Sunday, July 22, 2012

Virus Bulletin RAP Averages Quadrant, December 2011 through June 2012


Virus Bulletin has released their latest RAP Averages Quadrant, representing December 2011 through June 2012.  The top 10 (some eyeballing necessary):
  1. Coranti
  2. Coranti Cora
  3. Auslogics
  4. TrustPort
  5. G Data
  6. BullGuard
  7. Avira Pro
  8. ESTSoft
  9. Tencent
  10. Avira Free
The top three were in a clear cluster by themselves with the next seven in a separate cluster. 

From the October 2011 through April 2012 report; some eyeballing necessary):
  1. Coranti
  2. Lavasoft
  3. Auslogics
  4. G Data
  5. BitDefender
  6. ESTSoft (?)  (Could be Emisoft)
  7. TrustPort
  8. Avira Free
  9. Avira Pro
  10. Kaspersky ES
 All of the top 10 on the latest RAP Averages Quadrant  achieved greater than 90% on Reactive Detection and   80% Proactive Detection.  This was down a bit on the Proactive Detection side from the previous report.   

Neither Symantec nor Trend Micro are present on this RAP Averages Quadrant.  PC Tools, owned by Symantec, is.  Iolo had the worst Reactive Detection at around 55%.  UnThreat the worst Proactive Detection, at around 40%.

The relative performance of vendors can best be viewed by looking at the RAP Averages Quadrant chart at


Subscribers to Virus Bulletin's publications have access to more details on the results.

RAP Averages Quadrant

This test measures products' detection rates across four distinct sets of malware samples.  The first three test sets comprise malware first seen in each of the three weeks prior to product submission.  These measure how quickly product developers and labs react to the steady flood of new malware emerging every day across the world.  A fourth test set consists of malware samples first seen in the week after product submission.

About Virus Bulletin www.virusbtn.com

Virus Bulletin started in 1989 as a magazine dedicated to providing PC users with a regular source of intelligence about computer malware - its prevention, detection, and removal.  In addition, how to recover programs and data following an attack.

No comments: