SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Anti‐Virus Comparative ‐ Performance Test (Suite Products) – May 2012    www.av‐comparatives.org 




Anti-Virus Comparative




Performance Test (Suite Products)
Impact of Internet Security Suites on System Performance




Language: English
May 2012
Last Revision: 15th June 2012

www.av-comparatives.org


 
Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012            www.av‐comparatives.org 




    Table of Contents



    1. Introduction                                                         3

    2. Tested products                                                      3 

    3. Test methods                                                         4 

    4. Side notes and comments                                              5 

    5. Test cases                                                           7

    6. Test results                                                         8 

    7. Award levels reached in this test                                   12 

    8. Copyright and Disclaimer                                            13 



                                                                  ‐ 2 ‐ 

 
Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012                                www.av‐comparatives.org 




Introduction

We want to make clear that the results in this report are intended to give only an indication of the
impact on system performance (mainly by the real-time/on-access components) of the various Inter-
net Security Suite products in these specific tests. Users are encouraged to try out the software on
their own PC’s and form an opinion based on their own observations.

Tested products

The following products were evaluated (with default settings) in this test in May 20121:

     AhnLab V3 Internet Security 8.0                           Kaspersky Internet Security 2012
     Avast! Internet Security 7.0                              McAfee Internet Security 2012
     AVG Internet Security 2012                                Panda Internet Security 2012
     AVIRA Internet Security 2012                              PC Tools Internet Security 2012
     Bitdefender Internet Security 2012                        Qihoo 360 Security 3.0
     ESET Smart Security 5.0                                   Sophos Endpoint Security 10.0
     F-Secure Internet Security 2012                           Tencent QQ PC Manager 6.6
     Fortinet FortiClient Lite Premium 4.2                     Trend Micro Titanium Internet Security 2012
     G DATA Internet Security 2013                             Webroot SecureAnywhere Complete 2012
     GFI Vipre Internet Security 2012



Please note that the results in this report apply only to the products/versions listed above (e.g. 64-
Bit versions, product version, default settings, etc.). Also, keep in mind that different vendors offer
different (and differing quantities of) features in their products.

The following activities/tests were performed under an up-to-date Windows 7 Home Premium SP1 64-
Bit:

          File copying
          Archiving / Unarchiving
          Encoding / Transcoding
          Installing / Uninstalling applications
          Launching applications
          Downloading files
          PC Mark 7 Professional Testing Suite




1
    We used the latest available product versions available at time of testing.
                                                                  ‐ 3 ‐ 

 
Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012                         www.av‐comparatives.org 




Test methods

The tests were performed on an Intel Core i7 920 machine with 4GB of RAM and SATAII hard disks.
The performance tests were done on a clean Windows 7 Home Premium SP1 64 Bit system and then
with the installed security software (with default settings). The tests have been done with an active
internet connection to simulate real world impact of cloud services/features.

The hard disks were defragmented before starting the various tests, and care was taken to minimize
other factors that could influence the measurements and/or comparability of the systems. Optimizing
processes/fingerprinting used by the products were also considered – this means that the results rep-
resent the impact on a system which has already been used by the user for a while. The tests were
repeated several times (with and without fingerprinting) in order to get mean values and filter out
measurement errors. After each run the workstation was defragmented and rebooted. We simulated
various file operations that a computer user would execute: copying2 different types of clean files
from one place to another, archiving and unarchiving files, encoding and transcoding3 audio and vid-
eo files, converting DVD-Files to iPod format, downloading files from Internet, launching applications,
etc. We also used a third-party industry recognized performance testing suite (PC Mark 7 Professional)
to measure the system impact during real-world product usage. Readers are invited to evaluate the
various products themselves, to see how they impact on their systems (such as software conflicts
and/or user preferences, as well as different system configurations that may lead to varying results).

Security products need to load on systems at an early stage to provide security from the very begin-
ning – this load has some impact on the time needed for a system to start up. Measuring boot times
accurately is challenging. The most significant issue is to define exactly when the system is fully
started, as many operating environments may continue to perform start-up activities for some time
after the system appears responsive to the user. It is also important to consider when the protection
provided by the security solution being tested is fully active, as this could be a useful measure of
boot completion as far as the security solution is concerned. Some Anti-Virus products are loading
their services very late (even minutes later) at boot (users may notice that after some time that the
system loaded, the system gets very slow for some moments), so the system looks like loading very
fast, but it just loads its services later and makes the system also insecure/vulnerable. As we do not
want to support such activities, we still do not measure boot times.

To support our concerns, we tested if the products are loading all their protection modules before e.g.
malware in the start-up folder is executed. Most products failed this test, except AhnLab, Avast, AVG,
Bitdefender, Panda, Sophos and Webroot. Only those products detected and blocked the malware be-
fore its execution after system start-up (by loading itself at an early stage). In all other cases first the
malware was successfully executed and only later detected by the security suites, when the system
was already compromised. The boot process for those products took only in some cases marginally
longer than the one of the products which loaded their modules later.




2
    We used 4GB data of various file categories (pictures, movies, audio files, various MS Office documents, PDF
    files, applications/executables, Microsoft Windows 7 system files, archives, etc.).
3
    Converting MP3 files to WAV, MP3 to WMA, AVI to MPG and MPG to AVI, as well as iPod format
                                                                  ‐ 4 ‐ 

 
Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012                 www.av‐comparatives.org 




Side notes and comments

The on-access/real-time scanner component of Anti-Virus software runs as a background process to
check all files that are accessed, in order to protect the system continuously against malware threats.
For example, on-access scanners scan files as soon as they are accessed, while (e.g.) behaviour-
blockers add a different layer of protection and monitor what the file does when it is already execut-
ed/running. The services and processes that run in the background to do these tasks also require and
use system resources. Suite products have usually a higher impact on system performance than Anti-
Virus-only products, as more services/features are included and running in the background.

Security products need to be active deep in the system in order to protect it and e.g. to scan process-
es and so on that are already active during the system start-up, to identify rootkits and other mal-
ware. Those procedures add some extra time and thus a delay in system boot/start up.

If a product takes up too many system resources, users get annoyed and may either disable or unin-
stall some essential protective features (and considerably compromise the security of their system) or
may switch to security software that is less resource-hungry. Therefore, it is important not only that
Anti-Virus software provides high detection rates and good protection against malware, but also that
it does not degrade system performance or trouble users.

While this report looks at how much impact various Internet Security products have on system perfor-
mance, it is not always just the security software which is the main factor responsible for a slow sys-
tem. Other factors also play a role, and if users follow some simple rules, system performance can be
improved noticeably. The next sections address some of the other factors that may play a part.

A few common problems observed on some user PCs:

     - Old hardware: If a PC already runs at a snail’s pace because it has ten-year-old hardware, us-
       ing modern (security) software may make it unusable.
       o If possible, buy a new PC that at least meets the minimum recommended requirements of
           the software you want to use. Multi-Core processors are preferable.
       o Adding more RAM does not hurt. If you use Windows XP or Windows 7, you should use a
           minimum of 2GB of RAM. If you use Vista switch to Windows 7. 64-Bit systems are prefer-
           able, as especially software which is optimized for such systems will run faster.
       o Make sure you have only ONE Anti-Virus program with real-time protection. If your new PC
           came with a trial Anti-Virus program, remove this before installing a different AV program.

      - Keep all your software up-to-date: Using an Anti-Virus version from e.g. 2009 does not pro-
        tect you as well as the newer version would, even though you may still be able to update the
        signatures. Please visit http://update.microsoft.com regularly and keep your operating system
        up-to-date by installing the recommended patches. Any software can have vulnerabilities and
        bugs, so keep all the software installed on your PC up-to-date: this will not only protect you
        against many exploits and vulnerabilities, but also give you any other application improve-
        ments that have been introduced.




                                                                  ‐ 5 ‐ 

 
Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012                   www.av‐comparatives.org 



     - Clean up the content of your hard disk:
       o If your hard disk is almost full, your system performance will suffer accordingly. Leave at
           least 20% of your disk space free and move your movies and other infrequently accessed
           files to another (external) disk. If money is not an issue, consider buying solid state
           drives (SSDs).
       o Uninstall unneeded software. Often, the slowdown that users notice after installing an
           Anti-Virus product is due to other software on the PC running in the background (that is,
           due to software conflicts or heavy file access by other programs, each access requiring an-
           ti-virus scanning).
       o Remove unneeded entries/shortcuts from the Autostart/start-up folder in the program
           menu
       o if your PC is already messed up by residual files and registry entries left over by hundreds
           of applications you installed and uninstalled after trying them out over the past years, re-
           install a clean operating system and install only software you really need (fewer software
           installations, fewer potential vulnerabilities and conflicts, and so on) and use e.g. an im-
           age/backup tool in order to ensure that you do not have to reinstall everything manually
           in future.

-    Defragment your hard disks regularly: A fragmented hard disk can have a very big impact on
     system performance as well as considerably increasing the time needed to boot up the system.

-    Fingerprinting/Optimization: most Anti-Virus products use various technologies to decrease
     their impact on system performance. Fingerprinting is such a technology, where already scanned
     files do not get rescanned again for a while (or more rarely) or are whitelisted. This increases the
     speed considerably (esp. after some time the PC was used), but also adds some little potential
     risk, as not all files are scanned anymore. It is up to the user to decide what to prefer. We sug-
     gest performing regularly a full-system scan (to be sure that all files are at least currently found
     as clean and to further optimize the fingerprinting).

-    Be patient: a delay of a few additional seconds due to Anti-Virus is not necessarily a big deal.
     However, if even with the suggestions above the performance of your PC still annoys you, for in-
     stance, after you have installed the Anti-Virus you should consider trying out another Anti-Virus
     product. (If you only notice a slow-down after using the Anti-Virus for a long time, there are
     probably other factors behind the slowdown). Never reduce your security by disabling essential
     protection features, just in the hope of gaining a slightly faster PC!




                                                                  ‐ 6 ‐ 

 
Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012                  www.av‐comparatives.org 




Test cases

File copying

Some Anti-Virus products do not scan all kind of files by design/default (e.g. based on their file
extensions), or use fingerprinting technologies, which may skip already scanned files in order to
increase the speed (see comments on page 6). We copied a set of different file types which are wide-
spread at home and office workstations from one physical hard disk to another physical hard disk.

Archiving and unarchiving

Archives are commonly used for file storage, and the impact of Anti-Virus software on the time taken
to create new archives or to unarchive files from existing archives may be of interest for most users.
We archived a set of different file types which are widespread at home and office workstations form
one physical hard disk to another physical hard disk and unzipped them after this again on a third
physical hard disk. The results already consider the fingerprinting/optimization technologies of the
Anti-Virus products, as most users usually make archives of files they have on their disk.

Encoding/transcoding

Music files are often stored and converted on home systems, and converting such files takes system
resources. Due that, many home users may be interested to know if their Anti-Virus product imposes a
slowdown while converting multimedia files from one format to another. We encoded and transcoded
some multimedia files with FFmpeg, and for the iPod conversion we used HandBrakeCLI. The impact
during FFmpeg and iPod converting was almost the same. All products were “very fast” in this test.

Installing/uninstalling applications

We installed several programs (like e.g. Visual C++, .NET Framework, etc.) with MSI installers, and
then uninstalled them and measured how long it took. We did not consider fingerprinting, because
usually an application is only installed once.

Launching applications

Office document files and PDF files are very common. We opened some large document files in Mi-
crosoft Office (and closed it) and some large PDF files in Adobe Acrobat Reader (and closed it). Before
each opening, the workstation was rebooted. The time taken for the viewer or editor application to
open and a document to be displayed was measured. Although we list the results for the first opening
and the subsequent openings, we consider the subsequent openings more important, as normally this
operation is done several times by users, and optimization features of the Anti-Virus products take
place, minimizing their impact on the systems.

Downloading files

Files are commonly downloaded from the internet. Nearly all products were “very fast” in this test.


                                                                  ‐ 7 ‐ 

 
Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012                  www.av‐comparatives.org 




Test results

These specific test results show the impact on system performance that Internet Security Suite prod-
ucts have, compared to the other tested Internet Security Suite products. The reported data just give
an indication and are not necessarily applicable in all circumstances, as too many factors can play an
additional part. As we noticed that delivering percentages gets easily misinterpreted by users (as well
as misused by marketing departments or the press) and percentages would need adjustments when
other hardware specifications are being used, we grouped the results by clustering them. The impact
within those categories does not statistically differ, also considering error measurements. The catego-
ries were defined by the testers by consulting statistical methods like hierarchal clustering and taking
into consideration what would be noticed from user’s perspective or compared to the impact of the
other security products.




                                                                  ‐ 8 ‐ 

 
Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012                                             www.av‐comparatives.org 




Overview of single AV-C performance scores
                                                                                        Installing/                          Launching applications
                            File copying                        Archiving/ Encoding/                                                                                                         Downloading
      Vendor                                                                          uninstalling                      Open Word               Open PDF 
                                                              unarchiving transcoding                                                                                                           files
                      On first run       On subsequent runs                           applications               On first run   On subsequent runs       On first run   On subsequent runs

    AhnLab                                                                                                                                                                                    
    Avast                                                                                                                                                                
    AVG                                                                                                                                                                  
    AVIRA                                                                                                                                                                
    Bitdefender                                                                                                                                                          
    BullGuard                                                                                                                                                                                 
    eScan                                                                                                                                                                
    ESET                                                                                                                                                                 
    F-Secure                                                                                                                                                             
    Fortinet                                                                                                                                                                                  
    G DATA                                                                                                                                                               
    GFI                                                                                                                                                                                       
    Kaspersky                                                                                                                                                            
    McAfee                                                                                                                                                               
    Panda                                                                                                                                                                
    PC Tools                                                                                                                                                             
    Qihoo                                                                                                                                                                
    Sophos                                                                                                                                                               
    Tencent                                                                                                                                                                                   
    Trend Micro                                                                                                                                                          
    Webroot                                                                                                                                                              
                                      




                  Key: 
                                     slow                     mediocre    fast         very fast 



                                                                                                    ‐ 9 ‐ 

 
Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012                      www.av‐comparatives.org 




PC Mark Tests

In order to provide an industry-recognized performance test, we used the PC Mark 7 Professional Edi-
tion4 testing suite. Users using PC Mark 7 should take care to minimize all external factors which
could affect the testing suite and follow strictly at least the considerations/suggestions documented
inside the PC Mark manual, in order to get consistent and valid/useful results. Furthermore, the tests
should be repeated several times to verify them. For more information about the various consumer
scenarios tests included in PC Mark, please read the whitepaper on their website5.

“Without AV” is tested on a baseline6 system which scores 100 points in the PC Mark test.

 


                                                                   PC Mark points
                                                 
                                               without AV                   100,0
                                               Webroot                       99,8
                                               Avast                         99,7
                                               ESET                          99,6
                                               Sophos                        99,4
                                               AVIRA                         99,4
                                               Qihoo                         99,2
                                               Tencent                       99,1
                                               F-Secure                      98,8
                                               Panda                         98,8
                                               Bitdefender                   98,6
                                               Kaspersky                     98,6
                                               AVG                           98,5
                                               eScan                         98,1
                                               AhnLab                        98,0
                                               Fortinet                      98,0
                                               GFI                           98,0
                                               G DATA                        98,0
                                               McAfee                        97,8
                                               Trend Micro                   96,7
                                               BullGuard                     96,3
                                               PC Tools                      96,1




4
  For more information, see http://www.pcmark.com/benchmarks/pcmark7/
5
  http://www.pcmark.com/wp-content/uploads/2011/05/PCMark7_Whitepaper.pdf (PDF)
6
  Baseline system: Intel Core i7 920 machine with 4GB of RAM, ATI Radeon HD4500 (512 MB)

                                                                  ‐ 10 ‐ 

 
Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012                        www.av‐comparatives.org 




Summarized results

Users should weight the various subtests according to their needs. We applied a scoring system in
order to sum up the various results.

For “file copying” we took the mean values (and rounded them up), as well as for “launching applica-
tions” (on subsequent runs). Like in previous performance reports, “very fast” gets 15 points, “fast”
gets 10 points, “mediocre” gets 5 points and “slow” gets zero points. This leads to the following re-
sults:

 

                                                  AV-C Score         PC Mark Score   TOTAL

                               Webroot                 88                   99,8     187,8
                               Avast                   88                   99,7     187,7
                               ESET                    88                   99,6     187,6
                               AVIRA                   88                   99,4     187,4
                               Sophos                  88                   99,4     187,4
                               Qihoo                   88                   99,2     187,2
                               Tencent                 88                   99,1     187,1
                               F-Secure                88                   98,8     186,8
                               Panda                   88                   98,8     186,8
                               Bitdefender             88                   98,6     186,6
                               Kaspersky               88                   98,6     186,6
                               AVG                     88                   98,5     186,5
                               eScan                   85                   98,1     184,1
                               AhnLab                  83                   98,0     181,0
                               McAfee                  83                   97,8     180,8
                               GFI                     78                   98,0     176,0
                               Trend Micro             78                   96,7     174,7
                               BullGuard               78                   96,3     174,3
                               G DATA                  76                   98,0     174,0
                               Fortinet                63                   98,0     161,0
                               PC Tools                63                   96,1     159,1




                                                                  ‐ 11 ‐ 

 
Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012                         www.av‐comparatives.org 




Award levels reached in this test

The following award levels are for the results reached in this performance test report. Please note that
the performance test only tells you how much impact an Internet Security Suite product may have on
a system compared to other Internet Security Suite products; it does not tell you anything about the
effectiveness of the protection a product provides.



                                          AWARDS                                PRODUCTS7

                                                                               Webroot
                                                                               Avast
                                                                               ESET
                                                                               AVIRA
                                                                               Sophos
                                                                               Qihoo
                                                                               Tencent
                                                                               F-Secure
                                                                               Panda
                                                                               Bitdefender
                                                                               Kaspersky
                                                                               AVG

                                                                               eScan
                                                                               AhnLab
                                                                               McAfee
                                                                               GFI
                                                                               Trend Micro
                                                                               BullGuard
                                                                               G DATA




                                                                             Fortinet
                                                                             PC Tools




The above awards have been given based on our assessment of the overall impact results with default
settings under an up-to-date Windows 7 Home Premium SP1 64 Bit system.




7
    We suggest considering products with the same award to be as good as the other products with same award.
                                                                  ‐ 12 ‐ 

 
Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012                        www.av‐comparatives.org 




Copyright and Disclaimer

This publication is Copyright © 2012 by AV-Comparatives e.V. ®. Any use of the results, etc. in whole
or in part, is ONLY permitted if the explicit written agreement of the management board of AV-
Comparatives e.V. is given prior to any publication. AV-Comparatives e.V. and its testers cannot be
held liable for any damage or loss, which might occur as a result of, or in connection with, the use of
the information provided in this paper. We take every possible care to ensure the correctness of the
basic data, but no representative of AV-Comparatives e.V. can he held liable for the accuracy of the
test results. We do not give any guarantee of the correctness, completeness, or suitability for a spe-
cific purpose of any of the information/content provided at any given time. No one else involved in
creating, producing or delivering test results shall be liable for any indirect, special or consequential
damage, or loss of profits, arising out of, or related to, the use or inability to use, the services pro-
vided by the website, test documents or any related data. AV-Comparatives e.V. is a Non-Profit Organ-
ization.

                                                                            AV-Comparatives e.V. (June 2012)




                                                                  ‐ 13 ‐ 

 

Weitere ähnliche Inhalte

Was ist angesagt?

Tool Qualification v12.02
Tool Qualification v12.02Tool Qualification v12.02
Tool Qualification v12.02iSYSTEM AG
 
NASA Software Safety Guidebook
NASA Software Safety GuidebookNASA Software Safety Guidebook
NASA Software Safety GuidebookVapula
 
A study of anti virus' response to unknown threats
A study of anti virus' response to unknown threatsA study of anti virus' response to unknown threats
A study of anti virus' response to unknown threatsUltraUploader
 
Top Ten things that have been proven to effect software reliability
Top Ten things that have been proven to effect software reliabilityTop Ten things that have been proven to effect software reliability
Top Ten things that have been proven to effect software reliabilityAnn Marie Neufelder
 
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedThomas Zimmermann
 
The Top Ten things that have been proven to effect software reliability
The Top Ten things that have been proven to effect software reliabilityThe Top Ten things that have been proven to effect software reliability
The Top Ten things that have been proven to effect software reliabilityAnn Marie Neufelder
 
Ch12-Software Engineering 9
Ch12-Software Engineering 9Ch12-Software Engineering 9
Ch12-Software Engineering 9Ian Sommerville
 
Deliver Certification Exams Online Conveniently and Securely Anytime. Anywhere
Deliver Certification Exams Online Conveniently and Securely Anytime. AnywhereDeliver Certification Exams Online Conveniently and Securely Anytime. Anywhere
Deliver Certification Exams Online Conveniently and Securely Anytime. AnywhereSoftware Secure, Inc.
 
77848485 upgrade-security-in-your-r12-upgrade
77848485 upgrade-security-in-your-r12-upgrade77848485 upgrade-security-in-your-r12-upgrade
77848485 upgrade-security-in-your-r12-upgraderaghu_sid
 
Overview of software reliability engineering
Overview of software reliability engineeringOverview of software reliability engineering
Overview of software reliability engineeringAnn Marie Neufelder
 
Software Reliability Engineering
Software Reliability EngineeringSoftware Reliability Engineering
Software Reliability Engineeringguest90cec6
 
Software reliability engineering
Software reliability engineeringSoftware reliability engineering
Software reliability engineeringMark Turner CRP
 
4 florin coada - dast automation, more value for less work
4   florin coada - dast automation, more value for less work4   florin coada - dast automation, more value for less work
4 florin coada - dast automation, more value for less workIevgenii Katsan
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & qualityNur Islam
 
Arun Prasad-R.DOCX
Arun Prasad-R.DOCXArun Prasad-R.DOCX
Arun Prasad-R.DOCXArun R
 

Was ist angesagt? (20)

Avc fd mar2012_intl_en
Avc fd mar2012_intl_enAvc fd mar2012_intl_en
Avc fd mar2012_intl_en
 
Testing
Testing Testing
Testing
 
Tool Qualification v12.02
Tool Qualification v12.02Tool Qualification v12.02
Tool Qualification v12.02
 
Iso26262 component reuse_webinar
Iso26262 component reuse_webinarIso26262 component reuse_webinar
Iso26262 component reuse_webinar
 
NASA Software Safety Guidebook
NASA Software Safety GuidebookNASA Software Safety Guidebook
NASA Software Safety Guidebook
 
A study of anti virus' response to unknown threats
A study of anti virus' response to unknown threatsA study of anti virus' response to unknown threats
A study of anti virus' response to unknown threats
 
Intro to android (gdays)
Intro to android (gdays)Intro to android (gdays)
Intro to android (gdays)
 
Top Ten things that have been proven to effect software reliability
Top Ten things that have been proven to effect software reliabilityTop Ten things that have been proven to effect software reliability
Top Ten things that have been proven to effect software reliability
 
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get Reopened
 
The Top Ten things that have been proven to effect software reliability
The Top Ten things that have been proven to effect software reliabilityThe Top Ten things that have been proven to effect software reliability
The Top Ten things that have been proven to effect software reliability
 
Ch12-Software Engineering 9
Ch12-Software Engineering 9Ch12-Software Engineering 9
Ch12-Software Engineering 9
 
Deliver Certification Exams Online Conveniently and Securely Anytime. Anywhere
Deliver Certification Exams Online Conveniently and Securely Anytime. AnywhereDeliver Certification Exams Online Conveniently and Securely Anytime. Anywhere
Deliver Certification Exams Online Conveniently and Securely Anytime. Anywhere
 
77848485 upgrade-security-in-your-r12-upgrade
77848485 upgrade-security-in-your-r12-upgrade77848485 upgrade-security-in-your-r12-upgrade
77848485 upgrade-security-in-your-r12-upgrade
 
Overview of software reliability engineering
Overview of software reliability engineeringOverview of software reliability engineering
Overview of software reliability engineering
 
Software Reliability Engineering
Software Reliability EngineeringSoftware Reliability Engineering
Software Reliability Engineering
 
Software reliability engineering
Software reliability engineeringSoftware reliability engineering
Software reliability engineering
 
Software reliability
Software reliabilitySoftware reliability
Software reliability
 
4 florin coada - dast automation, more value for less work
4   florin coada - dast automation, more value for less work4   florin coada - dast automation, more value for less work
4 florin coada - dast automation, more value for less work
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & quality
 
Arun Prasad-R.DOCX
Arun Prasad-R.DOCXArun Prasad-R.DOCX
Arun Prasad-R.DOCX
 

Ähnlich wie Impact of Internet Security Suites on System Performance

AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)Doryan Mathos
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010nuttakorn nakkerd
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017Jermund Ottermo
 
Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Doryan Mathos
 
Desktop applicationtesting
Desktop applicationtestingDesktop applicationtesting
Desktop applicationtestingAkss004
 
Manual testing visonia
Manual testing   visoniaManual testing   visonia
Manual testing visoniaVisoniaTechlab
 
Window Desktop Application Testing
Window Desktop Application TestingWindow Desktop Application Testing
Window Desktop Application TestingTrupti Jethva
 
Testing Presentation
Testing PresentationTesting Presentation
Testing Presentationsureshpkumar
 
Configuration testing
Configuration testingConfiguration testing
Configuration testingfarouq umar
 
STLC– software testing life cycle
STLC– software testing life cycleSTLC– software testing life cycle
STLC– software testing life cyclesubash kumar
 
Avc report25
Avc report25Avc report25
Avc report25Era Brown
 
Windows 7 – Application Compatibility Toolkit 5.5 Overview
Windows 7 – Application Compatibility Toolkit 5.5 OverviewWindows 7 – Application Compatibility Toolkit 5.5 Overview
Windows 7 – Application Compatibility Toolkit 5.5 OverviewVijay Raj
 
11 steps of testing process - By Harshil Barot
11 steps of testing process - By Harshil Barot11 steps of testing process - By Harshil Barot
11 steps of testing process - By Harshil BarotHarshil Barot
 

Ähnlich wie Impact of Internet Security Suites on System Performance (20)

AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)
 
Avc prot 2012b_en
Avc prot 2012b_enAvc prot 2012b_en
Avc prot 2012b_en
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010
 
Avc prot 2013a_en
Avc prot 2013a_enAvc prot 2013a_en
Avc prot 2013a_en
 
Avc fdt 201209_en
Avc fdt 201209_enAvc fdt 201209_en
Avc fdt 201209_en
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
 
Avc beh 201207_en
Avc beh 201207_enAvc beh 201207_en
Avc beh 201207_en
 
Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014
 
Desktop applicationtesting
Desktop applicationtestingDesktop applicationtesting
Desktop applicationtesting
 
Avc prot 2016a_en
Avc prot 2016a_enAvc prot 2016a_en
Avc prot 2016a_en
 
Manual testing visonia
Manual testing   visoniaManual testing   visonia
Manual testing visonia
 
Window Desktop Application Testing
Window Desktop Application TestingWindow Desktop Application Testing
Window Desktop Application Testing
 
Testing Presentation
Testing PresentationTesting Presentation
Testing Presentation
 
Configuration testing
Configuration testingConfiguration testing
Configuration testing
 
Test plan
Test planTest plan
Test plan
 
STLC– software testing life cycle
STLC– software testing life cycleSTLC– software testing life cycle
STLC– software testing life cycle
 
Avc report25
Avc report25Avc report25
Avc report25
 
Avc Report25
Avc Report25Avc Report25
Avc Report25
 
Windows 7 – Application Compatibility Toolkit 5.5 Overview
Windows 7 – Application Compatibility Toolkit 5.5 OverviewWindows 7 – Application Compatibility Toolkit 5.5 Overview
Windows 7 – Application Compatibility Toolkit 5.5 Overview
 
11 steps of testing process - By Harshil Barot
11 steps of testing process - By Harshil Barot11 steps of testing process - By Harshil Barot
11 steps of testing process - By Harshil Barot
 

Kürzlich hochgeladen

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Impact of Internet Security Suites on System Performance

  • 1. Anti‐Virus Comparative ‐ Performance Test (Suite Products) – May 2012  www.av‐comparatives.org  Anti-Virus Comparative Performance Test (Suite Products) Impact of Internet Security Suites on System Performance Language: English May 2012 Last Revision: 15th June 2012 www.av-comparatives.org  
  • 2. Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012  www.av‐comparatives.org  Table of Contents 1. Introduction 3 2. Tested products 3  3. Test methods 4  4. Side notes and comments 5  5. Test cases 7 6. Test results 8  7. Award levels reached in this test 12  8. Copyright and Disclaimer 13  ‐ 2 ‐   
  • 3. Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012  www.av‐comparatives.org  Introduction We want to make clear that the results in this report are intended to give only an indication of the impact on system performance (mainly by the real-time/on-access components) of the various Inter- net Security Suite products in these specific tests. Users are encouraged to try out the software on their own PC’s and form an opinion based on their own observations. Tested products The following products were evaluated (with default settings) in this test in May 20121: AhnLab V3 Internet Security 8.0 Kaspersky Internet Security 2012 Avast! Internet Security 7.0 McAfee Internet Security 2012 AVG Internet Security 2012 Panda Internet Security 2012 AVIRA Internet Security 2012 PC Tools Internet Security 2012 Bitdefender Internet Security 2012 Qihoo 360 Security 3.0 ESET Smart Security 5.0 Sophos Endpoint Security 10.0 F-Secure Internet Security 2012 Tencent QQ PC Manager 6.6 Fortinet FortiClient Lite Premium 4.2 Trend Micro Titanium Internet Security 2012 G DATA Internet Security 2013 Webroot SecureAnywhere Complete 2012 GFI Vipre Internet Security 2012 Please note that the results in this report apply only to the products/versions listed above (e.g. 64- Bit versions, product version, default settings, etc.). Also, keep in mind that different vendors offer different (and differing quantities of) features in their products. The following activities/tests were performed under an up-to-date Windows 7 Home Premium SP1 64- Bit:  File copying  Archiving / Unarchiving  Encoding / Transcoding  Installing / Uninstalling applications  Launching applications  Downloading files  PC Mark 7 Professional Testing Suite 1 We used the latest available product versions available at time of testing. ‐ 3 ‐   
  • 4. Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012  www.av‐comparatives.org  Test methods The tests were performed on an Intel Core i7 920 machine with 4GB of RAM and SATAII hard disks. The performance tests were done on a clean Windows 7 Home Premium SP1 64 Bit system and then with the installed security software (with default settings). The tests have been done with an active internet connection to simulate real world impact of cloud services/features. The hard disks were defragmented before starting the various tests, and care was taken to minimize other factors that could influence the measurements and/or comparability of the systems. Optimizing processes/fingerprinting used by the products were also considered – this means that the results rep- resent the impact on a system which has already been used by the user for a while. The tests were repeated several times (with and without fingerprinting) in order to get mean values and filter out measurement errors. After each run the workstation was defragmented and rebooted. We simulated various file operations that a computer user would execute: copying2 different types of clean files from one place to another, archiving and unarchiving files, encoding and transcoding3 audio and vid- eo files, converting DVD-Files to iPod format, downloading files from Internet, launching applications, etc. We also used a third-party industry recognized performance testing suite (PC Mark 7 Professional) to measure the system impact during real-world product usage. Readers are invited to evaluate the various products themselves, to see how they impact on their systems (such as software conflicts and/or user preferences, as well as different system configurations that may lead to varying results). Security products need to load on systems at an early stage to provide security from the very begin- ning – this load has some impact on the time needed for a system to start up. Measuring boot times accurately is challenging. The most significant issue is to define exactly when the system is fully started, as many operating environments may continue to perform start-up activities for some time after the system appears responsive to the user. It is also important to consider when the protection provided by the security solution being tested is fully active, as this could be a useful measure of boot completion as far as the security solution is concerned. Some Anti-Virus products are loading their services very late (even minutes later) at boot (users may notice that after some time that the system loaded, the system gets very slow for some moments), so the system looks like loading very fast, but it just loads its services later and makes the system also insecure/vulnerable. As we do not want to support such activities, we still do not measure boot times. To support our concerns, we tested if the products are loading all their protection modules before e.g. malware in the start-up folder is executed. Most products failed this test, except AhnLab, Avast, AVG, Bitdefender, Panda, Sophos and Webroot. Only those products detected and blocked the malware be- fore its execution after system start-up (by loading itself at an early stage). In all other cases first the malware was successfully executed and only later detected by the security suites, when the system was already compromised. The boot process for those products took only in some cases marginally longer than the one of the products which loaded their modules later. 2 We used 4GB data of various file categories (pictures, movies, audio files, various MS Office documents, PDF files, applications/executables, Microsoft Windows 7 system files, archives, etc.). 3 Converting MP3 files to WAV, MP3 to WMA, AVI to MPG and MPG to AVI, as well as iPod format ‐ 4 ‐   
  • 5. Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012  www.av‐comparatives.org  Side notes and comments The on-access/real-time scanner component of Anti-Virus software runs as a background process to check all files that are accessed, in order to protect the system continuously against malware threats. For example, on-access scanners scan files as soon as they are accessed, while (e.g.) behaviour- blockers add a different layer of protection and monitor what the file does when it is already execut- ed/running. The services and processes that run in the background to do these tasks also require and use system resources. Suite products have usually a higher impact on system performance than Anti- Virus-only products, as more services/features are included and running in the background. Security products need to be active deep in the system in order to protect it and e.g. to scan process- es and so on that are already active during the system start-up, to identify rootkits and other mal- ware. Those procedures add some extra time and thus a delay in system boot/start up. If a product takes up too many system resources, users get annoyed and may either disable or unin- stall some essential protective features (and considerably compromise the security of their system) or may switch to security software that is less resource-hungry. Therefore, it is important not only that Anti-Virus software provides high detection rates and good protection against malware, but also that it does not degrade system performance or trouble users. While this report looks at how much impact various Internet Security products have on system perfor- mance, it is not always just the security software which is the main factor responsible for a slow sys- tem. Other factors also play a role, and if users follow some simple rules, system performance can be improved noticeably. The next sections address some of the other factors that may play a part. A few common problems observed on some user PCs: - Old hardware: If a PC already runs at a snail’s pace because it has ten-year-old hardware, us- ing modern (security) software may make it unusable. o If possible, buy a new PC that at least meets the minimum recommended requirements of the software you want to use. Multi-Core processors are preferable. o Adding more RAM does not hurt. If you use Windows XP or Windows 7, you should use a minimum of 2GB of RAM. If you use Vista switch to Windows 7. 64-Bit systems are prefer- able, as especially software which is optimized for such systems will run faster. o Make sure you have only ONE Anti-Virus program with real-time protection. If your new PC came with a trial Anti-Virus program, remove this before installing a different AV program. - Keep all your software up-to-date: Using an Anti-Virus version from e.g. 2009 does not pro- tect you as well as the newer version would, even though you may still be able to update the signatures. Please visit http://update.microsoft.com regularly and keep your operating system up-to-date by installing the recommended patches. Any software can have vulnerabilities and bugs, so keep all the software installed on your PC up-to-date: this will not only protect you against many exploits and vulnerabilities, but also give you any other application improve- ments that have been introduced. ‐ 5 ‐   
  • 6. Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012  www.av‐comparatives.org  - Clean up the content of your hard disk: o If your hard disk is almost full, your system performance will suffer accordingly. Leave at least 20% of your disk space free and move your movies and other infrequently accessed files to another (external) disk. If money is not an issue, consider buying solid state drives (SSDs). o Uninstall unneeded software. Often, the slowdown that users notice after installing an Anti-Virus product is due to other software on the PC running in the background (that is, due to software conflicts or heavy file access by other programs, each access requiring an- ti-virus scanning). o Remove unneeded entries/shortcuts from the Autostart/start-up folder in the program menu o if your PC is already messed up by residual files and registry entries left over by hundreds of applications you installed and uninstalled after trying them out over the past years, re- install a clean operating system and install only software you really need (fewer software installations, fewer potential vulnerabilities and conflicts, and so on) and use e.g. an im- age/backup tool in order to ensure that you do not have to reinstall everything manually in future. - Defragment your hard disks regularly: A fragmented hard disk can have a very big impact on system performance as well as considerably increasing the time needed to boot up the system. - Fingerprinting/Optimization: most Anti-Virus products use various technologies to decrease their impact on system performance. Fingerprinting is such a technology, where already scanned files do not get rescanned again for a while (or more rarely) or are whitelisted. This increases the speed considerably (esp. after some time the PC was used), but also adds some little potential risk, as not all files are scanned anymore. It is up to the user to decide what to prefer. We sug- gest performing regularly a full-system scan (to be sure that all files are at least currently found as clean and to further optimize the fingerprinting). - Be patient: a delay of a few additional seconds due to Anti-Virus is not necessarily a big deal. However, if even with the suggestions above the performance of your PC still annoys you, for in- stance, after you have installed the Anti-Virus you should consider trying out another Anti-Virus product. (If you only notice a slow-down after using the Anti-Virus for a long time, there are probably other factors behind the slowdown). Never reduce your security by disabling essential protection features, just in the hope of gaining a slightly faster PC! ‐ 6 ‐   
  • 7. Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012  www.av‐comparatives.org  Test cases File copying Some Anti-Virus products do not scan all kind of files by design/default (e.g. based on their file extensions), or use fingerprinting technologies, which may skip already scanned files in order to increase the speed (see comments on page 6). We copied a set of different file types which are wide- spread at home and office workstations from one physical hard disk to another physical hard disk. Archiving and unarchiving Archives are commonly used for file storage, and the impact of Anti-Virus software on the time taken to create new archives or to unarchive files from existing archives may be of interest for most users. We archived a set of different file types which are widespread at home and office workstations form one physical hard disk to another physical hard disk and unzipped them after this again on a third physical hard disk. The results already consider the fingerprinting/optimization technologies of the Anti-Virus products, as most users usually make archives of files they have on their disk. Encoding/transcoding Music files are often stored and converted on home systems, and converting such files takes system resources. Due that, many home users may be interested to know if their Anti-Virus product imposes a slowdown while converting multimedia files from one format to another. We encoded and transcoded some multimedia files with FFmpeg, and for the iPod conversion we used HandBrakeCLI. The impact during FFmpeg and iPod converting was almost the same. All products were “very fast” in this test. Installing/uninstalling applications We installed several programs (like e.g. Visual C++, .NET Framework, etc.) with MSI installers, and then uninstalled them and measured how long it took. We did not consider fingerprinting, because usually an application is only installed once. Launching applications Office document files and PDF files are very common. We opened some large document files in Mi- crosoft Office (and closed it) and some large PDF files in Adobe Acrobat Reader (and closed it). Before each opening, the workstation was rebooted. The time taken for the viewer or editor application to open and a document to be displayed was measured. Although we list the results for the first opening and the subsequent openings, we consider the subsequent openings more important, as normally this operation is done several times by users, and optimization features of the Anti-Virus products take place, minimizing their impact on the systems. Downloading files Files are commonly downloaded from the internet. Nearly all products were “very fast” in this test. ‐ 7 ‐   
  • 8. Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012  www.av‐comparatives.org  Test results These specific test results show the impact on system performance that Internet Security Suite prod- ucts have, compared to the other tested Internet Security Suite products. The reported data just give an indication and are not necessarily applicable in all circumstances, as too many factors can play an additional part. As we noticed that delivering percentages gets easily misinterpreted by users (as well as misused by marketing departments or the press) and percentages would need adjustments when other hardware specifications are being used, we grouped the results by clustering them. The impact within those categories does not statistically differ, also considering error measurements. The catego- ries were defined by the testers by consulting statistical methods like hierarchal clustering and taking into consideration what would be noticed from user’s perspective or compared to the impact of the other security products. ‐ 8 ‐   
  • 9. Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012  www.av‐comparatives.org  Overview of single AV-C performance scores Installing/ Launching applications File copying Archiving/ Encoding/ Downloading Vendor  uninstalling Open Word  Open PDF  unarchiving transcoding files On first run On subsequent runs applications On first run On subsequent runs On first run On subsequent runs AhnLab                     Avast                   AVG                   AVIRA                   Bitdefender                   BullGuard                     eScan                   ESET                   F-Secure                   Fortinet                     G DATA                   GFI                     Kaspersky                   McAfee                   Panda                   PC Tools                   Qihoo                   Sophos                   Tencent                     Trend Micro                   Webroot                     Key:  slow  mediocre  fast  very fast  ‐ 9 ‐   
  • 10. Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012  www.av‐comparatives.org  PC Mark Tests In order to provide an industry-recognized performance test, we used the PC Mark 7 Professional Edi- tion4 testing suite. Users using PC Mark 7 should take care to minimize all external factors which could affect the testing suite and follow strictly at least the considerations/suggestions documented inside the PC Mark manual, in order to get consistent and valid/useful results. Furthermore, the tests should be repeated several times to verify them. For more information about the various consumer scenarios tests included in PC Mark, please read the whitepaper on their website5. “Without AV” is tested on a baseline6 system which scores 100 points in the PC Mark test.   PC Mark points    without AV 100,0 Webroot 99,8 Avast 99,7 ESET 99,6 Sophos 99,4 AVIRA 99,4 Qihoo 99,2 Tencent 99,1 F-Secure 98,8 Panda 98,8 Bitdefender 98,6 Kaspersky 98,6 AVG 98,5 eScan 98,1 AhnLab 98,0 Fortinet 98,0 GFI 98,0 G DATA 98,0 McAfee 97,8 Trend Micro 96,7 BullGuard 96,3 PC Tools 96,1 4 For more information, see http://www.pcmark.com/benchmarks/pcmark7/ 5 http://www.pcmark.com/wp-content/uploads/2011/05/PCMark7_Whitepaper.pdf (PDF) 6 Baseline system: Intel Core i7 920 machine with 4GB of RAM, ATI Radeon HD4500 (512 MB) ‐ 10 ‐   
  • 11. Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012  www.av‐comparatives.org  Summarized results Users should weight the various subtests according to their needs. We applied a scoring system in order to sum up the various results. For “file copying” we took the mean values (and rounded them up), as well as for “launching applica- tions” (on subsequent runs). Like in previous performance reports, “very fast” gets 15 points, “fast” gets 10 points, “mediocre” gets 5 points and “slow” gets zero points. This leads to the following re- sults:   AV-C Score PC Mark Score TOTAL Webroot 88 99,8 187,8 Avast 88 99,7 187,7 ESET 88 99,6 187,6 AVIRA 88 99,4 187,4 Sophos 88 99,4 187,4 Qihoo 88 99,2 187,2 Tencent 88 99,1 187,1 F-Secure 88 98,8 186,8 Panda 88 98,8 186,8 Bitdefender 88 98,6 186,6 Kaspersky 88 98,6 186,6 AVG 88 98,5 186,5 eScan 85 98,1 184,1 AhnLab 83 98,0 181,0 McAfee 83 97,8 180,8 GFI 78 98,0 176,0 Trend Micro 78 96,7 174,7 BullGuard 78 96,3 174,3 G DATA 76 98,0 174,0 Fortinet 63 98,0 161,0 PC Tools 63 96,1 159,1 ‐ 11 ‐   
  • 12. Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012  www.av‐comparatives.org  Award levels reached in this test The following award levels are for the results reached in this performance test report. Please note that the performance test only tells you how much impact an Internet Security Suite product may have on a system compared to other Internet Security Suite products; it does not tell you anything about the effectiveness of the protection a product provides. AWARDS PRODUCTS7  Webroot  Avast  ESET  AVIRA  Sophos  Qihoo  Tencent  F-Secure  Panda  Bitdefender  Kaspersky  AVG  eScan  AhnLab  McAfee  GFI  Trend Micro  BullGuard  G DATA  Fortinet  PC Tools The above awards have been given based on our assessment of the overall impact results with default settings under an up-to-date Windows 7 Home Premium SP1 64 Bit system. 7 We suggest considering products with the same award to be as good as the other products with same award. ‐ 12 ‐   
  • 13. Anti‐Virus Comparative ‐ Performance Test (Suite Products) ‐ May 2012  www.av‐comparatives.org  Copyright and Disclaimer This publication is Copyright © 2012 by AV-Comparatives e.V. ®. Any use of the results, etc. in whole or in part, is ONLY permitted if the explicit written agreement of the management board of AV- Comparatives e.V. is given prior to any publication. AV-Comparatives e.V. and its testers cannot be held liable for any damage or loss, which might occur as a result of, or in connection with, the use of the information provided in this paper. We take every possible care to ensure the correctness of the basic data, but no representative of AV-Comparatives e.V. can he held liable for the accuracy of the test results. We do not give any guarantee of the correctness, completeness, or suitability for a spe- cific purpose of any of the information/content provided at any given time. No one else involved in creating, producing or delivering test results shall be liable for any indirect, special or consequential damage, or loss of profits, arising out of, or related to, the use or inability to use, the services pro- vided by the website, test documents or any related data. AV-Comparatives e.V. is a Non-Profit Organ- ization. AV-Comparatives e.V. (June 2012) ‐ 13 ‐