the field of Artificial Intelligence) to deal with the new spam messages sent every day. Its main advantage is that it can recognize new spam by perceiving similarities (oftentimes very subtle) between the new messages received and the ones it was trained on.

Image Filter Based on a constantly updated database, this filter adds a spam score to e-mails containing pictures that are common to spam.

Firewall Two-way firewall The firewall keeps intruders away and controls the access of applications to the Internet. Users can define exactly which incoming or outgoing connections to permit/deny based on specific protocols, ports, applications and/or remote addresses.

Stealth mode (block port scans) Port scans are attempts to connect to ports in order to find out whether or not a computer is vulnerable. The Stealth Mode option in BitDefender Total Security 2008 prevents the PC from responding to port scans, which makes it virtually invisible in the network.

12

BitDefender Total Security 2008 | Comparative Analysis

Database of known applications BitDefender Total Security 2008 maintains a database of trusted applications, and informs users whether or not the applications demanding network access are trustworthy. In this way, users can make informed decisions when allowing or denying these applications. Alternatively, BitDefender Total Security 2008 can automatically grant access to trusted applications.

Predefined network types BitDefender Total Security 2008 provides predefined network policies to help users better configure the firewall.

Different firewall profiles for different networks This feature is very useful for people who connect with the same laptop to various networks – for example at work and at home. The firewall should be able to apply the security profile that is most appropriate for each network.

Wi-Fi management The Wi-Fi management feature helps prevent unauthorized access to the Wi-Fi internet connection by notifying users about computers that log in to the network. Users will also be informed when connecting to an open Wi-Fi network and the respective network will automatically be classified as “untrusted” so that the PC is protected against unauthorized access.

Firewall zones Zones are IP addresses, individual or as ranges, covered by special rules inside profiles. Based on these zones, the respective IPs are allowed or denied access to users’ PCs. By default, BitDefender automatically adds zones for specific network configurations. For example an open wireless network will be considered to be an untrusted zone.

Parental control Keyword filter The keyword filter can be used to block e-mail messages or web pages which contain specific words or phrases.

Privacy protection The privacy guard monitors the outgoing HTTP (web) and SMTP (mail) traffic for what might be personal information –such as credit card numbers, Social Security numbers and other user-defined strings (e.g. bits of passwords).

Web time limiter The web time limiter enables users to allow or prevent other users or applications from accessing the web during specific intervals of time.

Application control This option helps limit access to certain applications such as games and messaging software.

Website filter Heuristic website filters automatically classify web pages based on content and other cues so that pages with inappropriate content are blocked. Instead of relying only on

13

BitDefender Total Security 2008 | Comparative Analysis

keywords, this approach applies antispam research principles when classifying web pages.

TuneUp Find duplicate files The duplicate finder checks for duplicate files, applications or media that have been downloaded multiple times or for documents saved in multiple places by mistake. Once the unnecessary copies have been identified, the duplicate finder presents the user with an option to erase, them in order to free up valuable disk space.

Clean temporary internet files and cookies Cleaning temporary Internet files and cookies frees disk space and helps protect users’ privacy.

Trace clean-up Trace clean-up completely erases files and "traces" of files from the disk to prevent their unauthorized recovery.

Registry cleaner Some of the registry keys associated with applications removed by the user might not be deleted and continue to remain in the Windows Registry causing system slowdowns and even instability. To improve system performance, the Registry Cleaner scans the Windows Registry and deletes the invalid registry keys.

Backup Local backup BitDefender Total Security 2008 is fitted with a new module which safeguards users’ data by creating backup copies to local and removable drives, CD-R/RW or DVDR/RW. This module is set to automatically back up only new files, based on a pre-set schedule

Backup scheduler The backup process can be performed based on a previously set schedule so that users will not have to deal with this task repeatedly.

Usability Protection status for each module BitDefender Total Security 2008 provides better visibility into its status, both overall and for each separate module, through the information available in its main window.

Fix all issues option Possible issues can be fixed from the main window, with just one click.

Multi user support If several people use the same PC, the product supports different settings for each of them.

14

BitDefender Total Security 2008 | Comparative Analysis

Compatibility Unicode support Support for languages that use unicode character sets (like Asian languages).

Windows 64b support Support for Windows XP 64-bit and WindowsVista 64-bit systems.

Windows Vista support Support for Windows Vista 32-bit and 64-bit systems.

Performance Memory consumption – On-access Memory consumption is an important antivirus scanner parameter. Given that the scanner is permanently active, the lower its memory consumption, the less significant its impact on the efficiency and overall “responsiveness” of the operating system.

Average memory – On-demand This is an indicator of how much memory the program utilizes when scanning a given target. The lower its value, the better the system performance.

Scan speed The time taken by an antivirus to scan a given quantity of data. The chart below shows how many seconds were necessary for the products to complete the scan test. Lower values mean better performance.

According to the CNET 2008 antivirus performance test (http://reviews.cnet.com/)

15

BitDefender Total Security 2008 | Comparative Analysis

Boot speed How long it takes to bring a system from powered-off to fully functional. The chart below lists boot times in seconds for each antivirus product. Lower values mean faster performance.

According to the CNET 2008 antivirus performance test (http://reviews.cnet.com/)

Other features Rescue CD BitDefender Total Security 2008 is delivered on a bootable CD which can be used to analyze/repair/disinfect a compromised system that cannot be started.

Gamer mode The new Gamer Mode temporarily modifies protection settings so as to minimize their impact on game speed, while maintaining a safe, fun gaming experience.

Self protection system BitDefender Total Security 2008 files and processes are safeguarded by special modules in order to prevent malicious software from disabling the product.

Update on-the-fly Updates are downloaded and installed without stopping the antivirus protection.

Password protected settings Other users are prevented from changing the product settings.

Scan during installation BitDefender Total Security 2008 provides the option of scanning the PC during installation so that it is cleaned of viruses before real-time protection becomes active.

16

BitDefender Total Security 2008 | Comparative Analysis

Conclusions With its numerous features, BitDefender Total Security 2008 appears to be a more complex security solution, capable of covering both the data security and the computer performance aspects of users’ activity on the Internet. BitDefender Total Security 2008 stands for a well-balanced combination of complex data security features, a good detection rate (both proactive and signature-based) and light resource consumption.

Why not Symantec Norton 360 With its 64% proactive detection rate, BitDefender surpasses by far Norton’s results (38%) in dealing with new and unknown viruses. The product’s firewall does not include Wi-fi management functions, although they would be useful for the protection of users connecting to open Wi-fi networks and for the issuing of warnings about attempts to connect to users’ own network.

-The parental control module is not capable of limiting access either to the Internet, during specific intervals, or to certain applications like games, file sharing programs, etc. Norton 360 does not have a gamer mode, although it would make the gaming experience smoother by reducing the load on system resources. The product does not offer the option to completely erase files and "traces" of files from the disk to prevent their unauthorized recovery.

Why not McAfee Total Protection 2008 While McAfee offers fairly good protection against viruses, the products itself is not protected against illegitimate attempts to disable it or to change its settings. Many viruses try to disable antivirus products when they execute for the first time. As this basically deprives the PC of any kind of protection, antivirus products should be capable of protecting their own files, processes and services. McAfee total security uses a lot more resources than BitDefender, which may translate into a visible slow-down of the PC. It does not have a gamer mode, so there is no system load reduction during games either. With its 64% proactive detection rate, BitDefender surpasses McAfee’s results (43%) in dealing with new and unknown viruses. The parental control module is not capable of limiting access either to the internet, during specific intervals, or to certain applications like games, file sharing programs, etc.

17

BitDefender Total Security 2008 | Comparative Analysis

Why not Microsoft Onecare v2 Microsoft Onecare only covers basic security needs. It does not include modules that are part of most all-in-one security products: parental control, antispam, tune-up. The virus shield does not filter either e-mail or web traffic, although it would allow blocking viruses even before they reach the hard disk, therefore reducing the risk of infections. The product is not protected against illegitimate attempts to disable it or to change the settings. Many viruses try to disable antivirus products when they execute for the first time. This basically renders the PC without any kind of protection so av products should have a self protection of their files, processes and services. The product’s firewall does not include Wi-fi management functions, although they would be useful for the protection of users connecting to open Wi-fi networks and for the issuing of warnings about attempts to connect to users’ own network. The firewall does not have a Stealth mode option either, so users’ computers can be easily detected on the net.

Why not Trend Micro Internet Security Pro 2008 The parental control module of this product is not capable of limiting access either to the internet, during specific intervals, or to certain applications like games, file sharing programs, etc It does not create backup copies of personal files and documents either, falling short of users’ expectations as to important data safeguarding. With its 64% proactive detection rate, BitDefender surpasses by far Trend Micro’s results (30%) in dealing with new and unknown viruses. The product does not offer the option to completely erase files and "traces" of files from the disk to prevent their unauthorized recovery. Finally, it does not provide the possibility of adapting settings to the specific needs of each of the persons who use the same computer.

Why not Kaspersky Internet Security 7.0 Kaspkersky Internet Security 7.0 only covers data security. Because it lacks a tune-up module, it does not allow improving PC operation through the removal of unnecessary files and registry entries. It does not create backup copies of personal files and documents either, falling short of users’ expectations as to important data safeguarding. The product’s firewall does not include Wi-fi management functions, although they would be useful for the protection of users connecting to open Wi-fi networks and for the issuing of warnings about attempts to connect to their own network. Kaspersky does not provide the possibility of adapting the product settings to the specific needs of each of the persons who use the same computer. Kaspersky does not have a gamer mode, so there is no system load reduction during games either.

18

BitDefender Total Security 2008 | Comparative Analysis

Why not F-Secure Internet Security 2008 F-Secure Internet Security is one of the very few tested products which lack antiphishing protection at browser level. Phishing attacks are attempts to trick users into giving away bank account information or other sensitive data by the use of “crafted” emails or web pages. This basically means that F-secure is unable to recognize and block such pages. F-secure Internet Security only covers data security. Because it lacks a tune-up module, it does not allow improving PC operation through the removal of unnecessary files and registry entries. It does not create backup copies of personal files and documents either, falling short of users’ expectations as to important data safeguarding. The product is not protected against illegitimate attempts to disable it or to change its settings. Many viruses try to disable antivirus products when they execute for the first time. As this basically deprives the PC of any kind of protection, antivirus products should be capable of protecting their own files, processes and services. The firewall is quite difficult to use as it lacks certain important features. It does not have any predefined network types (direct connection, LAN, etc.) which would make the setup phase much easier. Moreover, it does not even have a database of known applications in order for the users to be able to allow or block any programs attempting to connect to the Internet.

Why not Norton Internet Security 2008 Norton Internet Security only covers data security. Because it lacks a tune-up module, it does not allow improving PC operation through the removal of unnecessary files and registry entries. It does not create backup copies of personal files and documents either, falling short of users’ expectations as to important data safeguarding. The product’s parental control module is not capable of limiting access either to the internet, during specific intervals, or to certain applications like games, file sharing programs, etc. With its 64% proactive detection rate, BitDefender surpasses by far Norton’s results (38%) in dealing with new and unknown viruses. Norton Internet Security does not have a gamer mode, so there is no system load reduction during games either.

Why not Panda Internet Security 2008 The product’s parental control module is not capable of limiting access either to the internet, during specific intervals, or to certain applications like games, file sharing programs, etc. Panda Internet Security does not include a tune-up module so that it does not allow removing unnecessary files and registry entries to improve PC operation. Still on the subject of PC performance, it does not provide the possibility of completely erasing files and "traces" of files from the disk to prevent their unauthorized recovery.

19

BitDefender Total Security 2008 | Comparative Analysis

Panda Internet Security cannot adapt its settings to the specific needs of each of the persons who use the same computer. Panda uses a lot more resources than BitDefender, which may translate into a visible slow-down of the PC. It does not have a gamer mode either, although it would make the gaming experience smoother by reducing the load on system resources.

Why not Eset Smart Security v3 Eset Smart Security only covers basic security needs. It does not include modules that are part of most all-in-one security products: parental control, backup, tune-up. The firewall is, quite visibly, just a recent addition to Eset’s products. It does not have any predefined network types (direct connection, LAN, etc.), even though it would make the setup phase much easier. Moreover, users cannot assign different profiles to different networks, which may be very annoying if they switch networks often. The product is not protected against illegitimate attempts to disable it or to change its settings. Many viruses try to disable antivirus products when they execute for the first time. As this basically deprives the PC of any kind of protection, antivirus products should be capable of protecting their own files, processes and services. Eset Smart does not have a gamer mode, although it would make the gaming experience smoother by reducing the load on system resources.

Why not G Data Total Care 2008 G-data is one of the very few tested products which lack anti-phishing protection at browser level. Phishing attacks are attempts to trick users into giving away bank account information or other sensitive data by the use of “crafted” e-mails or web pages. This basically means that F-secure is unable to recognize and block such pages. The product is not protected against illegitimate attempts to disable it or to change its settings. Many viruses try to disable antivirus products when they execute for the first time. As this basically deprives the PC of any kind of protection, antivirus products should be capable of protecting their own files, processes and services. The product’s firewall does not include Wi-Fi management functions, although they would be useful for the protection of users connecting to open Wi-Fi networks and for the issuing of warnings about attempts to connect to their own network. G-Data uses a lot more resources than BitDefender, which may translate into a visible slow-down of the PC.

20

Related Documents