SHARE
Facebook X Pinterest WhatsApp

The Fall and Rise of Security Agents

Current conventional thinking concerning security is heavily focused on the role of the security gateway. The basic idea is that IT organizations need to reduce the total cost of security by consolidating as many security appliances as possible into gateways that people sometime refer to as next-generation firewalls. As a bonus, these gateways are typically […]

Written By
MV
Mike Vizard
Mar 14, 2011

Current conventional thinking concerning security is heavily focused on the role of the security gateway. The basic idea is that IT organizations need to reduce the total cost of security by consolidating as many security appliances as possible into gateways that people sometime refer to as next-generation firewalls. As a bonus, these gateways are typically a whole lot more useful than legacy security systems, especially when it comes to firewalls.

But Trend Micro CEO Eva Chen warns that while this approach to security has merits, gateways are really a secondary line of defense, and she argues that customers and the security industry as a whole need to start thinking about relying more on agent technologies on the client to stop attacks at their point of origin. After all, most malware makes it onto the corporate network because of an infected endpoint. Rather than let all those infected devices consume bandwidth by attempting to send malware through gateways, it would be a whole lot more cost-effective to rely on agent software to eliminate the malware on the endpoint in the first place.

This approach runs counter to previous lines of security thinking because the argument has always been that agents introduce too much overhead on the client. That may have been true in the past, but Chen argues that there is now more than enough processing power on the client to start deploying agent technologies much more aggressively.

One of the problems with security in general is that IT organizations get addicted to showing the same defense day after day. It’s like a football team that deploys the same defense pattern on every play; it doesn’t take long before the opposition figures out how to exploit the team in that defense. Ultimately, what Chen is making a case for is a more balanced approach to defense that not only provides higher levels of security, but also reduces the cost of all the bandwidth that is now being consumed by mindless malware all over the network.
 

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.