The ZoneAlarm Difference

Back Home

ZoneAlarm Stops Attacks Others Miss.

ZoneAlarm's dedication to staying ahead of threats has earned it a record of stopping attacks others miss. Here are some examples.

Attacks In The News
Attacks Test Results
Browser Security Attacks
Identity Theft & Online Storage Attacks


Attacks

Product comparisons*

          Distinguishing Features

2009 Microsoft Video ActiveX Exploit:

Drive-by attacks originated from thousands of newly-compromised websites.

See news story
See press release

 STOPPED
ATTACK?
ZoneAlarm® Extreme Security
ZoneAlarm® ForceField™
YES
Norton™ Internet Security Suite NO*
McAfee® Internet Security Suite NO*

* Anti-virus providers had to update software to catch exploit attacks. Only ZoneAlarm could block attacks from the first day of outbreak.

  • Browser virtualization

2009 Gumblar attack:

Injected itself into browsers when users
visited websites, intercepted web traffic, and installed a data-theft Trojan that steals names and passwords.

See news story
See press release
See blog

 STOPPED
ATTACK?
ZoneAlarm® Extreme Security
ZoneAlarm® ForceField™
YES
Norton™ Internet Security Suite NO*
McAfee® Internet Security Suite NO*

* Competitors had to update software to stop Gumblar attacks. Only ZoneAlarm could block attacks
from the first day of outbreak.

  • Browser virtualization

2009 Nine Ball attack:

Multi-layered Web browser attack
compromised legitimate Web sites and
redirected users to malicious sites.

See news story
See press release

 STOPPED
ATTACK?
ZoneAlarm Extreme Security
ZoneAlarm ForceField
YES
Norton™ Internet Security Suite NO*
McAfee® Internet Security Suite NO*

* Anti-virus providers had to update software to catch
Nine Ball attacks. Only ZoneAlarm could block attacks
from the first day of outbreak.

  • Browser virtualization

2008 online bill pay site hijack:

A hijack of CheckFree's website
affected an estimated 160,000 people.

See news story
See press release

 STOPPED
ATTACK?
ZoneAlarm Extreme Security*
ZoneAlarm ForceField
ZoneAlarm® Internet Security Suite
ZoneAlarm® Pro
ZoneAlarm® Antivirus
YES
Norton™ Internet Security Suite NO
McAfee® Internet Security Suite NO
  • Operating system firewall
    (OSFirewall™)
  • Browser virtualization

2008 Internet Explorer
vulnerability exploited

to distribute drive-by downloads.

See news story
See press release

 STOPPED
ATTACK?
ZoneAlarm Extreme Security*
ZoneAlarm ForceField
YES
Norton Internet Security Suite NO
McAfee Internet Security Suite NO
  • Browser virtualization

Security Certificate Forgery
Exploit:

Affecting Web users; discovered by
researchers in 2008.

See news story
See press release

 STOPPED
ATTACK?
ZoneAlarm Extreme Security*
ZoneAlarm ForceField
YES
Norton Internet Security Suite NO
McAfee Internet Security Suite NO
  • MD5-based certificate
    spoofing check

Adobe Flash exploit:

discovered by researcher
Shane Macaulay in 2008.

ForceField protection verified by
Macauley. See press release

 STOPPED
ATTACK?
ZoneAlarm Extreme Security*
ZoneAlarm ForceField
YES
Internet Explorer 7 built-in security NO
Firefox 3 built-in security NO
  • Browser virtualization

A Sony CD rootkit

packaged in music CDs was exploited
by hackers with viruses, Trojans, worms
and other attacks.

See news story
See press release and timeline

 STOPPED
ATTACK?
ZoneAlarm Extreme Security*
ZoneAlarm Internet Security Suite
ZoneAlarm Pro
ZoneAlarm Antivirus
YES
Norton Internet Security Suite NO
McAfee Internet Security Suite NO
  • Operating system firewall
    (OSFirewall™)

Firewall attack tests:

20 different tests were performed
using the independent Firewall Leak
Tester.

See test data

 STOPPED
ATTACK?
ZoneAlarm Extreme Security*
ZoneAlarm Internet Security Suite
ZoneAlarm Pro
ZoneAlarm Antivirus
100%
Norton Internet Security Suite 40%
McAfee Internet Security Suite 40%
  • Operating system firewall
    (OSFirewall™)
  • Early boot protection
  • Rootkit protection

Self protection tests:

Independent testing during multiple
attacks in a complete malware life
cycle environment.

See test data and KoreLogic report PDF

 STOPPED
ATTACK?
ZoneAlarm Extreme Security*
ZoneAlarm Internet Security Suite
ZoneAlarm Pro
ZoneAlarm Antivirus
80
Norton Internet Security Suite 65
McAfee Internet Security Suite 39
  • Self protection, including
    fail-safe protection

Boot attack tests:

Independent testing of attacks stopped
during the vulnerable boot-up period.

See test data and KoreLogic report PDF

 STOPPED
ATTACK?
ZoneAlarm Extreme Security*
ZoneAlarm Internet Security Suite
ZoneAlarm Pro
ZoneAlarm Antivirus
32
Norton Internet Security Suite 23
McAfee Internet Security Suite 3
  • Early boot protection

Drive-by downloads:

Stealth attacks such as those that have
hit users of popular sites like the 2007
Super Bowl hosts Miami Dolphins site.

 

 STOPPED
ATTACK?
ZoneAlarm Extreme Security*
ZoneAlarm ForceField
YES
Internet Explorer 7 built-in security NO
Firefox 3 built-in security NO
Norton Internet Security Suite NO
McAfee Internet Security Suite NO
Google Chrome Partial (no plugin and registry virtualization)
  • Browser virtualization

New Phishing Sites:

New imposter Web sites designed to
look like trusted Web sites

See Tested at over 95% + effectiveness
against known and new phishing attacks

 STOPPED
ATTACK?
ZoneAlarm Extreme Security*
ZoneAlarm ForceField
YES
Internet Explorer 7 built-in security YES
Firefox 3 built-in security NO
Norton Internet Security Suite NO
McAfee Internet Security Suite NO
Google Chrome NO
  • Anti-phishing heuristics detect
    new sites not yet in databases

Browser keyloggers and screen
grabbers:

Programs recording what you do,
such as the keyloggers installed by a
banner ad that affected MySpace.com
users.

 STOPPED
ATTACK?
ZoneAlarm Extreme Security*
ZoneAlarm ForceField
YES
Internet Explorer 7 built-in security NO
Firefox 3 built-in security NO
Norton Internet Security Suite NO
McAfee Internet Security Suite NO
Google Chrome NO
  • Keylogger and screen grabber
    blocking

Browser keyloggers and screen
grabbers:

Others with access to your computer
can see where you have been or what
you've typed.

  STOPS
ATTACK?
ZoneAlarm Extreme Security*
ZoneAlarm ForceField
YES
Internet Explorer 7 built-in security Partial(plug-in tracks left)
Firefox 3 built-in security Partial(plug-in tracks left)
Norton Internet Security Suite NO
McAfee Internet Security Suite NO
Google Chrome Partial(plug-in tracks left)
  • Private browser option erases all
    tracks (cookies, history, auto-fill,
    encrypts and erases temporary
    files, etc)

Offline identity theft:

Thieves go through garbage/recycling
to steal identity data.

 Helps stop
identity theft?
ZoneAlarm Extreme Security*
ZoneAlarm Internet Security Suite
ZoneAlarm Pro
YES
Norton Internet Security Suite NO
McAfee Internet Security Suite NO

*Available in US only.

  • Offline identity theft protection
    including credit activity monitoring

Online backup data theft:

Can occur at data center because
customer encryption keys are not private.

  STOPS
ATTACK?
ZoneAlarm Extreme Security* YES
Norton Internet Security Suite NO
McAfee Internet Security Suite (No online backup feature)
  • Private key option for online
    backup

* Comparisons based on products available at time of attack or at time research was performed. While ZoneAlarm Extreme Security was yet available at time of some attacks, it is listed because it is equivalent to the protections of both ZoneAlarm Internet Security Suite and ZoneAlarm ForceField.