SCF Advanced Search



  • Total Members: 13736
  • Latest: parasti
  • Total Posts: 38286
  • Total Topics: 12875
  • Online Today: 1297
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)


Author Topic: If You ONLY Deploy AntiVirus, It Will Cost You More and Make You Less Secure  (Read 1585 times)

0 Members and 1 Guest are viewing this topic.


  • SCF VIP Member
  • *****
  • Posts: 776
  • KARMA: 117
  • Gender: Male
  • Pez
If You ONLY Deploy AntiVirus, It Will Cost You More and Make You Less Secure

Everyone’s looking to shave their IT budgets, manage fewer vendors and streamline. The plethora of low cost and sometimes free AV products is an enticing option to lower the cost to secure any business. Some free antivirus programs do an acceptable job of detecting, blocking and removing certain kinds of malware, but don’t provide protection from ALL the rapidly growing threats that attack multiple system vulnerabilities. 

Recently, the data security company Imperva published a much derided test showing what most IT security experts already knew: an AV-only protection scheme is necessary but insufficient.

While traditional antivirus technology continues to hold value for consumers and enterprises, it is only one layer in what needs to be a multi-layered defense.  As such, McAfee pioneered behavioral and other “day-zero” protection technologies to protect against rapidly morphing threats that can evade traditional blacklisting.

Host Based Intrusion Prevention Systems (HIPS) and Application Control are just two examples of security technologies that McAfee has delivered to protect millions of endpoints.  For example, McAfee Application Control protects against 100% of the threats in Imperva’s tests.  McAfee has optimized the ability to respond to evolving threats and our Global Threat Intelligence (GTI) is an example.  It provides the most comprehensive view of the evolving threat landscape, correlated with threat intelligence from and across all threat vectors – file, web, message, and network –driving the transition from blacklisting to grey and white listing. While blacklisting is still a vital ingredient for protecting devices, there is only a small percent of the threats out there that are new and still plenty of old threats that infect devices.  Because of this, blacklisting will never go away.  However, what is changing is that the blacklist is living in the cloud instead of on each device.

Some great new primary research, from Aberdeen’s Derek Brink shows that AV-only group actually spends 1.5-times more, and effectively accepts 68% of its security-related risk.

larger image

Not investing in additional endpoint security solutions is actually a false economy – in reality, they are ignoring (and therefore effectively accepting) 68% of the risk and the associated costs.   Endpoint security initiatives should adopt a more comprehensive approach to protecting the organization’s platforms, networks, applications and data.  (Source: Aberdeen Group, March 2012.)

Beyond historic blacklisting, McAfee recommends that users also deploy host or network web protection, HIPS, AND good application control functionality to defeat the current generation of cybercriminals. That is why McAfee is relentless in solving the challenges of increasing threats and we do that by working to fulfill the value proposition of our Security Connected strategy– an integrated platform for security which identifies common host-network customer use cases and implements them to reduce the total cost of ownership for a complete security solution.

Orginal article: Friday, January 4, 2013 at 1:51pm by Rees Johnson
Their is two easy way to configure a system!
Every thing open and every thing closed.
Every thing else is more or less complex.

Start Turfing !,8405.msg21475.html#msg21475

Samker's Computer Forum -


With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters)

Enter your email address to receive daily email with ' - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising