Helping CISOs Select Top-Performing Cybersecurity Solutions with Rigorous Advanced Threat Protection Testing Results for 2024
Advanced Threat Protection Test 2024 AV-Comparatives, a globally recognised independent organisation specialising in cybersecurity testing, is pleased to announce the results of its 2024 Advanced Threat Protection (ATP) Test for enterprise cybersecurity solutions. This comprehensive evaluation provides Chief Information Security Officers (CISOs) with critical insights into the efficacy of leading endpoint protection products against sophisticated, targeted cyber threats.
The ATP Test rigorously assesses each product’s ability to defend against advanced persistent threats (APTs), which are complex, multi-stage attacks aimed at specific organisations. By simulating real-world attack scenarios, the test offers an objective measure of how well security solutions can prevent breaches that could lead to significant financial and reputational damage.
The 2024 evaluation included the following enterprise security products:
Avast Ultimate Business Security 24.8
Bitdefender GravityZone Business Security Premium 7.9
CrowdStrike Falcon Pro 7.16
ESET PROTECT Entry with ESET PROTECT Cloud 11.1
Kaspersky Endpoint Security for Business – Select, with KSC 12.6
NetSecurity ThreatResponder 3.5
Each of these solutions demonstrated robust protection capabilities, successfully blocking a significant number of advanced attacks. Notably, all six products achieved AV-Comparatives’ prestigious ATP Enterprise Certification, underscoring their effectiveness in safeguarding enterprise environments against sophisticated threats.
For CISOs and decision-makers, these results serve as a valuable resource for selecting security solutions that align with their organization’s specific needs. The detailed findings offer a clear comparison of each product’s strengths, facilitating informed decisions to enhance organisational cybersecurity postures.
AV-Comparatives remains committed to providing transparent, scientifically rigorous evaluations of cybersecurity products. By delivering unbiased assessments, we empower organisations to make informed choices in an ever-evolving threat landscape.
Methodology
AV-Comparatives used five different Initial Access Phases, distributed among the 15 test cases, mapped to the MITRE ATT&CK Matrix (c)
Trusted Relationship: “Adversaries may breach or otherwise leverage organizations who have access to intended victims. Access through trusted third-party relationship exploits an existing connection that may not be protected or receives less scrutiny than standard mechanisms of gaining access to a network.”
Valid accounts: “Adversaries may steal the credentials of a specific user or service account using Credential Access techniques or capture credentials earlier in their reconnaissance process through social engineering.“
Replication Through Removable Media: “Adversaries may move onto systems … by copying malware to removable media … and renaming it to look like a legitimate file to trick users into executing it on a separate system.“
Phishing: Spearphishing Attachment: “Spearphishing attachment is … employs the use of malware attached to an email.”
Phishing: Spearphishing Link: “Spearphishing with a link … employs the use of links to download malware contained in email.“
Also Read: Fortinet Expands Global Presence with New Company-Owned Innovation Hub in Atlanta
Read also the latest Business Security Factsheet for August-September 2024, containing the results of the Business Malware Protection Test (September) and Business Real-World Protection Test (August-September). The full report, including the Performance Test and product reviews, will be released in December.
[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]