NSS Labs
Breach Detection Systems Test Report – Trend Micro Deep Discovery Inspector Model 4000 (Hardware model
4100) v3.8 SP5 and OfficeScan (OSCE) v12.0.1807_101917
Table of Contents
Overview .......................................................................................................................................................................2
Security Effectiveness ...................................................................................................................................................5
False Positives ................................................................................................................................................................ 6
Malware Delivered by Drive-by Exploits........................................................................................................................ 7
Malware Delivered by Social Exploits ............................................................................................................................ 7
Malware Delivered over HTTP ....................................................................................................................................... 8
Malware Delivered over Email ...................................................................................................................................... 8
Offline Infections ........................................................................................................................................................... 9
Resistance to Evasion Techniques ................................................................................................................................. 9
Network Device Performance.....................................................................................................................................10
HTTP Capacity with No Transaction Delays ................................................................................................................. 10
Real-World Traffic Mixes ............................................................................................................................................. 11
Stability and Reliability ...............................................................................................................................................12
Total Cost of Ownership (TCO) ...................................................................................................................................13
Calculating the Total Cost of Ownership (TCO) ........................................................................................................... 13
Installation Time .......................................................................................................................................................... 14
Total Cost of Ownership .............................................................................................................................................. 14
Appendix: Product Scorecard .....................................................................................................................................15
Test Methodology .......................................................................................................................................................17
Contact Information....................................................................................................................................................17
This report is Confidential and is expressly limited to NSS Labs’ licensed users.
3
NSS Labs
Breach Detection Systems Test Report – Trend Micro Deep Discovery Inspector Model 4000 (Hardware model
4100) v3.8 SP5 and OfficeScan (OSCE) v12.0.1807_101917
Table of Figures
Figure 1 – Overall Test Results....................................................................................................................................... 2
Figure 2 – False Positive Rate ........................................................................................................................................ 6
Figure 3 – Malware Delivered by Drive-by Exploits: Detection over Time (Minutes).................................................... 7
Figure 4 – Malware Delivered by Social Exploits: Detection over Time (Minutes) ........................................................ 7
Figure 5 – Malware Delivered over HTTP: Detection over Time (Minutes) ................................................................... 8
Figure 6 – Malware Delivered over Email: Detection over Time (Minutes) .................................................................. 8
Figure 7 – Offline Infections........................................................................................................................................... 9
Figure 8 – Resistance to Evasion Results ....................................................................................................................... 9
Figure 9 – Detection under Load (HTTP Capacity with No Transaction Delay) ............................................................ 10
Figure 10 – Detection under Load (“Real-World” Traffic) ........................................................................................... 11
Figure 11 – Stability and Reliability Results ................................................................................................................. 12
Figure 12 – Number of Users ....................................................................................................................................... 13
Figure 13 – Installation Time (Hours) .......................................................................................................................... 14
Figure 14 –3-Year TCO (US$) ....................................................................................................................................... 14
Figure 15 – Scorecard .................................................................................................................................................. 16
This report is Confidential and is expressly limited to NSS Labs’ licensed users.
4
Please complete the form to gain access to this content