Solved

MS security essentials or other paid AV software?

Posted on 2014-04-29
4
452 Views
Last Modified: 2014-04-29
I noticed some small businesses use free MS Security essentials.  Others pay forKaspersky or similalr.
Is MS sec essentials not enough?  Why pay for other software?   They dont have anyAV distribution servers.  Is it enough for AV spyand malware?
0
Comment
Question by:Tiras25
4 Comments
 
LVL 24

Assisted Solution

by:aadih
aadih earned 167 total points
ID: 40031015
MSE provides a baseline protection. For those who practice safe browsing habits, it's sufficient.

Others may like to use a reputable free antivirus protection [starting with a: Avast, AVG, Avira, etc]. For personal use, there is no need to buy an antivirus program. It's an opinion, although based on experience. Other opinions are valid also.
0
 
LVL 23

Accepted Solution

by:
tailoreddigital earned 167 total points
ID: 40031044
aadih brought up a very important point, "For those who practice safe browsing habits, it's sufficient."

Microsoft Security Essentials has worked well for me and many clients.
One limitation though,  "Note: MSE is for home use, and for small businesses with 10 or fewer PCs."

FYI,
http://answers.microsoft.com/en-us/protect/wiki/mse-protect_start/microsoft-security-essentials-installation/e6e18776-9571-42e9-8fc0-66717dde0e19
0
 
LVL 18

Assisted Solution

by:web_tracker
web_tracker earned 166 total points
ID: 40031129
There is a commercial version of MSE, called MS Forefront Endpoint, it uses the same virus definitions and the same scanning engine as does MSE. It is designed for protecting both workstations and servers. We use it at the university where I work, protecting over 5000 computers.
0
 
LVL 53

Expert Comment

by:McKnife
ID: 40031268
By the way: on win8 win defender is a full commercial AV product which updates via wsus even and knows lots of GPOs.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Suggested Solutions

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now