AVG 2012: your local pub bouncer made digital

Faster, uses less memory, cleans up other people's mess

AVG Internet Security 2012 main screen: simpler, fewer icons, complex options hidden (AVG, supplied)

AVG Internet Security 2012 main screen: simpler, fewer icons, complex options hidden (AVG, supplied)

As AVG Ambassador Tony Anscombe explained the rational behind some of the new features in AVG Internet Security 2012, released today, I couldn't help but think of the bouncer at one of my favourite local pubs.

An enormous but quietly-spoken Islander, he keeps an eye open for any and every little situation that could potentially turn nasty. When something does turn, he acts swiftly and with minimal disturbance to the patrons.

But he also keeps an eye open for things that don't hold the potential for violence, but are "merely" risks to comfort or safety. While patrolling the bar, he clears glasses from shelves from where they might fall. He pushes an awkwardly-placed backpack further under a table so no-one will trip.

It's an attitude that takes this bouncer's work well beyond perimeter or endpoint defnece.

There's a similar attitude behind AVG's latest release that takes it where traditional anti-virus (AV) software doesn't go.

"Security is a strange topic because people like security, they want security, they know they need to have it. But in the very same breath they don't want to interact with it, and they don't want it to tell them it's doing anything," Anscombe told CSO Online.

People want it to be simpler. So AVG has simplified the main screen, hiding lesser-used options and incorporating their three add-on products: LiveKive online backups, Family Safety and PC Tuneup.

People are also afraid that AV will slow their computer, according to AVG's research. So AVG reworked the timing and scope of scans, reduced the number of running processes from 16 to 11, improved boot time and reduced memory usage by a claimed 20 percent -- a figure to confirmed by independent testing.

But AVG went further. While it's down in the bowels of the computer, AVG 2012 cleans up some mess.

"What we want to do is better the experience of somebody using their machine. Give them the speed back, so their experience of the internet is slick and fast," Anscombe said.

AVG Accelerator, which optimises the computer's internet connection, is claimed to cut download times for YouTube videos and Download.com files by up to half -- again the figure is to be confirmed. "It won't make much difference for a 10-second video clip," Anscombe said. But for anything bigger than 8 or 10MB users should see a "significant performance difference".

Anscombe wouldn't be drawn on how this is done. "I'm not allowed to get into it because it's proprietary to us," he said.

AVG Advisor resulted from a study of user behaviour that revealed some applications needed management to speed them up. Web browsers were an obvious first candidate, Memory leaks in browsers open for many hours cause significant slowdowns.

AVG Advisor monitors browser activity -- currently only Google Chrome, Mozilla Firefox and Microsoft Internet Explorer are supported -- and pops up a window to tell you when it's time to restart the browser for a "significant" speed increase.

This make-the-experience-better approach means that AVG 2012 defends against both halves of Anscombe's taxonomy of fake anti-virus (Fake-AV) software, "Fake-AV that delivers a Trojan or malware, and Fake-AV that takes $20 off you."

"Now the Trojan or malware version, we block it anyway because it's got malware in it. It's the other one, it's not strictly doing anything wrong other than fraudulently taking money off the person." From a traditional AV viewpoint it's doing the right thing, delivering harmless, well-formed HTML to the web browser for display on screen.

"We've built some patent-pending technology that looks at what's being messaged to the user and whether we think it's Fake-AV," Anscombe said. It looks at what the software is telling the user it's doing, for example, and compares that with the actual activity on the machine.

"This to me is taking us another layer out of the AV thing, because this is not AV. This is actually now protecting the user against a scam that's happening on the internet," he said. "So again we're trying to keep them safe, and kept their enjoyment of the internet good."

Join the CSO newsletter!

Error: Please check your email address.

Tags anti-virussecurityAVGAVG AcceleratorAVG ResearchAV Softwarenewstrojanmalware

More about AVG Technologies AUGoogleMicrosoftMozilla

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Stilgherrian

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts