Antivirus: From Stand-Alone Product to Endpoint Feature

  /     /     /  
Publicated : 22/11/2024   Category : security


Antivirus: From Stand-Alone Product to Endpoint Feature


Endpoint experts discuss the evolution of AV and its shift from stand-alone product to a feature in broader security tools.



The endpoint security evolution is underway. Antivirus (AV) isnt dead, but its nature is changing as enterprise threats become faster, more widespread, and more complex.
Antivirus has become, to me, more of a specific feature or age moniker than a type of product intrinsically, says Mike Spanbauer, vice president of research strategy at NSS Labs. Vendors that established the AV space - McAfee, Symantec, Kaspersky Lab - have spent the past decade enhancing their platforms with new capabilities, he explains.
Spanbauer cites two reasons for the shift from standalone antivirus systems to broader endpoint detection and response (EDR): a race to innovation and more complex attacks.
Malware as a service has become more accessible, says Andrew Newman, founder and CEO of Reason Software. The ease of creating new malware has resulted in a surge of malware strains, which has rendered the use of traditional AV for analyzing and creating signatures impossible.
There are a lot more eyes looking at, and investigating, vulnerability efforts across all enterprise applications, says Spanbauer. There are more vulnerabilities discovered than ever, more sophisticated actors than weve ever seen.
What we considered antivirus two years ago has advanced well beyond what we considered traditional AV, he continues. Companies are integrating cloud mechanics and augmenting their platforms with additional features to quickly detect increasingly complex threats.
The reality is, the bad guys arent resting, either, he adds.
What are we up against?
Todays attackers are organized and well-funded, and they no longer operate alone, Forrester Research reports in its Endpoint Security Software Forecast. Between 20% and 80% of cybercrime is conducted by organized criminal groups.
However, only 46% of security decision-makers are highly concerned about an attack from non-state actors, and 43% were highly concerned about foreign government attacks.
Corporate data is a prime target. Nearly half of organizations surveyed reported at least one breach of sensitive data in the year prior, and 46% of security leaders whose businesses were hit with a breach said it targeted a corporate server. Nearly 40% said corporate-owned devices were targeted in external attacks.
Todays antivirus systems arent advanced enough to protect against these threats. They consume system resources because they have to check each new file against millions of unknown threats, and they cant protect against fileless attacks.
Traditional antivirus, and the elements of it, take up so much space, says John McClurg, vice president and ambassador at large for Cylance. It almost turns endpoints into boat anchors. Solutions leave such a large footprint, they arent viable candidates for entities that will make up the Internet of everything.
AV: New capabilities and integrations
Certainly AV isnt dead, says Newman. If you dont have AV, you have zero protection.
AV is shifting from stand-alone product to a feature in endpoint tools. It doesnt make sense to separate AV when you can have antivirus and more in one package, he notes.
Endpoint security software is poised to grow 4.5% annually over the next five years, according to Forrester. Double-digit growth is expected for both application integrity protection, and endpoint visibility and control, offsetting declines in traditional endpoint security systems.
We expect these next-gen solutions to be the main market drivers over the next five years, says Forrester senior forecast analyst Jennifer Adams. While typically more expensive than traditional anti-malware, these newer products are more effective and limit the burden on system resources.
Michael Fey, president and COO at Symantec, says future systems will not be focused on defending against one particular attack vector. Defense will cover each endpoint and all of its assets, taking into account each organizations needs and characteristics.
When you think about endpoint protection, good businesses see it as part of their layered defense model, Fey explains. Businesses that are challenged see it as a checkbox. Theyre not using new solutions or leveraging what advanced vendors have built.
While signatures can be efficient, accurate, and lightweight, he continues, machine learning and artificial intelligence can futureproof your environment by identifying whats good and bad. They will integrate with host-based firewalls and detection technologies to deliver both a safe environment and positive end-user experience. You have to walk a fine line to bridge the two in a way that users get what they need and administrators can operate, he adds.
Both machine learning and AI will eliminate the human-intensive process of evaluating and collecting data, McClurg notes. The process of testing, ensuring there are no false positives, is a time-consuming process that often leaves the door open for adversaries.
Every enterprise I talk to is keenly interested to know how effective what they have is, says NSS Labs Spanbauer. Anyone who is cyber-insured, or business risk-insured, will have comprehensive desktop protection, he adds.
Were not at a perfect state, he continues. There is always room for improvement, whether its in terms of time to protection or time to detection, and being able to discover in as close to real-time as possible. Detecting at machine speed, as opposed to human speed, will be key.
Tying it all together
Just how these capabilities will integrate is unclear.
Over the last three years, there have been a lot of impressive and innovative efforts to trying to solve this problem, says Spanbauer, who anticipates a future in which vendors take steps to partner and drive organic system integration.
For example, EDR could simplify the process of consuming and sending data to SIEM, behavioral analytics, and security analytics systems. The endpoint could directly feed an active security control, by proxy of the cloud or another method that aggregates network insight.
Integration is one of the keys to successfully protecting tomorrows enterprise, he says, adding, I wish it were easy. He advises businesses to understand their current gaps and know where they stand in relation to the cybersecurity framework.
Some current antivirus products are free, bundled with other tools; others are offered as a broader service. Newman believes the key will be to run antivirus at the lowest level of the operating system; at the lowest level of hardware.
Its going to take time to get there, he says. Within ten years, certainly. Microsoft and hardware vendors will be key players in building antivirus into machines, he notes.
Symantecs Fey anticipates vendors will combine protection, detection, and response capabilities into holistic offerings to simplify the implementation process. Customers dont want to run more agents than they have to, he explains. They only do it today where its absolutely required … they want to deliver the whole product family in an endpoint protection suite.
How will you buy it?
The endpoint security market is still experimenting with new ideas for how companies will purchase new systems and capabilities. Most are comfortable with the annualized or desktop model, says NSS Labs Spanbauer, and its unclear whether one answer will be right.
There hasnt been a major reset yet on endpoint protection pricing relative to the established or heritage vendors today, he explains. New vendors may price differently. If a business buys three endpoint tools from one vendor, or two vendors with a strong partnership, what is the discount value? It will depend on an organizations individual needs, he says.
Forrester data indicates new endpoint protection tools will be expensive. Application whitelisting will cost $20 to $50 per endpoint, and application integrity protection could amount to $60 per endpoint, per year. Traditional antimalware tools cost $10 to $25 per endpoint, per year and could be much less - as low as $5 per year - for large businesses.
Related Content:
Macs Biggest Threats Lurk in the Apple App Store
Phish Bait: DMARC Adoption Failures Leave Companies Exposed
9 of the Biggest Bug Bounty Programs
ROPEMAKER Attack Turns Benign Emails Hostile Post-Delivery

Last News

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Antivirus: From Stand-Alone Product to Endpoint Feature