{"id":2531,"date":"2020-07-28T09:04:12","date_gmt":"2020-07-28T13:04:12","guid":{"rendered":"https:\/\/zzzptm.com\/wordpress\/?p=2531"},"modified":"2020-07-28T09:04:12","modified_gmt":"2020-07-28T13:04:12","slug":"security-for-all-sizes-which-antivirus-is-best","status":"publish","type":"post","link":"https:\/\/zzzptm.com\/wordpress\/?p=2531","title":{"rendered":"Security for All Sizes: Which Antivirus Is Best?"},"content":{"rendered":"\n<p>I remember the first time I saw an&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ai\">AI<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/antivirus\">antivirus<\/a>&nbsp;program. I was amazed, impressed, and sure that it would be something we&#8217;d want to use back at my day job. After the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/conference\">conference<\/a>, I leaned over the cube wall of the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/av\">AV<\/a>&nbsp;Manager and started to tell him what I saw.<\/p>\n\n\n\n<p>He smiled, kind of cut me off, and said, &#8220;I&#8217;ve heard of those guys and another&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/vendor\">vendor<\/a>&nbsp;that does a similar thing. However&#8230;&#8221; He swung his&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/monitor\">monitor<\/a>&nbsp;so I could see it. It showed his admin&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/dashboard\">dashboard<\/a>&nbsp;for AV installations. &#8220;I need one of these. I can&#8217;t have any AV&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/product\">product<\/a>&nbsp;unless I get to see an&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/enterprise\">enterprise<\/a>&nbsp;dashboard that tells me who has it installed and who doesn&#8217;t.&#8221;<\/p>\n\n\n\n<p>That was at a global megacorporation.&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/pci\">PCI<\/a>,&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/hipaa\">HIPAA<\/a>, and other&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/regulations\">regulations<\/a>&nbsp;require that any&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/pc\">PC<\/a>&nbsp;that connects or even might connect to a sensitive&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/network\">network<\/a>&nbsp;have&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/antivirus-software\">antivirus software<\/a>&nbsp;installed and running. The regulations do not specify that the antivirus actually has to work, just that it be installed and running. The primary concern in the big company is in delivering a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/report\">report<\/a>&nbsp;to an&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/auditor\">auditor<\/a>&nbsp;that shows the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/av-software\">AV software<\/a>&nbsp;is installed and running on every PC in the company.<\/p>\n\n\n\n<p>As for dealing with&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/viruses\">viruses<\/a>, that&#8217;s a simple matter.&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/download\">Download<\/a>&nbsp;the latest&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/signature\">signature<\/a>, test it against a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/development\">development<\/a>&nbsp;environment, verify that it doesn&#8217;t break production, then roll it out. While it&#8217;s true that most AV packages can&#8217;t deal with a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/zero-day\">zero-day<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/threat\">threat<\/a>, it&#8217;s also true that most&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/threats\">threats<\/a>&nbsp;are from the dim and distant past. Remember CIH? Melissa? Nimda? Well, they&#8217;re still out there. They&#8217;re out there with all of their old-school buddies from 20 years ago, and that AV program is there to keep all the known threats out of the PCs it protects.<\/p>\n\n\n\n<p>Flashy new products are nice, but the big firms need to know where they&#8217;re installed. Until the flashy new product can deliver that information, it won&#8217;t be installed. Even if the product can identify&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/virus\">virus<\/a>&nbsp;writers and have them proactively incarcerated, if the AV manager can&#8217;t show that it&#8217;s on every PC, it won&#8217;t be installed.<\/p>\n\n\n\n<p>At the other end of the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/business\">business<\/a>&nbsp;size continuum, the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/key\">key<\/a>&nbsp;factor is price. Really small firms will have each employee download a personal version of a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/free\">free<\/a>&nbsp;AV program and just hope that the Business Software Alliance never knocks on the door. Once the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/small-business\">small business<\/a>&nbsp;is big enough to be on the BSA&#8217;s&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/radar\">radar<\/a>, it&#8217;s likely that the margins there are so thin that if an AV solution isn&#8217;t free or near-free, it&#8217;s a non-starter. If the flashy new product can&#8217;t meet that price target, then the small firm is going with a near-free vendor that can&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/protect\">protect<\/a>&nbsp;against those legacy threats just as well as the flashy new product that might also be able to stop zero-day&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/exploits\">exploits<\/a>&nbsp;before they happen. The thing is, that&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/proactive\">proactive<\/a>&nbsp;stuff comes at a cost they can&#8217;t afford.<\/p>\n\n\n\n<p>The mid-sized company that&#8217;s outgrowing its near-free AV solution but still isn&#8217;t yet ready to bow down at the altar of big&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/corporate\">corporate<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/dashboards\">dashboards<\/a>&nbsp;may be the best chance for that flashy new product to find a customer. That being said, the flashy new product has an uphill fight against the name recognition of the existing major players. Who&#8217;s been fighting against all those viruses for 20 years and more? Not the Johnny-Come-Lately product.<\/p>\n\n\n\n<p>And that new AV product will also have to be sure that it never, ever, ever, never no never not ever takes down production. All those cool new algos and AI&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/learning\">learning<\/a>&nbsp;potential come up face to face with the stark reality that, every so often, a production application does stuff that&#8217;s very much like a virus.<\/p>\n\n\n\n<p>Maybe the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/developers\">developers<\/a>&nbsp;took advantage of a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/windows\">Windows<\/a>&nbsp;security hole to take care of a task. Maybe a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/developer\">developer<\/a>&nbsp;copied and pasted some evil&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/code\">code<\/a>&nbsp;into an app. These things can happen at any size of firm, and present real security issues.<\/p>\n\n\n\n<p>I recently ran into this at a mid-sized company where I noticed that there were&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/devices\">devices<\/a>&nbsp;launching brute-force&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/password\">password<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/attacks\">attacks<\/a>&nbsp;at file servers. We traced the attacks to PCs that were all in the same department. As it happened, they all used a particular application specific to their field that contained the brute-force code.The attacks continue as we wait for the vendor to issue an&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/update\">update<\/a>&nbsp;that doesn&#8217;t include that code. The&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/app\">app<\/a>&nbsp;was already white-listed with their AV program, so it didn&#8217;t get shut down, even though it was doing some horribly evil things on the network.<\/p>\n\n\n\n<p>Then there&#8217;s the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/botnet\">botnet<\/a>&nbsp;I discovered one day in the badge readers at a large corporation. Those devices had enough Windows&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/embedded\">embedded<\/a>&nbsp;in them to support the botnet, but not enough to be able to run the AV program. At least most of the company was running AV on their Windows&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/workstations\">workstations<\/a>, so they were protected from becoming part of the badge reader botnet.<\/p>\n\n\n\n<p>While the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/malware\">malware<\/a>&nbsp;threat from whitelisted apps and&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/iot-devices\">IoT devices<\/a>&nbsp;can be at any size company, there&#8217;s one particularly nasty threat that is more pervasive the smaller a firm is:&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/users\">users<\/a>&nbsp;with local admin rights.<\/p>\n\n\n\n<p>If users have local admin&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/rights\">rights<\/a>, and they typically do at the smaller firms, they can do all kinds of terrible things to their PCs, from accepting the installation of malware along with their Veeblefetzer searchbar add-on, on up to disabling their local AV program so that they can run their torrenting software without being interrupted about the malware that goes with those torrents. Large firms will also have local admin abusers, but the large firms are also more likely to be actively policing for that kind of abuse.<\/p>\n\n\n\n<p>On the whole, I think small firms have it hardest when it comes to getting an AV solution. They have to deal with tight budgets, unchecked developers, and local admin rights for all, so they&#8217;ve got the hardest battle to fight. As the firms get larger, the better they get at fighting yesterday&#8217;s wars, but remain open to tomorrow&#8217;s surprises.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I remember the first time I saw an&nbsp;AI&nbsp;antivirus&nbsp;program. I was amazed, impressed, and sure that it would be something we&#8217;d want to use back at my day job. After the&nbsp;conference, I leaned over the cube wall of the&nbsp;AV&nbsp;Manager and started to tell him what I saw. He smiled, kind of cut me off, and said, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2531","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2531"}],"version-history":[{"count":1,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2531\/revisions"}],"predecessor-version":[{"id":2532,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2531\/revisions\/2532"}],"wp:attachment":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}