The antivirus software industry is dead and has been for quite some time, and the antimalware software industry it has become is struggling to keep pace with the technology, sophistication and motivation of attackers and their methodologies.
Host-based, signature-driven technologies are outdated and for the most part abandoned as a viable long-term strategy by most vendors. Polymorphic or adaptive malware simply obfuscates or prevents signature detection outright, and the positioning of where the solutions are located becomes equally as problematic given the attack vectors and propagation techniques used.
Future antimalware software solutions will be based upon a distributed and multi-tiered deployment from the "cloud" to the endpoint. This means that telemetry and behavioral analytics are exchanged between all elements of the collective "network" of communities of interest to provide both detective and preventative capabilities.
Intelligent monitoring and correlation across not only antimalware software platforms, but any and all networked elements, will be critical in the evolution of detecting, isolating and mitigating the onslaught. Further, as attacks become more targeted and focused on not only the exploitation but also the extraction of information, decisions on content in context will also be required.
Ultimately, this telemetry will be gathered, normalized and shared collectively amongst participants and vendor pools in what Yankee Group analyst Andy Jaquith calls "the herd."
The precursor to the evolution of this sort of advanced distributed sensor network is the honeynet, which gathers data on the attack methodologies and vectors used by attackers and this information is then used to shore up defenses accordingly.
Dig Deeper on Cybersecurity risk assessment and management
Related Q&A from Christofer Hoff
Data leakage prevention (DLP) has become a feature of much larger information-centric lifecycle management suites of large companies with expansive ... Continue Reading
Learn why many security vendors are offering SMB security products – and how UTM is a result of this trend. Continue Reading
Learn about the architectural and security ramifications of virtualization and discover how to discuss virtual security with your customers. To ... Continue Reading