Solved

virus and network security.

Posted on 2008-10-01
3
243 Views
Last Modified: 2013-12-04
Hi all,
I am looking for a good AV , anti-spy ware, NAC,etc for our network , we are using symantec end point and i am not happy with it for various reason , one reason is performance impact , 2nd i cant relay on this .i would like to hear from you the best choice vs dollar and easy management , any comparable products ?

thank you all.
0
Comment
Question by:Thushya
3 Comments
 
LVL 53

Expert Comment

by:McKnife
ID: 22618848
About relying on security software: don't.
Other measures are by far more effective:
-patch management for apps and windows
-restricted acounts
-blocked startup areas
-teach users what (not) to do
-maybe internet only via a hardened terminal server
-maybe a software restriction policy

If you like virus scanners more than anything of the above, lookout for a product that can be configured what to scan and configure it. But you cannot rely on it.
If you are looking for product suggestions, you should describe what you are trying to potect against what attack. I think looking for a product comparable to Sym. endpoint is not very descriptive.
0
 

Author Comment

by:Thushya
ID: 22619127
thanks for the comments , we are using endpoint from symantec , looking to go for sophos , need some help to justify I like the NAC feature from sophos , i can contol dhcp clients etc....
0
 

Accepted Solution

by:
flipmedia earned 500 total points
ID: 22622297
Please check Eset NOD32 Business  edition.Its very light weight and easy to manage.Can install the client from the server using push install technique.You will get immediate notification on the server console about threats.Update is done centrally.Satisfactory.main thing i liked about is the resouce it takes.Very very light on pc's.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
This video discusses moving either the default database or any database to a new volume.
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now