SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
Paper
Is Using Off-the-shelf Antimalware
Product to Secure Your Medical Device a
Good Idea?
Or Eight Questions You Should Ask Yourself before doing that.
2
Most vendors, who create embedded devices – especially medical devices such
as medical X-Ray connected machines, connected Labs and other equipment –
are smart, and understand the need of securing them against external threats
such as malware. Such devices often run a common operating system such as
Windows Embedded, or Linux and are susceptible to many kinds of malware threats
as their non-embedded threats. Thus, protection against malware is important
consideration when securing such devices.
A possible approach for securing those devices is to install an off-the-shelf
antivirus product. The advocates of this approach typically come up with convincing
arguments such as:
•	 This antivirus is being used successfully by millions of users, so there should
be no issues running it on your devices;
•	 Your engineers are familiar with the antivirus installation and maintenance;
•	 The installation is quick – your device would be secured in a couple minutes of
time, no integration needed;
•	 It is very cheap – in some cases it could be even free!
Sounds like a plan? It does at first glance. But if you think it is a good idea, please
read on. There is a number of questions you need to ask yourself before making
such decisions, and this article will help you.
Paper
3
Question 1: Would the product UI confuse my users?
Imagine your X-Ray connected machine got infected. Maybe someone plugged in a USB stick
with malware, and opened an image file which triggered a vulnerability in a parser. Maybe one
of Windows services running on it had a remote code execution vulnerability, and got attacked
through the network. The antivirus detected the threat, and…
… and popped up the message on the screen!
Now a typical desktop user, who installed Bitdefender antivirus, would obviously understand
what’s going on. However the technician operating the X-Ray machine might have never heard of
Bitdefender, or (unlikely but possible) not even know about the antivirus software at all. So they
might not know what to do with this. They might even click on “More details” (assuming your
interface supports it in the first place!), and get even more confused. Most likely this will result in
their typical workflow being interrupted, and your support being called. At this moment the local
IT department might get involved, and hopefully would fix it.
Rule: a security solution running on a medical device should be able to report infections to an
appropriate department, and do so without workflow interruption.
There is absolutely no need for the technician to even see this message. The infection should be
automatically blocked, but because it was present, it is not enough. The IT department must be
notified so they can find out how it got there, and possibly clean other infected machines around.
In case of a hospital it should be their IT department, but if you offering support, it should be
YOUR IT department. And this should not confuse the operators and break the workflow.
Another issue is changing the product settings remotely. One option is to install remote
management software on each device, and modify the settings manually. The issue here is that
you can only do it during non-business hours, or otherwise the people would freak out seeing the
mysterious dialogs popping up on the X-Ray control panel. And if your business is good and you
have sold not just one machine, but 1000s – there’s a lot of work to do. Until next week someone
finds out one of the settings were set incorrectly, and you’re up to repeating this again.
Solution: when you license the anti-malware technology as Software Development Kit SDK, there
is no UI at all. You’re in complete control of the whole business logic, you decide what to do when
infections are detected, where they are reported and how. And you tell the SDK which settings
should be used. The settings could be stored on your server and your solution might download
them and apply them to all machines simultaneously, ensuring the best protection and the best
user experience for your valuable customers.
4
Question 2: Can I exclude the useless components?
A security product typically includes a lot of features. Those related to malware detection are
useful for you, but the other features might not be so useful. For example, the antivirus product
could include the anti-spam module, which makes no sense on the X-Ray machine control panel.
There could be built-in ad blocker, password manager, parental control, online banking protection,
and another zillion of features making no sense for your use case. Those features are quite useful
for desktop users, but they make no sense in your environment.
Rule: a security solution running on a medical device should only contain the necessary
components, and no more than that.
You might think it is not really a big deal. What issue is if there are extra features which nobody
would use? But please consider the following issues:
•	 Each of those features consumes some disk space, CPU, memory and (sometime) network.
Those are valuable resources which could be used for your application to perform faster,
do more processing or offer more features.
•	 Each of those features might have bugs, for which the product update would be issued.
This means you would have to update the antivirus much more frequently than if those
features were excluded. The product might only fix issues in the antispam module, but
since few vendors are so specific in the release notes, you are likely to be forced to install
every single product update.
•	 Some of those features might actually create issues. For example, there may be an
Paper
5
automatic “system optimization component” which reconfigures the system for the “best
user experience”, and changes the screen resolution which breaks your application layout.
Or there may be a “disk space cleanup” feature which deletes the temporary files of your
application as “unused” right where it was about to start processing them.
•	 And some features may be outright dangerous. For example, the antivirus might include
automatic remote backup, which uploads all the documents to a remote location
automatically. This may lead to leakage of the documents containing medical information,
and such act might be against the laws of your country – such as HIPAA in the USA –
exposing your company to a lawsuit. Some products may include device tracking and
remote wipe features, which could be abused remotely if misconfigured.
Solution: when you license the anti-malware technology as SDK, you only license the components
which you need. You don’t pay extra for the components you won’t use, and you don’t include
components such as “system optimizer” which have no place in your professional solution.
Question 3: Can I control the Antivirus use of Internet?
A medical facility often has a restrictive Internet access policy, and for the good reason. However
the antivirus products need to be updated frequently, or their ability to cope with new threats
would be reduced. And some antivirus products require Internet connection to be available even
for basic functionality, such as malware scanning, and will not work at all without one. This
may create issues, because many medical devices are portable, and are constantly transferred
between wards within the hospital the units – and even if it is not, a unit may be installed in a
place where the network connection is not available at all.
Rule #3: a security solution running on a medical device should work with limited Internet usage,
and should be fully-functional if network connection is interrupted.
Can you configure the antivirus to download its updates – including the product updates – from
an internal server? Note that this is not a typical home user configuration, so your product will not
have it built-in – you might need some extra software for that. Can you get it, and under which
terms?
And can your antivirus function without Internet connection, and if yes, how much of functionality
would be missing? Most modern products just print the “Internet connection required” on their
box, and almost nobody explains in the documentation, which components and functionality
depends on the Internet, what speed and throughput is required, and how much traffic a product
would consume daily. for what the connection is required, what is the required throughput, and
what functionality depends on it.
Solution: when you license the anti-malware technology as SDK, this information is always
available to you. More, an experienced vendor such as Bitdefender would be able to offer different
SDKs based on your needs, which would differ in their requirements of Internet connectivity. Also
the situation with firewalled networks, is common among technology partners, so you will get
access to the supported solution which performs the update mirroring, and will let hospitals to
set up their own secure update servers.
6
Question 4: Can Antivirus Work with my device security
measures?
You might create a very secure device, using the read-only file system to store executable
binaries, and use snapshots for the document areas – including registry – and restore it upon
reboot. This way any changes made to the configuration by one doctor on your device could be
easily reverted when another doctor gets on duty.
But does the antivirus support it? This is certainly not a typical end-user configuration, even in
corporate environments, so don’t be surprised if it does not. For example: it might rely internally
on binary patching, and break when the binaries are located in the read-only file system. It can
store the current update version in the registry branch which is not properly saved, and find out
the updates are reversed upon reboot and do not match the registry anymore.
Rule: a security solution running on a device with unique requirements should be explicitly
cleared by the vendor to support those requirements.
Moreover, even if the current version you tested works in this environment, there is no guarantee
the next version will work too. This is certainly not the use case the vendor tests the product on –
so your luck here is, indeed, just pure luck. But do you want to gamble with security?
Solution: when you license the anti-malware technology as SDK, you are in complete control of
which files are stored, and where they are stored. You can integrate the antivirus update process
with your read-only protection mechanism so you can allow write access for some components
for only specific time, which will allow the security solution to function properly while maintaining
the higher degree of security for your device than your competitors.
Paper
7
Question 5: Can I use the antivirus built-in extra
functionality?
Most antivirus products do a good job protecting themselves from malware. A typical malware –
even possessing administrative privileges on Windows – cannot delete the antivirus files, kill its
process or write to its memory. However, an off-the-shelf product – including enterprise products
– typically products do not offer additional self-protection features to incorporate into your
application.
Rule: a security solution running on a medical device should protect not just themselves, but the
medical application too.
The protection functionality offered by the underlying technology is very powerful – you can
prevent modification of files, registry keys, and process memory. In some cases you can even
prevent reading the process memory – even if the attacker possesses the administrator rights!
This provides a higher degree of security, and is very useful in securing your device against
internal attackers.
Solution: many experienced technology licensing vendors such as Bitdefender offer this
functionality as part of some of the SDKs, so when you need it, you’re covered.
8
Question 6: Does antivirus leak any data which would
get me in trouble?
Many antivirus products see their main job as protecting the consumer, including the consumer
privacy. But they protect it only from the “bad guys”. They might not be protecting it from the
“good guys”, and certainly not from themselves. Your security product – even an enterprise
product – might be sending a lot of information back to the vendor, such as diagnostic
information, some scanned files, some visited URLs and so on. This might not be applicable for a
medical device, and might even be considered violation of the patient information protection laws,
such as HIPAA in the USA.
Rule: a security solution running on a medical device should send out no protected or identifiable
information – even back to the vendor.
In case you’re using a free product, the situation is typically even worse. The vendors offering free
products need to make money to stay in business, so they typically collect a lot of information,
which could be then shared for profit. Remember the old saying, “if you’re not paying for the
product, you are the product”. The problem here is that even if you are paying for the product,
the vendor might still “subsidize” the lower product price with the information sharing. And the
transparency differs among vendors – while some vendors are very open about this, some bury it
in legaleze on page 268 of their privacy policy, where it is unlikely to be ever discovered.
Another possibility is that the antivirus vendor itself is using one or more 3rd
party technologies
internally, and those technologies share your data internally. This makes it much more difficult to
find out which information is shared and how it is used, since you might even not know about the
existence of a 3rd
party vendor (those partnerships are typically not public information). And even
if you’re aware of this issue, what happens if the technology vendor is changed, or acquired, or
changes their privacy policy tomorrow?
Solution: when you license the anti-malware technology as a SDK, it typically does not share
anything at all. You can enable sharing of specific information which would gain you certain
benefits (for example, if you want certain files to be re-analyzed manually for being malicious, you
would have to share them). But this sharing is always happening consciously, you’re always in
control of what you want to share, and can stop the sharing anytime, or per-customer based. Also
you can always ask the vendor to clarify if any 3rd
party technology is used, and act accordingly.
Paper
9
Question 7: Is my operating system supported?
Does the antivirus documentation says it supports the operating system you’re running it on, such
as Windows 7 Embedded? Or it doesn’t but you called the sales department and they assured
you “did I just hear ‘Windows’? Yeah, it surely works on Windows!” Or – even worse – one of your
engineers bought the antivirus in a store, installed on your device, popped up the UI, played with it
for 15 minutes and wrote a report “it works”?
Rule: if the antivirus specification does not say the OS is supported, it is not.
You can think it is easy to ignore this rule – after all you just need to test the antivirus yourself on
the OS, right? Nope. First, this is not easy – you need to spend some major effort to ensure the
antivirus works properly on this OS. This would require a complete test of it, and the complexity
of this task is obvious once you understand it is not enough just to install it there, click on the UI
popup, perform a scan and mark it as “checked”.
What if antivirus affects some functionality of your device hardware? This may be obvious, as
when the antivirus disabled a touch screen because of driver conflict. But it might be not so
obvious, when you find out that when your X-Ray tries to upload the shots to a central server, this
connection is blocked as suspicious. Or after your software has been run for two weeks, it makes
the antivirus behavior analysis module think it is malware, and it gets deleted? Just to find things
like that would require long-running test of your whole application functionality together with this
antivirus.
There also could be upgrades – OS upgrades, your application upgrades, product upgrades. An
OS got a security update, and the antivirus driver did not mark it as valid for this OS. It didn’t
check this before this update, but now it does, and the antivirus does not work anymore, or
crashes the OS on boot. Or the antivirus vendor made some changes to make it Windows 2020
compatible – and those exact changes broke the compatibility with your OS.
With all those issues you’re completely at mercy of the security vendor. Maybe they’d listen to
your pleas and restore the functionality – after accepting a fat check, no doubts – but even then
the result is not guaranteed, especially the urgent result.
Solution: when you license the anti-malware technology for your operating system, it is
guaranteed to be supported for the duration of the contract. The experienced vendor will also
help you to test your product to ensure there is no incompatibility between your product and their
code, and will promptly fix the issues if there is any. With the SLAs at your back you’ll feel much
more comfortable facing your demanding customers.
10
Question 8: Will the antivirus vendor support my use
cases?
What happens if antivirus decides that your product update executable is malware? After all, it
downloads executable files from Internet, and then overwrites existing executable files with them
– this is how a lot of malware acts, so this is certainly possible. What would you do in this case?
Rule: if you purchase off-the-shelf product, expect off-the-shelf support.
Most likely you’ll call the product support. With the off-the-shelf product it would probably take a
while to reach out to someone who can actually understand the issue, and it will take even longer
to find out someone who’s capable to take some action on your behalf. Even if you purchased
the enterprise version, and reached the enterprise support, they still might not be familiar with
the nuances of your product – after all it does not resemble anything like typical enterprise
environment!
In any case, expect to submit your product for analysis (the antivirus vendor needs to make sure
it is indeed a clean product and not malware), and this analysis might take some time too. Note
that since there is no NDA between you and the antivirus vendor – and since it is you who’re
experiencing the issue, not them, they might not be willing to sign one – your product binaries
might be shared with third parties.
Of course, when the next version of your product update is finally downloaded, you may be up to
the same procedure again – because it is a different binary now, and the antivirus vendor has no
way to know about it or test against it.
Solution: when you license the anti-malware technology, as part of the deal you are receiving
access to the completely different level of support – sometime you can even communicate
directly with engineers and researchers. This means your problems are fixed fast, and most of
them wouldn’t even happen – because the support would think ahead of this scenario, and ask
you to submit your new product binaries in advance, so the vendor can ensure it is not falsely
detected. And of course your submissions would be covered under the typical business NDA.
Paper
11
Conclusion
As you see, there are significant advantages of licensing the anti-malware technology from a
trusted vendor versus using the off-the-shelf product for securing your device. Even though these
products maybe the easiest to implement, Antimalware SDKs offer greater flexibility to avoid the
typical problems associated with off-the-shelf antivirus products.
All Rights Reserved. © 2016 Bitdefender.
All trademarks, trade names, and products referenced herein are property of their respective owners.
FOR MORE INFORMATION VISIT: bitdefender.com/oem/
18072016-Bitdefender-OEM-Papers-UseOffShelf-en_US
Bitdefender delivers security technology in more than 100 countries through a cutting-edge network of value-added alliances, distributors and reseller
partners. Since 2001, Bitdefender has consistently produced market-leading technologies for businesses and consumers and is one of the top security
providers in virtualization and cloud technologies. Bitdefender has matched its award-winning technologies with sales alliances and partnerships and has
strengthened its global market position through strategic alliances with some of the world’s leading virtualization and cloud technology providers.

Mais conteúdo relacionado

Mais procurados

Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentationDarshan Khant
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...Adrian Sanabria
 
Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseLumension
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructureAnton Chuvakin
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
Whitelist Tutorial 1
Whitelist Tutorial 1Whitelist Tutorial 1
Whitelist Tutorial 1tafinley
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfAdrian Sanabria
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerGFI Software
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Importance Of Structured Incident Response Process
Importance Of Structured Incident Response ProcessImportance Of Structured Incident Response Process
Importance Of Structured Incident Response ProcessAnton Chuvakin
 
Can Symantec reboot its own blockbuster success
Can Symantec reboot its own blockbuster successCan Symantec reboot its own blockbuster success
Can Symantec reboot its own blockbuster successSymantec
 
Cloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerCloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerAdrian Sanabria
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Adrian Sanabria
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesIJNSA Journal
 
Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportGroup of company MUK
 

Mais procurados (20)

Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentation
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
 
Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of Defense
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructure
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Whitelist Tutorial 1
Whitelist Tutorial 1Whitelist Tutorial 1
Whitelist Tutorial 1
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard Of
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Importance Of Structured Incident Response Process
Importance Of Structured Incident Response ProcessImportance Of Structured Incident Response Process
Importance Of Structured Incident Response Process
 
2016 virus bulletin
2016 virus bulletin2016 virus bulletin
2016 virus bulletin
 
Can Symantec reboot its own blockbuster success
Can Symantec reboot its own blockbuster successCan Symantec reboot its own blockbuster success
Can Symantec reboot its own blockbuster success
 
Cloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerCloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security Practitioner
 
Vulnerability Assessment Report
Vulnerability Assessment ReportVulnerability Assessment Report
Vulnerability Assessment Report
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017
 
Disaster Proof
Disaster ProofDisaster Proof
Disaster Proof
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical Support
 

Semelhante a Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Good Idea?

Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability ManagementGFI Software
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityTechvera
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyChristoanSmit
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023SofiaCarter4
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and RiskSecPod Technologies
 
AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewJermund Ottermo
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesKristin Helgeson
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxRichardSugbo
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And RiskChandrashekhar B
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017Jermund Ottermo
 
Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Doryan Mathos
 
Netreo whitepaper 5 ways to avoid it management becoming shelfware
Netreo whitepaper   5 ways to avoid it management becoming shelfwareNetreo whitepaper   5 ways to avoid it management becoming shelfware
Netreo whitepaper 5 ways to avoid it management becoming shelfwarePeter Reynolds
 
Sa No Scan Paper
Sa No Scan PaperSa No Scan Paper
Sa No Scan Papertafinley
 
Packet capture and network traffic analysis
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysisCARMEN ALCIVAR
 

Semelhante a Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Good Idea? (20)

Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software review
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
 
hotel management
hotel managementhotel management
hotel management
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
 
Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014
 
Netreo whitepaper 5 ways to avoid it management becoming shelfware
Netreo whitepaper   5 ways to avoid it management becoming shelfwareNetreo whitepaper   5 ways to avoid it management becoming shelfware
Netreo whitepaper 5 ways to avoid it management becoming shelfware
 
linkedin brainies
linkedin brainieslinkedin brainies
linkedin brainies
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Sa No Scan Paper
Sa No Scan PaperSa No Scan Paper
Sa No Scan Paper
 
Avc prot 2016a_en
Avc prot 2016a_enAvc prot 2016a_en
Avc prot 2016a_en
 
Packet capture and network traffic analysis
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysis
 

Último

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Último (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Good Idea?

  • 1. Paper Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Good Idea? Or Eight Questions You Should Ask Yourself before doing that.
  • 2. 2 Most vendors, who create embedded devices – especially medical devices such as medical X-Ray connected machines, connected Labs and other equipment – are smart, and understand the need of securing them against external threats such as malware. Such devices often run a common operating system such as Windows Embedded, or Linux and are susceptible to many kinds of malware threats as their non-embedded threats. Thus, protection against malware is important consideration when securing such devices. A possible approach for securing those devices is to install an off-the-shelf antivirus product. The advocates of this approach typically come up with convincing arguments such as: • This antivirus is being used successfully by millions of users, so there should be no issues running it on your devices; • Your engineers are familiar with the antivirus installation and maintenance; • The installation is quick – your device would be secured in a couple minutes of time, no integration needed; • It is very cheap – in some cases it could be even free! Sounds like a plan? It does at first glance. But if you think it is a good idea, please read on. There is a number of questions you need to ask yourself before making such decisions, and this article will help you.
  • 3. Paper 3 Question 1: Would the product UI confuse my users? Imagine your X-Ray connected machine got infected. Maybe someone plugged in a USB stick with malware, and opened an image file which triggered a vulnerability in a parser. Maybe one of Windows services running on it had a remote code execution vulnerability, and got attacked through the network. The antivirus detected the threat, and… … and popped up the message on the screen! Now a typical desktop user, who installed Bitdefender antivirus, would obviously understand what’s going on. However the technician operating the X-Ray machine might have never heard of Bitdefender, or (unlikely but possible) not even know about the antivirus software at all. So they might not know what to do with this. They might even click on “More details” (assuming your interface supports it in the first place!), and get even more confused. Most likely this will result in their typical workflow being interrupted, and your support being called. At this moment the local IT department might get involved, and hopefully would fix it. Rule: a security solution running on a medical device should be able to report infections to an appropriate department, and do so without workflow interruption. There is absolutely no need for the technician to even see this message. The infection should be automatically blocked, but because it was present, it is not enough. The IT department must be notified so they can find out how it got there, and possibly clean other infected machines around. In case of a hospital it should be their IT department, but if you offering support, it should be YOUR IT department. And this should not confuse the operators and break the workflow. Another issue is changing the product settings remotely. One option is to install remote management software on each device, and modify the settings manually. The issue here is that you can only do it during non-business hours, or otherwise the people would freak out seeing the mysterious dialogs popping up on the X-Ray control panel. And if your business is good and you have sold not just one machine, but 1000s – there’s a lot of work to do. Until next week someone finds out one of the settings were set incorrectly, and you’re up to repeating this again. Solution: when you license the anti-malware technology as Software Development Kit SDK, there is no UI at all. You’re in complete control of the whole business logic, you decide what to do when infections are detected, where they are reported and how. And you tell the SDK which settings should be used. The settings could be stored on your server and your solution might download them and apply them to all machines simultaneously, ensuring the best protection and the best user experience for your valuable customers.
  • 4. 4 Question 2: Can I exclude the useless components? A security product typically includes a lot of features. Those related to malware detection are useful for you, but the other features might not be so useful. For example, the antivirus product could include the anti-spam module, which makes no sense on the X-Ray machine control panel. There could be built-in ad blocker, password manager, parental control, online banking protection, and another zillion of features making no sense for your use case. Those features are quite useful for desktop users, but they make no sense in your environment. Rule: a security solution running on a medical device should only contain the necessary components, and no more than that. You might think it is not really a big deal. What issue is if there are extra features which nobody would use? But please consider the following issues: • Each of those features consumes some disk space, CPU, memory and (sometime) network. Those are valuable resources which could be used for your application to perform faster, do more processing or offer more features. • Each of those features might have bugs, for which the product update would be issued. This means you would have to update the antivirus much more frequently than if those features were excluded. The product might only fix issues in the antispam module, but since few vendors are so specific in the release notes, you are likely to be forced to install every single product update. • Some of those features might actually create issues. For example, there may be an
  • 5. Paper 5 automatic “system optimization component” which reconfigures the system for the “best user experience”, and changes the screen resolution which breaks your application layout. Or there may be a “disk space cleanup” feature which deletes the temporary files of your application as “unused” right where it was about to start processing them. • And some features may be outright dangerous. For example, the antivirus might include automatic remote backup, which uploads all the documents to a remote location automatically. This may lead to leakage of the documents containing medical information, and such act might be against the laws of your country – such as HIPAA in the USA – exposing your company to a lawsuit. Some products may include device tracking and remote wipe features, which could be abused remotely if misconfigured. Solution: when you license the anti-malware technology as SDK, you only license the components which you need. You don’t pay extra for the components you won’t use, and you don’t include components such as “system optimizer” which have no place in your professional solution. Question 3: Can I control the Antivirus use of Internet? A medical facility often has a restrictive Internet access policy, and for the good reason. However the antivirus products need to be updated frequently, or their ability to cope with new threats would be reduced. And some antivirus products require Internet connection to be available even for basic functionality, such as malware scanning, and will not work at all without one. This may create issues, because many medical devices are portable, and are constantly transferred between wards within the hospital the units – and even if it is not, a unit may be installed in a place where the network connection is not available at all. Rule #3: a security solution running on a medical device should work with limited Internet usage, and should be fully-functional if network connection is interrupted. Can you configure the antivirus to download its updates – including the product updates – from an internal server? Note that this is not a typical home user configuration, so your product will not have it built-in – you might need some extra software for that. Can you get it, and under which terms? And can your antivirus function without Internet connection, and if yes, how much of functionality would be missing? Most modern products just print the “Internet connection required” on their box, and almost nobody explains in the documentation, which components and functionality depends on the Internet, what speed and throughput is required, and how much traffic a product would consume daily. for what the connection is required, what is the required throughput, and what functionality depends on it. Solution: when you license the anti-malware technology as SDK, this information is always available to you. More, an experienced vendor such as Bitdefender would be able to offer different SDKs based on your needs, which would differ in their requirements of Internet connectivity. Also the situation with firewalled networks, is common among technology partners, so you will get access to the supported solution which performs the update mirroring, and will let hospitals to set up their own secure update servers.
  • 6. 6 Question 4: Can Antivirus Work with my device security measures? You might create a very secure device, using the read-only file system to store executable binaries, and use snapshots for the document areas – including registry – and restore it upon reboot. This way any changes made to the configuration by one doctor on your device could be easily reverted when another doctor gets on duty. But does the antivirus support it? This is certainly not a typical end-user configuration, even in corporate environments, so don’t be surprised if it does not. For example: it might rely internally on binary patching, and break when the binaries are located in the read-only file system. It can store the current update version in the registry branch which is not properly saved, and find out the updates are reversed upon reboot and do not match the registry anymore. Rule: a security solution running on a device with unique requirements should be explicitly cleared by the vendor to support those requirements. Moreover, even if the current version you tested works in this environment, there is no guarantee the next version will work too. This is certainly not the use case the vendor tests the product on – so your luck here is, indeed, just pure luck. But do you want to gamble with security? Solution: when you license the anti-malware technology as SDK, you are in complete control of which files are stored, and where they are stored. You can integrate the antivirus update process with your read-only protection mechanism so you can allow write access for some components for only specific time, which will allow the security solution to function properly while maintaining the higher degree of security for your device than your competitors.
  • 7. Paper 7 Question 5: Can I use the antivirus built-in extra functionality? Most antivirus products do a good job protecting themselves from malware. A typical malware – even possessing administrative privileges on Windows – cannot delete the antivirus files, kill its process or write to its memory. However, an off-the-shelf product – including enterprise products – typically products do not offer additional self-protection features to incorporate into your application. Rule: a security solution running on a medical device should protect not just themselves, but the medical application too. The protection functionality offered by the underlying technology is very powerful – you can prevent modification of files, registry keys, and process memory. In some cases you can even prevent reading the process memory – even if the attacker possesses the administrator rights! This provides a higher degree of security, and is very useful in securing your device against internal attackers. Solution: many experienced technology licensing vendors such as Bitdefender offer this functionality as part of some of the SDKs, so when you need it, you’re covered.
  • 8. 8 Question 6: Does antivirus leak any data which would get me in trouble? Many antivirus products see their main job as protecting the consumer, including the consumer privacy. But they protect it only from the “bad guys”. They might not be protecting it from the “good guys”, and certainly not from themselves. Your security product – even an enterprise product – might be sending a lot of information back to the vendor, such as diagnostic information, some scanned files, some visited URLs and so on. This might not be applicable for a medical device, and might even be considered violation of the patient information protection laws, such as HIPAA in the USA. Rule: a security solution running on a medical device should send out no protected or identifiable information – even back to the vendor. In case you’re using a free product, the situation is typically even worse. The vendors offering free products need to make money to stay in business, so they typically collect a lot of information, which could be then shared for profit. Remember the old saying, “if you’re not paying for the product, you are the product”. The problem here is that even if you are paying for the product, the vendor might still “subsidize” the lower product price with the information sharing. And the transparency differs among vendors – while some vendors are very open about this, some bury it in legaleze on page 268 of their privacy policy, where it is unlikely to be ever discovered. Another possibility is that the antivirus vendor itself is using one or more 3rd party technologies internally, and those technologies share your data internally. This makes it much more difficult to find out which information is shared and how it is used, since you might even not know about the existence of a 3rd party vendor (those partnerships are typically not public information). And even if you’re aware of this issue, what happens if the technology vendor is changed, or acquired, or changes their privacy policy tomorrow? Solution: when you license the anti-malware technology as a SDK, it typically does not share anything at all. You can enable sharing of specific information which would gain you certain benefits (for example, if you want certain files to be re-analyzed manually for being malicious, you would have to share them). But this sharing is always happening consciously, you’re always in control of what you want to share, and can stop the sharing anytime, or per-customer based. Also you can always ask the vendor to clarify if any 3rd party technology is used, and act accordingly.
  • 9. Paper 9 Question 7: Is my operating system supported? Does the antivirus documentation says it supports the operating system you’re running it on, such as Windows 7 Embedded? Or it doesn’t but you called the sales department and they assured you “did I just hear ‘Windows’? Yeah, it surely works on Windows!” Or – even worse – one of your engineers bought the antivirus in a store, installed on your device, popped up the UI, played with it for 15 minutes and wrote a report “it works”? Rule: if the antivirus specification does not say the OS is supported, it is not. You can think it is easy to ignore this rule – after all you just need to test the antivirus yourself on the OS, right? Nope. First, this is not easy – you need to spend some major effort to ensure the antivirus works properly on this OS. This would require a complete test of it, and the complexity of this task is obvious once you understand it is not enough just to install it there, click on the UI popup, perform a scan and mark it as “checked”. What if antivirus affects some functionality of your device hardware? This may be obvious, as when the antivirus disabled a touch screen because of driver conflict. But it might be not so obvious, when you find out that when your X-Ray tries to upload the shots to a central server, this connection is blocked as suspicious. Or after your software has been run for two weeks, it makes the antivirus behavior analysis module think it is malware, and it gets deleted? Just to find things like that would require long-running test of your whole application functionality together with this antivirus. There also could be upgrades – OS upgrades, your application upgrades, product upgrades. An OS got a security update, and the antivirus driver did not mark it as valid for this OS. It didn’t check this before this update, but now it does, and the antivirus does not work anymore, or crashes the OS on boot. Or the antivirus vendor made some changes to make it Windows 2020 compatible – and those exact changes broke the compatibility with your OS. With all those issues you’re completely at mercy of the security vendor. Maybe they’d listen to your pleas and restore the functionality – after accepting a fat check, no doubts – but even then the result is not guaranteed, especially the urgent result. Solution: when you license the anti-malware technology for your operating system, it is guaranteed to be supported for the duration of the contract. The experienced vendor will also help you to test your product to ensure there is no incompatibility between your product and their code, and will promptly fix the issues if there is any. With the SLAs at your back you’ll feel much more comfortable facing your demanding customers.
  • 10. 10 Question 8: Will the antivirus vendor support my use cases? What happens if antivirus decides that your product update executable is malware? After all, it downloads executable files from Internet, and then overwrites existing executable files with them – this is how a lot of malware acts, so this is certainly possible. What would you do in this case? Rule: if you purchase off-the-shelf product, expect off-the-shelf support. Most likely you’ll call the product support. With the off-the-shelf product it would probably take a while to reach out to someone who can actually understand the issue, and it will take even longer to find out someone who’s capable to take some action on your behalf. Even if you purchased the enterprise version, and reached the enterprise support, they still might not be familiar with the nuances of your product – after all it does not resemble anything like typical enterprise environment! In any case, expect to submit your product for analysis (the antivirus vendor needs to make sure it is indeed a clean product and not malware), and this analysis might take some time too. Note that since there is no NDA between you and the antivirus vendor – and since it is you who’re experiencing the issue, not them, they might not be willing to sign one – your product binaries might be shared with third parties. Of course, when the next version of your product update is finally downloaded, you may be up to the same procedure again – because it is a different binary now, and the antivirus vendor has no way to know about it or test against it. Solution: when you license the anti-malware technology, as part of the deal you are receiving access to the completely different level of support – sometime you can even communicate directly with engineers and researchers. This means your problems are fixed fast, and most of them wouldn’t even happen – because the support would think ahead of this scenario, and ask you to submit your new product binaries in advance, so the vendor can ensure it is not falsely detected. And of course your submissions would be covered under the typical business NDA.
  • 11. Paper 11 Conclusion As you see, there are significant advantages of licensing the anti-malware technology from a trusted vendor versus using the off-the-shelf product for securing your device. Even though these products maybe the easiest to implement, Antimalware SDKs offer greater flexibility to avoid the typical problems associated with off-the-shelf antivirus products.
  • 12. All Rights Reserved. © 2016 Bitdefender. All trademarks, trade names, and products referenced herein are property of their respective owners. FOR MORE INFORMATION VISIT: bitdefender.com/oem/ 18072016-Bitdefender-OEM-Papers-UseOffShelf-en_US Bitdefender delivers security technology in more than 100 countries through a cutting-edge network of value-added alliances, distributors and reseller partners. Since 2001, Bitdefender has consistently produced market-leading technologies for businesses and consumers and is one of the top security providers in virtualization and cloud technologies. Bitdefender has matched its award-winning technologies with sales alliances and partnerships and has strengthened its global market position through strategic alliances with some of the world’s leading virtualization and cloud technology providers.