This is the third in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.
Reason #2: the Desktop Security Software Risks
The risks of placing software on the desktop are such that I will be breaking this article into two parts.
There are many advantages to putting security and anti-virus software on the desktop. They range from efficiency to money. Under previous ways of thinking if I can capture security and virus problems at the desktop I can prevent them from going any farther. That works well in a non-connected environment. In the connected environment it makes more sense to centralize the software and monitor connections in and out. Basically "firewall" all the appliances from each other.
In a previous article we discussed the security risks inherent with desktop software designed to be the protection layer between you and all those bad people out there on the Internet. Here now we will discuss some more mundane issues regarding the risks of putting security software on the desktop:
Drag
Drag steals clock-cycles from your processes so that it can run in a higher priority mode. Anti-virus software especially places a drag on your computer. Depending on your settings (and the default settings are usually very aggressive), every time you run a program or open a file, real-time file scanning takes place and your files are scanned for viruses. This slows down your processing. Accessing larger files takes longer. You can see a discernible lag time between when you start a program/open a file and when you can actually access it.
Compatibility
After the obvious issue of "drag" is compatibility. Often security and anti-virus rules get in the way of your doing business on your computer. While you may get away with using older versions of such packages as Word, Sims, Photoshop, etc. on your computer with the new XP operating system, it's unlikely your security software will be completely compatible. Why? Many packages rely on very low-level functionality to be able to do the tasks they set out to do. Anti-virus packages have to be able to operate at a level closer to the hardware than most packages. They need to do this to prevent virus software from taking precedence from them. While many packages offer backward-compatibility the opposite is not true: forward-compatibility. There are several reasons for this: a package written for Windows 98 will not anticipate all the changes to the operating system that are implemented for Windows XP. While your Win98 anti-virus program may work under XP, it won't work at its peak performance. It can't. It's just another reason for centralizing your security. By siphoning all your traffic through a security screen at your ISP, for instance, you offload the need for updates and staying up-to-date on your security software. This then becomes the job of the service provider.
Updates
Having the software on your desktop means you are responsible for maintaining that software. In the case of office productivity software or image editing software, if new versions come out with features you're not interested in, you don't update. With new viruses appearing on the landscape every day, you can't afford not to continually update your software. If you don't update for a month or two, you run severe risks of infection. You also will incur potential long update cycles as your software has to be upgraded to handle all the new threats.
This makes the desktop these days a somewhat ineffective solution. Nearly two-thirds of all the PCs that have anti-virus protection installed do not update their definitions regularly. These PCs might as well uninstall the software for all the good it's doing them.
Lost Time
As mentioned in the above discussion, you can lose considerable time if you don't update regularly. Long intervals between updates can translate into long update cycles. If you have a slow connection to a vendor, your down time is much longer as you have to wait for the files to be downloaded and then you have to wait for your software to update itself.
Solution
The better solution is to move to a centralized solution in which all the software, all the updates are the responsibility of the service provider. You pay for the service of having your email cleaned before you receive it. When email arrives at your service provider's mailbox, it is checked for malicious tendencies and stripped if bad. You notice no long waiting, no downtime, no drag, no incompatibilities.
About The Author
Tim Klemmer
CEO, OnceRed LLC
http://www.checkinmyemail.com
Tim Klemmer has spent the better part of 12 years designing and perfecting the first true patented behavior-based solution to malicious software.
ASR (Automated System Recovery) is a feature available on the... Read More
1. Empty the Temp directory regularly. To do this, make... Read More
Maybe you always wanted a feature that hasn't been available... Read More
System File Checker is a great utility that is typically... Read More
For six years, my Samsung PC 13.8 inch SyncMaster conventional... Read More
Good Morning Mr. Sampson. Please type in you Personal Identification... Read More
Have you ever tried to remove Spyware off your PC... Read More
Many computer users are worried about their computer's performance. After... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
For many people the computer industry is a seeming unsolvable... Read More
When studying for your Cisco CCNA, CCNP, or CCIE exam,... Read More
In the years of the dot com boom and bust,... Read More
When you turn on your computer, does it act like... Read More
Projectors have come a long way in the past few... Read More
I do a holiday letter every year and send them... Read More
There have been some questions on anti-skip protection on mp3... Read More
The basic language of the internet is html. If you... Read More
When browsing the internet you are likely to come across... Read More
It seems like fast never quite rates fast enough.No matter... Read More
HTTP ProtocolThe web is run on port 80. You are... Read More
No matter how fast your processor and regardless of how... Read More
As the owner of a Country Mall and Top Site... Read More
In the first part of this home lab tutorial, CCNA... Read More
Microsoft Certifications are one of the most widely acclaimed, pursued,... Read More
With a little tweaking and with proper tools, you can... Read More
The Internet is an awesome tool, but be careful and... Read More
So I'll start from the very beginning.One day I was... Read More
Just The Facts, Ma'mPalm pilots are all the rage now.... Read More
In the 1950's and 1960's Polaroid's instant cameras were all... Read More
In this era of Internet, most people are frequent users... Read More
Getting started with video editing is very simple you only... Read More
How can you compare mp3 players to be sure you're... Read More
By using your computer today you can find a lot... Read More
A friend told me: "My computer startup seems to be... Read More
There are soooo many choices. With all the styles and... Read More
A Computer in Your HandCarrying around an address book and... Read More
1. Empty the Temp directory regularly. To do this, make... Read More
In my humble opinion nothing makes a long trip easier... Read More
On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F... Read More
The basic language of the internet is html. If you... Read More
The battle is heating up for market share, home movie... Read More
Your Bible At Your FingertipsIt is fairly easy to find... Read More
So you got yourself a digital camcorder. If you want... Read More
I recently got an e-mail asking about virtual memory. The... Read More
Confused by EDTV vs HDTV? We don't blame you. The... Read More
It seems like fast never quite rates fast enough.No matter... Read More
Tip #1 -- Rebates: A rebate is not always a... Read More
Maybe you always wanted a feature that hasn't been available... Read More
IntroOne of the big advantages of PCs over earlier types... Read More
Below you will find some useful information and comments about... Read More
This is not your typical lost data story. I was... Read More
What led them to this choice, as all four studios... Read More
First things first, what is Firefox? Well, it's a browser.... Read More
Viruses, software failures, power failures, human errors, hard drive failures... Read More
Lost & Found for the 21st CenturyIn today's hectic world... Read More
Are you thinking of buying an Apple iPod? Or have... Read More
Sometimes your PC will start acting strange for no apparent... Read More
Each of the items in the checklist below is part... Read More
Simone is exasperated. She has to work on her university... Read More
Having two operating systems is not as difficult as many... Read More
Buying Your PCBuying a PC that's right for you and... Read More
The technological horizon has always got something new to offer,... Read More
Your first step in removing dangerous infections from your computer... Read More
HTTP ProtocolThe web is run on port 80. You are... Read More
Maintaining your computer is extremely important ? especially if you... Read More
As the owner of a Country Mall and Top Site... Read More
Personal Technology |