Security saps system performance

Will we ever see an end to this arms race?

The tremendous benefits of computing in the Internet Age have come at a price. Viruses, worms, Trojan horses, DDoS attacks, spyware, phishing -- the list of network-based threats seems to grow longer every day. In response, IT managers pile security countermeasures onto servers and workstations, malware authors find ways around them, and the cycle continues.

Will we ever see an end to this arms race? "Probably not," says George Myers, director of product management at end-point security vendor Symantec. "To be certain, anti-virus technology alone does not provide adequate protection for today's threat landscape."

Securing network end points takes processing power, however -- cycles that could otherwise be devoted to running applications. Loaded up with spyware scanners, active virus screening, personal firewalls, and layers of encryption, a PC that was designed to be a race car ends up feeling more like an armored personnel carrier: It's safe, but hardly nimble.

Still, the cost of having too much security is outweighed by the consequences of having too little. Advanced, modern malware, including rootkits, can be extremely difficult to detect, and once it takes hold, it can be even harder to remove. With not just productivity but also sensitive data potentially at risk, locking down workstations is easily justified.

So what to do? How can IT organizations ensure that employees' PCs are protected without bogging them down with too much security?

"The right balance is really specific for each individual customer," says Myers. "Security is important to everyone, but the cost of security has to be weighed. Some security technologies are too costly to maintain and burdensome for users, but others are both simple and effective."

In other words, cross your fingers. Security vendors must constantly revisit and rethink their approaches to stay abreast of the latest threats, but they can only do so much. So long as the nature of network-based security threats is in constant flux, formulating an appropriate security policy for any given company will always involve trial and error -- with end-users caught in the crossfire.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Neil McAllister

InfoWorld
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?