The Cornerstone of Hard Drive Protection

Centurion Technologies VP Keith Rickman on the upside of relying onreboot/restore technology to guard against viruses and user sabotage.

T.H.E.: Keith RickmanHow d'es reboot/restore technology differ fromantivirus/spyware protection?Rickman: Antivirus protectiondetects only knownviruses, which are those thathave been identified and adefinition created. This meansthat unknown viruses—thosenot yet recognized or with nodefinitions written for them—will still bypass antivirusprotection. Conversely,reboot/restore protectiond'es not require recognition or definition specifics, and willprotect against both known and unknown viruses. And withspyware protection, much like antivirus protection, only itemsthat appear to be spyware or adware are eliminated. Butreboot/restore technology provides a blanket of protection thateliminates any unwanted change instantly. Spyware eliminationproducts also can be confusing and time-consuming with thedaily, weekly, or hourly scans that must be run to identify threats.With reboot/restore technology, the user simply reboots, and themachine is cleaned of all malicious code.

Administrators often use policies; d'esn’t that keep users fromgetting to anything that could harm the system?Policies are great for limiting availability. However, technicians arestill needed to clean up the areas where users are allowed to go,and,unfortunately, must still deal with basic user error. Withreboot/restore protection, it d'esn’t matter what end users aredoing or where they are going since they can’t harm the machine.This allows for a full user experience with no restrictions. If policiesare required for limiting content availability, they can be used inconjunction with our protection. This provides total control alongwith complete hard drive protection.

How d'es reboot/restore technology protect against user error,or users who try to sabotage machines?All changes that occur during use are written to a temporarystorage space and not the hard drive; this space is cleared uponreboot. Anything a user might do—upload files, download gamesand music, or even delete everything from the hard drive—istemporary. It seems to the user as though these changes aresticking,but an administrator knows that with a simple reboot, themachine is back to its original state.

WHERE’S THE PROTECTION?

In the fight for security, it’s good to know where the battles are won—or lost.

Featured

  • lightbulb

    Register Now for Tech Tactics in Education: Overcoming Roadblocks to Innovation

    Tech Tactics in Education will return on Sept. 25 with the conference theme "Overcoming Roadblocks to Innovation." Registration for the fully virtual event is now open.

  • stylized illustration of a desktop, laptop, tablet, and smartphone all displaying an orange AI icon

    Survey: AI Shifting from Cloud to PCs

    A recent Intel-commissioned report identifies a significant shift in AI adoption, moving away from the cloud and closer to the user. Businesses are increasingly turning to the specialized hardware of AI PCs, the survey found, recognizing their potential not just for productivity gains, but for revolutionizing IT efficiency, fortifying data security, and delivering a compelling return on investment by bringing AI capabilities directly to the edge.

  • Analyst or Scientist uses a computer and dashboard for analysis of information on complex data sets on computer.

    Anthropic Study Tracks AI Adoption Trends Across Countries, Industries

    Adoption of AI tools is growing quickly but remains uneven across countries and industries, with higher-income economies using them far more per person and companies favoring automated deployments over collaborative ones, according to a recent study from Anthropic.

  • AI symbol racing a padlock symbol on a red running track

    AI Surpasses Cybersecurity in State Education Leader Priority List

    For the first time, artificial intelligence has moved to the top of the priority list for state education leaders — knocking cybersecurity from the number one spot, according to the 2025 State EdTech Trends report from SETDA.