Preventing data corruption
Some anti-virus solutions clean out threats as they come in via email. Others detect viruses on external data sources such as CDs, network servers, and online downloads. To be effective, your data security schemes must take a multi-tiered approach to protecting gateways, servers, and desktops.
Make sure any solution you consider addresses all parts of your network. It is not enough to protect your workstations and desktops; it is also critical that you guard your gateway to contain threats at the network gateway. As the velocity of attacks increases, preventing viruses from getting to your network should be a top priority. For example, the SQL Slammer virus spread to 250,000 servers in ten minutes.
Your efforts must also acknowledge the inherent vulnerabilities of network servers, especially UNIX/Linux platforms. A UNIX or Linux file server can be a ?carrier? that passes viruses along the network, infecting more susceptible Windows systems.
Legislation seeks prudent protection to foreseeable threats such as the increase of viruses affecting UNIX/Linux platforms. Many companies have determined that SOX requires anti-virus protection on every server that manages financial data.
Compliance is not just a matter of end-of-quarter reports. You need real-time check-and- balance mechanisms to confirm that technology and procedures are actually protecting data and recognizing security breaches.
Anti-virus solutions must alert supervisors immediately of threats affecting the network. In addition, you need a real-time view of the status of every device in the network. You must be able to ascertain which devices are protected, which need updating, and which, if any, have been attacked. Automatic updates and centralized installation ensure continuous protection.