Preface
xiv
Dr Solomon’s Anti-Virus
Information security as a business necessity
Coincidentally or not, these darkly inventive new virus attacks and speedy
propagation methods appeared as more businesses made the transition to
Internet-based information systems and electronic commerce operations. The
convenience and efficiency that the Internet brought to business saved money
and increased profits. This probably also made these same businesses
attractive targets for pranksters, the hacker underground, and those intent on
striking at their favored targets.
Previously, the chief costs from a virus attack were the time and money it took
to combat an infection and restore computer systems to working order. To
those costs the new types of virus attacks now added the costs of lost
productivity, network and server downtime, service denials for e-mail and
other critical business tools, exposure—and perhaps widespread distribution
—of confidential information, and other ills.
Ultimately, the qualifying differences between a hacker-directed security
breach in a network and a security breach that results from a virus attack
might become merely ones of intent and method, not results. Already new
attacks have shaken the foundations of Net-enabled businesses, many of
which require 24-hour availability for networks and e-mail, high data
integrity, confidential customer lists, secure credit card data and purchase
verification, reliable communications, and hundreds of other computer-aided
transactional details. The costs from these virus attacks in the digital economy
now cut directly into the bottom line.
Because they do, protecting that bottom line means implementing a total
solution for information and network security—one that includes
comprehensive anti-virus protection. It’s not enough to rely only on
desktop-based anti-virus protection, or on haphazard or ad hoc security
measures. The best defense requires sealing all potential points by which
viruses can enter or attack your network, from the firewall and gateway down
to the individual workstation, and keeping the anti-virus sentries at those
points updated and current.
Part of the solution is deploying the Dr Solomon’s Active Virus Defense*
software suite, which provides a comprehensive, multi-platform series of
defensive perimeters for your network. You can also build on that security
with the Dr Solomon’s Active Security suite, which allows you to monitor
your network against intrusions, watch actual network packet traffic, and
encrypt e-mail and network transmissions. But even with anti-virus and
security software installed, new and previously unidentified viruses will
inevitably find their way into your network. That’s where the other part of the
equation comes in: a thorough, easy-to-follow anti-virus security policy and
set of practices for your enterprise—in the last analysis, only that can help to
stop a virus attack before it becomes a virus epidemic.
Содержание DR SOLOMON S ANTI-VIRUS 8.5
Страница 1: ...Dr Solomon s Anti Virus Administrator s Guide Version 8 5 ...
Страница 146: ...Using Dr Solomon s Anti Virus Administrative Utilities 146 Dr Solomon s Anti Virus ...
Страница 166: ...Installed Files 166 Dr Solomon s Anti Virus ...
Страница 184: ...Using Dr Solomon s Anti Virus Command line Options 184 Dr Solomon s Anti Virus ...
Страница 216: ...Understanding iDAT Technology 216 Dr Solomon s Anti Virus ...