bitde fender total security 2009download.bitdefender.com/...total_security_2009_comparative... ·...

30
CO The co inform Docum OMPARA omparative tes mation supply pu ment date: Nov Tot ATIVE A t this documen urposes. vember 2008 BitDe al Sec ANALY nt describes wa efende curity SIS as carried out b er y 2009 by the BitDefen 9 nder Team for

Upload: vutuyen

Post on 20-Aug-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

CO The coinformDocum

OMPARA

omparative tesmation supply pument date: Nov

Tot

ATIVE A

t this documenurposes.

vember 2008

BitDeal Sec

ANALY

nt describes wa

efendecurity

SIS

as carried out b

er y 2009

by the BitDefen

9

nder Team for

BitD

Do

Bit

K

efender To

ocumenThe purposeneeded to su2009. The d- BitDefen- Key Ben- Summar- Feature-- Features- Conclus

DefendBitDefender e-threats suclead to loss solutions arePCs functionwith always-

Key features• State-of-t• Defensiv

fraud atte• Preventio• New ada• Parental • Automate

data stor• Improved• Online ba• Easy to u

network (• IM encry• File vault• Vulnerab• Laptop m

mobile se

CertificatioThe BitDefeorganization

otal Securi

nt Overve of this docuupport markeocument is stnder Total Senefits ry Comparativ-Based Comps Description

sions

der Totasecurity solu

ch as virusesof personal fie tailored to aning mostly of-on, unfiltered

s the-art proacte layer againempts on of unauthoaptive engines

control blocked incrementarage on local od PC performaackup optionsuse remote ho(new) ption for keept, a secured sbility scan monmode for optimettings (new)

ons and awander 2008 pro

ns and the rec

ity 2009 |

view ment is to pro

eting and saletructured as fcurity overvie

ve Table parative Table

al Secutions provide

s, spyware, hales, identity th

accommodateff-line or in a

d Internet con

tive protectionst phishing at

orized accesss for faster ans access to inal backup witor removableance throughs for emergenome manage

ping eavesdrostorage spacenitoring your o

mized resourc

ards oducts have ecognition of to

Comparat

ovide marketes actions relafollows: ew

e

urity proactive staackers, spamheft and slow

e different comsecure LAN tnections.

n against newttacks by filte

to Wi-Fi netwnd more reliabnappropriate wh numerous o

e drives. fine tunning

ncy or unpredment for secu

opper away fre for personaloperating sys

ce allocation d

earned top mop industry pu

tive Analys

ers and partneated to BitDef

ate of the art p, and phishing

wer system pemputer usageto first-line de

w viruses ring all acces

work ble spam detewebsites andoptions for ad

modules (newicted situation

uring an entire

rom your IM tr information (

stem for vulneduring scans,

arks from indublications.

sis

ers with the infender Total S

protection agag attacks whirformance. T scenarios ra

efense for com

ssed web pag

ection and blod e-mail dditional copie

w) ns (new) e home or ho

raffic (new) (new) erabilities (new

backups and

dependent tes

nformation Security

ainst ch can he nging from

mputers

es for

ocking

es of vital

me office

w) d other

sting

BitDefender Total Security 2009 | Comparative Analysis

3

Key Benefits

BENEFIT FEATURES AV IS TS

Confidently download, share and open files from friends, family, co-workers – and even total strangers!

Improved: Scans all web, e-mail and instant messaging traffic for viruses and spyware, in real-time.

● ● ●

Proactively protects your PC against brand new virus outbreaks using advanced heuristics.

● ● ●

Protect your identity - shop, bank, listen, watch privately and securely.

Blocks attempted identity theft (phishing). ● ● ●

Improved: Prevents personal information from leaking via e-mail, web or instant messaging.

● ● ●

Guard your files and conversations with top-of-the line encryption and backup.

New: Instant Messaging Encryption ● ● ●

New: File Vault securely stores personal information or sensitive files.

● ●

Automatically backs up files and folders locally.

New: Provides secure on-line storage and sharing.

Connect securely to any network at home, in the office or away.

Automatically modifies firewall protection settings to suit the location's options...

● ●

Wi-Fi monitor helps prevent unauthorized access to your Wi-Fi network.

● ●

Protect your family and computers!

Blocks access to inappropriate websites and e-mail.

● ●

Schedules and limits children's access to Internet and applications.

● ●

Play safe, play seamlessly!

Improved: Reduces the system load and avoids user interaction requests during games.

● ● ●

Get finely-tuned performance from your computer!

Uses few system resources. ● ● ●

New: Laptop mode prolongs battery life ● ● ●

Removes unnecessary duplicates of files and registry entries.

Irrecoverably erases unwanted files and "traces" of files.

Be in control, stay in control!

New: Manages the security of your entire home network.

● ● ●

Use the dashboard to fix security issues with just one click.

● ● ●

Choose automatically the best protection measures to apply.

● ● ●

Let professionals solve any security issues! Free product lifetime technical support. ● ● ●

4

Summary Comparative Table  

BitDefender Total

Security 2009

Symantec Norton 360

v2

McAfee Total

Protection 2009

Microsoft OneCare

v2.5

Trend Micro Internet Security

2009

Kaspersky Internet Security

2009

F-Secure Internet Security

2009

Norton Internet Security

2009

Panda Global

Security 2009

Eset Smart Security v3

G Data Total Care 2009

Antivirus

Firewall

Wi-Fi management

Home management

Antispam ^

Anti-phishing

Anti-rootkit

Parental control ^ ^

Web time limiter

IM encryption

Gamer mode

Laptop mode + ++

Settings protection

Trace clean-up

Vulnerability scan

Registry cleaner

Duplicate finder

Local backup

Online backup ^^ *** ~~

File vault ~

Detection rate* 98.10% 96.18% 86.40% 96.01% 95.48% 97.49% 97.97% 96.18% 93.31% 93.65% 99.26%

Proactive detection** 63% 38% 43% n/a 30% 45% 36% 38% 24% 59% n/a

Update frequency hourly hourly 2-3/day 2-3/day 2-6/day hourly 2-6/day hourly hourly 2-4/day hourly

Checkmark Anti-malware / Firewall / / / / / / / / / / /

* According to Av-test.org, November 2007 **According to Anti-Malware Test Lab, January 2008 ***Only Photo Backup (additional cost) ^Optional Add-on ^^Only for some countries +Disable scheduled scans ++Silent mode ~Bonus McAfee Anti-Theft ~~ Additional, only for some countries

BitDefender Total Security 2009 | Comparative Analysis

5

Feature-Based Comparative Table (Part 1)

=

BitDefender Total

Security 2009 Symantec

Norton 360 v2 McAfee Total

Protection 2009

Microsoft Onecare v2.5

Trend Micro Internet

Security Pro 2009

Kaspersky Internet

Security 2009

Antivirus & Antispyware Real-time antivirus and antispyware protection

Detection rate (av-test.org, November 2007)

98.10% 96.18% 86.40% 96.01% 95.48% 97.49%

Proactive detection (Anti-malware Test, Jan 2008)

63% 38% 43% N/A 30% 45%

Update frequency Hourly Hourly 2-3/day 2-3/day 2-6/day Hourly

Detect viruses in archives (ace, arc, arj, cab, gz, ha, imp, rar, tar, zip)

All from list arj, cab, rar, tar, gzip, zip

arc, arj, cab, rar, zip, tar

ace, arj, cab, arc, gzip, rar, zip, tar

ace, arj, cab, rar, zip,

lha

ace, arj, cab, rar, zip,

tar, gzip

Clean archived files

zip, tar, czip, gzip,

rpm zip, gzip, tar zip tar zip, lha zip, gzip, tar

Detect and remove rootkits

Preset security levels Scan e-mail traffic Scan web(HTTP) traffic Narrow on-access scanning target

Run scan tasks at low priority

Scheduled scan tasks

Anti-phishing Filter phishing e-mails Web anti-phishing

Antispam Antispam filter Integration with Outlook / Outlook Express / Thunderbird

/ / / / / / / / / / / /

Wizard to train the antispam filter

Charset block NeuNet (Neural network) Image filter

Ctrl+Click links for

more info

BitDefender Total Security 2009 | Comparative Analysis

6

=

BitDefender Total

Security 2009 Symantec

Norton 360 v2 McAfee Total

Protection 2009

Microsoft Onecare v2.5

Trend Micro Internet

Security Pro 2009

Kaspersky Internet

Security 2009

Firewall Two-way firewall Stealth mode Database of known applications

Wi-Fi management Firewall zones

Parental control Keyword filter Privacy protection Web time limiter Application control Website filter

TuneUp Find duplicate files Clean temporary internet files and cookies

Trace clean-up Registry cleaner

Backup Local backup Backup scheduler

Online Backup

Incremental backup

^ ** Differential backup

^ Versioned backup

^ ** Encryption data

^ Email backup report

^ Scheduler backup

^ ** Online file sharing

^ Web interface accessible from anywhere

^ **

Encryption Instant Messaging Encryption

File Vault ~

Home network management Visual network map

BitDefender Total Security 2009 | Comparative Analysis

7

=

BitDefender Total

Security 2009 Symantec

Norton 360 v2 McAfee Total

Protection 2009

Microsoft Onecare v2.5

Trend Micro Internet

Security Pro 2009

Kaspersky Internet

Security 2009

Register the computer Run a scan task Run an update Run a tuneup task Fix issues on the computer

Apply a parental control profile

Set the computer as update server on the network

Usability Protection status for each module

‘Fix all issues’ option Multi user support

Compatibility Unicode support Windows 64b support Windows Vista support

Performance

Boot time (seconds)* 26,170 23,649 21,966 23,220 32,934 22,730

On-access memory - RAM (Mb)*

33,81 12,69 71,61 102,10 55,25 28,64

On-demand memory -RAM (Mb)*

62,61 57,11 190,25 114,77 78,21 102,42

On-access processor usage (%)*

1,20 4,28 64,81 44,83 4,12 30,31

On-demand processor usage (%)*

54,91 49,53 77,75 80,12 72,39 27,08

Archive time (zip) (seconds)*

19,47 21,18 51,32 28,41 35,53 14,38

Extract time (unzip) (seconds)*

23,08 20,09 48,76 27,38 58,46 13,40

On-demand scan time (seconds)*

296,00 254,65 299,95 574,80 423,57 126,00

Others Gamer mode Laptop mode Vulnerability Scanning Settings protection

BitDefender Total Security 2009 | Comparative Analysis

8

=

BitDefender Total

Security 2009 Symantec

Norton 360 v2 McAfee Total

Protection 2009

Microsoft Onecare v2.5

Trend Micro Internet

Security Pro 2009

Kaspersky Internet

Security 2009

Update on-the-fy Password-protected settings

Scan during installation

*

according to tests carried out by BitDefender

** Only Photo Backup (additional cost) ^ Only for some countries ~ Bonus McAfee Anti-Theft

Feature-Based Comparative Table (Part 2)

BitDefender Total Security

2009

F-Secure Internet

Security 2009

Norton Internet

Security 2009 Panda Global Security 2009

Eset Smart Security v3

G Data Total Care 2009

Antivirus Real-time antivirus and antispyware protection

Detection rate (av-test.org, November 2007)

98.10% 97.97% 96,18% 93.31% 93,65% 99.26%

Proactive detection (Anti-malware Test, Jan 2008)

63% 36% 38% 24% 59% n/a

Update frequency Hourly 2-6/day Hourly Hourly 2-4/day Hourly

Detect viruses in archives (ace, arc, arj, cab, gzip, ha, imp, rar, tar, zip)

All from list ace, ha, arj, cab, rar, tar,

zip, gzip

arj, cab, rar, tar, gzip, zip

ace, arc, arj, cab, rar, zip,

gzip, tar

ace, arj, cab, tar,

gzip, rar, zip All from list

Clean archived files

zip, tar, czip, gzip, rpm zip, tar, gzip zip, gzip, arj,

tar zip, tar, gzip

Detect and remove rootkits

Preset security levels Scan e-mail traffic Scan web(HTTP) traffic Narrow on-access scanning target

Run scan tasks at low priority

Scheduled scan tasks

BitDefender Total Security 2009 | Comparative Analysis

9

BitDefender Total Security

2009

F-Secure Internet

Security 2009

Norton Internet

Security 2009 Panda Global Security 2009

Eset Smart Security v3

G Data Total Care 2009

Anti-phishing Filter phishing e-mails Web anti-phishing

Antispam Antispam filter Integration with Outlook / Outlook Express / Thunderbird

/ / / / / / / / / / / /

Wizard to train the antispam filter

Charset block NeuNet (Neural network) Image filter

Firewall Two-way firewall Stealth mode Database of known applications

Predefined network types Wi-Fi management Firewall zones

Parental control Keyword filter Privacy protection Web time limiter Application control Website filter

TuneUp Find duplicate files Clean temporary internet files and cookies

Trace clean-up Registry cleaner

BackUp Local backup Backup scheduler

Online BackUp

Incremental backup

^

BitDefender Total Security 2009 | Comparative Analysis

10

BitDefender Total Security

2009

F-Secure Internet

Security 2009

Norton Internet

Security 2009 Panda Global Security 2009

Eset Smart Security v3

G Data Total Care 2009

Differential backup

^ Versioned backup

^ Encryption data

^ Email backup report

^ Scheduler backup

^ Online file sharing

^ Web interface accessible from anywhere

^

Encryption Instant Messaging Encryption

File Vault

Home network management Visual network map Register the computer Run a scan task Run an update Run a tuneup task Fix issues on the computer

Apply a parental control profile

Set the computer as update server on the network

Usability Protection status for each module

‘Fix all issues’ option Multi user support

Compatibility Unicode support Windows 64b support Windows Vista support

Performance

Boot time (seconds)* 26,170 29,441 23,894 29,960 21,216 35,038

On-access memory - RAM (Mb)*

33,81 161,59 10,51 148,42 46,14 205,81

On-demand memory -RAM (Mb)*

62,61 160,73 63,67 192,09 49,54 293,33

BitDefender Total Security 2009 | Comparative Analysis

11

BitDefender Total Security

2009

F-Secure Internet

Security 2009

Norton Internet

Security 2009 Panda Global Security 2009

Eset Smart Security v3

G Data Total Care 2009

On-access processor usage (%)*

1,20 37,79 0,46 11,03 24,63 8,95

On-demand processor usage (%)*

54,91 82,89 47,47 55,35 78,48 13,74

Archive time (zip) (seconds)*

19,47 39,59 24,02 17,61 13,75 53,87

Extract time (unzip) (seconds)*

23,08 50,05 21,76 16,76 17,25 12,89

On-demand scan time (seconds)*

296,00 525,60 75,40 301,00 303,80 319,40

Others Gamer mode Laptop mode Vulnerability Scanning Settings protection Update on-the-fly Password-protected settings

Scan during installation

*

according to tests carried out by BitDefender

^ Only for some countries

BitD

Fea

AntReal-

Detec

Proac

efender To

atures

tivirus an-time antivirA real-time vaccess (cop

ction rate Detection raset of virus sin Germany,protection agperformed inbackdoors, T

ctive detectProactivity isunknown threxclusively bmethod).

Th(ht

.

Panda Secu

Trend M

F‐Se

Syma

McA

Kaspe

BitDefen

otal Securi

Descri

nd Antisprus and antivirus and spywy, move, edit

ate is an indicasamples. Acc, BitDefender gainst Internen November 2Trojans and w

tion s a metric aboreats. The chabased on thei

he test was pettp://www.ant

0%

urity

Micro

cure

ntec

Afee

ersky

Eset

nder

ity 2009 |

ption

pyware spyware prware scanner).

ator of how mording to the is the most re

et threats, with2007 on a numworms.

out the way aart below repr behavior (ra

erformed by Ai-malware-tes

10% 2

Proactive

Comparat

otection r (virus shield

many viruses aindependent eliable singleh a 98.10% dmber of 1041

n antivirus coresents the pather than on

Anti-Malware st.com/?q=no

20% 30%

e antivirus

tive Analys

d) blocks infec

an antivirus dtest lab AV-T-engine produ

detection rate180 virus sam

opes with newercentage of the traditiona

Test Lab in Jode/39)

% 40%

s protection

sis

cted or suspe

detects out of Test (www.av-uct in point ofe. The test wamples includin

w and previouthreats detec

al virus signat

January 2008

50%

n test

ct files on-

a chosen -test.org) f as ng bots,

sly-cted ture

60%

70%

BitDefender Total Security 2009 | Comparative Analysis

13

Update frequency Traditional virus detection consists of identifying infected files based on signatures which are gradually stored in a constantly updated database. The more frequently the database is updated, the higher the chance of new viruses being detected. BitDefender is updated hourly so that our users are protected against the latest threats without pushing a button.

Virus detection and cleaning of archived files This feature can be successfully employed to disinfect and repair partially or totally compromised archives which include important information only part of which is infected. BitDefender can disinfect files located inside the following types of archives: zip, tar, czip, gzip and rpm.

Rootkit detection and removal Rootkits are malicious pieces of software designed to control a PC while staying hidden. As this kind of threats are identified based on their traces, BitDefender comes with a special rootkit removal tool which practically detects such traces.

Pre-set security levels Having different preset security levels allows users to choose the protection level that suits their security needs, with a click.

Scan incoming and outgoing email (POP3 and SMTP) BitDefender filters incoming and outgoing e-mail messages, regardless of the e-mail client (OutlookTM, Outlook ExpressTM, The Bat!TM, Netscape®, etc.), without any additional configuration.

Scan web (HTTP) traffic A web traffic filter that blocks viruses even before they reach the browser, reducing the risk of infections.

Narrow on-access scanning target This feature provides options for several scanning modes: specific drives, folders or even files. BitDefender Total Security 2009 allows defining custom scanning tasks that applies to user-selected items.

Run scan tasks at low priority This option decreases the priority of the scan process, allowing other programs to run faster. However, a low priority scan process will take longer to complete.

Scheduled scan tasks A task scheduler enables users to plan ahead and schedule full system/drive scans in the off hours, when the computer is not used.

BitDefender Total Security 2009 | Comparative Analysis

14

Anti-phishing Filter phishing emails

BitDefender’s new phishing detector keeps the computer clear of malicious e-mails that tries to trick people into giving away their bank account information or other sensitive data.

Web Anti-phishing Protects against phishing attempts by filtering all accessed web pages. BitDefender Total Security 2009 notifies the user and prompts for a decision when a web site is detected as phished.

Antispam Antispam filter

Antispam filters keep the inbox free of unsolicited mail by classifying messages based on various techniques and patterns.

Integration with Outlook, Outlook Express and Thunderbird While the antispam usually filters messages regardless of the email client type, some products have a stronger integration with programs like Microsoft OutlookTM or Outlook ExpressTM, which allows users to fine tune the antispam filter.

Wizard to train the antispam filter To further improve the efficiency of its antispam module and eliminate false positives, BitDefender Total Security 2009 includes a wizard that helps train the Bayesian filter to recognize spam based on the messages already received.

Charset block The Charset Filter blocks any e-mail written in "strange" characters, a very well known characteristic of spam.

NeuNet (Neural network) The new antispam filter available in BitDefender Total Security 2009 uses a Neural Network (a concept borrowed from the field of Artificial Intelligence) to deal with the new spam messages sent every day. Its main advantage is that it can recognize new spam by perceiving similarities (oftentimes very subtle) between the new messages received and the ones it was trained on.

Image Filter Based on a constantly updated database, this filter adds a spam score to e-mails containing pictures that are common to spam.

BitDefender Total Security 2009 | Comparative Analysis

15

Firewall Two-way firewall

The firewall keeps intruders away and controls the access of applications to the Internet. Users can define exactly which incoming or outgoing connections to permit/deny based on specific protocols, ports, applications and/or remote addresses.

Stealth mode (block port scans) Port scans are attempts to connect to ports in order to discover whether or not a computer is vulnerable. The Stealth Mode option in BitDefender Total Security 2009 prevents the PC from responding to port scans, which makes it virtually invisible in the network.

Database of known applications BitDefender Total Security 2009 maintains a database of trusted applications, and informs users whether or not the applications demanding network access are trustworthy. In this way, users can better decide when allowing or denying these applications. Alternatively, BitDefender Total Security 2009 can automatically grant access to trusted applications.

Predefined network types BitDefender Total Security 2009 provides predefined network policies to help users better configure the firewall.

Wi-Fi management The Wi-Fi management feature helps prevent unauthorized access to the Wi-Fi internet connection by notifying users about computers that log in to the network. Users are also informed when connecting to an open Wi-Fi network which is automatically classified as “untrusted”.

Firewall zones Zones are IP addresses, individual or multiple, covered by special rules within profiles. Based on these zones, the respective IPs are allowed or denied access to users’ PCs. By default, BitDefender automatically adds zones for specific network configurations. For example, an open wireless network is always considered as an untrusted zone.

Parental control Keyword filter

The keyword filter blocks e-mail messages or web pages which contain specific words or phrases.

Privacy protection The privacy guard monitors the outgoing HTTP (web) and SMTP (mail) traffic for what might be personal information – such as credit card numbers, Social Security numbers and other user-defined strings (e.g. bits of passwords).

Web time limiter The web time limiter enables users to allow or prevent other users or applications from accessing the web during specific time frames.

BitDefender Total Security 2009 | Comparative Analysis

16

Application control This option limits the access to specific applications such as games and messaging software.

Website filter Heuristic website filters automatically classify web pages based on their content and other details so that pages with an inappropriate content are blocked. Instead of relying only on keywords, this approach applies antispam research principles when classifying web pages.

TuneUp Find duplicate files

The duplicate finder checks for duplicate files, applications or media that have been downloaded multiple times or for documents saved in multiple places by mistake. Once the unnecessary copies have been identified, the duplicate finder presents the user with several options to free up valuable disk space.

Clean temporary internet files and cookies Cleaning temporary Internet files and cookies frees disk space and helps protect users’ privacy.

Trace clean-up Trace clean-up completely erases files and "traces" of files from the hard disk to prevent their unauthorized recovery.

Registry cleaner Some of the registry keys associated with applications removed by the user might not be deleted and continue to remain in the Windows Registry causing system slowdowns and even instability. To improve system performance, the Registry Cleaner scans the Windows Registry and deletes the invalid registry keys.

Backup While the file vault enables the user to keep sensitive files in an encrypted vault stored on the computer, Online backup enables the user to do additional copies of their files in an online location. In both cases files are encrypted and a password is required to access the documents. Offline backup makes supplemental copies of a file on a different partition, in a network location or on a CD/DVD.

Local backup BitDefender Total Security 2009 is fitted with a new module which safeguards users’ data by creating backup copies to local and removable drives, CD-R/RW or DVD-R/RW. This module is set to automatically back up only new files, based on a pre-set schedule. While the file vault enables the user to keep sensitive files in an encrypted vault stored on the computer, Online backup enables the users to do reserve copies of their files in an online location. In both cases files are encrypted and a password is required in order to access the documents. Offline backup makes reserve copies of a file on a different partition, in a network location or on a CD/DVD.

BitDefender Total Security 2009 | Comparative Analysis

17

Backup scheduler The backup process can be performed based on a previously set schedule so that users will not have to deal with this task repeatedly.

Online Backup While the file vault enables the user to keep sensitive files in an encrypted vault stored on the computer, Online backup enables the users to do reserve copies of their files in an online location. In both cases files are encrypted and a password is required in order to access the documents. Offline backup makes reserve copies of a file on a different partition, in a network location or on a CD/DVD.

Incremental backup Ensures that only newly modified files from the list of files scheduled to be backed up are uploaded. The differential backup feature guarantees that only the modified parts of files are uploaded and not the entire file, reducing bandwidth usage and backup times.

Differential backup Examines each changed file and determines exactly which binary digits (which ones and zeros) were changed since the last backup; it transfers only that data to the backup grid. The advantage of this solution is the substantially reduced recovery time, requiring only a full backup and the latest differential backup to restore the system.

Versioned backup Provides versioning for the files that have been backed up, meaning that multiple versions of the same file are backed up, without deleting/overwriting older versions. This option enables the user to restore older versions of the same file at any time.

Encryption data Encrypt your data locally with a unique encryption key. The backup is secured before it leaves your computer, and the restored folders or files are not decrypted until they return to your computer. No one can access or decrypt your data unless you give them your password.

Email backup report Send an automatic email reports at the end of the scheduled backups.

Scheduler backup You can scheduler when do you want to backup. You can set frequency, timing and what to backup.

Online file sharing You can share backup files with your friends. They can access it from a web interface or an email.

Web interface accessible from anywhere You can retrieve your files from any computer with a HTML compatible browser.

BitDefender Total Security 2009 | Comparative Analysis

18

Encryption Instant messaging encryption

Ensure that no one can eavesdrop on instant messaging traffic between two PCs. IM Encryption enables two users to communicate securely via Yahoo! Messenger 8 and Windows Live Messenger 8.5 by encrypting instant messages between them.

File vault The file vault is a secured storage space for personal information or sensitive files. It is kept locally, on your computer. After it is encrypted, the data inside the vault is invulnerable to theft or prying eyes. The user can open a vault with a password, store data inside and close it, maintaining its security. While the file vault enables the user to keep sensitive files in an encrypted vault stored on the computer, Online backup enables the users to do additional copies of their files in an online location. In both cases files are encrypted and a password is required in order to access the documents. Offline backup makes reserve copies of a file on a different partition, in a network location or on a CD/DVD.

Home network management Visual network map

A graphic map of the computer network where you can select one or more to manages it.

Register the computer You can register any computer from network or all with a license key.

Run a scan task A scan task can be run for individual or all computers.

Run an update An update task can be run for individual or all computers.

Run a tuneup task A tuneup task can be run for individual or all computers.

Fix issues on the computer You can choose to fix one or all the listed issues..

Apply a parental control profile Can choose a parental control profile for any particular computer.

Set the computer as update server on the network To reduce the bandwidth usage, BitDefender Home Management enables the designation of one computer as the update server for the entire household; all the other networked computers are updated through that designated “update server”.

BitDefender Total Security 2009 | Comparative Analysis

19

Usability Protection status for each module

BitDefender Total Security 2009 provides better visibility into its status, both overall and for each separate module, through the information available in its main window.

Fix all issues option Possible issues can be fixed from the main window, with just one click.

Multi user support If several people use the same PC, the product supports different settings for each of them.

Compatibility Unicode support

Support for languages that use unicode character sets (like Asian languages).

Windows 64b support Support for Windows XP 64-bit and WindowsVista 64-bit systems.

Windows Vista support Support for Windows Vista 32-bit and 64-bit systems.

Performance Boot time

Boot time recorded with Bootvis from Microsoft plus time when a script start (windows start) until CPU was idle (CPU<5%) for ten continuous seconds.

On access memory – RAM Security product memory (RAM) occupied to copy a test folder.

On-demand memory – RAM Security product memory (RAM) occupied to scan a test folder.

On-access processor usage Processor used by security product to copy a test folder.

On-demand processor usage Processor used by security product to scan a test folder.

Archive time (zip) Time to archives a test folder with zip archiver.

Extract time (unzip) Time to extract a zip archive with unzip.

BitDefender Total Security 2009 | Comparative Analysis

20

On-demand scan time Time to on-demand scan a test folder.

Other features Gamer mode

The new Gamer Mode temporarily modifies protection settings so as to minimize their impact on game speed, while maintaining a safe, fun gaming experience.

Laptop mode Laptops running on battery power can be automatically entered into a power-saving “Laptop mode”. This mode is a group of settings preventing scheduled scans, backups and tune-ups. In Laptop Mode scheduled scans, backups and tune-ups are postponed to save battery life.

Vulnerability Scanning Check the vulnerability status of your operating system, by initiating the update of known vulnerable applications or through other corrective actions as needed. The purpose of this feature is to monitor the operating system for possible vulnerabilities. Windows Updates and Windows Accounts passwords are checked to ensure possible vulnerable points coverage.

Self protection system BitDefender Total Security 2009 files and processes are safeguarded by special modules to prevent malicious software from disabling the product.

Update on-the-fly Updates are downloaded and installed without stopping the antivirus protection.

Password protected settings Other users are prevented from changing the product settings.

Scan during installation BitDefender Total Security 2009 provides PC scanning during installation so that the computer is virus free before real-time protection becomes active.

Conclusions With its numerous features, BitDefender Total Security 2009 appears to be a more complex security solution, capable of covering both the data security and the computer performance aspects of Internet-related users’ experience. BitDefender Total Security 2009 stands for a well-balanced combination of versatile data security features, a high detection rate (both proactive and signature-based) and light resource consumption.

BitDefender Total Security 2009 | Comparative Analysis

21

Performance File Scanning

Compared to the previous year, BitDefender 2009 is 60% faster. These results have been achieved by including a new module that improved the scanning times considerably. Below you can find a short description of this new system.

BitDefender 2009 does not fully scan known operating system files. A very small amount of time is spent on identifying if the file is a known OS file and if so it is not scanned

BitDefender 2009 remembers clean files and does not scan them based on an algorithm that ensures both performance and protection

Email Scanning Retrieving e-mails has been improved 6 times compared to BitDefender 2008.

Boot time delay comparative

0 5 10 15 20 25 30 35 40

Eset Smart Security

F‐Secure Internet Security

G Data TotalCare

McAfee Total Protection

Kaspersky Internet Security

Norton Internet Security

Norton 360

Microsoft Onecare

Panda Global Protection

Trend Micro Internet Security Pro

BitDefender Total Security

Without antivirus

Boot Time

BitDefender Total Security 2009 | Comparative Analysis

22

Memory and processor usage

0 50 100 150 200 250 300

Eset Smart Security

F‐Secure Internet Security

G Data TotalCare

McAfee Total Protection

Kaspersky Internet Security

Norton Internet Security

Norton 360

Microsoft Onecare

Panda Global Protection

Trend Micro Internet Security Pro

BitDefender Total Security

Memory (RAM)

On‐access On‐demand

0 200 400 600 800 1.000 1.200

Eset Smart Security

F‐Secure Internet Security

G Data TotalCare

McAfee Total Protection

Kaspersky Internet Security

Norton Internet Security

Norton 360

Microsoft Onecare

Panda Global Protection

Trend Micro Internet Security Pro

BitDefender Total Security

Memory (Virtual)

On‐access On‐demand

BitDefender Total Security 2009 | Comparative Analysis

23

Time to archive & extract

0% 10% 20% 30% 40% 50% 60% 70% 80% 90%

Eset Smart Security

F‐Secure Internet Security

G Data TotalCare

McAfee Total Protection

Kaspersky Internet Security

Norton Internet Security

Norton 360

Microsoft Onecare

Panda Global Protection

Trend Micro Internet Security Pro

BitDefender Total Security

Processor

On‐access On‐demand

0 10 20 30 40 50 60

Eset Smart Security v3

F‐Secure Internet Security 2009

G Data TotalCare 2009

McAfee Total Protection 2009

Kaspersky Internet Security 2009

Norton Internet Security 2009

Norton 360 v2

Microsoft Onecare v2.5

Panda Global Protection 2009

Trend Micro Internet Security Pro 2009

BitDefender Total Security 2009

Without antivirus

zip/unzip time

zip unzip

BitDefender Total Security 2009 | Comparative Analysis

24

On-demand scan time

Why not?

Why not Symantec Norton 360 v2 With its 64% proactive detection rate, BitDefender surpasses by far Norton’s results (38%) in dealing with new and unknown viruses in Antimalware test performed by www.anti-malware-test.com . The parental control module is not capable of limiting access either to the Internet, during specific intervals, or to certain applications like games, files sharing programs, etc. Norton 360 v2 does not have a gamer mode, although it would make the gaming experience smoother by reducing the load on system resources. There is no laptop mode in Norton 360 v2. In Laptop Mode scheduled scans, backups and tune-ups are postponed to save battery life. The product does not offer the option to completely erase files and "traces" of files from the disk to prevent their unauthorized recovery. Norton 360 v2 does not have file vault if you want to locally secure personal information or sensitive files.

0 100 200 300 400 500 600

Eset Smart Security

F‐Secure Internet Security

G Data TotalCare

McAfee Total Protection

Kaspersky Internet Security

Norton Internet Security

Norton 360

Microsoft Onecare

Panda Global Protection

Trend Micro Internet Security Pro

BitDefender Total Security

On‐demand scan time

BitDefender Total Security 2009 | Comparative Analysis

25

Norton 360 v2 does not provide instant messaging encryption and your instant messaging traffic can be eavesdropping.

Why not McAfee Total Protection 2009 McAfee Total Protection 2009 uses a lot more resources than BitDefender Total Security 2009, which may translate into a visible PC slow-down. It does not have a gamer mode, so there is no system load reduction during games either. With its 64% proactive detection rate, BitDefender surpasses McAfee’s results (43%) in dealing with new and unknown viruses in Antimalware test performed by www.anti-malware-test.com . The parental control module is not capable of limiting access to certain applications like games, file sharing programs, etc. With McAfee Total Protection 2009 you will not have instant messaging encryption and your instant messaging traffic can be eavesdropping. The battery life of your laptop will be shorter with McAfee Total Security 2009 because it doesn’t have a laptop mode to postpone scheduled scans, backups and tune-ups. The product doesn’t have a feature to monitor the operating system for possible vulnerabilities. McAfee Total Protection 2009 does not have file vault if you want to locally secure personal information or sensitive files. McAfee Total Protection 2009 don’t have the ability to backup important data online to ensure it is secure and protected from computer theft, fire, natural disaster, hard drive or other hardware failure.

Why not Microsoft Onecare v2.5

Microsoft Onecare v2.5 does not include modules that are part of most all-in-one security products: parental control, antispam, tune-up.

The virus shield does not filter either e-mail or web traffic, although it would allow blocking viruses even before they reach the hard disk, therefore reducing the risk of infections.

The product is not protected against illegitimate attempts to disable it but is protected against deleting product files. Many viruses try to disable antivirus products when they execute for the first time. This basically renders the PC without any kind of protection so AV products should have a self protection of their files, processes and services. Microsoft Onecare v2.5 does not have file vault if you want to locally secure personal information or sensitive files. With Microsoft Onecare v2.5 you will not have instant messaging encryption and your instant messaging traffic can be eavesdropping. Microsoft Onecare v2.5 can save online only photos not any other sensitive files.

BitDefender Total Security 2009 | Comparative Analysis

26

Why not Trend Micro Internet Security Pro 2009

The parental control module of this product is not capable of limiting access to certain applications like games, file sharing programs, etc

It does not create backup copies of personal files and documents either, falling short of users’ expectations as to important data safeguarding. With its 64% proactive detection rate, BitDefender surpasses by far Trend Micro’s results (30%) in dealing with new and unknown viruses in Antimalware test performed by www.anti-malware-test.com . The product does not offer the option to completely erase files and "traces" of files from the disk to prevent their unauthorized recovery. With Trend Micro Internet Security Pro 2009 you will not have instant messaging encryption and your instant messaging traffic can be eavesdropping. There is no laptop mode in Trend Micro Internet Security Pro 2009. In Laptop Mode scheduled scans, backups and tune-ups are postponed to save battery life. The product doesn’t have a feature to monitor the operating system for possible vulnerabilities. Finally, it does not provide the possibility of adapting settings to the specific needs of each of the persons who use the same computer.

Why not Kaspersky Internet Security 2009

Kaspkersky Internet Security 2009 only covers data security. Because it lacks a tune-up module, it does not allow improving PC operation through the removal of unnecessary files and registry entries. It does not create backup copies of personal files and documents either, falling short of users’ expectations as to important data safeguarding. Kaspersky does not provide the possibility of adapting the product settings to the specific needs of each of the persons who use the same computer. Kaspersky does not have a gamer mode, so there is no system load reduction during games either. With Kaspersky Internet Security 2009 you don’t have a way to manage an entire home or home office network from a single PC. With this feature you can remotely configured tasks such as scans, backups, tune-ups and updates which can be scheduled or can be run on-demand. Kaspersky Internet Security 2009 does not have instant messaging encryption and your instant messaging traffic can be eavesdropping. Kaspersky Internet Security 2009 does not have file vault if you want to locally secure personal information or sensitive files.

BitDefender Total Security 2009 | Comparative Analysis

27

Why not F-Secure Internet Security 2009 F-secure Internet Security only covers data security. Because it lacks a tune-up module, it does not allow improving PC operation through the removal of unnecessary files and registry entries. It does not create backup copies of personal files and documents either, falling short of users’ expectations as to important data safeguarding. With F-Secure Internet Security 2009 you don’t have a way to manage an entire home or home office network from a single PC. With this feature you can remotely configured tasks such as scans, backups, tune-ups and updates which can be scheduled or can be run on-demand. The product doesn’t have a feature to monitor the operating system for possible vulnerabilities. F-Secure Internet Security 2009 does not have an online backup to save and protect you important data.

Why not Norton Internet Security 2009

Norton Internet Security 2009 only covers data security. Because it lacks a tune-up module, it does not allow improving PC operation through the removal of unnecessary files and registry entries. It does not create backup copies of personal files and documents either, falling short of users’ expectations as to important data safeguarding. The product’s parental control module is not capable of limiting access either to the internet, during specific intervals, or to certain applications like games, file sharing programs, etc. There is no Laptop Mode in Norton Internet Security 2009 but has a “Silent Mode”. When Silent Mode is enabled, Norton Internet Security 2009 suppresses all alerts and suspends the background activities for the duration that you specify. In Laptop Mode scheduled scans, backups and tune-ups are postponed to save battery life. Norton Internet Security 2009 does not have a gamer mode but has Full Screen Detection and when you turn on Norton Internet Security 2009 automatically detects the applications that you run in full-screen mode and enables Silent Mode. Norton Internet Security 2009 does not have file vault if you want to locally secure personal information or sensitive files. With Norton Internet Security 2009 you will not have instant messaging encryption and your instant messaging traffic can be eavesdropping. Norton Internet Security 2009 does not have an online backup to save and protect you important data.

BitDefender Total Security 2009 | Comparative Analysis

28

Why not Panda Global Security 2009

The product’s parental control module is not capable of limiting access either to the internet, during specific intervals, or to certain applications like games, file sharing programs, etc. Panda Global Security 2009 cannot adapt its settings to the specific needs of each of the persons who use the same computer. Panda uses a lot more resources than BitDefender, which may translate into a visible slow-down of the PC. It does not have a gamer mode either, although it would make the gaming experience smoother by reducing the load on system resources. With Panda Global Security 2009 you don’t have a way to manage an entire home or home office network from a single PC. With this feature you can remotely configured tasks such as scans, backups, tune-ups and updates which can be scheduled or can be run on-demand. Panda Global Security 2009 does not have a laptop mode to safe you laptop battery because this feature postpone scheduled scans, backups and tune-ups. Panda Global Security 2009 does not have file vault if you want to locally secure personal information or sensitive files.

Why not Eset Smart Security v3

Eset Smart Security v3 only covers basic security needs. It does not include modules that are part of most all-in-one security products: parental control, backup, tune-up. The firewall is, quite visibly, just a recent addition to Eset’s products. It does not have any predefined network types (direct connection, LAN, etc.), even though it would make the setup phase much easier. Moreover, users cannot assign different profiles to different networks, which may be very annoying if they switch networks often. Eset Smart Security v3does not have a gamer mode, although it would make the gaming experience smoother by reducing the load on system resources. There is no Laptop Mode in Eset Smart Security v3. In Laptop Mode scheduled scans, backups and tune-ups are postponed to save battery life. Eset Smart Security v3 does not have file vault if you want to locally secure personal information or sensitive files. With Eset Smart Security v3 you will not have instant messaging encryption and your instant messaging traffic can be eavesdropping. The product doesn’t have a feature to monitor the operating system for possible vulnerabilities. Eset Smart Security v3 does not provide online storage or sharing.

BitDefender Total Security 2009 | Comparative Analysis

29

Why not G Data Total Care 2009

The product’s firewall does not include Wi-Fi management functions, although they would be useful for the protection of users connecting to open Wi-Fi networks and for the issuing of warnings about attempts to connect to their own network. G-Data uses a lot more resources than BitDefender, which may translate into a visible slow-down of the PC. With G Data Total Care 2009 you don’t have a way to manage an entire home or home office network from a single PC. With this feature you can remotely configured tasks such as scans, backups, tune-ups and updates which can be scheduled or can be run on-demand. G Data Total Care 2009 does not have file vault if you want to locally secure personal information or sensitive files. With G Data Total Care 2009 you will not have instant messaging encryption and your instant messaging traffic can be eavesdropping. There is no Laptop Mode in G Data Total Care 2009. In Laptop Mode scheduled scans, backups and tune-ups are postponed to save battery life.

Main competitors advantage Symantec

Norton 2009 line of products differs from previous version through speed and low

resource consumption. This new line of products is much better than previous and it

seems that Symantec is on the right way.

Different than BitDefender Internet Security 2009, it includes Norton Insight (determines

a trust level for the files that belong to well-known applications), a fill in password

manager (with an overall password) and pulse updates for up-to-the-minute protection

with which they update at 5-15 minutes.

Kaspersky Kaspersky Internet Security 2009 is one of the most expensive on the market (59,95$

for 1 year, 1 PC) and compared to the previous version includes Wi-fi management,

laptop mode (disable scheduled scans).

Different than BitDefender, Kaspersky scan HTTPS/SSL, secure VPN connections and

has a virtual keyboard for safe entry of logins and passwords.

BitDefender Total Security 2009 | Comparative Analysis

30

Panda Panda 2009 line of products has an improved technology with very good speed scan.

The new products use Collective Intelligence to carry out on-demand scans via the

cloud.

Different than the rest of security solutions it can be purchased from up to 6 months.

F-Secure F-Secure Internet Security 2009 includes RBL and dial up control compared to

BitDefender. They have also DeepGuard 2.0 which is based on “in the cloud”

technology.

Trend Micro Trend Micro has focused on home user products this year and they came with a new

concept technology named “in the cloud”.

McAfee McAfee has been focused mostly on online sales and do not have a string presence in

offline retail stores. From a technology perspective, their antivirus engines have good

detection rates but showed slow response times in latest tests and uses a lot more

resources than BitDefender Total Security 2009, which may translate into a visible PC

slow-down. They have also Site Safety Advisor and Link Checker; first adds safety

ratings to sites and search engine results based on comprehensive spam, adware, and

online scam safety tests; and the other identifies and prevents you from clicking on

harmful web site links in your browser, email, or instant messages. Another important

feature is Wireless Network Monitoring which alerts you when intruders try to connect

to your wireless home network.