AVIRA | MANAGED EMAIL SECURITY - V1.0 | Business Security Review 2014 - AV

Business Security Review 2014 - AV
Introduction and Software version reviewed
 Overview of the manufacturer’s business products, and details of the product reviewed
 Main product version number of each of the components used
Supported operating systems
 Microsoft Windows operating systems supported
 Non-Windows systems supported, such as Apple and Linux (although these are not reviewed)
Additional features
 We list any features over and above what might be expected from an antivirus program, for
example backup, firewall, vulnerability scanner
Documentation
 An overall view of the product’s manual, and in particular whether it provides suitable
instructions for installing the console and deploying client software
 Local help and online knowledge base, if available
Preparing server and clients for deployment
 Any configuration of the clients and server before the endpoint protection software can be
installed, e.g. opening firewall ports, enabling file sharing, or disabling User Account Control
Deploying the software2
 Installation of the console (if applicable)
 Deploying endpoint protection software to client PCs and file server, using what we regard as
the easiest method for each product
Management console
 Description of layout and features
Monitoring the network
 How to see overall status of protection, including state of real-time protection and updates
 How to correct any errors in the protection status, e.g. run an update
 Reporting of malware found
 Program version installed
 Licensing information
Managing the network
 Running one-off scans
 Setting up a scheduled scan
 Running updates
Client antivirus software3
 Registration in Windows Action Center
 System Tray icon
 Is Windows Defender disabled under Windows 7, Windows 8?
 Can the user run updates and scans?
 Is there a status display which shows the local user if all is well?
 If an alert is shown that protection is disabled, how can the user re-enable it?
 What sort of alert, if any, is shown when the EICAR test file is downloaded?
Server antivirus software
 A brief overview of the server antivirus software, in the event that this is significantly
different from the client endpoint protection program










AVIRA Endpoint Security 14.06
Bitdefender Endpoint Security 5.3
ESET Endpoint Security 5.0
F-Secure PSB Workstation Security 10.10
G DATA AntiVirus Business 13.0
Ikarus security.manager 4.2
Kaspersky Small Office Security 13.0
McAfee Endpoint Security 10.0
Sophos Endpoint Security and Control Cloud 10.3
Symantec Endpoint Protection Small Business Edition 12.1
Self-managed
Client-integrated console
Cloud-based console
Server-based console
Avira Endpoint Security
Introduction
Software version reviewed
Supported operating systems
Documentation
Preparing server and clients for deployment
Deploying the software
Management Console
Monitoring the network
Managing the network
Client antivirus software
Server antivirus software
Summary
Bitdefender Small Office Security (cloud)
Introduction
Software version reviewed
Supported operating systems
Additional features
Documentation
Preparing server and clients for deployment
Deploying the software
Management Console
Monitoring the network
Managing the network
Client antivirus software
Server antivirus software
Summary
ESET Endpoint Security
Introduction
Software version reviewed
Supported operating systems
Additional features
Documentation
Preparing server and clients for deployment
Deploying the software
Management console
Monitoring the network
Managing the network
Client antivirus software
Server antivirus software
Summary
F-Secure Protection Service for Business
Introduction
Software version reviewed
Supported operating systems
Additional features
Documentation
Preparing server and clients for deployment
Deploying the software
Management Console
Monitoring the network
Managing the network
Client antivirus software
Server antivirus software
Summary
G Data Antivirus Business
Introduction
Software version reviewed
System requirements
Additional features
Documentation
Preparing server and clients for deployment
Deploying the software
Management Console
Monitoring the network
Managing the network
Client antivirus software
Server antivirus software
Summary
IKARUS security.manager
Introduction
Software version reviewed
Supported operating systems
Documentation
Preparing server and clients for deployment
Deploying the software
Management Console
Monitoring the network
Managing the network
Monitoring and management using replica of client window
Client antivirus software
Server antivirus software
Summary
Kaspersky Small Office Security
Introduction
Software version reviewed
Supported operating systems
Additional features
Documentation
Preparing server and clients for deployment
Deploying the software
Management Console
Monitoring the network
Managing the network
Client antivirus software
Server antivirus software
Summary
McAfee Endpoint Security (Self-Managed Option)
Introduction
Software version reviewed
Supported Operating Systems
Documentation
Preparing server and clients for deployment
Deploying the software
Program interface
Summary
Sophos Endpoint Security and Control with Sophos Cloud
Introduction
Software version reviewed
Supported operating systems
Additional features
Protection; HIPS; Web Security; Device Control; Web Control (Filtering); Active Directory Sync;
Mobil device management (optional)
Documentation
Preparing server and clients for deployment
Deploying the software
Management Console
Monitoring the network
Managing the network
Client antivirus software
Server antivirus software
Summary
Symantec Endpoint Protection Small Business Edition
Introduction
Supported Operating Systems
Additional features
Documentation
Preparing server and clients for deployment
Deploying the software
Management Console
Monitoring the network
Managing the network
Client antivirus software
Server antivirus software
Summary
Feature list
AVIRA
Bitdefender
ESET
Avira Endpoint Security
Small office Security (Cloud) by
Bitdefender
ESET Endpoint Security
F-Secure
G DATA
Ikarus
G DATA Small Business Security
ÌKARUS anti.virus
Kaspersky Lab
McAfee
Sophos
Symantec
Recommended product for:
up to 5 Clients, Server
up to 25 Clients and 1 Fileserver
Avira Small Business Security
Suite
up to 25 Clients and Fileserver and Messaging Server
Avira Business Security Suite
more than 25 Clients, more than 1 Fileserver, more than 1 Messaging server
ESET Small Business
Security Pack 20
F-Secure Client Security & Email
& Server Security
G DATA Endpoint Protection
Business
G DATA Endpoint Protection
Business + MailSecurity +
ClientBackup
IKARUS security.manager
unlimited
Small office Security (Cloud) by
Bitdefender + Bitdefender
Security for Exchange
ESET Business Solutions
unlimited
unlimited
unlimited
unlimited
|
|
|
Sophos Endpoint Protection Business
Kaspersky Small Office Security
McAfee Small Business Security
Kaspersky Endpoint Security for
Business + Kaspersky Security for
Mail Server
McAfee Endpoint Protection
Advanced
unlimited
300,000
Symantec Endpoint Protection
Small Business Edition
Sophos Endpoint Protection Advanced
Symantec Endpoint Protection
Features Management Server
What is the maximum number of clients overall?
2,000
25,000
800,000
Master-Slave-Server
Multiple AV Servers
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Does the product include a mechanism that allows the administrator to push the software to the clients?
|
|
|
|
|
|
|
|
|
|
Does the product include a mechanism that allows the end user to download and install the software?
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Master server controls slave server in different offices
Slave server for distributing updates
Client Installation
Which client deployment methods does the product support?
General Capabilities
Does the product allow administrators to assign different policies to different groups of computers
(regardless of the person logged in)?
Does the product support static groups (i.e. user or computer are assigned manually to a group or are
imported from a third party system)?
Group Import & Synchronisation
Can changes in Active Directory be synchronized?
|
|
Can computers/users be imported from other LDAP server?
Can computers be imported by a GUI
|
|
|
|
|
|
Can different actions be defined based on the malware category?
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Microsoft Exchange
Exchange 2007 / 2010 / 2013
|
|
|
|
Network shares
|
Can a user or administrator scan network shares after entering a password?
Email Messages
Microsoft Outlook
Lotus Notes
Thunderbird
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Webcam
Printers, CD/DVD, modems,
multifunctional devices, external
network adapters, wi-fi,
Bluetooth devices
|
|
Archives
ZIP/RAR/ARJ & archived installers
Conditions
Remediation
Does the product provide remediation capabilities?
General capabilities
Firewall Rules
Does the product come with default policies for workstations?
Does the product come with default policies for server?
Client Management
Client User Interface
Can the administrator limit or control configuration changes by the end-user?
Can different policies be applied for different computers?
Depending on the location of the device (i.e. Office, Hotel, Home, etc)
Depending on group membership of the computer
Depending on group membership of the user (i.e. administrator vs. normal user)
|
|
|
|
|
|
|
|
|
|
|
Administrator Management
Rights / Access Control
Does the product support multiple administrators and different access levels?
|
|
Device Control
Does the product allow administrators to limit the use of external devices (USB sticks, printers, etc)?
Can you lock
|
DVD / USB / external media
Floppy
All ports and all removable media
can be locked, but it's possible to
add exceptions for any individual
ports or media
other
Any PnP devices
Firewire, Bluetooth, PCMCIA
Failover
What if the AV Server (local) hangs up
automatic switching to a second local server
updates from vendor-server instead of local server
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Supported Operating Systems
Apple
Mac OS
Mac OS X
Mac OS X Server
iPhone OS / iPod OS
Windows 2000
Professional / Server / Advanded Server 32 Bit / 64 Bit Intel
Advanced Server 64 Bit Itanium
Data Center Server / Data Center Server 64 Bit Intel
Data Center Server 64 Bit Itanium
Windows XP
Home
Professional
Media Center / Tablet PC Edition
Embedded
Windows Server 2003
Standard / Enterprise / Data Center / Small Business Server
Cluster Server / Storage Server
Web Edition
R2 Standard / Enterprise
Windows Vista
Home Basic / Home Premium
Business / Enterprise / Ultimate
Windows 7
Starter Edition
Home Premium
Professional / Ultimate / Enterprise
Windows 8
Professional / Enterprise
Windows 8.1
Professional / Enterprise
Windows 2012
Server 2012
Windows Server 2008
Standard
Standard - Core Installation
Enterprise / Server R2 (Standard/Enterprise)
Data Center / Web Edition
Foundation
HPC
Windows Mobile
Windows Mobile
Works for Citrix
Works for Citrix
Symbian
OS 9.0 / 9.1 / 9.3
Series 60
Linux
Redhat
Redhat Enterprise Linux 3.x 32 Bit / 64 Bit
Redhat Enterprise Linux 4.x 32 Bit / 64 Bit
Redhat Enterprise Linux 5.x 32 Bit / 64 Bit
Redhat Enterprise Linux 6.x 32 Bit / 64 Bit
SUSE
SUSE Linux Enterprise Desktop/Server 9.x 32 Bit / 64 Bit
SUSE Linux Enterprise Desktop 10.x 32 Bit / 64 Bit
SUSE Linux Enterprise Server 10.x 32 Bit / 64 Bit
SUSE Linux Enterprise Desktop/Server 11.x 32 Bit / 64 Bit
Novell
Open Enterprise Server OES 32 Bit / 64 Bit
Open Enterprise Server OES2 32 Bit / 64 Bit
VMware
ESX 4.x, 5.x
Management
Server
For how many users/clients is the free database recommended
Which database is included (i.e. Microsoft SQL, Sybase, MySQL, etc)
Protection
Client
Management
Server
Bitdefender
Management
Console
Protection
Client
Email Server
Microsoft Exchange
Domino
Linux
Novell Netware Server
Kerio
ESET
Management
Console
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Management
Server
F-Secure
Management
Console
Protection
Client
Management
Server
|
|
|
|
|
|
|
|
|
|
|
Protection
Client
|
G DATA
Management
Console
|
|
|
|
Protection
Client
Management
Server
IKARUS
Management
Console
Protection
Client
Management
Server
Kaspersky Lab
Management
Console
|
|
|
Protection
Client
|
|
|
|
Management
Server
McAfee
Management
Console
Protection
Client
Management
Server
Sophos
Management
Console
Management
Server
Symantec
Management
Console
|
|
|
|
|
Protection
Client
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The web
Security
Amazon Linux
Console can be
AMI, hosted inaccessed from
the-cloud
any major
browser
Solaris,
NetBSD,
Ubuntu, Free
BSD, Android
|
|
|
|
|
unlimited
20000
20000
Mongo
Microsoft
Access (JET
database)
H2DB
(embedded
database
engine)
|
MySQL 5.0,
Oracle 9i and
later
any ODBD
database
possible
|
|
CentOS, openSUSE, Debian,
Ubuntu
20000
MS Access
Protection
Client
|
Which additional databases are supported
Microsoft SQL Server
Microsoft SQL Server 2005 / 2008 / 2008 R2
Other Microsoft SQL Server 2012
Management
Server
|
|
|
Other supported OS
Database
Does the product require a database
AVIRA
Management
Console
|
|
CentOS,
Ubuntu,
Debian, Small
Business Server
2011
|
SQLite
|
Redhat Enterprise Linux 7 64
Bit, Fedora 20 32 Bit/ 64 Bit,
OpenSUSE 13.1 32 Bit / 64 Bit,
Debian 6/7 32 Bit /64 Bit,
CentOS 6.5 32 Bit / 64 Bit
|
|
|
|
|
Microsoft hyper-v
Android, iOS
|
|
|
|
|
|
unlimited
<100
25000
5 000
Microsoft SQL
Express
Microsoft SQL
2005 and
higher
SQL Server
2008 R2 SP2
Express Edition
MS SQL Express
2008
Sybase
|
|
|
|
|
|
MySQL, MySQL
Enterprise
|
|
|
|
|
|
Microsoft
hyper-v, free
BSD 7 and
up, HP-UX 11
and up,
OpenVMS 7
and up,
TurboLinux
10, Asianux 3,
Ubantu LTS 8
and up.
<1000 Clients
Microsoft SQL
Server 2012
|
|
|
|
SQL 2012
|
|
|
|
|
|
|
Feature list
AVIRA
Bitdefender
ESET
F-Secure
G DATA
Ikarus
G DATA Small Business
Security
ÌKARUS anti.virus
Kaspersky Lab
McAfee
Sophos
Symantec
Recommended product for:
up to 5 Clients, Server
Avira Endpoint Security
up to 25 Clients and 1 Fileserver
up to 25 Clients and Fileserver and Messaging Server
Avira Small Business
Security Suite
more than 25 Clients, more than 1 Fileserver, more than 1 Messaging server
Small office Security
(Cloud) by Bitdefender
Small office Security
(Cloud) by Bitdefender +
Bitdefender Security for
Exchange
ESET Endpoint Security
ESET Small Business
Security Pack 20
F-Secure Business Suite
ESET Business Solutions
G DATA Endpoint
Protection Business
G DATA Endpoint
Protection Business +
MailSecurity +
ClientBackup
IKARUS security.manager
Kaspersky Small Office
Security
Sophos Endpoint
Protection - Business
McAfee Small Business
Security
Sophos Endpoint
Protection - Advanced
Kaspersky Endpoint
Security for Business +
Kaspersky Security for Mail
Server
McAfee Endpoint
Protection Advanced
Symantec Endpoint
Protection Small Business
Edition
Symantec Endpoint
Protection
Features Management Server
What is the maximum number of clients overall?
2 000
unlimited
unlimited
unlimited
unlimited
unlimited
unlimited
300 000
25 000
800 000
What is the maximum number of clients that can be managed from a single
management server under the following conditions: All necessary components
(database, repositories, update mechanisms, reporting, etc.) are installed on
this server and the Clients communicate with the server either continuously or
at least once per hour
2 000
unlimited
depends on hardware of
the server and the
database used
20 000
1 000
unlimited
25 000
unlimited
25 000
50 000
2GHz, 1GB RAM, 500MB
disk space
1GHz, 512MB RAM, 1GB
disk space
2.66GHz, 8GB RAM, 20GB
disk space
1GHz, 512MB RAM, 500
MB disk space
2 GHz, 4GB RAM, 100GB
disk space
|
|
|
|
|
|
|
Required minimum hardware (CPU/RAM/free disk space)
Does the product provide a mechanism to limit the data transferred over WAN
Links when updating clients in remote locations?
By designating one client as local source for definition updates (Super Agent,
Group Update Provider)
Which options does the product provide to ensure that only authorized
administrators can administer the product?
1GHz, 1GB RAM, 5GB disk The server is hosted in-the- 1GHz, 512MB RAM, 1GB
space
cloud.
disk space
|
Login/Users + ACL
|
Role based user models
enforced through
passwords
|
|
|
|
|
|
|
|
Password-based user
authentication in Policy
Manager Console
Role based user model
enforced through
passwords / AD
Login/Windows based
Login / passwordproteccted client /
encrypted communication
between server and client
and server and
administrative console
Password protection of
the server
Authentification username
and password supporting
RBAC, password-protected
client, system tray icon
hide
|
|
|
|
Password protection,
complex password option,
Windows domain
authentication (role based
management), encrypted
communication
|
Log out administrator if idle for a specified time
2 GHz, 1GB RAM, 6GB disk 2GHz, 2GB RAM, 3GB disk
space
space
Authentication as well as
cert based authentication
Password protection,
Passwords, RSA SecureID,
of administrators into ePO, encrypted communication,
Active Directory
audit logs to log who has role-based administration
Authentication
made policy changes
|
|
Master-Slave-Server
Multiple AV Servers
|
|
|
|
|
Master server controls slave server in different offices
|
|
|
|
|
|
|
|
Slave server for distributing updates
Notes
|
|
Management server
infrastructure is hosted inthe-cloud, providing High
Availability and unlimited
scalability. Individual
Update Servers can be
installed into LAN. It is
possible to install and
configure more Update
Servers in cascade.
Slave servers can be
nested in multiple levels,
each with its own
credentials for access,
which can be dependent
on administrator's role
(read-only/limited
user/full privileges).
Policies from upper level
servers could be
propagated to lower
levels.
|
|
|
Different deployment
possibiltities, such as: All in
one management server
deployment, redundant
server deployment (Main
and Secondary
ManagementServer),
combination between
every workstation/server
management server and
with a simple windows
cascaded subnet servers
fileshare can be used as a
(Update agent) and/or
"distributing update
Peer-to-Peer update
server"
distribution between
clients, multiple
management servers
based for example on their
location and managed
with G Data Master
Administrator, or
combination of the above
Feature list
AVIRA
Bitdefender
ESET
F-Secure
G DATA
Ikarus
Kaspersky Lab
McAfee
Sophos
Symantec
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Client Installation
Which client deployment methods does the product support?
Does the product include a mechanism that allows the administrator to push
the software to the clients?
Can the installation of the clients be staggered over time to ensure that the
network is not over utilized?
Can the administrator see the status of the deployment (i.e. Transfer,
Installation in Progress, Installation complete, etc.)?
Does the product include a mechanism that allows the end user to download
and install the software?
Can the admin send a link which allows the user to download and install the
software?
Does to product support the creation of MSI packages for deployment with 3rd
party tools and Active Directory (GPO)?
Does the product support the creation of single file executable (.exe) installer
(i.e. for logon scripts or CD distribution)
Group Import & Synchronisation
|
|
|
|
|
|
|
|
|
|
|
|
|
Can computers be imported from a text file?
|
|
|
|
|
|
|
Can computers be imported from Active Directory?
|
|
|
|
|
|
|
|
|
Keeping the OU structure defined in Active Directory
|
|
|
|
|
|
|
|
|
Using other criteria to assign computers to groups
|
|
|
|
|
|
|
Can changes in Active Directory be synchronized?
|
|
|
|
|
|
|
|
Can the synchronisation schedule be defined?
|
|
|
|
|
|
|
|
|
|
|
Can computers be imported from multiple Active Directory server?
Can computers/users be imported from other LDAP server?
Can computers be imported by a GUI
|
|
|
|
|
|
Can different actions be defined based on the malware category?
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Scan Location
Can the administrator exclude/include files and folders from being scanned (by
file extension)?
|
|
|
|
By predefined lists of extensions provided by the product
|
|
|
|
By filenames ("file.txt") regardless of folder or location
|
|
|
|
|
|
|
By filenames, foldername & specific folder ("c:\Directory\file.txt")
|
|
|
|
|
|
|
|
|
Standard Windows folder (i.e. %WINDOWS%, %SYSTEM32%) regardless of the
operating system language
|
|
|
|
|
|
|
Does the product provide preconfigured exclusions?
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Microsoft Exchange
Microsoft Exchange
|
|
Network shares
|
Is scanning of network shares disabled by default?
|
|
Can a user or administrator scan network shares after entering a password?
|
|
|
|
|
|
System memory / Processes
Does the product scan processes in memory for malware?
|
|
|
|
|
|
|
|
Can the administrator define exceptions?
|
|
|
|
|
|
|
|
Boot sectors
|
|
|
|
|
|
|
Microsoft Outlook / Outlook Express
|
|
|
|
|
Lotus Notes
|
|
|
|
|
|
|
|
|
|
Email Messages
Does the product scan existing email in the message stores of the following
applications?
|
|
|
Feature list
AVIRA
Bitdefender
ESET
F-Secure
G DATA
Ikarus
Kaspersky Lab
McAfee
Sophos
Symantec
Thunderbird
|
|
|
|
|
|
Microsoft Windows Live Mail
|
|
|
|
|
Microsoft Windows Mail
|
|
|
|
|
|
SMTP / POP3
|
|
|
|
|
|
|
|
IMAP
|
|
|
|
|
|
|
Does the product scan incoming and outgoing emails and attachments in the
following protocols?
Archives
ZIP/RAR/ARJ & archived installers
|
|
|
|
|
|
|
|
|
|
how deep at on demand (by default)
20
16
10
5
100
8
unlimited
3
10
3
Can the administrator define when scans should take place and which Scan
locations should be included / excluded?
|
|
|
|
|
|
|
|
|
|
Can the system impact vs. scan speed be defined?
|
|
|
|
|
|
|
Can the administrator define when a scan is triggered?
|
|
|
|
|
|
|
|
|
|
Can the administrator specify which Scan Locations (incl. Files / Directories)
should be included / excluded?
|
|
|
|
|
|
|
|
|
|
Date and time the infection was detected, the name of the infection and the
original location where the infection was found (incl. file name)
|
|
|
|
|
|
|
|
|
|
The malware category (i.e. Virus, Worm, etc)
|
|
|
|
|
|
|
|
The computer on which the infection was found
|
|
|
|
|
|
|
|
|
|
The user who was logged on at the time the infection was detected
|
|
|
|
|
|
|
|
The action and current status of the infection (i.e. cleaned, deleted,
quarantined, still infected)
|
|
|
|
|
|
|
|
|
|
The current location of the infected file (i.e. local quarantine)
|
|
|
|
|
|
|
|
|
|
The scan that detected the infection (i.e. On Access, Manual, Start-up, etc)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
By displaying a pop up or balloon
|
|
|
|
|
|
|
|
|
|
Silen mode
By adding a warning to an infected email body or subject (email) and by
replacing an infected attachment
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Run a script or application after detection
|
On Demand Scans
|
On Access Scan
Which information is logged?
|
|
End-user Interaction
Let the end-user choose the action
Notify the end-user
Can a second or alternative action be defined (i.e. if the first action fails)?
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Which file specific actions can the product perform?
Clean / Delete
|
|
|
Can the product create a backup of the file before attempting to clean it?
|
|
|
Quarantine on the local system
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Terminate the process
|
|
|
|
|
|
|
|
|
|
Stop the service
|
|
|
|
|
|
Quarantine in a central location
Deny Access
|
|
Which processes specific actions can the product perform
|
Feature list
AVIRA
Bitdefender
ESET
Preconfigured Antivirus Check
|
|
|
Preconfigured Firewall Check
|
|
|
F-Secure
G DATA
Ikarus
Kaspersky Lab
|
McAfee
Sophos
Symantec
|
|
|
|
|
|
|
|
|
Does to product provide preconfigured conditions?
|
Preconfigured Patch Management Check
|
Operating system patching
status check
Other
database update
Remediation
|
Does the product provide remediation capabilities?
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Which remediation action can be defined in the user interface (without
resorting to scripts)?
|
Registry remediation
|
File remediation
|
Delete files / folders
|
|
|
Download files
Process remediation
|
Run service / application in user / system security context
Software Remediation
Download software and patches
|
|
|
|
Install / uninstall software and patches in user / system security context
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
End-user interaction
|
Inform user
Query user
|
|
Enforcement
Can the product prevent that a client failing the client health check connects to
a network?
|
|
|
Behaviour detection
Behavior detection
|
|
|
|
Is this technology enabled by default?
|
|
|
|
Is the firewall stateful for TCP and UDP connections?
|
|
|
Can the firewall analyze VPN traffic
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
General capabilities
|
|
Firewall Rules
Does the product come with default policies?
For workstations
|
|
For server
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Protocol
TCP/UDP/ICMP
|
|
Raw Ethernet
|
|
Any other IP protocol is
supported
IPv6-ICMP, IGMP, GRE,
ESP, SMP
|
|
|
|
|
|
|
Allow, Block, Ask and
Notify are all allowed
|
|
|
|
|
|
|
|
Other
IGMP, GGP, GUP, IDP, GRE
Which Actions can be taken when a firewall rule is triggered?
Allow / Block traffic / Ask / notify the end-user when traffic is blocked
Log
Log the incident
Include packet data in log
|
|
Feature list
AVIRA
Bitdefender
ESET
F-Secure
G DATA
Ikarus
Kaspersky Lab
McAfee
Sophos
Symantec
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Can the administrator define rules that can be overridden by end-user rules?
|
|
|
|
|
|
Can the end-user be allowed to disable the firewall?
|
|
|
|
|
|
Can the firewall automatically be enabled after a defined time?
|
Can the end-user easily block all network traffic?
|
|
|
Can the end-user be allowed to see the network traffic in real time?
|
|
|
Can the firewall rules be exported and imported?
|
|
|
End-user Interaction
Can end-users be allowed to create firewall rules?
Can the administrator define rules that can not be overridden by end-user
rules?
|
|
|
|
|
|
|
|
|
|
|
Client Management
Client User Interface
Can the administrator limit or control configuration changes by the end-user?
|
|
|
|
|
|
|
|
|
|
Can different policies be applied for different computers?
|
|
|
|
|
|
|
|
|
|
Depending on the location of the device (i.e. Office, Hotel, Home, etc)
|
|
|
|
|
|
|
|
|
Depending on group membership of the computer
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Depending on group membership of the user (i.e. administrator vs. normal
user)
|
|
|
|
|
|
Actions
Which actions can be initiated in administration console?
Update signatures
|
|
|
|
|
Scan computer
|
|
|
|
|
|
|
|
|
|
Enable/Disable On-Access Scan
|
|
|
|
|
|
|
|
|
|
Enable/Disable Firewall
|
|
|
|
|
|
|
|
|
|
Reboot computer
Other
Change all available
product options
Change all aspects of
configuration, including
handing off a client to
another server
|
|
|
|
Notifications on the
enduser can be
enabled/disabled
Vulnerability Scan
Application , Device and
Web Controls, software
inventory, hardare
registry, remote control,
remote installation of
software and OS, patch
deployment, network
access blocking, running
script, collecting traces for
troubleshooting, send
message to user, run/stop
application, turn on
computer, restart
computer
|
|
|
|
|
|
|
|
Scan for AV updates
According to the nature of
the specific action and
according to the
administrator needs
Any set of computers or
according to the
administration groups
hierarchy
|
|
|
|
Enable/Disable all product
features, reset statistics,
Central administration,
configuration changes, configuration, monitoring,
quarantine managmenet, etc. of all available product
software installation and
features
upgrades
On which systems can the actions be initiated?
A single computer / a group of computers
|
|
All computers matching certain criteria (i.e. identified by logs or reports)
Other
Can the status of the actions be tracked?
|
On organization/network
level
|
|
|
|
|
|
Feature list
AVIRA
Bitdefender
ESET
F-Secure
Is there a web based console?
G DATA
Ikarus
Kaspersky Lab
McAfee
Sophos
Symantec
|
|
|
|
|
|
|
|
|
|
|
|
Administrator Management
Rights / Access Control
Does the product support multiple administrators and different access levels?
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Authentication mechanism
Can administrators be authenticated using an integrated authentication
mechanism (i.e. username / password)?
Does the product enforce minimum password lengths and maximum password
age?
|
|
Can administrators be authenticated using Active Directory?
|
Account Security
|
Does the product log an administrator out after being idle for some time?
Administrator Auditing
|
Does the product keep an audit log?
|
|
|
|
|
|
Device Control
Does the product allow administrators to limit the use of external devices (USB
sticks, printers, etc)?
|
|
|
|
Failover
What if the AV Server (local) hangs up
automatic switching to a second local server
updates from vendor-server instead of local server
|
|
|
|
|
|
Log and notifications
Multiple proxy servers and
proxy chaining supported
|
|
|
|
|
|
|
|
other
|
|
|
|
|
|
|
|
|
|
|
service is automatically
restarted
any other network shared
folder
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Quarantine
Quarantine Folder
Is there a centralized quarantine-folder
Is there a quarantine-folder on the client
|
can administrators specify the location of the quarantine folder anywhere
|
|
|
|
rechecking quarantine
after an signature update, is the quarantine folder checked?
|
automatically
|
manual
|
|
undo av-action if false positive is detected
|
|
|
|
|
|
|
Messaging
Exchange
Feature overview Messaging
Product for Exchange. Full Transport and storage AV
integration with MS
scanning, Spam Control,
Monitoring, SMTP Groups, Exchange, scans the whole
attachment filtering,
Antivirus, Antispam,
Exchange store and
intelligent file type
Transport and storage AV
Content filtering,
Antispam Protection.
recognition, keywordScanning and extendable
Attachment filtering,
Managable from the
based content filtering, by a MailSecurity Gateway
Update
central management
zero-day protection,
server. Supports 64-bit
contralized quarantine
Exchange.
management
Modules and functional areas
Integrated option with MS
Exchange and Domino.
Secure email gateway
option (virtual or physical
appliance) for Enterprise
Edition. Antispam,
antivirus, antiphishing,
content filtering, and data
loss prevention
Malware detection
Recursive scan of all e-mails and file attachments in real time, event-and timecontrolled
|
|
|
|
|
|
|
Feature list
AVIRA
Bitdefender
ESET
F-Secure
G DATA
Information Store scan on every server
|
|
|
|
|
Support of automatic virus pattern updates
|
|
|
|
Scanning of e-mail message text and attachments
|
|
|
|
|
|
Definition of file limitations by a combination of file name, file extension and
file size
Ikarus
Kaspersky Lab
McAfee
Sophos
Symantec
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Application of the restrictions on file archives
|
|
|
|
|
|
|
|
Automatic detection of new mailboxes
|
|
|
|
|
|
|
|
Scanning of existing mailboxes
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Anti-Spam
scan according to the company's policies on prohibited, not desirable or
confidential content
Blocking unwanted e-mail senders (spam senders, mailing lists, etc.) as well as
to unwanted recipients (e.g. competitors)
Analysis of images on undesirable content (e.g. pornography)
Using current spam pattern for the fast detection of new spammer tricks
User-Specific Management of White- and blacklists on the server solely for
effective blocking unwanted e-mails
Definition of transmitter / receiver channels on a dedicated e-mail
communications
Freely editable exclusion list for addresses and content in subject and message
text
Flexible notifications of blocked e-mails (directly or schedule) to administration
or transmitter/receiver email
|
|
|
|
|
|
|
User-specific access to e-mails in the quarantine
|
Centralized quarantine management
|
Formation of company-specific e-mail categories
|
Automatic classification of e-mails to one or more categories
|
Response Management through defined classifications, for example, the
customer support automatic forwarding of e-mails to qualified employees
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Document protection: Following categories may, for example, all outgoing emails on company-related content should be examined
A content audit of e-mail attachments is also possible
|
|
if the same mail is delivered several times, would it be blocked as spam
|
|
|
|
|
|
|
|
|
General Windows
Feature overview Messaging
Integration with most
Windows mail servers is
possible through the
command line scanner
Modules and functional areas
Integrated option with MS
Exchange and Domino.
Secure email gateway
option (virtual or physical
appliance) for Enterprise
Edition. Antispam,
antivirus, antiphishing,
content filtering, and data
loss prevention
Gateway solution,
Exchange Plugin for
Exchange 2007/2010/2013
or combination of both
Malware detection
Recursive scan of all e-mails and file attachments in real time, event-and timecontrolled
|
|
|
|
Information Store scan on every server
|
|
|
|
Support of automatic virus pattern updates
|
|
|
|
Scanning of e-mail message text and attachments
|
|
|
|
Definition of file limitations by a combination of file name, file extension and
file size
|
|
|
Application of the restrictions on file archives such as zip, rar
|
|
|
|
|
|
Automatic detection of new mailboxes
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Feature list
Scanning of existing mailboxes
AVIRA
Bitdefender
|
ESET
F-Secure
G DATA
Ikarus
Kaspersky Lab
|
|
|
|
|
Chinese, Czech, Danish,
Dutch, English, Estonian,
Finnish, French, German,
Greek, Hungarian, Italian,
Japanese, Korean,
Norwegian, Polish,
Portuguese, Romanian,
Russian, Slovenian,
Spanish, Swedish, Turkish
German, English, Italian,
Spanish, French, Russian,
Polish, Turkish,
Portuguese, Chinese,
Japanese
German, English, Italian,
Russian, Turkish
English, French, German,
Japanese, Chinese,
Russian, Spanish,
Portuguese, Polish,
Turkish, Arabic, Italian
All
English, German, Spanish,
French, Japanese, Finnish,
Italian, Swedish.
German, English, Italian,
Spanish, French, Polish
German, English
|
|
|
English, Danish, Finnish,
French, German,
Cantonese, English,
Japanese, Norwegian,
Swedish
McAfee
Sophos
Symantec
|
|
Language:
In which languages are your business/corporate products available?
In which languages are your (help) manuals available?
German, English, Italian,
Japanese, Turkish,
Spanish, Portuguese,
French, Russian, Dutch,
Chinese Korean
Management Server and
Console: English, Japanese,
German, Russian, French,
Spanish, Polish, Chinese,
Portuguese, Italian.
Client: Bulgarian, Chinese,
Croatian, Czech, Danish,
Dutch, English, Estonian,
Finnish, French, German,
Hungarian, Italian,
English, French, Spanish,
Japanese, Kazakh, Korean,
German
Norwegian, Polish,
Portuguese, Romanian,
Russian, Latin, Slovak,
Slovenian, Spanish,
Swedish, Thai, Turkish,
Ukrainian, Lithuanian.
German, English
English, Portuguese,
Chinese, Dutch, French,
English, French, German,
German, Hebrew, Italian, Italian, Japanese, Spanish,
Japanese, Korean, Polish,
Chinese
Spanish, Swedish, Russian
English, Chinese, Korean,
French, Italian, German,
Spanish, Portuguese,
Russian, Czech, Polish,
Japanese
Support
24/7/365 phone support
|
|
|
German, English, Italian,
Japanese, Turkish,
Spanish, Portuguese,
French, Russian, Dutch,
Chinese Korean
English, French, Spanish,
German
All
Remote Desktop Control for support
|
|
|
Support per Forum
|
|
|
|
Support over Email
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Avira Endpoint Security
Small office Security by
Bitdefender
ESET Endpoint Antivirus
F-Secure Business Suite
G DATA Small Business
Security
IKARUS anti.virus
1 year Euro
193
202
150
306
167
3 years Euro
385
403
317
128
467
1 year USD
250
246
192
306
3 years USD
500
491
402
765
Avira Small Business
Security Suite
Small office Security by
Bitdefender
ESET Endpoint Antivirus +
ESET File Security
1 year plan EURO
1 260
785
3 year plan EURO
2 520
1 570
Supported Support Languages
On-Site service?
|
|
|
English, Portuguese,
English, French, German,
Chinese, Dutch, French,
English, French, German,
Italian, Spanish,
German, Hebrew, Italian, Spanish, Italian, Japanese, Portuguese, Czech, Polish,
Japanese, Korean, Polish,
Chinese
Russian, Chinese, Korean,
Spanish, Swedish, Russian
Japanese, Taiwanese
German, English, Italian,
Spanish, French
German, English
All
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Service
Managed by Vendor, this means, can the whole management process be done
as a service by the vendor?
|
|
|
Kaspersky Small Office
Security
McAfee Small Business
Security
Sophos Endpoint
Protection - Business
Symantec Endpoint
Protection Small Business
Edition
34
132
196
214
162
55
301
343
428
389
167
44
229
210
244
175
467
70
498
367
488
419
F-Secure Business Suite
G DATA Endpoint
Protection Business
IKARUS security.manager
Kaspersky Small Office
Security
McAfee Small Business
Security
Sophos Endpoint
Protection - Business
Symantec Endpoint
Protection Small Business
Edition
473
942
753
910
744
1 610
656
300
993
2353
1 530
1 456
1 674
3 170
1312
692
Pricing (may vary)
Scenario A: 5 clients, server, outlook as mail client
recommended product
Scenario B SMB: 1 SBS 2003 Server, 25 Clients
recommended product
Feature list
AVIRA
Bitdefender
ESET
F-Secure
G DATA
Ikarus
Kaspersky Lab
McAfee
Sophos
Symantec
1 year plan USD
1 638
958
601
942
753
1 170
985
1 509
731
316
3 year plan USD
3 276
1 916
1262
2353
1 530
1 871
2 313
3 169
1487
991
IKARUS security.manager
Kaspersky Endpoint
Security + Kaspersky
Security for Mail Server
McAfee Small Business
Security
Sophos Endpoint
Protection - Business
Symantec Protection Suite
Enterprise Edition
5 454
5 158
6 738
3 950
5 292
8 726
11 607
11 861
7 900
10 079
Scenario C: 1 Fileserver, 1 Exchange server, 200 Clients
1 year plan EURO
7 620
8 199
4 815
4 842
G DATA Endpoint
Protection Business +
MailSecurity +
ClientBackup
6 624
3 year plan EURO
15 240
16 399
10 113
12 104
14 112
1 year plan USD
9 906
10 046
6 122
4 842
6 624
7 009
5 838
8 005
4 500
4 944
3 year plan USD
19 812
20 092
12 856
12 104
14 112
11 214
11 677
14 089
9 000
9 310
IKARUS security.manager
Kaspersky Endpoint
Security + Kaspersky
Security for Mail Server
McAfee Endpoint
Protection Suite
Sophos Endpoint
Protection - Business
Symantec Protection Suite
Enterprise Edition
19 057
18 617
28 545
18 000
27 075
recommended product
Avira Business Security
Suite
Small office Security by ESET Endpoint Antivirus +
Bitdefender + Bitdefender ESET File Security + ESET
Mail Security
Security for Exchange
F-Secure Business Suite
Scenario D, 2 Fileserver, 1 Exchange server, 1000 Clients
1 year plan EURO
21 300
29 850
15 821
15 857
G DATA Endpoint
Protection Business +
MailSecurity +
ClientBackup
23 040
3 year plan EURO
42 600
59 700
33 244
39 638
47 520
30 491
41 899
50 240
27 000
61 563
1 year plan USD
27 690
36 387
20 111
15 857
23 040
24 492
22 389
32 939
20 250
20 060
3 year plan USD
55 380
72 774
42 260
39 638
47 520
39 187
44 767
57 973
40 500
44 579
IKARUS security.manager
Kaspersky Endpoint
Security + Kaspersky
Security for Mail Server
McAfee Endpoint
Protection Suite
Sophos Endpoint
Protection - Business
Symantec Protection Suite
Enterprise Edition
120 240
186 170
162 224
180 000
220 820
recommended product
Avira Business Security
Suite
Small office Security by ESET Endpoint Antivirus +
Bitdefender + Bitdefender ESET File Security + ESET
Mail Security
Security for Exchange
F-Secure Business Suite
Scenario E: 10 Fileserver, 10 Exchange server, 10000 Clients
1 year plan EURO
136 000
259 254
116 084
81 763
G DATA Endpoint
Protection Business +
MailSecurity +
ClientBackup
230 400
3 year plan EURO
272 000
518 508
243 176
204 408
475 200
192 384
418 990
285 470
270 000
530 030
1 year plan USD
176 800
316 239
147 566
81 763
230 400
154 530
223 890
187 174
202 500
159 960
3 year plan USD
353 600
632 477
309 125
204 408
475 200
247 251
447 670
329 357
405 000
388 788
recommended product
Avira Business Security
Suite
Small office Security by ESET Endpoint Antivirus +
Bitdefender + Bitdefender ESET File Security + ESET
Mail Security
Security for Exchange
F-Secure Business Suite
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising