Skip to content

Competitive Benchmarks

Accurate benchmarking of security solutions is critical to users’ decision making. Today, many third-party tests show composite scores that do not allow the user to identify where in the kill chain the protection is provided. As such, Trend Micro has been advocating for a more detailed approach to testing in the industry, that is, to break out the different layers of these tests and thereby identify effectiveness at each layer.

Diagram Competitive-benchmarks

Why exposure layer matters

A single malicious server may serve up an infinite number of malicious files during its lifetime. As such, blocking the source of infection is a far better option than waiting to identify each file served up by the server at the endpoint. Blocking the source of the infection using IP, Domain and Web Reputation technologies benefits the user in a number of ways:

  • Malicious files served up by the infection source are blocked
  • Files are not downloaded to the device, thereby preserving bandwidth
  • Files are not scanned on the device, thereby preserving computing resources
     

To see the difference among industry competitors, we look at results published by independent testing lab, Veszprog for 1H 2013. Among the battery of tests Veszprog performs are endpoint exposure and infection layer tests.

Graph-maliciousurl-blocking-1h-13-131121 Graph-maliciousurl-end-to-end-1h-13-131121
Figure 1
Figure 2

 

Figure 1: Trend Micro blocks 72% of the threats at their source–the URL–whereas our competitors only block on average 26% of the threats. This demonstrates that instead of blocking the malware at its source, these competitors rely on on-device scanning techniques (signature, heuristics, behavior scanning) to identify most threats.

Figure 2: The end-to-end test shows how detection rates increase beyond the exposure layer. Trend Micro increased detection 8% beyond that of the exposure layer, for a total end-to-end of score of 80%, versus an industry average of nearly 72%.

Trend Micro’s proactive defense at the exposure layer is essential to effectively protecting customers from new threats as well as minimizing the impact on their computing resources.

 

Graph-phishing-url-1h-13-131126

Figure 3

 

Figure 3: Veszprog also tests blocking of phishing-based URLs, which have become standard in Blackhole Exploit Kit attacks. Trend Micro leads the industry by over 30% in this area.

Customers need to know not just how a security solution works, but also how well it works. When put through the rigors of real-world testing, Trend Micro's products regularly outperform its competitors'.

Trend Micro OfficeScan recently ranked top in two protection tests by AV-Test, an IT research lab that certifies endpoint security solutions. Below are the results compared with all vendor averages, published in AV-Test's November-December 2013 report. Download the Trend Micro report here.

Graph-widespread-malware-protection Graph-zero-day-protection


Source: AVTest.org

Trend Micro also consistently ranks ahead of the pack against 20+ other security vendors in AV-Comparatives' “Whole Product Dynamic Real World Protection Test.” The 2013 results below show the averages for Trend Micro Titanium against all vendors and Microsoft, which they use as a baseline.

   

Source: AV-Comparatives.org

 

Recently, NSS Labs released its 2014 Consumer Endpoint Protection Test results for Socially Engineered Malware and Titanium 2014 again ranked #1 in overall protection. Download the report here.

In 2013, NSS Labs tested consumer products for their ability to detect phishing sites. Again, Trend Micro Titanium was top in its class but also top in the lab's Time-to-Protect results, illustrating Trend Micro's ability to collect and assess threat samples and protect our customers faster than our competitors. The below chart encompasses both results.

  Graph-nss-block-combined  

Source: NSS Labs

Download the phishing report here.

For four consecutive quarters, Trend Micro messaging and mail server security has ranked first in Opus One anti-spam tests against eight leading security vendors including Barracuda Networks, Cisco, Google, McAfee, Microsoft, Proofpoint, Sophos, and Symantec (Figure 1).

Opus One’s methodology relies on actual corporate mail streams, manually analyzed for threats, providing significant real-world results, unlike results obtained through automated tests based on artificial mail streams.

Diagram Opusone-antispamresults

 Figure 1: Trend Micro email security consistently leads the industry

 

Diagram Opusoneantispamtesting-q1-13

Figure 2: Trend Micro has the highest in spam catch rate, outscoring 8 other competitors

Source: Opus One

The smartphone has become a universal tool valued for its productivity and fun factor but hated for the problems it can bring. Malware targeting Google's Android platform increased over 1,000,000 apps in just one year, and the number of malicious and high-risk Android apps is expected to reach at least three million by the end of 2014.

In AV-Test's January 2014 benchmarking of 30 mobile security solutions, Trend Micro Mobile Security for Android excelled. Trend Micro Mobile Security rated high in protecting against both Android malware and potentially unwanted programs versus the average of all vendors in the test.

 

AV-Test January 2014 - Malicious Apps    AV-Test January 2014 - Unwanted Apps


Doing well in one test is not enough today, consistently good results over time is the true measure of the strength of a solution. Below are the average results from the past two tests performed by AV-Test for Trend Micro and all vendors who participated.


AV-Test November 2013 - January 2014 - Malicious Apps Average    AV-Test November 2013 - January 2014 - Unwanted Apps Average

Source: AV-test.org


Connect with us on