Tag Archives: Panda Security

The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017

In order to help consumers get a better idea about the state of the market in cybersecurity, and in turn make the right decision when it comes to shielding their digital life, the independent laboratory AV-Comparatives regularly publishes the results of its “Real-World” Protection Test. Their latest edition, called the Whole Product Dynamic “Real-World” Protection Test, is especially relevant for having compiled results over a five-month span. In this edition, Panda Security received the maximum possible score, outperforming every one of the 20 other vendors that underwent testing.

In the words of AV-Comparatives: “In this test, all protection features of the product can be used to prevent infection” “This means that the test achieves the most realistic way of determining how well the security product protects the PC”. In fact, the methodology they used for this test has itself received numerous awards and recognitions.

Thanks to the innovative technologies that were developed in response to malwares rapid evolution over the last few years, Panda Security offers the most efficient defense against threats such as ransomware and has positioned itself as the strongest ally in prevention, protection, and response in the face of today’s attack trends.

The Test, in Detail

The Real-World Test is recognized by the industry for being the most complete and rigorous of the tests performed by AV-Comparatives, since it provides the most accurate reflection of the protection offered by antivirus solutions available on the market.

Each cybersecurity solution was subjected to a total of 1769 real-time tests between July and November, consisting, for example, in exposure to malicious URLs with drive-by exploits (malware attacks that take effect just by visiting the page) and URLs that linked directly to the malware.

The analysis focused on each software’s ability to “protect systems against infection by malicious files before, during, or after execution”, the authors explain. Observing the security systems in each of these stages gives a more holistic approach to the test, allowing assessors and users to better calibrate the overall effectiveness of security solutions.

In the malware protection test, Panda successfully blocked 100% of samples in the test bench, leading in efficiency and detection ratios, followed by Bitdefender, F-Secure, Tencent, and Trend Micro with 99.9%.

These good results, which have been consistently repeated in recent months, speak to the high protection ratios offered by Panda’s solutions.

Luis Corrons, Technical Director of PandaLabs, had this to say: “We are truly proud of the results that we earned. They are the fruit of years of labor, and seeing how we were able to outperform each and every one of our competitors is a huge reward that is dwarfed only by the greatest reward of all: protecting our clients as no one else is able to do.”

The post The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017 appeared first on Panda Security Mediacenter.

Read More

Computer Security Day 2017: The Current State of Cybersecurity

Thursday 30th November marks the 29th Computer Security Day – an unofficial “holiday” used to raise awareness of cybersecurity issues that affect us all. At the most basic level, people across the world are encouraged to take the opportunity to create new strong passwords.

The annual Computer Security Day is also a useful chance to assess wider cybersecurity implications, and how well industry and individuals are protecting themselves.

So, what is the current state of IT security?

Security is more complex than ever

Every day new devices are added to home networks, most of which also connect to the Internet. From smart heating thermostats to remote controlled blinds and games consoles, technology is becoming part of the very fabric of our homes. And if smart speakers like Amazon’s Alexa and Apple’s HomePod sell as well as expected this Christmas, the home network is going to become busier (and more complicated) than ever.

The only drawback to all these devices is that they increase the number of potential attack points for cybercriminals. In the past, hackers would only have the option of breaking into your home PC. But with so many network connected devices to choose from, hacking in has actually become easier.

Security is not being prioritised by manufacturers

In the rush to sell their products as quickly as possible, some manufacturers are cutting corners. The software powering these devices often contains bugs and security holes that can be used by hackers to gain access. Once connected to the device, they can then attack other more important devices, like your laptop or PC.

Where there are decent security provisions on the device, owners are making basic mistakes that place their network at risk. As always, poor passwords are the biggest problem, making the hacker’s job even easier. If you have network connected devices at home, use this Computer Security Day to update all of those passwords too.

We are getting better at cybersecurity

Networks may be more complex than ever, but our security options are also improving. Most home routers used to connect to the Internet now include firewall functions to keep hackers out for instance. And the tools used to detect and remove malware are also improving daily.

In fact, anti-malware is the last line of defence when it comes to protecting your personal data. If hackers do manage to break through defences and compromise network-connected devices like webcams and smart speakers, anti-malware will stop them accessing your computers where the really valuable personal information is held.

If you do nothing else this Computer Security Day, please take a few minutes to download and install a free copy of Panda Antivirus for your PC. You should also take the opportunity to protect your smartphone too – download a free copy of Panda Mobile Security today.

The post Computer Security Day 2017: The Current State of Cybersecurity appeared first on Panda Security Mediacenter.

Read More

Don’t Let Yourself Become the Next Equifax

Last month we wrote about the biggest hack of sensitive personal data in history. Equifax, the financial entity that manages data for more than 820 million consumers and more than 91 million businesses around the world, suffered a global attack by an organized group called the PastHole Hacking Team, affecting customer data not only from the United States, but also Canada and the United Kingdom.

Following the recent events, it has come to light that the massive hacking attack is not the only grievance that the company has suffered. As it turns out, there was also malware on the company’s website.

Ars Technica reports that a security analyst named Randy Abrams came to the site to check his credit information when he encountered a fake Adobe Flash installer, one of those pop-ups that abound on the internet and demand that you “click here”, only to redirect you to some malicious site full of internet junk.

The subsequent analysis revealed that the “promoted” malicious software is called Adware.Eorezo and is marked as malware by only three cybersecurity solutions in the world, including Panda Security, testament to the great effort that went into hiding the code so as to cause as much damage as possible.

Panda’s good performance against Adware.Eorezo coincides with the AV-Comparatives Business Security Report recognizing the Adaptive Defense 360 ​​smart cybersecurity solution. This platform would successfully prevent an organization from becoming the victim of an attack such as Equifax. In the words of the independent laboratory, “Panda Adaptive Defense 360 ​​is managed by a well-designed, clearly laid-out cloud-based console, which would be very straightforward for less-experienced administrators to use. This makes it particularly suitable for small businesses, while its EDR features will make it appealing to corporations. ”

Now, the question is, how did attackers manage to slip past the security barriers at Equifax, a site with troves of incredibly sensitive data? Things may have turned out differently with the right security solution. Only unlimited visibility and total real-time control of advanced threats can be effective in protecting the IT infrastructure.

The post Don’t Let Yourself Become the Next Equifax appeared first on Panda Security Mediacenter.

Read More

Debunking the Myths of the GDPR

The GDPR (General Data Protection Regulation) is a hot topic among experts in cybersecurity and privacy. For consumers, the GDPR will strengthen the protection of basic rights on the internet and give control of personal data back to the user. But what does this mean for companies?

As the date for its entry into force approaches, and having explained the most important changes the regulation will bring about, in this article we will have a look at some of the myths surrounding the GDPR.

Myth 1: “The GDPR only affects companies in the European Union”

This is far from being the truth. The GDPR rules will apply to all companies that offer goods or services to people from the EU, regardless of where their offices or servers are located. Therefore, the GDPR applies to all companies that process information from EU citizens, making this the first global data protection law. For example, if an EU citizen uses a US-based social network, makes an ecommerce transaction in Japan, or uses an Argentinian platform for vacation rentals, all those companies must comply with the GDPR.

Myth 2: “All security incidents must be reported within 72 hours”

This is one of the most widespread myths and has been accepted as a general rule, but there is some nuance to it. First, only personal data leaks need to be reported — it is not required in the case of security incidents or data breaches that do not involve personal data. This means that any breach that affects the confidentiality or integrity of personal information must be reported.

Moreover, the countdown for the 72 hour deadline does not start when the incident occurs, but rather when the company becomes aware that it has suffered a personal data breach. If for some reason it is not possible to report the breach to the authorities within this time period, the limit can be extended provided that the organization justifies the delay.

Myth 3: “All data must be encrypted in order to be in compliance with the GDPR”

This is false for several reasons. The GDPR requires that measures be implemented to provide an appropriate level of security, based on an assessment of the risk involved in any action that requires, for example, the processing or storage of personal data.

Although encryption is a recommended measure, it is not a must. Everything depends on the risks associated with not encrypting said personal data. Thus, in the case of sensitive data, such as patient medical information, the GDPR recommends encryption and other robust security measures, such as secure algorithms.

Panda Security Can Help Ease the Transition

These are just three of the myths shrouding a regulation that will mark a before and after in the protection of personal data. To help all types of companies adapt and comply with the GDPR, at Panda we have prepared the “Preparation Guide to the New European General Data Protection Regulation”. In this guide, we respond to major issues related to the GDPR: How does it affect my business? What obligations does this regulation bring about? What happens if I do not comply with these obligations?

With this whitepaper, and using tools included in our Adaptive Defense solution, Panda can help meet the requirements imposed by the new regulation. Although the law will not come into effect until 2018, it is vital to understand the implications of the GDPR and to implement a plan of action.

The post Debunking the Myths of the GDPR appeared first on Panda Security Mediacenter.

Read More

Building Resistant Companies

Ransomware is on the rise, and in recent years has become one of the biggest headaches for IT departments in both large and small organizations. With 90 million attacks worldwide in 2016, and more than 180 million attacks expected for 2017, the million-dollar question is: how do we face these attacks? At Panda Security and Deloitte EMEA, we have no doubt about the matter — corporations can protect themselves by building their resistance.

The right approach and continuous response capabilities

Our new aim is to face the challenge conjointly, both structurally and in terms of the methodologies used by Panda Security and Deloitte EMEA. Increasingly aware of traditional security solutions’ shortcomings, namely their inability to handle attacks that use advanced techniques, such as those that use non-malicious tools, we made the decision to be proactive and reinvent cybersecurity.

How will we do this? With an advanced solution based on situational analysis:

  • Attackers are now more efficient than ever before. While attackers are able to compromise systems in just minutes or hours, businesses often take months or even years to react.
  • They attack the endpoint because it is from there that they can access other targets, exfiltrate information, steal credentials, or deploy other attacks.
  • The lack of resources and competence at companies is evidences by the statistic that hardly 4% of security alerts are investigated.

And we will also be watching the challenges that our clients face:

  • The availability of ransomware-as-a-service
  • Negative economic and reputational side effects
  • Data and productivity loss
  • Data protection initiatives in light of the GDPR

The result? A cyberintelligence platform that categorizes and correlates all of the data obtained about cyberthreats to carry out Prevention, Deteciton, Response, and Remediation tasks, combined with attack area reduction services rendered by Adapted Defense.

Panda and Deloitte: an anti-ransomware alliance

Recent events have proven the strength of a security model that has the answers to client’s needs:

  • Deloitte EMEA, invulnerable to the latest security breaches: this past week, we’ve learned that unknown actors allegedly had access to Deloitte USA’s email for months, with no major setbacks. However, the European branch, protected by Adaptive Defense, was unaffected by the cyberattack.
  • The major ransomware attacks of the year: both the WannaCry ransomware, which affected more than 150 countries and carried with it losses reaching up to 4 billion dollars, and the subsequent Petya/GoldenEye attacks, never reached a single Adaptive Defense user who had lock mode activated.

Governments and large public and private companies are betting on this strategy, making Adaptive Defense the best-selling security solution in the history of Panda Security, with a global market share of over 22% in EDR solutions. Multinationals in all types of strategic sectors (financial, telecommunications, military, energy, etc.) rely on Panda Security to protect their systems with Adaptive Defense.

The post Building Resistant Companies appeared first on Panda Security Mediacenter.

Read More

Zeus is Still the Base of Many Current Trojans

In 2007, no one expected ZeuS to have such a brutal impact on the digital world. But two years later, Zbot, another of the names it is known by, became a milestone in the history of cybersecurity. With more than 3.6 million infected computers in 2009, ZeuS compromised more than 74,000 FTP accounts on such important networks as those of NASA, ABC, Oracle, Cisco, Amazon, and Bank of America. It also managed to steal and block information from the United States Department of Transportation, among other government agencies. Its impact was extreme, and the measures to combat it hard and complex. To this day, ZeuS is still posing a threat.

What is ZeuS and what does it do?

Zbot is a classic Trojan in many ways: its vector of infection usually goes through phishing methods or “drive-by download” techniques. Basically, the software, designed to infect Windows, was introduced to devices by voluntary but unintentional downloads, via infected pop-ups or email attachments. Once infected, the Trojan, according to its variant, acts in various ways. In general, ZeuS is famous for its use in the theft of credentials, passwords, and other sensitive information through different techniques: keylogging, form-grabbing, or even cryptolocking.

Among the vulnerabilities exploited by this Trojan are some failures in Microsoft ATL, different problems found in ActiveX controls, or vulnerabilities in functions controlled by JavaScript, among many others. At the time, Zbot was detected and identified in time to stop it in its tracks. However, this Trojan, supposedly created by Evgeniy Mikhailovich Bogachev, better known as “Slavik”, has been the source of a powerful toolkit that can be purchased on the black market. These tools offer various modules with which to design and create new malware.

The “Sons” of ZeuS

There are thousands of variants of Zbot. Some, like Gameover, or the slightly newer Atmos, have made their own place in the headlines. Sphinx, Floki Bot, and many more share in their core the same guidelines as ZeuS. However, they have managed to go unnoticed by many security measures. Gameover jeopardized a large section of the financial community, and Atmos, identified in 2015, targeted banks and the transactions they processed. The warning from experts is clear: ZeuS is still here, just going by new names and honing other “skills”. And it’s more dangerous than ever.

How can we protect ourselves?

The disastrous result of being infected with this Trojan (or rather its variants), can be mitigated or avoided. To do this, we must take several immediate precautions. In addition to using advanced cybersecurity tools capable of preventing this Trojan from reaching the corporate network, it is advisable to take into account other specific aspects:

  • Avoid autoplay with multimedia files, activate read-only mode, and avoid access between computers in the network if it is not essential.
  • When using the company network for collaborative work, it is recommended to use strict protection and password policies, limiting access and permissions.
  • Get rid of unnecessary services, taking special care to eliminate ancillary services.
  • Keeping all software up to date is also a sure way to reduce weaknesses.
  • If an infection is detected, isolate the device immediately
  • Eliminate other unnecessary connection paths, such as Bluetooth.
  • Configuring email to automatically block attachments that are typically vulnerable, such as .exe, .bat, .vbs, .pif or .scr, will close one more door to attacks.

With a little attention and training, ZeuS will become a minor and well-controlled threat.

The post Zeus is Still the Base of Many Current Trojans appeared first on Panda Security Mediacenter.

Read More

Zeus is Still the Base of Many Current Trojans

In 2007, no one expected ZeuS to have such a brutal impact on the digital world. But two years later, Zbot, another of the names it is known by, became a milestone in the history of cybersecurity. With more than 3.6 million infected computers in 2009, ZeuS compromised more than 74,000 FTP accounts on such important networks as those of NASA, ABC, Oracle, Cisco, Amazon, and Bank of America. It also managed to steal and block information from the United States Department of Transportation, among other government agencies. Its impact was extreme, and the measures to combat it hard and complex. To this day, ZeuS is still posing a threat.

What is ZeuS and what does it do?

Zbot is a classic Trojan in many ways: its vector of infection usually goes through phishing methods or “drive-by download” techniques. Basically, the software, designed to infect Windows, was introduced to devices by voluntary but unintentional downloads, via infected pop-ups or email attachments. Once infected, the Trojan, according to its variant, acts in various ways. In general, ZeuS is famous for its use in the theft of credentials, passwords, and other sensitive information through different techniques: keylogging, form-grabbing, or even cryptolocking.

Among the vulnerabilities exploited by this Trojan are some failures in Microsoft ATL, different problems found in ActiveX controls, or vulnerabilities in functions controlled by JavaScript, among many others. At the time, Zbot was detected and identified in time to stop it in its tracks. However, this Trojan, supposedly created by Evgeniy Mikhailovich Bogachev, better known as “Slavik”, has been the source of a powerful toolkit that can be purchased on the black market. These tools offer various modules with which to design and create new malware.

The “Sons” of ZeuS

There are thousands of variants of Zbot. Some, like Gameover, or the slightly newer Atmos, have made their own place in the headlines. Sphinx, Floki Bot, and many more share in their core the same guidelines as ZeuS. However, they have managed to go unnoticed by many security measures. Gameover jeopardized a large section of the financial community, and Atmos, identified in 2015, targeted banks and the transactions they processed. The warning from experts is clear: ZeuS is still here, just going by new names and honing other “skills”. And it’s more dangerous than ever.

How can we protect ourselves?

The disastrous result of being infected with this Trojan (or rather its variants), can be mitigated or avoided. To do this, we must take several immediate precautions. In addition to using advanced cybersecurity tools capable of preventing this Trojan from reaching the corporate network, it is advisable to take into account other specific aspects:

  • Avoid autoplay with multimedia files, activate read-only mode, and avoid access between computers in the network if it is not essential.
  • When using the company network for collaborative work, it is recommended to use strict protection and password policies, limiting access and permissions.
  • Get rid of unnecessary services, taking special care to eliminate ancillary services.
  • Keeping all software up to date is also a sure way to reduce weaknesses.
  • If an infection is detected, isolate the device immediately
  • Eliminate other unnecessary connection paths, such as Bluetooth.
  • Configuring email to automatically block attachments that are typically vulnerable, such as .exe, .bat, .vbs, .pif or .scr, will close one more door to attacks.

With a little attention and training, ZeuS will become a minor and well-controlled threat.

The post Zeus is Still the Base of Many Current Trojans appeared first on Panda Security Mediacenter.

Read More

Panda Security, leader in Gartner’s Peer Insights program

panda-adaptive-defense

We’ve been warning for some time now that traditional antivirus solutions are no longer effective against the newer threats. Targeted and zero-day attacks, as well as the dreaded malwareless threats, are a growing concern for businesses. And not only that, we have also emphasized time and again the importance of preventing the losses and reputational damage stemming from cyber-threats, and how the new protection model leveraged by Panda Adaptive Defense and Adaptive Defense 360 can help companies reinforce their IT security posture by classifying and monitoring all processes running on their network. Panda’s new security approach provides complete endpoint visibility and allows organizations to block security attacks and respond to them immediately, implementing more robust security measures to prevent further incidents. This is not just our opinion but the opinion of our customers as well, as shown by the fact that 96 percent of participants in IT software and services review platform Gartner Peer Insights are recommending Panda’s advanced cyber-security solutions to other companies.

But, what is Gartner Peer Insights?

Peer Insights is an online platform of ratings and reviews of IT software and services. The reviews are written and read by IT professionals and technology decision-makers like you.

The goal is to help IT leaders make more insightful purchase decisions and help technology providers improve their products by receiving objective unbiased feedback from their customers.

“A product taht is great on visibility and proactive protection even againts direct attack. During the POC and Implementation, everything was easy. Even until now, the support is excellent.” – IT Assistant Manager in the Education Industry.

In this regard, Adaptive Defense, Panda Security’s Endpoint Detection and Response (EDR) solution, is the best rated software and receives 28 percent of all reviews submitted by participants. The best-rated features of Panda’s software include its detection, attack containment, remediation and investigation capabilities.   Additionally, Adaptive Defense’s 100% Attestation Service and the fact that it is cloud-based provide great value for its total cost of ownership, allowing customers to save time and money.

Outstanding capabilities to detect attacks and malware that we never though could escape. This tool does everything we need it to do,and as long as it continues to help us save time, I will continue recommending it.- Responsible For Systems in the Government Industry. 

Panda’s EPP technologies, represented by Panda Endpoint Protection, are also highly rated in the reviews. The fact that the solution can be managed from a single, central Web-based console at any time, from anywhere, is highly praised by IT security professionals,

Companies of all sizes and industries say they have become more resilient to cyber-attacks and give Panda a 4.7 out of 5 overall rating, outscoring all other security vendors.

I’d like to participate in the program, but who can write a review?

Reviews must be completed by people working with Panda Endpoint Protection or Panda Adaptive Defense/Adaptive Defense 360 on a daily basis, or people involved in the purchasing decision.

Panda Adaptive Defense delivers on its commitment to provide complete, integrated protection to users, and is at the forefront of advanced cyber-security solutions. It’s not just us who say so.Are you using Panda Endpoint Protection, Panda Adaptive Defense or Panda Adaptive Defense 360 in your organization? Would you like to share your experience with your peers? Click here to access Gartner’s Peer Insights platform and share your cyber-security experience.

The post Panda Security, leader in Gartner’s Peer Insights program appeared first on Panda Security Mediacenter.

Read More

Panda Security and Deloitte Sign a Cyber Alliance against Advanced Threats

Even with security technology in place, companies know that it is not possible to prevent all cyberattacks. At any rate, however, the damages caused by attacks can be greatly mitigated with quick and decisive action in response to threats. The answer is to use a cybersecurity solution capable of monitoring, uninterruptedly, all applications in order to block known malware and detect other advanced and unknown malware.

With this goal in mind, Panda Security is signing a strategic Cyber Alliance with Deloitte to cover clients in Europe, the Middle East, Africa, and Latin America with global protection against advanced cyberthreats thanks to the Panda Adaptive Defense suite.

For further details of the Cyber Alliance, you can download the brochure here.

An alliance in the name of cybersecurity

This alliance between Panda Security and Deloitte will create an integrated security ecosystem that will maximize clients’ investment in their cybersecurity infrastructure. Deloitte’s offices in Spain will use the smart technology of Panda Adaptive Defense on 8,000 endpoints.

Traditional security solutions, while effective in protecting against known malware, are not capable of dealing with attacks where non-malicious tools and other advanced techniques are used. Only a solution like Adaptive Defense, which combines EDR (Endpoint Detection & Response) technology with monitoring and categorization of 100% of running processes, lowers the possibility of being attacked by advanced malware to zero.

“The agreement between Panda Security and Deloitte will provide our clients with the perfect combination of cybersecurity solutions and services to keep them protected from the rise of advanced cyberthreats,” said Juan Santamaría, General Manager of Panda Security, in a statement. “This cooperation will allow Deloitte’s most advanced security services to benefit from the smart cybersecurity technologies of Panda Security.”

With this agreement, Deloitte has gone one step further to become the leading global provider of advanced cybersecurity services for corporations. The collaboration allows the firm, which already has a team of over 1,200 IT security professionals in 20 EMEA countries, to combine functional business knowledge with a managed cybersecurity service like Adaptive Defense. Thanks to machine learning, Deloitte and its customers will be able to reduce to zero their possibility of becoming victims of a cyberthreat.

“This collaboration highlights the central role that these two companies play in the cybersecurity market, and specifically in the protection of digital infrastructures and the corporate network,” according to César Martin, Managing Partner in charge of Cyber Risk Advisory at Deloitte. “It will offer efficient protection against known and unknown threats to all clients in the Deloitte network and the EMEA region.”

Market recognition

The market, independent analysts, and customers already attest to the evolution from a traditional security model to the contextual intelligence offered by Panda Security. Deloitte, the leading cybersecurity consultancy, will provide advanced cybersecurity solutions to the corporate market with Panda bringing intelligent endpoint security technology to the table.

The post Panda Security and Deloitte Sign a Cyber Alliance against Advanced Threats appeared first on Panda Security Mediacenter.

Read More

Panda Security Achieves Highest Level of Protection in AV-Comparatives’ First Semester Report

The technologic efficiency of Panda Security’s solutions has once again earned top marks from the independent testing laboratory AV-Comparatives, in their first comprehensive evaluation of the year. The Spanish cybersecurity firm finds itself at the top of the heap with other world-class security solutions, having been placed in the highest certification tier, Advanced+, in this new edition of the Real-World Protection Test.

 

The 21 leading cybersecurity firms in the world included in the test have undergone, on an individual basis, a total of 1995 tests in the period from February to June 2017.

Testing in a real-world environment

Just as the nature of threats changes, evaluating solutions designed to counter these threats also changes. Techniques such as social engineering play a key role. Malware is increasingly focused on users — for example, tricking them into visiting infected web pages, installing malicious software, or opening emails with infected attachments. The perimeter is where the user is, so keeping it protected is probably the biggest challenge for security barriers. Also to be taken into consideration is the use of exploits as an infection vector, a method which remains extremely popular, as we saw with WannaCry. Because of this, AV-Comparatives focuses on using the same attacks that users face in the real world in order to evaluate the effectiveness of security solutions, so that users can then make an informed decision about who they’re going to trust to protect their most precious data.

It’s just as important for solutions to protect users from malicious programs as it is for them to correctly detect innocent programs. A solution that blocks good software from running could hinder the normal workflow of users’ computers. Obviously, the consequences are not quite as serious if a file from an unknown program is blocked erroneously, as opposed to a tremendously popular one. They solve this issue in the test by classifying programs according to their prevalence: “very low”, “low”, “medium”, and “high”. Solutions that fail in this section due to the number and severity of false positives given are automatically downgraded.

In this rigorous and dynamic testing environment, Panda Security’s solution achieved a 99.8% protection rate. “We are truly proud of Panda’s results in these tests, as we are harvesting the fruits of a years-long labor to create the most advanced protection technologies in the world,” commented Luis Corrons, Technical Director of PandaLabs. “Having a good detection rate for malware is very simple if you detect everything that moves, as Trend Micro does for example, which was downgraded because of the huge amount of false positives it turned out.”

“The same thing can be said,” continued Corrons, “if your solution achieves a low ratio of false positives: it’s as simple as not detecting anything at all. Only one of the solutions had 0 false positives — Adaware — but it is also the one that had the highest failure rate when it came to detecting malware.”

“If you somehow manage to have a lot of false positives and at the same time detect very little malware ­— as was the case with Microsoft, McAfee, and Symantec — that’s a different story altogether.”

“The trick is to find a balance. Out of the 21 tested solutions, only 4 gave no false positives within the low, medium or high range: Adaware, ESET, Kaspersky, and Panda. And the solution that detected the most malware was Panda, which places us at the forefront of global security solutions. ”

These favorable results, which Panda has been consistently getting over the past months, demonstrate once again the high security standards offered by Panda’s solutions.

The post Panda Security Achieves Highest Level of Protection in AV-Comparatives’ First Semester Report appeared first on Panda Security Mediacenter.

Read More