{"id":14610,"date":"2016-06-13T08:00:02","date_gmt":"2016-06-13T15:00:02","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=14610"},"modified":"2016-06-13T10:13:54","modified_gmt":"2016-06-13T17:13:54","slug":"conventional-av-systems-can-actually-harm-you","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/06\/conventional-av-systems-can-actually-harm-you\/","title":{"rendered":"Conventional AV Systems Can Actually Harm You"},"content":{"rendered":"<p>There\u2019s barely a day goes by when I\u2019m not reading another batch of stories about how unsuitable conventional endpoint AV security is for dealing with modern malware, APTs, zero-day threats and so forth.<\/p>\n<p>So replete are these tales of woe that it\u2019s almost possible to switch off from the basic fact that in this uber-connected, cloud-enabled, everything-as-a-service, internet-of-thingamajigs world, most conventional endpoint AV systems are impotent and probably do more harm than good. I write almost, but not quite, because every now and again the occasional story jumps off the screen and gives you that all important wake-up call.<\/p>\n<p><!--more--><\/p>\n<p>One such story that came to light a few weeks ago, centered around an Adverse Event Report <a href=\"https:\/\/www.accessdata.fda.gov\/scripts\/cdrh\/cfdocs\/cfmaude\/detail.cfm?mdrfoi__id=5487204\" rel=\"nofollow,noopener\"  target=\"_blank\">published by the U.S. Food and Drug Administration (FDA)<\/a>. Wherein, a patient (not named), undergoing a cardiac catheterisation procedure at a US Hospital (also not named) had to be sedated, mid-operation, for five minutes, while the procedure was suspended following the system crash of a vital piece of monitoring equipment.<\/p>\n<p>The system in question monitors, measures and records patient data during cardiac catheterization procedures. The system is made up of a patient data module, used to capture the patient\u2019s vitals, and a hemo monitor PC to display them. The two elements are connected via a serial interface.<\/p>\n<p>During this particular procedure the monitor PC lost communication with the patient data module resulting in a black screen on the monitor and the patient having to be sedated while the system was rebooted. As the FDA report describes, the cause of this blackout was attributed to the installed conventional AV software, which at a critical point in the procedure initiated a scan of the system.<\/p>\n<p>Although the system could be rebooted and the patient fortunately survived it got me thinking about the real-life harm a conventional AV could do to me. Quoting from the Manufacturers Narrative in the FDA Report, \u201cOur experience has shown that improper configuration of anti-virus software can have adverse effects including downtime and clinically unusable performance.\u201d So, although I may be sensationalizing the FDA\u2019s paragraph a little, I\u2019m not feeling that confident after reading the manufacturer\u2019s narrative. Let\u2019s face it: the team performing a standard cardiac catheterisation procedure is not likely to include an IT security engineer who can be called upon at a moment\u2019s notice.<\/p>\n<p>Could this scenario have been avoided with an Advanced Endpoint Protection system? The answer is probably yes. <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-endpoint\/traps\" target=\"_blank\">Traps, our advanced endpoint protection product<\/a>, is not a conventional AV system -- indeed, it\u2019s a paradigm shift from \u201cthe way things used to be done.\u201d Traps secures endpoints by preventing known and unknown malware and exploits from executing by focusing on blocking the few, core techniques used by attackers rather than application-specific characteristics. Furthermore, It does this in a lightweight, nonintrusive agent <strong>that definitely does not rely on system scanning<\/strong>.<\/p>\n<h3 class=\"p1\"><span class=\"s1\">Learn more<\/span><\/h3>\n<ul class=\"ul1\">\n<li class=\"li2\"><span class=\"s2\"><a href=\"https:\/\/www.youtube.com\/watch?v=5ZooAAceKMk&amp;feature=youtu.be\" rel=\"nofollow,noopener\"  target=\"_blank\"><span class=\"s3\">Watch a demo<\/span><\/a><\/span><\/li>\n<li class=\"li3\"><span class=\"s5\"><a href=\"https:\/\/www.paloaltonetworks.com\/events\/test-drive.html\" target=\"_blank\"><span class=\"s3\">Ultimate Test Drive<\/span><\/a><\/span><\/li>\n<li class=\"li3\"><span class=\"s5\"><a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-endpoint\/traps\" target=\"_blank\"><span class=\"s3\">Traps<\/span><\/a><\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s barely a day goes by when I\u2019m not reading another batch of stories about how unsuitable conventional endpoint AV security is for dealing with modern malware, APTs, zero-day threats and so &hellip;<\/p>\n","protected":false},"author":198,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[598,108],"tags":[603,2106,2100,778],"coauthors":[2103],"class_list":["post-14610","post","type-post","status-publish","format-standard","hentry","category-endpoint-2","category-threat-prevention-2","tag-advanced-endpoint-protection","tag-av-sys","tag-conventional-av-systems","tag-traps"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/198"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=14610"}],"version-history":[{"count":9,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14610\/revisions"}],"predecessor-version":[{"id":14655,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14610\/revisions\/14655"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=14610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=14610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=14610"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=14610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}