SlideShare a Scribd company logo
1 of 7
Download to read offline
#209138
                                                                                           September 2009
                                                                                                      Commissioned by
                                                                                                  Sunbelt Software, Inc.



            Sunbelt Software VIPRE® Enterprise Version 3.1:
Anti-virus Scanning Performance and System Resource Utilization Comparison
                 Versus McAfee VirusScan Enterprise 8.7i and
           Symantec Endpoint Protection 12 Small Business Edition

        EXECUTIVE SUMMARY                                                       THE BOTTOM LINE
IT system administrators need to balance the security                        Sunbelt VIPRE Enterprise:
requirements of the enterprise with usability of PCs.
As the threat landscape evolves, PC security solutions
have become resource hungry to the point that the
                                                                        1 Consumes up to 38% and 45% and
                                                                          memory compared to the Symantec
                                                                                                          less

                                                                             McAfee products tested respectively
PC becomes unusable during periods of security

                                                                        2 Offers upspeed 2.6xa and system faster
scanning. Tests show that Sunbelt Software’s VIPRE                                   to             3.6x
Enterprise endpoint security solution offers better                       scanning        in full          scan,
scanning performance with minimal system resource                            compared respectively to the Symantec
usage compared to McAfee VirusScan Enterprise and                            and McAfee products tested
Symantec Endpoint Protection products.

      Memory Consumption on a Test PC with Products Under Test Under Various Usage Scenarios
                            (As Reported by PerfMon on a PC running Microsoft Windows XP SP3)
                                      (Lower values imply lower impact on PC performance)




 Note: Memory consumption shown includes both operating system and the product under test. The test PC was equipped with a
 2.6GHz Intel Celeron CPU, 512 MB RAM and running Microsoft Windows XP SP3 with Microsoft Office 2003 and the product under test
 in its default configuration, resulting in about 18 GB of total data on the hard disk.
Source: Tolly, July 2009                                                                                                Figure 1

© 2009 TOLLY ENTERPRISES, LLC                                WWW.TOLLY.COM                                       PAGE 1 OF 7
SUNBELT VIPRE ENTERPRISE 3.1                                                                                           #209138




                                                 security policies with real time virus and
SUMMARY OF                                       spyware protection and email protection             Sunbelt
                                                 services enabled. Other functionality in
FINDINGS                                         the McAfee and Symantec products
                                                                                                     Software, Inc.
                                                 including desktop firewall and intrusion
Tolly engineers evaluated the scanning           prevention features were disabled for               VIPRE
performance and system resource                  the scope of this test.                             Enterprise 3.1
utilization of Sunbelt Software VIPRE
Enterprise 3.1 (referred to as Sunbelt           Impact on PC Performance                            Anti-virus
VIPRE, hereafter) antivirus product aimed
at Small and Medium Enterprises, against         As shown in Figures 1, 2 and 3, when                Scanning
McAfee VirusScan Enterprise 8.7i and             providing real time and email anti virus            Performance                 Tested
Symantec Endpoint Protection 12.0 Small          protection, Sunbelt VIPRE consistently
                                                 had the least impact on the PC
                                                                                                     and System                   July
Business Edition.
                                                 performance in terms of memory and                  Resource                     2009
All the products were tested using               CPU utilization, compared to the McAfee             Utilization
their default configuration options and          and Symantec products tested.

            System Resource Utilization (Operating System plus Product Under Test) Over Time
                                (As Reported by PerfMon on a PC running Microsoft Windows XP SP3)
                                            (Lower lines imply lower impact on the PC performance)




 Note: These waveforms show system resource utilization on the test PC when the product under test goes from a disabled state to enabled
 state at idle to full system scan to remediation and then to an idle state again. The test PC was equipped with a 2.6GHz Intel Celeron CPU,
 512 MB RAM and running Microsoft Windows XP SP3 with Microsoft Office 2003 and the product under test in its default configuration.
 Source: Tolly, July 2009                                                                                                             Figure 2


 © 2009 TOLLY ENTERPRISES, LLC                                        WWW.TOLLY.COM                                           PAGE 2 OF 7
SUNBELT VIPRE ENTERPRISE 3.1                                                                                         #209138




Sunbelt VIPRE consumed the least                whether at idle, or while using the              system scan, or during remediation of
amount of system resources irrespective         product’s GUI based management                   risks found from the scan. Test results
of the state of activity on the PC:             interface, or during an on demand full           show that Sunbelt VIPRE makes better

                                Detailed Summary of System Resource Utilization
                            (As Reported by PerfMon on a PC running Microsoft Windows XP SP3)

                                              Average Memory Consumption (MB)
                                               v                  m                                    Average CPU Utilization (%)
                                                                                                             e            t
               Task                                              Symantec                                                     Symantec
                                     Sunbelt    McAfee           Endpoint           Sunbelt    McAfee                         Endpoint
                                      VIPRE    VirusScan         Protection          VIPRE    VirusScan                       Protection
                                                          Delta*            Delta*
                                    Enterprise Enterprise         12 Small         Enterprise Enterprise                       12 Small
                                       3.1        8.7i            Business            3.1        8.7i                          Business
                                                                   Edition                                                      Edition
  Baseline (without protection
                                       200            203        1.5%         202        0.6%         0.4            0.2          1.3
        services running)
      Real-time and email
                                       219            249       12.2%         326       32.9%         1.3           12.3          3.8
   protection services started

     Open the product GUI              232            273        15%          335       30.6%         1.1            8.0          2.5

    Running full-system scan           245            363       32.5%         397       38.3%         52.4          56.9          57.6

       Peak load during a              257            470       45.4%         408       37.2%         93.3         100.0          93.7
        full-system scan

   Scan completed, GUI open            249            356       30.1%         396       37.2%         0.7           15.6          2.3

       During remediation              249            275        9.4%         388       35.8%         0.2            4.3          1.9

     Close the product GUI
    (protection services still         235            269       12.8%         345       31.8%         0.3            2.0          0.9
            running)
      Real-time and email
                                       204            206         1%          315       35.2%         0.3            1.1          2.9
  protection services stopped
  Note:
      * The ‘Delta’ column indicates the additional memory utilized by the McAfee or Symantec product compared to Sunbelt VIPRE
        Enterprise. The formula used to calculate Delta is: DeltaB over A= [ (B A) / B ]*100
        Symantec’s security services cannot be terminated by the user. Two services: ‘Symantec CMC SMC GUI’ and ‘Symantec CMC SMC’
        run at all times, resulting in a baseline memory consumption of 309 MB for Symantec Endpoint Protection. All services for Sunbelt
        and McAfee products could be terminated to form the baseline PC configuration. Hence engineers estimated the real baseline
        memory consumption without any security services running to be the average of the memory consumption of the Sunbelt and
        McAfee products, which was ~202 MB.
        The test PC was equipped with a 2.6GHz Intel Celeron CPU, 512 MB RAM and running a clean install of Microsoft Windows XP SP3
        with Microsoft Office 2003 and the product under test in its default configuration.
  Source: Tolly, July 2009                                                                                                         Figure 3


 © 2009 TOLLY ENTERPRISES, LLC                                       WWW.TOLLY.COM                                          PAGE 3 OF 7
SUNBELT VIPRE ENTERPRISE 3.1                                                                                       #209138




                         Memory Consumption of Products Under Test at Idle State
                             (As Reported by PerfMon on a PC Running Microsoft Windows XP SP3)

                                         (Lower values imply lower impact on PC performance)




  Notes:
    The test PC was equipped with a 2.6 GHz Intel Celeron CPU, 512 MB RAM and running Microsoft Windows XP SP3 operating system
    with Microsoft Office 2003 and the product under test in its default configuration. Baseline had only the operating system running.
  * The Symantec product always has two services running on the endpoint PC, which cannot be disabled by the user completely, thus
    resulting in a higher baseline memory consumption than Sunbelt and McAfee products. Hence, its baseline memory consumption was
    estimated to be the average consumption of the Sunbelt and McAfee product installations.
  Source: Tolly, July 2009                                                                                                       Figure 4


use of system resources to provide better      protection and email protection services         had the largest memory usage increase,
end user experience, with lower impact         enabled.                                         at 90 MB more on average, and 197 MB
on user productivity, compared to the                                                           more at the peak; while the Symantec
McAfee VirusScan Enterprise and Symantec       As shown in figures 3 and 4, Sunbelt             product used 62 MB more on average,
Endpoint Protection products.                  VIPRE consumed 12% to 33% less                   and 73 MB more at the peak.
                                               memory than the McAfee and Symantec
Memory Consumption                             products respectively, while the PC is idle,     Compared to the McAfee and Symantec
                                               with the security services configured to         products tested, Sunbelt VIPRE makes
Test results show that Sunbelt VIPRE           provide real time and email protection.          more efficient use of system resources,
consistently exhibits lower memory                                                              thereby leaving more system resources
consumption than the comparable                While running an on demand, full                 available for user productivity tasks and
Symantec and McAfee products tested,           system scan using the default security           improving the user experience.
even when all the products were                configuration, Sunbelt VIPRE used just
configured with their default security         12 MB more on an average, and 25 MB              Furthermore, as more system resources
policies, and real time anti virus             at the peak. Compared to this, McAfee            can be dedicated towards productive


 © 2009 TOLLY ENTERPRISES, LLC                                      WWW.TOLLY.COM                                         PAGE 4 OF 7
SUNBELT VIPRE ENTERPRISE 3.1                                                                                    #209138




                                Full System Scanning Time of Products Under Test
                            (As Reported by PerfMon on a PC running Microsoft Windows XP SP3)

                                                               (Lower values are better)




 Note: The test PC was equipped with a 2.6GHz Intel Celeron CPU, 512 MB RAM and about 18 GB of total data on the hard disk resulting
 from an installation of Microsoft Windows XP SP3, Microsoft Office 2003 and the product under test in its default configuration.
 Source: Tolly, July 2009                                                                                                    Figure 5


tasks, the enterprise can prolong the         As shown in Figure 5 above, Sunbelt
useful life of its PCs rather than            VIPRE took 2.6x and 3.6x less time             TEST SETUP AND
upgrading the hardware to make room           compared to the Symantec and McAfee
for resource hungry security solutions.       products respectively, to scan approximately   METHODOLOGY
                                              18 GB of data.
Scanning Speed                                                                               Tolly engineers tested the following
                                              During the scanning window, Sunbelt            small and medium enterprise (SME)
Engineers documented the time it took         VIPRE was once again the least CPU             class security products: Sunbelt VIPRE
for each of the products under test to        intensive, but all the products were           Enterprise 3.1, McAfee VirusScan Enterprise
perform an on demand, full system scan        roughly within 1% to 5% of CPU                 8.7i and Symantec Endpoint Protection
using all the default security options.       utilization relative to one another.           12 Small Business Edition. All products
Where required, engineers modified the                                                       have been updated to the latest
default configuration to specify all file     Faster scanning speed, lower CPU               available patches and signatures prior to
and content types to be scanned, without      utilization and lower memory consumption       the start of testing.
any exclusions.                               while performing an exhaustive, on
                                              demand security scan means that a PC           Sunbelt VIPRE Enterprise and Symantec
The test results showed once again that       protected by the Sunbelt VIPRE Enterprise      Endpoint Protection were implemented
Sunbelt VIPRE had the best performance        product can provide better user                in a client server model, with a central
by demonstrating the fastest scanning         experience through low impact on system        server component used to provision,
speed among the products tested.              resources.                                     configure and manage the client side


 © 2009 TOLLY ENTERPRISES, LLC                                     WWW.TOLLY.COM                                       PAGE 5 OF 7
SUNBELT VIPRE ENTERPRISE 3.1                                                                                     #209138




security software agents deployed on         Engineers started out by establishing a        again for five minutes.
the client PCs. The McAfee VirusScan         baseline configuration for the PC,
Enterprise product was implemented as        where the product under test was               Next, engineers started a full system
a standalone, client side installation for   installed, but was disabled. Engineers         scan,and measured the memory and CPU
ease of testing, although the product        measured the memory and CPU                    utilization over the scanning period. Once
does offer centralized management            utilization in this state for five minutes     the scan was completed, the console was
and configuration abilities similar to       to obtain an average baseline memory           left idle for another five minutes for another
the Sunbelt and Symantec products.           and CPU consumption.                           set of CPU and memory measurements.
                                                                                            Then, engineers performed the suggested
The client PC was equipped with a 2.4        Note: Since Symantec Endpoint Protection       remediation action, and took the
GHz Intel Celeron CPU, 512 MB of RAM,        cannot be completely disabled by the           measurements for another five minute
two physical hard disks of 90 GB and 250     user, two processes were always                duration.
GB respectively, and running Microsoft       running in the background, leading to a
Windows XP SP3. Additionally, Microsoft      higher baseline memory consumption.            Next, engineers closed the GUI console,
Office 2003 was also installed. The total    To overcome this issue, engineers calculated   and took measurements over a five
volume of data on the disk was               the average memory consumption of the          minute duration to observe any resource
approximately 18 GB.                         Sunbelt VIPRE and McAfee VirusScan             utilization variations.
                                             products, and used that as the estimated
The products under test were configured                                                     Finally, engineers terminated the security
                                             baseline memory consumption for
to scan all physical disks, using the                                                       services of the product under test, and
                                             Symantec.
default security policies modified where                                                    took another set of CPU and memory
necessary to mandate scanning all file       Next, the product under test was               measurements over a five minute duration
and content types. System resource           activated by enabling its security services,   to observe any variation in resource
utilization was measured using Perfmon       and once again, engineers measured the         utilization. All the tests were repeated
counters built into Windows. Engineers       memory and CPU utilization for a five          twice on each product under test, to
also enabled real time anti virus            minute duration. Then, the GUI based           ensure repeatability of results. Final
protection and email protection on all       client console of the product was              measurements were obtained by averaging
products.                                    launched, and measurements were taken          the data from the two runs.




  About Sunbelt Software
  Sunbelt Software, Inc. develops Windows based security software to protect against viruses, spam, spyware and other
  malware threats.
  Headquartered in Tampa Bay (Clearwater), Florida and founded in 1994, Sunbelt provides high performance enterprise and
  consumer Windows security software including anti malware, anti spyware, anti virus, email security, and malware analysis
  tools.
  Leading products include the CounterSpy® and VIPRE® endpoint security product lines, VIPRE Email Security, Sunbelt
  Exchange Archiver™, CWSandbox™, and Threat Track™.
  For more information about Sunbelt Software, please visit the company's website at www.sunbeltsoftware.com. To learn
  more about current activities, products, and ideas at Sunbelt, please visit Sunbelt's corporate blog at www.sunbeltblog.com.
                                                                                                   Source: Sunbelt Software, Inc.


 © 2009 TOLLY ENTERPRISES, LLC                                    WWW.TOLLY.COM                                         PAGE 6 OF 7
SUNBELT VIPRE ENTERPRISE 3.1                                                                                        #209138




About Tolly                                          Interaction with Competitors
The Tolly Group companies have been                  In accordance with The Tolly Group’s Fair
delivering world class IT services for 20            Testing Charter, Tolly representatives
years. Tolly is a leading global provider            contact competing vendors to participate in
of third party validation services for               the testing. Since the competing vendor
vendors of IT products, components and               products in this test were being tested in
services.                                            their default configuration, Tolly personnel
You can reach the company via E mail                 did not engage the representatives of
at sales@tolly.com, or via telephone at              McAfee, Inc. and Symantec Corporation.
+1 561.391.5610.
Visit Tolly on the Internet at:                      For more information on the Tolly Fair Testing Charter, visit:
http://www.tolly.com                                 http://www.tolly.com/FTC.aspx


                                                    Terms of Usage
This document is provided, free of charge, to help you understand whether a given product, technology or service merits additional
investigation for your particular needs. Any decision to purchase a product must be based on your own assessment of suitability
based on your needs. The document should never be used as a substitute for advice from a qualified IT or business professional.
This evaluation was focused on illustrating specific features and/or performance of the product(s) and was conducted under
controlled, laboratory conditions. Certain tests may have been tailored to reflect performance under ideal conditions; performance
may vary under real world conditions. Users should run tests based on their own real world scenarios to validate performance for
their own networks.
Reasonable efforts were made to ensure the accuracy of the data contained herein but errors and/or oversights can occur. The test/
audit documented herein may also rely on various test tools the accuracy of which is beyond our control. Furthermore, the
document relies on certain representations by the sponsor that are beyond our control to verify. Among these is that the software/
hardware tested is production or production track and is, or will be, available in equivalent or better form to commercial customers.
Accordingly, this document is provided "as is", and Tolly Enterprises, LLC (Tolly) gives no warranty, representation or undertaking,
whether express or implied, and accepts no legal responsibility, whether direct or indirect, for the accuracy, completeness,
usefulness or suitability of any information contained herein. By reviewing this document, you agree that your use of any
information contained herein is at your own risk, and you accept all risks and responsibility for losses, damages, costs and other
consequences resulting directly or indirectly from any information or material available on it. Tolly is not responsible for, and you
agree to hold Tolly and its related affiliates harmless from any loss, harm, injury or damage resulting from or arising out of your use
of or reliance on any of the information provided herein.
Tolly makes no claim as to whether any product or company described herein is suitable for investment. You should obtain your
own independent professional advice, whether legal, accounting or otherwise, before proceeding with any investment or project
related to any information, products or companies described herein. When foreign translations exist, the English document is
considered authoritative. To assure accuracy, only use documents downloaded directly from Tolly.com. No part of any document
may be reproduced, in whole or in part, without the specific written permission of Tolly. All trademarks used in the document are
owned by their respective owners. You agree not to use any trademark in or as the whole or part of your own trademarks in
connection with any activities, products or services which are not ours, or in a manner which may be confusing, misleading or
deceptive or in a manner that disparages us or our information, projects or developments.

                                                                                                       209138-td1-kk-14Oct09-verG

© 2009 TOLLY ENTERPRISES, LLC                                     WWW.TOLLY.COM                                         PAGE 7 OF 7

More Related Content

What's hot

Planning and implementing windows 7
Planning and implementing windows 7Planning and implementing windows 7
Planning and implementing windows 7Interop
 
Brief summary of onTune [teemstone]
Brief summary of onTune [teemstone]Brief summary of onTune [teemstone]
Brief summary of onTune [teemstone]TeemStone Pty Ltd
 
Top 5 Reasons to Select SolarWinds over HP NNMi
Top 5 Reasons to Select SolarWinds over HP NNMi Top 5 Reasons to Select SolarWinds over HP NNMi
Top 5 Reasons to Select SolarWinds over HP NNMi SolarWinds
 
09 intel v_tune_session_13
09 intel v_tune_session_1309 intel v_tune_session_13
09 intel v_tune_session_13Niit Care
 
Lotus domino consolidation to linux on system z
Lotus domino consolidation to linux on system zLotus domino consolidation to linux on system z
Lotus domino consolidation to linux on system zsystemz
 
miniAVIT Brochure
miniAVIT BrochureminiAVIT Brochure
miniAVIT Brochurejohnuzz
 
Comp tia a+_session_09
Comp tia a+_session_09Comp tia a+_session_09
Comp tia a+_session_09Niit Care
 
Qt remote monitoring 3 1 web
Qt remote monitoring 3 1 webQt remote monitoring 3 1 web
Qt remote monitoring 3 1 webCitizen Logen
 
分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景ITband
 

What's hot (13)

Planning and implementing windows 7
Planning and implementing windows 7Planning and implementing windows 7
Planning and implementing windows 7
 
Big ip-ltm-asm-dg
Big ip-ltm-asm-dgBig ip-ltm-asm-dg
Big ip-ltm-asm-dg
 
Brief summary of onTune [teemstone]
Brief summary of onTune [teemstone]Brief summary of onTune [teemstone]
Brief summary of onTune [teemstone]
 
Top 5 Reasons to Select SolarWinds over HP NNMi
Top 5 Reasons to Select SolarWinds over HP NNMi Top 5 Reasons to Select SolarWinds over HP NNMi
Top 5 Reasons to Select SolarWinds over HP NNMi
 
09 intel v_tune_session_13
09 intel v_tune_session_1309 intel v_tune_session_13
09 intel v_tune_session_13
 
Lotus domino consolidation to linux on system z
Lotus domino consolidation to linux on system zLotus domino consolidation to linux on system z
Lotus domino consolidation to linux on system z
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
miniAVIT Brochure
miniAVIT BrochureminiAVIT Brochure
miniAVIT Brochure
 
Adnmag
AdnmagAdnmag
Adnmag
 
Discover Great Reasons to move to ConfigMgr 2012 SP1
Discover Great Reasons to move to ConfigMgr 2012 SP1Discover Great Reasons to move to ConfigMgr 2012 SP1
Discover Great Reasons to move to ConfigMgr 2012 SP1
 
Comp tia a+_session_09
Comp tia a+_session_09Comp tia a+_session_09
Comp tia a+_session_09
 
Qt remote monitoring 3 1 web
Qt remote monitoring 3 1 webQt remote monitoring 3 1 web
Qt remote monitoring 3 1 web
 
分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景
 

Viewers also liked

Viewers also liked (7)

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Antivirus slideshare
Antivirus slideshareAntivirus slideshare
Antivirus slideshare
 
Antivirus
AntivirusAntivirus
Antivirus
 
Anti virus
Anti virusAnti virus
Anti virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
anti-virus
anti-virusanti-virus
anti-virus
 

Similar to Antivirus Scanning Performance and System Resource Utilization Comparison

B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-usPelos TCHIKAYA
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET Journal
 
Computacenter success story
Computacenter success storyComputacenter success story
Computacenter success storyMartin Rutkowski
 
Wipro - FM Best Practices Showcase
Wipro - FM Best Practices ShowcaseWipro - FM Best Practices Showcase
Wipro - FM Best Practices ShowcaseSudhendu Bali
 
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...ITCamp
 
Symantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization SuiteSymantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization SuitePipeline Srl
 
Network emulation with data rates
Network emulation with data ratesNetwork emulation with data rates
Network emulation with data ratesPacket Storm
 
Vunvulea radu it camp-ro 2012 - building metro style applications on window...
Vunvulea radu   it camp-ro 2012 - building metro style applications on window...Vunvulea radu   it camp-ro 2012 - building metro style applications on window...
Vunvulea radu it camp-ro 2012 - building metro style applications on window...Radu Vunvulea
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010Vadimazz
 
Cloud Computing and VCE
Cloud Computing and VCECloud Computing and VCE
Cloud Computing and VCECenk Ersoy
 
Arun Prasad-R.DOCX
Arun Prasad-R.DOCXArun Prasad-R.DOCX
Arun Prasad-R.DOCXArun R
 
Webroot Cloud vs. Six Traditional Antivirus Products
Webroot Cloud vs. Six Traditional Antivirus ProductsWebroot Cloud vs. Six Traditional Antivirus Products
Webroot Cloud vs. Six Traditional Antivirus ProductsWebroot
 
White Paper: Monitoring EMC Greenplum DCA with Nagios - EMC Greenplum Data Co...
White Paper: Monitoring EMC Greenplum DCA with Nagios - EMC Greenplum Data Co...White Paper: Monitoring EMC Greenplum DCA with Nagios - EMC Greenplum Data Co...
White Paper: Monitoring EMC Greenplum DCA with Nagios - EMC Greenplum Data Co...EMC
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET Journal
 
Advantages of Web Based CMMS
Advantages of Web Based CMMSAdvantages of Web Based CMMS
Advantages of Web Based CMMSGoCMMS
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010nuttakorn nakkerd
 

Similar to Antivirus Scanning Performance and System Resource Utilization Comparison (20)

B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-us
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable Software
 
Computacenter success story
Computacenter success storyComputacenter success story
Computacenter success story
 
Wipro - FM Best Practices Showcase
Wipro - FM Best Practices ShowcaseWipro - FM Best Practices Showcase
Wipro - FM Best Practices Showcase
 
IBM PureSystems
IBM PureSystemsIBM PureSystems
IBM PureSystems
 
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...
 
Symantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization SuiteSymantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization Suite
 
Avc per 201206_en
Avc per 201206_enAvc per 201206_en
Avc per 201206_en
 
Network emulation with data rates
Network emulation with data ratesNetwork emulation with data rates
Network emulation with data rates
 
Vunvulea radu it camp-ro 2012 - building metro style applications on window...
Vunvulea radu   it camp-ro 2012 - building metro style applications on window...Vunvulea radu   it camp-ro 2012 - building metro style applications on window...
Vunvulea radu it camp-ro 2012 - building metro style applications on window...
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010
 
Cloud Computing and VCE
Cloud Computing and VCECloud Computing and VCE
Cloud Computing and VCE
 
Arun Prasad-R.DOCX
Arun Prasad-R.DOCXArun Prasad-R.DOCX
Arun Prasad-R.DOCX
 
Webroot Cloud vs. Six Traditional Antivirus Products
Webroot Cloud vs. Six Traditional Antivirus ProductsWebroot Cloud vs. Six Traditional Antivirus Products
Webroot Cloud vs. Six Traditional Antivirus Products
 
White Paper: Monitoring EMC Greenplum DCA with Nagios - EMC Greenplum Data Co...
White Paper: Monitoring EMC Greenplum DCA with Nagios - EMC Greenplum Data Co...White Paper: Monitoring EMC Greenplum DCA with Nagios - EMC Greenplum Data Co...
White Paper: Monitoring EMC Greenplum DCA with Nagios - EMC Greenplum Data Co...
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
 
TM1 Monitoring Tools
TM1 Monitoring ToolsTM1 Monitoring Tools
TM1 Monitoring Tools
 
Advantages of Web Based CMMS
Advantages of Web Based CMMSAdvantages of Web Based CMMS
Advantages of Web Based CMMS
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010
 

More from GFI Software

Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013GFI Software
 
Network Environments
Network EnvironmentsNetwork Environments
Network EnvironmentsGFI Software
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data BackupsGFI Software
 
Master Class Series
Master Class SeriesMaster Class Series
Master Class SeriesGFI Software
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability ManagementGFI Software
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™GFI Software
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementGFI Software
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerGFI Software
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security SolutionsGFI Software
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web SecurityGFI Software
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkGFI Software
 
How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR SpamGFI Software
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 

More from GFI Software (20)

Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013
 
Network Environments
Network EnvironmentsNetwork Environments
Network Environments
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
Email Continuity
Email ContinuityEmail Continuity
Email Continuity
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
 
Data Backups
Data BackupsData Backups
Data Backups
 
Master Class Series
Master Class SeriesMaster Class Series
Master Class Series
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log Management
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManager
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security Solutions
 
Maxmp greylisting
Maxmp greylistingMaxmp greylisting
Maxmp greylisting
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web Security
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your Network
 
How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR Spam
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 

Recently uploaded

Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfAnna Loughnan Colquhoun
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.francesco barbera
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 

Recently uploaded (20)

Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 

Antivirus Scanning Performance and System Resource Utilization Comparison

  • 1. #209138 September 2009 Commissioned by Sunbelt Software, Inc. Sunbelt Software VIPRE® Enterprise Version 3.1: Anti-virus Scanning Performance and System Resource Utilization Comparison Versus McAfee VirusScan Enterprise 8.7i and Symantec Endpoint Protection 12 Small Business Edition EXECUTIVE SUMMARY THE BOTTOM LINE IT system administrators need to balance the security Sunbelt VIPRE Enterprise: requirements of the enterprise with usability of PCs. As the threat landscape evolves, PC security solutions have become resource hungry to the point that the 1 Consumes up to 38% and 45% and memory compared to the Symantec less McAfee products tested respectively PC becomes unusable during periods of security 2 Offers upspeed 2.6xa and system faster scanning. Tests show that Sunbelt Software’s VIPRE to 3.6x Enterprise endpoint security solution offers better scanning in full scan, scanning performance with minimal system resource compared respectively to the Symantec usage compared to McAfee VirusScan Enterprise and and McAfee products tested Symantec Endpoint Protection products. Memory Consumption on a Test PC with Products Under Test Under Various Usage Scenarios (As Reported by PerfMon on a PC running Microsoft Windows XP SP3) (Lower values imply lower impact on PC performance) Note: Memory consumption shown includes both operating system and the product under test. The test PC was equipped with a 2.6GHz Intel Celeron CPU, 512 MB RAM and running Microsoft Windows XP SP3 with Microsoft Office 2003 and the product under test in its default configuration, resulting in about 18 GB of total data on the hard disk. Source: Tolly, July 2009 Figure 1 © 2009 TOLLY ENTERPRISES, LLC WWW.TOLLY.COM PAGE 1 OF 7
  • 2. SUNBELT VIPRE ENTERPRISE 3.1 #209138 security policies with real time virus and SUMMARY OF spyware protection and email protection Sunbelt services enabled. Other functionality in FINDINGS the McAfee and Symantec products Software, Inc. including desktop firewall and intrusion Tolly engineers evaluated the scanning prevention features were disabled for VIPRE performance and system resource the scope of this test. Enterprise 3.1 utilization of Sunbelt Software VIPRE Enterprise 3.1 (referred to as Sunbelt Impact on PC Performance Anti-virus VIPRE, hereafter) antivirus product aimed at Small and Medium Enterprises, against As shown in Figures 1, 2 and 3, when Scanning McAfee VirusScan Enterprise 8.7i and providing real time and email anti virus Performance Tested Symantec Endpoint Protection 12.0 Small protection, Sunbelt VIPRE consistently had the least impact on the PC and System July Business Edition. performance in terms of memory and Resource 2009 All the products were tested using CPU utilization, compared to the McAfee Utilization their default configuration options and and Symantec products tested. System Resource Utilization (Operating System plus Product Under Test) Over Time (As Reported by PerfMon on a PC running Microsoft Windows XP SP3) (Lower lines imply lower impact on the PC performance) Note: These waveforms show system resource utilization on the test PC when the product under test goes from a disabled state to enabled state at idle to full system scan to remediation and then to an idle state again. The test PC was equipped with a 2.6GHz Intel Celeron CPU, 512 MB RAM and running Microsoft Windows XP SP3 with Microsoft Office 2003 and the product under test in its default configuration. Source: Tolly, July 2009 Figure 2 © 2009 TOLLY ENTERPRISES, LLC WWW.TOLLY.COM PAGE 2 OF 7
  • 3. SUNBELT VIPRE ENTERPRISE 3.1 #209138 Sunbelt VIPRE consumed the least whether at idle, or while using the system scan, or during remediation of amount of system resources irrespective product’s GUI based management risks found from the scan. Test results of the state of activity on the PC: interface, or during an on demand full show that Sunbelt VIPRE makes better Detailed Summary of System Resource Utilization (As Reported by PerfMon on a PC running Microsoft Windows XP SP3) Average Memory Consumption (MB) v m Average CPU Utilization (%) e t Task Symantec Symantec Sunbelt McAfee Endpoint Sunbelt McAfee Endpoint VIPRE VirusScan Protection VIPRE VirusScan Protection Delta* Delta* Enterprise Enterprise 12 Small Enterprise Enterprise 12 Small 3.1 8.7i Business 3.1 8.7i Business Edition Edition Baseline (without protection 200 203 1.5% 202 0.6% 0.4 0.2 1.3 services running) Real-time and email 219 249 12.2% 326 32.9% 1.3 12.3 3.8 protection services started Open the product GUI 232 273 15% 335 30.6% 1.1 8.0 2.5 Running full-system scan 245 363 32.5% 397 38.3% 52.4 56.9 57.6 Peak load during a 257 470 45.4% 408 37.2% 93.3 100.0 93.7 full-system scan Scan completed, GUI open 249 356 30.1% 396 37.2% 0.7 15.6 2.3 During remediation 249 275 9.4% 388 35.8% 0.2 4.3 1.9 Close the product GUI (protection services still 235 269 12.8% 345 31.8% 0.3 2.0 0.9 running) Real-time and email 204 206 1% 315 35.2% 0.3 1.1 2.9 protection services stopped Note: * The ‘Delta’ column indicates the additional memory utilized by the McAfee or Symantec product compared to Sunbelt VIPRE Enterprise. The formula used to calculate Delta is: DeltaB over A= [ (B A) / B ]*100 Symantec’s security services cannot be terminated by the user. Two services: ‘Symantec CMC SMC GUI’ and ‘Symantec CMC SMC’ run at all times, resulting in a baseline memory consumption of 309 MB for Symantec Endpoint Protection. All services for Sunbelt and McAfee products could be terminated to form the baseline PC configuration. Hence engineers estimated the real baseline memory consumption without any security services running to be the average of the memory consumption of the Sunbelt and McAfee products, which was ~202 MB. The test PC was equipped with a 2.6GHz Intel Celeron CPU, 512 MB RAM and running a clean install of Microsoft Windows XP SP3 with Microsoft Office 2003 and the product under test in its default configuration. Source: Tolly, July 2009 Figure 3 © 2009 TOLLY ENTERPRISES, LLC WWW.TOLLY.COM PAGE 3 OF 7
  • 4. SUNBELT VIPRE ENTERPRISE 3.1 #209138 Memory Consumption of Products Under Test at Idle State (As Reported by PerfMon on a PC Running Microsoft Windows XP SP3) (Lower values imply lower impact on PC performance) Notes: The test PC was equipped with a 2.6 GHz Intel Celeron CPU, 512 MB RAM and running Microsoft Windows XP SP3 operating system with Microsoft Office 2003 and the product under test in its default configuration. Baseline had only the operating system running. * The Symantec product always has two services running on the endpoint PC, which cannot be disabled by the user completely, thus resulting in a higher baseline memory consumption than Sunbelt and McAfee products. Hence, its baseline memory consumption was estimated to be the average consumption of the Sunbelt and McAfee product installations. Source: Tolly, July 2009 Figure 4 use of system resources to provide better protection and email protection services had the largest memory usage increase, end user experience, with lower impact enabled. at 90 MB more on average, and 197 MB on user productivity, compared to the more at the peak; while the Symantec McAfee VirusScan Enterprise and Symantec As shown in figures 3 and 4, Sunbelt product used 62 MB more on average, Endpoint Protection products. VIPRE consumed 12% to 33% less and 73 MB more at the peak. memory than the McAfee and Symantec Memory Consumption products respectively, while the PC is idle, Compared to the McAfee and Symantec with the security services configured to products tested, Sunbelt VIPRE makes Test results show that Sunbelt VIPRE provide real time and email protection. more efficient use of system resources, consistently exhibits lower memory thereby leaving more system resources consumption than the comparable While running an on demand, full available for user productivity tasks and Symantec and McAfee products tested, system scan using the default security improving the user experience. even when all the products were configuration, Sunbelt VIPRE used just configured with their default security 12 MB more on an average, and 25 MB Furthermore, as more system resources policies, and real time anti virus at the peak. Compared to this, McAfee can be dedicated towards productive © 2009 TOLLY ENTERPRISES, LLC WWW.TOLLY.COM PAGE 4 OF 7
  • 5. SUNBELT VIPRE ENTERPRISE 3.1 #209138 Full System Scanning Time of Products Under Test (As Reported by PerfMon on a PC running Microsoft Windows XP SP3) (Lower values are better) Note: The test PC was equipped with a 2.6GHz Intel Celeron CPU, 512 MB RAM and about 18 GB of total data on the hard disk resulting from an installation of Microsoft Windows XP SP3, Microsoft Office 2003 and the product under test in its default configuration. Source: Tolly, July 2009 Figure 5 tasks, the enterprise can prolong the As shown in Figure 5 above, Sunbelt useful life of its PCs rather than VIPRE took 2.6x and 3.6x less time TEST SETUP AND upgrading the hardware to make room compared to the Symantec and McAfee for resource hungry security solutions. products respectively, to scan approximately METHODOLOGY 18 GB of data. Scanning Speed Tolly engineers tested the following During the scanning window, Sunbelt small and medium enterprise (SME) Engineers documented the time it took VIPRE was once again the least CPU class security products: Sunbelt VIPRE for each of the products under test to intensive, but all the products were Enterprise 3.1, McAfee VirusScan Enterprise perform an on demand, full system scan roughly within 1% to 5% of CPU 8.7i and Symantec Endpoint Protection using all the default security options. utilization relative to one another. 12 Small Business Edition. All products Where required, engineers modified the have been updated to the latest default configuration to specify all file Faster scanning speed, lower CPU available patches and signatures prior to and content types to be scanned, without utilization and lower memory consumption the start of testing. any exclusions. while performing an exhaustive, on demand security scan means that a PC Sunbelt VIPRE Enterprise and Symantec The test results showed once again that protected by the Sunbelt VIPRE Enterprise Endpoint Protection were implemented Sunbelt VIPRE had the best performance product can provide better user in a client server model, with a central by demonstrating the fastest scanning experience through low impact on system server component used to provision, speed among the products tested. resources. configure and manage the client side © 2009 TOLLY ENTERPRISES, LLC WWW.TOLLY.COM PAGE 5 OF 7
  • 6. SUNBELT VIPRE ENTERPRISE 3.1 #209138 security software agents deployed on Engineers started out by establishing a again for five minutes. the client PCs. The McAfee VirusScan baseline configuration for the PC, Enterprise product was implemented as where the product under test was Next, engineers started a full system a standalone, client side installation for installed, but was disabled. Engineers scan,and measured the memory and CPU ease of testing, although the product measured the memory and CPU utilization over the scanning period. Once does offer centralized management utilization in this state for five minutes the scan was completed, the console was and configuration abilities similar to to obtain an average baseline memory left idle for another five minutes for another the Sunbelt and Symantec products. and CPU consumption. set of CPU and memory measurements. Then, engineers performed the suggested The client PC was equipped with a 2.4 Note: Since Symantec Endpoint Protection remediation action, and took the GHz Intel Celeron CPU, 512 MB of RAM, cannot be completely disabled by the measurements for another five minute two physical hard disks of 90 GB and 250 user, two processes were always duration. GB respectively, and running Microsoft running in the background, leading to a Windows XP SP3. Additionally, Microsoft higher baseline memory consumption. Next, engineers closed the GUI console, Office 2003 was also installed. The total To overcome this issue, engineers calculated and took measurements over a five volume of data on the disk was the average memory consumption of the minute duration to observe any resource approximately 18 GB. Sunbelt VIPRE and McAfee VirusScan utilization variations. products, and used that as the estimated The products under test were configured Finally, engineers terminated the security baseline memory consumption for to scan all physical disks, using the services of the product under test, and Symantec. default security policies modified where took another set of CPU and memory necessary to mandate scanning all file Next, the product under test was measurements over a five minute duration and content types. System resource activated by enabling its security services, to observe any variation in resource utilization was measured using Perfmon and once again, engineers measured the utilization. All the tests were repeated counters built into Windows. Engineers memory and CPU utilization for a five twice on each product under test, to also enabled real time anti virus minute duration. Then, the GUI based ensure repeatability of results. Final protection and email protection on all client console of the product was measurements were obtained by averaging products. launched, and measurements were taken the data from the two runs. About Sunbelt Software Sunbelt Software, Inc. develops Windows based security software to protect against viruses, spam, spyware and other malware threats. Headquartered in Tampa Bay (Clearwater), Florida and founded in 1994, Sunbelt provides high performance enterprise and consumer Windows security software including anti malware, anti spyware, anti virus, email security, and malware analysis tools. Leading products include the CounterSpy® and VIPRE® endpoint security product lines, VIPRE Email Security, Sunbelt Exchange Archiver™, CWSandbox™, and Threat Track™. For more information about Sunbelt Software, please visit the company's website at www.sunbeltsoftware.com. To learn more about current activities, products, and ideas at Sunbelt, please visit Sunbelt's corporate blog at www.sunbeltblog.com. Source: Sunbelt Software, Inc. © 2009 TOLLY ENTERPRISES, LLC WWW.TOLLY.COM PAGE 6 OF 7
  • 7. SUNBELT VIPRE ENTERPRISE 3.1 #209138 About Tolly Interaction with Competitors The Tolly Group companies have been In accordance with The Tolly Group’s Fair delivering world class IT services for 20 Testing Charter, Tolly representatives years. Tolly is a leading global provider contact competing vendors to participate in of third party validation services for the testing. Since the competing vendor vendors of IT products, components and products in this test were being tested in services. their default configuration, Tolly personnel You can reach the company via E mail did not engage the representatives of at sales@tolly.com, or via telephone at McAfee, Inc. and Symantec Corporation. +1 561.391.5610. Visit Tolly on the Internet at: For more information on the Tolly Fair Testing Charter, visit: http://www.tolly.com http://www.tolly.com/FTC.aspx Terms of Usage This document is provided, free of charge, to help you understand whether a given product, technology or service merits additional investigation for your particular needs. Any decision to purchase a product must be based on your own assessment of suitability based on your needs. The document should never be used as a substitute for advice from a qualified IT or business professional. This evaluation was focused on illustrating specific features and/or performance of the product(s) and was conducted under controlled, laboratory conditions. Certain tests may have been tailored to reflect performance under ideal conditions; performance may vary under real world conditions. Users should run tests based on their own real world scenarios to validate performance for their own networks. Reasonable efforts were made to ensure the accuracy of the data contained herein but errors and/or oversights can occur. The test/ audit documented herein may also rely on various test tools the accuracy of which is beyond our control. Furthermore, the document relies on certain representations by the sponsor that are beyond our control to verify. Among these is that the software/ hardware tested is production or production track and is, or will be, available in equivalent or better form to commercial customers. Accordingly, this document is provided "as is", and Tolly Enterprises, LLC (Tolly) gives no warranty, representation or undertaking, whether express or implied, and accepts no legal responsibility, whether direct or indirect, for the accuracy, completeness, usefulness or suitability of any information contained herein. By reviewing this document, you agree that your use of any information contained herein is at your own risk, and you accept all risks and responsibility for losses, damages, costs and other consequences resulting directly or indirectly from any information or material available on it. Tolly is not responsible for, and you agree to hold Tolly and its related affiliates harmless from any loss, harm, injury or damage resulting from or arising out of your use of or reliance on any of the information provided herein. Tolly makes no claim as to whether any product or company described herein is suitable for investment. You should obtain your own independent professional advice, whether legal, accounting or otherwise, before proceeding with any investment or project related to any information, products or companies described herein. When foreign translations exist, the English document is considered authoritative. To assure accuracy, only use documents downloaded directly from Tolly.com. No part of any document may be reproduced, in whole or in part, without the specific written permission of Tolly. All trademarks used in the document are owned by their respective owners. You agree not to use any trademark in or as the whole or part of your own trademarks in connection with any activities, products or services which are not ours, or in a manner which may be confusing, misleading or deceptive or in a manner that disparages us or our information, projects or developments. 209138-td1-kk-14Oct09-verG © 2009 TOLLY ENTERPRISES, LLC WWW.TOLLY.COM PAGE 7 OF 7