Skip to main content
SolarWinds MSP
  • Login
  • Support
  • Partnerships
    • Partnerships Overview
    • Solution Provider Program
    • Technology Alliance Program
    • Distributor Program
SolarWinds MSP
  • Products
    • Monitoring & Management
    • N-central Automate. Tackle complex networks. Get remote monitoring and management built for efficiency and scale.
    • RMM Start fast. Grow at your own pace. Try this powerful but easy remote monitoring and management solution.
    • Backup
    • Backup Get data protection for servers, workstations, applications, documents, and Microsoft 365 from one dashboard.
    • Security
    • EDR Defend against ransomware, zero-day attacks, and evolving threats with endpoint detection and response.
    • Mail Assure Leverage mail protection and archiving to keep your users safe from email threats and downtime.
    • Passportal Adopt and enforce best practices for password and documentation management with ease.
    • Tools & Services
    • MSP Manager Increase helpdesk efficiency with a robust PSA, ticketing, reporting, and billing management solution.
    • Take Control Help support customers and their devices with remote support tools designed to be fast and powerful.
    • View All
  • Solutions

    Solutions

    • Security Protect your customers and expand your business by offering layered security services without the complexity.
    • Monitoring Choose the right remote monitoring and management solution to meet you where you are and grow with you.
    • Operational Efficiency Boost profits by improving efficiency via automation, resources and training, and time-saving products.
    • IT Departments Keep your organization productive by easily managing IT from a single, easy-to-use, web-based dashboard.
    • Remote Monitoring Solutions Comparison Compare SolarWinds RMM and N-central side by side. Sign up to talk to a specialist to find the right fit.
    • View All
  • Resources
    • Download
    • Resource Library
    • Product Information
    • Free Tools
    • Learn
    • MSP Institute Webinar Series
    • Daily Live Demos
    • MSP Advice Project
    • Ask the N-central Experts
    • Upcoming Webcasts
    • Connect
    • Blog
    • Security Resource Center
    • Events
    • RMM Foundations Training
  • About
    • Company
    • About Us
    • Leadership
    • Careers
    • News & Press
    • Awards & Recognition
    • Support & Policies
    • Customer Success
    • Customer Support
    • Legal
    • Security
    • Get in Touch
    • Contact
    • Get a Quote
    • Worldwide Sales & Support
  • IT Departments
  • Contact Sales
    • Contact Sales
    • General Inquiry
    • Get a Quote
    • Worldwide Sales & Support
    • Talk to Specialist
    • Security Solutions
    • Monitoring Solutions
    • Operational Efficiency
  • Try Now
    • Monitoring & Management
    • N-central
    • RMM
    • Backup
    • Security
    • EDR
    • Mail Assure
    • Passportal
    • Tools & Services
    • MSP Manager
    • Take Control
  • Request a Quote
  • Try Now
    • SolarWinds RMM
    • SolarWinds N-central
    • SolarWinds Backup
    • MSP Manager
    • SolarWinds Mail Assure
    • SolarWinds Passportal
    • SolarWinds Risk Intelligence
    • SolarWinds Take Control
Request quote
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • The Head Nerds
    • Tips & Advice
    • Training
Home Blog MSP Business Cloud Computing Moving to the Cloud - Cloud-Based Antivirus
Cloud Computing

Moving to the Cloud - Cloud-Based Antivirus

By Nick Cavalancia
20 June, 2017

The move from on-premises endpoints to hosted endpoints in the cloud is one many organizations are embracing. Why? Because it offers benefits like better availability, lower cost, and none of the hardware headaches. Cloud options like Amazon Web Services™, VMware® Cloud Air, Azure®, Rackspace® (to name a few) all provide IT with an ability to quickly create, manage, and remove virtual machines (VMs) as business needs change.

Staying Vigilant Against Malware and Ransomware 

stayaware.jpgOnce you move the endpoints into the cloud with a trusted vendor, you can’t (and shouldn’t) assume the endpoints are secure. The fact is, they’re not. The threat of malware is on the rise, and cloud-based systems are often seen as opportunistic, low-hanging fruit by cyber attackers. Employing a simple war dialer-type scan of a cloud infrastructure vendor’s IP addresses can highlight a number of potential unsecured targets for an attacker. According to the Verizon® Data Breach Investigations Report, most attacks involve some type of malware, so having some level of antivirus protection is a mandatory part of your layered defensive security strategy to safeguard your cloud-based endpoints from the latest viruses, malware, and spam. 

Is Antivirus in the Cloud Different Than On-Premises?

In a word, absolutely. 

Cloud-based antivirus, of course, has the same function as its on-premises counterpart. But the cloud adds one major design requirement to antivirus that on-premises is not as concerned with: performance. Given your cloud-based endpoints are likely virtual machines (VMs), there’s a big push to ensure the levels of disk and processor required are MUCH lighter in the cloud from that of on-premises antivirus—if not offloaded entirely. Traditional antivirus uses a number of operating system intercepts (memory, or file for example) to scan using various methods (such as signatures, heuristics, or sandboxing), which only kills a machine’s performance. Cloud-based antivirus is laser-focused on security and performance.

If you were to use that kind of solution within a cloud-based server hosting a number of VMs, you'd need to multiply the performance problem by the number of VMs—with each one slowing down the others (remember VMs are a shared resource system!).

How Do You Select the Right Cloud-based Antivirus Solution?

rightav.jpgChoosing the right antivirus for the cloud

The choice of a cloud-based antivirus solution comes down to three basic issues, all of which intersect:

  1. The antivirus feature set and the security value it brings
  2. The endpoint (read: guest VM) resources required
  3. The individual endpoint workloads

If you choose a powerful, comprehensive antivirus solution, but it taxes the living daylights out of your most critical workloads, you’re in trouble. The same goes for an extremely light version of antivirus that leaves your endpoint’s resources relatively untouched. You need to find the perfect balance of powerful and light. 

Which Antivirus Features Should You Be Looking For?

scanningfiles.jpgIt’s important to look beyond marketing claims and focus on the technical capabilities of each solution. Depending on the vendor you select, you’ll want to make sure whatever antivirus you put in place has one or more of the following features:

  • Agentless Scanning—In some solutions, there is no agent running within the endpoint VM itself. Instead, scans are performed by the host. This offloads the work to the host, eliminating resource bottlenecks and avoids the potential for simultaneous system scans. It also, in theory, provides for a higher VM density per host given the lower resource needed for each VM.
  • Network Traffic Scanning—Because the endpoints will most likely become infected as a result of downloading some bit of nasty code from the internet, intercepting and scanning the network traffic itself is another way of offloading the burden of scanning from the endpoint. 
  • Lightweight Agents—In this model, each endpoint does have a very small agent that has a far more limited set of responsibilities. Unlike an on-premises agent, a lightweight agent likely does no scanning of files. Instead, it collects relevant information about downloaded files—such as the file’s hash, its fuzzy hash (used to identify polymorphic malware), details on how the file was downloaded and from where, and other information—and passes all this to an external scanning engine.
  • Cloud-based Analysis—This server-side processing is accomplished by servers hosted by the antivirus provider. Normally used in conjunction with lightweight agents, this methodology successfully offloads any taxing of endpoint resources while utilizing a central, up-to-date engine. There are a few benefits of this model. First, the engine and its malware definitions are the culmination of every customer using it—so the moment a new piece of malware is identified, every customer benefits. Second, the engine itself isn’t accessible to malware creators, giving the antivirus vendor an upper hand in the battle.

Depending on the vendor, there are likely other features that add value, so the preceding list is by no means comprehensive. It does, however, provide a base level of functionality you should be looking for. Each vendor takes a slightly different approach, based on the way they see the problem and how it should be solved. 

Regardless of which method is used, keep a watchful eye on the claims of what a vendor’s solution specifically addresses. Some will only scan downloaded files, others focus on scans of file system changes, while others schedule scans of an endpoint. Assuming you are taking a layered approach to your cloud security, you’ll need to identify the weaknesses in your strategy and select a cloud-based antivirus solution that fills in the gaps.

Ensuring a Secure Cloud

The right cloud-based antivirus solution will have more than one of these features, but not necessarily all of them. What’s important is: first, have something in place (don’t wait just because you can’t find the right feature set—cyber criminals aren’t going to give you the needed time before they attack); second, consider how the security features you implement will impact performance; and third, select a solution that fits in the context of your overall security strategy.

 

Nick Cavalancia has over 20 years of enterprise IT experience and is an accomplished executive, consultant, trainer, speaker, and columnist. He has authored, co-authored and contributed to over a dozen books on Windows®, Active Directory®, Exchange™ and other Microsoft® technologies. Nick has also held executive positions at ScriptLogic®, SpectorSoft® and Netwrix® and now focuses on the evangelism of technology solutions.

Follow Nick on Twitter® at @nickcavalancia

 

Click here to find out more about our Layered Security offering and how it can help you secure your clients’ business.

 

© 2017 SolarWinds MSP UK Ltd. All rights reserved.

 

You might also like...
Cloud Computing

Moving to the cloud: Help ensure your cloud-based web security

Business Growth

How to Get Customer Buy-In for Cybersecurity

Cloud Computing

Understanding Software-Defined Networking

Cybersecurity

5 Ways to Stop Phishing Attacks

Cybersecurity

MSP Data Breach 101: 4 things you need to know about data security

Cloud Computing

Hyper-V Physical to Virtual

Want to stay up to date?

Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

Recent Posts
  • Three things I learned working for an MSP
  • Earning word-of-mouth referrals for your IT business
  • Backup automation part 1: Deploying backup devices
  • Ultimate Guide: MySQL Backup
  • Most common automation requests and how to solve them: Ep 2
Categories:
  • Security (240)
  • Tips & Advice (130)
  • Best Practices (97)
  • Backup & Disaster Recovery (96)
  • Managed Services (89)
  • The Head Nerds (82)
  • Business Growth (79)
  • IT Support (43)
  • Business (41)
  • Automation (40)
  • Operations (38)
  • Cybersecurity (37)
  • Mail (33)
  • Remote Management (30)
  • ITSM (26)
  • Networking (22)
  • Cloud Computing (21)
  • Data (21)
  • Marketing (15)
  • PSA (13)
  • Product (11)
  • Service Desk (6)
  • Services & Support (5)
  • Mobile (4)
  • Risk Intelligence (4)
  • GDPR (3)
  • Internet of Things (3)
  • Customer Service (3)
  • Research & Trends (2)
  • Training (2)
  • Business Risk (1)
  • LOGICcards (1)
  • Cybersecurity Awareness Month (1)
Show moreless
SolarWinds MSP

Products
  • SolarWinds RMM
  • SolarWinds N-central
  • SolarWinds Backup
  • SolarWinds EDR
  • SolarWinds MSP Manager
  • SolarWinds Mail Assure
  • SolarWinds Risk Intelligence
  • SolarWinds Take Control
  • SolarWinds Passportal
  • All Products Use Cases
Solutions
  • Security Solutions
  • Monitoring Solutions
  • Efficiency Solutions
  • Identify which RMM solution is right for me
  • Drive Efficiency with Automation
  • Manage my MSP Business More Efficiently
  • Manage my IT Department More Efficiently
  • Layered Security
  • Cross-Platform Support
  • Data-Driven Insights
About
  • About Us
  • Careers
  • Newsroom
  • Leadership Team
  • Upcoming Events
  • Subscription Preferences
  • SolarWinds
  • SolarWinds Trust Center
  • COVID-19 Response
Support
  • SolarWinds RMM
  • Solarwinds N-central
  • SolarWinds Backup
  • SolarWinds Mail Assure
  • SolarWinds Take Control
  • SolarWinds MSP Manager
  • Solarwinds Risk Intelligence
  • Solarwinds Threat Monitor
  • SolarWinds Passportal
  • SolarWinds Take Control Downloads
  • Backup & Recovery Downloads
  • Service Status

Footer 2

  • Legal Documents
  • Privacy
  • California Privacy Rights
  • Security Information
  • Sitemap

© SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd.
All Rights Reserved.