ICSA Labs report reveals testing details

Posted by   Virus Bulletin on   Nov 18, 2009

Certification issues unmasked in 20-year lab survey.

Renowned testing and certification group ICSA Labs has released a fascinating report drawing back the curtain on its security product tests - the detailed results of which are generally kept quiet as products go through the process of achieving certification.

Among the most widely noted facts in the report is the large number of products that require multiple cycles through the test programme before they manage to achieve certifiable standards.

As with many certification bodies, ICSA generally reports only the status of those products that have made the grade and been awarded certification, while failure to reach the required standards usually results in a private report to the vendor involved so that they can fix any problems with the product and have another go at the test.

According to the report, only 4% of all products tested achieve certification on the first attempt - although 27% of anti-malware solutions are found to be certifiable from the off, the average is heavily dented by the VPN and web application firewall categories, where no product has ever made the grade without receiving advice and assistance from the certifiers.

While these figures have been picked up by the sensational press as indicators of general inadequacy across the security industry, the report aims to highlight the tough and challenging nature of the certification process, and the efforts gone to by certification labs to work with vendors to improve their solutions, providing expertise and cross-industry cooperation.

The report also provides an overview of the history of ICSA and the security industry and offers advice to both product developers and potential buyers, with a lengthy checklist of criteria to consider when selecting a security solution. The report was created in collaboration with ICSA owner Verizon Business, and was issued as part of the inauguration of a new blog. The first entry of the blog, penned by contributing writer and ICSA MD George Japak, is available here. The report itself can be found here, with comments on the ESET blog here, and in The Register here.

Posted on 11 November 2009 by Virus Bulletin



Latest posts:

VB2017 paper: The life story of an IPT - Inept Persistent Threat actor

At VB2017 in Madrid, Polish security researcher and journalist Adam Haertlé presented a paper about a very inept persistent threat. Today, we publish both the paper and the recording of Adam's presentation.

Five reasons to submit a VB2018 paper this weekend

The call for papers for VB2018 closes on 18 March, and while we've already received many great submissions, we still want more! Here are five reasons why you should submit a paper this weekend.

First partners of VB2018 announced

We are excited to announce the first six companies to partner with VB2018.

VB2018: looking for technical and non-technical talks

We like to pick good, solid technical talks for the VB conference programme, but good talks don't have to be technical and we welcome less technical submissions just as much.

Partner with VB2018 for extra visibility among industry peers

Partnering with the VB conference links your company to a successful and well-established event, demonstrates your commitment to moving the industry forward, allows you to meet potential clients, be visible to industry peers and build lasting…