Symantec Norton Internet Security 2010 beta
The beta of Symantec's Norton Internet Security 2010 is more notable for what's under the hood than what you actually see
The just-beta of Symantec's Norton Internet Security 2010 is more notable for what's under the hood than what you actually see.
- Less bloated than earlier versions
- Installation bugginess, uninstalls whatever security program is already running
So should you download this beta version of Norton Internet Security 2010? Given its installation bugginess — and the fact that it appears that the subscription may last only 14 days — the answer is most likely no. And since it uninstalls whatever security program is already running, you certainly won't want to put it on your primary computer. The software is set to be final sometime in the autumn; you'd do well to wait until then.
However, if you're planning to try out Symantec Norton Internet Security 2010, you'd better not do it on your main PC - this is not only a beta release, but a temporary one as well. Currently, the installed beta says that it is good for only 14 days.
The NIS 2010 beta is available for free from www.norton.com/nis2010beta, Norton AntiVirus 2010 beta: www.norton.com/nav2010beta. (Only those people who consider themselves sufficiently technically savvy to deal with software glitches and flaws should test beta software, particularly security software.)
Norton Internet Security 2010: From signatures to reputation
Symantec's comprehensive Norton Internet Security 2010 suite offers protection against viruses, Trojans, rootkits, spyware and malware of all kinds, as did the previous versions. Like those versions, it includes a firewall, intrusion protection, email protection and web protection; for example, it integrates with your browser and search engine to warn you away from visiting sites that might be malicious.
Symantec says that Symantec Norton Internet Security 2010 marks a major shift away from signature-based detection to what it calls "reputation-based security technologies", which it claims offer more complete and up-to-date protection.
According to Symantec, traditional signature-based solutions simply can't keep up with the massive amounts of new malware released every year. The company says that Symantec researchers see more than 200 million attacks on PCs every month, many of them threats not seen before that may slip by signature-based security software. Because of that, the company claims, signature-based solutions by themselves can no longer adequately protect PCs.
Its new reputation-based security strategy relies heavily on Symantec's global product reach, in which millions of people who use Norton products and opt in to the Norton Community send information anonymously about the applications running on their system. Using this data, Symantec calculates a "reputation score" for applications, and uses that reputation score, in addition to traditional malware signatures, as the engine to keep PCs safe in Norton Internet Security Suite 2010.
Norton Internet Security 2010 isn't the first time a reputation-based technology has been used by anti-malware vendors. Cloudmark Desktop, for example, has been using it for years to protect against spam. But Cloudmark is a far smaller company than Symantec, with a smaller user base, and not as comprehensive a security suite. In addition, protecting against spam is far simpler than protecting against the myriad constantly evolving threats on the web.
These days it takes a large-scale lab to judge whether reputation-based security is superior to signature-based security, so the final answer will have to wait until the fall of 2009 when Symantec Norton Internet Security 2010 is expected to be released in final form. At that point, various labs will weigh in with their results.
Best Deals on PCWorld
- Mobile PhonesView all »
- NotebooksView all »
- TabletsView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »
With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security protection is now ineffective due to the sheer volume, quality, and complexity of malware. This paper looks at this problem and how Webroot, by going back to the drawing board on countering malware threats, is revolutionising endpoint protection and solving the issues that hinder existing endpoint security solutions. Download now.