bitde fender total security 2009download.bitdefender.com/...total_security_2009_comparative... ·...
TRANSCRIPT
CO The coinformDocum
OMPARA
omparative tesmation supply pument date: Nov
Tot
ATIVE A
t this documenurposes.
vember 2008
BitDeal Sec
ANALY
nt describes wa
efendecurity
SIS
as carried out b
er y 2009
by the BitDefen
9
nder Team for
BitD
Do
Bit
K
efender To
ocumenThe purposeneeded to su2009. The d- BitDefen- Key Ben- Summar- Feature-- Features- Conclus
DefendBitDefender e-threats suclead to loss solutions arePCs functionwith always-
Key features• State-of-t• Defensiv
fraud atte• Preventio• New ada• Parental • Automate
data stor• Improved• Online ba• Easy to u
network (• IM encry• File vault• Vulnerab• Laptop m
mobile se
CertificatioThe BitDefeorganization
otal Securi
nt Overve of this docuupport markeocument is stnder Total Senefits ry Comparativ-Based Comps Description
sions
der Totasecurity solu
ch as virusesof personal fie tailored to aning mostly of-on, unfiltered
s the-art proacte layer againempts on of unauthoaptive engines
control blocked incrementarage on local od PC performaackup optionsuse remote ho(new) ption for keept, a secured sbility scan monmode for optimettings (new)
ons and awander 2008 pro
ns and the rec
ity 2009 |
view ment is to pro
eting and saletructured as fcurity overvie
ve Table parative Table
al Secutions provide
s, spyware, hales, identity th
accommodateff-line or in a
d Internet con
tive protectionst phishing at
orized accesss for faster ans access to inal backup witor removableance throughs for emergenome manage
ping eavesdrostorage spacenitoring your o
mized resourc
ards oducts have ecognition of to
Comparat
ovide marketes actions relafollows: ew
e
urity proactive staackers, spamheft and slow
e different comsecure LAN tnections.
n against newttacks by filte
to Wi-Fi netwnd more reliabnappropriate wh numerous o
e drives. fine tunning
ncy or unpredment for secu
opper away fre for personaloperating sys
ce allocation d
earned top mop industry pu
tive Analys
ers and partneated to BitDef
ate of the art p, and phishing
wer system pemputer usageto first-line de
w viruses ring all acces
work ble spam detewebsites andoptions for ad
modules (newicted situation
uring an entire
rom your IM tr information (
stem for vulneduring scans,
arks from indublications.
sis
ers with the infender Total S
protection agag attacks whirformance. T scenarios ra
efense for com
ssed web pag
ection and blod e-mail dditional copie
w) ns (new) e home or ho
raffic (new) (new) erabilities (new
backups and
dependent tes
nformation Security
ainst ch can he nging from
mputers
es for
ocking
es of vital
me office
w) d other
sting
BitDefender Total Security 2009 | Comparative Analysis
3
Key Benefits
BENEFIT FEATURES AV IS TS
Confidently download, share and open files from friends, family, co-workers – and even total strangers!
Improved: Scans all web, e-mail and instant messaging traffic for viruses and spyware, in real-time.
● ● ●
Proactively protects your PC against brand new virus outbreaks using advanced heuristics.
● ● ●
Protect your identity - shop, bank, listen, watch privately and securely.
Blocks attempted identity theft (phishing). ● ● ●
Improved: Prevents personal information from leaking via e-mail, web or instant messaging.
● ● ●
Guard your files and conversations with top-of-the line encryption and backup.
New: Instant Messaging Encryption ● ● ●
New: File Vault securely stores personal information or sensitive files.
● ●
Automatically backs up files and folders locally.
●
New: Provides secure on-line storage and sharing.
●
Connect securely to any network at home, in the office or away.
Automatically modifies firewall protection settings to suit the location's options...
● ●
Wi-Fi monitor helps prevent unauthorized access to your Wi-Fi network.
● ●
Protect your family and computers!
Blocks access to inappropriate websites and e-mail.
● ●
Schedules and limits children's access to Internet and applications.
● ●
Play safe, play seamlessly!
Improved: Reduces the system load and avoids user interaction requests during games.
● ● ●
Get finely-tuned performance from your computer!
Uses few system resources. ● ● ●
New: Laptop mode prolongs battery life ● ● ●
Removes unnecessary duplicates of files and registry entries.
●
Irrecoverably erases unwanted files and "traces" of files.
●
Be in control, stay in control!
New: Manages the security of your entire home network.
● ● ●
Use the dashboard to fix security issues with just one click.
● ● ●
Choose automatically the best protection measures to apply.
● ● ●
Let professionals solve any security issues! Free product lifetime technical support. ● ● ●
4
Summary Comparative Table
BitDefender Total
Security 2009
Symantec Norton 360
v2
McAfee Total
Protection 2009
Microsoft OneCare
v2.5
Trend Micro Internet Security
2009
Kaspersky Internet Security
2009
F-Secure Internet Security
2009
Norton Internet Security
2009
Panda Global
Security 2009
Eset Smart Security v3
G Data Total Care 2009
Antivirus
Firewall
Wi-Fi management
Home management
Antispam ^
Anti-phishing
Anti-rootkit
Parental control ^ ^
Web time limiter
IM encryption
Gamer mode
Laptop mode + ++
Settings protection
Trace clean-up
Vulnerability scan
Registry cleaner
Duplicate finder
Local backup
Online backup ^^ *** ~~
File vault ~
Detection rate* 98.10% 96.18% 86.40% 96.01% 95.48% 97.49% 97.97% 96.18% 93.31% 93.65% 99.26%
Proactive detection** 63% 38% 43% n/a 30% 45% 36% 38% 24% 59% n/a
Update frequency hourly hourly 2-3/day 2-3/day 2-6/day hourly 2-6/day hourly hourly 2-4/day hourly
Checkmark Anti-malware / Firewall / / / / / / / / / / /
* According to Av-test.org, November 2007 **According to Anti-Malware Test Lab, January 2008 ***Only Photo Backup (additional cost) ^Optional Add-on ^^Only for some countries +Disable scheduled scans ++Silent mode ~Bonus McAfee Anti-Theft ~~ Additional, only for some countries
BitDefender Total Security 2009 | Comparative Analysis
5
Feature-Based Comparative Table (Part 1)
=
BitDefender Total
Security 2009 Symantec
Norton 360 v2 McAfee Total
Protection 2009
Microsoft Onecare v2.5
Trend Micro Internet
Security Pro 2009
Kaspersky Internet
Security 2009
Antivirus & Antispyware Real-time antivirus and antispyware protection
Detection rate (av-test.org, November 2007)
98.10% 96.18% 86.40% 96.01% 95.48% 97.49%
Proactive detection (Anti-malware Test, Jan 2008)
63% 38% 43% N/A 30% 45%
Update frequency Hourly Hourly 2-3/day 2-3/day 2-6/day Hourly
Detect viruses in archives (ace, arc, arj, cab, gz, ha, imp, rar, tar, zip)
All from list arj, cab, rar, tar, gzip, zip
arc, arj, cab, rar, zip, tar
ace, arj, cab, arc, gzip, rar, zip, tar
ace, arj, cab, rar, zip,
lha
ace, arj, cab, rar, zip,
tar, gzip
Clean archived files
zip, tar, czip, gzip,
rpm zip, gzip, tar zip tar zip, lha zip, gzip, tar
Detect and remove rootkits
Preset security levels Scan e-mail traffic Scan web(HTTP) traffic Narrow on-access scanning target
Run scan tasks at low priority
Scheduled scan tasks
Anti-phishing Filter phishing e-mails Web anti-phishing
Antispam Antispam filter Integration with Outlook / Outlook Express / Thunderbird
/ / / / / / / / / / / /
Wizard to train the antispam filter
Charset block NeuNet (Neural network) Image filter
Ctrl+Click links for
more info
BitDefender Total Security 2009 | Comparative Analysis
6
=
BitDefender Total
Security 2009 Symantec
Norton 360 v2 McAfee Total
Protection 2009
Microsoft Onecare v2.5
Trend Micro Internet
Security Pro 2009
Kaspersky Internet
Security 2009
Firewall Two-way firewall Stealth mode Database of known applications
Wi-Fi management Firewall zones
Parental control Keyword filter Privacy protection Web time limiter Application control Website filter
TuneUp Find duplicate files Clean temporary internet files and cookies
Trace clean-up Registry cleaner
Backup Local backup Backup scheduler
Online Backup
Incremental backup
^ ** Differential backup
^ Versioned backup
^ ** Encryption data
^ Email backup report
^ Scheduler backup
^ ** Online file sharing
^ Web interface accessible from anywhere
^ **
Encryption Instant Messaging Encryption
File Vault ~
Home network management Visual network map
BitDefender Total Security 2009 | Comparative Analysis
7
=
BitDefender Total
Security 2009 Symantec
Norton 360 v2 McAfee Total
Protection 2009
Microsoft Onecare v2.5
Trend Micro Internet
Security Pro 2009
Kaspersky Internet
Security 2009
Register the computer Run a scan task Run an update Run a tuneup task Fix issues on the computer
Apply a parental control profile
Set the computer as update server on the network
Usability Protection status for each module
‘Fix all issues’ option Multi user support
Compatibility Unicode support Windows 64b support Windows Vista support
Performance
Boot time (seconds)* 26,170 23,649 21,966 23,220 32,934 22,730
On-access memory - RAM (Mb)*
33,81 12,69 71,61 102,10 55,25 28,64
On-demand memory -RAM (Mb)*
62,61 57,11 190,25 114,77 78,21 102,42
On-access processor usage (%)*
1,20 4,28 64,81 44,83 4,12 30,31
On-demand processor usage (%)*
54,91 49,53 77,75 80,12 72,39 27,08
Archive time (zip) (seconds)*
19,47 21,18 51,32 28,41 35,53 14,38
Extract time (unzip) (seconds)*
23,08 20,09 48,76 27,38 58,46 13,40
On-demand scan time (seconds)*
296,00 254,65 299,95 574,80 423,57 126,00
Others Gamer mode Laptop mode Vulnerability Scanning Settings protection
BitDefender Total Security 2009 | Comparative Analysis
8
=
BitDefender Total
Security 2009 Symantec
Norton 360 v2 McAfee Total
Protection 2009
Microsoft Onecare v2.5
Trend Micro Internet
Security Pro 2009
Kaspersky Internet
Security 2009
Update on-the-fy Password-protected settings
Scan during installation
*
according to tests carried out by BitDefender
** Only Photo Backup (additional cost) ^ Only for some countries ~ Bonus McAfee Anti-Theft
Feature-Based Comparative Table (Part 2)
BitDefender Total Security
2009
F-Secure Internet
Security 2009
Norton Internet
Security 2009 Panda Global Security 2009
Eset Smart Security v3
G Data Total Care 2009
Antivirus Real-time antivirus and antispyware protection
Detection rate (av-test.org, November 2007)
98.10% 97.97% 96,18% 93.31% 93,65% 99.26%
Proactive detection (Anti-malware Test, Jan 2008)
63% 36% 38% 24% 59% n/a
Update frequency Hourly 2-6/day Hourly Hourly 2-4/day Hourly
Detect viruses in archives (ace, arc, arj, cab, gzip, ha, imp, rar, tar, zip)
All from list ace, ha, arj, cab, rar, tar,
zip, gzip
arj, cab, rar, tar, gzip, zip
ace, arc, arj, cab, rar, zip,
gzip, tar
ace, arj, cab, tar,
gzip, rar, zip All from list
Clean archived files
zip, tar, czip, gzip, rpm zip, tar, gzip zip, gzip, arj,
tar zip, tar, gzip
Detect and remove rootkits
Preset security levels Scan e-mail traffic Scan web(HTTP) traffic Narrow on-access scanning target
Run scan tasks at low priority
Scheduled scan tasks
BitDefender Total Security 2009 | Comparative Analysis
9
BitDefender Total Security
2009
F-Secure Internet
Security 2009
Norton Internet
Security 2009 Panda Global Security 2009
Eset Smart Security v3
G Data Total Care 2009
Anti-phishing Filter phishing e-mails Web anti-phishing
Antispam Antispam filter Integration with Outlook / Outlook Express / Thunderbird
/ / / / / / / / / / / /
Wizard to train the antispam filter
Charset block NeuNet (Neural network) Image filter
Firewall Two-way firewall Stealth mode Database of known applications
Predefined network types Wi-Fi management Firewall zones
Parental control Keyword filter Privacy protection Web time limiter Application control Website filter
TuneUp Find duplicate files Clean temporary internet files and cookies
Trace clean-up Registry cleaner
BackUp Local backup Backup scheduler
Online BackUp
Incremental backup
^
BitDefender Total Security 2009 | Comparative Analysis
10
BitDefender Total Security
2009
F-Secure Internet
Security 2009
Norton Internet
Security 2009 Panda Global Security 2009
Eset Smart Security v3
G Data Total Care 2009
Differential backup
^ Versioned backup
^ Encryption data
^ Email backup report
^ Scheduler backup
^ Online file sharing
^ Web interface accessible from anywhere
^
Encryption Instant Messaging Encryption
File Vault
Home network management Visual network map Register the computer Run a scan task Run an update Run a tuneup task Fix issues on the computer
Apply a parental control profile
Set the computer as update server on the network
Usability Protection status for each module
‘Fix all issues’ option Multi user support
Compatibility Unicode support Windows 64b support Windows Vista support
Performance
Boot time (seconds)* 26,170 29,441 23,894 29,960 21,216 35,038
On-access memory - RAM (Mb)*
33,81 161,59 10,51 148,42 46,14 205,81
On-demand memory -RAM (Mb)*
62,61 160,73 63,67 192,09 49,54 293,33
BitDefender Total Security 2009 | Comparative Analysis
11
BitDefender Total Security
2009
F-Secure Internet
Security 2009
Norton Internet
Security 2009 Panda Global Security 2009
Eset Smart Security v3
G Data Total Care 2009
On-access processor usage (%)*
1,20 37,79 0,46 11,03 24,63 8,95
On-demand processor usage (%)*
54,91 82,89 47,47 55,35 78,48 13,74
Archive time (zip) (seconds)*
19,47 39,59 24,02 17,61 13,75 53,87
Extract time (unzip) (seconds)*
23,08 50,05 21,76 16,76 17,25 12,89
On-demand scan time (seconds)*
296,00 525,60 75,40 301,00 303,80 319,40
Others Gamer mode Laptop mode Vulnerability Scanning Settings protection Update on-the-fly Password-protected settings
Scan during installation
*
according to tests carried out by BitDefender
^ Only for some countries
BitD
Fea
AntReal-
Detec
Proac
efender To
atures
tivirus an-time antivirA real-time vaccess (cop
ction rate Detection raset of virus sin Germany,protection agperformed inbackdoors, T
ctive detectProactivity isunknown threxclusively bmethod).
Th(ht
.
Panda Secu
Trend M
F‐Se
Syma
McA
Kaspe
BitDefen
otal Securi
Descri
nd Antisprus and antivirus and spywy, move, edit
ate is an indicasamples. Acc, BitDefender gainst Internen November 2Trojans and w
tion s a metric aboreats. The chabased on thei
he test was pettp://www.ant
0%
urity
Micro
cure
ntec
Afee
ersky
Eset
nder
ity 2009 |
ption
pyware spyware prware scanner).
ator of how mording to the is the most re
et threats, with2007 on a numworms.
out the way aart below repr behavior (ra
erformed by Ai-malware-tes
10% 2
Proactive
Comparat
otection r (virus shield
many viruses aindependent eliable singleh a 98.10% dmber of 1041
n antivirus coresents the pather than on
Anti-Malware st.com/?q=no
20% 30%
e antivirus
tive Analys
d) blocks infec
an antivirus dtest lab AV-T-engine produ
detection rate180 virus sam
opes with newercentage of the traditiona
Test Lab in Jode/39)
% 40%
s protection
sis
cted or suspe
detects out of Test (www.av-uct in point ofe. The test wamples includin
w and previouthreats detec
al virus signat
January 2008
50%
n test
ct files on-
a chosen -test.org) f as ng bots,
sly-cted ture
60%
70%
BitDefender Total Security 2009 | Comparative Analysis
13
Update frequency Traditional virus detection consists of identifying infected files based on signatures which are gradually stored in a constantly updated database. The more frequently the database is updated, the higher the chance of new viruses being detected. BitDefender is updated hourly so that our users are protected against the latest threats without pushing a button.
Virus detection and cleaning of archived files This feature can be successfully employed to disinfect and repair partially or totally compromised archives which include important information only part of which is infected. BitDefender can disinfect files located inside the following types of archives: zip, tar, czip, gzip and rpm.
Rootkit detection and removal Rootkits are malicious pieces of software designed to control a PC while staying hidden. As this kind of threats are identified based on their traces, BitDefender comes with a special rootkit removal tool which practically detects such traces.
Pre-set security levels Having different preset security levels allows users to choose the protection level that suits their security needs, with a click.
Scan incoming and outgoing email (POP3 and SMTP) BitDefender filters incoming and outgoing e-mail messages, regardless of the e-mail client (OutlookTM, Outlook ExpressTM, The Bat!TM, Netscape®, etc.), without any additional configuration.
Scan web (HTTP) traffic A web traffic filter that blocks viruses even before they reach the browser, reducing the risk of infections.
Narrow on-access scanning target This feature provides options for several scanning modes: specific drives, folders or even files. BitDefender Total Security 2009 allows defining custom scanning tasks that applies to user-selected items.
Run scan tasks at low priority This option decreases the priority of the scan process, allowing other programs to run faster. However, a low priority scan process will take longer to complete.
Scheduled scan tasks A task scheduler enables users to plan ahead and schedule full system/drive scans in the off hours, when the computer is not used.
BitDefender Total Security 2009 | Comparative Analysis
14
Anti-phishing Filter phishing emails
BitDefender’s new phishing detector keeps the computer clear of malicious e-mails that tries to trick people into giving away their bank account information or other sensitive data.
Web Anti-phishing Protects against phishing attempts by filtering all accessed web pages. BitDefender Total Security 2009 notifies the user and prompts for a decision when a web site is detected as phished.
Antispam Antispam filter
Antispam filters keep the inbox free of unsolicited mail by classifying messages based on various techniques and patterns.
Integration with Outlook, Outlook Express and Thunderbird While the antispam usually filters messages regardless of the email client type, some products have a stronger integration with programs like Microsoft OutlookTM or Outlook ExpressTM, which allows users to fine tune the antispam filter.
Wizard to train the antispam filter To further improve the efficiency of its antispam module and eliminate false positives, BitDefender Total Security 2009 includes a wizard that helps train the Bayesian filter to recognize spam based on the messages already received.
Charset block The Charset Filter blocks any e-mail written in "strange" characters, a very well known characteristic of spam.
NeuNet (Neural network) The new antispam filter available in BitDefender Total Security 2009 uses a Neural Network (a concept borrowed from the field of Artificial Intelligence) to deal with the new spam messages sent every day. Its main advantage is that it can recognize new spam by perceiving similarities (oftentimes very subtle) between the new messages received and the ones it was trained on.
Image Filter Based on a constantly updated database, this filter adds a spam score to e-mails containing pictures that are common to spam.
BitDefender Total Security 2009 | Comparative Analysis
15
Firewall Two-way firewall
The firewall keeps intruders away and controls the access of applications to the Internet. Users can define exactly which incoming or outgoing connections to permit/deny based on specific protocols, ports, applications and/or remote addresses.
Stealth mode (block port scans) Port scans are attempts to connect to ports in order to discover whether or not a computer is vulnerable. The Stealth Mode option in BitDefender Total Security 2009 prevents the PC from responding to port scans, which makes it virtually invisible in the network.
Database of known applications BitDefender Total Security 2009 maintains a database of trusted applications, and informs users whether or not the applications demanding network access are trustworthy. In this way, users can better decide when allowing or denying these applications. Alternatively, BitDefender Total Security 2009 can automatically grant access to trusted applications.
Predefined network types BitDefender Total Security 2009 provides predefined network policies to help users better configure the firewall.
Wi-Fi management The Wi-Fi management feature helps prevent unauthorized access to the Wi-Fi internet connection by notifying users about computers that log in to the network. Users are also informed when connecting to an open Wi-Fi network which is automatically classified as “untrusted”.
Firewall zones Zones are IP addresses, individual or multiple, covered by special rules within profiles. Based on these zones, the respective IPs are allowed or denied access to users’ PCs. By default, BitDefender automatically adds zones for specific network configurations. For example, an open wireless network is always considered as an untrusted zone.
Parental control Keyword filter
The keyword filter blocks e-mail messages or web pages which contain specific words or phrases.
Privacy protection The privacy guard monitors the outgoing HTTP (web) and SMTP (mail) traffic for what might be personal information – such as credit card numbers, Social Security numbers and other user-defined strings (e.g. bits of passwords).
Web time limiter The web time limiter enables users to allow or prevent other users or applications from accessing the web during specific time frames.
BitDefender Total Security 2009 | Comparative Analysis
16
Application control This option limits the access to specific applications such as games and messaging software.
Website filter Heuristic website filters automatically classify web pages based on their content and other details so that pages with an inappropriate content are blocked. Instead of relying only on keywords, this approach applies antispam research principles when classifying web pages.
TuneUp Find duplicate files
The duplicate finder checks for duplicate files, applications or media that have been downloaded multiple times or for documents saved in multiple places by mistake. Once the unnecessary copies have been identified, the duplicate finder presents the user with several options to free up valuable disk space.
Clean temporary internet files and cookies Cleaning temporary Internet files and cookies frees disk space and helps protect users’ privacy.
Trace clean-up Trace clean-up completely erases files and "traces" of files from the hard disk to prevent their unauthorized recovery.
Registry cleaner Some of the registry keys associated with applications removed by the user might not be deleted and continue to remain in the Windows Registry causing system slowdowns and even instability. To improve system performance, the Registry Cleaner scans the Windows Registry and deletes the invalid registry keys.
Backup While the file vault enables the user to keep sensitive files in an encrypted vault stored on the computer, Online backup enables the user to do additional copies of their files in an online location. In both cases files are encrypted and a password is required to access the documents. Offline backup makes supplemental copies of a file on a different partition, in a network location or on a CD/DVD.
Local backup BitDefender Total Security 2009 is fitted with a new module which safeguards users’ data by creating backup copies to local and removable drives, CD-R/RW or DVD-R/RW. This module is set to automatically back up only new files, based on a pre-set schedule. While the file vault enables the user to keep sensitive files in an encrypted vault stored on the computer, Online backup enables the users to do reserve copies of their files in an online location. In both cases files are encrypted and a password is required in order to access the documents. Offline backup makes reserve copies of a file on a different partition, in a network location or on a CD/DVD.
BitDefender Total Security 2009 | Comparative Analysis
17
Backup scheduler The backup process can be performed based on a previously set schedule so that users will not have to deal with this task repeatedly.
Online Backup While the file vault enables the user to keep sensitive files in an encrypted vault stored on the computer, Online backup enables the users to do reserve copies of their files in an online location. In both cases files are encrypted and a password is required in order to access the documents. Offline backup makes reserve copies of a file on a different partition, in a network location or on a CD/DVD.
Incremental backup Ensures that only newly modified files from the list of files scheduled to be backed up are uploaded. The differential backup feature guarantees that only the modified parts of files are uploaded and not the entire file, reducing bandwidth usage and backup times.
Differential backup Examines each changed file and determines exactly which binary digits (which ones and zeros) were changed since the last backup; it transfers only that data to the backup grid. The advantage of this solution is the substantially reduced recovery time, requiring only a full backup and the latest differential backup to restore the system.
Versioned backup Provides versioning for the files that have been backed up, meaning that multiple versions of the same file are backed up, without deleting/overwriting older versions. This option enables the user to restore older versions of the same file at any time.
Encryption data Encrypt your data locally with a unique encryption key. The backup is secured before it leaves your computer, and the restored folders or files are not decrypted until they return to your computer. No one can access or decrypt your data unless you give them your password.
Email backup report Send an automatic email reports at the end of the scheduled backups.
Scheduler backup You can scheduler when do you want to backup. You can set frequency, timing and what to backup.
Online file sharing You can share backup files with your friends. They can access it from a web interface or an email.
Web interface accessible from anywhere You can retrieve your files from any computer with a HTML compatible browser.
BitDefender Total Security 2009 | Comparative Analysis
18
Encryption Instant messaging encryption
Ensure that no one can eavesdrop on instant messaging traffic between two PCs. IM Encryption enables two users to communicate securely via Yahoo! Messenger 8 and Windows Live Messenger 8.5 by encrypting instant messages between them.
File vault The file vault is a secured storage space for personal information or sensitive files. It is kept locally, on your computer. After it is encrypted, the data inside the vault is invulnerable to theft or prying eyes. The user can open a vault with a password, store data inside and close it, maintaining its security. While the file vault enables the user to keep sensitive files in an encrypted vault stored on the computer, Online backup enables the users to do additional copies of their files in an online location. In both cases files are encrypted and a password is required in order to access the documents. Offline backup makes reserve copies of a file on a different partition, in a network location or on a CD/DVD.
Home network management Visual network map
A graphic map of the computer network where you can select one or more to manages it.
Register the computer You can register any computer from network or all with a license key.
Run a scan task A scan task can be run for individual or all computers.
Run an update An update task can be run for individual or all computers.
Run a tuneup task A tuneup task can be run for individual or all computers.
Fix issues on the computer You can choose to fix one or all the listed issues..
Apply a parental control profile Can choose a parental control profile for any particular computer.
Set the computer as update server on the network To reduce the bandwidth usage, BitDefender Home Management enables the designation of one computer as the update server for the entire household; all the other networked computers are updated through that designated “update server”.
BitDefender Total Security 2009 | Comparative Analysis
19
Usability Protection status for each module
BitDefender Total Security 2009 provides better visibility into its status, both overall and for each separate module, through the information available in its main window.
Fix all issues option Possible issues can be fixed from the main window, with just one click.
Multi user support If several people use the same PC, the product supports different settings for each of them.
Compatibility Unicode support
Support for languages that use unicode character sets (like Asian languages).
Windows 64b support Support for Windows XP 64-bit and WindowsVista 64-bit systems.
Windows Vista support Support for Windows Vista 32-bit and 64-bit systems.
Performance Boot time
Boot time recorded with Bootvis from Microsoft plus time when a script start (windows start) until CPU was idle (CPU<5%) for ten continuous seconds.
On access memory – RAM Security product memory (RAM) occupied to copy a test folder.
On-demand memory – RAM Security product memory (RAM) occupied to scan a test folder.
On-access processor usage Processor used by security product to copy a test folder.
On-demand processor usage Processor used by security product to scan a test folder.
Archive time (zip) Time to archives a test folder with zip archiver.
Extract time (unzip) Time to extract a zip archive with unzip.
BitDefender Total Security 2009 | Comparative Analysis
20
On-demand scan time Time to on-demand scan a test folder.
Other features Gamer mode
The new Gamer Mode temporarily modifies protection settings so as to minimize their impact on game speed, while maintaining a safe, fun gaming experience.
Laptop mode Laptops running on battery power can be automatically entered into a power-saving “Laptop mode”. This mode is a group of settings preventing scheduled scans, backups and tune-ups. In Laptop Mode scheduled scans, backups and tune-ups are postponed to save battery life.
Vulnerability Scanning Check the vulnerability status of your operating system, by initiating the update of known vulnerable applications or through other corrective actions as needed. The purpose of this feature is to monitor the operating system for possible vulnerabilities. Windows Updates and Windows Accounts passwords are checked to ensure possible vulnerable points coverage.
Self protection system BitDefender Total Security 2009 files and processes are safeguarded by special modules to prevent malicious software from disabling the product.
Update on-the-fly Updates are downloaded and installed without stopping the antivirus protection.
Password protected settings Other users are prevented from changing the product settings.
Scan during installation BitDefender Total Security 2009 provides PC scanning during installation so that the computer is virus free before real-time protection becomes active.
Conclusions With its numerous features, BitDefender Total Security 2009 appears to be a more complex security solution, capable of covering both the data security and the computer performance aspects of Internet-related users’ experience. BitDefender Total Security 2009 stands for a well-balanced combination of versatile data security features, a high detection rate (both proactive and signature-based) and light resource consumption.
BitDefender Total Security 2009 | Comparative Analysis
21
Performance File Scanning
Compared to the previous year, BitDefender 2009 is 60% faster. These results have been achieved by including a new module that improved the scanning times considerably. Below you can find a short description of this new system.
BitDefender 2009 does not fully scan known operating system files. A very small amount of time is spent on identifying if the file is a known OS file and if so it is not scanned
BitDefender 2009 remembers clean files and does not scan them based on an algorithm that ensures both performance and protection
Email Scanning Retrieving e-mails has been improved 6 times compared to BitDefender 2008.
Boot time delay comparative
0 5 10 15 20 25 30 35 40
Eset Smart Security
F‐Secure Internet Security
G Data TotalCare
McAfee Total Protection
Kaspersky Internet Security
Norton Internet Security
Norton 360
Microsoft Onecare
Panda Global Protection
Trend Micro Internet Security Pro
BitDefender Total Security
Without antivirus
Boot Time
BitDefender Total Security 2009 | Comparative Analysis
22
Memory and processor usage
0 50 100 150 200 250 300
Eset Smart Security
F‐Secure Internet Security
G Data TotalCare
McAfee Total Protection
Kaspersky Internet Security
Norton Internet Security
Norton 360
Microsoft Onecare
Panda Global Protection
Trend Micro Internet Security Pro
BitDefender Total Security
Memory (RAM)
On‐access On‐demand
0 200 400 600 800 1.000 1.200
Eset Smart Security
F‐Secure Internet Security
G Data TotalCare
McAfee Total Protection
Kaspersky Internet Security
Norton Internet Security
Norton 360
Microsoft Onecare
Panda Global Protection
Trend Micro Internet Security Pro
BitDefender Total Security
Memory (Virtual)
On‐access On‐demand
BitDefender Total Security 2009 | Comparative Analysis
23
Time to archive & extract
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
Eset Smart Security
F‐Secure Internet Security
G Data TotalCare
McAfee Total Protection
Kaspersky Internet Security
Norton Internet Security
Norton 360
Microsoft Onecare
Panda Global Protection
Trend Micro Internet Security Pro
BitDefender Total Security
Processor
On‐access On‐demand
0 10 20 30 40 50 60
Eset Smart Security v3
F‐Secure Internet Security 2009
G Data TotalCare 2009
McAfee Total Protection 2009
Kaspersky Internet Security 2009
Norton Internet Security 2009
Norton 360 v2
Microsoft Onecare v2.5
Panda Global Protection 2009
Trend Micro Internet Security Pro 2009
BitDefender Total Security 2009
Without antivirus
zip/unzip time
zip unzip
BitDefender Total Security 2009 | Comparative Analysis
24
On-demand scan time
Why not?
Why not Symantec Norton 360 v2 With its 64% proactive detection rate, BitDefender surpasses by far Norton’s results (38%) in dealing with new and unknown viruses in Antimalware test performed by www.anti-malware-test.com . The parental control module is not capable of limiting access either to the Internet, during specific intervals, or to certain applications like games, files sharing programs, etc. Norton 360 v2 does not have a gamer mode, although it would make the gaming experience smoother by reducing the load on system resources. There is no laptop mode in Norton 360 v2. In Laptop Mode scheduled scans, backups and tune-ups are postponed to save battery life. The product does not offer the option to completely erase files and "traces" of files from the disk to prevent their unauthorized recovery. Norton 360 v2 does not have file vault if you want to locally secure personal information or sensitive files.
0 100 200 300 400 500 600
Eset Smart Security
F‐Secure Internet Security
G Data TotalCare
McAfee Total Protection
Kaspersky Internet Security
Norton Internet Security
Norton 360
Microsoft Onecare
Panda Global Protection
Trend Micro Internet Security Pro
BitDefender Total Security
On‐demand scan time
BitDefender Total Security 2009 | Comparative Analysis
25
Norton 360 v2 does not provide instant messaging encryption and your instant messaging traffic can be eavesdropping.
Why not McAfee Total Protection 2009 McAfee Total Protection 2009 uses a lot more resources than BitDefender Total Security 2009, which may translate into a visible PC slow-down. It does not have a gamer mode, so there is no system load reduction during games either. With its 64% proactive detection rate, BitDefender surpasses McAfee’s results (43%) in dealing with new and unknown viruses in Antimalware test performed by www.anti-malware-test.com . The parental control module is not capable of limiting access to certain applications like games, file sharing programs, etc. With McAfee Total Protection 2009 you will not have instant messaging encryption and your instant messaging traffic can be eavesdropping. The battery life of your laptop will be shorter with McAfee Total Security 2009 because it doesn’t have a laptop mode to postpone scheduled scans, backups and tune-ups. The product doesn’t have a feature to monitor the operating system for possible vulnerabilities. McAfee Total Protection 2009 does not have file vault if you want to locally secure personal information or sensitive files. McAfee Total Protection 2009 don’t have the ability to backup important data online to ensure it is secure and protected from computer theft, fire, natural disaster, hard drive or other hardware failure.
Why not Microsoft Onecare v2.5
Microsoft Onecare v2.5 does not include modules that are part of most all-in-one security products: parental control, antispam, tune-up.
The virus shield does not filter either e-mail or web traffic, although it would allow blocking viruses even before they reach the hard disk, therefore reducing the risk of infections.
The product is not protected against illegitimate attempts to disable it but is protected against deleting product files. Many viruses try to disable antivirus products when they execute for the first time. This basically renders the PC without any kind of protection so AV products should have a self protection of their files, processes and services. Microsoft Onecare v2.5 does not have file vault if you want to locally secure personal information or sensitive files. With Microsoft Onecare v2.5 you will not have instant messaging encryption and your instant messaging traffic can be eavesdropping. Microsoft Onecare v2.5 can save online only photos not any other sensitive files.
BitDefender Total Security 2009 | Comparative Analysis
26
Why not Trend Micro Internet Security Pro 2009
The parental control module of this product is not capable of limiting access to certain applications like games, file sharing programs, etc
It does not create backup copies of personal files and documents either, falling short of users’ expectations as to important data safeguarding. With its 64% proactive detection rate, BitDefender surpasses by far Trend Micro’s results (30%) in dealing with new and unknown viruses in Antimalware test performed by www.anti-malware-test.com . The product does not offer the option to completely erase files and "traces" of files from the disk to prevent their unauthorized recovery. With Trend Micro Internet Security Pro 2009 you will not have instant messaging encryption and your instant messaging traffic can be eavesdropping. There is no laptop mode in Trend Micro Internet Security Pro 2009. In Laptop Mode scheduled scans, backups and tune-ups are postponed to save battery life. The product doesn’t have a feature to monitor the operating system for possible vulnerabilities. Finally, it does not provide the possibility of adapting settings to the specific needs of each of the persons who use the same computer.
Why not Kaspersky Internet Security 2009
Kaspkersky Internet Security 2009 only covers data security. Because it lacks a tune-up module, it does not allow improving PC operation through the removal of unnecessary files and registry entries. It does not create backup copies of personal files and documents either, falling short of users’ expectations as to important data safeguarding. Kaspersky does not provide the possibility of adapting the product settings to the specific needs of each of the persons who use the same computer. Kaspersky does not have a gamer mode, so there is no system load reduction during games either. With Kaspersky Internet Security 2009 you don’t have a way to manage an entire home or home office network from a single PC. With this feature you can remotely configured tasks such as scans, backups, tune-ups and updates which can be scheduled or can be run on-demand. Kaspersky Internet Security 2009 does not have instant messaging encryption and your instant messaging traffic can be eavesdropping. Kaspersky Internet Security 2009 does not have file vault if you want to locally secure personal information or sensitive files.
BitDefender Total Security 2009 | Comparative Analysis
27
Why not F-Secure Internet Security 2009 F-secure Internet Security only covers data security. Because it lacks a tune-up module, it does not allow improving PC operation through the removal of unnecessary files and registry entries. It does not create backup copies of personal files and documents either, falling short of users’ expectations as to important data safeguarding. With F-Secure Internet Security 2009 you don’t have a way to manage an entire home or home office network from a single PC. With this feature you can remotely configured tasks such as scans, backups, tune-ups and updates which can be scheduled or can be run on-demand. The product doesn’t have a feature to monitor the operating system for possible vulnerabilities. F-Secure Internet Security 2009 does not have an online backup to save and protect you important data.
Why not Norton Internet Security 2009
Norton Internet Security 2009 only covers data security. Because it lacks a tune-up module, it does not allow improving PC operation through the removal of unnecessary files and registry entries. It does not create backup copies of personal files and documents either, falling short of users’ expectations as to important data safeguarding. The product’s parental control module is not capable of limiting access either to the internet, during specific intervals, or to certain applications like games, file sharing programs, etc. There is no Laptop Mode in Norton Internet Security 2009 but has a “Silent Mode”. When Silent Mode is enabled, Norton Internet Security 2009 suppresses all alerts and suspends the background activities for the duration that you specify. In Laptop Mode scheduled scans, backups and tune-ups are postponed to save battery life. Norton Internet Security 2009 does not have a gamer mode but has Full Screen Detection and when you turn on Norton Internet Security 2009 automatically detects the applications that you run in full-screen mode and enables Silent Mode. Norton Internet Security 2009 does not have file vault if you want to locally secure personal information or sensitive files. With Norton Internet Security 2009 you will not have instant messaging encryption and your instant messaging traffic can be eavesdropping. Norton Internet Security 2009 does not have an online backup to save and protect you important data.
BitDefender Total Security 2009 | Comparative Analysis
28
Why not Panda Global Security 2009
The product’s parental control module is not capable of limiting access either to the internet, during specific intervals, or to certain applications like games, file sharing programs, etc. Panda Global Security 2009 cannot adapt its settings to the specific needs of each of the persons who use the same computer. Panda uses a lot more resources than BitDefender, which may translate into a visible slow-down of the PC. It does not have a gamer mode either, although it would make the gaming experience smoother by reducing the load on system resources. With Panda Global Security 2009 you don’t have a way to manage an entire home or home office network from a single PC. With this feature you can remotely configured tasks such as scans, backups, tune-ups and updates which can be scheduled or can be run on-demand. Panda Global Security 2009 does not have a laptop mode to safe you laptop battery because this feature postpone scheduled scans, backups and tune-ups. Panda Global Security 2009 does not have file vault if you want to locally secure personal information or sensitive files.
Why not Eset Smart Security v3
Eset Smart Security v3 only covers basic security needs. It does not include modules that are part of most all-in-one security products: parental control, backup, tune-up. The firewall is, quite visibly, just a recent addition to Eset’s products. It does not have any predefined network types (direct connection, LAN, etc.), even though it would make the setup phase much easier. Moreover, users cannot assign different profiles to different networks, which may be very annoying if they switch networks often. Eset Smart Security v3does not have a gamer mode, although it would make the gaming experience smoother by reducing the load on system resources. There is no Laptop Mode in Eset Smart Security v3. In Laptop Mode scheduled scans, backups and tune-ups are postponed to save battery life. Eset Smart Security v3 does not have file vault if you want to locally secure personal information or sensitive files. With Eset Smart Security v3 you will not have instant messaging encryption and your instant messaging traffic can be eavesdropping. The product doesn’t have a feature to monitor the operating system for possible vulnerabilities. Eset Smart Security v3 does not provide online storage or sharing.
BitDefender Total Security 2009 | Comparative Analysis
29
Why not G Data Total Care 2009
The product’s firewall does not include Wi-Fi management functions, although they would be useful for the protection of users connecting to open Wi-Fi networks and for the issuing of warnings about attempts to connect to their own network. G-Data uses a lot more resources than BitDefender, which may translate into a visible slow-down of the PC. With G Data Total Care 2009 you don’t have a way to manage an entire home or home office network from a single PC. With this feature you can remotely configured tasks such as scans, backups, tune-ups and updates which can be scheduled or can be run on-demand. G Data Total Care 2009 does not have file vault if you want to locally secure personal information or sensitive files. With G Data Total Care 2009 you will not have instant messaging encryption and your instant messaging traffic can be eavesdropping. There is no Laptop Mode in G Data Total Care 2009. In Laptop Mode scheduled scans, backups and tune-ups are postponed to save battery life.
Main competitors advantage Symantec
Norton 2009 line of products differs from previous version through speed and low
resource consumption. This new line of products is much better than previous and it
seems that Symantec is on the right way.
Different than BitDefender Internet Security 2009, it includes Norton Insight (determines
a trust level for the files that belong to well-known applications), a fill in password
manager (with an overall password) and pulse updates for up-to-the-minute protection
with which they update at 5-15 minutes.
Kaspersky Kaspersky Internet Security 2009 is one of the most expensive on the market (59,95$
for 1 year, 1 PC) and compared to the previous version includes Wi-fi management,
laptop mode (disable scheduled scans).
Different than BitDefender, Kaspersky scan HTTPS/SSL, secure VPN connections and
has a virtual keyboard for safe entry of logins and passwords.
BitDefender Total Security 2009 | Comparative Analysis
30
Panda Panda 2009 line of products has an improved technology with very good speed scan.
The new products use Collective Intelligence to carry out on-demand scans via the
cloud.
Different than the rest of security solutions it can be purchased from up to 6 months.
F-Secure F-Secure Internet Security 2009 includes RBL and dial up control compared to
BitDefender. They have also DeepGuard 2.0 which is based on “in the cloud”
technology.
Trend Micro Trend Micro has focused on home user products this year and they came with a new
concept technology named “in the cloud”.
McAfee McAfee has been focused mostly on online sales and do not have a string presence in
offline retail stores. From a technology perspective, their antivirus engines have good
detection rates but showed slow response times in latest tests and uses a lot more
resources than BitDefender Total Security 2009, which may translate into a visible PC
slow-down. They have also Site Safety Advisor and Link Checker; first adds safety
ratings to sites and search engine results based on comprehensive spam, adware, and
online scam safety tests; and the other identifies and prevents you from clicking on
harmful web site links in your browser, email, or instant messages. Another important
feature is Wireless Network Monitoring which alerts you when intruders try to connect
to your wireless home network.