Friday, January 8, 2010

kaspersky internet security 2010 is a penetrating AV Real World Test


kaspersky internet security (KIS) in 2010 had graduated within test stated that done by AV-Test - a leading laboratory housed in a state of German states. based on the same test, KIS 2010 has successfully penetrated their Real World experiment. test which has been done includes 10 Internet security solution that is very popular from different providers different. each - each solution in a test of about 10 malware 'Zerro - day' new per 24 hours or malware that has just emerged or spread on the internet. test long until 60-day test period, and use the device consisting of 600 samples that have been active or that include sample exploit and malware distributed via email.

In these tests, KIS 2010 received the highest ratings in tests of the Real World, ranked second in the category 'malware detection (97.5%) and ranked third in the category' malware blocking (89.8%) and recorded very few false positive.

kaspersky achieved achievement is not without reason. "kaspersky Internet Security 2010 received outstanding results in tests of the Real World because it uses a unique synergy of technologies that effectively complement and enhance each other," said Nikita Shvetsov (Director of the Anti-Malware Research).


effectiveness of protection on offer in contrast to the 2 categories of malware detection and malware blocking. criteria are in use including the level of malware detection that is the extent to which destructive activities of malware can be blocked and flase positive number that has been recorded in the face of a collection of programs - programs that are dangerous it.

found a solution that has been offered in kaperskey has allowed to apply a complete range of protection for their technology, including URL filtering and application - the application of the blacklist, analysist behavioral and signature-based detection. but with that all that needs to remember that analyze the performance of an antivirus solution, there is only one protection technology already in use. examples of signature-based scanning (reactive protection) or proactive protection module.


Related Posts:

  • increase bandwidth up to 20% in this post I want to give Patrick a very telling and powerful in my opinion in raising the internet bandwidth. today many people are complaining to me because the internet connection he used often drop precipitously a… Read More
  • blogger widget: blogger support Haiti disaster relief a new widget for your very very important function because the widget is intended to help victims of earthquake disaster in American. This is now a blogger had made reforms in the labor system in the blogger buzz. because of… Read More
  • Google Dosc: air storage can be file-sharing and capacity 1 GB now we are very hard to find a place online data storage or hosting, even today, websites that provide hosting at a price, capacity, service variety - of once. but for the users of Google or all of you who have blogs that us… Read More
  • laptop into hotspot areas hotspot areas is a new network but has now mushroomed and Became very popular Indonesian Among netters. and now this lot are using laptops or mobile phones That already use Wi-Fi services as well. but this time I Will discu… Read More
  • Smadav 8.2 been skiing I am very grateful for all has been given by Allah SWT Health I'll tell you a little why some months I do not post, because I was busy with various things with school and my job that I need to do pile up. At this time I'… Read More

0 Komentar:

Post a Comment