top of page
Product Details

Last Updated:

28 September 2024

nordtp.png

PRODUCT:

Threat Protection Pro

VERSION:

7.28.4.0

PLATFORM:

Windows 11

PRODUCT URL:

FEATURES:

Technology
Verified
Malware Detection
28/09/2024
Malware Remediation
28/09/2024

EXPANDED TESTS:

Product Performance

Vendor Claims

Support Provision

Product Validation

Product Validation Testing
As part of the Product Validation programme, a series of requirements are designated as either Core or Augmented and cover various areas of the product ownership lifecycle. The exact requirements vary depending on the nature and intended purpose of the tested product.

​

Each individual requirement, whether Core or Augment, is assigned one or more categories:
User Experience
(UX) - where it affects the overall user experience
Documentation
(Doc) - where information is being provided to the user 
Operation
(Opt) - where it affects the expected operation of the product

 

The Product Validation programme is a constantly evolving accreditation and requirements are frequently updated. 

Product Rating:

Product Rating: AAA

The tested product met all of the Core requirements and included one or more Augment requirements in each of the tested categories.

Product Rating: AA

The product met all of the Core requirements and one or more Augment requirements across one or more of the tested categories.

Product Rating: A

The product met all of the Core requirements in each of the tested categories.

Product Rating: FAIL

The product failed to meet the Core requirements in one or more of the tested categories.

Tested Requirements - total

CORE Requirements

Core requirements are those that the solution must demonstrate or provide in order to meet the minimum standard for the West Coast Labs - Product Validation accreditation. Each product area tested (purchase through to removal) will have their own set of Core requirements.

Total:

15

UX:

7

DOC:

9

OPT:

11

Components

AUGMENT Requirements

Further to the Core requirements, testing also verifies each product against a series of Augment requirements. The Augment category, while not a mandatory, are those product elements that add to or enhance the tested solution. The individual Augment requirements may be classified as affecting one or more of user impact, documentation, or operation.

Total:

15

UX:

12

DOC:

10

OPT:

13

Components

EXPANDED Requirements

Additional requirements related to the optional Expanded Product Validation tests (Product Performance, Vendor Claims, and Support Validation).

Total:

0

UX:

0

DOC:

0

OPT:

0

Components

Tested Requirements - by category

While traditional product certifications focus on detection rates, the West Coast Labs Product Validation evaluates the product ownership lifecycle as a whole. This full-product evaluation allows for greater confidence in the wider functionality and overall ownership experience. Each of the product areas is listed below and includes the individual evaluated components. 

PURCHASE

deploy_icon.png

DEPLOYMENT

ADMINISTRATION

FUNCTIONALITY

func_icon.png

SUPPORT

supp_icon.png

REMOVAL

rem_icon.png

Purchase

Requirement
Type
Date
Accurate quote/pricing provision
Core
28/09/2024
Multiple licensing option provision
Augment
28/09/2024
Secured purchasing method
Core
28/09/2024
Purchase receipt/invoice provided
Core
28/09/2024
Purchase cooling-off period
Augment
28/09/2024
Refunds provided as per agreement
Core
28/09/2024
Timed or reduced-function trial available
Augment
28/09/2024

Includes the clarity and accuracy of product pricing, licensing and license terms. Where applicable, also includes purchasing methods and refund policies.

Core:

4

Augment:

3

Expanded:

00

Requirement Type Counts:

Component Counts:

Requirement:

--

Components

Suggested areas of the solution impacted by the tested requirement.

User Experience: 

Documentation:

Operation:

--

--

--

Description:

--

futuristic-white-hexagon-dynamic-wave-futuristic-honeycomb-concept-digital-technology-webf
Expanded Test: Product Performance

Product Rating Scale

Performance Testing

The Product Performance Expanded Feature Set enhances the West Coast Labs Product Validated accreditation with test requirements specific to the capability of the solutions advertised role or operation.


The Expanded Test contains an exhaustive analysis of the core functionality or technology provided by the tested solution. This may include statistical data, scenario recreation, and impact footprint; however, the exact makeup of the evaluation will vary depending on the nature of the test solution and the scale of deployment.

Malware Category: Regional

Part of the West Coast Labs sample analysis system records the country in which each sample was reported. Samples used in this test have been grouped by geographic region; countries included in this test may be found below.

Malware Category: Regional

Last updated:

0000-00-00 00:00:00

Americas

Europe

Middle East & Africa

Asia Pacific & Oceania

Americas

Sample Count:
Included Countries:
USA, Canada, Brazil, Argentina

0000

Europe

​

Sample Count:
Included Countries:
USA, Canada, Brazil, Argentina

0000

Middle East & Africa

 

Sample Count:
Included Countries:
USA, Canada, Brazil, Argentina

0000

Asia Pacific & Oceania

 

Sample Count:
Included Countries:
USA, Canada, Brazil, Argentina

0000

Last updated:

0000-00-00 00:00:00

Outline:
Binaries and applications that interact with system registry and local files but that do not present a definitive risk either through design or error.

Sample Count:

0000

RISK CATEGORIES

​

All tested binaries are assigned an associated threat rating based on their monitored behavior under analysis. Threat ratings start at 0.0 and increase based on their impact and attempted interactions.


Any binary with a threat rating above 10 is automatically categorized as Critical. Associated ratings may be the result of a high number of lower impact system interactions or those that are  individual yet high impact.     

Malware Category: Threat Level

​

The following results indicate the solution’s ability to mitigate threats based on the associated risk. While traditional signature testing can indicate a product’s effectiveness, it is often built on the assumption that all included binaries represent an equal threat. This can lead to an incorrect rating of that solution’s performance.

Low/PUP
Threat Range: 0.5-2.0

Sample Count:

0000

Sample Count:

0000

Sample Count:

0000

Outline:
Malware used to create further vulnerabilities on the system or attempt to interfere with system operations.

Outline:
Malware that presents a definitive risk to the user’s data/information, or that may facilitate further security breaches.

Outline:
Active threats that present a direct risk to the integrity of the system and user information. These will include ransomware, destructive malware, and data theft.

Moderate
Threat Range: 2.1-4.0

High
Threat Range: 4.1-10.0

Critical
Threat Range: 10.1+

Malware Category: Threat Level

Product Rating

Product Rating

Product Rating

Product Rating

Last updated:

0000-00-00 00:00:00

Malware Category: Delivery Method


The following outlines the tested solution’s detection capability of malware samples being reported as distributed over four distinct delivery methods. Testing is based on the category of malware and not the delivery method itself.

Malware Category: Delivery Method

Outline: The aggressor places malware on a genuine website through an existing exploit or vulnerability. On browsing to the affected website, the malicious code attempts to deliver the payload to the user’s system.

Sample Count:

0000

Product Rating:

Delivery Method: Drive-by Download

Outline: The aggressor places malware on a genuine website, server, or other host through an existing exploit or vulnerability. A victim then manually downloads the malicious file to the endpoint.

Sample Count:

0000

Product Rating:

Delivery Method: File Download (Manual)

Outline: An email is sent to the victim, either as part of a wider attack or a more direct attack against the victim. The email contains a malicious file that is saved to the affected system.

Sample Count:

0000

Product Rating:

Delivery Method: Email Attachment

meth_emailurl.png

Outline: An email is sent to the victim, either as part of a wider attack or a more direct attack against the victim. A link within the email directs the user directly to the malicious file.

Sample Count:

0000

Product Rating:

Delivery Method: Email Link

Last updated:

0000-00-00 00:00:00

Malware Category: Type


Protection capability when malware is classified by type or category. Categories may differ between tests depending on trends at the time of testing. Categorization is based on observed behaviors during initial analysis against an unprotected system.

Malware Category: Type

Malware Type: Trojan

Outline:
As used in testing, malware in this category is designated as trojan primarily by its authentic appearance and behavior but where it also presents a threat to the user/system.

Sample Count:

0000

Product Rating:

Malware Type: Spyware

Outline:
Applications that are designed to remain hidden on the affected system and present a threat to the user by the theft and use of their information or data.

Sample Count:

0000

Product Rating:

Malware Type: Droppers

Outline:
Any threat that places new files or code on the target system that is either a threat itself or allows for further corruption of system integrity.

Sample Count:

0000

Product Rating:

Malware Type: Service Impact

Outline:
Malware that attempts to interrupt, disable, or otherwise corrupt authentic services running on the target system. Includes the running of malicious/mimic services.

Sample Count:

0000

Product Rating:

Malware Type: Network

Outline:
Traffic associated with malware that is either directly related to the exfiltration of data of for the transfer of data or further malicious files. Includes interaction with C&C servers.

Sample Count:

0000

Product Rating:

Malware Type: Crypto Theft

Outline:
Malware that is designed to steal data surrounding privately held cryptocurrency. Including user credentials and wallet access attempts.

Sample Count:

0000

Product Rating:

Last updated:

0000-00-00 00:00:00

Malware Remediation


In addition to the tested product’s detection capability, the lab also examines the product’s ability to remove traces of infection that exist prior to the product’s installation. Tested samples are taken from three distinct categories and these may change between tests. Testing focuses on four areas of remediation:

Malware Remediation

Running Processes
This criteria examined the solution’s ability to evaluate all of the system’s currently running processes and accurately identify any that may be present as a result of infection.

Registry Changes
This criteria is intended to detect where any registry entries, resulting from previous infection, still remain.

Secondary Files
This criteria requires the detection of files not otherwise included in the Dropped Executables test listed below.

Dropped Executables
This criteria is a test of the solution’s ability to detect, upon scanning, the presence of any binary files that have been placed on the system after infection. Only valid, executable files are included.

Malware Type: Spyware

Running Processes

Item Count:

0000

Product Rating:

Registry Changes

Item Count:

0000

Product Rating:

Dropped Executables

Item Count:

0000

Product Rating:

Secondary Files

Item Count:

0000

Product Rating:

Malware Type: Trojan

Running Processes

Item Count:

0000

Product Rating:

Registry Changes

Item Count:

0000

Product Rating:

Dropped Executables

Item Count:

0000

Product Rating:

Secondary Files

Item Count:

0000

Product Rating:

Malware Type: Botnet

Running Processes

Item Count:

0000

Product Rating:

Registry Changes

Item Count:

0000

Product Rating:

Dropped Executables

Item Count:

0000

Product Rating:

Secondary Files

Item Count:

0000

Product Rating:

futuristic-white-hexagon-dynamic-wave-futuristic-honeycomb-concept-digital-technology-webf
Expanded Test: Product Performance

Not Registered

Expanded Test: Vendor Claims

The Vendor Claims Expanded Feature Test enhances the West Coast Labs Product Validated accreditation with test requirements specific

that allow you to highlight the features and functionality that sets your product apart from the rest.

​

When you want to demonstrate the unique features offered by your solution, this evaluation service enables you to back up those claims with independent verification.

​

Whether your solution takes a new approach to an old problem, includes cutting edge functionality, or excels in performance, the Product Validated service enables the creation of a bespoke accreditation unique to your solution. West Coast Labs will work with you to create a set of objective claims unique to your solution.

Expanded Test: Vendor Claims

Not Registered

Expanded Test: Support Provision

The Support Provision Expanded Feature Test provides an independent evaluation of support provided to the user whether through online live chat functions or through traditional telephone support.


The lab will create a series of common fault scenarios that may be presented to support agents. Customer Support evaluation may include licensing issues, refund enquiries, and general account faults. Technical Support evaluation may include both faults associated with the functionality of the solution and use of the solution to carry out standard operations on the user’s system.

Expanded Test: Support Provision

Not Registered

bottom of page