One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 740330
Date de publication 2018-06-26 13:00:00 (vue: 2018-07-11 17:02:48)
Titre SMBs: 3 Signs It\'s Finally Time to Replace Your AntiVirus
Texte Antivirus has been a foundational element of protecting endpoints at small and medium-sized businesses for going on three decades. During that time, the threat landscape has changed dramatically. Thanks to the proliferation and commodification of sophisticated hacking tools, SMBs are now seeing the types of attacks formerly leveled almost exclusively at governments and large enterprises. These new attacks — and the inability of antivirus to block them — have eroded organizations’ trust in their existing solutions. According to a recent survey conducted by the Ponemon Institute, less than a third believe their antivirus can stop the threats they are seeing. As a result, organizations are exploring their options. One third of respondents to the Ponemon survey reported they had replaced their antivirus with a competitor’s offering or a next-generation endpoint protection solution in the past 12 months. 50 percent confirmed they had kept their antivirus but supplemented it with additional solutions designed to provide better protection and/or detection and response capabilities. While maintaining legacy antivirus alongside new protection may work for larger companies that have the budget and staff to take on and manage multiple solutions, it may not always be an effective option for small or medium-sized businesses. How do you know when it is finally time to cut your legacy antivirus loose? Here are three key signs to consider: 1) There are attacks your antivirus is not blocking At its core, antivirus has one job to do: keep endpoints from being infected or compromised. Unfortunately, its primary method of doing that job — scanning static files to determine if they are potentially malicious — is extremely narrow and limited considering the variety of attack techniques we’re seeing today. As Gartner points out, “Endpoint protection platforms that rely solely on signature-based malware detection are not completely effective when it comes to repacked or new malware until new signatures are distributed.... Organizations...are essentially unprotected until all their endpoints are updated with the latest signature.” Even next-generation antivirus solutions that supplement signature matching with machine learning are still limited to scanning, analyzing, and quarantining static files written to disk. Many of today’s attacks have evolved to exploit that limitation, adopting fileless delivery techniques, instead. These are no longer theoretical threats. According to Ponemon, 77% of attacks that successfully compromised organizations in 2017 utilized fileless techniques. The inability to block today’s evasive and fileless threats is one of the top reasons organizations cite for replacing their antivirus. 2) Your Antivirus is slowing you down When antivirus isn’t doing its job that’s bad enough, but it can often make it harder for admins and users to do their jobs. Constant updates and file scanning are notorious antivirus pain points. In fact, when Barkly asked IT and security pros what their challenges with their current endpoint protection were, “slows down user machines” was t
Envoyé Oui
Condensat “endpoint “slows  to 2017 425 about according additional adjustments admins admit adopting aggressive alert alerts all allow almost alongside also always analyze analyzing and/or annually another answer antivirus anything are ask asked attack attacks attention average away bad barkly based become been before being believe benign better beyond block blocking blood boy breaking budget business businesses but can capabilities case cause caution challenges challenging changed cite come comes comfort commodification common companies competitor’s completely compromised conducted confirmed consider: considering constant consuming core costing created cried criteria cross current cut dangerous decades decision dedicated delivery designed detection determine disk disproportionate disruptive distributed do: documents doing don’t down downtime dramatically due during easier easy effect effective element encounter endpoint endpoints enough enterprises equal eroded err essentially evade evaluation evasive even every evolve evolved example exclusively executables executive’s existing exploit exploring extremely facing fact false fatigue file fileless files finally find flagging formerly foundational from full gaps gartner general generation gets going governments grabbers growing guide hacking had hand harder has have haven’t help here high hours how however identify ignoring impact improving inability increasingly infected instead institute inundating investigating isn’t issues it’s its job jobs keep kept key know lags landscape large larger latest learning legacy less leveled life limitation limited line longer looking loose lost lower machine machines” maintaining make makes making malicious malware manage many marketplace matching may medium method million model models months more move moving multiple narrow never new next not notorious now number offering office often one only option options ordinary organization organizations organizations’ out outside owe pain past percent perfect performance perspective platforms point points ponemon positives potentially prediction pressure primary problem problematic productivity products proliferation pros protecting protection provide pumping quarantining questions quick quickly reasons recent reliance rely repacked replace replaced replacing reported resigned respondents responding response result right safe scanning scripts security see seeing seen sense sets settle side sign signature signatures signs sized slowing small smbs smbs: solely solution solutions sometimes sophisticated sorry staff static stop strict strongest study successfully supplement supplemented survey suspicious switch take task teams techniques ten tendency terms than thanks that’s them theoretical these they’re third threat threats three time today today’s tolerance tolerate tools top trust turn types typically unfortunately unprotected until updated updates user users utilized valuable variety vendors volumes waste wasting waves we’re week what what’s when whether whitelisting who wider will wolf” work written your yourself zone
Tags Malware Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: