Lower IT Costs through Better Anti-Virus Management
|
|
|
- Justina Davis
- 9 years ago
- Views:
Transcription
1 Lower IT Costs through Better Anti-Virus Management
2 Table of Contents Executive summary...2 The escalating virus problem...3 Traditional anti-virus software architecture...4 The scanning application and the scanning engine...4 Drawbacks to the traditional architecture...5 AV vendor strategies to counteract product drawbacks...6 NAVEX : a unique technology in Norton AntiVirus products...7 Support for all Norton AntiVirus products and platforms...7 Consistent protection across the enterprise...8 No workstation or server downtime...9 Easy distribution...9 Virus eradication scenarios...10 Virus eradication: the traditional AV software solution...12 Virus eradication: the NAVEX solution...13 Cost scenarios: distributing new anti-virus protection...14 Updating a typical anti-virus program...14 Updating Norton AntiVirus...16 Summary...17 Note to Microsoft Office 2000 purchasers...17 Conclusion...18 About Symantec...18 Appendix A: New types of virus threats
3 Executive summary As a member of the IT community, you face challenges every day in keeping servers and workstations up and running. These challenges are complicated by the demands of an increasingly complex IT environment, limited IT resources, and often the requirements of a Service Level Agreement as well. Yet the failure to meet these challenges can result in decreased IT credibility, unanticipated organizational changes, outsourcing of IT functions, and diminished resource allocations all of which make it even harder for you to provide excellent service in the future. Computer viruses are among the most frustrating challenges faced by IT organizations today. They rob workers of productivity, divert IT personnel from more strategic corporate concerns, and can even jeopardize your company s information security. Yet there is no way you can keep every virus out of your company s computers. Employees unthinkingly launch executable attachments that contain them. Newsreader programs pick up viruses attached to Usenet postings. Traveling employees bring them in on laptops after visits to customer sites. Each time a workstation or server has problems and IT resources must be redirected to fix those problems, you incur additional costs, spend extra time, and your IT group s credibility slips just a little bit more. IT organizations therefore need strategies and robust tools to deal with the growing virus problem. Even if you already have a strong anti-virus (AV) product, many new viruses are so complex that simply issuing new virus definitions for them isn t sufficient. These new classes of viruses require either patches or whole new revisions of the AV software. With most AV software that means updating and producing an in-line for the entire program, because the scanning engine and the scanning application are inextricably linked together. Symantec realized that a faster, better, and less expensive solution was required to meet the needs of our customers. That s why our Norton AntiVirus software features Norton AntiVirus Extension (NAVEX ) technology. This modular virus-scanning engine lets the engineers in the Symantec AntiVirus Research Center (SARC) quickly update and redistribute the relevant elements of Norton AntiVirus software efficiently and effectively. You not only get virus fixes faster, you get them in a form that s smaller and easier to distribute to all the workstations and servers you support. NAVEX technology is integrated into all Norton AntiVirus products. NAVEX enables SARC to seamlessly update the scanning engine during normal virus definition updates. It s the only solution of its kind available to users of AV software today. This white paper describes the current computer virus situation, how most AV vendors are dealing with it, and how Norton AntiVirus products with their NAVEX technology provide a faster, simpler, and significantly more cost-effective way to keep all your computers protected from viruses. 2
4 The escalating virus problem Initially there were only a few computer viruses, so programmers of anti-virus products could spend a significant amount of time analyzing each new virus that was discovered, building a customized solution for it into their products, and re-releasing their programs. However, as viruses became more prevalent, it was no longer practical to create a new version of an AV product in response to each new virus. Thus the next step was for AV vendors to create engines that could look for a virus s fingerprint. A fingerprint is a unique sequence of bytes known to be contained in a given virus. This new approach allowed AV researchers to simply add new fingerprints to the existing database used by their product when new viruses were discovered. This technique made product development faster and easier, reduced the amount of data that needed to be sent out to customers (a database update instead of a whole new software release), and eliminated the need to build a new product from scratch every time a new virus was discovered. Unfortunately, virus writers are motivated to write code that s hard to detect and/or repair. So over the years, whole new classes of viruses emerged that were able to evade the traditional detection-and-repair algorithms of AV programs. Adding traditional fingerprints was useless in treating these viruses; new technology had to be constructed to eliminate them. Viruses that the technology of the time couldn t handle included unusual encryption routines for hard drives (such as the One_Half virus) and attempts to conceal viral routines in memory (such as the Stealth virus). These types of viruses could necessitate a complete change in a program s AV engine. In other words, AV vendors were back to the original problem of having to spend a lot of time developing new versions of their products to eradicate the new threats. Special case viruses that have required new AV technology to eradicate. Boot viruses Polymorphic viruses Cluster viruses 32-bit Windows viruses Variable-entry viruses Microsoft Office 2000 viruses Resident viruses Access viruses.hlp file viruses Microsoft Excel viruses Windows 3.1 viruses PowerPoint viruses Microsoft Office 97 viruses Device driver viruses Stealth viruses Microsoft Word viruses VBScript viruses 3
5 Today, there are even more viruses have been developed (well over 40,000 today) and more people using AV programs. These factors mean that troublesome viruses are more common and, at the same time, it s even more costly to keep all of a company s computers updated effectively. The cost of building, testing, and manufacturing new products is high for AV developers, and the cost and logistical hassle of continually reinstalling, testing, and distributing the AV software is high for customers. IT organizations end up spending valuable resources on this constant upgrading, and everyone from upper management to end users may get the impression that IT is not really on top of the virus situation if they keep having to install new AV software. What are AV vendors doing about this frustrating situation? Traditional anti-virus software architecture In order to understand why the Symantec Norton AntiVirus solutions are so powerful, it s helpful to first consider the fundamental design of AV programs and how other vendors are dealing with complex viruses. The scanning application and the scanning engine The typical AV program comprises two major components: the scanning application and the scanning engine. The scanning application provides a user interface, alert functions, and logging mechanisms. The application determines which files to scan and how to react when a virus is found. However, it knows absolutely nothing about computer viruses. Every time it scans a file or a floppy disk, it calls upon the scanning engine to detect computer viruses in the designated location. If the scanning engine locates a virus, it reports back to the scanning application. The scanning application then informs the user of the infection and prompts the user to repair the file. If the user chooses to do so, the scanning application again calls upon the scanning engine to repair the infected file or disk. Figure 1: How the scanning engine and scanning software work together 4
6 The scanning engine comprises dozens of complex searching algorithms along with CPU emulators and elaborate program logic. In contrast to the scanning application, the engine knows nothing about user interfaces, which files to scan, or what to tell the user when it finds a virus. It only knows how to detect and repair viruses. It simply examines the file or disk the scanning application directs it to, and determines whether there are any viruses present. The obstacles to successful enterprise-wide AV protection are numerous, and virus eradication is time-consuming and expensive. Typically, scanning engines work by scanning each file or disk for thousands of virus fingerprints. These fingerprints are stored in the virus definition data files that users around the world download each week when they obtain their virus software updates. In all AV programs except the Norton AntiVirus family, the scanning application and the scanning engine are fused into one inseparable component. Drawbacks to the traditional AV architecture The inflexibility of traditional AV architecture, with its combined scanning application and scanning engine, becomes apparent when an IT organization is faced with a complex new virus. The obstacles to successful enterprise-wide AV protection are numerous, and virus eradication is time-consuming and expensive. Some of the consequences in applying typical AV programs to special case viruses are: A new version of the AV product must be released to eradicate a special case virus. When a virus is discovered that cannot be handled by a simple fingerprint update, the entire AV program must be updated and reinstalled. Even if no changes are required to the scanning application itself, changes to the scanning engine require new deployment of the entire product. The AV software on each supported platform must be updated to include the new scanning engine logic. And each of these new product in-lines must be deployed by the IT organization. Platform releases are staggered over time, leaving an IT organization with inconsistent protection across desktops, servers, and gateways until all the platforms are updated. Producing new code for each AV platform is timeintensive and costly, and forces the typical AV vendor to develop and deploy their full spectrum of product support over a period of months. Every AV installation requires IT time, money, and resources. End user productivity continues to be affected until complete AV protection is achieved across the enterprise. 5
7 AV vendor strategies to counteract product drawbacks The costs to update and deploy comprehensive AV protection are high. To lessen expenses to themselves and to their customers AV vendors have tried to implement various alternative strategies. Selective virus protection One vendor strategy to reduce AV costs is to select only certain classes of viruses to eradicate. Sometimes this choice is made because creating a robust solution is very difficult; other times it results from the vendor s inability to integrate a solution cleanly and quickly. The major drawback in this cost-cutting strategy is the viruses that are not addressed, and leaving the customer open to infection. Releasing temporary stand-alone tools Another cost-cutting strategy is to build a stand-alone tool to deal with each new class of virus, distribute that tool to customers, and then integrate the new capability into the main program later. This is a stopgap solution that addresses immediate virus threats, but prolongs distribution and administration for IT. Stand-alone tools are not platform-independent. They are usually command-line utilities written only for DOS. End users must be trained to use them, and must remember to use them regularly in addition to their normal AV software to scan files and attachments. When the AV vendor has eventually integrated and tested this new technology on all its AV platforms, customers must upgrade all their workstations and servers again to take advantage of the new product. Grouping solutions together in large releases This final cost-cutting strategy is a compromise position between the previous two choices. Here, the AV vendor waits (potentially months) until several new complex viruses are discovered and then updates the AV product line all at once to handle the latest set of virus threats. This method reduces IT administration and deployment time, but leaves the enterprise without updated AV protection for a period of time. The length of this unprotected period can vary, but AV vendors often need six months or more to update an entire line of AV products across all platforms perhaps first the Windows 32-bit scanner, then the NLM, then the NT server product, and finally the gateway products. So even after the first new products have been released, many other computers in customers companies can remain unprotected. As we have seen, the standard architecture of AV products can cause serious delays, expenses, and loss of productivity for the companies who use them. Businesses need a new anti-virus architecture that can be modified, distributed, and installed quickly and cost-effectively when new classes of viruses are discovered. 6
8 NAVEX : A unique technology in Norton AntiVirus products Symantec looked at the drawbacks of the traditional AV software architecture and the ineffective solutions that it pressures vendors into making and realized that a new design was needed to better serve customers. Abnormal viruses have become the norm. Unless detection and repair for complex viruses can be implemented with the same ease as the fingerprinting technology of the past, creating and maintaining a robust AV solution becomes impossible. Therefore, powerful new detection and repair strategies must become part of the normal virus definition update....symantec can quickly compile a single set of engine source code for every computer platform supported by Norton AntiVirus, protecting your entire enterprise at once. The result of our research was Norton AntiVirus Extension (NAVEX) technology, which separates the scanning engine from the scanning application. The scanning engine can now be updated on its own, improved on its own, and redistributed as part of the standard Norton AntiVirus virus definitions through all available update methods. NAVEX enables Symantec to provide customers with compact, easy-todistribute, easy-to-install updates to all our Norton AntiVirus products. Support for all Norton AntiVirus products and platforms The NAVEX engine s source code is platform-independent. In response to a complex new virus, or new classes of viruses, (such as Office 2000 viruses) Symantec can quickly compile a single set of engine source code for every computer platform supported by Norton AntiVirus, protecting your entire enterprise at once. All Norton AntiVirus products on all platforms support NAVEX. That includes all on-demand components, real-time components, background scanners, server products, gateway products, and groupware products. When your enterprise upgrades to the latest definitions, your desktop systems, Windows NT servers, and NLM will all have the latest engines and databases, and therefore the latest protection. 7
9 Consistent protection across the enterprise Each update of the NAVEX engine is generated from one set of source code. That means SARC engineers only need to modify the program logic once in order to properly update the scanning engines for all Norton AntiVirus products for both real-time and on-demand scanning functions. This single code-base approach gives you consistent AV protection across your entire company. Figure 2: How one set of Norton AntiVirus source codes deploys to protect the entire enterprise. 8
10 No workstation or server downtime All Norton AntiVirus products can be upgraded with new NAVEX engines without having to reboot the computer or even shut down the AV scanner. There s no need to take down your file servers, groupware servers, or users desktop systems, so you get updated virus protection without lost productivity. Easy distribution The modular Norton AntiVirus architecture enables Symantec to send out compact updates to the NAVEX engine instead of the full software updates required by other AV products. This approach makes it far easier for you to get updates from Symantec and then distribute them to your staff and end users. Figure 3: Updating with Symantec and NAVEX vs. updating with other AV vendors Here are three easy ways you can get virus updates from Symantec: LiveUpdate sessions, in which the Norton AntiVirus software dials in to a Symantec server to download the latest updates to virus definitions. Downloads from the Symantec web site Scan and Deliver responses. Scan and Deliver is a feature of Norton AntiVirus that s newly detected virus strains to the Symantec AntiVirus Research Center for identification. (To protect the privacy of your company s documents, only the virus is sent, not the entire infected file.) SARC researchers can then respond via with a new virus definition to treat the infection. If necessary, the new virus definition can include a new NAVEX engine. Because virus definition updates containing new NAVEX engines are so small, you can use your choice of file and web servers, attachments, and so on to distribute the updates to your IT staff and end users. When users receive an update, virtually a single click lets them incorporate it into Norton AntiVirus. They never have to install and learn a new stand-alone tool in order to deal with a specific new virus. 9
11 Virus Eradication Scenarios Virus authors revel in their attempts to confound AV researchers. And while most viruses use the same techniques to spread, some viruses break the mold. There are also special case viruses that use common techniques to spread but have some sort of nasty side effect that can t be undone without modifying the scanning engine. Virus eradication: the traditional AV software solution This section describes two scenarios: how the vendor of a typical AV program would deal with a special-case virus, and how Symantec, with its unique NAVEX technology, would deal with it. Figure 5: the 6-month virus update solution 10
12 Virus eradication: the NAVEX solution Figure 6: the 2-day Norton AntiVirus update solution 11
13 Virus eradication: the traditional AV software solution Virus eradication: The traditional AV software solution The first signs of trouble. An employee s workstation crashes over and over. She calls the company s IT help desk. Escalating the problem. Several hours later, an IT representative arrives. He notices that a number of executable files appear to be corrupted and begins to suspect a computer virus, so he sends the files to the company s AV vendor. A new virus is discovered. The AV vendor s researchers analyze the files and realize they re dealing with a new virus that s too different for their existing AV product to detect or repair. A stopgap solution. The AV engineers realize that they cannot quickly update their main product, so they create a temporary DOS-based stand-alone program to deal with this virus and send it to the IT director at the client company. The workstation cure is distributed. The IT director distributes the tool to her staff so that they can clean up the infected workstations. Two days after the initial outbreak, the employees affected by the problem are finally able to work again. More infections throughout the enterprise. In the meantime, IT detects the virus the company s file and servers; it has spread and reinfected some workstations. The AV vendor promises a new version of workstation software in about a month, and the server version in several more months. Manual labor. IT personnel fan out to scan all the local site s file and servers manually, hand copies of the disk to all infected workstation users, and send copies of the program to all of their company s other sites. New workstation AV software. One month later, the AV vendor ships an in-line update for the desktop version of their AV product. New server AV software. Several months later, the AV company ships its server product to the customer. More than half a year after the new virus was discovered, the situation is finally under control. At least, until the next unusual virus appears Summary This scenario is typical of virtually all AV companies and their clients. It took a month for the AV vendor to provide a software update just for workstations months more for servers. Meanwhile, in order to protect users against this virus, the IT staff needed to manually scan dozens or even hundreds of machines, then later reinstall AV software on thousands of machines. Because the original solution was not part of the normal AV program, the virus was able to spread again when it was not completely eradicated or was reintroduced into the enterprise. Unfortunately, this scenario happens frequently in many corporations around the world. Companies may lack protection against key viruses for months at a time. Employees must manually scan files with special purpose tools, losing productive time from their work schedules. Administrators must sift through servers to track down and eradicate infections. IT personnel are forced to spend time dealing with virus eradication instead of working on strategic company IT plans. Today s enterprises simply can t afford to waste the time of their IT staff and general employees in this way. 12
14 Virus eradication: the NAVEX solution Virus eradication: The NAVEX solution The first signs of trouble. An employee s workstation crashes over and over. She calls the company s IT help desk. Escalating the problem. Several hours later, an IT representative arrives. He notices that a number of executable files appear to be corrupted and begins to suspect a computer virus. He sends the files to the Symantec AntiVirus Research Center (SARC) using the efficient Scan and Deliver feature built into Norton AntiVirus. A new virus is discovered. SARC researchers analyze the files and realize they re dealing with a new virus that s too different for the existing version of Norton AntiVirus to detect or repair. SARC promises to deliver a solution within the next 24 hours. More infections throughout the enterprise. In the meantime, IT detects the virus in the company s file and servers. SARC promises a comprehensive solution for all supported platforms within the next 24 hours. Updating Norton AntiVirus, with no stopgap solution needed. SARC engineers update the NAVEX engine to deal with the new virus. Because the full Norton AntiVirus engine can be modified so easily, there s no need to settle for a stopgap stand-alone solution. When the new virus definition set is ready, SARC sends to the IT director at the client company. The cure is distributed. The IT director gives the Norton AntiVirus update to her top engineer. He uses the company s standard distribution tools to disseminate the new virus definitions to all workstations, file servers, servers, and gateways. He then initiates virus scans across the enterprise. He also sends the update to all other corporate sites for deployment. Two days after the initial outbreak, the employees affected by the problem are able to get back to work and their workstations and all other computers in the company are protected from future infections by this virus. Summary That s how Symantec responds to a difficult new computer virus: quickly and effectively. In both scenarios, it took roughly the same amount of time for the AV engineers to develop a solution for the virus. However, the other AV vendor had to create a temporary stand-alone tool one that required manual intervention at every step and wasn t integrated with their regular AV software. By the time the vendor updated the AV offering on each and every platform, the customer s IT staff and other employees had lost hundreds of hours of work time. By contrast, because of Symantec s NAVEX technology, the Symantec customers got a comprehensive, integrated, multiplatform solution within two days. 13
15 The costs of distributing new anti-virus protection The following scenarios illustrate the costs of updating Norton AntiVirus, with its innovative NAVEX technology, compared with updating a competing AV product to handle the same virus. In both instances, we ll assume that: The company has 5,000 computers: 300 are Windows NT 4.0 servers and 4,700 are Windows 95 and Windows NT clients. The company s network administrator makes $60,000 a year, an approximate hourly rate of $41.00 including benefits.* We ll make the same salary assumption for the other employees mentioned in this case study. *Using a benefits load factor of 1.37, we get a true cost of $82,200. At 2,000 working hours a year, that yields the hourly rate of $ Updating a typical anti-virus program There are several levels of cost to an IT organization when updating a traditional AV product to provide detection and repair for a new virus threat, such as Microsoft Office 2000 macro viruses: Update costs for a new virus threat: Testing. A network administrator tests an in-line version of an AV product for an average of 60 hours before deploying it across the enterprise. While in-lines often fix many problems for users, they also frequently create new issues or have incompatibilities with existing software. Thus the need for extensive testing. At the administrator s rate of $41.00 an hour, this 60 hours of testing will cost approximately $2, Rolling out the new in-line. With software distribution in place, the rollout effort would probably take around 32 hours of the administrator s time, costing about $1, Without software distribution in place, the administrator would probably post the in-line on a publicly available file or web server and then notify users about the update via . All users would then be responsible for updating their own computers. If we assume that it takes the average user 20 minutes to find the inline on the server, install it, and then reboot the desktop system, this update would take a total of 1,500 hours for the company s 4,700 workstation users. Assuming an average pay rate of $41.00 per hour for the workstation users, the distribution will roughly cost the company $61, Help desk support. Let s assume that some users will have problems installing the new update and will need to call the help desk. Even with a failure rate of only 5 percent, these problems will result in 150 calls to the help desk, at approximately 20 minutes each. That adds another 50 hours of support time at an additional cost of $2,
16 Table 1 summarizes the costs of in-lining a non-navex-based AV product to support a hard new virus or new class of viruses: Task Rough estimate cost Task Rough estimate cost Testing of the new version of the anti-virus software, configuration of settings, etc. $ 2, Rollout with software distribution tools $ 1, Calls to the help desk at 5% rate $ 2, Total cost $ 5, Testing of the new version of the anti-virus software, configuration of settings, etc. $ 2, Manual rollout $ 61, Calls to the help desk at 5% rate $ 2, Total cost $ 66, Table 1: Costs to update a competing AV product to support a new threat, across the enterprise, with either manual distribution or using software distribution technologies. And other virus update costs: Those viruses that do not require scanning engine updates. Regular virus definition updates must still be distributed to yield protection against new viruses that don t require engine updates (such as to protect against new Office 95/97 macro viruses, DOS viruses, or BOOT viruses). If we assume that competing AV products have a distribution mechanism similar to Symantec s LiveUpdate, this will cost an additional $1, per update. However, because competing products may require a reboot of desktop machines and a shutdown of the file or groupware server during the update, the administrator and end users will incur additional unproductive downtime during definition updates. Updates to each platform as solutions become available. Because most AV vendors must in-line multiple products on multiple platforms to cope with a new virus, it can be months before an enterprise has complete protection across desktop systems, file and servers, groupware servers, and the gateway. This incomplete and inconsistent protection makes the enterprise victim to repeat infections and the increased costs of maintaining the non-navex solution. 15
17 Updating Norton AntiVirus Now consider the costs of distributing an update to Norton AntiVirus: Update costs for a new virus threat: In order to detect and repair a completely new threat such as Office 2000 viruses, the administrator needs to distribute the latest virus definition files these include the new NAVEX engine to all desktops and servers. Testing. Most administrators test new virus definitions before a full rollout. We will estimate 16 hours of testing before this rollout. Because the software being tested includes only a set of virus definitions, rather than an in-line update of the entire application, much less testing is required than with typical AV products. Assuming once again a $41.00 per hour pay rate for an IT administrator, testing will cost approximately $ Distribution. Once the administrator is assured of the stability of the new virus definitions, he posts the virus definitions on the corporate LiveUpdate server. LiveUpdate is a pull technology that all Symantec products use to obtain updates. Administrators can maintain intranet LiveUpdate servers and post new virus definitions to them as required. Client Symantec software, such as Norton AntiVirus, can be scheduled to pick up these updates as often as necessary. LiveUpdate servers can use virtually any operating system and platform, as long as the platform supports UNC, FTP, or HTTP access. We will estimate two hours to post the new virus definitions on the LiveUpdate server the administrator will incur a cost of about $ After the virus definitions are posted, all Norton AntiVirus desktop, server, and gateway versions can download them when appropriate. 16
18 Other virus update costs: none. Because Norton AntiVirus does not require rebooting when new virus definitions are obtained, no additional administrative effort is required to update all Norton AntiVirus products across the enterprise, and no employee downtime for rebooting is incurred. The total cost of updating Norton AntiVirus in this situation therefore amounts to $ Task Cost Testing of new virus definitions $ Deployment of new virus definitions to Live Update server $82.00 Total cost $ Table 2: Cost to update Norton AntiVirus to support a new threat, across the enterprise. Summary As the examples above show, it can cost roughly from 7 to 89 times more to update a typical AV product to handle hard viruses or new classes of viruses than to update Norton AntiVirus products. This is an example of how NAVEX technology saves you time, money, and frustration. A special note to Microsoft Office 2000 purchasers As your users or business partners begin to use Microsoft Office 2000, your enterprise will need protection against new virus threats. If you re using a competing anti-virus offering, and intend to in-line your solution as you did for Office 97, consider the following: for the one-time cost of switching to Norton AntiVirus, you ll never again have to deploy in-line upgrades of your anti-virus software to stay protected against new viruses. 17
19 Conclusion With complex new viruses becoming the norm rather than the exception, it is more important than ever to employ an AV product that has a modular engine. This architecture can save countless hours of testing, updating, manual virus elimination, and calls to the help-desk. Competing AV vendors offer a number of ad hoc solutions to deal with new virus threats until they can in-line their existing AV protection. However, these solutions are not cost effective, and provide varying levels of AV protection in different areas of the enterprise, and often require manual end-user intervention. Finally, when in-lines of the competing AV product finally do become available, they require extensive testing, distribution, rebooting of workstations and servers, and end-user support. Without NAVEX technology, there are two choices: pay a lot more for good protection, or stay unprotected. With the NAVEX technology built into all Norton AntiVirus products, your entire enterprise can be quickly and efficiently updated to the latest level of protection for a fraction of the cost of less-effective solutions. That s the Symantec advantage. About Symantec Founded in 1982, Symantec Corporation is the world leader in utility and communications software for business and personal computing. More than 50 million people worldwide use Symantec products. And Symantec products occupy the number one or two position in every software category in which they compete categories like Java development tools and utility and mobile worker software, that Symantec created with its innovative, first-to-market solutions. Symantec is dedicated to providing its customers with the highest-quality, most cutting-edge software products available, and the superior service and support to back them up. With its charter to create products and solutions that maximize user productivity and minimize support from IT, Symantec is poised to build upon its 15 years of market excellence and leadership. 18
20 Appendix: New types of virus threats How often do computer viruses actually necessitate the updating of an AV product s scanning engine? The answer these days, unfortunately, is all too often. Here s a partial list of new viruses and virus classes that have required fundamentally new AV engines just in the past two years. Each of these problems forced Symantec s competitors (and their customers) to in-line their AV software in order to provide updated virus protection. Office 97 viruses The release of Microsoft Office 97 suite included a change in the basic macro language of the office applications. Existing macro detection strategies had to be researched and reengineered to understand the new file formats. Viruses of this type already make up roughly 5% of viruses known to be spreading in the wild. 32-bit Windows viruses The number of 32-bit Windows viruses has risen significantly in the last 18 months and many of these viruses are complex polymorphic (self-mutating) viruses. The first one, HPS, was discovered in May, 1998, and a more recent polymorphic virus (Win95.Marburg) has been found in many locations. While most AV products contain excellent technology for detecting DOS polymorphic viruses, detecting new 32-bit Windows polymorphic viruses is a whole new game requiring a whole new engine. XF.Paix The XF in Paix s name stands for Excel formula. This virus employs a new type of attack on Microsoft Excel spreadsheets. Scanning engines had to be redesigned to scan these Excel files more robustly, especially since Paix is spreading unfettered. The leading Norton AntiVirus competitor took many months to provide in-lines that protected all platforms against this now-prevalent class of virus. Remote Explorer virus The high profile Remote Explorer virus has the unusual characteristic of compressing and storing the original host within itself (using the gzip algorithm). Norton AntiVirus was the first AV product to provide an integrated, cross-platform solution for this virus. At the time of this writing, most competitors still lack detection and repair for this virus across all platforms, in both real-time and ondemand products. PowerPoint viruses The first Microsoft PowerPoint viruses emerged in 1998 (PP97M.Master.A). Already, strains of these viruses have made the Wildlist. As usual, a new virus class requires a new detection strategy. Microsoft Access virus A97M.AccessiV.A was discovered in the beginning of 1998, and is the first virus to infect Microsoft Access macros. 19
21 Java viruses Strange Brew, found by Symantec s Seeker web-spider technology, was the first known Java virus. Since its discovery, at least two more Java viruses have been developed. New scanning strategies are needed to scan Java files efficiently. Office 2000 viruses Microsoft has shipped a new suite of Microsoft Office utilities in 1999 that provides a new target for viruses as Office 97 did. Companies that use Norton AntiVirus will not need to update to a whole new product in order to get protection against Office 2000 viruses. Our standard virus definition updates, including NAVEX, already protect your enterprise. 20
22 WORLD HEADQUARTERS Torre Avenue Cupertino, CA USA 1 (800) (541) World Wide Web Site Corporate: Australia (Sydney): Australia (Melbourne): Brazil: Canada: 1(416) France: Germany: +49 n Hong Kong: Italy: Ireland: Japan: Korea: Malaysia: Mexico: New Zealand: Netherlands: Russia: Singapore: Sweden: Switzerland: South Africa: Taiwan: UK: Symantec, the Symantec logo, and Norton AntiVirus are U.S. registered trademarks of Symantec Corporation. LiveUpdate, NAVEX, Seeker, and Symantec AntiVirus Research Center (SARC) are trademarks of Symantec Corporation. Java and all Java based marks are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Microsoft, Microsoft Access, Microsoft Excel, Microsoft Word, Microsoft Office, Microsoft PowerPoint, Windows and Windows NT are trademarks or registered trademark of Microsoft Corporation, in the U.S. and other countries. Other brands and products are trademarks of their respective holder/s. Copyright 1999 Symantec Corporation. All Rights Reserved. Printed in the U.S.A. 4/
(Self-Study) Identify How to Protect Your Network Against Viruses
SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses
Release Notes: PowerChute plus for Windows 95 and Windows 98
: PowerChute plus for Windows 95 and Windows 98 These release notes supplement the User s Guide: PowerChute plus, Version 5.0.2, for Windows 95 and Windows 98 (pc98ug.pdf) and the Installation Guide: PowerChute
The Symantec Enterprise Papers Volume XXX. Understanding and Managing Polymorphic Viruses.
The Symantec Enterprise Papers Volume XXX Understanding and Managing Polymorphic Viruses. Table of Contents Introduction 1 The Evolution of Polymorphic Viruses 1 Simple Viruses 1 Encrypted Viruses 1 Polymorphic
Symantec AntiVirus Enterprise Edition
Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise
Understanding Virus Behavior in 32-bit Operating Environments
Understanding Virus Behavior in 32-bit Operating Environments Executive Summary Computer Viruses and How They Spread Types of Viruses How Viruses Spread Virus Damage Viruses in a Windows 95 Environment
WHY PATCH MANAGEMENT MATTERS
WHY PATCH MANAGEMENT MATTERS Understanding the return on investment of managed patching for both MSPs and their customers COMMUNICATING THE VALUE OF MANAGED PATCHING As long as there are hackers willing
Proactive. Professional. IT Support and Remote Network Monitoring.
Proactive. Professional. IT Support and Remote Network Monitoring. Watching Your Greatest Asset with the Latest Technology. Focus on your Business. We ll focus on your IT. Recent business trends coupled
Managed Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
Remote Control/Problem Resolution
Remote Control/Problem Resolution Have the best of all worlds secure, reliable remote control with robust information gathering and problem resolution tools Solve user problems the first time anytime,
Remote control/problem resolution
LANDesk Solution Brief: Remote control/problem resolution Solving real IT challenges. Solve user problems the first time anytime, anywhere The Challenge: One thing is certain in the modern enterprise:
Information Technology Services
Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,
Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com
Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two
Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers
Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec
Endpoint Security Management
Endpoint Security Management LANDESK SOLUTION BRIEF Protect against security threats, malicious attacks and configuration vulnerabilities through strong endpoint security control and maintenance. Protect
The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments
The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss
How To Install Safari Antivirus On A Dv8000 Dv Recorder On A Pc Or Macbook Or Ipad (For A Pc) On A Microsoft Dv8 (For Macbook) On An Ipad Or Ipa (
Using Symantec AntiVirus Corporate Edition Version 9.0 Software On a DX8000 DVR DX8000 Digital Video Recorder C1613M-A (12/04) Contents Using Symantec AntiVirus Corporate Edition 9.0 Software.....................................................................5
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
Symantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
CaliberRM / LDAP Integration. CaliberRM
CaliberRM / LDAP Integration CaliberRM Borland Software Corporation 100 Enterprise Way Scotts Valley, California 95066-3249 www.borland.com Made in Borland Copyright 2004 Borland Software Corporation.
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
ANTIVIRUS BEST PRACTICES
ANTIVIRUS BEST PRACTICES Antivirus Best Practices 1. Introduction This guideline covers the basics on Antivirus Software and its best practices. It will help to have an overall understanding of the subject
LOS ANGELES UNIFIED SCHOOL DISTRICT Policy Bulletin
Policy Bulletin TITLE: NUMBER: ENTERPRISE LICENSE SYMANTEC ANTI- VIRUS SOFTWARE BUL-717.1 ROUTING All Employees All Locations ISSUER: Margaret A. Klee Chief Information Officer DATE: POLICY: MAJOR CHANGES:
ANDRA ZAHARIA MARCOM MANAGER
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
Managing SSL Certificates with Ease
WHITE PAPER: MANAGING SSL CERTIFICATES WITH EASE White Paper Managing SSL Certificates with Ease Best Practices for Maintaining the Security of Sensitive Enterprise Transactions Managing SSL Certificates
High Availability Server Management
High Availability Server Management Maintain high server availability through active performance monitoring and low-impact, on-demand remote management services. Maintain high server availability with
5 Reasons Your Business Needs Network Monitoring
5 Reasons Your Business Needs Network Monitoring Intivix.com (415) 543 1033 5 REASONS YOUR BUSINESS NEEDS NETWORK MONITORING Your business depends on the health of your network for office productivity.
Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information
Getting started Symantec AntiVirus Business Pack Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 Symantec and the Symantec logo are U.S. registered trademarks of Symantec
ScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
Device Lifecycle Management
Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)
Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks
DX8100 Series Symantec AntiVirus Corporate Edition Installation Instructions. Version 10.1.6
DX8100 Series Symantec AntiVirus Corporate Edition Installation Instructions Version 10.1.6 DX8100 DX8100 Digital Video Recorder C2643M (4/08) Contents Description...........................................................................................................
Monitoring Microsoft Exchange Server in the Context of the Entire Network
Monitoring Microsoft Exchange Server in the Context of the Entire Network Abstract: Virtually every business process and function relies in some way on messaging applications. Microsoft Exchange is one
Operations Manager Comprehensive, secure remote monitoring and management of your entire digital signage network infrastructure
Network monitoring, management and maintenance 3M TM Network Operations Manager Comprehensive, secure remote monitoring and management of your entire digital signage network infrastructure Provides real-time
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
Avoiding The Hidden Costs. of the Cloud
Avoiding The Hidden Costs of the Cloud 2013 CONTENTS 4 5 6 7 8 9 10 INTRODUCTION ROGUE CLOUD IMPLEMENTATIONS CLOUD BACK UP AND RECOVERY INEFFICIENT CLOUD STORAGE COMPLIANCE AND ediscovery SSL CERTIFICATE
PROACTIVE PROTECTION MADE EASY
PROACTIVE PROTECTION AUTHOR: ANDREW NIKISHIN KASPERSKY LAB Heuristic Analyzer Policy-Based Security Intrusion Prevention System (IPS) Protection against Buffer Overruns Behaviour Blockers Different Approaches
Lumension Guide to Patch Management Best Practices
Lumension Guide to Patch Management Best Practices With the sophistication and sheer volume of exploits targeting major applications and operating systems, the speed of assessment and deployment of security
Five Reasons Your Business Needs Network Monitoring
Five Reasons Your Business Needs Network Monitoring cognoscape.com Five Reasons Your Business Needs Network Monitoring Your business depends on the health of your network for office productivity. Most
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
Leading Australian recruitment agency gets Wyse
Leading Australian recruitment agency gets Wyse Overview After experiencing steady growth and initiating several acquisitions, Catalyst Recruitment Systems found it had an unwieldy patchwork of IT infrastructure
P e r s o n a l E d i t i o n For Windows 95, 98, NT
P e r s o n a l E d i t i o n For Windows 95, 98, NT Getting Started Version 5.0 This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end
How To Protect Your Endpoints From Attack
2012 Endpoint Security Best Practices Survey GLOBAL RESULTS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Top tier organizations fare better against attacks... 8 Finding 2: Top tier organizations
WhitePaper THIN CLIENTS
THIN CLIENTS Benefits and savings of using thin clients THIN CLIENTS This whitepaper describes the advantages of using thin clients as opposed to PCs (fat clients), and demonstrates how thin clients can
Symantec Backup Exec 11d for Windows Small Business Server
Symantec Backup Exec 11d for Windows Small Business Server End-User Call Script for Sales This document is intended as a simple call structure to help get you started when selling Backup Exec 11d for Windows
Dimension Data s Uptime Maintenance Service
Dimension Data s Uptime Maintenance Service The pace of business today simply doesn t allow for downtime. When systems go off-line, productivity drops, time and money go to waste and opportunities are
Cisco Blended Agent: Bringing Call Blending Capability to Your Enterprise
DATA SHEET Cisco Blended Agent: Bringing Call Blending Capability to Your Enterprise Cisco ICM software has traditionally enabled companies to distribute inbound service volume to a variety of termination
Power, Patch, and Endpoint Managers Expand McAfee epo Platform Capabilities While Cutting Endpoint Costs
Business Brief Power, Patch, and Endpoint Managers Expand McAfee epo Platform Capabilities While Cutting Endpoint Costs McAfee Compatible Solution Autonomic Software Endpoint Manager 1.2 and McAfee epo
WHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION. SYMANTEC Backup Exec 10d Continuous Protection Server
WHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION SYMANTEC Backup Exec 10d Continuous Protection Server 1 TABLE OF CONTENTS EXECUTIVE SUMMARY...3 Current Situation...3 The New Opportunity...3 The
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
Integrating CaliberRM with Software Configuration Management Tools
Integrating CaliberRM with Software Configuration Management Tools A Borland White Paper By Jenny Rogers, CaliberRM Technical Writer January 2002 Contents Introduction... 3 Enabling SCM for a Project...
Norton Personal Firewall for Macintosh
Norton Personal Firewall for Macintosh Evaluation Guide Firewall Protection for Client Computers Corporate firewalls, while providing an excellent level of security, are not always enough protection for
What you can do prevent virus infections on your computer
What you can do prevent virus infections on your computer A computer virus is program code which 'hides' in other files and can cause irreparable damage to your computer. Computer viruses spread easily
Demystifying Virtualization for Small Businesses Executive Brief
Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection
Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
INSIDE. Malicious Threats of Peer-to-Peer Networking
Symantec Security Response WHITE PAPER Malicious Threats of Peer-to-Peer Networking by Eric Chien, Symantec Security Response INSIDE Background Protocols New Vector of Delivery Malicious Uses of Peer-to-Peer
Field Service Management in the Cloud
Field Service Management in the Cloud The Rise of Cloud Applications for Mission-Critical Tasks ORACLE WHITE PAPER DECEMBER 2014 Introduction Since the introduction of cloud applications for customer relationship
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Choosing a Server to Fit Your Business. A step-by-step guide to help businesses maximize the benefits of Intel. Xeon -based server solutions.
Choosing a Server to Fit Your Business. A step-by-step guide to help businesses maximize the benefits of Intel Xeon -based server solutions. Copyright 2005 Intel Corporation. All rights reserved. Intel,
Symantec AntiVirus for Network Attached Storage Integration Guide
Symantec AntiVirus for Network Attached Storage Integration Guide Introducing Symantec AntiVirus for Network Attached Storage The software described in this book is furnished under a license agreement
It looks like your regular telephone.
It looks like your regular telephone. But it s a lot better. CISCO PHONE SYSTEM SOLUTIONS FOR SMALL AND MEDIUM BUSINESSES Between the increased productivity and administrative savings we ve experienced,
OS Deployment and Migration
LANDesk Solution Brief: OS Deployment and Migration Solving real IT challenges. Solving real IT challenges. Simplify OS upgrades and user migrations The Challenge: Migrating users to new Windows operating
Responding to Healthcare s Most Urgent Business Issues. Gundersen Lutheran Health System Case Study
Responding to Healthcare s Most Urgent Business Issues Gundersen Lutheran Health System Case Study Gundersen Lutheran Health System case study Surgical Instrument Management Reduces Surgery Delays and
Using Borland Deployment Op-Center to manage CaliberRM, StarTeam, and Mercury TestDirector server environments
Using Borland Deployment Op-Center to manage CaliberRM, StarTeam, and Mercury TestDirector server environments A Borland White Paper By Darrell Kalichak March 2005 Contents Introduction... 3 Deployment
Desktop Application Virtualization and Application Streaming: Function and Security Benefits
Desktop Application Virtualization and Application Streaming: Function and Security Benefits Tom Olzak August 2007 Current security issues caused by an increasing number of threats, application vulnerabilities,
Fast and Effective Migration from Novell to Windows Active Directory with VMware Mirage WHITE PAPER
Fast and Effective Migration from Novell to Windows Active Directory with VMware Mirage WHITE PAPER Introduction This paper describes how GANTECH, a systems integrator specializing in virtualization, used
VDI can reduce costs, simplify systems and provide a less frustrating experience for users.
1 INFORMATION TECHNOLOGY GROUP VDI can reduce costs, simplify systems and provide a less frustrating experience for users. infor ation technology group 2 INFORMATION TECHNOLOGY GROUP CONTENTS Introduction...3
WHITE PAPER. Citrix XenDesktop. Cost savings with centralized virtual desktops. www.citrix.com
WHITE PAPER Citrix XenDesktop Cost savings with centralized virtual desktops www.citrix.com Introduction Centralized virtual desktops optimize the efficiency, security and flexibility of any PC environment.
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
Symantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.
SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,
Cisco IT Data Center and Operations Control Center Tour
Cisco IT Data Center and Operations Control Center Tour Inside the Build Room Page 1 of 8 5. Inside the Build Room Introduction Figure 1. Inside the Build Room Ian: The purpose of the Build room is for
Choosing a Server to Fit your Business
Solutions for Small Business Choosing a Server to Fit your Business A step-by-step guide to help businesses maximize the benefits of Intel Xeon processor-based server solutions. Your business can't afford
Managed Antivirus Quick Start Guide
Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt
How to Make Microsoft Security Patch Testing More Efficient
How to Make Microsoft Security Patch Testing More Efficient Published Sept 2005 Abstract Despite the perils of deploying a Microsoft security patch to an enterprise s operating environment without first
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
