SlideShare a Scribd company logo
1 of 12
Download to read offline
Anti-Virus Comparative
Performance Test
Impact of Security Software on System Performance
Language: English
May 2015
Last Revision: 30th
June 2015
www.av-comparatives.org
Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org
- 2 -
Table of Contents
1. Introduction 3
2. Tested products 3
3. Test methods 4
4. Notes and comments 5
5. Test cases 7
6. Test results 7
7. Award levels reached in this test 11
8. Copyright and Disclaimer 12
Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org
- 3 -
Introduction
We want to make clear that the results in this report are intended only to give an indication of the
impact on system performance (mainly by the real-time/on-access components) of the security prod-
ucts in these specific tests. Users are encouraged to try out the software on their own PC’s and see
how it performs on their own systems.
Tested products
The following products for 64-bit systems were evaluated (with default settings) in this test1
:
Avast Free Antivirus 2015
AVG Internet Security 2015
AVIRA Antivirus Pro 15.0
Baidu Antivirus 5.4 (English)
Bitdefender Internet Security 2015
BullGuard Internet Security 15.1
Emsisoft Anti-Malware 10.0
eScan Internet Security Suite 14.0
ESET Smart Security 8.0
Fortinet FortiClient 5.2 (with FortiGate)
F-Secure Internet Security 2015
Kaspersky Internet Security 2015
Lavasoft Ad-Aware Free Antivirus+ 11.6
McAfee Internet Security 2015
Panda Free Antivirus 15.1
Quick Heal Total Security 16.0
Sophos Endpoint Protection 10.3
Tencent PC Manager 10.4 (English)
ThreatTrack Vipre Internet Security 2015
Trend Micro Internet Security 2015
For the benefit of readers who are familiar with performance tests done in previous years, we should
point out that this test includes both “Antivirus” and “Internet Security” products – both referred to
as security products. We have tested the product that each manufacturer submits for the protection
tests in the Main Test Series. Please note that the results in this report apply only to the specific
product versions listed above (i.e. to the exact version numbers and to 64-bit systems). Also, keep in
mind that different vendors offer different (and differing numbers of) features in their products.
The following activities/tests were performed under an up-to-date Windows 8.1 64-Bit system:
• File copying
• Archiving / unarchiving
• Installing / uninstalling applications
• Launching applications
• Downloading files
• PC Mark 8 Professional Testing Suite
This year we have not considered encoding/transcoding, as we feel this is no longer relevant.
1
We used the latest product versions available at time of testing (May 2015). Additionally, Microsoft Windows
Defender integrated in Windows 8.1 has also been evaluated.
Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org
- 4 -
Test methods
The tests were performed on an HP 350 G1 machine with an Intel Core i5-4210U CPU, 4GB of RAM and
SATA II hard disks. The performance tests were done on a clean and fully updated Windows 8.1 64-Bit
system (English) and then with the installed security software (with default settings). The tests were
done with an active Internet connection to allow for the real-world impact of cloud services/features.
The hard disks were defragmented before starting the various tests, and care was taken to minimize
other factors that could influence the measurements and/or comparability of the systems. Optimizing
processes/fingerprinting used by the products were also considered – this means that the results rep-
resent the impact on a system which has already been operated by the user for a while. The tests were
repeated several times (with and without fingerprinting) in order to get mean values and filter out
measurement errors. After each run, the workstation was defragmented and rebooted six times. We
simulated various file operations that a computer user would execute: copying2
different types of
clean files from one place to another, archiving and unarchiving files, downloading files from the
Internet and launching applications (opening documents). For the subtests, we have this year re-
placed WinAutomation with an industry-recognized performance assessment tool, namely Windows
Assessment and Deployment Toolkit (Windows ADK) 6.3.9600.17029 with the Windows Performance
Toolkit (WPT). This toolkit is widely used in the industry to measure the performance of computer
systems. By using this tool, we enable vendors to more easily replicate the results and find out what
in the product causes the impact on performance. In order to prevent vendors optimising their prod-
ucts for our test, we have implemented our own test drivers for the ADK. These also enable us to
measure the performance impact of individual sub-tests without these influencing each other.
We also used a third-party, industry-recognized performance testing suite (PC Mark 8 Professional) to
measure the system impact during real-world product usage. Readers are invited to evaluate the vari-
ous products themselves, to see what impact they have on their systems (due to e.g. software con-
flicts and/or user preferences, as well as different system configurations that may lead to varying
results).
Security products need to load on systems at an early stage to provide security from the very begin-
ning – this load has some impact on the time needed for a system to start up. Measuring boot times
accurately is challenging. The most significant issue is to define exactly when the system is fully
started, as many operating environments may continue to perform start-up activities for some time
after the system appears responsive to the user. It is also important to consider when the protection
provided by the security solution being tested is fully active, as this could be a useful measure of
boot completion as far as the security solution is concerned. Some security products load their ser-
vices very late at boot (or even minutes later). Users may notice that some time after the system has
loaded, it will become very slow for a little while; thus, it initially looks as though the system has
loaded very quickly, but in fact the security product just loads its services belatedly, leaving the sys-
tem more vulnerable. As we find this misleading, we still do not publish boot times in our reports.
2
We use around 3GB of data consisting of various file types and sizes (pictures, movies, audio files, MS Office
documents, PDF documents, applications/executables, Windows operating system files, archives, etc.).
Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org
- 5 -
Notes and comments
The on-access/real-time scanner component of anti-virus software runs as a background process to
check all files that are accessed, in order to protect the system continuously against malware threats.
For example, on-access scanners scan files as soon as they are accessed, while (e.g.) behaviour-
blockers add a different layer of protection and monitor what the file does when it is already execut-
ed/running. The services and processes that run in the background to do these tasks also require and
use system resources. Suite products usually have a higher impact on system performance than anti-
virus-only products, as more services/features are included and running in the background.
Security products need to be active deep in the system in order to protect it, e.g. to scan processes
and so on that are already active during the system start-up, to identify rootkits and other malware.
Those procedures add some extra time and thus a delay in system boot/start up.
If a product takes up too many system resources, users get annoyed and may either disable or unin-
stall some essential protective features (and thus considerably compromise the security of their sys-
tem) or may switch to security software that is less resource-hungry. Therefore, it is important not
only that anti-virus software provide high detection rates and good protection against malware, but
also that it does not degrade system performance or trouble users.
While this report looks at how much impact various Internet security products have on system perfor-
mance, it is not always the security software that is principally responsible for a slow system. Other
factors also play a role, and if users follow some simple rules, system performance can be improved
noticeably. The next sections address some of the other factors that may play a part.
A few common problems observed on some user PCs:
- Old hardware: If a PC already runs at a snail’s pace because it has ten-year-old hardware, us-
ing modern (security) software may make it unusable.
o If possible, buy a new PC that at least meets the minimum recommended requirements of
the software you want to use. Multi-Core processors are preferable.
o Adding more RAM does not hurt. If you use Windows 7 or Windows 8, you should use a
minimum of 4GB of RAM. If you use Windows XP or Vista, switch to Windows 8.1 64-Bit.
o Make sure you have only ONE security program with real-time protection. If your new PC
came with a trial security suite, remove this before installing a different protection pro-
gram.
- Keep all your software up-to-date: Using an anti-virus version from e.g. 2013 may not pro-
tect you as well as the newer version would, even though you may still be able to update the
signatures. Please visit http://update.microsoft.com regularly and keep your operating system
up-to-date by installing the recommended patches. Any software can have vulnerabilities and
bugs, so keep all the software installed on your PC up-to-date: this will not only protect you
against many exploits and vulnerabilities, but also give you any other application improve-
ments that have been introduced.
Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org
- 6 -
- Clean up the content of your hard disk:
o If your hard disk is almost full, your system performance will suffer accordingly. Leave at
least 20% of your disk space free and transfer your movies and other infrequently ac-
cessed files to another (external) disk. If money is not an issue, consider buying solid-
state drives (SSDs).
o Uninstall unneeded software. Often, the slowdown that users notice after installing an an-
ti-virus product is due to other software on the PC running in the background (that is,
due to software conflicts or heavy file access by other programs, each access requiring an-
ti-virus scanning).
o Remove unneeded entries/shortcuts from the Start-Up folder in the All Programs menu.
o If your PC is already cluttered with residual files and registry entries left over by hundreds
of applications you installed and uninstalled after trying them out, reinstall a clean oper-
ating system and install only software you really need (fewer software installations means
fewer potential vulnerabilities and conflicts, and so on) and use e.g. an image/backup
tool in order to return to a clean system without reinstalling everything.
- Defragment your hard disks regularly: A fragmented hard disk can have a very big impact on
system performance as well as considerably increasing the time needed to boot up the system. A
minimum of 15% free space on a hard disk is necessary for effective defragmentation. Please note
that defragmentation is not necessary with a solid-state drive (SSD) and can reduce its lifetime.
- Fingerprinting/Optimization: most anti-virus products use various technologies to decrease their
impact on system performance. Fingerprinting is such a technology, where already scanned files
do not get rescanned for some time or (more rarely) or are whitelisted. This increases the speed
considerably (especially after a longer period of PC usage), but also adds some potential risk, as
not all files are scanned anymore. It is up to the user to decide what to do. We suggest regularly
performing a full-system scan (to be sure that all files are at least currently found to be clean,
and to further optimize the fingerprinting).
- Be patient: a delay of a few additional seconds due to security software is not necessarily a big
deal. However, if even with the suggestions above the performance of your PC still annoys you,
you should consider trying out another anti-virus product. If you only notice a slow-down after
using the anti-virus for a long time, there are probably other factors behind the slowdown. Never
reduce your security by disabling essential protection features, just in the hope of gaining a
slightly faster PC!
Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org
- 7 -
Test cases
File copying: Some anti-virus products ignore some types of files by design/default (e.g. based on
their file extensions), or use fingerprinting technologies, which may skip already scanned files in
order to increase the speed (see comments on page 6). We copied a set of various common file types
from one physical hard disk to another physical hard disk.
Archiving and unarchiving: Archives are commonly used for file storage, and the impact of anti-virus
software on the time taken to create new archives or to unarchive files from existing archives may be
of interest for most users. We archived a set of different file types that are commonly found on home
and office workstations. The results already consider the fingerprinting/optimization technologies of
the anti-virus products, as most users usually make archives of files they have on their disk.
Installing/uninstalling applications: We installed several popular applications with the silent install
mode, then uninstalled them and measured how long it took. We did not consider fingerprinting, be-
cause usually an application is installed only once.
Launching applications: Microsoft Office (Word, Excel, PowerPoint) and PDF documents are very
common. We opened and then later closed various documents in Microsoft Office and in Adobe Acro-
bat Reader. The time taken for the viewer or editor application to launch, and afterwards to close, was
measured. Although we list the results for the first opening and the subsequent openings, we consider
the subsequent openings more important, as normally this operation is done several times by users,
and optimization of the anti-virus products take place, minimizing their impact on the systems.
Downloading files: Large files are downloaded from a local server with a GUI-less browser that allows
sending HTTP requests in the background. Additionally, the content of several popular websites are
fetched via wget, also from a local server.
Test results
These specific test results show the impact on system performance that a security product has, com-
pared to the other tested security products. The reported data just gives an indication and is not nec-
essarily applicable in all circumstances, as too many factors can play an additional part. The testers
defined the categories Mediocre, Fast and Very Fast by consulting statistical methods and taking into
consideration what would be noticed from the user’s perspective, or compared to the impact of the
other security products. If some products are faster/slower than others in a single subtest, this is
reflected in the results.
Mediocre Fast Very Fast
The mean value of the products
in this cluster builds a third
cluster in the given subcategory
The mean value of the
products in this group is
higher than the average of
all scores in the given
subcategory
The mean value of the
products in this group is
lower than the average of
all scores in the given
subcategory
Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org
- 8 -
Overview of single AV-C performance scores
Vendor File copying Archiving/
unarchiving
Installing/
uninstalling
applications
Launching applications
(opening documents and PDF files) Downloading files
On first run On subsequent runs On first run On subsequent runs
Avast
AVG
Avira
Baidu
Bitdefender
BullGuard
Emsisoft
eScan
ESET
Fortinet
F-Secure
Kaspersky Lab
Lavasoft
McAfee
Microsoft
Panda
Quick Heal
Sophos
Tencent
Trend Micro
ThreatTrack
Key: mediocre fast very fast
Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org
- 9 -
PC Mark Tests
In order to provide an industry-recognized performance test, we used the PC Mark 8 Professional Edi-
tion3
testing suite. Users using PC Mark 8 benchmark4
should take care to minimize all external factors
that could affect the testing suite, and strictly follow at least the suggestions documented inside the
PC Mark manual, in order to get consistent and valid/useful results. Furthermore, the tests should be
repeated several times to verify them. For more information about the various consumer scenarios
tests included in PC Mark, please read the whitepaper on their website5
.
“No security software” is tested on a baseline6
system with Windows Defender disabled7
, which scores
100 points in the PC Mark 8 Work benchmark.
PC Mark 8
Points
No security software 100
Avast 97.9
Emsisoft 97.8
Kaspersky Lab 97.7
Bitdefender
97.6ESET
McAfee
AVG
97.5
F-Secure
Avira
97.4Sophos
Tencent
BullGuard 97.2
Baidu
97.1
eScan
Panda 97.0
Fortinet
96.7
Trend Micro
Lavasoft
96.3Quick Heal
ThreatTrack
3
For more information, see http://www.futuremark.com/benchmarks/pcmark8
4
PCMark® is a registered trademark of Futuremark Corporation.
5
http://www.futuremark.com/downloads/pcmark8-technical-guide.pdf (PDF)
6
Baseline system: Intel Core i5-4210U machine with 4GB RAM
7
The PC Mark score with active Windows Defender would be 96,9.
Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org
- 10 -
Summarized results
Users should weight the various subtests according to their needs. We applied a scoring system in
order to sum up the various results. Please note that for the File Copying and Launching Applications
subtests, we noted separately the results for the first run and for subsequent runs. For the AV-C score,
we took the rounded mean values of first and subsequent runs for File Copying, whilst for Launching
Applications we considered only the subsequent runs. “Very fast” gets 15 points, “fast” gets 10 points
and “mediocre” gets 5 points. This leads to the following results:
AV-C Score PC Mark Score TOTAL Impact Score
Avast 73 97.9 170.9 4.1
Emsisoft 73 97.8 170.8 4.2
Avira 70 97.4 167.4 7.6
Kaspersky Lab 68 97.7 165.7 9.3
AVG 65 97.5 162.5 12.5
Bitdefender 63 97.6 160.6 14.4
ESET 63 97.6 160.6 14.4
McAfee 63 97.6 160.6 14.4
Sophos 63 97.4 160.4 14.6
Tencent 63 97.4 160.4 14.6
Baidu 63 97.1 160.1 14.9
eScan 63 97.1 160.1 14.9
BullGuard 60 97.2 157.2 17.8
F-Secure 58 97.5 155.5 19.5
Panda 58 97.0 155.0 20.0
Fortinet 58 96.7 154.7 20.3
Trend Micro 58 96.7 154.7 20.3
Lavasoft 58 96.3 154.3 20.7
Quick Heal 53 96.3 149.3 25.7
ThreatTrack 53 96.3 149.3 25.7
The out-of-box system impact score with enabled Windows Defender on Microsoft Windows 8.1 is 18.1.
Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org
- 11 -
Award levels reached in this test
The following award levels are for the results reached in this performance test report8
. Please note
that the performance test only tells you how much impact a security product may have on a system
compared to other security products (please read the note on page 8); it does not say anything about
the effectiveness of the protection a product provides, so please have also a look at the results of
recent Real-World Protection and File Detection tests on our website.
AWARDS PRODUCTS9
Avast
Emsisoft
Avira
Kaspersky Lab
AVG
Bitdefender
ESET
McAfee
Sophos
Tencent
Baidu
eScan
BullGuard
F-Secure
Panda
Fortinet
Trend Micro
Lavasoft
Quick Heal
ThreatTrack
-
The above awards have been given based on our assessment of the overall impact results with default
settings under Windows 8.1 64-Bit.
8
Microsoft Windows Defender was tested out-of-competition and is therefore not included in the awards page.
9
We suggest considering products with the same award to be as light as the other products with same award.
Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org
- 12 -
Copyright and Disclaimer
This publication is Copyright © 2015 by AV-Comparatives®. Any use of the results, etc. in whole or in
part, is ONLY permitted if the explicit written agreement of the management board of AV-
Comparatives is given prior to any publication. AV-Comparatives and its testers cannot be held liable
for any damage or loss, which might occur as a result of, or in connection with, the use of the infor-
mation provided in this paper. We take every possible care to ensure the correctness of the basic data,
but no representative of AV-Comparatives can he held liable for the accuracy of the test results. We do
not give any guarantee of the correctness, completeness, or suitability for a specific purpose of any of
the information/content provided at any given time. No one else involved in creating, producing or
delivering test results shall be liable for any indirect, special or consequential damage, or loss of prof-
its, arising out of, or related to, the use or inability to use, the services provided by the website, test
documents or any related data.
AV-Comparatives (June 2015)

More Related Content

What's hot

Unit 6 final
Unit 6 finalUnit 6 final
Unit 6 finalsietkcse
 
Software testing and test environment​
Software testing and test environment​Software testing and test environment​
Software testing and test environment​adhirasable
 
The complete guide for software integration testing | David Tzemach
The complete guide for software integration testing | David TzemachThe complete guide for software integration testing | David Tzemach
The complete guide for software integration testing | David TzemachDavid Tzemach
 
Integration testing
Integration testingIntegration testing
Integration testingVaibhav Dash
 
Integration testing
Integration testingIntegration testing
Integration testingTechversant
 
What is Integration Testing? | Edureka
What is Integration Testing? | EdurekaWhat is Integration Testing? | Edureka
What is Integration Testing? | EdurekaEdureka!
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigatericharddxd
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksErdem Erdogan
 
Unit Testing vs Integration Testing
Unit Testing vs Integration TestingUnit Testing vs Integration Testing
Unit Testing vs Integration TestingRock Interview
 
Enterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security AssessmentsEnterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security AssessmentsEnclaveSecurity
 

What's hot (20)

Testing
Testing Testing
Testing
 
Unit 6 final
Unit 6 finalUnit 6 final
Unit 6 final
 
Software testing and test environment​
Software testing and test environment​Software testing and test environment​
Software testing and test environment​
 
The complete guide for software integration testing | David Tzemach
The complete guide for software integration testing | David TzemachThe complete guide for software integration testing | David Tzemach
The complete guide for software integration testing | David Tzemach
 
Types of Non Functional Testing
Types of Non Functional TestingTypes of Non Functional Testing
Types of Non Functional Testing
 
Integration testing
Integration testingIntegration testing
Integration testing
 
Integration testing
Integration testingIntegration testing
Integration testing
 
St6 to st7 update Procedure
St6 to st7 update ProcedureSt6 to st7 update Procedure
St6 to st7 update Procedure
 
Application Testing
Application TestingApplication Testing
Application Testing
 
Software automation
Software automationSoftware automation
Software automation
 
Avc fd mar2012_intl_en
Avc fd mar2012_intl_enAvc fd mar2012_intl_en
Avc fd mar2012_intl_en
 
SRE Tools
SRE ToolsSRE Tools
SRE Tools
 
What is Integration Testing? | Edureka
What is Integration Testing? | EdurekaWhat is Integration Testing? | Edureka
What is Integration Testing? | Edureka
 
Avc fd mar2012_intl_en
Avc fd mar2012_intl_enAvc fd mar2012_intl_en
Avc fd mar2012_intl_en
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigate
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid Cyberattacks
 
Unit Testing vs Integration Testing
Unit Testing vs Integration TestingUnit Testing vs Integration Testing
Unit Testing vs Integration Testing
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Enterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security AssessmentsEnterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security Assessments
 

Viewers also liked

창의적 발상
창의적 발상창의적 발상
창의적 발상태경 김
 
Grossesses
GrossessesGrossesses
GrossessesITPCMENA
 
Effets secondaires
Effets secondairesEffets secondaires
Effets secondairesITPCMENA
 
лекция5
лекция5лекция5
лекция5infcult
 
лекция1
лекция1лекция1
лекция1infcult
 
Six thinking hats
Six thinking hatsSix thinking hats
Six thinking hatsWeolcan
 
HIV, pregnancy
HIV, pregnancyHIV, pregnancy
HIV, pregnancyITPCMENA
 
John Coe Resume 2015
John Coe Resume 2015John Coe Resume 2015
John Coe Resume 2015John Coe
 
Life Coaching Program_updated
Life Coaching Program_updatedLife Coaching Program_updated
Life Coaching Program_updatedArjun Gaur
 
Industry risk assessment and risk managemnt
Industry risk assessment and risk managemntIndustry risk assessment and risk managemnt
Industry risk assessment and risk managemntMd Niamul Islam
 

Viewers also liked (15)

Luxury Cars in India
Luxury Cars in IndiaLuxury Cars in India
Luxury Cars in India
 
창의적 발상
창의적 발상창의적 발상
창의적 발상
 
Grossesses
GrossessesGrossesses
Grossesses
 
Effets secondaires
Effets secondairesEffets secondaires
Effets secondaires
 
лекция5
лекция5лекция5
лекция5
 
samar resume
samar resumesamar resume
samar resume
 
IBAT eMarketing
IBAT eMarketingIBAT eMarketing
IBAT eMarketing
 
лекция1
лекция1лекция1
лекция1
 
Six thinking hats
Six thinking hatsSix thinking hats
Six thinking hats
 
Decision process
Decision processDecision process
Decision process
 
HIV, pregnancy
HIV, pregnancyHIV, pregnancy
HIV, pregnancy
 
John Coe Resume 2015
John Coe Resume 2015John Coe Resume 2015
John Coe Resume 2015
 
Life Coaching Program_updated
Life Coaching Program_updatedLife Coaching Program_updated
Life Coaching Program_updated
 
Industry risk assessment and risk managemnt
Industry risk assessment and risk managemntIndustry risk assessment and risk managemnt
Industry risk assessment and risk managemnt
 
Front page progress
Front page progressFront page progress
Front page progress
 

Similar to ANTIVIRUS

The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017Jermund Ottermo
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010nuttakorn nakkerd
 
Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Doryan Mathos
 
Window Desktop Application Testing
Window Desktop Application TestingWindow Desktop Application Testing
Window Desktop Application TestingTrupti Jethva
 
Configuration testing
Configuration testingConfiguration testing
Configuration testingfarouq umar
 
Desktop applicationtesting
Desktop applicationtestingDesktop applicationtesting
Desktop applicationtestingAkss004
 
Automated Regression Testing for Embedded Systems in Action
Automated Regression Testing for Embedded Systems in ActionAutomated Regression Testing for Embedded Systems in Action
Automated Regression Testing for Embedded Systems in ActionAANDTech
 
STLC– software testing life cycle
STLC– software testing life cycleSTLC– software testing life cycle
STLC– software testing life cyclesubash kumar
 
AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015AVG Technologies
 
11 steps of testing process - By Harshil Barot
11 steps of testing process - By Harshil Barot11 steps of testing process - By Harshil Barot
11 steps of testing process - By Harshil BarotHarshil Barot
 
Levels Of Testing.pptx
Levels Of Testing.pptxLevels Of Testing.pptx
Levels Of Testing.pptxSunilNagaraj10
 
Manual testing visonia
Manual testing   visoniaManual testing   visonia
Manual testing visoniaVisoniaTechlab
 
Lab #2 Managing Host Based Security Purpose To develop .docx
Lab #2  Managing Host Based Security Purpose To develop .docxLab #2  Managing Host Based Security Purpose To develop .docx
Lab #2 Managing Host Based Security Purpose To develop .docxsmile790243
 
Testing Presentation
Testing PresentationTesting Presentation
Testing Presentationsureshpkumar
 

Similar to ANTIVIRUS (20)

Avc prot 2013a_en
Avc prot 2013a_enAvc prot 2013a_en
Avc prot 2013a_en
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010
 
Avc prot 2012b_en
Avc prot 2012b_enAvc prot 2012b_en
Avc prot 2012b_en
 
Avc prot 2016a_en
Avc prot 2016a_enAvc prot 2016a_en
Avc prot 2016a_en
 
Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014
 
Window Desktop Application Testing
Window Desktop Application TestingWindow Desktop Application Testing
Window Desktop Application Testing
 
Configuration testing
Configuration testingConfiguration testing
Configuration testing
 
Desktop applicationtesting
Desktop applicationtestingDesktop applicationtesting
Desktop applicationtesting
 
Test plan
Test planTest plan
Test plan
 
Automated Regression Testing for Embedded Systems in Action
Automated Regression Testing for Embedded Systems in ActionAutomated Regression Testing for Embedded Systems in Action
Automated Regression Testing for Embedded Systems in Action
 
Avc fdt 201303_en
Avc fdt 201303_enAvc fdt 201303_en
Avc fdt 201303_en
 
STLC– software testing life cycle
STLC– software testing life cycleSTLC– software testing life cycle
STLC– software testing life cycle
 
AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015
 
Software testing
Software testingSoftware testing
Software testing
 
11 steps of testing process - By Harshil Barot
11 steps of testing process - By Harshil Barot11 steps of testing process - By Harshil Barot
11 steps of testing process - By Harshil Barot
 
Levels Of Testing.pptx
Levels Of Testing.pptxLevels Of Testing.pptx
Levels Of Testing.pptx
 
Manual testing visonia
Manual testing   visoniaManual testing   visonia
Manual testing visonia
 
Lab #2 Managing Host Based Security Purpose To develop .docx
Lab #2  Managing Host Based Security Purpose To develop .docxLab #2  Managing Host Based Security Purpose To develop .docx
Lab #2 Managing Host Based Security Purpose To develop .docx
 
Testing Presentation
Testing PresentationTesting Presentation
Testing Presentation
 

More from fauscha

007359 hanampa alvarez faustino
007359 hanampa alvarez faustino007359 hanampa alvarez faustino
007359 hanampa alvarez faustinofauscha
 
007359 hanampa alvarez faustino
007359 hanampa alvarez faustino007359 hanampa alvarez faustino
007359 hanampa alvarez faustinofauscha
 
Ejercicios de clase
Ejercicios de claseEjercicios de clase
Ejercicios de clasefauscha
 
SEGURIDAD INFORMATICA
SEGURIDAD INFORMATICASEGURIDAD INFORMATICA
SEGURIDAD INFORMATICAfauscha
 

More from fauscha (6)

Hanampa
HanampaHanampa
Hanampa
 
Alvarez
AlvarezAlvarez
Alvarez
 
007359 hanampa alvarez faustino
007359 hanampa alvarez faustino007359 hanampa alvarez faustino
007359 hanampa alvarez faustino
 
007359 hanampa alvarez faustino
007359 hanampa alvarez faustino007359 hanampa alvarez faustino
007359 hanampa alvarez faustino
 
Ejercicios de clase
Ejercicios de claseEjercicios de clase
Ejercicios de clase
 
SEGURIDAD INFORMATICA
SEGURIDAD INFORMATICASEGURIDAD INFORMATICA
SEGURIDAD INFORMATICA
 

Recently uploaded

VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 

Recently uploaded (20)

VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 

ANTIVIRUS

  • 1. Anti-Virus Comparative Performance Test Impact of Security Software on System Performance Language: English May 2015 Last Revision: 30th June 2015 www.av-comparatives.org
  • 2. Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org - 2 - Table of Contents 1. Introduction 3 2. Tested products 3 3. Test methods 4 4. Notes and comments 5 5. Test cases 7 6. Test results 7 7. Award levels reached in this test 11 8. Copyright and Disclaimer 12
  • 3. Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org - 3 - Introduction We want to make clear that the results in this report are intended only to give an indication of the impact on system performance (mainly by the real-time/on-access components) of the security prod- ucts in these specific tests. Users are encouraged to try out the software on their own PC’s and see how it performs on their own systems. Tested products The following products for 64-bit systems were evaluated (with default settings) in this test1 : Avast Free Antivirus 2015 AVG Internet Security 2015 AVIRA Antivirus Pro 15.0 Baidu Antivirus 5.4 (English) Bitdefender Internet Security 2015 BullGuard Internet Security 15.1 Emsisoft Anti-Malware 10.0 eScan Internet Security Suite 14.0 ESET Smart Security 8.0 Fortinet FortiClient 5.2 (with FortiGate) F-Secure Internet Security 2015 Kaspersky Internet Security 2015 Lavasoft Ad-Aware Free Antivirus+ 11.6 McAfee Internet Security 2015 Panda Free Antivirus 15.1 Quick Heal Total Security 16.0 Sophos Endpoint Protection 10.3 Tencent PC Manager 10.4 (English) ThreatTrack Vipre Internet Security 2015 Trend Micro Internet Security 2015 For the benefit of readers who are familiar with performance tests done in previous years, we should point out that this test includes both “Antivirus” and “Internet Security” products – both referred to as security products. We have tested the product that each manufacturer submits for the protection tests in the Main Test Series. Please note that the results in this report apply only to the specific product versions listed above (i.e. to the exact version numbers and to 64-bit systems). Also, keep in mind that different vendors offer different (and differing numbers of) features in their products. The following activities/tests were performed under an up-to-date Windows 8.1 64-Bit system: • File copying • Archiving / unarchiving • Installing / uninstalling applications • Launching applications • Downloading files • PC Mark 8 Professional Testing Suite This year we have not considered encoding/transcoding, as we feel this is no longer relevant. 1 We used the latest product versions available at time of testing (May 2015). Additionally, Microsoft Windows Defender integrated in Windows 8.1 has also been evaluated.
  • 4. Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org - 4 - Test methods The tests were performed on an HP 350 G1 machine with an Intel Core i5-4210U CPU, 4GB of RAM and SATA II hard disks. The performance tests were done on a clean and fully updated Windows 8.1 64-Bit system (English) and then with the installed security software (with default settings). The tests were done with an active Internet connection to allow for the real-world impact of cloud services/features. The hard disks were defragmented before starting the various tests, and care was taken to minimize other factors that could influence the measurements and/or comparability of the systems. Optimizing processes/fingerprinting used by the products were also considered – this means that the results rep- resent the impact on a system which has already been operated by the user for a while. The tests were repeated several times (with and without fingerprinting) in order to get mean values and filter out measurement errors. After each run, the workstation was defragmented and rebooted six times. We simulated various file operations that a computer user would execute: copying2 different types of clean files from one place to another, archiving and unarchiving files, downloading files from the Internet and launching applications (opening documents). For the subtests, we have this year re- placed WinAutomation with an industry-recognized performance assessment tool, namely Windows Assessment and Deployment Toolkit (Windows ADK) 6.3.9600.17029 with the Windows Performance Toolkit (WPT). This toolkit is widely used in the industry to measure the performance of computer systems. By using this tool, we enable vendors to more easily replicate the results and find out what in the product causes the impact on performance. In order to prevent vendors optimising their prod- ucts for our test, we have implemented our own test drivers for the ADK. These also enable us to measure the performance impact of individual sub-tests without these influencing each other. We also used a third-party, industry-recognized performance testing suite (PC Mark 8 Professional) to measure the system impact during real-world product usage. Readers are invited to evaluate the vari- ous products themselves, to see what impact they have on their systems (due to e.g. software con- flicts and/or user preferences, as well as different system configurations that may lead to varying results). Security products need to load on systems at an early stage to provide security from the very begin- ning – this load has some impact on the time needed for a system to start up. Measuring boot times accurately is challenging. The most significant issue is to define exactly when the system is fully started, as many operating environments may continue to perform start-up activities for some time after the system appears responsive to the user. It is also important to consider when the protection provided by the security solution being tested is fully active, as this could be a useful measure of boot completion as far as the security solution is concerned. Some security products load their ser- vices very late at boot (or even minutes later). Users may notice that some time after the system has loaded, it will become very slow for a little while; thus, it initially looks as though the system has loaded very quickly, but in fact the security product just loads its services belatedly, leaving the sys- tem more vulnerable. As we find this misleading, we still do not publish boot times in our reports. 2 We use around 3GB of data consisting of various file types and sizes (pictures, movies, audio files, MS Office documents, PDF documents, applications/executables, Windows operating system files, archives, etc.).
  • 5. Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org - 5 - Notes and comments The on-access/real-time scanner component of anti-virus software runs as a background process to check all files that are accessed, in order to protect the system continuously against malware threats. For example, on-access scanners scan files as soon as they are accessed, while (e.g.) behaviour- blockers add a different layer of protection and monitor what the file does when it is already execut- ed/running. The services and processes that run in the background to do these tasks also require and use system resources. Suite products usually have a higher impact on system performance than anti- virus-only products, as more services/features are included and running in the background. Security products need to be active deep in the system in order to protect it, e.g. to scan processes and so on that are already active during the system start-up, to identify rootkits and other malware. Those procedures add some extra time and thus a delay in system boot/start up. If a product takes up too many system resources, users get annoyed and may either disable or unin- stall some essential protective features (and thus considerably compromise the security of their sys- tem) or may switch to security software that is less resource-hungry. Therefore, it is important not only that anti-virus software provide high detection rates and good protection against malware, but also that it does not degrade system performance or trouble users. While this report looks at how much impact various Internet security products have on system perfor- mance, it is not always the security software that is principally responsible for a slow system. Other factors also play a role, and if users follow some simple rules, system performance can be improved noticeably. The next sections address some of the other factors that may play a part. A few common problems observed on some user PCs: - Old hardware: If a PC already runs at a snail’s pace because it has ten-year-old hardware, us- ing modern (security) software may make it unusable. o If possible, buy a new PC that at least meets the minimum recommended requirements of the software you want to use. Multi-Core processors are preferable. o Adding more RAM does not hurt. If you use Windows 7 or Windows 8, you should use a minimum of 4GB of RAM. If you use Windows XP or Vista, switch to Windows 8.1 64-Bit. o Make sure you have only ONE security program with real-time protection. If your new PC came with a trial security suite, remove this before installing a different protection pro- gram. - Keep all your software up-to-date: Using an anti-virus version from e.g. 2013 may not pro- tect you as well as the newer version would, even though you may still be able to update the signatures. Please visit http://update.microsoft.com regularly and keep your operating system up-to-date by installing the recommended patches. Any software can have vulnerabilities and bugs, so keep all the software installed on your PC up-to-date: this will not only protect you against many exploits and vulnerabilities, but also give you any other application improve- ments that have been introduced.
  • 6. Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org - 6 - - Clean up the content of your hard disk: o If your hard disk is almost full, your system performance will suffer accordingly. Leave at least 20% of your disk space free and transfer your movies and other infrequently ac- cessed files to another (external) disk. If money is not an issue, consider buying solid- state drives (SSDs). o Uninstall unneeded software. Often, the slowdown that users notice after installing an an- ti-virus product is due to other software on the PC running in the background (that is, due to software conflicts or heavy file access by other programs, each access requiring an- ti-virus scanning). o Remove unneeded entries/shortcuts from the Start-Up folder in the All Programs menu. o If your PC is already cluttered with residual files and registry entries left over by hundreds of applications you installed and uninstalled after trying them out, reinstall a clean oper- ating system and install only software you really need (fewer software installations means fewer potential vulnerabilities and conflicts, and so on) and use e.g. an image/backup tool in order to return to a clean system without reinstalling everything. - Defragment your hard disks regularly: A fragmented hard disk can have a very big impact on system performance as well as considerably increasing the time needed to boot up the system. A minimum of 15% free space on a hard disk is necessary for effective defragmentation. Please note that defragmentation is not necessary with a solid-state drive (SSD) and can reduce its lifetime. - Fingerprinting/Optimization: most anti-virus products use various technologies to decrease their impact on system performance. Fingerprinting is such a technology, where already scanned files do not get rescanned for some time or (more rarely) or are whitelisted. This increases the speed considerably (especially after a longer period of PC usage), but also adds some potential risk, as not all files are scanned anymore. It is up to the user to decide what to do. We suggest regularly performing a full-system scan (to be sure that all files are at least currently found to be clean, and to further optimize the fingerprinting). - Be patient: a delay of a few additional seconds due to security software is not necessarily a big deal. However, if even with the suggestions above the performance of your PC still annoys you, you should consider trying out another anti-virus product. If you only notice a slow-down after using the anti-virus for a long time, there are probably other factors behind the slowdown. Never reduce your security by disabling essential protection features, just in the hope of gaining a slightly faster PC!
  • 7. Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org - 7 - Test cases File copying: Some anti-virus products ignore some types of files by design/default (e.g. based on their file extensions), or use fingerprinting technologies, which may skip already scanned files in order to increase the speed (see comments on page 6). We copied a set of various common file types from one physical hard disk to another physical hard disk. Archiving and unarchiving: Archives are commonly used for file storage, and the impact of anti-virus software on the time taken to create new archives or to unarchive files from existing archives may be of interest for most users. We archived a set of different file types that are commonly found on home and office workstations. The results already consider the fingerprinting/optimization technologies of the anti-virus products, as most users usually make archives of files they have on their disk. Installing/uninstalling applications: We installed several popular applications with the silent install mode, then uninstalled them and measured how long it took. We did not consider fingerprinting, be- cause usually an application is installed only once. Launching applications: Microsoft Office (Word, Excel, PowerPoint) and PDF documents are very common. We opened and then later closed various documents in Microsoft Office and in Adobe Acro- bat Reader. The time taken for the viewer or editor application to launch, and afterwards to close, was measured. Although we list the results for the first opening and the subsequent openings, we consider the subsequent openings more important, as normally this operation is done several times by users, and optimization of the anti-virus products take place, minimizing their impact on the systems. Downloading files: Large files are downloaded from a local server with a GUI-less browser that allows sending HTTP requests in the background. Additionally, the content of several popular websites are fetched via wget, also from a local server. Test results These specific test results show the impact on system performance that a security product has, com- pared to the other tested security products. The reported data just gives an indication and is not nec- essarily applicable in all circumstances, as too many factors can play an additional part. The testers defined the categories Mediocre, Fast and Very Fast by consulting statistical methods and taking into consideration what would be noticed from the user’s perspective, or compared to the impact of the other security products. If some products are faster/slower than others in a single subtest, this is reflected in the results. Mediocre Fast Very Fast The mean value of the products in this cluster builds a third cluster in the given subcategory The mean value of the products in this group is higher than the average of all scores in the given subcategory The mean value of the products in this group is lower than the average of all scores in the given subcategory
  • 8. Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org - 8 - Overview of single AV-C performance scores Vendor File copying Archiving/ unarchiving Installing/ uninstalling applications Launching applications (opening documents and PDF files) Downloading files On first run On subsequent runs On first run On subsequent runs Avast AVG Avira Baidu Bitdefender BullGuard Emsisoft eScan ESET Fortinet F-Secure Kaspersky Lab Lavasoft McAfee Microsoft Panda Quick Heal Sophos Tencent Trend Micro ThreatTrack Key: mediocre fast very fast
  • 9. Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org - 9 - PC Mark Tests In order to provide an industry-recognized performance test, we used the PC Mark 8 Professional Edi- tion3 testing suite. Users using PC Mark 8 benchmark4 should take care to minimize all external factors that could affect the testing suite, and strictly follow at least the suggestions documented inside the PC Mark manual, in order to get consistent and valid/useful results. Furthermore, the tests should be repeated several times to verify them. For more information about the various consumer scenarios tests included in PC Mark, please read the whitepaper on their website5 . “No security software” is tested on a baseline6 system with Windows Defender disabled7 , which scores 100 points in the PC Mark 8 Work benchmark. PC Mark 8 Points No security software 100 Avast 97.9 Emsisoft 97.8 Kaspersky Lab 97.7 Bitdefender 97.6ESET McAfee AVG 97.5 F-Secure Avira 97.4Sophos Tencent BullGuard 97.2 Baidu 97.1 eScan Panda 97.0 Fortinet 96.7 Trend Micro Lavasoft 96.3Quick Heal ThreatTrack 3 For more information, see http://www.futuremark.com/benchmarks/pcmark8 4 PCMark® is a registered trademark of Futuremark Corporation. 5 http://www.futuremark.com/downloads/pcmark8-technical-guide.pdf (PDF) 6 Baseline system: Intel Core i5-4210U machine with 4GB RAM 7 The PC Mark score with active Windows Defender would be 96,9.
  • 10. Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org - 10 - Summarized results Users should weight the various subtests according to their needs. We applied a scoring system in order to sum up the various results. Please note that for the File Copying and Launching Applications subtests, we noted separately the results for the first run and for subsequent runs. For the AV-C score, we took the rounded mean values of first and subsequent runs for File Copying, whilst for Launching Applications we considered only the subsequent runs. “Very fast” gets 15 points, “fast” gets 10 points and “mediocre” gets 5 points. This leads to the following results: AV-C Score PC Mark Score TOTAL Impact Score Avast 73 97.9 170.9 4.1 Emsisoft 73 97.8 170.8 4.2 Avira 70 97.4 167.4 7.6 Kaspersky Lab 68 97.7 165.7 9.3 AVG 65 97.5 162.5 12.5 Bitdefender 63 97.6 160.6 14.4 ESET 63 97.6 160.6 14.4 McAfee 63 97.6 160.6 14.4 Sophos 63 97.4 160.4 14.6 Tencent 63 97.4 160.4 14.6 Baidu 63 97.1 160.1 14.9 eScan 63 97.1 160.1 14.9 BullGuard 60 97.2 157.2 17.8 F-Secure 58 97.5 155.5 19.5 Panda 58 97.0 155.0 20.0 Fortinet 58 96.7 154.7 20.3 Trend Micro 58 96.7 154.7 20.3 Lavasoft 58 96.3 154.3 20.7 Quick Heal 53 96.3 149.3 25.7 ThreatTrack 53 96.3 149.3 25.7 The out-of-box system impact score with enabled Windows Defender on Microsoft Windows 8.1 is 18.1.
  • 11. Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org - 11 - Award levels reached in this test The following award levels are for the results reached in this performance test report8 . Please note that the performance test only tells you how much impact a security product may have on a system compared to other security products (please read the note on page 8); it does not say anything about the effectiveness of the protection a product provides, so please have also a look at the results of recent Real-World Protection and File Detection tests on our website. AWARDS PRODUCTS9 Avast Emsisoft Avira Kaspersky Lab AVG Bitdefender ESET McAfee Sophos Tencent Baidu eScan BullGuard F-Secure Panda Fortinet Trend Micro Lavasoft Quick Heal ThreatTrack - The above awards have been given based on our assessment of the overall impact results with default settings under Windows 8.1 64-Bit. 8 Microsoft Windows Defender was tested out-of-competition and is therefore not included in the awards page. 9 We suggest considering products with the same award to be as light as the other products with same award.
  • 12. Anti-Virus Comparative - Performance Test – May 2015 www.av-comparatives.org - 12 - Copyright and Disclaimer This publication is Copyright © 2015 by AV-Comparatives®. Any use of the results, etc. in whole or in part, is ONLY permitted if the explicit written agreement of the management board of AV- Comparatives is given prior to any publication. AV-Comparatives and its testers cannot be held liable for any damage or loss, which might occur as a result of, or in connection with, the use of the infor- mation provided in this paper. We take every possible care to ensure the correctness of the basic data, but no representative of AV-Comparatives can he held liable for the accuracy of the test results. We do not give any guarantee of the correctness, completeness, or suitability for a specific purpose of any of the information/content provided at any given time. No one else involved in creating, producing or delivering test results shall be liable for any indirect, special or consequential damage, or loss of prof- its, arising out of, or related to, the use or inability to use, the services provided by the website, test documents or any related data. AV-Comparatives (June 2015)