iTechSolv - Security is a Process, Not a Product iTechSolv - Security is a Process, Not a Product



Real time Virus Alert !













• Introduction


Although many organizations have deployed antivirus software, malicious software such as computer viruses, worms, and Trojan horses continue to infect computer systems around the world. There is no single reason for this apparent contradiction, but the current situation indicates that the standard approach of deploying antivirus software on each computer in your environment may not be sufficient.

Morever, with more than 60,000 viruses existing today, managing and updating anti-virus software can be both costly and cumbersome for many small to large-sized businesses. These tools, however, are only as effective as the most recently updated virus signature files.

iTechSolv adopt proactive defense-in-dept approach that goes beyond perimeter security to protect customers information system assets with zero-day vulnerability. iTechSolv alleviates the headaches associated with managing anti-virus functionality and assures your company will be ready when a virus attacks. Computer viruses are responsible for hundreds of millions of lost dollars and countless hours of lost productivity - we can help your organization prevent virus incidents before they can do similar damage.


Early network protocols, such as Telnet, RPC and FTP, were relatively simple and required action by a dedicated hacker with a sustained connection to a remote system to launch an attack.


In the last ten years, applications have become much more complex, and protocols are used to carry much richer content. These changes have been exploited by attackers to develop more effective, content-based threats that circumvent connection-oriented security and that also have the ability to reproduce and spread automatically.


Content-based threats are able to bypass connection-oriented Stateful-Inspection firewalls because they are typically delivered via connections that are inherently “trusted.” Content-based threats include viruses, Trojans, worms, banned content and spam, and are readily propagated through email, web pages and other real-time communications applications.


With the many email viruses making headline news every few months, users are now beginning to understand the potential dangers of opening an unsolicited email - even if it's from someone they know! With grayware, users don't even have to open an attachment or execute a program to become infected. Just visiting a Web site that harbors this technology is enough to become a victim. And while some types of grayware such as pop-ups may be viewed in the same manner as spam - more of an annoyance that a true security threat - there is a fine line between "harmless" grayware and those types that can compromise valuable information such as credit card numbers, passwords, and even a user's identity.


Bagel, MyDoom, Netsky:A through Z. IT administrators faced a relentless attack of worms and viruses, often with new variants popping up daily. Businesses incurred major financial costs due to downtime. In the past two years, however, viruses and worms have become criminal tools. Some, such as the Badtrans and Orpheus worms, include keystroke loggers to steal passwords and other critical company information. Others, such as MyDoom, opened backdoors that allowed hackers to turn PCs into “Zombies” for relaying spam email, launching distributed denial of service attacks, or even for hosting illegal pornographic material —thus covering the tracks of the true perpetrators.


It’s no secret that the challenge of securing enterprise information assets is rapidly growing in importance and complexity.


The number of reported incidents of virus and worm attacks has increased dramatically over the past several years, as has the cost of dealing with these attacks. The combined costs related to damage and recovery from the Code Red worm approached $2.5 billion, and the related costs for Nimda were an additional $3 billion.


Network security is now a mission-critical concern for enterprises, government agencies, and organizations of all sizes. Today’s advanced threats from cyber-terrorists, disgruntled employees, and hackers demand a methodical approach to network security.


In many industries enhanced security is not an option — it’s mandatory.


© Copyright 2005-2008 iTechSolv Sdn. Bhd. All rights reserved.