Peter Stelzhammer

Austria Contact Info
500+ connections

Join to view profile

About

Co-Founder, AV-Comparatives
Founder, kompetenzzentrum.IT / ITSEC
Member Board of…

Activity

Join now to see all activity

Experience & Education

  • Wirtschaftskammer Tirol

View Peter’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Publications

  • Mobile Security Products for Android: Security for the Android Platform

    Once again we tested security products for smartphones running Google's Android operating system. The report covers details of the products made by leading manufacturers. Smartphones represent the future of modern communications. In 2013, more than 1 billion smartphones were sold, a further milestone in the advance of these devices1. A study published by Facebook emphasises the importance of smartphones in our lives; about 80% of users make use of their smartphone within 15 minutes of waking up…

    Once again we tested security products for smartphones running Google's Android operating system. The report covers details of the products made by leading manufacturers. Smartphones represent the future of modern communications. In 2013, more than 1 billion smartphones were sold, a further milestone in the advance of these devices1. A study published by Facebook emphasises the importance of smartphones in our lives; about 80% of users make use of their smartphone within 15 minutes of waking up each day. At the same time, the traditional function of a telephone is becoming less and less important. The high quality of integrated cameras means that the smartphone is increasingly used for photography. As well as with photos, users trust their devices with their most personal communications, such as Facebook, WhatsApp and email. This brings some risks with it, as such usage makes the smartphone interesting for criminals, who attempt to infect the device with malware or steal personal data. There is also the danger brought by phishing attacks. These days, the use of security software on a PC or laptop is seen as essential. However, many smartphone users do not yet have the same sense of responsibility, even though their devices store personal data, private photos, Internet banking information or even company data. As modern smartphones are often expensive to buy, they are also an attractive target for thieves. Top-quality smartphones cost several hundred Euros. As it is not possible to physically prevent them from being stolen, they must be made less attractive to thieves. Consequently, many of today's security products contain not only malware protection, but also highly developed theft-protection functions, which make the device less attractive to thieves (e.g. by locking the device), and help the owner to find it again.

    Other authors
    See publication
  • Free Antivirus and its Market Implementation

    The study analyzed the business model of two selected Chinese AV-vendors, Qihoo 360 and Baidu, from the perspective of their product development model, revenue model, marketing and distribution, and services and implementation. Furthermore, market research was conducted to compare the Chinese and Western users in order to investigate the influential factors on users' choice of security software. This study was initiated for the purpose of investigating the business model which supports Chinese…

    The study analyzed the business model of two selected Chinese AV-vendors, Qihoo 360 and Baidu, from the perspective of their product development model, revenue model, marketing and distribution, and services and implementation. Furthermore, market research was conducted to compare the Chinese and Western users in order to investigate the influential factors on users' choice of security software. This study was initiated for the purpose of investigating the business model which supports Chinese "free" AV-vendors to offer free fully-functional security software.

    Other authors
    See publication
  • Efficient Malware Detection: by a Honeypot Network

    Akademikerverlag

    Testing and comparing antivirus software necessitates the availability of malware samples. An efficient way to detect malware is the use of honeypots. There exist honeypots which passively wait for automated attacks in order to capture the malicious binaries. Other types of honeypots crawl the web, and, by being attacked, can identify malicious websites. The goal was to create an efficient, easily manageable and adaptable network of honeypots, distributed worldwide, which automatically collects…

    Testing and comparing antivirus software necessitates the availability of malware samples. An efficient way to detect malware is the use of honeypots. There exist honeypots which passively wait for automated attacks in order to capture the malicious binaries. Other types of honeypots crawl the web, and, by being attacked, can identify malicious websites. The goal was to create an efficient, easily manageable and adaptable network of honeypots, distributed worldwide, which automatically collects and handles malware from the web. For this purpose, existing honeypots were investigated and compared extensively. The findings were incorporated in the design of specialized, user-friendly honeynets, capable of automatically collecting malware samples and handling already known and unknown (zero-day) attacks. Additionally, an efficient sorting mechanism for large amounts of malware files was developed in order to create useful test sets.

    Other authors
    • Florian Girtler
  • IT Security Products for Corporate Users [Paperback]

    Most organizations are aware of the risks threatening their IT environment. Viruses, trojans, worms, exploits and many other threats represent a serious danger for the IT department. A collapse of the IT system could mean grave financial losses right up to insolvency for a company. The IT departments of companies are conscious of this problem. Getting the best protection against these threats is the only issue. A simple file antivirus solution alone is totally inade-quate, as there are too many…

    Most organizations are aware of the risks threatening their IT environment. Viruses, trojans, worms, exploits and many other threats represent a serious danger for the IT department. A collapse of the IT system could mean grave financial losses right up to insolvency for a company. The IT departments of companies are conscious of this problem. Getting the best protection against these threats is the only issue. A simple file antivirus solution alone is totally inade-quate, as there are too many threats from contaminated e-mails, exploits etc. What is re-quired is a comprehensive suite that provides protection against all of these. Functional Diversity Because of the immense functional diversity of various antivirus suites and corporate prod-ucts, it is becoming increasingly difficult for decision-makers in the IT sector to get a proper overview. Which product should one opt for and for which areas of protection? During these tests our main focus has not been on malware detection rates, but on the prod-ucts' handling and user-friendliness, and the scope of functionality. We have compiled the functional scope of various products in a detailed table. For malware detection rates of indi-vidual products please refer to the tests of our website: http://www.av-comparatives.org

    Other authors
    See publication
  • Energieeffizienz und Kostenoptimierung in der IT: Total Cost of Ownership (TCO) & Green-IT [Broschiert]

    BoD

    Die Studie „Total Cost of Ownership (TCO) & Green-IT – Energieeffizienz und Kostenoptimierung“ befasst sich mit der Fragestellung, ob es für eine bestimmte Unternehmensgröße ökonomisch und/oder ökologisch effizienter ist in einem Zyklus von 3 Jahren auf einen Gesamtbetrachtungsrahmen von 9 Jahren die gesamte IT-Landschaft eines Unternehmens gegen ein energieeffizienteres Pendant auszutauschen oder die bestehende aufzurüsten.

    See publication

Honors & Awards

  • Tyrol's most family-friendly company

    Government Tyrol / Austria

  • Best Paper Award - Malwareconference 2014

    -

    Best Paper Award at the www.malwareconference.com 2014
    Paper: Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative protection testing by Andreas Clementi and Peter Stelzhammer, AV-Comparatives, Austria.

  • Innovationspreis IT - "Best Of"

    Initiative Mittelstand Deutschland

  • Constantinus Award - Special Award International Project

    Government of Austria

    The Constantinus Award is the highest award which is given by Austrian Government (Chamber of Commerce) for international projects in management consulting.

  • Constantinus Award in Computer Science, 1st Place

    Government of Austria

    The Constantinus Award is the highest award which is given by Austrian Government (Chamber of Commerce) for projects in computer science.

  • Cluster Award 2012

    Standortagentur Tirol

    AV-Comparatives' Real World Protection Test was awarded as the best IT innovation 2012 in the Tyrol.

  • Austrian eAward 2012

    Report.at

  • Nomination T-System Innovation Award 2012

    -

  • Austrias top cycle-friendly company

    Chamber of Commerce Austria

  • Tirolissimo (6 times as subcontractor)

    Chamber of Commerce - Tyrol

    2003, 2004, 2005, 2006, 2008, 2009

Languages

  • Deutsch

    Native or bilingual proficiency

  • Englisch

    Full professional proficiency

Recommendations received

More activity by Peter

View Peter’s full profile

  • See who you know in common
  • Get introduced
  • Contact Peter directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Peter Stelzhammer in Austria