A white paper published by McAfee in 2005. All citations and credits for any part or content should be for McAfee. McAfee however holds no liability for any thing in this blog since this blog is created by a third party without their express consent. This blog is created for academic purposes only.

Monday, September 27, 2010

Summary

The solution to the much publicized threat from malicious software viruses has materialized in the form of anti-virus software and anti-spyware that counters viruses and spyware programs as they are identified within infected files or as they transit thru a network.

However, the simple name “anti-virus” (commonly known as AV) does not properly convey the total protection that most anti-virus solutions now provide. Varying levels of anti-virus protection can now be provided, the extent of the protection being offered being dependant upon the size and importance of the network equipment being protected.

At the edge of the network, enterprise desktop and commercial/ retail anti-virus solutions targeted at residential end users now seek to provide a more general level of support to counter the effects of most of the malicious virus software, including worms and Trojan horses (which carry PUPs/spyware).

In the core of network, dedicated security appliances may be implemented to protect network assets from individual specific threats; for example, a Web server may be protected by a dedicated Web-server protection appliance, or company e-mails may be scanned for viruses and other forms of malware at the point of ingress by a dedicated, managed-mail security appliance.