NSS Labs Breach Detection Systems Report

NSS Labs Breach Detection Systems Test Report – Trend Micro Deep Discovery Inspector Model 4000 (Hardware model 4100) v3.8 SP5 and OfficeScan (OSCE) v12.0.1807_101917 Table of Contents Overview .......................................................................................................................................................................2 Security Effectiveness ...................................................................................................................................................5 False Positives ................................................................................................................................................................ 6 Malware Delivered by Drive-by Exploits........................................................................................................................ 7 Malware Delivered by Social Exploits ............................................................................................................................ 7 Malware Delivered over HTTP ....................................................................................................................................... 8 Malware Delivered over Email ...................................................................................................................................... 8 Offline Infections ........................................................................................................................................................... 9 Resistance to Evasion Techniques ................................................................................................................................. 9 Network Device Performance.....................................................................................................................................10 HTTP Capacity with No Transaction Delays ................................................................................................................. 10 Real-World Traffic Mixes ............................................................................................................................................. 11 Stability and Reliability ...............................................................................................................................................12 Total Cost of Ownership (TCO) ...................................................................................................................................13 Calculating the Total Cost of Ownership (TCO) ........................................................................................................... 13 Installation Time .......................................................................................................................................................... 14 Total Cost of Ownership .............................................................................................................................................. 14 Appendix: Product Scorecard .....................................................................................................................................15 Test Methodology .......................................................................................................................................................17 Contact Information....................................................................................................................................................17 This report is Confidential and is expressly limited to NSS Labs’ licensed users. 3 NSS Labs Breach Detection Systems Test Report – Trend Micro Deep Discovery Inspector Model 4000 (Hardware model 4100) v3.8 SP5 and OfficeScan (OSCE) v12.0.1807_101917 Table of Figures Figure 1 – Overall Test Results....................................................................................................................................... 2 Figure 2 – False Positive Rate ........................................................................................................................................ 6 Figure 3 – Malware Delivered by Drive-by Exploits: Detection over Time (Minutes).................................................... 7 Figure 4 – Malware Delivered by Social Exploits: Detection over Time (Minutes) ........................................................ 7 Figure 5 – Malware Delivered over HTTP: Detection over Time (Minutes) ................................................................... 8 Figure 6 – Malware Delivered over Email: Detection over Time (Minutes) .................................................................. 8 Figure 7 – Offline Infections........................................................................................................................................... 9 Figure 8 – Resistance to Evasion Results ....................................................................................................................... 9 Figure 9 – Detection under Load (HTTP Capacity with No Transaction Delay) ............................................................ 10 Figure 10 – Detection under Load (“Real-World” Traffic) ........................................................................................... 11 Figure 11 – Stability and Reliability Results ................................................................................................................. 12 Figure 12 – Number of Users ....................................................................................................................................... 13 Figure 13 – Installation Time (Hours) .......................................................................................................................... 14 Figure 14 –3-Year TCO (US$) ....................................................................................................................................... 14 Figure 15 – Scorecard .................................................................................................................................................. 16 This report is Confidential and is expressly limited to NSS Labs’ licensed users. 4
Please complete the form to gain access to this content