Skip to content

Competitive Benchmarks

Accurate benchmarking of security solutions is critical to users’ decision making. Today, many third-party tests show composite scores that do not allow the user to identify where in the kill chain the protection is provided. As such, Trend Micro has been advocating for a more detailed approach to testing in the industry, that is, to break out the different layers of these tests and thereby identify effectiveness at each layer.

Diagram Competitive-benchmarks

Why exposure layer matters

A single malicious server may serve up an infinite number of malicious files during its lifetime. As such, blocking the source of infection is a far better option than waiting to identify each file served up by the server at the endpoint. Blocking the source of the infection using IP, Domain and Web Reputation technologies benefits the user in a number of ways:

  • Malicious files served up by the infection source are blocked
  • Files are not downloaded to the device, thereby preserving bandwidth
  • Files are not scanned on the device, thereby preserving computing resources
     

To see the difference among industry competitors, we look at results published by independent testing lab, Veszprog for 1H 2013. Among the battery of tests Veszprog performs are endpoint exposure and infection layer tests.

Graph-maliciousurl-blocking-1h-13-131121 Graph-maliciousurl-end-to-end-1h-13-131121
Figure 1
Figure 2

 

Figure 1: Trend Micro blocks 72% of the threats at their source–the URL–whereas our competitors only block on average 26% of the threats. This demonstrates that instead of blocking the malware at its source, these competitors rely on on-device scanning techniques (signature, heuristics, behavior scanning) to identify most threats.

Figure 2: The end-to-end test shows how detection rates increase beyond the exposure layer. Trend Micro increased detection 8% beyond that of the exposure layer, for a total end-to-end of score of 80%, versus an industry average of nearly 72%.

Trend Micro’s proactive defense at the exposure layer is essential to effectively protecting customers from new threats as well as minimizing the impact on their computing resources.

 

Graph-phishing-url-1h-13-131126

Figure 3

 

Figure 3: Veszprog also tests blocking of phishing-based URLs, which have become standard in Blackhole Exploit Kit attacks. Trend Micro leads the industry by over 30% in this area.

open all

Global threat intelligence derived from our cloud-based detection and correlation technologies, and custom data mining tools, allows us to respond to today’s volume, variety, and velocity of threats efficiently and effectively.

AV-Comparatives' “Whole Product Dynamic Real World Protection Test” consistently ranks Trend Micro at the head of the pack against 20 other security vendors.

Avcomparatives Real World Results Put Trend Micro First

What's more, Trend Micro's performance is more consistent over time, demonstrating the strength of our approach and effectiveness of the Smart Protection Network framework.

Avcomparatives Real World Results Trend Over Time

Source: AV-Comparatives

 

In recent tests, NSS Labs found Trend Micro the fastest in protecting against, and #1 in detecting, phishing threats.

Nsslabs Consumer-phishing-time-to-protect

Trend Micro has best phishing detection rate in NSS Labs test

Windows 8 Security

Trend Micro was the top performer in PCSL's unique assessment

Trend Micro was the top performer in PC Security Labs' unique assessment of endpoint security products for Windows 8. They evaluated five vendors against Microsoft's free Windows Defender and rated their effectiveness based on user type. Read the March 2013 report

Diagram Pc-security-labs-benchmarks-windows8

Exploits

Trend Micro blocked all attacks in NSS Labs' test of 13 consumer products

The mission of endpoint protection is to defend users against exploits and malware when a patch is not available or has not yet been applied. NSS Labs conducted tests on 13 popular consumer antivirus products, to see how well they repelled attacks on systems not yet patched for the CVE-2012-1875 and CVE-2012-1889 Microsoft vulnerabilities uncovered in June and July 2012.

Trend Micro was one of only 4 of the 13 products to block all attacks. According to NSS Labs, “Exploit prevention remains a challenge for most products.”

Diagram Nss-labs-chart

Source: NSS Labs
 

For four consecutive quarters, Trend Micro messaging and mail server security has ranked first in Opus One anti-spam tests against eight leading security vendors including Barracuda Networks, Cisco, Google, McAfee, Microsoft, Proofpoint, Sophos, and Symantec (Figure 1).

Opus One’s methodology relies on actual corporate mail streams, manually analyzed for threats, providing significant real-world results, unlike results obtained through automated tests based on artificial mail streams.

Diagram Opusone-antispamresults

 Figure 1: Trend Micro email security consistently leads the industry

 

Diagram Opusoneantispamtesting-q1-13

Figure 2: Trend Micro has the highest in spam catch rate, outscoring 8 other competitors

Source: Opus One

AV-Test Certified November 2013

The smartphone has become a universal tool valued for its productivity and fun factor but hated for the problems it can bring. Malware targeting Google's Android platform increased over 1,000,000 apps in just one year, and the number of malicious and high-risk Android apps is expected to reach at least three million by the end of 2014.

In AV-Test's November 2013 benchmarking of 28 mobile security solutions, Trend Micro Mobile Security for Android excelled. Trend Micro Mobile Security rated high in protecting against both Android malware and potentially unwanted programs versus the average of all vendors in the test.


AV-Test November 2013 - Malicious Apps    AV-Test November 2013 - Unwanted Apps

Source: AV-test.org


Connect with us on