How to test anti -virus programs


Protecting your devices from viruses and other harmful programs is incredibly important, but the discovery of effective antivirus is not the only thing to consider when choosing a safety program. You also want to make sure that the program will not slow your devices or interfere with daily tasks. If you buy a full set of cybersecurity, you will need to make sure that it covers most or all your security needs.

Our tests are designed to help you find antivirus tools that meet all these standards.

Test environment

All antivirus tests are performed on Lenovo Thinkpad with the Intel i5 and Windows 11 processor. Anti -virus tools are also installed on the Moto G Stylus 5G Android to test the primary interface. Your experience may vary with the anti -virus specified based on the devices you use, especially if you have an older setting.

Browser safety tools are tested on both Chrome and Firefox, with browsers updating to the latest versions before testing. Online tools are tested directly to a browser, such as dark web monitoring, in Firefox.

All tests are performed by the CNET Dianna Gunn, who has 16 years of experience in building websites and eight years of experience in the test.

Features

The first stage of the test is to evaluate the features associated with packets of antivirals and the basic cybersecurity of the company. We consider all the advantages of antivirus itself and the number/types of additional tools available.

Then we compare these features with the offers of the higher anti -virus companies to create a feature of features. Companies with many features receive for the protection of cybersecurity and theft of identity a 10/10 rating.

The ability to use

The practical part of the test begins by buying a plan and creating an account and testing the following areas of use:

  • Account Management: How easy is your products, invoices and other areas of account management
  • Installation and preparation: The extent of the speed and ease of use in the installation process, as well as the ease
  • Additional tools: How easy to install and create virus cybersecurity tools, except for identity the tools

Cyber security companies that make all these three experiences of users receive enjoyable and welcome people who do not obtain a 10/10 use classification.

performance

After installing antivirus, we run it for two or three days while performing daily tasks such as browsing the web (with five to seven tabs) and editing photos to learn how to affect the anti -virus. We also check the task manager periodically to know the amount of treatment strength (the percentage of the central processing unit) and the disk space used by the program.

Throughout the test days, we turn on three of each type of antiviral wiping provided by the program. This usually includes regular surveying, fast survey and deep survey. We are the time when we scan and keep the task manager open all the time to learn about the use of the program resources during the examination operations.

Finally, we move on to test the additional tools, we are looking for some of the main things:

  • The extent of the speed of data via the Internet or the dark web management tools for initial scannings, the amount of data you buy within the first examination and the tools you provide to remove or protect your data
  • The extent of effective performance tools and tools, as well as the effectiveness of identifying areas of improvement
  • How much browser safety tools that affect the browsing experience
  • Whether fraud detection tools are science links from random mail folders as suspicious
  • How much VPN reduces internet speed

To receive a 10/10 classification, all tools should be both fast and effective, using the minimum resources and create the minimum effects of current programs so that users can continue to perform daily activities. Information management and device performance tools must be accurately determined and provided tools or advice to repair them.

Security and privacy

CNET does not conduct security tests due to concerns about the injury of devices in connection with the common Internet. Instead, we consider the third -party tests of laboratories with many years of experience in testing anti -virus and membership programs in Organization for the anti -malware testing. We focus primarily on the test results from Out of the test and Av-Completerss. We are looking for security degrees of 5.5 out of 6 from AV-Test in the past six months and at least last year last year.

We also evaluate how to protect the additional tools of cybersecurity from the privacy of users, focusing on password managers and VPNS. The password manager must use AES-256 encryption and infrastructure for zero knowledge that prevents the company-or any other person-from accessing user passwords. VPN should not keep IP addresses or Internet activity, and you should use any information you keep-along with the information sent through VPN-CE-256 encryption.

After that, we analyze the company’s privacy policies to determine the amount of information it collects about customers and what you do with this information. We pay special attention to whether the company shares customer data with third parties, third parties share the customer data with them and when this data shares. We also notice the location of the company and its rules about whether it shares data with the public authorities and when.

Finally, we are looking into the history of the company to see if it has any known data violations. If data violations occur, we are thinking about the time he spent since these violations, the extent of the company’s transparency about what happened and the company’s activity about reforming safety problems.

Corporates can net security classification of 10/10 if:

  • High degrees consistent in the security of external security for at least six months
  • Wide private protocols for additional tools such as the password manager and VPN
  • Comprehensive privacy policies that define the company only collect the data needed to perform the product
  • Strict restrictions on how and when the customer data shares with third parties, including government authorities
  • There are no data breach during the past five years
  • Date to deal with any previous data violations of transparency and efficiency

Customer service

We explore the customer service portal, each company, looking for:

  • A base for knowledge with a prominent search function and links to common categories of questions, such as preparing the account or installation
  • Videos and photos are included in the knowledge base articles to make educational programs easier for visual learners
  • Live chat, phone and e -mail can be easily accessible, preferably with 24/7 service

Then we communicate with the company through each way to communicate to determine the extent of the speed and representatives of its support. Companies receive customer service classification 10/10 if they provide a wide knowledge base with large content for multimedia, and support 24/7 across all three communication channels (direct chat, phone, email), fast response times and useful support representatives.

value

After developing a comprehensive understanding of how cyber security products and the company’s protection for its customers, we return to its website to reassess its pricing plans. This time, we focus on comparing the prices and features of the basic antivirus, medium -range plan and a higher -level plan on cybersecurity equivalent to popular companies.

Intermediate prices will receive average average (from 30 to 70 dollars annually to combat basic viruses, $ 150 to $ 200 for medium -term plan, $ 2000 to $ 250 annually to the highest degree plan) and a full list of cybersecurity, including protecting identity theft, by a value of 10/10.

Overall ranking

The total categories are determined by the average sub -categories classifications. The anti -virus companies obtained by 8.5 and above are the editors selection award. Companies that occupy the rank between 7 and 8.5 are included in the best menus with recommendations for specified use cases unless there are major problems in security or privacy. It is not recommended for companies that do not receive at least 7 in our reviews.



Leave a Reply

Your email address will not be published. Required fields are marked *