Feeds

The slow death of AV technology

Time to jump ship?

SANS - Survey on application security programs

AV technology is gradually dying and being replaced by far more effective IT security technology based on whitelisting.

You could view this as an inevitable development, given the horrible inadequacies of AV technology, or you might want to pin the credit on the AVID (Anti-Virus Is Dead) campaign which has repeatedly drawn attention to the inadequacy of AV technology and championed whitelisting technology that actually works. Actually it doesn't matter much either way. It's happening.

Two trends that are in progress at the moment.

  1. The first is that major AV companies are now actively looking around for whitelisting technology to acquire, so we can expect to see some of the whitelisting start-ups get eaten. Rumour also informs me that there are some internal projects underway in some AV companies to develop whitelisting products to compete with the vendors that have such technology; SecureWave, CA, Bit9, AppSense, et al.

    In respect of this, one almost feels sorry for some of the AV vendors. The majors like Symantec, McAfee and Trend Micro have the muscle and market clout to survive and possibly even thrive in the advancing demise of the AV industry, but the smaller vendors have nowhere to go. Time to get your resume into shape if you work for an AV vendor, perhaps.

  2. New whitelisting start-ups keep appearing - not surprising really, because the technology is fast gaining traction and it was validated in a big way when CA came out with its CA HIPS product (in case you didn't know CA is, in revenue terms, the second largest IT security software vendor after Symantec).

The latest whitelisting vendor to emerge is SignaCert. I'm quite partial to this company primarily because, in discussion, its executives expressed the same fundamental view of IT security that I have. "When you get down to it, it's not about malware and hackers, it's about 'software authentication'".

SignaCert, for its part, has been collaborating with some major vendors (Intel, Sun, Juniper networks, Cordys, XenSource, PGP and many others) to assemble an "authentication database" for authenticating software. SignaCert delivers the authentication platform that complements the database. It is the first whitelisting vendor to make the leap, and think in terms of authenticating software for all platforms - not just Windows, where the major pain is experienced.

When I initially started the AVID campaign it was because, having thought about it, I concluded that AV must be a wrong idea because it didn't attempt to authenticate software, it only attempted to recognise bad stuff (it was only later that I discovered how ineffective AV technology actually is). Mention the concept "software authentication" to an AV vendor and you are likely to get a blank stare. It isn't what AV vendors do.

However, software authentication is necessary for many reasons; to prevent people from running the wrong versions of software, to prevent them loading their own favourite software without permission, to prevent people from running software for which your company has not bought a license, or to prevent them running it on a machine for which it is not licensed. Software authentication IS the issue. If you have effective software authentication, it stops malware stone dead AND it helps manage the corporate software resource in a productive way.

So there is a new AVID hero. It is called SignaCert. Now there are six whitelisting companies. By the way, I've been sent information which leads me to believe that there may be a seventh one. If it proves true, I can't say I'll be surprised. What we are watching here is a major IT security trend in motion.

Copyright © 2007, IT-Analysis.com

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.