Arg! The money spent the month before I stated here.
-
They also don't allow technical support to deal with it, and their sales team would take multi-week vacations with no means of contacting them. They also didn't have a "restore" switch. The kill switch was one way. Once killed, the product was dead.
-
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
It's great for central management, keeping definitions updated, showing if any devices are not up to date... shows if windows updates are not current as well.
I'm not giving a theoretical problem. I've used it. I've had every feature you mentioned disabled at will, randomly, but ESET the company in order to force us to be pressured to give them more money.
Oh, well as with any service, if you don't pay the bill it gets cut off... we pay the bill we're fine. We don't pay the bill, we'll have another rsolution ready to replace ESET>
Don't patronize me. We DID pay the bill. ESET tried to steal from us.
-
@tim_g said in Arg! The money spent the month before I stated here.:
we pay the bill we're fine.
Now you are saying I'm lying. It happened twice. We had to threaten legal action AND had to pay our staff to manually reinstall for all clients. ESET stole from us. They are crooks. They are exactly the people I'd not want with access to my network.
-
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
It's great for central management, keeping definitions updated, showing if any devices are not up to date... shows if windows updates are not current as well.
I'm not giving a theoretical problem. I've used it. I've had every feature you mentioned disabled at will, randomly, but ESET the company in order to force us to be pressured to give them more money.
Oh, well as with any service, if you don't pay the bill it gets cut off... we pay the bill we're fine. We don't pay the bill, we'll have another rsolution ready to replace ESET>
Don't patronize me. We DID pay the bill. ESET tried to steal from us.
I'm no trying to. I obviously know 0 details of what happened with your personal experience with ESET.
It's the first I've heard anything like it, and completely opposite of my experience with ESET in the 6 years I've been dealing with them at an enterprise level.
-
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
It's great for central management, keeping definitions updated, showing if any devices are not up to date... shows if windows updates are not current as well.
I'm not giving a theoretical problem. I've used it. I've had every feature you mentioned disabled at will, randomly, but ESET the company in order to force us to be pressured to give them more money.
Oh, well as with any service, if you don't pay the bill it gets cut off... we pay the bill we're fine. We don't pay the bill, we'll have another rsolution ready to replace ESET>
Don't patronize me. We DID pay the bill. ESET tried to steal from us.
I'm no trying to. I obviously know 0 details of what happened with your personal experience with ESET.
It's the first I've heard anything like it, and completely is opposite of my experience with ESET in the 6 years I've been dealing with them at an enterprise level.
I've brought it up a ton, every time someone mentions considering ESET. They LITERALLY attempted to extort good, paying customers, twice. Lots of us. Pure, unmitigated extortion. Because they sold us the software and intentionally used a back door kill switch, they violated federal trade laws. They "took back" software they had sold to us which is the same as outright theft.
-
You haven't had to deal with it because we went through it. Doesn't change the fact that they can't be trusted. They just can't pull that stunt any more because we've been so vocal about it since.
-
@scottalanmiller said in Arg! The money spent the month before I stated here.:
I've brought it up a ton, every time someone mentions considering ESET.
I've never seen anything about, regardless of how often you brought it up. I guess I just haven't opened those threads and seen it.
But now I'm aware of what they did, and I do believe you.
-
So in this case, it's good that there is a gateway A/V since ESET 0%... good thing huh?
-
@tim_g said in Arg! The money spent the month before I stated here.:
So in this case, it's good that there is a gateway A/V since ESET 0%... good thing huh?
That's a contrived case, though. Just put on a reliable AV product. Maybe the UTM has the same issue.
-
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
I've brought it up a ton, every time someone mentions considering ESET.
I've never seen anything about, regardless of how often you brought it up. I guess I just haven't opened those threads and seen it.
But now I'm aware of what they did, and I do believe you.
What's worse was that they provided no working contact information. Somewhere on SW you could track down a thread were we, and some others, believed that ESET went out of business as ALL of their available contact avenues dead ended. All of their available extensions pointed to each other and they had shut down their products. It was weeks that they were completely unreachable. They had pulled this extortion prank AND forgotten to ensure that they were even up and functioning with email or phones!
-
There's a bigass ESET place in central San Diego... you can see it when you are driving. I know they exist.
-
-
I hear everything you say about the gateway AV... but I've personally seen a lot of cases where the gateway AV had not been in place, the AV on the client did not detect or the lack of AV would not have detected.
-
I'm sure most places may not need it at all, but some environments may.. such as those with a number of devices that may not have AV (not theoretical, because there's some that don't) and some with outdated definitions.
I've seen a lot of AV clients that are running outdated definitions... they are broken and wont update.
There's a lot of places a gateway AV makes sense. Maybe by your technical definition it's not layered security... but in a lot of cases it's the only layer, in which it becomes important... even though you can argue AV should be on those devices.
There are also devices like iPads that won't have AV... if one obtains ransomware on there from the internet... a point is to not even allow the ransomware on the network... block it before it even gets to a device.
-
@tim_g said in Arg! The money spent the month before I stated here.:
I hear everything you say about the gateway AV... but I've personally seen a lot of cases where the gateway AV had not been in place, the AV on the client did not detect or the lack of AV would not have detected.
That can happen, of course. But this implies that better AV is being used in one place and a lesser one is being kept in the more important place. The takeaway shouldn't have been "good thing we had a UTM", it should have been "oh boy, we need better AV clients."
Also, just because I don't like UTM doesn't mean that I am universally against network access layer AV scanning. I just never want that in my firewall. UTM isn't the same as "scanning AV on the network". The issue that Jared and I have with UTM is where that function is placed.
-
@tim_g said in Arg! The money spent the month before I stated here.:
I'm sure most places may not need it at all, but some environments may.. such as those with a number of devices that may not have AV (not theoretical, because there's some that don't) and some with outdated definitions.
I've seen a lot of AV clients that are running outdated definitions... they are broken and wont update.
But the answer is... fix them. That makes the UTM a dangerous band aid... a false sense of security.
-
@tim_g said in Arg! The money spent the month before I stated here.:
There's a lot of places a gateway AV makes sense. Maybe by your technical definition it's not layered security... but in a lot of cases it's the only layer, in which it becomes important... even though you can argue AV should be on those devices.
Right. This is a contrived scenario. It's actually one of the reasons that I think that it is bad. One mistake leading to another, and the second one used to justify the first.
-
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
How do you protect devices without A/V?
I feel like this is a trick question. It's one of those "what about this unnamed or unkown threat" that isn't a real world threat. We don't need to protect against things that don't exist. It sounds sensible... what if "X" happens, what will you do? But that's not how security works. Security you have to assess what are reasonable, realistic threats. AV isn't a broadly useful tool, it's useful in the Windows desktop world and the Mac world, but beyond that, it's not really a valuable thing. You don't need AV on your router, right? You don't need it on your switches.
But asking the question creates an emotional response. Oh no, no antivirus on your switches or access points? How will you protect yourself without a UTM?
Um... I protect myself by that not being a threat vector. There's nothing to protect against.
I was talking client devices, like computers and laptops.. and servers.
-
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
How do you protect devices without A/V?
I feel like this is a trick question. It's one of those "what about this unnamed or unkown threat" that isn't a real world threat. We don't need to protect against things that don't exist. It sounds sensible... what if "X" happens, what will you do? But that's not how security works. Security you have to assess what are reasonable, realistic threats. AV isn't a broadly useful tool, it's useful in the Windows desktop world and the Mac world, but beyond that, it's not really a valuable thing. You don't need AV on your router, right? You don't need it on your switches.
But asking the question creates an emotional response. Oh no, no antivirus on your switches or access points? How will you protect yourself without a UTM?
Um... I protect myself by that not being a threat vector. There's nothing to protect against.
I was talking client devices, like computers and laptops.. and servers.
Then don't deploy them without AV.
-
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
How do you protect devices without A/V?
I feel like this is a trick question. It's one of those "what about this unnamed or unkown threat" that isn't a real world threat. We don't need to protect against things that don't exist. It sounds sensible... what if "X" happens, what will you do? But that's not how security works. Security you have to assess what are reasonable, realistic threats. AV isn't a broadly useful tool, it's useful in the Windows desktop world and the Mac world, but beyond that, it's not really a valuable thing. You don't need AV on your router, right? You don't need it on your switches.
But asking the question creates an emotional response. Oh no, no antivirus on your switches or access points? How will you protect yourself without a UTM?
Um... I protect myself by that not being a threat vector. There's nothing to protect against.
I was talking client devices, like computers and laptops.. and servers.
Then don't deploy them without AV.
We don't.
They break, they get weird... they stop updating. They run Windows... crap happens.
People get the company WiFi password (not the guest wifi) and connect their phones and other devices to it without AV.
There's just a ton of things without AV... in your perfect world, i'm sure isn't the case. But in my world it's how thigns are and there isn't always something I can personally do about it.
I just don't want malware on the network. The SonicWALL has this stuff built in, and easily handels it without performance degradation... the only thing passing through it is internet... it's not like clients accessing the fileserver get slowed down because AV is running on the SonicWALL.
It's great to use if you have it.
It beats having a crappy box doing it. The SonicWALL handles it extremely well.