Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management

    The Enterprise Administrators Anti-Virus Bill of Rights

    By
    eWEEK EDITORS
    -
    May 28, 2012
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      1The Enterprise Administrators Anti-Virus Bill of Rights

      1

      written by Andrew Garcia; illustrated by Brian Moore

      2The Enterprise Administrators Anti-Virus Bill of Rights – Do No Harm

      2

      False positives are bad enough, but eating mission-critical files, hamstringing device drivers or serving as launch vectors for threats are absolute deal breakers for anti-virus products.

      3The Enterprise Administrators Anti-Virus Bill of Rights – Don’t Be a Pig

      3

      Administrators need to be able to control when and to what extent the computing time and resources under their care will be consumed in the name of security. As a rule, anti-virus products should never consume CPU resources unfettered, lock up disk drives

      4The Enterprise Administrators Anti-Virus Bill of Rights – Research

      4

      Since most anti-virus detection and cleaning operations are reactive processes, anti-virus companies must provide signatures that are accurate, effective and fast. Automated research capabilities are a must, and global distribution of research labs can he

      5The Enterprise Administrators Anti-Virus Bill of Rights – Management

      5

      Enterprise administrators have to be flexible with security policies, as different users working in different environments need varying levels of protection. A security solution should also interact with existing infrastructure components as much as possi

      6The Enterprise Administrators Anti-Virus Bill of Rights – Develop and Grow While Easing Future Adoption

      6

      The constantly changing threat landscape requires anti-virus solutions to evolve and adapt to new threat vectors and malware types. Administrators should expect their security solutions will evolve over time, but vendors need to grow in a way that makes s

      7The Enterprise Administrators Anti-Virus Bill of Rights – See More Slideshows Like This One

      7

      • The Best IT Advice I Ever Got
      • The Thirteen Scariest Things in IT<</body>
      PrevNext

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×