Feeds

Network Associates warms to behaviour blocking

Anti-virus intrusion prevention

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Network Associates yesterday announced plans to offer intrusion prevention alongside conventional anti-virus software.

The move is something of a watershed for the AV industry with a top-tier vendor acknowledging that conventional AV scanning software alone fails to defend against fast-spreading Internet worms like Sasser and Blaster. Conventional AV technology is inherently reactive and leaves a 'Window of vulnerability' where firms can get hit even if they have the latest AV signature updates, Metwork Associates acknowledges.

Rather than looking for known malware - the approach taken with conventional AV scanners - host-based intrusion prevention firms argue that malicious code is more effectively thwarted at the desktop using various types of behaviour-blocking technologies. Network Associates technology uses a combination of behavioural rules and signatures to prevent "both known and unknown attacks against servers, databases and applications". NAI got its hands on the technolgy with the acquisition of start-up Entercept in April 2003.

In the wake of the damage caused by Sasser, influential analyst Gartner advised Windows shops to invest both in means to patch faster and in host-based intrusion prevention software for all Windows PCs and server. The advice has spurred increased interest in the nascent market, which helps explain the timing of Network Associates' announcement.

McAfee VirusScan Enterprise 8.0i will combine anti-virus, desktop firewall and host intrusion prevention features within a single security agent. Currently available in beta, VirusScan Enterprise 8.0i is slated for general availability in Q3 2004.

Nick Ray, chief executive of rival host-based intrusion prevention firm PrevX, welcomed Network Associates move into the market but argued it was simpler to introduce intrusion prevention as a separate function than as part of a security suite. ®

Related stories

Blaster rewrites Windows worm rules
Blaster beats up British business
Sasser worm creates havoc
Sasser ups cost of Windows - Gartner
NAI buys Entercept for $120m
Cisco combats network worms
SecureWave revamps alternative to desktop AV

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.