{"id":68967,"date":"2023-07-19T11:19:38","date_gmt":"2023-07-19T03:19:38","guid":{"rendered":"https:\/\/version-2.com\/?p=68967"},"modified":"2023-07-17T11:24:22","modified_gmt":"2023-07-17T03:24:22","slug":"eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-these-advanced-security-features-in-business-products","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/07\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-these-advanced-security-features-in-business-products\/","title":{"rendered":"ESET Achieves Certification in AV-Comparatives\u2019 First Anti-Tampering Test \u2013 Marking the Importance of These Advanced Security Features in Business Products"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"68967\" class=\"elementor elementor-68967\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div id=\"content-c9404452\" class=\"csc-frame csc-frame-default\"><h4><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/_processed_\/6\/9\/csm_Anti-tampering_1080x1080_49826bc821.jpg\" alt=\"\" width=\"250\" height=\"250\" \/><\/h4><div id=\"content-c9384433\" class=\"csc-frame csc-frame-default\"><p class=\"bodytext\">Usually, when discussing endpoint security, people dismiss the underlying technology as \u201ctechno-babble,\u201d looking more at the performance and cost rather than what makes a cybersecurity solution actually work.<\/p><p>Those underlying technologies or toolsets are actually very important, as each layer protects the endpoint in a specific way, going from cloud-based sandboxing to actual on-device protection to deter any would-be attacker from compromising a network or a system. The combination of all these measures is what makes endpoint security work; however, as in the case of our <a href=\"https:\/\/www.eset.com\/blog\/business\/detection-and-response-means-becoming-an-active-defender\/\" target=\"_blank\" rel=\"noopener\">detection and response blog<\/a>, some features deserve deeper exploration, as well as the reasons why they exist in the first place \u2013 like the case of anti-tampering technologies created to protect against, you guessed it, tampering.<\/p><p>Recently, AV-Comparatives conducted its first <a href=\"https:\/\/www.av-comparatives.org\/news\/anti-tampering-certification-test\/\" target=\"_blank\" rel=\"noopener\">Anti-Tampering Certification Test<\/a> where security products were subjected to advanced techniques and tools in an effort to disable or modify AV\/EPP\/EDR components or capabilities through tampering. When the test results came in, ESET was one of only four companies that passed \u2013 showcasing the effectiveness of ESET\u2019s multi-layered security approach. In the tests, ESET PROTECT Entry demonstrated the ability to effectively detect and prevent tampering attempts and protect its own integrity from malicious actors.<\/p><\/div><div id=\"content-c9384434\" class=\"csc-frame csc-frame-default\"><h3 class=\"bold\">What is tampering?<\/h3><p class=\"bodytext\">Once a cybercriminal compromises a network\/machine, staying under the radar is the most important hurdle to overcome. This is best achieved by eliminating endpoint security software, likely by using compromised credentials to access the network and then using legitimate tools as much as possible (living off the land).<\/p><p>That is called tampering, and it can happen in a <a href=\"https:\/\/attack.mitre.org\/techniques\/T1562\/001\/\" target=\"_blank\" rel=\"noopener\">variety of ways<\/a>, usually by prompting the user with fake pop-ups asking them to disable their antivirus to avoid unnecessary software blocking during installation, for example. Consequently, the attacker has an easier time to compromise one\u2019s system. Attackers might also want to completely and wholly kill security software services, modify Registry keys or configuration files so security tools do not operate properly. Or they may use other methods to interfere with security products, like disabling updates to prevent the latest security patches from reaching a victim\u2019s systems. A successful tampering attack can result in a loss of functionality for the whole security ecosystem, enabling unauthorized access to the internal system (like privilege escalation), which could result in a data breach.<\/p><p>AV-Comparatives describes the hurdle of overcoming endpoint security rather as being about getting past the annoying product, even as a privileged user. Usually, after <a href=\"https:\/\/support.eset.com\/en\/kb3466-collect-logs-with-eset-log-collector-for-windows\" target=\"_blank\" rel=\"noopener\">collecting logs and analyzing them<\/a> post-incident, an admin can see attempts to disable endpoint security, potentially poor configuration of security products, the existence of vulnerabilities, and which modules in the endpoint security product were eventually disabled due to all the aforementioned weaknesses.<\/p><p>As soon as the criminal actor disables endpoint security software, they likely have limited time before they are detected \u2013 IT admin logs into ESET PROTECT in the morning and finds that endpoint protection was disabled or settings changed (likely through an XDR alert, kicking off an incident response).<\/p><p class=\"bodytext\">False positives can happen, but in the case of ESET technology, that is less of a concern, thanks to our track record of regularly realizing the <a href=\"https:\/\/www.av-comparatives.org\/tests\/false-alarm-test-march-2023\/\" target=\"_blank\" rel=\"noopener\">lowest rate of false positives<\/a> amongst all tested vendors. Hence it is always better to heed the warnings of the endpoint protection platform itself rather than the page you are browsing or the software you are trying to install \u2013 always keep your protection enabled.<\/p><\/div><div id=\"content-c9384435\" class=\"csc-frame csc-frame-default\"><h3 class=\"bold\">ESET\u2019s anti-tampering technologies<\/h3><p class=\"bodytext\">At ESET, we strive to offer the best product we can, and this has been true for years, as our over 30-year-long cybersecurity history suggests. Anti-tampering functionality has been among our best tools in combating hacking attempts for several years now. It has been over a decade since we introduced several technologies to protect our software from being tampered with \u2013 one of the first vendors to do so, in fact.<\/p><p>The most important anti-tampering feature that customers need to be reminded about is <a href=\"https:\/\/help.eset.com\/protect_cloud\/en-US\/setup_protection.html\" target=\"_blank\" rel=\"noopener\">setting a strong password\/passphrase to protect their settings<\/a>. Critically, customers should prioritize this step as it pays big dividends toward achieving ultimate protection.<\/p><p>Tech-wise, ESET uses core technologies modules including HIPS and Self-Defense, among others, to deliver self-defense across its products to prevent exploitation of memory corruption vulnerabilities or to block executable code from launching where it is not supposed to. These join trust certificates and other technologies and strategies to limit manipulation of our product.<\/p><p>The above modules work in concert with ESET Anti-Tampering technologies, including <strong>Protected Process Light<\/strong>, which controls and protects running processes from being infected by malicious code and possible exploitation by other potentially dangerous processes. Additionally, since the introduction of Windows 8.1 OS and higher, there is also ELAM, or <strong>Early Launch Anti-Malware<\/strong>, in the form of an opt-in driver, which helps anti-malware services by being launched as a protected service, only allowing trusted, signed code (Windows or anti-malware vendor signed) to load, as a built-in defense against code injection attacks.<\/p><p>These technologies are important since both malware and manual attackers will always focus on disabling the protection system first, even after attempting a remote login \u2013 disabling services for them is of utmost importance.<\/p><\/div><div id=\"content-c9384436\" class=\"csc-frame csc-frame-default\"><h3 class=\"bold\">Testing confirms ESET\u2019s anti-tampering chops<\/h3><p class=\"bodytext\">For any endpoint security solution, independent testing done by analysts is how a product receives professional\/critical acclaim and certification proving its expert competence.<\/p><p>Regarding anti-tampering, ESET excelled in tests as far back as 2014 and <a href=\"https:\/\/www.av-test.org\/en\/news\/check-2015-self-protection-of-antivirus-software\/\" target=\"_blank\" rel=\"noopener\">2015<\/a>, when independent testing found ESET\u2019s consumer offering 100% successful in preventing tampering attacks, a major milestone compared to the competition of 32 different vendors.<\/p><p>AV-Comparatives\u2019 recent Anti-Tampering Certification Test results mark yet another feather in ESET\u2019s cap \u2013 certifying <a href=\"https:\/\/www.eset.com\/hk\/business\/entry-protection\/\" target=\"_blank\" rel=\"noopener\">ESET PROTECT Entry<\/a> with the <a href=\"https:\/\/www.av-comparatives.org\/wp-content\/uploads\/2023\/05\/avc_tampering_2023_ESET.pdf\" target=\"_blank\" rel=\"noopener\">highest degree of approval<\/a> while also affirming ESET\u2019s continuous improvements of its anti-tampering technologies, like our password protection for settings, which was the most relevant settings change that AV-Comparatives highlighted in their test. <br \/>*Users of ESET Protect Entry are by default also entitled to use ESET Protect Cloud, which can help admins save time and capacity.<\/p><p>For more information on ESET PROTECT Entry, and our full suite of cybersecurity solutions, visit <a href=\"https:\/\/www.eset.com\/hk\/business\/protect-platform\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.eset.com\/hk\/business\/protect-platform\/<\/a>.\u00a0<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Usually, when discussing endpoint security, people dism [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1075,40,61],"tags":[41,1076],"class_list":["post-68967","post","type-post","status-publish","format-standard","hentry","category-year2023","category-eset","category-press-release","tag-eset","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ESET Achieves Certification in AV-Comparatives\u2019 First Anti-Tampering Test \u2013 Marking the Importance of These Advanced Security Features in Business Products - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/awards-and-testing\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ESET Achieves Certification in AV-Comparatives\u2019 First Anti-Tampering Test \u2013 Marking the Importance of These Advanced Security Features in Business Products - Version 2\" \/>\n<meta property=\"og:description\" content=\"Usually, when discussing endpoint security, people dism [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/awards-and-testing\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-19T03:19:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/_processed_\/6\/9\/csm_Anti-tampering_1080x1080_49826bc821.jpg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/awards-and-testing\\\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/07\\\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-these-advanced-security-features-in-business-products\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"ESET Achieves Certification in AV-Comparatives\u2019 First Anti-Tampering Test \u2013 Marking the Importance of These Advanced Security Features in Business Products\",\"datePublished\":\"2023-07-19T03:19:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/07\\\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-these-advanced-security-features-in-business-products\\\/\"},\"wordCount\":1042,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/awards-and-testing\\\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/_processed_\\\/6\\\/9\\\/csm_Anti-tampering_1080x1080_49826bc821.jpg\",\"keywords\":[\"ESET\",\"2023\"],\"articleSection\":[\"2023\",\"ESET\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/awards-and-testing\\\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/07\\\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-these-advanced-security-features-in-business-products\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/awards-and-testing\\\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\\\/\",\"name\":\"ESET Achieves Certification in AV-Comparatives\u2019 First Anti-Tampering Test \u2013 Marking the Importance of These Advanced Security Features in Business Products - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/awards-and-testing\\\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/awards-and-testing\\\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/_processed_\\\/6\\\/9\\\/csm_Anti-tampering_1080x1080_49826bc821.jpg\",\"datePublished\":\"2023-07-19T03:19:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/awards-and-testing\\\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/awards-and-testing\\\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/awards-and-testing\\\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/_processed_\\\/6\\\/9\\\/csm_Anti-tampering_1080x1080_49826bc821.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/_processed_\\\/6\\\/9\\\/csm_Anti-tampering_1080x1080_49826bc821.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/awards-and-testing\\\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ESET Achieves Certification in AV-Comparatives\u2019 First Anti-Tampering Test \u2013 Marking the Importance of These Advanced Security Features in Business Products\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ESET Achieves Certification in AV-Comparatives\u2019 First Anti-Tampering Test \u2013 Marking the Importance of These Advanced Security Features in Business Products - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/awards-and-testing\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\/","og_locale":"en_US","og_type":"article","og_title":"ESET Achieves Certification in AV-Comparatives\u2019 First Anti-Tampering Test \u2013 Marking the Importance of These Advanced Security Features in Business Products - Version 2","og_description":"Usually, when discussing endpoint security, people dism [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/awards-and-testing\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\/","og_site_name":"Version 2","article_published_time":"2023-07-19T03:19:38+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/_processed_\/6\/9\/csm_Anti-tampering_1080x1080_49826bc821.jpg","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/awards-and-testing\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/07\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-these-advanced-security-features-in-business-products\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"ESET Achieves Certification in AV-Comparatives\u2019 First Anti-Tampering Test \u2013 Marking the Importance of These Advanced Security Features in Business Products","datePublished":"2023-07-19T03:19:38+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/07\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-these-advanced-security-features-in-business-products\/"},"wordCount":1042,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/awards-and-testing\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/_processed_\/6\/9\/csm_Anti-tampering_1080x1080_49826bc821.jpg","keywords":["ESET","2023"],"articleSection":["2023","ESET","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/awards-and-testing\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/07\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-these-advanced-security-features-in-business-products\/","url":"https:\/\/www.eset.com\/blog\/awards-and-testing\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\/","name":"ESET Achieves Certification in AV-Comparatives\u2019 First Anti-Tampering Test \u2013 Marking the Importance of These Advanced Security Features in Business Products - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/awards-and-testing\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/awards-and-testing\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/_processed_\/6\/9\/csm_Anti-tampering_1080x1080_49826bc821.jpg","datePublished":"2023-07-19T03:19:38+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/awards-and-testing\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/awards-and-testing\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eset.com\/blog\/awards-and-testing\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/_processed_\/6\/9\/csm_Anti-tampering_1080x1080_49826bc821.jpg","contentUrl":"https:\/\/www.eset.com\/fileadmin\/_processed_\/6\/9\/csm_Anti-tampering_1080x1080_49826bc821.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/awards-and-testing\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-t\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"ESET Achieves Certification in AV-Comparatives\u2019 First Anti-Tampering Test \u2013 Marking the Importance of These Advanced Security Features in Business Products"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-hWn","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/68967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=68967"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/68967\/revisions"}],"predecessor-version":[{"id":68974,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/68967\/revisions\/68974"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=68967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=68967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=68967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}