Search Test Report


You are here: Test Procedures > Test Modules
News
23rd April 2014

Win XP, 7 & 8.1: Internet Security Suites Complete an Endurance Test Lasting 6 Months

Between September 2013 and February 2014, the laboratory experts at AV-TEST subjected 24 Internet...

18th February 2014

30 Security Apps for Android Take On 2200 Pieces of Malware

30 current security apps for Android recently had to fend off 2200 pieces of the latest malware in...

5th February 2014

25 Internet Security Suites Are Put to the Test Using Windows 8.1

According to Microsoft, Windows 8.1 is already equipped with good tools for increased protection...

AV-TEST Statistics

The Modular Structure that Leads To Certificates

All products tested and inspected by AV-TEST undergo complex test procedures in terms of their performance in the categories of Protection, PerformanceUsability and Repair.

Protection

We test the protective effect of security solutions by installing them on a non-infected system and examining how they respond to malware threats. We do so by simulating a variety of attack scenarios such as the threat of e-mail attachments, infected websites or malicious files that have been transferred from external storage devices. When carrying out these tests, AV-TEST takes the entire functionality of the protection program into account.

Performance

Typical actions are used to measure the influence on the system speed, for example:

  • Downloading various files from the Internet
  • Copying files locally and in a network
  • Installing programs
  • Running and using programs such as Word or Excel

Usability

We investigate the influence that security software has on the usability of the system and the system interferences that occur, for example: warning messages, general messages and blockage as well as false positives during system scans.

Repair

The repair performance of products is analysed using a system that is already infected. We evaluate the products' ability to remove active malware and to restore other system changes as well as its performance when detecting and removing specially hidden malware (rootkits).