Comment Re:Of course you should... (Score 1) 396
To caviet... let me ask you if you think RSA ( the major cyber security company) runs all windows on thier servers? Yet they got pwned. They were socialy enginered... then the user installed a root kit on the system which allowed access to their servers... root kit = malware. Now thier NIDS ( network based intrusion detection) caught what was happening when it was in progress... but by the time they were able to respond the damage had been done and a lot of information access and ripped.
Many of you are forgetting there are many forms of AV out there. You are all talking about signature based which relies on after 0 day signatures of known virii. These ARE helpful... but yes its after it's on your system. There are other types of AV , heuristics/behavior/anomily/signature based systems. AV doesn't hurt you unless your allowing it to take up to many resources which a good sys admin or user shouldn't allow to happen.
If I'm running a Unix / Lunix / OS X / Windows server farm for a company I should definately do what I can to protect it. Network based intrusion detection systems, Host based ( NIDS HIDS) firewalls, DMZ's for incomming traffic ( demiliterized zones) Honeypots ( places set up to lure hackers so you can watch thier activity) you think all these concepts were developed for "windows only machines" ?