Feeds

Check Point beefs up spyware defences

Behaviour blocking with a twist

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Check Point Software is to build improved spyware defences into the next version of its ZoneAlarm integrated consumer security software package. ZoneAlarm Security Suite 6, due to be released 18 July, will feature a spyware scanner and an "operating system" firewall.

Gregor Freund, chief technology officer at Check Point, and founder of Check Point's Zone Labs subsidiary, described the technology as "behaviour blocking with a twist" that added to existing network and application firewall components of the suite. By providing spyware signature updates through a service called SmartDefense Advisor Check Point aims to make behaviour blocking easier for consumers to use. The technology will eventually also make its way into Integrity, ZoneAlarm's enterprise security software client.

Spyware - invasive programs that generate pop-ups, hijack home pages, redirect searches and poison DNS files - has become a top security threat to consumers and corporates alike over the last 18 months or so. According to IDC, 67 per cent of all computers contain some form of spyware. Spyware applications secretly forward information about a user's online activities to third parties without a user's knowledge or permission.

Anti-spyware scanning software alone won't deal with the problem because any approach that "let's the bad things happen and focuses on cleaning up afterwards is going to fail," according to Freund. Removing spyware and adware from infested machines or blocking infection in the first place has become a lucrative market and Check Point is going to have plenty of competition to contend with in both the consumer and enterprise security markets. Anti-virus vendors are looking to carve out a piece of the action. Trend Micro's May acquisition of InterMute follows Computer Associates' acquisition of PestPatrol in August 2004.

Organisations facing the mounting nuisance of spyware can also choose from specialist hardware (from the likes of Blue Coat, Fortinet and others) or a managed filtering service (from ScanSafe or others). That's to say nothing of Cisco's ongoing efforts to embed anti-malware defences into networks.

In January, Microsoft released an anti-spyware software beta following its acquisition of Giant Software a month earlier. Microsoft plans to build anti-spyware technology into the next version of Internet Explorer (IE 7), which is due to begin beta testing this summer.

Zone Alarm Security Suite 6 features anti-spam software from MailFrontier and anti-virus technology from Computer Associates as well as personal firewall technology from Check Point's Zone Labs subsidiary in an integrated security suite. English language versions of the product will sell for around $69 with German, French and Spanish language versions due next month. ®

Related stories

Check Point buys Zone Labs
Check Point strengthens perimeter with Zone Labs
Trend Micro boosts anti-spyware defences with Intermute buy
Spyware fears prompt changing net habits
Anti-spam success drives malware authors downmarket
Men blamed for spyware surge
Anti-spyware market to rocket

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.