Is Cloud Based Anti-Virus An Effective Means Of Security?

Is Cloud Based Anti-Virus An Effective Means Of Security?

Infographic Stats
Infographic

Is Cloud Based Anti-Virus an Effective Means of Security?

Anti-virus systems are now a de facto part of modern computing. In a world where every webpage, email and downloaded file has the potential to contain malicious code or trojan horses there is a need to be more vigilant than ever about the security of your computer and your data.

Traditionally anti-virus programs have been installed directly on a computer’s hard drive – running in the background to alert users to phishing attacks, dangerous files and other online threats. However, as the cloud computing continues to expand we are now seeing the advent of alternative methods of protection – specifically cloud-based anti-virus programs.

How does it work?

Cloud-based anti-virus typically uses lightweight software which runs on your compute while offloading the majority of data analysis to the provider’s infrastructure. This has the effect of using less of your system’s resources and reducing the likelihood of the anti-virus agent itself being compromised due to a design vulnerability.

What are its advantages?

The benefit that will most appeal to users is the always up-to-date nature of a cloud-based system. There is no requirement to ensure that virus definitions are updated before starting a full system scan because the cloud always has the most recent data, and the anti-virus will often scan suspicious files and webpages by using multiple antivirus engines ensuring that nothing slips through the net.

Another major advantage is speed – the lack of a lengthy installation process and removal of resource-heavy software means not only can a computer be scanned much faster, but the computer itself should run more smoothly than with an ‘always-on’ system running in the background.

What are its limitations?

Naturally, the biggest drawback of using a cloud-based solution is that you need to be connected to the internet to take full advantage of it. If you are not online the software cannot query the anti-virus cloud – though this can be addressed by the program storing a local cache of the most relevant queries.

Secondly, network bandwidth limitations will frequently prevent some cloud-based anti-virus software from sending the entirety of files that need to be scanned. The workaround utilised by providers is that the software will submit information about the file in question rather than the file itself – though this method could potentially be exploited by skilled hackers and cyber-criminals.

Can it replace traditional anti-virus?

There is no doubt that cloud-based anti-virus programs could be used to replace local software – but it isn’t necessarily a recommended strategy. Either way, they certainly give you a ‘second opinion’ by running in conjunction with a more traditional program.

Normal anti-virus use so much of a system’s resources that it is never recommended to install more than one at a time – especially as two local anti-viruses running at the same time could also cause system conflicts – but an online anti-virus tool that performs a quick scan of your system without running in the background shouldn’t cause any problems.

Have you used cloud-based anti-virus? Did you find them to be an effective way of protecting your machine? Let us know in the comments below.

By Daniel Price

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…