Internet security software is supposed to run unobtrusively in the background.
In reality, however, it often hogs CPU cycles and memory. This is no small concern
for many businesses, particularly those that use shared servers to run other
applications such as e-mail and file sharing. For these organizations, security
and poor performance or memory footprint bottlenecks go hand in hand. This,
in turn, creates IT and management headaches as well as hassles for end users.
This history of sluggishness runs counter to the way business is conducted
today. In this global, highly interconnected, information-driven world, businesses
and consumers demand not only easy and secure access to uncompromised data,
but also the ability to keep pace with the speed of business. Indeed, long wait
times caused by security program processing can impede user productivity and
negatively affect the bottom line.
Clearly, businesses should not have to choose between security and performance.
And they may no longer have to. A growing number of security vendors are stepping
up to this challenge and finding innovative ways to improve the performance
of their solutions without sacrificing the protection they provide. Better yet,
independent tests indicate that these solutions are succeeding.
As a result, businesses interested in maintaining a secure and highly productive
workforce have more options than ever before in selecting effective protection
tools that won't slow them down.
Minimizing the performance impact of security solution response times increases
user acceptance of security programs and reduces the desire to disable those
programs. Installing a low-impact solution enables organizations to potentially
postpone investments in new client hardware while improving the user experience.
Reduced boot time and memory footprint
Many organizations deploy endpoint security solutions that provide multiple
layers of protection against malware on laptops, desktops, and servers. These
solutions can provide a wealth of powerful security technologies, including
antivirus, antispyware, firewall, intrusion prevention, and device and application
control. This multi-dimensional approach can present a formidable defense against
even the most sophisticated attacks that evade traditional security measures,
such as rootkits, zero-day attacks, and mutating malware and spyware.