SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
GFI White Paper

            Basic security -
      Why purchasing antivirus,
      anti-spyware and a firewall
               is a must
Paid security solutions offer significantly higher levels of protection,
along with far greater value for the money through the inclusion of
     a broader range of key features tailored for the home user,
    while supporting parents and offering tools to help protect
                     children from online harm.
Contents
                   Introduction                                                    3
                   Free and paid solutions                                         3
                   The free software solution – you get what you pay for           4
                   Added value and protection – the paid advantage                 5
                   Summary                                                         6
                   About GFI VIPRE® Antivirus Home                                 6
                   About GFI®                                                      7




Basic security - Why purchasing antivirus, anti-spyware and a firewall is a must       2
Introduction
Home computers are at the front line of today’s malware and Internet security battles, with a growing number
of criminals and opportunistic hackers looking to exploit vulnerabilities in software and websites, as well as
trick unsuspecting users into revealing sensitive information and handing over usernames, passwords and
banking information1.
It is a harsh reality of the Internet-centric world that we now live in – we live so much of our lives online, and
carry out so many of our day-to-day interactions via our computers – that our computers are a key part of
how we communicate, how we shop, how we enjoy entertainment and how we work. Therefore, it is essential
that we keep our computers safe, secure and working.
Sadly, IT security is not a problem that goes away, but rather one that evolves alongside other aspects
of modern computing such as operating systems, Web browsers and other key applications. As these
applications change and advance, so do the security threats posed by the likes of malware, discovered
vulnerabilities and data loss. Criminals looking to harvest useful information will go to great lengths, using
both hardware and software2 to capture useful information from consumers.
The developers of security solutions strive to create new and more advanced ways of combating the threats
posed to computers, but are frequently met by increasingly sophisticated challenges posed by new strains of
malware and new hacking tools. This is in addition to the challenges posed by known and unknown security
vulnerabilities discovered in operating systems and key applications such as email clients, Web browsers,
games and office productivity software.
Given the magnitude of the challenge, there is a vast array of security options on the market to help users
protect their PCs from both Internet-based threats and malware that is introduced locally via storage devices
(USB sticks, CDs, DVDs and other peripherals). Capabilities and prices vary considerably, but one group of
products has broken the mold – the increasing number of free security solutions offering a basic level of
security that is now part of the established security landscape.
The freeware model for certain key security products, such as antivirus, anti-spyware and firewall applications
has helped many novice and cash-strapped users implement basic security on their computers.3 However,
free security software is increasingly being considered as an all-encompassing option to provide home
computer security, despite often lacking many features needed to protect a PC from the full range of threats
and methods of depositing malware onto a computer.
So, why are paid security solutions still the best option, and why are free security solutions often unsuitable for
anything but the most basic level of malware protection?

Free and paid solutions
The arrival of a plethora of free security solutions – composed of standalone freeware products and so-called
‘lite’ versions of existing paid solutions – has made the process of choosing the right security product for a
home PC all the more difficult:
»»   Lite solutions: Usually products from established IT security and antivirus vendors that offer a range of
     paid security software, these free products often retain the look and feel of familiar paid products, but
     contain only a fraction of the features and capabilities. For example, such a solution may only provide
     basic antivirus protection and very basic email scanning, but nothing else. Definition updates will often be
     less frequent as a means to both differentiate the support and service offered and to help underline the
     benefit of buying the paid version of the same product. There will often be in-application pop-ups and
     other promotional windows encouraging you to upgrade to the paid equivalent, which will offer more
     features, including many core features needed to ensure robust data and PC protection. Support options
     within the lite product will often be limited to email queries and a Web support forum


1
  http://www.timeslive.co.za/thetimes/2011/06/20/identity-thieves-lurk-online
2
  http://www.theregister.co.uk/2011/02/15/hardware_keyloggers_manchester_libraries/
3
  http://www.virusbtn.com/virusbulletin/archive/2011/06/vb201106-comment


Basic security - Why purchasing antivirus, anti-spyware and a firewall is a must                                  3
»»     Standalone free solutions: These are usually products emanating from the open source and other free
       software communities with no commercial ties to an existing paid product or commercial IT security
       vendor. Support is usually provided in the form of peer support, while software updates and definition file
       refreshes rely on a volunteer workforce of developers and beta testers, meaning that while the product may
       be sound, updates will often be less frequent and less predictable than those for products funded through
       sales, subscriptions and support contracts. With no income source, development is limited to volunteers’
       spare time, so release schedules can be erratic and known bugs are not always fixed in a timely manner.
Free security software already has a foothold in everyday computing, thanks largely to the number of
integrated security products and features included in later versions of Microsoft Windows (namely Windows
XP, Vista and Windows 7), along with Microsoft products offered via the Windows Update patch distribution
service. Microsoft’s Windows Firewall is the most typical free security product used today, as it has been
bundled in the Windows operating system since the Windows XP service pack 2.
The inclusion of basic security applications, such as a firewall, in an operating system can complicate matters,
with users sometimes believing there is a higher level of security with integrated security products.
These products are not intended to offer long-term robust security protection, but rather to provide
consumers with early-stage ‘out of the box’ protection after they first install the OS or purchase a new PC.
More recently, Microsoft has also moved into the free antivirus market with the launch of Microsoft Security
Essentials4. This free product is distributed via Microsoft’s Windows Update service and replaced Windows
Live OneCare, a commercial subscription-based antivirus service for home users. However, Microsoft Security
Essentials is geared for basic consumer use and is a prime example of a free security product that is neither
suitable nor able to deliver sufficient protection.

The free software solution – you get what you pay for
There are more choices than ever in the market5, but the solutions offered vary so significantly from the low
end to the high end that ensuring the one chosen has the right combination of features, support and updates
can quickly become a challenge for consumers. This is particularly true when faced with the daunting array of
products for sale online or a shelf-full of competing products in a PC store.
It is important to remember from the outset that most free security products, in particular free antivirus
solutions, free firewalls, free anti-spyware tools and free anti-spam products from known software companies,
are primarily aimed at a single-user consumer audience and at providing a minimum level of security. This
audience has little, if no knowledge of security, it is certainly not IT savvy and, because users see the AV icon
on their desktop, they believe that their machine is protected. Although there is basic protection in place, with
so much important data at stake, can a user take the risk that their computer is ‘almost’ protected?
When choosing the right home PC security product, whether it is free or requires some form of one-time or
ongoing payment, it is essential to consider the following points:
»»     Frequency of updates – One of the biggest differentiators between paid and free software is how and
       when the products are updated. It is crucial to look at how often the application receives updates, as
       well as how regularly definition database files are refreshed. For products such as antivirus and anti-spam
       products, frequent definition updates are needed to keep on top of the latest security threats. This is a key
       area where free products lag behind paid solutions. Infrequent updates save money, but also compromise
       the effectiveness of a solution

4
    http://en.wikipedia.org/wiki/Microsoft_Security_Essentials
5
    http://www.virusbtn.com/vb100/latest_comparative/index




Basic security - Why purchasing antivirus, anti-spyware and a firewall is a must                                   4
»»     Support options – How and where to get support and ask questions are critical for an IT department to
       deliver effective user support. By their very nature, free products have few means to fund a substantial
       support operation, meaning that support is usually kept at arm’s length from the developer in the form
       of email queries, Web forums and developer blog posts. This is far from ideal, especially for users who are
       not particularly technical or Web savvy. The standard of the support offered may well be high when a
       request is received but beyond this, free software usually offers no guarantee to uptime or response time
       on support queries. So an urgent query may go days and weeks without being answered, and a user may
       have to rely on unverified guidance from peer groups on Web forums, leading to further problems and
       misdiagnosis of issues
»»     Limited scanning and detection – Basic security solutions are by their very nature stripped back to the
       basic functions. They lack the peripheral features and detailed scanning options included in paid solutions
       that deliver value and justify ongoing investment costs.6 Free products lack many real-time scanning and
       reporting capabilities found in commercial products, particularly paid versions of the same application
»»     Integration with third-party applications – Free security software is rooted firmly in the consumer space,
       so ensuring compatibility with third-party products such as some email clients, browsers, file downloading
       applications and gaming networks cannot be guaranteed. Basic support for the most common products
       – such as Microsoft Outlook and Windows Live Mail – can usually be found, but beyond this, there is little
       integration of free antivirus and security software with the most popular Internet applications
»»     License terms – Many free software products specifically prohibit commercial use, including use in a
       business environment or on a home PC also used for work activities. Furthermore, some open-source free
       products fall under open-source licenses that prohibit commercial use without payment, so you have to
       pay to use a ‘free’ product, but end up with the same lack of features and technical support.

Added value and protection – the paid advantage
It is important to note that many free security software products have a very good reputation and have
received many plaudits from the media. However, when compared head-to-head with paid products, the
differences soon become clear. The additional features and tailored capabilities of paid security software stand
out and the level of compromise that is involved in using a free product is often significant:
»»     Email platform protection – Particularly for antivirus and anti-spam solutions, there are few free products
       that support a broad range of email clients, while some struggle to effectively scan server-side email such
       as IMAP, Gmail and other proprietary server-based email services. Most paid solutions support a wide
       range of email applications, email protocols and can even provide robust protection when using Web-
       based email
»»     Web filtering and rogue site interception – Basic protection usually stops at limited port blocking
       for firewalls, basic malware scanning and detection for antivirus and periodic scans for anti-spyware
       solutions. Commercial security products go much further, combining higher levels of core protection with
       additional interception and protection capabilities, such as intercepting known bad websites before they
       have a chance to load on a client PC, blocking parts of pages from loading if they are from untrusted or
       known bad sources
»»     Broad coverage – Some free products specialize in one thing, leaving the rest under-developed and
       under-resourced. This often depends on the specific DNA or technical focus of the application and its
       developer. Commercial security solutions with a broader range of dedicated developers and resources
       frequently out-perform their free counterparts across a range of core functions, from scanning times to
       detection levels.

6
    http://www.ehow.com/facts_6886278_limitations-antivirus-software.html




Basic security - Why purchasing antivirus, anti-spyware and a firewall is a must                                     5
»»   Parental control and lock-down capabilities – Parents wanting to maintain a level of control over what
     their children can and can’t use their PC for will find that basic, free security software offers little in the
     way of Web filtering, content and application blocking and activity logging. An important feature of any
     well-rounded home PC security suite is capabilities for parents to ‘lock down’ PCs and maintain control
     over use, so that children can use a PC without needing constant parental supervision. Regularly updated
     lists of good and bad sites ensure that Web filtering keeps the majority of bad and inappropriate sites
     away from view, while content controls can ensure children are not using chat sites and other potentially
     harmful Web services when unsupervised.

Summary
The basic security afforded by free and integrated security products represents an important consideration for
home users, particularly in these economically strained times. However, these tools remain largely focused on
delivering the absolute minimum acceptable level of protection for individual users and offer no guarantees
or route to complain if they fail. Furthermore, such products only serve to deliver a modest level of protection,
partly in order to separate them from paid stable mates, but also to minimize the operating costs associated
with delivering database and application updates to a user community that is not paying towards the on-
going development and upkeep of a product and its back-end support systems.
Paid security solutions continue to offer significantly higher levels of protection, along with far greater value
for the money through the inclusion of a broader range of key features tailored for the home user, while
supporting parents and offering tools to help protect children from online harm.
When choosing the right security solution, it is critical that you consider and evaluate all the options available.
It is also important to understand what you will get in return for the purchase or subscription cost of a security
product, and what compromises would need to be made in order to forgo the cost of software. While free
software can seem like an easy way to save some money, you have to balance this against the cost – both in
time and money – if your PC is rendered inoperable by malware or if your personal and financial information is
hijacked by criminal organizations.
You can seldom afford to compromise on PC and information security, and thus should think twice before
relying solely on a free or integrated security solution.

About GFI VIPRE Antivirus Home
VIPRE Antivirus Home is designed to provide the fundamental, necessary desktop malware protection that
you need in today’s threat environment without slowing down your PC. Instead of creating a product loaded
with ‘marketing’ features, GFI Software has focused on core functionality that consumers need, including
comprehensive malware protection, easy-to-use menus and options, free technical support, free malware removal
assistance and one of the best and most frequently updated malware detection databases on the market.
All this is combined with underlying technology such as Active Protection™, which delivers real-time
monitoring and protection against known and unknown malware threats. Active Protection works deep
inside your Windows installation to watch for malware, stopping it before it activates and does damage. VIPRE
Antivirus Home also offers a range of Premium features including a powerful integrated firewall.
VIPRE Antivirus Home comes with a 30-day money back guarantee. If you are not satisfied, we offer a hassle-
free full refund within this period.




Basic security - Why purchasing antivirus, anti-spyware and a firewall is a must                                       6
About GFI
GFI Software provides web and mail security, archiving and fax, networking and security software and hosted
IT solutions for small to medium-sized enterprises (SMEs) via an extensive global partner community. GFI
products are available either as on-premise solutions, in the cloud or as a hybrid of both delivery models. With
award-winning technology, a competitive pricing strategy, and a strong focus on the unique requirements
of SMEs, GFI satisfies the IT needs of organizations on a global scale. The company has offices in the United
States (North Carolina, California and Florida), UK (London and Dundee), Austria, Australia, Malta, Hong Kong,
Philippines and Romania, which together support hundreds of thousands of installations worldwide. GFI is
a channel-focused company with thousands of partners throughout the world and is also a Microsoft Gold
Certified Partner.
More information about GFI can be found at http://www.gfi.com.




Basic security - Why purchasing antivirus, anti-spyware and a firewall is a must                               7
USA,»CANADA»AND»CENTRAL»AND»SOUTH»AMERICA




                                                                                                                                                                                               GFI 1990 july11
15300 Weston Parkway, Suite 104, Cary, NC 27513, USA
Telephone: +1 (888) 243-4329
Fax: +1 (919) 379-3402
ussales@gfi.com



ENGLAND»AND»IRELAND
Magna House, 18-32 London Road, Staines, Middlesex, TW18 4BP, UK
Telephone: +44 (0) 870 770 5370
Fax: +44 (0) 870 770 5377
sales@gfi.co.uk



EUROPE,»MIDDLE»EAST»AND»AFRICA
GFI House, San Andrea Street, San Gwann, SGN 1612, Malta
Telephone: +356 2205 2000
Fax: +356 2138 2419
sales@gfi.com



AUSTRALIA»AND»NEW»ZEALAND
83 King William Road, Unley 5061, South Australia
Telephone: +61 8 8273 3000
Fax: +61 8 8273 3099
sales@gfiap.com




Disclaimer

© 2011. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners.

The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but
not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential
damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the
accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out-
of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in
this document.

If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.

Contenu connexe

Tendances

Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
Andrew Wong
 
Security for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks EnterpriseSecurity for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks Enterprise
Scott K. Wilder
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
tovmug
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
Bob Guimarin
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 

Tendances (20)

Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
 
Security for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks EnterpriseSecurity for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks Enterprise
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, Expertise
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
The impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clientsThe impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clients
 
Secure Systems of Engagement
Secure Systems of EngagementSecure Systems of Engagement
Secure Systems of Engagement
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
GDPR & Capacity Management
GDPR & Capacity ManagementGDPR & Capacity Management
GDPR & Capacity Management
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 

En vedette

Autoverkopen juni 2014
Autoverkopen juni 2014 Autoverkopen juni 2014
Autoverkopen juni 2014
Auto Verkopen
 

En vedette (8)

Industrial Revolution
Industrial RevolutionIndustrial Revolution
Industrial Revolution
 
Europese autoverkopen april 2014
Europese autoverkopen april 2014Europese autoverkopen april 2014
Europese autoverkopen april 2014
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManager
 
Why You Need an Email Exploit Detection Engine
Why You Need an Email Exploit Detection EngineWhy You Need an Email Exploit Detection Engine
Why You Need an Email Exploit Detection Engine
 
Sending Faxes in real-time over an IP Network
Sending Faxes in real-time over an IP NetworkSending Faxes in real-time over an IP Network
Sending Faxes in real-time over an IP Network
 
Data Backups
Data BackupsData Backups
Data Backups
 
GFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment StrategiesGFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment Strategies
 
Autoverkopen juni 2014
Autoverkopen juni 2014 Autoverkopen juni 2014
Autoverkopen juni 2014
 

Similaire à Basic security

Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
kent neri
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
kent neri
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
Turvallisuus2013
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
Jennifer Cataluña
 

Similaire à Basic security (20)

Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
WithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaperWithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaper
 
Mjtanasas
MjtanasasMjtanasas
Mjtanasas
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Internet security setting
Internet security settingInternet security setting
Internet security setting
 
Marketing of services Australian Education
Marketing of services Australian EducationMarketing of services Australian Education
Marketing of services Australian Education
 
Securing Your Work from Home.pdf
Securing Your Work from Home.pdfSecuring Your Work from Home.pdf
Securing Your Work from Home.pdf
 
Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security Protection
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Bitdefender internet security review 2018: simply unbeatable antivirus
Bitdefender internet security review 2018: simply unbeatable antivirus Bitdefender internet security review 2018: simply unbeatable antivirus
Bitdefender internet security review 2018: simply unbeatable antivirus
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
Chap 2 lab2 (Ej
Chap 2 lab2 (EjChap 2 lab2 (Ej
Chap 2 lab2 (Ej
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
Why is open source software is good for business
Why is open source software is good for businessWhy is open source software is good for business
Why is open source software is good for business
 
R esearch report with footnote
R esearch report with footnoteR esearch report with footnote
R esearch report with footnote
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
 

Plus de GFI Software

Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013
GFI Software
 

Plus de GFI Software (20)

Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013
 
Network Environments
Network EnvironmentsNetwork Environments
Network Environments
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
Email Continuity
Email ContinuityEmail Continuity
Email Continuity
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
 
Master Class Series
Master Class SeriesMaster Class Series
Master Class Series
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log Management
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security Solutions
 
Maxmp greylisting
Maxmp greylistingMaxmp greylisting
Maxmp greylisting
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web Security
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your Network
 
How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR Spam
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Email Continuity
Email ContinuityEmail Continuity
Email Continuity
 
Greylisting
GreylistingGreylisting
Greylisting
 
Binary translation
Binary translationBinary translation
Binary translation
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Basic security

  • 1. GFI White Paper Basic security - Why purchasing antivirus, anti-spyware and a firewall is a must Paid security solutions offer significantly higher levels of protection, along with far greater value for the money through the inclusion of a broader range of key features tailored for the home user, while supporting parents and offering tools to help protect children from online harm.
  • 2. Contents Introduction 3 Free and paid solutions 3 The free software solution – you get what you pay for 4 Added value and protection – the paid advantage 5 Summary 6 About GFI VIPRE® Antivirus Home 6 About GFI® 7 Basic security - Why purchasing antivirus, anti-spyware and a firewall is a must 2
  • 3. Introduction Home computers are at the front line of today’s malware and Internet security battles, with a growing number of criminals and opportunistic hackers looking to exploit vulnerabilities in software and websites, as well as trick unsuspecting users into revealing sensitive information and handing over usernames, passwords and banking information1. It is a harsh reality of the Internet-centric world that we now live in – we live so much of our lives online, and carry out so many of our day-to-day interactions via our computers – that our computers are a key part of how we communicate, how we shop, how we enjoy entertainment and how we work. Therefore, it is essential that we keep our computers safe, secure and working. Sadly, IT security is not a problem that goes away, but rather one that evolves alongside other aspects of modern computing such as operating systems, Web browsers and other key applications. As these applications change and advance, so do the security threats posed by the likes of malware, discovered vulnerabilities and data loss. Criminals looking to harvest useful information will go to great lengths, using both hardware and software2 to capture useful information from consumers. The developers of security solutions strive to create new and more advanced ways of combating the threats posed to computers, but are frequently met by increasingly sophisticated challenges posed by new strains of malware and new hacking tools. This is in addition to the challenges posed by known and unknown security vulnerabilities discovered in operating systems and key applications such as email clients, Web browsers, games and office productivity software. Given the magnitude of the challenge, there is a vast array of security options on the market to help users protect their PCs from both Internet-based threats and malware that is introduced locally via storage devices (USB sticks, CDs, DVDs and other peripherals). Capabilities and prices vary considerably, but one group of products has broken the mold – the increasing number of free security solutions offering a basic level of security that is now part of the established security landscape. The freeware model for certain key security products, such as antivirus, anti-spyware and firewall applications has helped many novice and cash-strapped users implement basic security on their computers.3 However, free security software is increasingly being considered as an all-encompassing option to provide home computer security, despite often lacking many features needed to protect a PC from the full range of threats and methods of depositing malware onto a computer. So, why are paid security solutions still the best option, and why are free security solutions often unsuitable for anything but the most basic level of malware protection? Free and paid solutions The arrival of a plethora of free security solutions – composed of standalone freeware products and so-called ‘lite’ versions of existing paid solutions – has made the process of choosing the right security product for a home PC all the more difficult: »» Lite solutions: Usually products from established IT security and antivirus vendors that offer a range of paid security software, these free products often retain the look and feel of familiar paid products, but contain only a fraction of the features and capabilities. For example, such a solution may only provide basic antivirus protection and very basic email scanning, but nothing else. Definition updates will often be less frequent as a means to both differentiate the support and service offered and to help underline the benefit of buying the paid version of the same product. There will often be in-application pop-ups and other promotional windows encouraging you to upgrade to the paid equivalent, which will offer more features, including many core features needed to ensure robust data and PC protection. Support options within the lite product will often be limited to email queries and a Web support forum 1 http://www.timeslive.co.za/thetimes/2011/06/20/identity-thieves-lurk-online 2 http://www.theregister.co.uk/2011/02/15/hardware_keyloggers_manchester_libraries/ 3 http://www.virusbtn.com/virusbulletin/archive/2011/06/vb201106-comment Basic security - Why purchasing antivirus, anti-spyware and a firewall is a must 3
  • 4. »» Standalone free solutions: These are usually products emanating from the open source and other free software communities with no commercial ties to an existing paid product or commercial IT security vendor. Support is usually provided in the form of peer support, while software updates and definition file refreshes rely on a volunteer workforce of developers and beta testers, meaning that while the product may be sound, updates will often be less frequent and less predictable than those for products funded through sales, subscriptions and support contracts. With no income source, development is limited to volunteers’ spare time, so release schedules can be erratic and known bugs are not always fixed in a timely manner. Free security software already has a foothold in everyday computing, thanks largely to the number of integrated security products and features included in later versions of Microsoft Windows (namely Windows XP, Vista and Windows 7), along with Microsoft products offered via the Windows Update patch distribution service. Microsoft’s Windows Firewall is the most typical free security product used today, as it has been bundled in the Windows operating system since the Windows XP service pack 2. The inclusion of basic security applications, such as a firewall, in an operating system can complicate matters, with users sometimes believing there is a higher level of security with integrated security products. These products are not intended to offer long-term robust security protection, but rather to provide consumers with early-stage ‘out of the box’ protection after they first install the OS or purchase a new PC. More recently, Microsoft has also moved into the free antivirus market with the launch of Microsoft Security Essentials4. This free product is distributed via Microsoft’s Windows Update service and replaced Windows Live OneCare, a commercial subscription-based antivirus service for home users. However, Microsoft Security Essentials is geared for basic consumer use and is a prime example of a free security product that is neither suitable nor able to deliver sufficient protection. The free software solution – you get what you pay for There are more choices than ever in the market5, but the solutions offered vary so significantly from the low end to the high end that ensuring the one chosen has the right combination of features, support and updates can quickly become a challenge for consumers. This is particularly true when faced with the daunting array of products for sale online or a shelf-full of competing products in a PC store. It is important to remember from the outset that most free security products, in particular free antivirus solutions, free firewalls, free anti-spyware tools and free anti-spam products from known software companies, are primarily aimed at a single-user consumer audience and at providing a minimum level of security. This audience has little, if no knowledge of security, it is certainly not IT savvy and, because users see the AV icon on their desktop, they believe that their machine is protected. Although there is basic protection in place, with so much important data at stake, can a user take the risk that their computer is ‘almost’ protected? When choosing the right home PC security product, whether it is free or requires some form of one-time or ongoing payment, it is essential to consider the following points: »» Frequency of updates – One of the biggest differentiators between paid and free software is how and when the products are updated. It is crucial to look at how often the application receives updates, as well as how regularly definition database files are refreshed. For products such as antivirus and anti-spam products, frequent definition updates are needed to keep on top of the latest security threats. This is a key area where free products lag behind paid solutions. Infrequent updates save money, but also compromise the effectiveness of a solution 4 http://en.wikipedia.org/wiki/Microsoft_Security_Essentials 5 http://www.virusbtn.com/vb100/latest_comparative/index Basic security - Why purchasing antivirus, anti-spyware and a firewall is a must 4
  • 5. »» Support options – How and where to get support and ask questions are critical for an IT department to deliver effective user support. By their very nature, free products have few means to fund a substantial support operation, meaning that support is usually kept at arm’s length from the developer in the form of email queries, Web forums and developer blog posts. This is far from ideal, especially for users who are not particularly technical or Web savvy. The standard of the support offered may well be high when a request is received but beyond this, free software usually offers no guarantee to uptime or response time on support queries. So an urgent query may go days and weeks without being answered, and a user may have to rely on unverified guidance from peer groups on Web forums, leading to further problems and misdiagnosis of issues »» Limited scanning and detection – Basic security solutions are by their very nature stripped back to the basic functions. They lack the peripheral features and detailed scanning options included in paid solutions that deliver value and justify ongoing investment costs.6 Free products lack many real-time scanning and reporting capabilities found in commercial products, particularly paid versions of the same application »» Integration with third-party applications – Free security software is rooted firmly in the consumer space, so ensuring compatibility with third-party products such as some email clients, browsers, file downloading applications and gaming networks cannot be guaranteed. Basic support for the most common products – such as Microsoft Outlook and Windows Live Mail – can usually be found, but beyond this, there is little integration of free antivirus and security software with the most popular Internet applications »» License terms – Many free software products specifically prohibit commercial use, including use in a business environment or on a home PC also used for work activities. Furthermore, some open-source free products fall under open-source licenses that prohibit commercial use without payment, so you have to pay to use a ‘free’ product, but end up with the same lack of features and technical support. Added value and protection – the paid advantage It is important to note that many free security software products have a very good reputation and have received many plaudits from the media. However, when compared head-to-head with paid products, the differences soon become clear. The additional features and tailored capabilities of paid security software stand out and the level of compromise that is involved in using a free product is often significant: »» Email platform protection – Particularly for antivirus and anti-spam solutions, there are few free products that support a broad range of email clients, while some struggle to effectively scan server-side email such as IMAP, Gmail and other proprietary server-based email services. Most paid solutions support a wide range of email applications, email protocols and can even provide robust protection when using Web- based email »» Web filtering and rogue site interception – Basic protection usually stops at limited port blocking for firewalls, basic malware scanning and detection for antivirus and periodic scans for anti-spyware solutions. Commercial security products go much further, combining higher levels of core protection with additional interception and protection capabilities, such as intercepting known bad websites before they have a chance to load on a client PC, blocking parts of pages from loading if they are from untrusted or known bad sources »» Broad coverage – Some free products specialize in one thing, leaving the rest under-developed and under-resourced. This often depends on the specific DNA or technical focus of the application and its developer. Commercial security solutions with a broader range of dedicated developers and resources frequently out-perform their free counterparts across a range of core functions, from scanning times to detection levels. 6 http://www.ehow.com/facts_6886278_limitations-antivirus-software.html Basic security - Why purchasing antivirus, anti-spyware and a firewall is a must 5
  • 6. »» Parental control and lock-down capabilities – Parents wanting to maintain a level of control over what their children can and can’t use their PC for will find that basic, free security software offers little in the way of Web filtering, content and application blocking and activity logging. An important feature of any well-rounded home PC security suite is capabilities for parents to ‘lock down’ PCs and maintain control over use, so that children can use a PC without needing constant parental supervision. Regularly updated lists of good and bad sites ensure that Web filtering keeps the majority of bad and inappropriate sites away from view, while content controls can ensure children are not using chat sites and other potentially harmful Web services when unsupervised. Summary The basic security afforded by free and integrated security products represents an important consideration for home users, particularly in these economically strained times. However, these tools remain largely focused on delivering the absolute minimum acceptable level of protection for individual users and offer no guarantees or route to complain if they fail. Furthermore, such products only serve to deliver a modest level of protection, partly in order to separate them from paid stable mates, but also to minimize the operating costs associated with delivering database and application updates to a user community that is not paying towards the on- going development and upkeep of a product and its back-end support systems. Paid security solutions continue to offer significantly higher levels of protection, along with far greater value for the money through the inclusion of a broader range of key features tailored for the home user, while supporting parents and offering tools to help protect children from online harm. When choosing the right security solution, it is critical that you consider and evaluate all the options available. It is also important to understand what you will get in return for the purchase or subscription cost of a security product, and what compromises would need to be made in order to forgo the cost of software. While free software can seem like an easy way to save some money, you have to balance this against the cost – both in time and money – if your PC is rendered inoperable by malware or if your personal and financial information is hijacked by criminal organizations. You can seldom afford to compromise on PC and information security, and thus should think twice before relying solely on a free or integrated security solution. About GFI VIPRE Antivirus Home VIPRE Antivirus Home is designed to provide the fundamental, necessary desktop malware protection that you need in today’s threat environment without slowing down your PC. Instead of creating a product loaded with ‘marketing’ features, GFI Software has focused on core functionality that consumers need, including comprehensive malware protection, easy-to-use menus and options, free technical support, free malware removal assistance and one of the best and most frequently updated malware detection databases on the market. All this is combined with underlying technology such as Active Protection™, which delivers real-time monitoring and protection against known and unknown malware threats. Active Protection works deep inside your Windows installation to watch for malware, stopping it before it activates and does damage. VIPRE Antivirus Home also offers a range of Premium features including a powerful integrated firewall. VIPRE Antivirus Home comes with a 30-day money back guarantee. If you are not satisfied, we offer a hassle- free full refund within this period. Basic security - Why purchasing antivirus, anti-spyware and a firewall is a must 6
  • 7. About GFI GFI Software provides web and mail security, archiving and fax, networking and security software and hosted IT solutions for small to medium-sized enterprises (SMEs) via an extensive global partner community. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both delivery models. With award-winning technology, a competitive pricing strategy, and a strong focus on the unique requirements of SMEs, GFI satisfies the IT needs of organizations on a global scale. The company has offices in the United States (North Carolina, California and Florida), UK (London and Dundee), Austria, Australia, Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a Microsoft Gold Certified Partner. More information about GFI can be found at http://www.gfi.com. Basic security - Why purchasing antivirus, anti-spyware and a firewall is a must 7
  • 8. USA,»CANADA»AND»CENTRAL»AND»SOUTH»AMERICA GFI 1990 july11 15300 Weston Parkway, Suite 104, Cary, NC 27513, USA Telephone: +1 (888) 243-4329 Fax: +1 (919) 379-3402 ussales@gfi.com ENGLAND»AND»IRELAND Magna House, 18-32 London Road, Staines, Middlesex, TW18 4BP, UK Telephone: +44 (0) 870 770 5370 Fax: +44 (0) 870 770 5377 sales@gfi.co.uk EUROPE,»MIDDLE»EAST»AND»AFRICA GFI House, San Andrea Street, San Gwann, SGN 1612, Malta Telephone: +356 2205 2000 Fax: +356 2138 2419 sales@gfi.com AUSTRALIA»AND»NEW»ZEALAND 83 King William Road, Unley 5061, South Australia Telephone: +61 8 8273 3000 Fax: +61 8 8273 3099 sales@gfiap.com Disclaimer © 2011. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out- of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document. If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.