Feeds

The slow death of AV technology

Time to jump ship?

The Power of One eBook: Top reasons to choose HP BladeSystem

AV technology is gradually dying and being replaced by far more effective IT security technology based on whitelisting.

You could view this as an inevitable development, given the horrible inadequacies of AV technology, or you might want to pin the credit on the AVID (Anti-Virus Is Dead) campaign which has repeatedly drawn attention to the inadequacy of AV technology and championed whitelisting technology that actually works. Actually it doesn't matter much either way. It's happening.

Two trends that are in progress at the moment.

  1. The first is that major AV companies are now actively looking around for whitelisting technology to acquire, so we can expect to see some of the whitelisting start-ups get eaten. Rumour also informs me that there are some internal projects underway in some AV companies to develop whitelisting products to compete with the vendors that have such technology; SecureWave, CA, Bit9, AppSense, et al.

    In respect of this, one almost feels sorry for some of the AV vendors. The majors like Symantec, McAfee and Trend Micro have the muscle and market clout to survive and possibly even thrive in the advancing demise of the AV industry, but the smaller vendors have nowhere to go. Time to get your resume into shape if you work for an AV vendor, perhaps.

  2. New whitelisting start-ups keep appearing - not surprising really, because the technology is fast gaining traction and it was validated in a big way when CA came out with its CA HIPS product (in case you didn't know CA is, in revenue terms, the second largest IT security software vendor after Symantec).

The latest whitelisting vendor to emerge is SignaCert. I'm quite partial to this company primarily because, in discussion, its executives expressed the same fundamental view of IT security that I have. "When you get down to it, it's not about malware and hackers, it's about 'software authentication'".

SignaCert, for its part, has been collaborating with some major vendors (Intel, Sun, Juniper networks, Cordys, XenSource, PGP and many others) to assemble an "authentication database" for authenticating software. SignaCert delivers the authentication platform that complements the database. It is the first whitelisting vendor to make the leap, and think in terms of authenticating software for all platforms - not just Windows, where the major pain is experienced.

When I initially started the AVID campaign it was because, having thought about it, I concluded that AV must be a wrong idea because it didn't attempt to authenticate software, it only attempted to recognise bad stuff (it was only later that I discovered how ineffective AV technology actually is). Mention the concept "software authentication" to an AV vendor and you are likely to get a blank stare. It isn't what AV vendors do.

However, software authentication is necessary for many reasons; to prevent people from running the wrong versions of software, to prevent them loading their own favourite software without permission, to prevent people from running software for which your company has not bought a license, or to prevent them running it on a machine for which it is not licensed. Software authentication IS the issue. If you have effective software authentication, it stops malware stone dead AND it helps manage the corporate software resource in a productive way.

So there is a new AVID hero. It is called SignaCert. Now there are six whitelisting companies. By the way, I've been sent information which leads me to believe that there may be a seventh one. If it proves true, I can't say I'll be surprised. What we are watching here is a major IT security trend in motion.

Copyright © 2007, IT-Analysis.com

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.