Expert Insights: IT Decision Makers Want Real-World Testing

Cylance® recently engaged Carbonview Research to conduct a national survey of cybersecurity professionals across various industries and company sizes. The aim was to understand exactly what has led to past breaches, and whether these breaches have affected IT security professionals’ ability to prioritize, evaluate, and select new security solutions.

This blog details the results ascertained around industry testing and reports.

The Test

In total, 201 IT decision makers completed the survey. Those that completed the survey had at least 5 years’ experience at a company with 300+ employees, and had experience with endpoint anti-malware products. The qualifying question to take the survey was that they had to describe the difference between file-less malware and an exploit.

The survey results are located here.

In this survey, 48% of respondents read AV-TEST industry testing reports. This was a significantly higher result than found in other organizations. This was consistent across all target segments in the study.

Not only are the survey respondents familiar with AV-TEST, they also trust it most among all organizations in the survey. MRG Effitas was found to have the lowest trust level. Applicability to real world scenarios and sample/testing prevalence are shown to be the main drivers for trusting a testing organization.

There were very few differences revealed among organizations surveyed. Those that distrusted a testing organization noted that this distrust was due to the testing methods, which respondents felt were not applicable to real world scenarios, and the fact that the malware samples used were not prevalent. However, the malware samples that are more well-known appear to have better applicability to the real world.

Improving the Test

Regarding the improvement of industry testing reports, across the competitive set, about a quarter of respondents felt that improvements were possible. Including more products and more test cases, and making (Read more...)

*** This is a Security Bloggers Network syndicated blog from Cylance Blog authored by Chad Skipper. Read the original post at: