Desktop Anti-Spyware Doesn't Cut It, Survey Says - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News
News
3/14/2005
02:29 PM
50%
50%

Desktop Anti-Spyware Doesn't Cut It, Survey Says

Desktop defenses against spyware are ineffective, says a survey, an opinion backed by a security analyst wired into the identity-theft scene.

Desktop defenses against spyware are ineffective, said a survey released Monday, an opinion backed by a security analyst wired into the identity theft scene.

Security appliance maker Blue Coat polled more than 300 IT professionals whose companies are using desktop-based anti-spyware solutions from vendors such as Computer Associates, Webroot, Symantec, Lavasoft, Microsoft, and Spybot, and found that nearly three out of four reported that current programs "are ineffective in preventing spyware from infecting their networks."

The survey, which was conducted last month and included IT managers from around the world working in small-, medium-, and large-sized enterprises, also found that spyware was becoming an ever-bigger blight. Eight-four percent of those surveyed said that the spyware problem is worse, or at best the same, as it was three months ago.

Although one would expect such results from a poll done by a vendor that sells gateway, not end-point, anti-spyware products, Gartner research director Avivah Litan seconded Blue Coat's motion that today's desktop defenses are not the ultimate solution for the spyware dilemma.

"The lack of effectiveness comes from the fact that many [programs] are signature based," she said, referring to the one-one-one digital fingerprints that anti-spyware, like their anti-virus cousins, must create to detect and then delete each new instance of spyware. "There's a latency issue there, a break between when new spyware appears and a signature's created."

Instead, said Litan, the wave of the future -- spyware defense-wise -- will be behavioral-based defenses. Rather than scan each file and try to match it to an anti-spyware signature, this kind of guardian looks at the behavior of both suspect software and the PC as a whole. "Software that looks for unusual behavior, such as specific open ports or a process that's logging keystrokes or programs that are trying to hide, is much more effective than signature-based anti-spyware," she said.

WholeSecurity, added Litan, is one of the leaders in the behavior-style category, but other vendors are getting themselves in gear, too. "Others are trying to move that way as quickly as they can."

WholeSecurity last month launched a program to share information about phishing attacks -- which are increasingly using spyware to snatch identities -- with the help of such corporate titans as Microsoft, eBay, PayPal, and Visa.

Blue Coat's poll also showed that a majority of IT pros recreate systems as a way to purge spyware.

Seventy-four percent re-imaged some or all of their desktops, even though they had desktop anti-spyware software installed, as a way to completely clean infected systems. (It's common, for instance, that one desktop anti-spyware product misses some spyware that rivals catch, and vice versa, the root of the advice by many experts to use multiple anti-spyware solutions.)

In fact, about one out of every eight enterprise IT managers polled said that they re-image all their spyware-infected desktops as a matter of course.

"Most anti-spyware software is reactive," said Litan. "That doesn't mean it's totally ineffective, but [defensive] software does need to get more intelligent."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
2020 State of DevOps Report
2020 State of DevOps Report
Download this report today to learn more about the key tools and technologies being utilized, and how organizations deal with the cultural and process changes that DevOps brings. The report also examines the barriers organizations face, as well as the rewards from DevOps including faster application delivery, higher quality products, and quicker recovery from errors in production.
News
The State of Chatbots: Pandemic Edition
Jessica Davis, Senior Editor, Enterprise Apps,  9/10/2020
Commentary
Deloitte on Cloud, the Edge, and Enterprise Expectations
Joao-Pierre S. Ruth, Senior Writer,  9/14/2020
Slideshows
Data Science: How the Pandemic Has Affected 10 Popular Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  9/9/2020
Register for InformationWeek Newsletters
Video
Current Issue
IT Automation Transforms Network Management
In this special report we will examine the layers of automation and orchestration in IT operations, and how they can provide high availability and greater scale for modern applications and business demands.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll