The antivirus software industry is dead and has been for quite some time, and the antimalware software industry...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
it has become is struggling to keep pace with the technology, sophistication and motivation of attackers and their methodologies.
Host-based, signature-driven technologies are outdated and for the most part abandoned as a viable long-term strategy by most vendors. Polymorphic or adaptive malware simply obfuscates or prevents signature detection outright, and the positioning of where the solutions are located becomes equally as problematic given the attack vectors and propagation techniques used.
Future antimalware software solutions will be based upon a distributed and multi-tiered deployment from the "cloud" to the endpoint. This means that telemetry and behavioral analytics are exchanged between all elements of the collective "network" of communities of interest to provide both detective and preventative capabilities.
Intelligent monitoring and correlation across not only antimalware software platforms, but any and all networked elements, will be critical in the evolution of detecting, isolating and mitigating the onslaught. Further, as attacks become more targeted and focused on not only the exploitation but also the extraction of information, decisions on content in context will also be required.
Ultimately, this telemetry will be gathered, normalized and shared collectively amongst participants and vendor pools in what Yankee Group analyst Andy Jaquith calls "the herd."
The precursor to the evolution of this sort of advanced distributed sensor network is the honeynet, which gathers data on the attack methodologies and vectors used by attackers and this information is then used to shore up defenses accordingly.
Dig Deeper on Threat management and prevention
Related Q&A from Christofer Hoff
Learn why companies that place too much emphasis on security regulatory compliance run the risk of neglecting a full-orbed structured assessment ...continue reading
Data leakage prevention (DLP) has become a feature of much larger information-centric lifecycle management suites of large companies with expansive ...continue reading
Learn why the upcoming changes to the Payment Card Industry Data Security Standard (PCI-DSS), designed to prevent further corporate data breaches, ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.