Access "Antivirus software comparison, 2004: Not all AV products are equal"
This article is part of the June 2004 issue of Exposed: Why your AV software is failing to protect you
Your antivirus product isn't doing the job you think it is. AV is one of the most mature infosecurity technologies and the undisputed mainstay of desktop and network defense against nasty code lurking on the Internet. But, too many of us put unwavering trust in these applications to stop malware attacks. Such blind faith is misplaced, as Information Security found in its month-long test of 10 leading desktop AV products against 11 criteria. AV has barely made a dent in detecting spyware or backdoors. , We found that many AV solutions are surprisingly easy to defeat, can't detect malware using alternative attack vectors and are difficult to manage. Strikingly, the capabilities and reliability of the products varied greatly. In the two decades since the first viruses appeared, most AV vendors continue to push the same basic signature-based technology. Feature sets have been added and functionality improved, but the products haven't evolved as rapidly as the capabilities of viruses and worms. For this reason, rather than simply testing the breadth and ... Access >>>
Premium Content for Free.
Antivirus software comparison, 2004: Not all AV products are equal
Your desktop AV may be leaving you wide open to attack.
NAC best practices and technologies to meet corporate security policy
by Curtis Dalton, CISSP
New solutions help you secure endpoints
- Antivirus software comparison, 2004: Not all AV products are equal
Physical and IT Security: Overcoming Security Convergence Challenges
Physical and IT security convergence seems just one leap away...and may remain that way. Learn how to overcome security integration challenges.
Six Sigma and CMM models offer security best practices
Security can learn a lot from Six Sigma, CMM and other established business methodologies.
- Physical and IT Security: Overcoming Security Convergence Challenges
Unintentional benefits: Attackers force search for better Trojan virus protection
by Lawrence M. Walsh
Editor Lawrence M. Walsh says creative attackers are unintentionally aiding the search for better security defenses.
Firewall and system logs: Using log file analysis for defense
by Marcus Ranum
Log analysis is the most under-appreciated, unsexy aspect of infosecurity, yet Marcus Ranum says it's one of the most important.
Prevent data loss, theft with secure data outputs
by Pete Lindstrom, Contributor
To secure data outputs, some organizations are going a step further by deploying data protection systems for specific applications.
Linux malware: Challenges of the Linux worm
Should Linux users brush off concerns about malware plagues? Short answer: No. Learn more about Linux malware and the challenges posed by the Linux worm.
Internal security controls and business continuity go hand in hand
Learn the top four quality of security beliefs and see why better security means better quality.
- Unintentional benefits: Attackers force search for better Trojan virus protection by Lawrence M. Walsh
More Premium Content Accessible For Free
In this special issue, we are revealing the winners of our Security 7 awards. This is the ninth year we've handed out the Security 7 awards, which ...
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...