Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
Ransomware Test: Cylance, Sophos, VoodooShield | by VoodooShield
Message
<blockquote data-quote="Windows_Security" data-source="post: 587950" data-attributes="member: 50782"><p>Thanks,</p><p></p><p>At #2 ease of use and #3 compatibility</p><p>At the moment we are discussing a local white-list based on program signatures determined when VS does its post-install system snapshot. Because companies often use standardized images, this would imply a "no actions required / automatic deployment" for system admins/IT managers. This local hash/signature whitelist guarantees offline protection (no internet connection available) and can be changed through central management (e.g. in response to malware outbreak). Central Admins even can put on a 'lock' when endpoint has admin rights (tightly limited to local white-list managed by company or relaxed using the cloud whitelist).</p><p></p><p>#4 Regulatory compliance.</p><p>Thinking about how to implement this. Please help me get this clear. Regulatory compliance is industry based, so this "entity of control" is between the local whitelist (image or company based) and the global cloud whitelist (basically for every VS user). This could be implemented using insudstry specific mask or views in the cloud whitelist. Out of my head this would have some data base impact (either replicate the hash for every industry or add a multiple industry code array to the hash). So do you know of security software already implemented regulatory compliance?</p><p></p><p>#Unknown exploits</p><p>At the moment VS does a perfect job blocking exploits triggered by executables and does very well against poisoned documents. Dan is thinking about further strengthening protection of script based exploits</p><p></p><p>#Pricing</p><p>Since VS offers a fully functioning freeware function, we have discussed micro-licensing (which is common for phone apps often priced between $0.99 and $2.99 annually). I have not yet convinced Dan on this. He has an enormous advantage at the moment. He has sold quite a few licenses and he is able to deliver customer services on his own (somple because VS does not require much user support). Because a lot of people bought a license to support development of VS, it is unclear yet of the current group of users are very educated users requiring little support by themselves OR VS is a killer application when it comes to requiring little customer support. When the latter is through, no other AV can meet his low cost of operation. So VS could be sold according 'micro licensing' scheme (say $1.99 per endpoint/user seat annually). Do you have any info on pricing schedules of next gen AV's?</p><p></p><p>Regards Kees</p></blockquote><p></p>
[QUOTE="Windows_Security, post: 587950, member: 50782"] Thanks, At #2 ease of use and #3 compatibility At the moment we are discussing a local white-list based on program signatures determined when VS does its post-install system snapshot. Because companies often use standardized images, this would imply a "no actions required / automatic deployment" for system admins/IT managers. This local hash/signature whitelist guarantees offline protection (no internet connection available) and can be changed through central management (e.g. in response to malware outbreak). Central Admins even can put on a 'lock' when endpoint has admin rights (tightly limited to local white-list managed by company or relaxed using the cloud whitelist). #4 Regulatory compliance. Thinking about how to implement this. Please help me get this clear. Regulatory compliance is industry based, so this "entity of control" is between the local whitelist (image or company based) and the global cloud whitelist (basically for every VS user). This could be implemented using insudstry specific mask or views in the cloud whitelist. Out of my head this would have some data base impact (either replicate the hash for every industry or add a multiple industry code array to the hash). So do you know of security software already implemented regulatory compliance? #Unknown exploits At the moment VS does a perfect job blocking exploits triggered by executables and does very well against poisoned documents. Dan is thinking about further strengthening protection of script based exploits #Pricing Since VS offers a fully functioning freeware function, we have discussed micro-licensing (which is common for phone apps often priced between $0.99 and $2.99 annually). I have not yet convinced Dan on this. He has an enormous advantage at the moment. He has sold quite a few licenses and he is able to deliver customer services on his own (somple because VS does not require much user support). Because a lot of people bought a license to support development of VS, it is unclear yet of the current group of users are very educated users requiring little support by themselves OR VS is a killer application when it comes to requiring little customer support. When the latter is through, no other AV can meet his low cost of operation. So VS could be sold according 'micro licensing' scheme (say $1.99 per endpoint/user seat annually). Do you have any info on pricing schedules of next gen AV's? Regards Kees [/QUOTE]
Insert quotes…
Verification
Post reply
Top