Matousec RETEST !! COMODO & Online Armor DO NOT pass 100% !!

Discussion in 'other firewalls' started by Happy-Dude, May 17, 2008.

Thread Status:
Not open for further replies.
  1. alex_s

    alex_s Registered Member

    Joined:
    Aug 13, 2007
    Posts:
    1,251
    I'm not marketing guru, but it seems quite obviouse for me that a big vendor with a big income and brand name can afford itself much more independent marketing strategy. Small vendor without brand-name is very dependent on everything public. Otherwise it risks to end up with a very good, but known to nobody product that will never cover expences. BTW, I do not think that Kaspersky lab is too dependent on their KIS. I think their main income is KAV, well know and still well rated antivirus.
     
  2. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
    Hi all,

    I fully understand the ironic comments of the wilders members.

    For classical HIPS and FireWall's it makes sense to combine their functionality. The most user intrusive part of both: is application control. This application centric control (including whitelists) is the rational behind this trend. To differentiate FireWalla with these features, testing had to be pushed further. It is just a pity it has taken a ridiculeous direction.

    The test pictures FireWall concentrating on their core task as inferior quality products. PC users may have other approaches in obtaining those goals.

    For instance
    - On Vista, use VistaFireWall control for outbound control and ThreatFire to deal with intrusions
    - on XP, use Sunbelt Kerio FW (with a nice NIDS and easy image execution control when checking behavior control, but automaticcally allowing startup) and ThreatFire

    Above setups are 10 times easier than the 10+ numbero uno ranked Comodo, but I bet you loose only little security with this immense gain of user friendliness and simplicity.

    Regards Kees
     
    Last edited: May 19, 2008
  3. Joliet Jake

    Joliet Jake Registered Member

    Joined:
    Mar 1, 2005
    Posts:
    911
    Location:
    Scotland
    Firewall vendors should get together and agree a single course of action with regards to online tests where they're required to pay for retests.

    The business model of Matousec is plainly obvious, scare the pants off vendors by pitting one against the other and releasing a bright and shiny league table every few weeks which results in vendors rushing out their latest 'fix'.

    The biggest beneficiary here is matousec imo.

    If vendors agreed to stop dancing to his tune and instead develop their product in a mature fashion I don't believe anyone's security will be compromised.
     
  4. Saraceno

    Saraceno Registered Member

    Joined:
    Mar 24, 2008
    Posts:
    2,404
    Hopefully Online Armor and others will read your post a few times over. These 'hypothetical' one-in-a-million chance of infection tests are getting out of hand.

    The only thing leaking is the firewall vendors' pockets.
     
    Last edited by a moderator: May 21, 2008
  5. Einsturzende

    Einsturzende Registered Member

    Joined:
    Apr 14, 2008
    Posts:
    390
    Location:
    neubauten
    Optimistic question ;) :
    Why not adding better keylogger detection in free version?

    It is confusing now, some keyloggers can be detected and some not, someone will thinking OA free have poor keylog detection implementation.
    Half solutions are always bad...
     
  6. Saraceno

    Saraceno Registered Member

    Joined:
    Mar 24, 2008
    Posts:
    2,404
    Mike's working hard, he's gotta put 'food on your family'.

    You can't get all the features for free. ;)
     
  7. Dwarden

    Dwarden Registered Member

    Joined:
    Apr 11, 2003
    Posts:
    176
    Location:
    Czech Republic
    Matousec should (or more like MUST) add new simple test to Level 1:

    When firewall supports SNORT/advanced SNORT rules it PASSED and if NOT it FAILED ...

    deadly serious about this...
    no mercy with vendors ignoring it :)
     
  8. FatalChaos

    FatalChaos Registered Member

    Joined:
    Aug 6, 2005
    Posts:
    98
    I just noticed that for outpost 2008, perfudp and perftcp are listed as N/A, as they are for some other firewalls. Anyone wanna shed any light on this one? Is it just not possible to test the performance level of some firewalls?
     
  9. ggf31416

    ggf31416 Registered Member

    Joined:
    Aug 20, 2006
    Posts:
    314
    Location:
    Uruguay
    The products with score /62 were not retested yet.
     
  10. Einsturzende

    Einsturzende Registered Member

    Joined:
    Apr 14, 2008
    Posts:
    390
    Location:
    neubauten
    Matousec already tested imaginary build, Agnitum needs time to send him another imaginary version of Outpost which will pass all those keylogg tests, WE DON'T KNOW YET HOW GOOD OR BAD IS OUTPOST (according to Matousec testing)
     
  11. Einsturzende

    Einsturzende Registered Member

    Joined:
    Apr 14, 2008
    Posts:
    390
    Location:
    neubauten
    Yes, you can get but not from him, anyway that is not my point at all, my point is give us free keylogg protection or remove all keylogg protection from free version, half protection is good for nothing...
     
  12. Fuzzfas

    Fuzzfas Registered Member

    Joined:
    Jun 24, 2007
    Posts:
    2,753
    No test here, but i will take my crystal ball and say that Outpost will score over 90% at least in the PerfTCP test. I am trying the firewall now and i feel the connections quick. Everything seems very responsive. If i am proven to be correct by Matousec, i will think of opening the "Fuzzfas feel-the-network test". :D
     
  13. dmenace

    dmenace Registered Member

    Joined:
    Nov 29, 2006
    Posts:
    275
    I can see why people dislike the leaktest concept...

    BUT... without leaktests any discussion about firewall performance will be extremely boring, bland and too technical.

    Since inbound protection is usually carried out by a SPI NAT router (yes I know there are exceptions)

    Outbound protection is a much more relevent aspect to test. If malware manages to sneak into your pc, you would still want to stop it from connecting to net and send private info.

    IMHO, firewalls were the earliest form of HIPS / 0-day protect software in the respect that they would detect outbound connections by unknown software - a very suspicious action most malware does.

    ~~~

    On another note:

    Comodo 3 (in matousecs latest testing) still fails SSS? I thought that was fixed a while ago. o_O

    Cheers,
    Denis.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.