Feeds

Anti-virus becoming less important than content control

Bosses want to control staff

  • alert
  • submit to reddit

The smart choice: opportunity from uncertainty

By 2007 firms will spend more on content filtering and encryption technology than they do on anti-virus software according to a report by industry analysts Frost & Sullivan released this week.

According to the analysts, malicious code monitoring will experience high growth over the forecast period, but will become subsumed into other technologies. This is an admittedly tricky process because of the difficulty of integrating anti-virus and encryption technologies.

Frost & Sullivan forecasts that total sales in the European Internet content security market are expected to grow from $524.6 million in 2000 to $3.13 billion in 2007, but the portion of this represented by anti-virus products will diminish from 80 per cent to 38.5 per cent in the future.

The growth of content filtering will be driven by companies increased desire to control their employees' use of email and the Internet.

Tom Fawcett, a security analyst at Frost & Sullivan, said that firms are prepared to spend more on content filtering to avoid becoming exposed to legal risks, from legislation like the Data Protection Act and the RIP Act, and to control worker productivity. Growth in sales of content encryption products will also see a huge upswing due to the introduction of data protection legislation, pushing sales from $38 million to $1.36 billion by 2007.

Historically sales of anti-virus software has been stimulated by the outbreak of viruses, such as Melissa and the Love Bug. Fawcett said, at least within corporates, the effect of such security scares will become less important on overall spending in future, because anti-virus protection is a done deal.

We're far from sure about this one because we regularly hear have firms that have fallen victim to malicious code because of lack of adequate antivirus protection. If it isn't Hewlett-Packard distributing virus-infected drivers, then it's employment agency Manpower's email system been swamped by Melissa.

Also if most people were adequately protected we wouldn't see the continuous spread of old infections, like Kakworm. Some estimates, such as a study by securityportal.com available here, suggest that users can take two years or more to update their antivirus programs and apply patches to fix program vulnerabilities.

Graham Cluley, of Sophos, agreed that home users are more "lackadaisical" than corporates and often have anti-virus software that is out of date, so that people need to take personal responsibility over the issue.

He conceded that vendors need to do more on the issue both by designing software that makes it more obvious to users if protection is not up to date and releasing tools that make it easier to update remote workstation and laptops, which may be only infrequently connected to corporate networks.

Michael Kalinichenko, technical director of Russian antivirus firm Kaspersky Labs, said the problem is "users don't think about the necessity of upgrading their antivirus software until the moment of infection." ®

Related Story

Encryption vs anti-virus

Securing Web Applications Made Simple and Scalable

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.