Men in Proxy Blog

A blog covering the most interesting topics about online anonymity and Internet security!

Cloud based security technologies could make malware unprofitable to create

Posted on: May 9th, 2013

Cloud based security technologies could make malware unprofitable to createIt had been widely projected by numerous industry experts such as Eugene Kaspersky that creating cloud based security technologies could make the business of creating malware extremely unprofitable. However, the question that remains to be answered is whether these technologies have lived up to their billing. The answer to this question is that while these technologies haven’t put cyber criminals out of business, it certainly has proved to be a formidable ally for industries and organizations in the struggle against cyber crime. Most anti virus programs nowadays also use these cloud based security systems of offer enhanced security for their users.

Cloud based security systems to fight malware on two fronts

One of the biggest advantages of cloud based security systems is that they help in fighting malware on two fronts. Firstly, they help in the protection of all the endpoints against a new malware right from the moment it is first encountered and determined as malicious. Secondly, these systems cause quite a lot of damage to cyber criminals as the only return that these criminals get is from the time the malware is launched to the time it is detected and blocked by the endpoints. Since cloud technologies make the window for detection shorter, they reduce the profit potential for cyber criminals.

Other advantages offered by cloud based systems are that they help in minimizing the impact of DDoS attacks, act as a point security solution for providing the overall protection to various organizations which require the usage at multiple locations and by multiple workers and reducing capital expenditure and administrative burdens for users. Some of the most common Cloud Security vendors which one can choose from are Seculert, Alert Logic, Qualys, Webroot, McAfee, Symantec, Blue Coat Systems and Zscaler.


You can follow any responses to this entry through the RSS 2.0 feed.

AddThis Social Bookmark Button

Leave your comment