Solved

Multiple Antivirus Providers  - Corporate

Posted on 2016-10-19
2
78 Views
Last Modified: 2016-10-21
Recently I saw a suggestion on the web that corporate networks should be protected by more than one antivirus provider to reduce the risks of relying on one particular provider to identify and/or protect against new threats.

Now I’m not sure if I am right on this but I have always been under the impression that using more than 1 antivirus solution can cause issues with each one identifying the other as a virus etc.  Is this correct and if not, how common is it to use more than one provider?  Surely even if you are using two, it doesn’t guarantee you are going to identify everything.

I believe the context of what I saw was specific to antivirus scanners, rather than saying an antivirus scanner and a malware scanner are in fact two products.
0
Comment
Question by:jdc1944
2 Comments
 
LVL 53

Assisted Solution

by:McKnife
McKnife earned 250 total points
ID: 41849642
It is correct, multiple ones are better - just not when installed on the same system. So you'd have 2 different systems that scan (for example) attachments with different AV engines.
0
 
LVL 95

Accepted Solution

by:
Lee W, MVP earned 250 total points
ID: 41850757
Multiple providers generally means you have a solution on the desktop, MAYBE a separate one for the servers (if you're a larger organization this makes more sense), and AT LEAST one more used on the edge - at the firewall/router/UTM (Unified Threat Management device).  When the traffic comes through the network, it's scanned by at least one engine (at the UTM), then perhaps your mail server uses a different engine, and finally your workstation uses a different engine... And keep in mind NOTHING is perfect.  Security is a tiered approach that involves firewalls, services that perhaps filter your web browsing, DNS services that can potentially block access to infected sites, firewalls, and MOST IMPORTANTLY, USER EDUCATION.  (And there can be other things involved too!).
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now