Where should virus checking be done? Almost every security vendor under the sun is releasing a solution for some place that they believe is vulnerable. The options range from scanning e-mail to networks to servers to floppies. And then there is the hostile code wild card. Trend Micro is on the right track with the technology in InterScan but has gone wrong in its implementation. The notion of perimeter security is dead and, along with it, any gateway device. Most hacking and securitybreaches occur on the inside of a corporation, so security must be all-encompassing. When vendors start developing solutions that look as critically at internal traffic as they do at external traffic, the world will be a safer place.
Pankaj Chowdhry, PC Week Labs' West Coast technical director, can be reached at pankaj_ firstname.lastname@example.org.