This is the third in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.
Reason #2: the Desktop Security Software Risks
The risks of placing software on the desktop are such that I will be breaking this article into two parts.
There are many advantages to putting security and anti-virus software on the desktop. They range from efficiency to money. Under previous ways of thinking if I can capture security and virus problems at the desktop I can prevent them from going any farther. That works well in a non-connected environment. In the connected environment it makes more sense to centralize the software and monitor connections in and out. Basically "firewall" all the appliances from each other.
In a previous article we discussed the security risks inherent with desktop software designed to be the protection layer between you and all those bad people out there on the Internet. Here now we will discuss some more mundane issues regarding the risks of putting security software on the desktop:
Drag
Drag steals clock-cycles from your processes so that it can run in a higher priority mode. Anti-virus software especially places a drag on your computer. Depending on your settings (and the default settings are usually very aggressive), every time you run a program or open a file, real-time file scanning takes place and your files are scanned for viruses. This slows down your processing. Accessing larger files takes longer. You can see a discernible lag time between when you start a program/open a file and when you can actually access it.
Compatibility
After the obvious issue of "drag" is compatibility. Often security and anti-virus rules get in the way of your doing business on your computer. While you may get away with using older versions of such packages as Word, Sims, Photoshop, etc. on your computer with the new XP operating system, it's unlikely your security software will be completely compatible. Why? Many packages rely on very low-level functionality to be able to do the tasks they set out to do. Anti-virus packages have to be able to operate at a level closer to the hardware than most packages. They need to do this to prevent virus software from taking precedence from them. While many packages offer backward-compatibility the opposite is not true: forward-compatibility. There are several reasons for this: a package written for Windows 98 will not anticipate all the changes to the operating system that are implemented for Windows XP. While your Win98 anti-virus program may work under XP, it won't work at its peak performance. It can't. It's just another reason for centralizing your security. By siphoning all your traffic through a security screen at your ISP, for instance, you offload the need for updates and staying up-to-date on your security software. This then becomes the job of the service provider.
Updates
Having the software on your desktop means you are responsible for maintaining that software. In the case of office productivity software or image editing software, if new versions come out with features you're not interested in, you don't update. With new viruses appearing on the landscape every day, you can't afford not to continually update your software. If you don't update for a month or two, you run severe risks of infection. You also will incur potential long update cycles as your software has to be upgraded to handle all the new threats.
This makes the desktop these days a somewhat ineffective solution. Nearly two-thirds of all the PCs that have anti-virus protection installed do not update their definitions regularly. These PCs might as well uninstall the software for all the good it's doing them.
Lost Time
As mentioned in the above discussion, you can lose considerable time if you don't update regularly. Long intervals between updates can translate into long update cycles. If you have a slow connection to a vendor, your down time is much longer as you have to wait for the files to be downloaded and then you have to wait for your software to update itself.
Solution
The better solution is to move to a centralized solution in which all the software, all the updates are the responsibility of the service provider. You pay for the service of having your email cleaned before you receive it. When email arrives at your service provider's mailbox, it is checked for malicious tendencies and stripped if bad. You notice no long waiting, no downtime, no drag, no incompatibilities.
About The Author
Tim Klemmer
CEO, OnceRed LLC
http://www.checkinmyemail.com
Tim Klemmer has spent the better part of 12 years designing and perfecting the first true patented behavior-based solution to malicious software.
Lincoln Stretch rentals Alsip ..GOT VIRUS? Your Data is NOT lost forever!In the wake... Read More
Plenty! When we made the decision to be our own... Read More
It's free, it comes with Windows and it's used by... Read More
Microsoft Business Solutions is on the way to popularize it's... Read More
Most of the web applications have a lot of images... Read More
IF WE say that it was mainly because of the... Read More
In the early days, Personal Digital Assistants (PDAs) were not... Read More
File permissions are one of the strengths that the Unix... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
Not so many years ago, homes across the country watched... Read More
Step 1:Open WinRAR and browse to the folder with your... Read More
MP3 players are everywhere! It seems that the number of... Read More
PDA Medical BenefitsIf you are concerned about your medical history,... Read More
ASR (Automated System Recovery) is a feature available on the... Read More
You have your television and home theater receiver; you just... Read More
There are plenty of articles out there about how to... Read More
We all enjoy our favorite screensavers but in the same... Read More
Computers are supposed to speed up our productivity?to help us... Read More
Apache, MysQL and PHP for Windows could be a nice... Read More
The registry is where the computer stores information about the... Read More
In this era of Internet, most people are frequent users... Read More
With a little tweaking and with proper tools, you can... Read More
System File Checker is a great utility that is typically... Read More
I do a holiday letter every year and send them... Read More
I have a love-hate relationship with my computer.In fact, often... Read More
Western Springs shuttle limo ..Your Bible At Your FingertipsIt is fairly easy to find... Read More
Stop Getting LostOne of the greatest uses for a pocket... Read More
iPod users start to get the picture and it's turning... Read More
I've worked my way from the CCNA to the CCIE,... Read More
This tip is on sharing files and folders on a... Read More
Cameras: still known for taking pictures but assumed as digital... Read More
Projectors have come a long way in the past few... Read More
In the years of the dot com boom and bust,... Read More
Since the DOS days, batch files have been one of... Read More
Most people download and save so much information on their... Read More
We have just entered the time of year that most... Read More
After another security hole recently surfaced in Microsoft's Windows operating... Read More
A Computer in Your HandCarrying around an address book and... Read More
I have a p3 500MHz PC with 128MB RAM, 10.2... Read More
1. Empty the Temp directory regularly. To do this, make... Read More
Getting started with video editing is very simple you only... Read More
With the bewildering number of digital cameras on the market,... Read More
The first step is: Start > My DocumentsSo you have... Read More
If you ask most people what frustrates them most about... Read More
Save money. Save 10-15% on utility bills per month. Work... Read More
You will need the following:1. 1.44MB FDD (floppy)2. NVFLASH utility... Read More
There have been some questions on anti-skip protection on mp3... Read More
As the owner of a Country Mall and Top Site... Read More
Surf the 'Net for about 10 minutes and chances rate... Read More
Are you thinking of buying an Apple iPod? Or have... Read More
Personal Technology |