Irrespective of the size of the enterprise, securing oneself against rootkits play a vital role for every organization. Though, the impact of rootkits on large enterprise would be much higher than the medium or small business organizations, it is not directly proportional to the size alone. There are various other factors that come into effect when one has to analyze risk based on rootkits. Risk analysis for rootkits on enterprise depends on:
Well, there are many other factors that decide the risk an enterprise goes through when they are compromised with rootkits. Though there are many anti-rootkit software, one must understand that each of these use different kinds of detection and prevention techniques and no single software currently exists that performs all those tasks. Also, one has to take into fact that this is an ongoing war between the good and the bad. Hence, when the bad updates his techniques and methodologies used, the good has to update their tools based on analysis of the rootkits. Which means that the tools that were released in 2005 or even 2007 are out of date as compared to the tools that are releasing currently, but this also doesn't mean that the tools releasing today have better detection techniques as compared to the old tools that were used before since it really depends on the techniques used, efficiency of the tool, accuracy in detection [FP/FN vs. TP] and other factors.
The science of Rootkit analysis has been playing a vital role in the enterprise. Many small and medium business enterprises haven't been really researching or funding themselves for securing their data from rootkits or even from intrusion. This could be due to lack of:
Everything falls under one of the 4 listed above, though some large business organizations on the other hand has been assuming that they are secure, though they really aren't. In general, it is good for one to try to be secure. If not possible, one should accept that they are insecure and make efforts for securing themselves in the near future. But the ones who really think that they are secure and are really aren't, will the ones who get affected for the most part as they do not know even that they are compromised.
NOTE: Our tools are listed in many sites and torrents, which makes it hard for us to track all downloads. Hence, we are listing only the total installations from our website.