"Which Is The Best Security Software I Can Buy?"
There is no easy answer to this as not every security suite is made equal. In fact, many components within the security suite differ greatly.
Cloud Computing (Security Related)
"Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, as with the electricity grid." - Wikipedia. In simple terms it means "the wisdom of the many"; in security terms it means that if a file is of questionable nature, Security Software checks it against not only its own anti-virus but also the cloud computing initiative that has a broad set of policies, technologies, controls etc., deployed to protect data and applications.
So if cloud computing answers the file as dangerous because several such instances (users) have had problems with their computers, the file in question is locked down. Different security vendors call it different names and implement it on a different scale. For instance, Norton calls it SONAR.
If you are interested to read a little more about cloud computing, jump to Securelist's "Clear skies ahead: cloud computing and in-the-cloud security" article.
"Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, as with the electricity grid." - Wikipedia. In simple terms it means "the wisdom of the many"; in security terms it means that if a file is of questionable nature, Security Software checks it against not only its own anti-virus but also the cloud computing initiative that has a broad set of policies, technologies, controls etc., deployed to protect data and applications.
So if cloud computing answers the file as dangerous because several such instances (users) have had problems with their computers, the file in question is locked down. Different security vendors call it different names and implement it on a different scale. For instance, Norton calls it SONAR.
If you are interested to read a little more about cloud computing, jump to Securelist's "Clear skies ahead: cloud computing and in-the-cloud security" article.
Sandbox
As Wikipedia puts it, "In computer security, a sandbox is a security mechanism for separating running programs." Sandbox is like a controlled test chamber wherein whatever happens within it, stays in it; the effects don't affect the rest of the system. This is especially helpful if the Internet Security Suite doesn't know whether the program is good or bad and therefore needs to run it in the test environment.
As Wikipedia puts it, "In computer security, a sandbox is a security mechanism for separating running programs." Sandbox is like a controlled test chamber wherein whatever happens within it, stays in it; the effects don't affect the rest of the system. This is especially helpful if the Internet Security Suite doesn't know whether the program is good or bad and therefore needs to run it in the test environment.
Game/Fullscreen Mode
It was introduced a few years back when users complained that Security software was interfering with fullscreen applications such as games and movies. This mode automatically detects fullscreen activity and suppresses alerts and scheduled scans for a more appropriate time.
It was introduced a few years back when users complained that Security software was interfering with fullscreen applications such as games and movies. This mode automatically detects fullscreen activity and suppresses alerts and scheduled scans for a more appropriate time.
No comments:
Post a Comment