REPORTS
Best Practices: 10 Steps To Telecommuter Support

Download

IT Pro Ranking: Endpoint Antivirus/Anti-Malware

Best Practices: 10 Steps To Telecommuter Support

Our InformationWeek 2012 Antivirus and Anti-malware Vendor Evaluation Survey asked 386 IT professionals to gauge their impressions of AV/anti-malware vendors. We asked respondents to only rank vendors they’ve used or evaluated within the past 12 months. The core of our survey asked two sets of questions: one focused on overall vendor performance, including price, general performance and product reliability, and the other focused on product-specific features such as virus and malware detection and removal.

Our respondents rated nine vendors. Kaspersky Lab and Sophos earned the highest ranking for overall performance, closely followed by Avast Software and Malwarebytes. Note that only six percentage points separated the leaders from the last-place finisher, Trend Micro. Kaspersky and Sophos also took the top two spots for AV/anti-malware features. The spread was wider here, with 10 points separating first and last place. While smaller players took top honors, brand name vendors still dominate IT’s radar. When we asked respondents to select up to three vendors they use, or have used or evaluated in the past 12 months, 42% said Symantec and 36% said McAfee. Compare that to 10% of respondents who use or have used or evaluated Kaspersky. It’s clear that brand names resonate with IT, but there’s ample opportunity for smaller players to grab a bigger slice of the market. This report analyzes the survey results, provides some product evaluation and purchase advice, and highlight changes in the threat landscape in the ongoing arms race between cyber vandals and anti-malware developers. (R4130212)

Survey Name InformationWeek Analytics 2012 Antivirus and Anti-Malware Vendor Evaluation Survey
Survey Date December 2011
Region North America
Number of Respondents 386
Purpose To determine preference for vendors supplying endpoint antivirus and anti-malware software to enterprise IT organizations.

 

Download
Table of Contents