Intrusion Defense School

Considerations for antimalware deployments

New Early antivirus products were host-based agents that used basic signature detection to scan hard drives for malicious code. Today’s antimalware is more sophisticated with enterprises operating not only within the network perimeter, but on mobile devices and in the cloud. Traditional antimalware deployments aren’t good enough anymore. You need to consider your company’s needs by user and location and protect assets accordingly. In this lesson, you’ll learn how to effectively architect antimalware solutions for your enterprise.

About the author:
Diana Kelley is a partner with Amherst, N.H.-based consulting firm SecurityCurve.

In this part:

Webcast: Beyond Antimalware

With enterprises operating not only within the network perimeter, but on mobile devices and in the cloud, traditional antimalware deployments aren’t good enough anymore. You need to consider your company’s needs by user and location and protect assets accordingly. In this expert webcast, you’ll learn how to effectively architect antimalware solutions. You’ll learn what your architectural options are for mobile devices, the perimeter and cloud and what the pros and cons are for each layer of your antimalware architecture.

Tip: Enterprise antimalware excess? Managing antimalware security products

Enterprise antimalware has a way of spreading everywhere. Get Diana Kelley's advice on managing antimalware security products efficiently.

Podcast: Key considerations when buying an antimalware product

This podcast focuses on best practices for antimalware deployments (AM) including:

  • Anitmalware for mobile devices
  • Anitmalware in the cloud
  • Compliance and regulatory conformance – do enterprises still need anitmalware?

Quiz: Architectural considerations for enterprise antimalware deployments

Test your knowledge of architectural considerations for enterprise antimalware deployments in this short quiz.

Take the quiz