{"id":1768,"date":"2014-05-06T16:31:56","date_gmt":"2014-05-06T16:31:56","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1768"},"modified":"2020-12-22T12:46:30","modified_gmt":"2020-12-22T17:46:30","slug":"death-of-av","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/death-of-av\/1768\/","title":{"rendered":"So what is the fuss about the &#8216;Death of AV&#8217;?"},"content":{"rendered":"<p>So, you may have heard that antivirus has been <a style=\"line-height: 1.5em;\" href=\"http:\/\/www.networkworld.com\/news\/2014\/050514-taking-aim-at-fending-281282.html?page=1\" target=\"_blank\" rel=\"noopener nofollow\">pronounced dead<\/a><span style=\"line-height: 1.5em;\"> \u2013 again.<\/span><\/p>\n<p>It has happened before and, no doubt, will happen again. Usually, such \u201cbig\u201d announcements are used when an IT security company wants to announce a \u201cnew\u201d technology arriving. Another vendor has been using the same approach since back <a href=\"http:\/\/www.zdnet.com\/trend-micro-antivirus-industry-lied-for-20-years-3039440184\/\" target=\"_blank\" rel=\"noopener nofollow\">in 2008 to announce their cloud security platform<\/a>, and even then it wasn\u2019t something really new.<\/p>\n<p>What can I say? Traditional signature-scan antivirus <span style=\"text-decoration: underline;\">as the sole method<\/span> of protection has been dead for many years. It has been replaced by a much more sophisticated bundle of products and technologies, which combine heuristics, sandbox analyzers, cloud reputation and allowlists to protect the user.<\/p>\n<div class=\"pullquote\">Traditional signature-scan antivirus as the sole method of protection has been dead for many years.<\/div>\n<p>Every major player today has already adapted to these trends. Actually, those who didn\u2019t adapt simply disappeared! Many times new technologies have emerged which were supposed to become \u2018magic bullets\u2019 to save the world from malware and make traditional (signature-based) antivirus technology largely obsolete. However, it always\u00a0 becomes quickly apparent they\u2019re not magic bullets at all, and all that happens is that the new technologies are simply added to IT security companies\u2019 existing protection technologies which in turn bolsters the level of security overall.<\/p><blockquote class=\"twitter-pullquote\"><p>As threats become more complex and sophisticated, only the best companies will survive<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F64dj&amp;text=As+threats+become+more+complex+and+sophisticated%2C+only+the+best+companies+will+survive\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Modern superior-quality IT protection solutions include a huge number of various functions \u2013 proactive behavior detection, roll-back mechanisms, cloud-enabled protection, <a href=\"https:\/\/www.kaspersky.com\/about\/news\/product\/2014\/Kaspersky-Lab-application-control-technology-on-top-in-AV-TEST-trials\" target=\"_blank\" rel=\"noopener nofollow\">application control<\/a>, sandboxing, <a href=\"https:\/\/www.kaspersky.com\/about\/news\/virus\/2013\/Kaspersky-Lab-Automatic-Exploit-Prevention-technology-blocks-4-2-million-Java-exploit-attacks-year\" target=\"_blank\" rel=\"noopener nofollow\">application exploit prevention<\/a> and many more. And by the way, we\u2019ve often been the first ones to introduce these new technologies.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-1773\" alt=\"800_2\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/05\/06015946\/800_21.jpg\" width=\"800\" height=\"531\"><\/p>\n<p>However, perhaps in the question \u201cis AV dead?\u201d there is a deeper question: \u201cis security dead\u201d?<\/p>\n<p>The answer is of course, no.<\/p>\n<p>As threats become more complex and more sophisticated, only the best companies will survive, which offer the best protection.<\/p>\n<p>PS: As a bonus, <a href=\"http:\/\/www.zdnet.com\/blog\/security\/talking-malware-with-eugene-kaspersky\/728\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here\u2019s a link to an interview<\/a> with Eugene Kaspersky from December 2007 on the emergence of \u201chybrid protection\u201d into our products.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So, you may have heard that antivirus has been pronounced dead \u2013 again. It has happened before and, no doubt, will happen again. Usually, such \u201cbig\u201d announcements are used when<\/p>\n","protected":false},"author":378,"featured_media":16190,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[1251,97],"class_list":{"0":"post-1768","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-antivirus","10":"tag-security-2"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/death-of-av\/1768\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/death-of-av\/3584\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/death-of-av\/1768\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/death-of-av\/1768\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/antivirus\/","name":"Antivirus"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1768","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/378"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1768"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1768\/revisions"}],"predecessor-version":[{"id":38195,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1768\/revisions\/38195"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16190"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1768"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1768"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1768"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}