Feeds

Network Associates warms to behaviour blocking

Anti-virus intrusion prevention

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Network Associates yesterday announced plans to offer intrusion prevention alongside conventional anti-virus software.

The move is something of a watershed for the AV industry with a top-tier vendor acknowledging that conventional AV scanning software alone fails to defend against fast-spreading Internet worms like Sasser and Blaster. Conventional AV technology is inherently reactive and leaves a 'Window of vulnerability' where firms can get hit even if they have the latest AV signature updates, Metwork Associates acknowledges.

Rather than looking for known malware - the approach taken with conventional AV scanners - host-based intrusion prevention firms argue that malicious code is more effectively thwarted at the desktop using various types of behaviour-blocking technologies. Network Associates technology uses a combination of behavioural rules and signatures to prevent "both known and unknown attacks against servers, databases and applications". NAI got its hands on the technolgy with the acquisition of start-up Entercept in April 2003.

In the wake of the damage caused by Sasser, influential analyst Gartner advised Windows shops to invest both in means to patch faster and in host-based intrusion prevention software for all Windows PCs and server. The advice has spurred increased interest in the nascent market, which helps explain the timing of Network Associates' announcement.

McAfee VirusScan Enterprise 8.0i will combine anti-virus, desktop firewall and host intrusion prevention features within a single security agent. Currently available in beta, VirusScan Enterprise 8.0i is slated for general availability in Q3 2004.

Nick Ray, chief executive of rival host-based intrusion prevention firm PrevX, welcomed Network Associates move into the market but argued it was simpler to introduce intrusion prevention as a separate function than as part of a security suite. ®

Related stories

Blaster rewrites Windows worm rules
Blaster beats up British business
Sasser worm creates havoc
Sasser ups cost of Windows - Gartner
NAI buys Entercept for $120m
Cisco combats network worms
SecureWave revamps alternative to desktop AV

Secure remote control for conventional and virtual desktops

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.