Search Test Report

You are here: Test Procedures > Test Modules
18th February 2014

30 Security Apps for Android Take On 2200 Pieces of Malware

30 current security apps for Android recently had to fend off 2200 pieces of the latest malware in...

5th February 2014

25 Internet Security Suites Are Put to the Test Using Windows 8.1

According to Microsoft, Windows 8.1 is already equipped with good tools for increased protection...

4th February 2014

The Protection Provided by Security Solutions for the Office Workplace on Windows 8 Systems

Which option provides better protection for your company PC: the protection solution from Microsoft...

AV-TEST Statistics

The Modular Structure that Leads To Certificates

All products tested and inspected by AV-TEST undergo complex test procedures in terms of their performance in the categories of Protection, PerformanceUsability and Repair.


We test the protective effect of security solutions by installing them on a non-infected system and examining how they respond to malware threats. We do so by simulating a variety of attack scenarios such as the threat of e-mail attachments, infected websites or malicious files that have been transferred from external storage devices. When carrying out these tests, AV-TEST takes the entire functionality of the protection program into account.


Typical actions are used to measure the influence on the system speed, for example:

  • Downloading various files from the Internet
  • Copying files locally and in a network
  • Installing programs
  • Running and using programs such as Word or Excel


We investigate the influence that security software has on the usability of the system and the system interferences that occur, for example: warning messages, general messages and blockage as well as false positives during system scans.


The repair performance of products is analysed using a system that is already infected. We evaluate the products' ability to remove active malware and to restore other system changes as well as its performance when detecting and removing specially hidden malware (rootkits).