[go: nahoru, domu]

Antivirus software: Difference between revisions

Content deleted Content added
m Reverted edit by 172.58.123.36 (talk) to last version by Kku
→‎2014–present: market monopolization: The previous wording for "monopolization" was "consolidation": a clear cybersecurity attack on civic human intelligibility.
Tag: Reverted
Line 131:
In 2011, [[AVG (software)|AVG]] introduced a similar cloud service, called Protective Cloud Technology.<ref>{{cite web|url=http://www.avgsecurity.co.za/technology-overview |title=TECHNOLOGY OVERVIEW |website=AVG Security |access-date=February 16, 2015 |url-status=dead |archive-url=https://web.archive.org/web/20150602055929/http://www.avgsecurity.co.za/technology-overview |archive-date=June 2, 2015}}</ref>
 
=== 2014–present: riseunbalanced of next-genautomation, market consolidationmonopolization ===
Following the 2013 release of the APT 1 report from [[Mandiant]], the industry has seen a shift towards signature-less approaches to the problem capable of detecting and mitigating [[Zero-day (computing)|zero-day attacks]].<ref>{{cite magazine|url=https://www.wired.com/story/mysterious-return-of-years-old-chinese-malware-apt1/|title=The Mysterious Return of Years-Old Chinese Malware|magazine=Wired|date=18 October 2018|access-date=16 June 2019|via=www.wired.com|last1=Barrett|first1=Brian}}</ref> Numerous approaches to address these new forms of threats have appeared, including behavioral detection, artificial intelligence, machine learning, and cloud-based file detonation. According to Gartner, it is expected the rise of new entrants, such [[VMware Carbon Black|Carbon Black]], [[Cylance]] and [[CrowdStrike|Crowdstrike]] will force EPP incumbents into a new phase of innovation and acquisition.<ref>{{cite web|url=https://www.gartner.com/doc/reprints?id=1-2XXIZ8F|title=Magic Quadrant Endpoint Protection Platforms 2016|publisher=Gartner Research}}</ref> One method from [[Bromium]] involves micro-virtualization to protect desktops from malicious code execution initiated by the end user. Another approach from [[SentinelOne]] and [[Carbon Black (company)|Carbon Black]] focuses on behavioral detection by building a full context around every process execution path in real time,<ref name="NetworkWorld">{{cite web|url=http://www.networkworld.com/article/2466793/security0/start-up-offers-up-endpoint-detection-and-response-for-behavior-based-malware-detection.html|title=Start-up offers up endpoint detection and response for behavior-based malware detection|first=Ellen|last=Messmer|publisher=networkworld.com|url-status=live|archive-url=https://web.archive.org/web/20150205023309/http://www.networkworld.com/article/2466793/security0/start-up-offers-up-endpoint-detection-and-response-for-behavior-based-malware-detection.html|archive-date=February 5, 2015|date=2014-08-20}}</ref><ref name="HSToday.US">{{cite web|url=http://www.hstoday.us/briefings/industry-news/single-article/bromium-research-reveals-insecurity-in-existing-endpoint-malware-protection-deployments/05ccfa234d62872b3d3a5422f2cbd4bd.html|title=Homeland Security Today: Bromium Research Reveals Insecurity in Existing Endpoint Malware Protection Deployments|url-status=live|archive-url=https://web.archive.org/web/20150924031641/http://www.hstoday.us/briefings/industry-news/single-article/bromium-research-reveals-insecurity-in-existing-endpoint-malware-protection-deployments/05ccfa234d62872b3d3a5422f2cbd4bd.html|archive-date=September 24, 2015}}</ref> while [[Cylance Inc.|Cylance]] leverages an artificial intelligence model based on machine learning.<ref>{{Cite news|url=https://www.forbes.com/sites/thomasbrewster/2016/07/06/duelling-unicorns-crowdstrike-vs-cylance-in-brutal-battle-to-knock-hackers-out/#9cd0a3b12114|title=Duelling Unicorns: CrowdStrike Vs. Cylance In Brutal Battle To Knock Hackers Out|work=Forbes|date=July 6, 2016|url-status=live|archive-url=https://web.archive.org/web/20160911015121/http://www.forbes.com/sites/thomasbrewster/2016/07/06/duelling-unicorns-crowdstrike-vs-cylance-in-brutal-battle-to-knock-hackers-out/#9cd0a3b12114|archive-date=September 11, 2016}}</ref> Increasingly, these signature-less approaches have been defined by the media and analyst firms as "next-generation" antivirus<ref>{{Cite news|url=http://thevarguy.com/blog/anti-virus-dead-shift-toward-next-gen-endpoints|title=Is Anti-virus Dead? The Shift Toward Next-Gen Endpoints|last=Potter|first=Davitt|date=June 9, 2016|url-status=live|archive-url=https://web.archive.org/web/20161220093921/http://thevarguy.com/blog/anti-virus-dead-shift-toward-next-gen-endpoints|archive-date=December 20, 2016}}</ref> and are seeing rapid market adoption as certified antivirus replacement technologies by firms such as Coalfire and DirectDefense.<ref>{{cite web|url=https://www.cylance.com/cylanceprotect-achieves-hipaa-security-rule-compliance-certification|title=CylancePROTECT® Achieves HIPAA Security Rule Compliance Certification|publisher=Cylance|url-status=dead|archive-url=https://web.archive.org/web/20161022023812/https://www.cylance.com/cylanceprotect-achieves-hipaa-security-rule-compliance-certification|archive-date=October 22, 2016|access-date=October 21, 2016}}</ref> In response, traditional antivirus vendors such as [[Trend Micro]],<ref>{{cite web|url=http://www.trendmicro.com/us/business/xgen/index.html?cm_mmc=VURL:www.trendmicro.com-_-VURL-_-/xgen/index.html-_-vanity|title=Trend Micro-XGen|date=October 18, 2016|publisher=Trend Micro|url-status=live|archive-url=https://web.archive.org/web/20161221074459/http://www.trendmicro.com/us/business/xgen/index.html?cm_mmc=VURL%3Awww.trendmicro.com-_-VURL-_-%2Fxgen%2Findex.html-_-vanity|archive-date=December 21, 2016}}</ref> [[NortonLifeLock|Symantec]] and [[Sophos]]<ref>{{cite web|url=https://www.sophos.com/en-us/products/endpoint-antivirus.aspx|title=Next-Gen Endpoint|publisher=Sophos|url-status=live|archive-url=https://web.archive.org/web/20161106204530/https://www.sophos.com/en-us/products/endpoint-antivirus.aspx|archive-date=November 6, 2016}}</ref> have responded by incorporating "next-gen" offerings into their portfolios as analyst firms such as [[Forrester Research|Forrester]] and [[Gartner]] have called traditional signature-based antivirus "ineffective" and "outdated".<ref>[https://www.forrester.com/report/The+Forrester+Wave+Endpoint+Security+Suites+Q4+2016/-/E-RES113145 The Forrester Wave™: Endpoint Security Suites, Q4 2016] {{webarchive|url=https://web.archive.org/web/20161022024840/https://www.forrester.com/report/The+Forrester+Wave+Endpoint+Security+Suites+Q4+2016/-/E-RES113145 |date=October 22, 2016}}. Forrester.com (October 19, 2016). Retrieved on 2017-01-03.</ref>
 
As of [[Windows 8]], Windows includes its own free antivirus protection under the [[Windows Defender]] brand. Despite bad detection scores in its early days, AV-Test now certifies Defender as one of its top products.<ref>{{Cite web |author1=Paul Wagenseil |date=2016-05-25 |title=Is Windows Defender Good Enough? Not Yet |url=https://www.tomsguide.com/us/avoid-windows-defender,news-22729.html |access-date=2023-12-18 |website=Tom's Guide |language=en}}</ref><ref>{{Cite web |title=Test antivirus software for Windows 11 - October 2023 |url=https://www.av-test.org/en/antivirus/home-windows/ |access-date=2023-12-18 |website=www.av-test.org |language=en-US}}</ref> While it isn't publicly known how the inclusion of antivirus software in Windows affected antivirus sales, Google search traffic for antivirus has declined significantly since 2010.<ref>{{Cite web |title=Google Trends |url=https://trends.google.com/trends/explore?date=all&q=antivirus&hl=en |access-date=2023-12-18 |website=Google Trends |language=en-US}}</ref>
 
Since 2016, there has been a notableworryisome amount of consolidationmonopolization in the industry. [[Avast]] purchased [[AVG AntiVirus|AVG]] in 2016 for $1.3 billion.<ref>{{Cite web |title=Avast Announces Agreement to Acquire AVG for $1.3B |url=https://press.avast.com/avast-announces-agreement-to-acquire-avg-for-13b |access-date=2023-12-18 |website=Avast Announces Agreement to Acquire AVG for $1.3B |language=en}}</ref> [[Avira]] was acquired by [[Norton AntiVirus|Norton]] owner [[Gen Digital]] (then NortonLifeLock) in 2020 for $360 million.<ref>{{Cite web |last=Lunden |first=Ingrid |date=2020-12-07 |title=NortonLifeLock acquires Avira in $360M all-cash deal, 8 months after Avira was acquired for $180M |url=https://techcrunch.com/2020/12/07/nortonlifelock-acquires-avira-in-360m-all-cash-deal-8-months-after-avira-was-acquired-for-180m/ |access-date=2023-12-18 |website=TechCrunch |language=en-US}}</ref> In 2021, the Avira division of Gen Digital acquired BullGuard.<ref>{{Cite web |author1=Daniel Todd |date=2022-02-07 |title=BullGuard to drop name in favour of Norton branding |url=https://www.itpro.com/business/business-strategy/367111/bullguard-to-drop-name-in-favour-of-norton-branding |access-date=2023-12-18 |website=channelpro |language=en}}</ref> The BullGuard brand was discontinued in 2022 and its customers were migrated to Norton. In 2022, Gen Digital acquired Avast, effectively consolidating four major antivirus brands under one owner.<ref>{{Cite web |title=NortonLifeLock Completes Merger with Avast |url=https://press.avast.com/nortonlifelock-completes-merger-with-avast |access-date=2023-12-18 |website=NortonLifeLock Completes Merger with Avast |language=en}}</ref>
 
== Identification methods ==