This is the third in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.
Reason #2: the Desktop Security Software Risks
The risks of placing software on the desktop are such that I will be breaking this article into two parts.
There are many advantages to putting security and anti-virus software on the desktop. They range from efficiency to money. Under previous ways of thinking if I can capture security and virus problems at the desktop I can prevent them from going any farther. That works well in a non-connected environment. In the connected environment it makes more sense to centralize the software and monitor connections in and out. Basically "firewall" all the appliances from each other.
In a previous article we discussed the security risks inherent with desktop software designed to be the protection layer between you and all those bad people out there on the Internet. Here now we will discuss some more mundane issues regarding the risks of putting security software on the desktop:
Drag
Drag steals clock-cycles from your processes so that it can run in a higher priority mode. Anti-virus software especially places a drag on your computer. Depending on your settings (and the default settings are usually very aggressive), every time you run a program or open a file, real-time file scanning takes place and your files are scanned for viruses. This slows down your processing. Accessing larger files takes longer. You can see a discernible lag time between when you start a program/open a file and when you can actually access it.
Compatibility
After the obvious issue of "drag" is compatibility. Often security and anti-virus rules get in the way of your doing business on your computer. While you may get away with using older versions of such packages as Word, Sims, Photoshop, etc. on your computer with the new XP operating system, it's unlikely your security software will be completely compatible. Why? Many packages rely on very low-level functionality to be able to do the tasks they set out to do. Anti-virus packages have to be able to operate at a level closer to the hardware than most packages. They need to do this to prevent virus software from taking precedence from them. While many packages offer backward-compatibility the opposite is not true: forward-compatibility. There are several reasons for this: a package written for Windows 98 will not anticipate all the changes to the operating system that are implemented for Windows XP. While your Win98 anti-virus program may work under XP, it won't work at its peak performance. It can't. It's just another reason for centralizing your security. By siphoning all your traffic through a security screen at your ISP, for instance, you offload the need for updates and staying up-to-date on your security software. This then becomes the job of the service provider.
Updates
Having the software on your desktop means you are responsible for maintaining that software. In the case of office productivity software or image editing software, if new versions come out with features you're not interested in, you don't update. With new viruses appearing on the landscape every day, you can't afford not to continually update your software. If you don't update for a month or two, you run severe risks of infection. You also will incur potential long update cycles as your software has to be upgraded to handle all the new threats.
This makes the desktop these days a somewhat ineffective solution. Nearly two-thirds of all the PCs that have anti-virus protection installed do not update their definitions regularly. These PCs might as well uninstall the software for all the good it's doing them.
Lost Time
As mentioned in the above discussion, you can lose considerable time if you don't update regularly. Long intervals between updates can translate into long update cycles. If you have a slow connection to a vendor, your down time is much longer as you have to wait for the files to be downloaded and then you have to wait for your software to update itself.
Solution
The better solution is to move to a centralized solution in which all the software, all the updates are the responsibility of the service provider. You pay for the service of having your email cleaned before you receive it. When email arrives at your service provider's mailbox, it is checked for malicious tendencies and stripped if bad. You notice no long waiting, no downtime, no drag, no incompatibilities.
About The Author
Tim Klemmer
CEO, OnceRed LLC
http://www.checkinmyemail.com
Tim Klemmer has spent the better part of 12 years designing and perfecting the first true patented behavior-based solution to malicious software.
Barrington South Lincoln Stretch rentals .. Lockport Chicago limo O’HareSo you've got some spyware, ad-ware, or viruses on your... Read More
Addressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More
This article describes the basic properties of color, what the... Read More
Nothing is worse than having to negotiate all kinds of... Read More
When you think of a help desk, what do you... Read More
Cookies, not the kind that Mom makes, but the computer... Read More
Computer related terminology could sometimes be daunting to newcomers. These... Read More
The registry is where the computer stores information about the... Read More
Are you thinking of buying an Apple iPod? Or have... Read More
I do a holiday letter every year and send them... Read More
JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More
All of us are familiar with the pyramids of Egypt.... Read More
Enhanced Definition Television ? also known as EDTV ? is... Read More
Confused by EDTV vs HDTV? We don't blame you. The... Read More
I am going to assume that you are running windows... Read More
1. Let your PC boot up completely before opening any... Read More
If you don't have an mp3 player, and even if... Read More
Computers are supposed to speed up our productivity?to help us... Read More
When studying for your Cisco CCNA, CCNP, or CCIE exam,... Read More
Stimulus thru Caffiene or Visual Input?It appears that the Mobi... Read More
As the web has evolved, so have the methods of... Read More
All over the world, people carry with them walkmans and... Read More
HTTP ProtocolThe web is run on port 80. You are... Read More
In the early days, Personal Digital Assistants (PDAs) were not... Read More
ComputersBusinesses and individuals alike have all grown to rely on... Read More
Downers Grove limo Chicago ..Google, in their march to stay ahead of the pack... Read More
No matter how fast your processor and regardless of how... Read More
Surf the 'Net for about 10 minutes and chances rate... Read More
Have you ever thought about building your own computer system?... Read More
Introduction In this article I will clearly spell out the... Read More
Although there are many things that can affect the performance... Read More
MP3 players are Hot! Playing music has come a long... Read More
I've worked my way from the CCNA to the CCIE,... Read More
Since the DOS days, batch files have been one of... Read More
When you turn on your computer, does it act like... Read More
It's hard enough as it is these days to get... Read More
Cameras: still known for taking pictures but assumed as digital... Read More
Cisco Certification: Taking Your First Certification ExamYou've studied hard; you've... Read More
In the 1950's and 1960's Polaroid's instant cameras were all... Read More
Most people download and save so much information on their... Read More
Good Morning Mr. Sampson. Please type in you Personal Identification... Read More
In the first part of this home lab tutorial, CCNA... Read More
Saving Lives With A Pocket PCFree medical downloads can be... Read More
System File Checker is a great utility that is typically... Read More
This is not your typical lost data story. I was... Read More
About mail-mergingMail-merging is the process of merging variable data and... Read More
I recently got an e-mail asking about virtual memory. The... Read More
Do you use Windows standard uninstall feature? How do you... Read More
You don't have to fork out $250 for a super-diggy-whizbang... Read More
Peoples' private information needs to stay private, even after it... Read More
Personal Technology |