The Enterprise Administrators Anti-Virus Bill of Rights

1
2
3
4
5
6
7
1 of 7

The Enterprise Administrators Anti-Virus Bill of Rights

written by Andrew Garcia; illustrated by Brian Moore

2 of 7

The Enterprise Administrators Anti-Virus Bill of Rights - Do No Harm

False positives are bad enough, but eating mission-critical files, hamstringing device drivers or serving as launch vectors for threats are absolute deal breakers for anti-virus products.

3 of 7

The Enterprise Administrators Anti-Virus Bill of Rights - Don't Be a Pig

Administrators need to be able to control when and to what extent the computing time and resources under their care will be consumed in the name of security. As a rule, anti-virus products should never consume CPU resources unfettered, lock up disk drives

4 of 7

The Enterprise Administrators Anti-Virus Bill of Rights - Research

Since most anti-virus detection and cleaning operations are reactive processes, anti-virus companies must provide signatures that are accurate, effective and fast. Automated research capabilities are a must, and global distribution of research labs can he

5 of 7

The Enterprise Administrators Anti-Virus Bill of Rights - Management

Enterprise administrators have to be flexible with security policies, as different users working in different environments need varying levels of protection. A security solution should also interact with existing infrastructure components as much as possi

6 of 7

The Enterprise Administrators Anti-Virus Bill of Rights - Develop and Grow While Easing Future Adoption

The constantly changing threat landscape requires anti-virus solutions to evolve and adapt to new threat vectors and malware types. Administrators should expect their security solutions will evolve over time, but vendors need to grow in a way that makes s

7 of 7

The Enterprise Administrators Anti-Virus Bill of Rights - See More Slideshows Like This One

The Best IT Advice I Ever Got The Thirteen Scariest Things in IT<</body>

Top White Papers and Webcasts