AV-TEST Identifies the 10 Best Security Products of 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next AV-TEST Identifies the 10 Best Security Products of 2014-2 Next

Best Protection – Consumer Users

The AV-TEST BEST PROTECTION 2014 AWARD recognizes the annual laureate in the category of protection against malware. The award in the field of consumer users went to the product Trend Micro Internet Security.

AV-TEST recently announced the winners of the AV-TEST AWARDs for 2014. These awards were presented to both consumer and corporate user products in five categories, including protection (protection function), performance (speed), usability (user-friendliness), Android security, and best repair.

All the award-winning products were put through continuous certification tests in 2014 at the laboratories of AV-TEST. The criteria for receiving the AV-TEST AWARD is the successful completion of all AV-TEST certifications in the year 2014 for consumer or corporate users and in the area of mobile devices. The certification procedures take place in two-month intervals. All the products are tested in terms of their performance in protecting against current malware threats. The analyses take place under simultaneous and realistic test conditions. The independently obtained results are measured against the current industry average for the sector and evaluated accordingly. An exception is the REPAIR AWARD. In a separate endurance test, the labs at AV-TEST determine which antivirus software solution and which clean-up tool is most effective at removal and repair after a malware attack.

Here are the top security products for 2014.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.