AV-TEST Identifies the 10 Best Security Products of 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next AV-TEST Identifies the 10 Best Security Products of 2014-8 Next

Best Android Security

The AV-TEST BEST ANDROID SECURITY PRODUCT 2014 AWARD recognizes the safest product for mobile devices. The 2014 award went to two apps due to a tie vote: Qihoo 360 Mobile Security and Cheetah Mobile Clean Master.

AV-TEST recently announced the winners of the AV-TEST AWARDs for 2014. These awards were presented to both consumer and corporate user products in five categories, including protection (protection function), performance (speed), usability (user-friendliness), Android security, and best repair.

All the award-winning products were put through continuous certification tests in 2014 at the laboratories of AV-TEST. The criteria for receiving the AV-TEST AWARD is the successful completion of all AV-TEST certifications in the year 2014 for consumer or corporate users and in the area of mobile devices. The certification procedures take place in two-month intervals. All the products are tested in terms of their performance in protecting against current malware threats. The analyses take place under simultaneous and realistic test conditions. The independently obtained results are measured against the current industry average for the sector and evaluated accordingly. An exception is the REPAIR AWARD. In a separate endurance test, the labs at AV-TEST determine which antivirus software solution and which clean-up tool is most effective at removal and repair after a malware attack.

Here are the top security products for 2014.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.