{"id":21448,"date":"2012-12-04T19:01:49","date_gmt":"2012-12-05T00:01:49","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2022-08-26T15:33:07","modified_gmt":"2022-08-26T19:33:07","slug":"is-cloud-based-anti-virus-ready","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/is-cloud-based-anti-virus-ready\/","title":{"rendered":"Is Cloud-Based Anti-Virus Ready?"},"content":{"rendered":"<p><a href=\"https:\/\/www.datacenterknowledge.com\/archives\/2013\/08\/05\/nasdaq-finqloud-host-cloud-powered-compliance\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-108928\" title=\"Is Cloud-Based Anti-Virus Ready?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cloud_storage.jpg?resize=120%2C85&#038;ssl=1\" alt=\"Is Cloud-Based Anti-Virus Ready?\" width=\"120\" height=\"85\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cloud_storage.jpg?resize=150%2C106&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cloud_storage.jpg?resize=75%2C53&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cloud_storage.jpg?w=470&amp;ssl=1 470w\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" \/><\/a><strong>Cloud computing<\/strong> technology is one of the most <strong>disruptive technologies<\/strong> in recent history. <a title=\"Xath Cruz\" href=\"http:\/\/web.archive.org\/web\/20140209173137\/http:\/\/cloudtimes.org\/author\/xcruz\/\" target=\"_blank\" rel=\"noopener noreferrer\">Xath Cruz<\/a> at <em><a title=\"CloudTimes\" href=\"http:\/\/cloudtimes.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">CloudTimes<\/a><\/em> argues in a recent article that cloud computing is also <strong>disrupting security software<\/strong> such as anti-virus and he asks h<strong>ow effective are cloud-based anti-viruses<\/strong>?<\/p>\n<p><a href=\"https:\/\/www.dublin.k12.ca.us\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-108930\" title=\"malware\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-19-e1571004344282.jpg?resize=102%2C90&#038;ssl=1\" alt=\"malware\" width=\"102\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-19-e1571004344282.jpg?w=116&amp;ssl=1 116w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-19-e1571004344282.jpg?resize=75%2C66&amp;ssl=1 75w\" sizes=\"auto, (max-width: 102px) 100vw, 102px\" \/><\/a>The article, <a title=\"How Effective are Cloud-Based Anti-Viruses?\" href=\"http:\/\/cloudtimes.org\/2012\/11\/09\/how-effective-cloud-anti-virus\/\" target=\"_blank\" rel=\"noopener noreferrer\">How Effective are Cloud-Based Anti-Viruses?<\/a> claims the demand for cloud-based anti-virus software has gone up steadily as more cloud-dependent computing devices have invaded the market. Cloud-dependent computing devices like <a title=\"iPad\" href=\"http:\/\/www.apple.com\/ipad\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">iPads<\/a>, <a title=\"Nook\" href=\"https:\/\/web.archive.org\/web\/20150628190813\/http:\/\/www.barnesandnoble.com:80\/u\/nook\/379003208\" target=\"_blank\" rel=\"noopener noreferrer\">Nooks<\/a>, <a title=\"iPhone\" href=\"http:\/\/www.apple.com\/iphone\" target=\"_blank\" rel=\"homepage noopener noreferrer\">iPhones<\/a>, and <a title=\"Galaxy\" href=\"http:\/\/www.samsung.com\/global\/galaxys3\/\" target=\"_blank\" rel=\"noopener noreferrer\">Galaxy&#8217;s<\/a> are as susceptible to malware as their big desktop brethren.<\/p>\n<p>In order to fight the malware threats to cloud-dependent computing devices, cloud-based anti-virus has evolved.\u00a0 <a title=\"Cloud computing\" href=\"https:\/\/en.wikipedia.org\/wiki\/Cloud_computing\" target=\"_blank\" rel=\"noopener noreferrer\">Cloud based<\/a> anti-virus works differently than popular cloud-based document editors like <a title=\"Google Docs\" href=\"http:\/\/docs.google.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Google Docs<\/a>, where you only need a web browser and internet access. The blog post explains that cloud-based anti-virus software can\u2019t function if it\u2019s only in the cloud, since your PC won\u2019t easily give the right kind of administrative access needed by antivirus software to programs hosted remotely, as that would leave your PC at risk of being intruded upon by other programs.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-108932 size-thumbnail\" title=\"small native app that runs on the device\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/3gears.gif?resize=75%2C71&#038;ssl=1\" alt=\"small native app that runs on the device\" width=\"75\" height=\"71\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/3gears.gif?resize=75%2C71&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/3gears.gif?resize=150%2C143&amp;ssl=1 150w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/>In order to protect a PC, tablet, or smartphone, a cloud-based anti-virus software requires a small native app to run on the device. When downloaded, the app acts as the anti-virus, with its database and heuristics data being hosted on the cloud. There is also cloud-based anti-virus software that use web browser extensions or Active X and Java to gain proper access to your PC.<\/p>\n<p>Like any technology, cloud-based antivirus software has specific pros and cons when compared to native anti-virus suites, Mr. Cruz lays out some of the pros and cons of cloud-based anti-virus:<\/p>\n<h3>Cloud advantages<\/h3>\n<p><a href=\"http:\/\/www.fedtechmagazine.com\/article\/2013\/03\/government-wants-your-input-mobile-apps\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-108934\" title=\"cloud based anti-virus\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cloud_antivirus.png?resize=100%2C100&#038;ssl=1\" alt=\"cloud based anti-virus\" width=\"100\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cloud_antivirus.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cloud_antivirus.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cloud_antivirus.png?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>1. No Installation Required \u2013 The first advantage of cloud-based anti-virus is that there\u2019s no need to install them on your PC. Cloud-based anti-virus does not eat up hard disk space, with its storage and memory footprint being a fraction of what local anti-virus need. Additionally, you can get them up and running immediately, and there\u2019s no likelihood of messing up the installation (which usually results in a non-working antivirus or corrupted file volume).<\/p>\n<p>2. No Updating Necessary \u2013\u00a0 With cloud-based anti-virus, there is no need to update data files, since it\u2019s hosted on the cloud, and will automatically be patched or updated by the provider. This will offer the latest in protection when it becomes available.<\/p>\n<p>3. Double Security Layer \u2013 With cloud-based anti-virus software, it is possible to run a locally installed anti-malware app and run another different cloud-based antivirus without worrying about conflicts or PC slowdown. Different anti-virus software are better able to catch or inoculate different viruses.<\/p>\n<p><a href=\"https:\/\/techbuddha.wordpress.com\/2008\/11\/03\/cloud-computing-swarm-intelligence-and-security-in-a-distributed-world\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-108936\" title=\"collective intelligence\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/swarm-of-bees.jpg?resize=98%2C100&#038;ssl=1\" alt=\"collective intelligence\" width=\"98\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/swarm-of-bees.jpg?resize=148%2C150&amp;ssl=1 148w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/swarm-of-bees.jpg?w=374&amp;ssl=1 374w\" sizes=\"auto, (max-width: 98px) 100vw, 98px\" \/><\/a>4. An advantage of cloud-based anti-virus software the author missed is collective or community intelligence. <a href=\"http:\/\/searchsecurity.techtarget.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>SearchSecurity<\/em><\/a> <a title=\"Enterprise antivirus comparison: Is cloud-based antivirus better?\" href=\"http:\/\/searchsecurity.techtarget.com\/answer\/Enterprise-antivirus-comparison-Is-cloud-based-antivirus-better\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that when a system identifies malware, it&#8217;s able to give feedback to the cloud anti-malware provider, thus providing a wider surface area for rapidly detecting 0-day attacks.<\/p>\n<h3>Cloud disadvantages<\/h3>\n<p>1. Won\u2019t Run in the Background &#8211; Cloud-based anti-viruses are not effective against viruses that run on startup. Cloud-based anti-viruses are not TSR (terminate and stay resident) programs and only run on an as-needed basis.<\/p>\n<p>2. Limited Scan \u2013 Cloud-based anti-viruses risk missing dormant viruses in unopened or archived files. Windows\u2019 security protocols will prevent some cloud anti-viruses from scanning the computer. They will only be able to scan core windows files and what\u2019s currently loaded in the memory.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20200928093403\/https:\/\/www.avalan.com\/blog\/bid\/395400\/All-about-the-Ethernet\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-108939\" title=\"Network connection\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ethernet-3-e1571004526504-150x116.jpg?resize=116%2C90&#038;ssl=1\" alt=\"Network connection\" width=\"116\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ethernet-3-e1571004526504.jpg?resize=150%2C116&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ethernet-3-e1571004526504.jpg?resize=75%2C58&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ethernet-3-e1571004526504.jpg?w=481&amp;ssl=1 481w\" sizes=\"auto, (max-width: 116px) 100vw, 116px\" \/><\/a>3. It Requires an Internet Connection \u2013 Cloud-based anti-virus is useless without access to the Internet. This is a problem for portable device users who can\u2019t be connected 24&#215;7. Without an Internet connection viruses will be free to do whatever they want.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>The author concludes for the best protection your PC can get, you need to use the services of both a locally installed anti-virus software and a cloud-based one.<\/em><\/p>\n<div>\n<p><em>The main concern I have about cloud-based anti-virus apps is downtime. Cloud providers like <a title=\"Microsoft's Azure cloud down and out for 8 hours\" href=\"http:\/\/www.theregister.co.uk\/2012\/02\/29\/windows_azure_outage\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a>, <a title=\"Storm Knocks Out Amazon\u2019s Power, Taking Down Instagram, Netflix, Pinterest\" href=\"https:\/\/web.archive.org\/web\/20220105085946\/https:\/\/allthingsd.com\/20120630\/storm-knocks-out-amazons-power-taking-down-instagram-netflix-pinterest\/\" target=\"_blank\" rel=\"noopener noreferrer\">Amazon<\/a>, and <a title=\"Amazon\u2019s Cloud Is Down Again, Taking Heroku and GitHub With It\" href=\"https:\/\/web.archive.org\/web\/20220127183619\/https:\/\/allthingsd.com\/20121022\/amazons-cloud-is-down-again-taking-heroku-and-github-with-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">Amazon<\/a> have had issues lately providing their services. Downtime at the upstream ISP on the LAN can also play havoc with cloud-based anti-malware apps.<\/em><\/p>\n<\/div>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20130518023904\/http:\/\/www.webroot.com:80\/En_US\/business\/articles\/why-you-should-rethink-your-endpoint-security-strategies-part-i\" target=\"_blank\" rel=\"noopener noreferrer\">Why You Should Rethink Your Endpoint Security Strategies Part I<\/a> (webroot.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Demand for cloud-based anti-virus software has grown as cloud-dependent devices have proven as susceptible to malware as their desktop brethren<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,420,565,101,173,1794,536,92,296,304,4],"class_list":["post-21448","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-aapl","tag-anti-virus","tag-apple","tag-cloud-computing","tag-docs","tag-goog","tag-google","tag-ipad","tag-iphone","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/21448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=21448"}],"version-history":[{"count":11,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/21448\/revisions"}],"predecessor-version":[{"id":130969,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/21448\/revisions\/130969"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=21448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=21448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=21448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}