I for one am looking forward to this. We have McAfee and are testing Vipre.
We also had issues with Conflicker and Iloma, and were less than impressed
with the McAfee responses.   Of course, that might be par for the course
when these things hit. 

 

We've also spent months trying to get SCCM deployed.  It's been an arduous
task even with MS help.   All kinds of issues with BITS, COM, WMI,
permissions, etc.   To be fair, we had a whole lot of trouble with the Quest
tools when we were converting from Novell.   Too many models, too many
images, etc etc. 

 

What we wish we had when we started with SCCM was  a checklist of what's
needed, or even some kind of "pre-requisite".  Of course, SCCM Console does
have a pre-requisite scan, and on a new PC, it still failed to install after
passing the pre-req. 

 

Hopefully Vipre will have something that ensure successful installations.  

 

From: Alex Eckelberry [mailto:al...@sunbelt-software.com] 
Sent: Thursday, February 25, 2010 3:06 PM
To: NT System Admin Issues
Subject: RE: VIPRE versus Trend

 

Going through this list, there are a number of things I can think of that
would be causing these issues.   Most, if not all, are configuration issues.
Cookies, for example, should be set to Report Only.  

 

The Dell biometric issue is over a year old. 

 

The Confiker  issue you're dealing with is due to Confiker being in your
environment (from whatever, an unpatched system or a user bringing an
infected USB stick) and agents being upgraded and real-time protection being
turned off during the upgrade.  While this can be managed by the admin, we
have dealt with this in version 4 being released next week. 

 

I would just recommend a call with management here at Sunbelt to go over in
detail your environment.  

 

Alex

 

Alex Eckelberry, CEO 
Sunbelt Software
33 N. Garden Avenue, Clearwater, FL 33755 p: 727-562-0101 x220 
e:  <mailto:a...@sunbeltsoftware.com> a...@sunbeltsoftware.com MSN:
<mailto:alex...@hotmail.com> alex...@hotmail.com 
w:  <http://www.sunbeltsoftware.com> www.sunbeltsoftware.com b:
<http://www.sunbeltblog.com> www.sunbeltblog.com

 

 

 

 

From: Greg Olson [mailto:gol...@markettools.com] 
Sent: Thursday, February 25, 2010 4:34 AM
To: NT System Admin Issues
Subject: RE: VIPRE versus Trend

 

I have to +1 with this assessment. We're having all the issues reported
below and more. My director of customer support has had it now, and is
lobbying hard to get rid of it. I really wanted to see it work well, and
lobbied hard to get in into play. And perhaps the new version will fix some
if it. I really do believe Sunbelt will get it up to snuff eventually, but
its hard to justify our support staff spending 60% of their time on Vipre
issues. 

 

Here's a copy of some of an email he sent to myself and our VP of IT. I put
some comments in () below.

Quote:

Here is a summary of the problems that we are facing with Vipre from the
information that I gathered from my team:

 

 

a.       Vipre becomes inactive on machines for no evident reason. When
VIpre support was contacted the response was that this will be fixed in the
next version upgrade (hoping it will, nervous about jumping to the new
version though, but are testing it)

b.      Vipre starts crashing user machines. This behavior is seen in
machines that also run the security software by Dell which works on disk
encryption and biometric authentication. According to viper the only
solution is to not use the Dell security software which is not a good option
because with the proposed windows 7 rollout we are planning to implement
disk encryption and also the biometric authentication is a good feature to
use in windows 7. (This I thought was fixed, but I listened in on the
support call he had with Sunbelt, and the Tech did say it might still have
issues with the newer version, but he (meaning us) will just have to try it
an see)

c.       Vipre gets uninstalled from clients: This happened in a few
instances and when contacted by viper this happens if the definitions
downloaded by the client are not installed appropriately and there is no
solution for this problem according to viper. They claim that this issue is
resolved in their latest version but we will not know that for sure until we
start having these problems again but there is no way to detect these
problems until a client reports this themselves which is very unlikely.
(very disturbing, and has left us with over 30 laptops that have had this
issue so far, including the CIO's machine, defiantly need some sort of patch
upgrade failback and retry, it should NEVER uninstall its self and leave a
machine totally venerable, I'm pretty sure they will fix this one in the new
version, its too insane not too)

d.      Vipre starts a scan as soon as the machines boots and utilizes all
the available system resources making it impossible for the user to log in.
The only solution to this problem according to viper is to disable the agent
on the machine in safe mode and reboot the machine, let the user log in and
then enable the agent again. This is happening pretty frequently and is
causing a lot of productivity downtime. (need to have a min do not scan till
xyz minutes after a boot-up to fix this)

e.      False alarms: we are getting at least 20 to 25 false alarms everyday
when viper opens tickets for browser cookies which are mostly harmless and
are removed as soon as the user closes his browser session (we have cookies
allowed as fyi, but this doesn't really worry me, the removal of good
programs does), sometimes viper is detecting genuine software to be
malicious and is quarantining or deleting them making the user reinstall
programs. We can add all these false alarms as exceptions in viper policy
and make it work but this will add a huge overhead based on the amount of
false alarms we are getting. For example Vipre quarantined its own
executables and some HP management software executables as threats.

f.        No malware engine. Vipre doesn't seem to have a malware engine or
the engine is pretty useless because thus far we have not seen viper detect
any malware infections at all. Recently we came across a malware that was
causing user machines to reboot as soon as they login and viper was not able
to detect it via safe mode or command line utility. We had to install third
party solutions in most of the cases where users reported infections to get
them cleaned as viper is neither preventing nor cleaning the infections.

g.       Known threats. We are having at least a few instances everyday
where user machines are infected with known exploits and threats and viper,
with active protection running, does not prevent or detect the
viruses/Trojans/worms etc and we are ending up installing other applications
(Symantec endpoint, zonealarm, malware bytes etc) to get rid of these
infections.

h.      Deployments: Vipre has been horrible as far as remote deployments
are concerned rolling out viper in our enterprise was a nightmare. Took us 3
months as most of the times remote deployment either failed or cause system
issues, I believe lot of us within the team had issues with the deployments
too including the CTO. Even now the deployments are a matter of luck, if we
are lucky it works if we are not it doesn't and if it hates the tech it will
say it deployed but wont turn on. (Remove Symantec tool from Sunbelt was
also being used in the install, and may have had a hand in some of these
complaints)

 

Prior to viper we were using Symantec v9 or v10 on all our clients(not even
endpoint protection) and the only time we had higher volume of problems was
conficker, now with viper my team is spending 60% of its time everyday
resolving pc issues related to viruses/Trojans/malware etc or even worse
resolving issues caused by viper. I understand there are claims that the
next version of viper is going to resolve most of the above mentioned issues
but thus far they are just claims and given the quality of tech support we
are receiving from sunbelt I wouldn't vouch for it.

 

Given this scenario I would, on behalf of my entire team, recommend rolling
back to Symantec and work on improving our patch management which would have
saved us from issues like conficker than spend half of my team's time
everyday resolving the above mentioned problems. Also, the stress levels of
the users are very clearly being displayed and my team is facing their
wrath. This is killing my teams productivity and morale and I would
recommend we act on it immediately. I am definitely open to other
recommendations but please, if you think viper's next version is the
solution, shoot me.

 

End quote. 

 

 

 So not all that good. But I will push to get the new version up into a good
size (100+ users) test audience before having to go back to Symantec. Uggh,
Symantec.. Uggh...

 

-Greg

 

 

 

From: Steve Kelsay [mailto:kels...@sctax.org] 
Sent: Wednesday, February 24, 2010 1:43 PM
To: NT System Admin Issues
Subject: RE: VIPRE versus Trend

 

I wish I could be more optimistic, but We are using the Vipre Enterprise. It
does an excellent job of protecting us, when I can keep it running. It seems
like it just is not ready for primetime. Sunbelt had their top tech go
through our entire network setup during a recent Konficker attack, and it is
still not really stable. 

 

I can look at the console and believe it is running wonderfully, until scans
start without any identifiable cause, effectively shutting down servers with
100% Cpu usage, but that scan never shows up on the remote console, although
the machines are sending last contact info, and last scan info, the off time
scans never show up. I lobbied hard to get Vipre, and really want it to
succeed, but it is not looking good at this time. A deep scan starts on many
machines as soon as anyone logs onto the machine, and that will also peg the
CPU meter. No reason we can tell for this to happen.

 

From: Raper, Jonathan - Eagle [mailto:jra...@eaglemds.com] 
Sent: Wednesday, February 24, 2010 4:26 PM
To: NT System Admin Issues
Subject: VIPRE versus Trend

 

All,

 

We're looking to move away from McAfee. Right now we're considering Trend
Micro OfficeScan Enterprise and the VIPRE Enterprise products.

 

Anyone here (aside from Sunbelt employees) have any experience with both of
the current or relatively current iterations of the products?

 

Can you provide any reasons to choose one over the other, aside from price?

 

Thanks in advance,

Jonathan L. Raper, A+, MCSA, MCSE
Technology Coordinator
Eagle Physicians & Associates, PA
 <BLOCKED::mailto:%20jra...@eaglemds.com> jra...@eaglemds.com
 <BLOCKED::http://www.eaglemds.com/> www.eaglemds.com 

 

 

  _____  

Any medical information contained in this electronic message is CONFIDENTIAL
and privileged. It is unlawful for unauthorized persons to view, copy,
disclose, or disseminate CONFIDENTIAL information. This electronic message
may contain information that is confidential and/or legally privileged. It
is intended only for the use of the individual(s) and/or entity named as
recipients in the message. If you are not an intended recipient of this
message, please notify the sender immediately and delete this material from
your computer. Do not deliver, distribute or copy this message, and do not
disclose its contents or take any action in reliance on the information that
it contains.

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to