Internet Security Suite (Free)

Results and comments

Proactive Security Challenge 64
These rules are listed in the Application Rules interface. HyperSnap allows you to take quick and easy screen captures from your main screen as well as full-screen games, and text capture TextSnap where normal text copy is not possible. That remains the case today, with the potential for cyber-attacks still very much a danger, and the promise that third-party software can make your system even more secure. However, out of box settings of many products may provide much less security. It is designed to restrict the actions of unknown applications, and restrict access to important files, folders, settings and the Windows Registry. You might want to try your luck as well. FBackup is a lightweight automated backup program that can effectively help protect your important files and folders from being lost.

Secure your PC with a feature-packed third-party firewall

TechRadar pro

And even if the malware succeeded to collect the information it should not be allowed to send it outside the protected system and this means an implementation of the outbound network traffic control. To achieve all these is much harder task than it seems. The protection system also has to prevent attacking trusted processes and other components in the system. So the next feature that is required here is a control of untrusted processes' activities and that is the hardest task for the tested products.

It also includes an implementation of self-protection mechanisms because the malware should not be able to terminate the protection, which implies some other features to be implemented and so on. So, what does it mean if the product fails even the most basic tests of our challenge? It means that it is unable to do what its vendor claims it can.

Such a product can hardly protect you against the mentioned threats. On the other hand, if the product succeeds in all our tests, it does not mean that it is perfect.

Our tests are focused on the security and stability, but there are many other aspects important for the users like performance, hardware requirements, easy to use, availability of support, price, vendor's reaction time to new threats etc. It should also be noted that although our testing suite is quite large, it is not complete and there may exist many other ways to bypass the tested products.

We are working constantly on extending the suite to be able to provide more accurate information about the security of the tested products. If the tested product fails only a few tests in our challenge, it still might be a great product.

You should try them yourself and choose the one best for you, the one that you would be happy with, the one you would be able to configure and use everyday.

Note that we test the products in their highest usable security settings configuration. This means that the results reflect the best the products can do.

However, out of box settings of many products may provide much less security. It is not rare that the default configuration of a product is set to a medium level of protection in order to achieve a better user experience. Vendors' responses We have received following responses to Proactive Security Challenge Many thanks to Matousec Lab for another testing!

As revealed in the latest results, Outpost keeps up the top scores, although there are a few issues we'll need to address in the next editions. Agnitum has always taken bit security seriously and we continue to provide full protection for bit Windows and make perpetual improvements as security threats and hacker techniques evolve.

Along with a high overall score, the latest Proactive Security Challenge 64 revealed a few potential issues we had already been working on for some time. There's always room for perfection, and we plan to fill the existing the gaps shortly in one of our future releases. Securing and bit systems is in many ways different due to Microsoft Kernel Patch Protection. According to the tests some products protect only bit OS's.

The technology behind our products lets us protect all PCs - both bit and bit. As one of the world's most advanced security solutions, Bitdefender is committed to providing the best protection to our users. This unforeseeable side effect is triggered by the fact that the test only takes into account whether the product blocks individual actions that are dissociated by other features characteristic to malware, such as the ability of an application to add itself to startup via Registry.

These behaviors are also specific to legitimate applications that one user may voluntarily install on their computer, and blocking them in real-world scenarios would be considered as false positives.

In real life scenarios, there is no reason to prevent an application from creating its own startup Registry key unless that application is deemed malicious by a complementary Bitdefender technology. On our customer's devices, Bitdefender uses layered technologies to ensure accurate detection by correlating inputs from antimalware engines, host-intrusion prevention systems, cloud intelligence and behavior-based inspection.

For the past three years, this layered approach to security has brought us multiple No. Your input is very valuable to us as we are continuously working on improving our award-winning technologies to boost detection and usability in real-world usage scenarios. We find it somehow strange that autorun tests are being questioned by Bitdefender. Bitdefender implements a behavior based protection that actually does prevent access asks for application's permissions to the most common autorun location used by legitimate applications i.

In fact, Bitdefender also monitors many other autorun locations and prevents their infection. On the other hand, it fails to block techniques of hijacking trusted applications e. Comodo Security Solutions, Inc. We are very glad to receive these stellar results on your tests. Your testing results will reassure our users that over the years, while we have significantly improved the performance and usability, we have not sacrificed from the security and the protection we offer.

Keep up the good work! Thank you for including our product in your latest tests. Your open-source, open methodology tests are always very well thought out and unique. The latest results indicate the fact that there is a reason for us to be able to offer a USD virus free guarantee in all operating systems. Thank you Matousec for this latest testing effort for Privatefirewall and your continued commitment to security software vendors and their customers.

While a 3 ranking is not very satisfying when combined with the Protection level earned by Privatefirewall in this initial round of the new x64 PSC, we are aware of the work required on our end to dramatically improve our performance and the effort to do so is already underway.

We thank the Matousec organization for their continued commitment to helping vendors improve their products and ensuring that the consumers and businesses that rely on them are able to realize the greatest levels of system protection. SpyShelter Firewall is basically very young product, which already managed to reach World's top 5 in Firewall security. Features browser isolation, keylogger prevention, copy-paste protection, screen capture blocking and SSL certificate inspection.

Firewall quickly learns the rules you set for downloading software, and adjusts its alerts accordingly to fit your needs. Cloud based antivirus scanning detects malicious file even if a user does not have up-to-date virus definitions.

Keeps you safe online by automatically blocking dangerous websites and allows you to set up custom block lists for different members of your family. Suppresses operations that could interfere with a user's gaming experience such as alerts, virus database updates or scheduled scans. List of over two million known PC-friendly files and applications so safe files and apps are allowed to run.

Comodo Secure Shopping provides unbeatable security for online banking and shopping sessions by ensuring you connect to those websites from within a security-hardened browsing environment. Comodo Internet Security prevents even the very latest malware from infecting your system by isolating unknown and suspicious files inside a security hardened virtual environment. Applications executed inside the sandbox will not affect other processes, programs or data on your real computer.

In addition to running suspicious applications inside the sandbox on an ad-hoc basis, you can create a specific list of programs that should always run in the sandbox. Comodo Internet Security includes the buffer-overflow protection original featured in Comodo Memory Firewall. Internet Security is a security suite plus. More than just an antivirus program, it also includes an award-winning firewall, host intrusion prevention, a sandbox for untrusted software, anti-malware and buffer overflow protection to deliver comprehensive protection against today's diverse range of threats.

Applications in the sandbox are run under a carefully selected set of privileges and will write to a virtual file system and registry instead of the real system. This means untrusted but harmless applications have the freedom to operate as usual while malicious programs are prevented from accessing or infecting your computer. This provides smoothest and most secure user experience possible. It works by only allowing trusted files to run on your system. Files that are not trusted are run inside the new sandbox.

No — the sandbox is the first part of a trust decision engine. After an unknown application has been placed in the sandbox, Internet Security will also automatically queue it for submission to Comodo labs where it will be analyzed by our technicians.

If it is found to be harmless then it will be added to the global safe list that will be downloaded by all Internet Security users in the next round of updates. Once it is added to the safe list, the application will no longer be run in the sandbox by Internet Security.

If it is found to be malicious then it will be added to Comodo's list of malware signatures and will be deleted after the next round of updates.

Comodo Secure Shopping provides unbeatable security for online banking and shopping sessions by running your favorite browser inside a security-hardened virtual environment which is isolated from the rest of your computer.

This creates a threat resistant tunnel between you and your target website which cannot be attacked by other processes running on your computer. Secure Shopping also features memory-scraping prevention, remote takeover protection and independent SSL certificate authentication to deliver the next-generation of security for online transactions. The sandbox is a virtual operating environment created within your computer for unknown and untrusted programs.

Internet Security automatically runs untrusted programs in the sandbox where they cannot make changes to processes, programs or data on your 'real' system. This protection goes well beyond traditional Antivirus software by ensuring any brand new viruses are completely isolated and cannot cause damage. However, enterprises looking to implement Internet Security on large networks of workstations would benefit from the centralized management capabilities of Comodo Advanced Endpoint Security.

For technical product questions visit our Support Home Page click on the "Submit a Ticket" link and select "Internet Security Support" from the dropdown menu and submit. Check out our Online Help Guide for tips on how to use and configure our products and for detailed technical information. Go to the Help Guide. Our Forum is populated with fellow Comodo users and developers alike and can quite often be the quickest and friendliest way to find answers to questions that you have.

Comodo Secure Shopping is a major new feature in CIS which provides unbeatable security for online banking and shopping sessions. When using Secure Shopping, websites will open inside a security-hardened virtual environment which is isolated from the rest of your computer. This creates a threat resistant tunnel between you and your target website which cannot be monitored or attacked by any other processes running on your computer.

But Secure Shopping isn't just for the internet! You can run any application which handles sensitive information inside the secure environment. Applications inside the secure environment are totally sealed-off from other processes on your computer - meaning there is no way that malware can gain access to your data. The technology behind Comodo Secure Shopping is already being used by major point-of-sale and money-wiring organizations to secure sensitive customer transactions.

With CIS, Comodo brings this same level of security to your home. If you need a truly secure place to work and go online, then use Comodo Secure Shopping. We've streamlined our installation processes so users always receive the most up-to-date version even if you download an outdated build. Have you ever tried to run a program only to find your security software is blocking it - then can't figure out what you need to do to get it running?

Is it the firewall, the behavior blocker, the sandbox or the antivirus which is stopping it? Comodo's new unblock applications feature allows you to release applications with a single click from whichever security component has blocked them. What is Internet Security? Why Comodo Internet Security Suite? True security for online banking and shopping Secure Shopping lets you shop and bank online with confidence. Stay ahead of emerging threats Our sandbox technology automatically locks unknown files in a secure environment while our Valkyrie system tests their behavior in real-time - protecting you against malware that the virus industry hasn't even discovered yet.

Integrated Firewall Control which programs are allowed to access the internet, make your computer invisible to hackers and protect your system against all inbound and outbound attacks. Anti-Spyware Detects spyware threats and destroys each infection. Bot Protection Prevents malicious software turning your PC into a zombie. Memory Firewall Cutting-edge protection against sophisticated buffer overflow attacks. Anti-Malware Kills malicious processes before they can do harm.

Unlimited Live Expert Virus Removal.

On Windows 7 (or Vista) I use