ICSA Labs report reveals testing details

Posted by   Virus Bulletin on   Nov 18, 2009

Certification issues unmasked in 20-year lab survey.

Renowned testing and certification group ICSA Labs has released a fascinating report drawing back the curtain on its security product tests - the detailed results of which are generally kept quiet as products go through the process of achieving certification.

Among the most widely noted facts in the report is the large number of products that require multiple cycles through the test programme before they manage to achieve certifiable standards.

As with many certification bodies, ICSA generally reports only the status of those products that have made the grade and been awarded certification, while failure to reach the required standards usually results in a private report to the vendor involved so that they can fix any problems with the product and have another go at the test.

According to the report, only 4% of all products tested achieve certification on the first attempt - although 27% of anti-malware solutions are found to be certifiable from the off, the average is heavily dented by the VPN and web application firewall categories, where no product has ever made the grade without receiving advice and assistance from the certifiers.

While these figures have been picked up by the sensational press as indicators of general inadequacy across the security industry, the report aims to highlight the tough and challenging nature of the certification process, and the efforts gone to by certification labs to work with vendors to improve their solutions, providing expertise and cross-industry cooperation.

The report also provides an overview of the history of ICSA and the security industry and offers advice to both product developers and potential buyers, with a lengthy checklist of criteria to consider when selecting a security solution. The report was created in collaboration with ICSA owner Verizon Business, and was issued as part of the inauguration of a new blog. The first entry of the blog, penned by contributing writer and ICSA MD George Japak, is available here. The report itself can be found here, with comments on the ESET blog here, and in The Register here.

Posted on 11 November 2009 by Virus Bulletin

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Necurs pump-and-dump spam campaign pushes obscure cryptocurrency

A Necurs pump-and-dump spam campaign pushing the lesser known Swisscoin botnet is mostly background noise for the Internet.

Alleged author of creepy FruitFly macOS malware arrested

A 28-year old man from Ohio has been arrested on suspicion of having created the mysterious FruitFly malware that targeted macOS and used it to spy on its victims.

The threat and security product landscape in 2017

At the start of the new year, Virus Bulletin looks back at the threats seen in the 2017 and at the security products that are available to help mitigate them.

Spamhaus report shows many botnet controllers look a lot like legitimate servers

Spamhaus's annual report on botnet activity shows that botherders tend to use popular, legitimate hosting providers, domain registrars and top-level domains when setting up command-and-control servers.

Tips on researching tech support scams

As tech support scammers continue to target the computer illiterate through cold calling, VB's Martijn Grooten uses his own experience to share some advice on how to investigate such scams.