Generated by GPT-5-mini| SE Labs | |
|---|---|
| Name | SE Labs |
| Type | Private |
| Industry | Cybersecurity testing |
| Founded | 2010 |
| Headquarters | London, United Kingdom |
| Key people | Andrew Rogoyski |
| Products | Security testing reports, breach detection assessments |
SE Labs SE Labs is a London-based independent testing organization that evaluates antivirus software, endpoint protection, network security appliances, and security services. Founded by professionals with backgrounds in information security, penetration testing, and forensics, the organization produces repeatable assessments used by vendors, resellers, and purchasers in North America, Europe, and Asia. SE Labs' reports are cited alongside results from AV-Comparatives, AV-Test, Magma Research, and MITRE evaluations in procurement and research contexts.
SE Labs traces origins to practitioners active in computer security and digital forensics communities who responded to demand for real-world testing after incidents such as the WannaCry ransomware attack and high-profile breaches at organizations like Yahoo! and Equifax. Early activity overlapped with initiatives from Virus Bulletin and IETF-aligned working groups interested in standardized evaluation. Over the 2010s SE Labs formalized procedures while engaging with vendors from Microsoft, Symantec, Trend Micro, Kaspersky Lab, and Bitdefender. The organization has collaborated or cross-referenced work from ENISA, NIST, and academic groups at University College London and Imperial College London.
SE Labs publishes structured methodologies that combine elements of penetration testing, red teaming, and incident response simulation to assess detection, prevention, and response capabilities. Test cycles often use threat emulations inspired by operations attributed to groups reported by Mandiant, FireEye, CrowdStrike, and Recorded Future threat intelligence. Test scenarios may involve exploitation techniques catalogued in the MITRE ATT&CK framework and use payloads similar to those used in the NotPetya and Stuxnet incidents for realism. SE Labs employs controlled live malware, simulated phishing campaigns leveraging templates used by actors like FIN7 and APT28, and network-based attacks reminiscent of campaigns against Sony Pictures Entertainment and Target Corporation. Results are measured against objective criteria influenced by ISO/IEC standards and incident handling guidance from SANS Institute and CERT-EU.
SE Labs issues comparative reports that rate products and services on axes such as protection, detection, and accuracy. Evaluations are often juxtaposed with independent test suites from AV-Comparatives, AV-Test, and the VirusTotal aggregation platform to provide broader context. Vendors whose products have been tested include McAfee, Sophos, ESET, Palo Alto Networks, CrowdStrike, and Cisco Systems. Ratings consider live malware handling as seen in compromises like SolarWinds and trivially evasive techniques documented by BlackBerry Cylance research. SE Labs' scoring has been cited in procurement decisions by organizations similar to NHS England, Deutsche Bank, and Telefonica.
SE Labs' work has influenced product development cycles at major vendors; test findings have led to feature adjustments by companies such as Microsoft Defender, Symantec Corporation, and Trend Micro Incorporated. Coverage and commentary appear in trade publications including Wired (magazine), The Register (website), SC Magazine, and InfoWorld. Analysts at firms like Gartner, Forrester Research, and IDC reference independent testing, including SE Labs, when evaluating market dynamics for endpoint detection and response and managed detection and response offerings. Some vendors have criticized third-party testing methods historically, echoing debates also seen around AV-Comparatives and AV-Test, while customer advocacy groups such as Which? and Consumers International have welcomed transparent assessment data.
The organization operates as a private entity headquartered in London. Leadership includes professionals with prior roles in consultancies and incident response teams at firms like PwC, Deloitte, and KPMG. Funding and commercial models combine report sales, testing services for vendors, and sponsored research, following patterns similar to other independent testers such as AV-Comparatives and Virus Bulletin. SE Labs adheres to non-disclosure agreements when necessary with vendors such as Kaspersky Lab and Bitdefender, while publishing public reports for broader audiences including stakeholders in EU cybersecurity policy and procurement offices in United Kingdom and United States.