iPage Hosting

Web Hosting Article

Protect Your Hosted Servers with Juniper's Perimeter Antivirus by Kaspersky Labs

Submitted By: Lisa Gecko | Category: General Information | Total Views: 4550 | Word Count: 581

Published on September 1, 2010, read more web hosting articles here.

Antivirus protection prevents, detects, and removes malicious software, also called malware. Malware includes threats such as viruses, worms, Trojan horses, adware, and spyware. Antivirus protection can be installed anywhere in the network, but is most efficient when implemented at both the perimeter firewall and the endpoints, such as desktop and laptop computers.

Security at the Firewall

Having antivirus protection at the perimeter firewall, rather than just on servers or endpoints using software-based solutions, is good for both saving costs and maintaining security. You can rely on perimeter antivirus on the firewall to protect your network and save money by keeping your bandwidth use down.

Integrated Security from Computer Protection Experts

A firewall performs many necessary security functions: intrusion detection, stateful packet inspection, network address translation, policy enforcement, and VPN tunneling. Though independent of antivirus protection, these jobs are consistent with the security you need from antivirus protection. Firewall manufacturers work with the best antivirus companies to bring you integrated, seamless security against viruses, worms, and other malware. This suite of protection�firewall and antivirus together�is referred to as Unified Threat Management.

Efficient Security Increases Network Performance

Perimeter antivirus stands as a central signature and heuristics engine that allows hourly updates, as well as streamlined installation and update management. It also gives IT a tool for creating and enforcing policies at the most basic level, making antivirus effective, yet invisible to end users. This takes the load off your servers by providing bandwidth-saving, centralized updating and variable scanning. All this is controlled by experts in security who understand how to balance risk against system performance. The hourly updates also provide an added security bonus�faster updates reduce the window of vulnerability to emerging threats.

What is the Best Way to Implement Antivirus Protection?

Antivirus software protects using two different basic methods: signature-based detection and heuristic detection.

Signature-based detection identifies viruses and other malware by comparing the contents of a file to a list of signatures. Good signature detection searches inside files to look at embedded files. This method can only be used on known threats, and requires frequent updates to remain viable.

Heuristic detection can be used to identify unknown viruses, sometimes called zero-day threats. File emulation is an approach that executes a suspected program in a virtual environment and logs what actions the program performs.

The only way to properly implement antivirus protection is to protect both the entry point to your network, the firewall, and your endpoints, such as servers, computers, and laptops with protection that defends you by deeply searching all inbound traffic via a firewall-based antivirus solution, and maintaining a complimentary (but not identical) solution locally. This is especially important when using laptops and other computers that travel outside your protected network.

How Infinitely Virtual, Juniper Networks, and Kaspersky Labs Protect Your Business

Infinitely Virtual chose Juniper Networks and its firewall-based antivirus solution from Kaspersky Labs to provide the best protection without sacrificing virtual server performance. Your virtual servers are protected from intrusion, viruses, and malware from the outside. This includes that carried over email and web traffic, the most common malware attack vectors, all without slowing down or crowding out the traffic you need to do business on your virtual servers.

Infinitely Virtual�s Perimeter Antivirus Will Work for Your Business

Perimeter antivirus works for your business, providing cost effective security without sacrificing preformance. To find out more about perimeter antivirus, IV's firewall implementation, and how you can protect your company from threats when using a virtual server, call Infinitely Virtual at (866) 257-8455 or request more information at www.InfinitelyVirtual.com.

About the Author
Lisa Gecko is a staff writer for InfinitelyVirtual.com

Articles You May Be Interested In

Reducing Your Carbon Footprint with the Cloud
One of the less-touted benefits of working with Cloud Service Providers (CSPs) is how much “greener” the cloud is versus the traditional in-house data centers.

Choose the Right Anti-Spam Solution for Your Business
As it becomes increasingly harder for a company to function in todays climate without electronic media and internet capabilities, more and more offices are becoming prone to spam.

Why so many people abandon work on their web site, and 10 things you can do to stay up to date.
Website is likely the first impression of your business so make it a statement of who you are, what your business offers and the quality of service you are going to give the customer.

The Best Solutions for Web Hosting Options
In the times when we all want the networks to be perfect and no downtime there will be need for dedicated servers. The main purpose of dedicated server is to work as the data center.

What are the Networking Advantages of vCloud Director?
In this series of articles we are looking at features and benefits of vCloud Director (vCD), and in this installment we explore some of the advances in self-service networking.

eHostInfo Sponsors

Lunarpages Internet Solutions

iPage Hosting


We are a professional review site that receives compensation from the companies whose products we review. We tested and reviewed the web hosting sites ranked here. We are independently owned and the opinions expressed here are our own.