Experts Divided Over Death of AV Software


Intact Software Distribution MD, Lutz Blaeser

Intact Software Distribution MD, Lutz Blaeser

JOHANNESBURG – A senior information and computer technology official rejected recent declarations of the demise of antivirus (AV) software.

Lutz Blaeser, Managing Director of Intact Software Distribution, said contrary to claims Symantec Vice President Brian Dye, AV was far from dead.

Dye recently claimed that anti-virus software is dead, causing ripples in the infosec world, and a barrage of statements both in defence of this idea, and in denial.

“The bottom line is that hundreds of thousands of new malware samples are discovered each month. In fact, close on three new strands every second.

What is crucial here is the speed at which businesses can respond to new threats, and how the technologies involved actually deal with them.

“For sure, AV that relies solely on signature-based processes for rooting out malware is AV of the past, and pretty much obsolete. Today’s security products must combine proactive technologies with the traditional reactive ones, if they are to hope to protect against unknown threats,” said Blaesar.

“AV is far from dead, it remains a useful and highly effective tool against malware. Good security is all about layering, and not relying on a single technology or solution to protect your business from attackers,” Blaeser argued.

Blaeser added that top security vendors have been combining proactive and reactive technologies in their solutions for some time, and offer multi-layered security that blocks known threats, fights off the unknown ones, and prevents vulnerabilities in software from being exploited.

The fact that thorough and effective protection of the IT environment needs technologies and solutions over and above AV is not in dispute, said Blaeser.

“Data leakage prevention (DLP), intrusion prevention (IPS), encryption tools, firewalls and policy and device management systems are also vital links in the security chain.”

– CAJ News












Short URL:

Posted by on Oct 31 2014. Filed under Featured, IT Security, Technology. You can follow any responses to this entry through the RSS 2.0. You can leave a response or trackback to this entry

Connect to CAJ News on Facebook

Subscribe to our Newsletter

Photo Gallery

Log in
All material © CAJ News Africa. Material may not be published or reproduced in any form without prior written permission.