Recent Tests

October 2, 2019

Comparative assessment of Cloud Backup products on backup time

This comparative test report is designed to serve as a reflection of product backup time levels because cloud backup products should be fast and usable. This assessment measured the backup time of four cloud backup products.
Cloud Backup Testing
Read Report
August 20, 2019

Android Efficacy Assessment – Q2 2019

  • 11 AV applications tested
  • 173 in-the-wild samples
  • 5 simulators
  • 3 real-life scenarios
  • Operating system: Android 6.0
360 Protection Testing, Endpoint Protection Testing, Smartphone Security Testing
Read Report
August 20, 2019

360 Assessment & Certification – Q2 2019

  • 12 applications tested
  • 398 In-the-Wild malware samples used
  • Operating System: Windows 10 x64 / Windows 7 x64
  • Browser: Chrome
  • Real World scenario with no user initiated threat neutralization
  • Exploit/Fileless, PUA, False positive, Performance tests
360 Protection Testing, Endpoint Protection Testing
Read Report
August 15, 2019

Online Banking Certification – Q2 2019

  • 11 Applications Tested
  • 17 In-the-Wild Financial malware samples
  • 1 Live Botnet
  • 1 Simulated Attack
  • Operating System: Windows 10 x64, Windows 7 x64
  • Browser: IE, Chrome, Firefox
Endpoint Protection Testing, Online Banking Testing
Read Report
View all Tests

View all

Latest Research

On Android Philosophy and its Effects on Malware

June 25, 2018  |  Endpoint Protection Testing, Smartphone Security Testing

Android AV vs. Third-Party App Stores

November 10, 2017  |  Endpoint Protection Testing, Smartphone Security Testing

Encrypted exploit delivery – #IRONSQUIRREL

September 21, 2017  |  Endpoint Protection Testing, Exploit Protection Testing

Case Study: Webroot

Webroot has worked with MRG Effitas over the past several years due to their unique capacity to test efficacy functionality that goes beyond simply blocking a threat. While Effitas does understand that prevention is important, they were the first to introduce testing that looked at detection of specific malicious behaviors by using malware simulation tools to replicate what behaviors were being encountered in the wild.

Read more

Trusted by

View all News

Latest News

MRG-Effitas @ BSides London 2019

September 10, 2019  |  Effitas News

Reflections from BSides London 2019 By Barnabas Sztan-Kovacs, June 2019 “Machines are not learning” was the provocative motto of the 9th BSides London which took place at the ILEC Conference Centre on …

Read more