MRG Effitas 360 Assessment & Certification – Q4 2019

Discussion in 'other anti-virus software' started by waking, Feb 9, 2020.

  1. waking

    waking Registered Member

    Joined:
    Jan 25, 2016
    Posts:
    176
    MRG Effitas 360 Assessment & Certification – Q4 2019
    https://www.mrg-effitas.com/wp-content/uploads/2020/01/MRG_Effitas_2019Q4_360.pdf
     
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,546
    Location:
    The Netherlands
    Once again major players like Win Def, Avira, F-Secure and CrowdStrike failed to block a lot of the Exploit/Fileless malware samples. Perhaps itman can shed some light on this.
     
  3. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,592
    Location:
    U.S.A.
    Appears the report Level classifications are screwed up. For example, WD missed Adware/PUA and Fileless/Eploit malware samples and was still certified at Level 1. Eset on the hand didn't miss any and was only certified at Level 2.
     
  4. Gein

    Gein Registered Member

    Joined:
    Dec 8, 2013
    Posts:
    219
    Yeah that's very odd.

    I'm also wondering what the difference between auto block and signature block means on the exploit test. Wouldn't a signature block be an auto block?
     
  5. Romagnolo1973

    Romagnolo1973 Registered Member

    Joined:
    Feb 17, 2009
    Posts:
    565
    Location:
    Italy - Ravenna
    Performance test is complitly different to other tests, here windows defender is the best, kaspersky the worst. But they have to change metodology because Defender without fingerprint tecnology use a lot of disk while file transfert or opened and this impact performance and usability more than other actions.
     
  6. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,592
    Location:
    U.S.A.
    One possibility is Eset detected one sample within the 24 hour re-scan interval. I do know that MRG penalizes for that although they consider it a detection overall. Appears the penalty is a bit heavy. Especially in light of the WD fileless/exploit malware misses.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.