Feeds

Network Associates warms to behaviour blocking

Anti-virus intrusion prevention

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

Network Associates yesterday announced plans to offer intrusion prevention alongside conventional anti-virus software.

The move is something of a watershed for the AV industry with a top-tier vendor acknowledging that conventional AV scanning software alone fails to defend against fast-spreading Internet worms like Sasser and Blaster. Conventional AV technology is inherently reactive and leaves a 'Window of vulnerability' where firms can get hit even if they have the latest AV signature updates, Metwork Associates acknowledges.

Rather than looking for known malware - the approach taken with conventional AV scanners - host-based intrusion prevention firms argue that malicious code is more effectively thwarted at the desktop using various types of behaviour-blocking technologies. Network Associates technology uses a combination of behavioural rules and signatures to prevent "both known and unknown attacks against servers, databases and applications". NAI got its hands on the technolgy with the acquisition of start-up Entercept in April 2003.

In the wake of the damage caused by Sasser, influential analyst Gartner advised Windows shops to invest both in means to patch faster and in host-based intrusion prevention software for all Windows PCs and server. The advice has spurred increased interest in the nascent market, which helps explain the timing of Network Associates' announcement.

McAfee VirusScan Enterprise 8.0i will combine anti-virus, desktop firewall and host intrusion prevention features within a single security agent. Currently available in beta, VirusScan Enterprise 8.0i is slated for general availability in Q3 2004.

Nick Ray, chief executive of rival host-based intrusion prevention firm PrevX, welcomed Network Associates move into the market but argued it was simpler to introduce intrusion prevention as a separate function than as part of a security suite. ®

Related stories

Blaster rewrites Windows worm rules
Blaster beats up British business
Sasser worm creates havoc
Sasser ups cost of Windows - Gartner
NAI buys Entercept for $120m
Cisco combats network worms
SecureWave revamps alternative to desktop AV

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.