Is Cloud Based Anti-Virus An Effective Means Of Security?

Advertise on CloudTweaks
Infographic Stats
Infographic

Is Cloud Based Anti-Virus an Effective Means of Security?

Anti-virus systems are now a de facto part of modern computing. In a world where every webpage, email and downloaded file has the potential to contain malicious code or trojan horses there is a need to be more vigilant than ever about the security of your computer and your data.

Traditionally anti-virus programs have been installed directly on a computer’s hard drive – running in the background to alert users to phishing attacks, dangerous files and other online threats. However, as the cloud computing continues to expand we are now seeing the advent of alternative methods of protection – specifically cloud-based anti-virus programs.

How does it work?

Cloud-based anti-virus typically uses lightweight software which runs on your compute while offloading the majority of data analysis to the provider’s infrastructure. This has the effect of using less of your system’s resources and reducing the likelihood of the anti-virus agent itself being compromised due to a design vulnerability.

What are its advantages?

The benefit that will most appeal to users is the always up-to-date nature of a cloud-based system. There is no requirement to ensure that virus definitions are updated before starting a full system scan because the cloud always has the most recent data, and the anti-virus will often scan suspicious files and webpages by using multiple antivirus engines ensuring that nothing slips through the net.

Another major advantage is speed – the lack of a lengthy installation process and removal of resource-heavy software means not only can a computer be scanned much faster, but the computer itself should run more smoothly than with an ‘always-on’ system running in the background.

What are its limitations?

Naturally, the biggest drawback of using a cloud-based solution is that you need to be connected to the internet to take full advantage of it. If you are not online the software cannot query the anti-virus cloud – though this can be addressed by the program storing a local cache of the most relevant queries.

Secondly, network bandwidth limitations will frequently prevent some cloud-based anti-virus software from sending the entirety of files that need to be scanned. The workaround utilised by providers is that the software will submit information about the file in question rather than the file itself – though this method could potentially be exploited by skilled hackers and cyber-criminals.

Can it replace traditional anti-virus?

There is no doubt that cloud-based anti-virus programs could be used to replace local software – but it isn’t necessarily a recommended strategy. Either way, they certainly give you a ‘second opinion’ by running in conjunction with a more traditional program.

Normal anti-virus use so much of a system’s resources that it is never recommended to install more than one at a time – especially as two local anti-viruses running at the same time could also cause system conflicts – but an online anti-virus tool that performs a quick scan of your system without running in the background shouldn’t cause any problems.

Have you used cloud-based anti-virus? Did you find them to be an effective way of protecting your machine? Let us know in the comments below.

By Daniel Price

Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

CONTRIBUTORS

Are You Doing Enough To Protect Your Business From Ransomware? Probably Not

Are You Doing Enough To Protect Your Business From Ransomware? Probably Not

Protect Your Business From Ransomware Ransomware is more advanced than ever. If you aren’t updating your security with that in ...
Cyber Attackers Targeting the Keys to the Cloud Kingdom

Cyber Attackers Targeting the Keys to the Cloud Kingdom

Cyber Attacking Targets Privileged Credentials Used to Administer Cloud Services Make an Attractive Target and Entry Point for Attackers In ...
AWS S3 Outage & Lessons in Tech Responsibility From Smokey the Bear

AWS S3 Outage & Lessons in Tech Responsibility From Smokey the Bear

AWS S3 Outage & Lessons in Tech Responsibility Earlier this week, AWS S3 had to fight its way back to ...
Chris Gerva

How to Avoid Becoming Another Cloud Security Statistic

Cloud Security Statistic Last year, Gartner predicted that, by 2020, 95 percent of all cloud security failures will be caused ...
73% of Executives Are Researching & Launching IoT Projects

73% of Executives Are Researching & Launching IoT Projects

New IoT Projects Manufacturing-based IoT connections grew 84% between 2016 and 2017, followed by energy & utilities (41%). 73% of ...
4 Tech Cleanups For National Cyber Security Awareness

4 Tech Cleanups For National Cyber Security Awareness

National Cyber Security Awareness October is Cyber Security Awareness Month, and President Obama recently called upon the American people to ...
IoT developers

For Uber and Waymo’s Initiatives to Thrive, IoT Needs 4.5 Million Developers by 2020

IoT Developers Imagine it’s December, 2016, and you’re Uber boss Travis Kalanick. One of your self-driving Volvos in SF just ...
Target of the Next Big Breach

With Big Data Comes Big Responsibility: How to Avoid Becoming a Target of the Next Big Breach

Avoid Becoming a Target of the Next Big Breach Practically every industry relies on Big Data, from education, government, and ...

NEWS

IBM’s cloud, cybersecurity and data analytics business rose 11 percent to $8.8 billion in the quarter

IBM’s cloud, cybersecurity and data analytics business rose 11 percent to $8.8 billion in the quarter

Big Blue back on the attack, analysts cautious (Reuters) - IBM shares surged 5 percent on Wednesday after the world’s ...
Treacherous 12: Top Threats to Cloud Computing + Industry Insights

Treacherous 12: Top Threats to Cloud Computing + Industry Insights

Top Threats to Cloud Computing SEATTLE, Oct. 20, 2017 /PRNewswire/ -- The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining ...
Cisco Unveils Industry's First Predictive Services Powered by AI

Cisco Unveils Industry’s First Predictive Services Powered by AI

New offerings designed to manage growing technical skills gap through unique expertise, intelligence and automation SAN JOSE, CA--(Marketwired - Oct ...

CloudTweaks CONTRIBUTOR PROGRAM

The CloudTweaks thought leadership profile building program is free to join but requires a commitment of atleast 3 articles over a 12-month period. Articles must be vendor-neutral in nature, related to connected cloud technologies and written by an executive level business representative to be considered.

You can also contact us to hear more about our on-demand content and lead generation programs for 2018