Learn more about the complex threats facing network-edge hardware and best practices to combat them:
1. Malware filtering needs to take place on the lightweight device
For maximum economy and efficiency, malware filtering needs to take place on the lightweight device, ruling out the proxying method.
2. Scanning engine must be lightweight and capable of processing large amounts of data
To maintain the required throughput level, the scanning engine must be lightweight and capable of processing large amounts of data with limited resources of memory or CPU.
3. Large amounts of detection data should not be stored on the device
To avoid firmware updating requirements, improvements to the engine logic must be applied live and remotely, leaving the hard-coded components integrated into the device firmware untouched.
4. Filter by URI, not by file
Minimize latency and added traffic by avoiding complex remote lookups of each and every file.