This is the third in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.
Reason #2: the Desktop Security Software Risks
The risks of placing software on the desktop are such that I will be breaking this article into two parts.
There are many advantages to putting security and anti-virus software on the desktop. They range from efficiency to money. Under previous ways of thinking if I can capture security and virus problems at the desktop I can prevent them from going any farther. That works well in a non-connected environment. In the connected environment it makes more sense to centralize the software and monitor connections in and out. Basically "firewall" all the appliances from each other.
In a previous article we discussed the security risks inherent with desktop software designed to be the protection layer between you and all those bad people out there on the Internet. Here now we will discuss some more mundane issues regarding the risks of putting security software on the desktop:
Drag
Drag steals clock-cycles from your processes so that it can run in a higher priority mode. Anti-virus software especially places a drag on your computer. Depending on your settings (and the default settings are usually very aggressive), every time you run a program or open a file, real-time file scanning takes place and your files are scanned for viruses. This slows down your processing. Accessing larger files takes longer. You can see a discernible lag time between when you start a program/open a file and when you can actually access it.
Compatibility
After the obvious issue of "drag" is compatibility. Often security and anti-virus rules get in the way of your doing business on your computer. While you may get away with using older versions of such packages as Word, Sims, Photoshop, etc. on your computer with the new XP operating system, it's unlikely your security software will be completely compatible. Why? Many packages rely on very low-level functionality to be able to do the tasks they set out to do. Anti-virus packages have to be able to operate at a level closer to the hardware than most packages. They need to do this to prevent virus software from taking precedence from them. While many packages offer backward-compatibility the opposite is not true: forward-compatibility. There are several reasons for this: a package written for Windows 98 will not anticipate all the changes to the operating system that are implemented for Windows XP. While your Win98 anti-virus program may work under XP, it won't work at its peak performance. It can't. It's just another reason for centralizing your security. By siphoning all your traffic through a security screen at your ISP, for instance, you offload the need for updates and staying up-to-date on your security software. This then becomes the job of the service provider.
Updates
Having the software on your desktop means you are responsible for maintaining that software. In the case of office productivity software or image editing software, if new versions come out with features you're not interested in, you don't update. With new viruses appearing on the landscape every day, you can't afford not to continually update your software. If you don't update for a month or two, you run severe risks of infection. You also will incur potential long update cycles as your software has to be upgraded to handle all the new threats.
This makes the desktop these days a somewhat ineffective solution. Nearly two-thirds of all the PCs that have anti-virus protection installed do not update their definitions regularly. These PCs might as well uninstall the software for all the good it's doing them.
Lost Time
As mentioned in the above discussion, you can lose considerable time if you don't update regularly. Long intervals between updates can translate into long update cycles. If you have a slow connection to a vendor, your down time is much longer as you have to wait for the files to be downloaded and then you have to wait for your software to update itself.
Solution
The better solution is to move to a centralized solution in which all the software, all the updates are the responsibility of the service provider. You pay for the service of having your email cleaned before you receive it. When email arrives at your service provider's mailbox, it is checked for malicious tendencies and stripped if bad. You notice no long waiting, no downtime, no drag, no incompatibilities.
About The Author
Tim Klemmer
CEO, OnceRed LLC
http://www.checkinmyemail.com
Tim Klemmer has spent the better part of 12 years designing and perfecting the first true patented behavior-based solution to malicious software.
house refresh service Morton Grove ..Using SQL Server 2000 and above versions you can retrieve... Read More
Although there are many things that can affect the performance... Read More
We all enjoy our favorite screensavers but in the same... Read More
There are plenty of articles out there about how to... Read More
Perhaps not yet, but the handwriting might be on the... Read More
Peoples' private information needs to stay private, even after it... Read More
Yes, it's true. You may have inadvertently invited a spy... Read More
How familiar does the following sound? Your computer was working... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
Projectors have come a long way in the past few... Read More
Flow Text Around a GraphicQuestion: I have inserted a photo... Read More
Saving Lives With A Pocket PCFree medical downloads can be... Read More
Has This Ever Happened To You? OK.. it's Friday night,... Read More
The DNS (Domain Name System) servers are what your computer... Read More
In the years of the dot com boom and bust,... Read More
Confused by EDTV vs HDTV? We don't blame you. The... Read More
Cisco Certification: Taking Your First Certification ExamYou've studied hard; you've... Read More
Do you know how many fonts are currently installed on... Read More
Maybe you always wanted a feature that hasn't been available... Read More
There are many sources of heat that can raise the... Read More
This tip is on sharing files and folders on a... Read More
I am going to assume that you are running windows... Read More
Get started creating web pages using text files and HTML... Read More
Stimulus thru Caffiene or Visual Input?It appears that the Mobi... Read More
This is the third in a series of articles highlighting... Read More
cleaning service near Mundelein ..If you use a computer, you need to know more... Read More
If you're like me, you occasionally find the ubiquitous mouse... Read More
I have always been interested in computers, but in the... Read More
Cookies, not the kind that Mom makes, but the computer... Read More
The year is 1981. IBM has just released the Personal... Read More
Computer related terminology could sometimes be daunting to newcomers. These... Read More
Are you frustrated with your PC?Is it feeling sluggish or... Read More
HTTP ProtocolThe web is run on port 80. You are... Read More
Just The Facts, Ma'mPalm pilots are all the rage now.... Read More
What is a Refurbished Computer?Refurbished Computers. Remanufactured Computers. Reconditioned Computers.... Read More
Do you know how many fonts are currently installed on... Read More
I am going to assume that you are running windows... Read More
How long do you think DVDs have around? 20 years?... Read More
As the owner of a Country Mall and Top Site... Read More
The registry is where the computer stores information about the... Read More
CCNAs and CCNA candidates hear it all the time: ???Get... Read More
Maintaining your computer is extremely important ? especially if you... Read More
ASR (Automated System Recovery) is a feature available on the... Read More
Digital cameras ratings are great tools for deciding which camera... Read More
That desk in front of you and everything else around... Read More
Occupational Therapy Made EasierMedical downloads for the pda have improved... Read More
With their solid-state technology, compact size, and abundant memory, portable... Read More
Yes, it's true. You may have inadvertently invited a spy... Read More
In this era of Internet, most people are frequent users... Read More
In the early days, Personal Digital Assistants (PDAs) were not... Read More
Personal Technology |