TechTarget

Antivirus systems fail to detect unknown viruses, study shows

Less than 5% of the top 40 antivirus systems are able to detect previously non-cataloged viruses initially, a study has revealed

Less than 5% of the top 40 antivirus systems are able to detect previously non-cataloged viruses initially, a study...

has revealed.

A test by security firm Imperva, which used more than 80 previously non-catalogued viruses, showed that many systems took up to a month or longer to update their signatures following the initial scan.

“Enterprise security has drawn an imaginary line with antivirus solutions, but the reality is that every single newly created virus may subvert these solutions,” said Amichai Shulman, CTO at Imperva.

“We do not believe that enterprises are achieving the value of the investment of billions of dollars in anti-virus solutions, especially when certain freeware solutions in our study outperformed paid solutions,” he said.

Imperva collected more than 80 viruses, which were tested in a virtual execution environment that the firm claims ensured they displayed behaviour indicative of viruses but limited the vulnerability to computing resources.

Enterprises are not achieving the value of investment in anti-virus solutions

Amichai Shulman, CTO, Imperva

Automated data collection runs were conducted once a week for six weeks. The key findings of the study are contained in Imperva’s November Hacker Intelligence report.

Antivirus solutions were found to have a difficult time detecting newly created viruses and many lag in updating signatures, according to the report.

In the light of the study’s findings, the report concludes that investment in antivirus is misaligned, with 2011 Gartner figures indicating that more than a third of security budgets were spent on antivirus.

While Imperva did not find a single antivirus product that provided complete protection, the products that had the best detection rates included two freeware anti-virus products.

Despite the inadequacy of antivirus solutions, Imperva does not recommend completely eliminating them from an effective security posture.

Instead, the company said security teams should focus on detecting abnormal behaviour, such as unusually fast access speeds or large volume of downloads, and adjust their security spend accordingly.


Image: Thinkstock

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close