AVIRA MANAGED EMAIL SECURITY - V1.0 User manual

Introduction and Software version reviewed Overview of the manufacturer’s business products, and details of the product reviewed Main product version number of each of the components used Supported operating systems Microsoft Windows operating systems supported Non-Windows systems supported, such as Apple and Linux (although these are not reviewed) Additional features We list any features over and above what might be expected from an antivirus program, for example backup, firewall, vulnerability scanner Documentation An overall view of the product’s manual, and in particular whether it provides suitable instructions for installing the console and deploying client software Local help and online knowledge base, if available Preparing server and clients for deployment Any configuration of the clients and server before the endpoint protection software can be installed, e.g. opening firewall ports, enabling file sharing, or disabling User Account Control Deploying the software2 Installation of the console (if applicable) Deploying endpoint protection software to client PCs and file server, using what we regard as the easiest method for each product Management console Description of layout and features Monitoring the network How to see overall status of protection, including state of real-time protection and updates How to correct any errors in the protection status, e.g. run an update Reporting of malware found Program version installed Licensing information Managing the network Running one-off scans Setting up a scheduled scan Running updates Client antivirus software3 Registration in Windows Action Center System Tray icon Is Windows Defender disabled under Windows 7, Windows 8? Can the user run updates and scans? Is there a status display which shows the local user if all is well? If an alert is shown that protection is disabled, how can the user re-enable it? What sort of alert, if any, is shown when the EICAR test file is downloaded? Server antivirus software A brief overview of the server antivirus software, in the event that this is significantly different from the client endpoint protection program AVIRA Endpoint Security 14.06 Bitdefender Endpoint Security 5.3 ESET Endpoint Security 5.0 F-Secure PSB Workstation Security 10.10 G DATA AntiVirus Business 13.0 Ikarus security.manager 4.2 Kaspersky Small Office Security 13.0 McAfee Endpoint Security 10.0 Sophos Endpoint Security and Control Cloud 10.3 Symantec Endpoint Protection Small Business Edition 12.1 Self-managed Client-integrated console Cloud-based console Server-based console Avira Endpoint Security Introduction Software version reviewed Supported operating systems Documentation Preparing server and clients for deployment Deploying the software Management Console Monitoring the network Managing the network Client antivirus software Server antivirus software Summary Bitdefender Small Office Security (cloud) Introduction Software version reviewed Supported operating systems Additional features Documentation Preparing server and clients for deployment Deploying the software Management Console Monitoring the network Managing the network Client antivirus software Server antivirus software Summary ESET Endpoint Security Introduction Software version reviewed Supported operating systems Additional features Documentation Preparing server and clients for deployment Deploying the software Management console Monitoring the network Managing the network Client antivirus software Server antivirus software Summary F-Secure Protection Service for Business Introduction Software version reviewed Supported operating systems Additional features Documentation Preparing server and clients for deployment Deploying the software Management Console Monitoring the network Managing the network Client antivirus software Server antivirus software Summary G Data Antivirus Business Introduction Software version reviewed System requirements Additional features Documentation Preparing server and clients for deployment Deploying the software Management Console Monitoring the network Managing the network Client antivirus software Server antivirus software Summary IKARUS security.manager Introduction Software version reviewed Supported operating systems Documentation Preparing server and clients for deployment Deploying the software Management Console Monitoring the network Managing the network Monitoring and management using replica of client window Client antivirus software Server antivirus software Summary Kaspersky Small Office Security Introduction Software version reviewed Supported operating systems Additional features Documentation Preparing server and clients for deployment Deploying the software Management Console Monitoring the network Managing the network Client antivirus software Server antivirus software Summary McAfee Endpoint Security (Self-Managed Option) Introduction Software version reviewed Supported Operating Systems Documentation Preparing server and clients for deployment Deploying the software Program interface Summary Sophos Endpoint Security and Control with Sophos Cloud Introduction Software version reviewed Supported operating systems Additional features Protection; HIPS; Web Security; Device Control; Web Control (Filtering); Active Directory Sync; Mobil device management (optional) Documentation Preparing server and clients for deployment Deploying the software Management Console Monitoring the network Managing the network Client antivirus software Server antivirus software Summary Symantec Endpoint Protection Small Business Edition Introduction Supported Operating Systems Additional features Documentation Preparing server and clients for deployment Deploying the software Management Console Monitoring the network Managing the network Client antivirus software Server antivirus software Summary Feature list AVIRA Bitdefender ESET Avira Endpoint Security Small office Security (Cloud) by Bitdefender ESET Endpoint Security F-Secure G DATA Ikarus G DATA Small Business Security ÌKARUS anti.virus Kaspersky Lab McAfee Sophos Symantec Recommended product for: up to 5 Clients, Server up to 25 Clients and 1 Fileserver Avira Small Business Security Suite up to 25 Clients and Fileserver and Messaging Server Avira Business Security Suite more than 25 Clients, more than 1 Fileserver, more than 1 Messaging server ESET Small Business Security Pack 20 F-Secure Client Security & Email & Server Security G DATA Endpoint Protection Business G DATA Endpoint Protection Business + MailSecurity + ClientBackup IKARUS security.manager unlimited Small office Security (Cloud) by Bitdefender + Bitdefender Security for Exchange ESET Business Solutions unlimited unlimited unlimited unlimited | | | Sophos Endpoint Protection Business Kaspersky Small Office Security McAfee Small Business Security Kaspersky Endpoint Security for Business + Kaspersky Security for Mail Server McAfee Endpoint Protection Advanced unlimited 300,000 Symantec Endpoint Protection Small Business Edition Sophos Endpoint Protection Advanced Symantec Endpoint Protection Features Management Server What is the maximum number of clients overall? 2,000 25,000 800,000 Master-Slave-Server Multiple AV Servers | | | | | | | | | | | | | | | | | Does the product include a mechanism that allows the administrator to push the software to the clients? | | | | | | | | | | Does the product include a mechanism that allows the end user to download and install the software? | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Master server controls slave server in different offices Slave server for distributing updates Client Installation Which client deployment methods does the product support? General Capabilities Does the product allow administrators to assign different policies to different groups of computers (regardless of the person logged in)? Does the product support static groups (i.e. user or computer are assigned manually to a group or are imported from a third party system)? Group Import & Synchronisation Can changes in Active Directory be synchronized? | | Can computers/users be imported from other LDAP server? Can computers be imported by a GUI | | | | | | Can different actions be defined based on the malware category? | | | | | | | | | | | | | | | | | | | Microsoft Exchange Exchange 2007 / 2010 / 2013 | | | | Network shares | Can a user or administrator scan network shares after entering a password? Email Messages Microsoft Outlook Lotus Notes Thunderbird | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Webcam Printers, CD/DVD, modems, multifunctional devices, external network adapters, wi-fi, Bluetooth devices | | Archives ZIP/RAR/ARJ & archived installers Conditions Remediation Does the product provide remediation capabilities? General capabilities Firewall Rules Does the product come with default policies for workstations? Does the product come with default policies for server? Client Management Client User Interface Can the administrator limit or control configuration changes by the end-user? Can different policies be applied for different computers? Depending on the location of the device (i.e. Office, Hotel, Home, etc) Depending on group membership of the computer Depending on group membership of the user (i.e. administrator vs. normal user) | | | | | | | | | | | Administrator Management Rights / Access Control Does the product support multiple administrators and different access levels? | | Device Control Does the product allow administrators to limit the use of external devices (USB sticks, printers, etc)? Can you lock | DVD / USB / external media Floppy All ports and all removable media can be locked, but it's possible to add exceptions for any individual ports or media other Any PnP devices Firewire, Bluetooth, PCMCIA Failover What if the AV Server (local) hangs up automatic switching to a second local server updates from vendor-server instead of local server | | | | | | | | | | | | | | Supported Operating Systems Apple Mac OS Mac OS X Mac OS X Server iPhone OS / iPod OS Windows 2000 Professional / Server / Advanded Server 32 Bit / 64 Bit Intel Advanced Server 64 Bit Itanium Data Center Server / Data Center Server 64 Bit Intel Data Center Server 64 Bit Itanium Windows XP Home Professional Media Center / Tablet PC Edition Embedded Windows Server 2003 Standard / Enterprise / Data Center / Small Business Server Cluster Server / Storage Server Web Edition R2 Standard / Enterprise Windows Vista Home Basic / Home Premium Business / Enterprise / Ultimate Windows 7 Starter Edition Home Premium Professional / Ultimate / Enterprise Windows 8 Professional / Enterprise Windows 8.1 Professional / Enterprise Windows 2012 Server 2012 Windows Server 2008 Standard Standard - Core Installation Enterprise / Server R2 (Standard/Enterprise) Data Center / Web Edition Foundation HPC Windows Mobile Windows Mobile Works for Citrix Works for Citrix Symbian OS 9.0 / 9.1 / 9.3 Series 60 Linux Redhat Redhat Enterprise Linux 3.x 32 Bit / 64 Bit Redhat Enterprise Linux 4.x 32 Bit / 64 Bit Redhat Enterprise Linux 5.x 32 Bit / 64 Bit Redhat Enterprise Linux 6.x 32 Bit / 64 Bit SUSE SUSE Linux Enterprise Desktop/Server 9.x 32 Bit / 64 Bit SUSE Linux Enterprise Desktop 10.x 32 Bit / 64 Bit SUSE Linux Enterprise Server 10.x 32 Bit / 64 Bit SUSE Linux Enterprise Desktop/Server 11.x 32 Bit / 64 Bit Novell Open Enterprise Server OES 32 Bit / 64 Bit Open Enterprise Server OES2 32 Bit / 64 Bit VMware ESX 4.x, 5.x Management Server For how many users/clients is the free database recommended Which database is included (i.e. Microsoft SQL, Sybase, MySQL, etc) Protection Client Management Server Bitdefender Management Console Protection Client Email Server Microsoft Exchange Domino Linux Novell Netware Server Kerio ESET Management Console | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Management Server F-Secure Management Console Protection Client Management Server | | | | | | | | | | | Protection Client | G DATA Management Console | | | | Protection Client Management Server IKARUS Management Console Protection Client Management Server Kaspersky Lab Management Console | | | Protection Client | | | | Management Server McAfee Management Console Protection Client Management Server Sophos Management Console Management Server Symantec Management Console | | | | | Protection Client | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The web Security Amazon Linux Console can be AMI, hosted inaccessed from the-cloud any major browser Solaris, NetBSD, Ubuntu, Free BSD, Android | | | | | unlimited 20000 20000 Mongo Microsoft Access (JET database) H2DB (embedded database engine) | MySQL 5.0, Oracle 9i and later any ODBD database possible | | CentOS, openSUSE, Debian, Ubuntu 20000 MS Access Protection Client | Which additional databases are supported Microsoft SQL Server Microsoft SQL Server 2005 / 2008 / 2008 R2 Other Microsoft SQL Server 2012 Management Server | | | Other supported OS Database Does the product require a database AVIRA Management Console | | CentOS, Ubuntu, Debian, Small Business Server 2011 | SQLite | Redhat Enterprise Linux 7 64 Bit, Fedora 20 32 Bit/ 64 Bit, OpenSUSE 13.1 32 Bit / 64 Bit, Debian 6/7 32 Bit /64 Bit, CentOS 6.5 32 Bit / 64 Bit | | | | | Microsoft hyper-v Android, iOS | | | | | | unlimited <100 25000 5 000 Microsoft SQL Express Microsoft SQL 2005 and higher SQL Server 2008 R2 SP2 Express Edition MS SQL Express 2008 Sybase | | | | | | MySQL, MySQL Enterprise | | | | | | Microsoft hyper-v, free BSD 7 and up, HP-UX 11 and up, OpenVMS 7 and up, TurboLinux 10, Asianux 3, Ubantu LTS 8 and up. <1000 Clients Microsoft SQL Server 2012 | | | | SQL 2012 | | | | | | | Feature list AVIRA Bitdefender ESET F-Secure G DATA Ikarus G DATA Small Business Security ÌKARUS anti.virus Kaspersky Lab McAfee Sophos Symantec Recommended product for: up to 5 Clients, Server Avira Endpoint Security up to 25 Clients and 1 Fileserver up to 25 Clients and Fileserver and Messaging Server Avira Small Business Security Suite more than 25 Clients, more than 1 Fileserver, more than 1 Messaging server Small office Security (Cloud) by Bitdefender Small office Security (Cloud) by Bitdefender + Bitdefender Security for Exchange ESET Endpoint Security ESET Small Business Security Pack 20 F-Secure Business Suite ESET Business Solutions G DATA Endpoint Protection Business G DATA Endpoint Protection Business + MailSecurity + ClientBackup IKARUS security.manager Kaspersky Small Office Security Sophos Endpoint Protection - Business McAfee Small Business Security Sophos Endpoint Protection - Advanced Kaspersky Endpoint Security for Business + Kaspersky Security for Mail Server McAfee Endpoint Protection Advanced Symantec Endpoint Protection Small Business Edition Symantec Endpoint Protection Features Management Server What is the maximum number of clients overall? 2 000 unlimited unlimited unlimited unlimited unlimited unlimited 300 000 25 000 800 000 What is the maximum number of clients that can be managed from a single management server under the following conditions: All necessary components (database, repositories, update mechanisms, reporting, etc.) are installed on this server and the Clients communicate with the server either continuously or at least once per hour 2 000 unlimited depends on hardware of the server and the database used 20 000 1 000 unlimited 25 000 unlimited 25 000 50 000 2GHz, 1GB RAM, 500MB disk space 1GHz, 512MB RAM, 1GB disk space 2.66GHz, 8GB RAM, 20GB disk space 1GHz, 512MB RAM, 500 MB disk space 2 GHz, 4GB RAM, 100GB disk space | | | | | | | Required minimum hardware (CPU/RAM/free disk space) Does the product provide a mechanism to limit the data transferred over WAN Links when updating clients in remote locations? By designating one client as local source for definition updates (Super Agent, Group Update Provider) Which options does the product provide to ensure that only authorized administrators can administer the product? 1GHz, 1GB RAM, 5GB disk The server is hosted in-the- 1GHz, 512MB RAM, 1GB space cloud. disk space | Login/Users + ACL | Role based user models enforced through passwords | | | | | | | | Password-based user authentication in Policy Manager Console Role based user model enforced through passwords / AD Login/Windows based Login / passwordproteccted client / encrypted communication between server and client and server and administrative console Password protection of the server Authentification username and password supporting RBAC, password-protected client, system tray icon hide | | | | Password protection, complex password option, Windows domain authentication (role based management), encrypted communication | Log out administrator if idle for a specified time 2 GHz, 1GB RAM, 6GB disk 2GHz, 2GB RAM, 3GB disk space space Authentication as well as cert based authentication Password protection, Passwords, RSA SecureID, of administrators into ePO, encrypted communication, Active Directory audit logs to log who has role-based administration Authentication made policy changes | | Master-Slave-Server Multiple AV Servers | | | | | Master server controls slave server in different offices | | | | | | | | Slave server for distributing updates Notes | | Management server infrastructure is hosted inthe-cloud, providing High Availability and unlimited scalability. Individual Update Servers can be installed into LAN. It is possible to install and configure more Update Servers in cascade. Slave servers can be nested in multiple levels, each with its own credentials for access, which can be dependent on administrator's role (read-only/limited user/full privileges). Policies from upper level servers could be propagated to lower levels. | | | Different deployment possibiltities, such as: All in one management server deployment, redundant server deployment (Main and Secondary ManagementServer), combination between every workstation/server management server and with a simple windows cascaded subnet servers fileshare can be used as a (Update agent) and/or "distributing update Peer-to-Peer update server" distribution between clients, multiple management servers based for example on their location and managed with G Data Master Administrator, or combination of the above Feature list AVIRA Bitdefender ESET F-Secure G DATA Ikarus Kaspersky Lab McAfee Sophos Symantec | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Client Installation Which client deployment methods does the product support? Does the product include a mechanism that allows the administrator to push the software to the clients? Can the installation of the clients be staggered over time to ensure that the network is not over utilized? Can the administrator see the status of the deployment (i.e. Transfer, Installation in Progress, Installation complete, etc.)? Does the product include a mechanism that allows the end user to download and install the software? Can the admin send a link which allows the user to download and install the software? Does to product support the creation of MSI packages for deployment with 3rd party tools and Active Directory (GPO)? Does the product support the creation of single file executable (.exe) installer (i.e. for logon scripts or CD distribution) Group Import & Synchronisation | | | | | | | | | | | | | Can computers be imported from a text file? | | | | | | | Can computers be imported from Active Directory? | | | | | | | | | Keeping the OU structure defined in Active Directory | | | | | | | | | Using other criteria to assign computers to groups | | | | | | | Can changes in Active Directory be synchronized? | | | | | | | | Can the synchronisation schedule be defined? | | | | | | | | | | | Can computers be imported from multiple Active Directory server? Can computers/users be imported from other LDAP server? Can computers be imported by a GUI | | | | | | Can different actions be defined based on the malware category? | | | | | | | | | | | | | | | | | | | | | | | | | | | Scan Location Can the administrator exclude/include files and folders from being scanned (by file extension)? | | | | By predefined lists of extensions provided by the product | | | | By filenames ("file.txt") regardless of folder or location | | | | | | | By filenames, foldername & specific folder ("c:\Directory\file.txt") | | | | | | | | | Standard Windows folder (i.e. %WINDOWS%, %SYSTEM32%) regardless of the operating system language | | | | | | | Does the product provide preconfigured exclusions? | | | | | | | | | | | | | | | | Microsoft Exchange Microsoft Exchange | | Network shares | Is scanning of network shares disabled by default? | | Can a user or administrator scan network shares after entering a password? | | | | | | System memory / Processes Does the product scan processes in memory for malware? | | | | | | | | Can the administrator define exceptions? | | | | | | | | Boot sectors | | | | | | | Microsoft Outlook / Outlook Express | | | | | Lotus Notes | | | | | | | | | | Email Messages Does the product scan existing email in the message stores of the following applications? | | | Feature list AVIRA Bitdefender ESET F-Secure G DATA Ikarus Kaspersky Lab McAfee Sophos Symantec Thunderbird | | | | | | Microsoft Windows Live Mail | | | | | Microsoft Windows Mail | | | | | | SMTP / POP3 | | | | | | | | IMAP | | | | | | | Does the product scan incoming and outgoing emails and attachments in the following protocols? Archives ZIP/RAR/ARJ & archived installers | | | | | | | | | | how deep at on demand (by default) 20 16 10 5 100 8 unlimited 3 10 3 Can the administrator define when scans should take place and which Scan locations should be included / excluded? | | | | | | | | | | Can the system impact vs. scan speed be defined? | | | | | | | Can the administrator define when a scan is triggered? | | | | | | | | | | Can the administrator specify which Scan Locations (incl. Files / Directories) should be included / excluded? | | | | | | | | | | Date and time the infection was detected, the name of the infection and the original location where the infection was found (incl. file name) | | | | | | | | | | The malware category (i.e. Virus, Worm, etc) | | | | | | | | The computer on which the infection was found | | | | | | | | | | The user who was logged on at the time the infection was detected | | | | | | | | The action and current status of the infection (i.e. cleaned, deleted, quarantined, still infected) | | | | | | | | | | The current location of the infected file (i.e. local quarantine) | | | | | | | | | | The scan that detected the infection (i.e. On Access, Manual, Start-up, etc) | | | | | | | | | | | | | | | | By displaying a pop up or balloon | | | | | | | | | | Silen mode By adding a warning to an infected email body or subject (email) and by replacing an infected attachment | | | | | | | | | | | | | | | | | | | Run a script or application after detection | On Demand Scans | On Access Scan Which information is logged? | | End-user Interaction Let the end-user choose the action Notify the end-user Can a second or alternative action be defined (i.e. if the first action fails)? | | | | | | | | | | | | | | | | | | | | | | | | | | | Which file specific actions can the product perform? Clean / Delete | | | Can the product create a backup of the file before attempting to clean it? | | | Quarantine on the local system | | | | | | | | | | | | | | | | | | | Terminate the process | | | | | | | | | | Stop the service | | | | | | Quarantine in a central location Deny Access | | Which processes specific actions can the product perform | Feature list AVIRA Bitdefender ESET Preconfigured Antivirus Check | | | Preconfigured Firewall Check | | | F-Secure G DATA Ikarus Kaspersky Lab | McAfee Sophos Symantec | | | | | | | | | Does to product provide preconfigured conditions? | Preconfigured Patch Management Check | Operating system patching status check Other database update Remediation | Does the product provide remediation capabilities? | | | | | | | | | | | | | | | | | | | | | | | Which remediation action can be defined in the user interface (without resorting to scripts)? | Registry remediation | File remediation | Delete files / folders | | | Download files Process remediation | Run service / application in user / system security context Software Remediation Download software and patches | | | | Install / uninstall software and patches in user / system security context | | | | | | | | | | | | | | | | | | End-user interaction | Inform user Query user | | Enforcement Can the product prevent that a client failing the client health check connects to a network? | | | Behaviour detection Behavior detection | | | | Is this technology enabled by default? | | | | Is the firewall stateful for TCP and UDP connections? | | | Can the firewall analyze VPN traffic | | | | | | | | | | | | | | | | | | | | General capabilities | | Firewall Rules Does the product come with default policies? For workstations | | For server | | | | | | | | | | | | | | | | | | | Protocol TCP/UDP/ICMP | | Raw Ethernet | | Any other IP protocol is supported IPv6-ICMP, IGMP, GRE, ESP, SMP | | | | | | | Allow, Block, Ask and Notify are all allowed | | | | | | | | Other IGMP, GGP, GUP, IDP, GRE Which Actions can be taken when a firewall rule is triggered? Allow / Block traffic / Ask / notify the end-user when traffic is blocked Log Log the incident Include packet data in log | | Feature list AVIRA Bitdefender ESET F-Secure G DATA Ikarus Kaspersky Lab McAfee Sophos Symantec | | | | | | | | | | | | | | Can the administrator define rules that can be overridden by end-user rules? | | | | | | Can the end-user be allowed to disable the firewall? | | | | | | Can the firewall automatically be enabled after a defined time? | Can the end-user easily block all network traffic? | | | Can the end-user be allowed to see the network traffic in real time? | | | Can the firewall rules be exported and imported? | | | End-user Interaction Can end-users be allowed to create firewall rules? Can the administrator define rules that can not be overridden by end-user rules? | | | | | | | | | | | Client Management Client User Interface Can the administrator limit or control configuration changes by the end-user? | | | | | | | | | | Can different policies be applied for different computers? | | | | | | | | | | Depending on the location of the device (i.e. Office, Hotel, Home, etc) | | | | | | | | | Depending on group membership of the computer | | | | | | | | | | | | | | | Depending on group membership of the user (i.e. administrator vs. normal user) | | | | | | Actions Which actions can be initiated in administration console? Update signatures | | | | | Scan computer | | | | | | | | | | Enable/Disable On-Access Scan | | | | | | | | | | Enable/Disable Firewall | | | | | | | | | | Reboot computer Other Change all available product options Change all aspects of configuration, including handing off a client to another server | | | | Notifications on the enduser can be enabled/disabled Vulnerability Scan Application , Device and Web Controls, software inventory, hardare registry, remote control, remote installation of software and OS, patch deployment, network access blocking, running script, collecting traces for troubleshooting, send message to user, run/stop application, turn on computer, restart computer | | | | | | | | Scan for AV updates According to the nature of the specific action and according to the administrator needs Any set of computers or according to the administration groups hierarchy | | | | Enable/Disable all product features, reset statistics, Central administration, configuration changes, configuration, monitoring, quarantine managmenet, etc. of all available product software installation and features upgrades On which systems can the actions be initiated? A single computer / a group of computers | | All computers matching certain criteria (i.e. identified by logs or reports) Other Can the status of the actions be tracked? | On organization/network level | | | | | | Feature list AVIRA Bitdefender ESET F-Secure Is there a web based console? G DATA Ikarus Kaspersky Lab McAfee Sophos Symantec | | | | | | | | | | | | Administrator Management Rights / Access Control Does the product support multiple administrators and different access levels? | | | | | | | | | | | | | | | | | | | | | | | | | | | | Authentication mechanism Can administrators be authenticated using an integrated authentication mechanism (i.e. username / password)? Does the product enforce minimum password lengths and maximum password age? | | Can administrators be authenticated using Active Directory? | Account Security | Does the product log an administrator out after being idle for some time? Administrator Auditing | Does the product keep an audit log? | | | | | | Device Control Does the product allow administrators to limit the use of external devices (USB sticks, printers, etc)? | | | | Failover What if the AV Server (local) hangs up automatic switching to a second local server updates from vendor-server instead of local server | | | | | | Log and notifications Multiple proxy servers and proxy chaining supported | | | | | | | | other | | | | | | | | | | | service is automatically restarted any other network shared folder | | | | | | | | | | | | | | | | | | | Quarantine Quarantine Folder Is there a centralized quarantine-folder Is there a quarantine-folder on the client | can administrators specify the location of the quarantine folder anywhere | | | | rechecking quarantine after an signature update, is the quarantine folder checked? | automatically | manual | | undo av-action if false positive is detected | | | | | | | Messaging Exchange Feature overview Messaging Product for Exchange. Full Transport and storage AV integration with MS scanning, Spam Control, Monitoring, SMTP Groups, Exchange, scans the whole attachment filtering, Antivirus, Antispam, Exchange store and intelligent file type Transport and storage AV Content filtering, Antispam Protection. recognition, keywordScanning and extendable Attachment filtering, Managable from the based content filtering, by a MailSecurity Gateway Update central management zero-day protection, server. Supports 64-bit contralized quarantine Exchange. management Modules and functional areas Integrated option with MS Exchange and Domino. Secure email gateway option (virtual or physical appliance) for Enterprise Edition. Antispam, antivirus, antiphishing, content filtering, and data loss prevention Malware detection Recursive scan of all e-mails and file attachments in real time, event-and timecontrolled | | | | | | | Feature list AVIRA Bitdefender ESET F-Secure G DATA Information Store scan on every server | | | | | Support of automatic virus pattern updates | | | | Scanning of e-mail message text and attachments | | | | | | Definition of file limitations by a combination of file name, file extension and file size Ikarus Kaspersky Lab McAfee Sophos Symantec | | | | | | | | | | | | | | Application of the restrictions on file archives | | | | | | | | Automatic detection of new mailboxes | | | | | | | | Scanning of existing mailboxes | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Anti-Spam scan according to the company's policies on prohibited, not desirable or confidential content Blocking unwanted e-mail senders (spam senders, mailing lists, etc.) as well as to unwanted recipients (e.g. competitors) Analysis of images on undesirable content (e.g. pornography) Using current spam pattern for the fast detection of new spammer tricks User-Specific Management of White- and blacklists on the server solely for effective blocking unwanted e-mails Definition of transmitter / receiver channels on a dedicated e-mail communications Freely editable exclusion list for addresses and content in subject and message text Flexible notifications of blocked e-mails (directly or schedule) to administration or transmitter/receiver email | | | | | | | User-specific access to e-mails in the quarantine | Centralized quarantine management | Formation of company-specific e-mail categories | Automatic classification of e-mails to one or more categories | Response Management through defined classifications, for example, the customer support automatic forwarding of e-mails to qualified employees | | | | | | | | | | | | | | | | | | Document protection: Following categories may, for example, all outgoing emails on company-related content should be examined A content audit of e-mail attachments is also possible | | if the same mail is delivered several times, would it be blocked as spam | | | | | | | | | General Windows Feature overview Messaging Integration with most Windows mail servers is possible through the command line scanner Modules and functional areas Integrated option with MS Exchange and Domino. Secure email gateway option (virtual or physical appliance) for Enterprise Edition. Antispam, antivirus, antiphishing, content filtering, and data loss prevention Gateway solution, Exchange Plugin for Exchange 2007/2010/2013 or combination of both Malware detection Recursive scan of all e-mails and file attachments in real time, event-and timecontrolled | | | | Information Store scan on every server | | | | Support of automatic virus pattern updates | | | | Scanning of e-mail message text and attachments | | | | Definition of file limitations by a combination of file name, file extension and file size | | | Application of the restrictions on file archives such as zip, rar | | | | | | Automatic detection of new mailboxes | | | | | | | | | | | | | | | | | | | | | | | | | Feature list Scanning of existing mailboxes AVIRA Bitdefender | ESET F-Secure G DATA Ikarus Kaspersky Lab | | | | | Chinese, Czech, Danish, Dutch, English, Estonian, Finnish, French, German, Greek, Hungarian, Italian, Japanese, Korean, Norwegian, Polish, Portuguese, Romanian, Russian, Slovenian, Spanish, Swedish, Turkish German, English, Italian, Spanish, French, Russian, Polish, Turkish, Portuguese, Chinese, Japanese German, English, Italian, Russian, Turkish English, French, German, Japanese, Chinese, Russian, Spanish, Portuguese, Polish, Turkish, Arabic, Italian All English, German, Spanish, French, Japanese, Finnish, Italian, Swedish. German, English, Italian, Spanish, French, Polish German, English | | | English, Danish, Finnish, French, German, Cantonese, English, Japanese, Norwegian, Swedish McAfee Sophos Symantec | | Language: In which languages are your business/corporate products available? In which languages are your (help) manuals available? German, English, Italian, Japanese, Turkish, Spanish, Portuguese, French, Russian, Dutch, Chinese Korean Management Server and Console: English, Japanese, German, Russian, French, Spanish, Polish, Chinese, Portuguese, Italian. Client: Bulgarian, Chinese, Croatian, Czech, Danish, Dutch, English, Estonian, Finnish, French, German, Hungarian, Italian, English, French, Spanish, Japanese, Kazakh, Korean, German Norwegian, Polish, Portuguese, Romanian, Russian, Latin, Slovak, Slovenian, Spanish, Swedish, Thai, Turkish, Ukrainian, Lithuanian. German, English English, Portuguese, Chinese, Dutch, French, English, French, German, German, Hebrew, Italian, Italian, Japanese, Spanish, Japanese, Korean, Polish, Chinese Spanish, Swedish, Russian English, Chinese, Korean, French, Italian, German, Spanish, Portuguese, Russian, Czech, Polish, Japanese Support 24/7/365 phone support | | | German, English, Italian, Japanese, Turkish, Spanish, Portuguese, French, Russian, Dutch, Chinese Korean English, French, Spanish, German All Remote Desktop Control for support | | | Support per Forum | | | | Support over Email | | | | | | | | | | | | | | Avira Endpoint Security Small office Security by Bitdefender ESET Endpoint Antivirus F-Secure Business Suite G DATA Small Business Security IKARUS anti.virus 1 year Euro 193 202 150 306 167 3 years Euro 385 403 317 128 467 1 year USD 250 246 192 306 3 years USD 500 491 402 765 Avira Small Business Security Suite Small office Security by Bitdefender ESET Endpoint Antivirus + ESET File Security 1 year plan EURO 1 260 785 3 year plan EURO 2 520 1 570 Supported Support Languages On-Site service? | | | English, Portuguese, English, French, German, Chinese, Dutch, French, English, French, German, Italian, Spanish, German, Hebrew, Italian, Spanish, Italian, Japanese, Portuguese, Czech, Polish, Japanese, Korean, Polish, Chinese Russian, Chinese, Korean, Spanish, Swedish, Russian Japanese, Taiwanese German, English, Italian, Spanish, French German, English All | | | | | | | | | | | | | | | | | | | Service Managed by Vendor, this means, can the whole management process be done as a service by the vendor? | | | Kaspersky Small Office Security McAfee Small Business Security Sophos Endpoint Protection - Business Symantec Endpoint Protection Small Business Edition 34 132 196 214 162 55 301 343 428 389 167 44 229 210 244 175 467 70 498 367 488 419 F-Secure Business Suite G DATA Endpoint Protection Business IKARUS security.manager Kaspersky Small Office Security McAfee Small Business Security Sophos Endpoint Protection - Business Symantec Endpoint Protection Small Business Edition 473 942 753 910 744 1 610 656 300 993 2353 1 530 1 456 1 674 3 170 1312 692 Pricing (may vary) Scenario A: 5 clients, server, outlook as mail client recommended product Scenario B SMB: 1 SBS 2003 Server, 25 Clients recommended product Feature list AVIRA Bitdefender ESET F-Secure G DATA Ikarus Kaspersky Lab McAfee Sophos Symantec 1 year plan USD 1 638 958 601 942 753 1 170 985 1 509 731 316 3 year plan USD 3 276 1 916 1262 2353 1 530 1 871 2 313 3 169 1487 991 IKARUS security.manager Kaspersky Endpoint Security + Kaspersky Security for Mail Server McAfee Small Business Security Sophos Endpoint Protection - Business Symantec Protection Suite Enterprise Edition 5 454 5 158 6 738 3 950 5 292 8 726 11 607 11 861 7 900 10 079 Scenario C: 1 Fileserver, 1 Exchange server, 200 Clients 1 year plan EURO 7 620 8 199 4 815 4 842 G DATA Endpoint Protection Business + MailSecurity + ClientBackup 6 624 3 year plan EURO 15 240 16 399 10 113 12 104 14 112 1 year plan USD 9 906 10 046 6 122 4 842 6 624 7 009 5 838 8 005 4 500 4 944 3 year plan USD 19 812 20 092 12 856 12 104 14 112 11 214 11 677 14 089 9 000 9 310 IKARUS security.manager Kaspersky Endpoint Security + Kaspersky Security for Mail Server McAfee Endpoint Protection Suite Sophos Endpoint Protection - Business Symantec Protection Suite Enterprise Edition 19 057 18 617 28 545 18 000 27 075 recommended product Avira Business Security Suite Small office Security by ESET Endpoint Antivirus + Bitdefender + Bitdefender ESET File Security + ESET Mail Security Security for Exchange F-Secure Business Suite Scenario D, 2 Fileserver, 1 Exchange server, 1000 Clients 1 year plan EURO 21 300 29 850 15 821 15 857 G DATA Endpoint Protection Business + MailSecurity + ClientBackup 23 040 3 year plan EURO 42 600 59 700 33 244 39 638 47 520 30 491 41 899 50 240 27 000 61 563 1 year plan USD 27 690 36 387 20 111 15 857 23 040 24 492 22 389 32 939 20 250 20 060 3 year plan USD 55 380 72 774 42 260 39 638 47 520 39 187 44 767 57 973 40 500 44 579 IKARUS security.manager Kaspersky Endpoint Security + Kaspersky Security for Mail Server McAfee Endpoint Protection Suite Sophos Endpoint Protection - Business Symantec Protection Suite Enterprise Edition 120 240 186 170 162 224 180 000 220 820 recommended product Avira Business Security Suite Small office Security by ESET Endpoint Antivirus + Bitdefender + Bitdefender ESET File Security + ESET Mail Security Security for Exchange F-Secure Business Suite Scenario E: 10 Fileserver, 10 Exchange server, 10000 Clients 1 year plan EURO 136 000 259 254 116 084 81 763 G DATA Endpoint Protection Business + MailSecurity + ClientBackup 230 400 3 year plan EURO 272 000 518 508 243 176 204 408 475 200 192 384 418 990 285 470 270 000 530 030 1 year plan USD 176 800 316 239 147 566 81 763 230 400 154 530 223 890 187 174 202 500 159 960 3 year plan USD 353 600 632 477 309 125 204 408 475 200 247 251 447 670 329 357 405 000 388 788 recommended product Avira Business Security Suite Small office Security by ESET Endpoint Antivirus + Bitdefender + Bitdefender ESET File Security + ESET Mail Security Security for Exchange F-Secure Business Suite
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
Related manuals
Download PDF
advertisement