{"id":1746,"date":"2014-04-25T14:38:43","date_gmt":"2014-04-25T14:38:43","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1746"},"modified":"2020-02-26T10:49:55","modified_gmt":"2020-02-26T15:49:55","slug":"battling-the-strain-kaspersky-security-for-virtualization-vs-instant-on-gaps","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/battling-the-strain-kaspersky-security-for-virtualization-vs-instant-on-gaps\/1746\/","title":{"rendered":"Battling the strain: Kaspersky Security for Virtualization vs. Instant-On Gaps"},"content":{"rendered":"<p>Virtualization offers a lot of advantages, and the possibility to speed things up isn\u2019t the least of them. In recent years it\u2019s become clear that virtual PCs (especially those with Windows installed) require protection from cyber threats as well as physical ones: machines may be virtual, but they are still used to work with sensitive data, and their loss can have very real consequences.<\/p>\n<p>Sometimes people install the same anti-malware solutions that they use on physical (\u2018normal\u2019) machines to their virtual PCs. This may cost them dearly, especially if there are lots of duplicated virtual PCs on the same host (i.e. physical server).<\/p>\n<p>Because antimalware solutions are duplicated their antivirus bases are as well, and if they are all active at the same time it can put a heavy strain on the server, reducing it to a crawl. This kills the very idea of virtualization: why talk about fast and dynamic resource allocation within an enterprise infrastructure if it\u2019s sluggish?<\/p>\n<p>In <a href=\"https:\/\/business.kaspersky.com\/virtualization-security-what-is-light-agent\/\" target=\"_blank\" rel=\"noopener nofollow\">one of the previous posts<\/a> we already talked about the \u2018update storm\u2019 and \u2018scanning storm\u2019, or when all of the security solutions installed on virtual PCs start updating themselves and scanning virtual drives all at the same time. The causes the server to pant and employees go smoking \u2013 there\u2019s no way they can work for at least a few minutes.<\/p>\n<p>A similar situation takes place when an entire pack of virtual machines is being launched. Or when large enterprises use virtual machines in dynamic cycles, provisioning and decommissioning them when needed. Keeping their security tools consistently up-to-date is a problem. Long-dormant VMs can eventually fall below the \u2018baseline\u2019 so that updating them is a time-consuming chore.<\/p>\n<p>Besides this, VMs can become a security vulnerability all on their own: it takes time to update them, and this time period is a window of opportunity for malware, cyberattacks, etc. In other words, there is time when existing VMs coming back online from a dormant state or newly created ones (with no security solution installed yet) are vulnerable, or rather are completely unprotected. That is what is called \u2018Instant On Gap\u2019. Depending on how many users are simultaneously downloading these updates to their individual VMs, and how many days worth of security updates there are to process, this \u2018window\u2019 can drag on for minutes, or even hours. At the same time the resources of the virtual servers are heavily strained, which means that virtualization makes little sense at all.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/04\/06015945\/800_23.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1748\" alt=\"800_2\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/04\/06015945\/800_23.jpg\" width=\"800\" height=\"534\"><\/a><\/p>\n<p>There is a way to avoid this, of course. There are solutions tailored specifically towards use in virtual environments providing security for every one of the VMs on a given host. Kaspersky Security for Virtualization is one these solutions. Its primary idea is to reduce the resource\u2019s drain, so that dynamic changes within the virtual infrastructure stay dynamic, without any \u2018crawling\u2019. This is achieved via the centralization of protection.<\/p><blockquote class=\"twitter-pullquote\"><p>Agent-based antimalware protection on long dormant VMs can fall below the actual security baseline and take \u2018ages\u2019 to update.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FwHL2&amp;text=Agent-based+antimalware+protection+on+long+dormant+VMs+can+fall+below+the+actual+security+baseline+and+take+%26%238216%3Bages%26%238217%3B+to+update.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Depending upon the virtualization platform, there are agentless variants and so-called \u2018Light Agents\u2019, when every VM is equipped with a small piece of software acting in the similar way to a full-scale security agent, but without straining the server.<\/p>\n<p>In both cases \u2018the core\u2019 is a virtual appliance installed on the host, which actually performs all resource-intensive security processing, thus providing immediate protection for every virtual machine, both already existing and new: Light Agent is very small so it\u2019s install time on the new machines takes next to no time, removing the Instant On Gap.<\/p>\n<p>The solution has a unified, centralized database on all threats, so there is no unnecessary data duplication; also, there is Shared Cache, which ensures that the same file opened on several different VMs is scanned only once: the scanning engine\u2019s initial verdict is shared within all of the environments, so unless the \u2018good\u2019 file is changed or a user requests a new scan manually, it will be considered safe and won\u2019t be scanned again.<\/p>\n<p>More technical data on the new Kaspersky Security for Virtualization is available <a href=\"https:\/\/www.kaspersky.com\/about\/news\/product\/2014\/Kaspersky-Lab-Announces-New-Light-Agent-Virtualization-Security\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Traditional &#8216;agent-based&#8217; solutions should not be used in virtual environments, especially those in dynamic use. Instant-On Gaps are the most common problem here: it strains servers and creates a serious vulnerability window for a VM. Kaspersky Security for Virtualization has been designed specifically to eliminate this problem.<\/p>\n","protected":false},"author":209,"featured_media":16144,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2090,2091],"class_list":{"0":"post-1746","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-instant-on-gaps","10":"tag-kaspersky-security-for-virtualization"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/battling-the-strain-kaspersky-security-for-virtualization-vs-instant-on-gaps\/1746\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/battling-the-strain-kaspersky-security-for-virtualization-vs-instant-on-gaps\/1746\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/battling-the-strain-kaspersky-security-for-virtualization-vs-instant-on-gaps\/1746\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/instant-on-gaps\/","name":"Instant-On Gaps"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1746"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1746\/revisions"}],"predecessor-version":[{"id":33123,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1746\/revisions\/33123"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16144"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}