bitflipper
abacab: have you looked at system overhead with HitmanPro? My concern is that anything that hooks into low-level system calls is going to necessarily degrade system performance. Not a concern for most day-to-day computing, but paramount for a DAW that needs every CPU cycle it can get for the task at hand.
I can run this on my DAW and still pass LatencyMon with flying colors.
I see nothing at all on their website that explains how HitmanPro actually works. This is a red flag for me. Obfuscation is never necessary for a security product to be effective; it serves only one purpose: it allows marketers to make unchallenged claims.
That is a shame, apparently since the original SurfRight website that described it in detail, has been shuttered and brought under the umbrella of Sophos, which remains rather opaque. Probably just due to the transition period for bringing the products into the parent portfolio. The two devs that developed this were paid handsomely to be acquired, and are still very active in it's development.
Sophos is marketing this technology now as part of it's endpoint security for enterprise customers. They call it InterceptX and explain it here.
https://www.sophos.com/en-us/products/intercept-x.aspx HitmanPro products remain a consumer only product line, but the original tech came from HitmanPro.Alert. HitmanPro is actually two products that com bundled together with one license. HitmanPro.Alert is the exploit interceptor, and HitmanPro is an on-demand scanner/cleaner.
If you have ever heard of Microsoft's EMET, this begins with a similar concept, but goes way beyond.
There are two main parts, Exploit Mitigations, and Risk Reduction, for protection against unknown, 0-day, or patient zero exploits.
As far as impact to running applications, the Exploit Mitigations are only designed to protect internet facing applications, such as browsers, email programs, media players, office applications, browser plugins, etc. So it's not really going to affect any other local stuff running that is not explicitly protected.
The second part, Risk Reduction, provides some additional system hardening protection. These can be individually toggled on and off just by clicking a button on the GUI. A few examples are:
Cryptoguard - detects encryption of files and stops the attack
Keystroke Encryption - protects against keyloggers when filling out web forms
Process Protection - prevents process hollowing
BadUSB - Stops malicious USB devices
Network Lockdown - stops backdoor traffic
Bottom line is I can see no additional performance impact from this, running alongside my AV.