Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Microsoft Security Gets Mixed Reviews

    Written by

    Matt Hines
    Published June 19, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Microsofts transformation from pariah to trendsetter in the information security sector is slowly beginning to sink in, but users are mixed about hopping on the bandwagon.

      At the TechEd conference here, the software maker worked overtime to convince the world that security really is its No. 1 priority. So far, with a few rare exceptions, customers and developers are buying it, but it remains to be seen if Microsoft can win the security game.

      In the meantime, Microsoft is working diligently to be seen as a security player. On the TechEd show floor, Windows Vistas security goodies were front and center with booths showcasing UAC (User Account Control), a key operating system tweak aimed at countering the malware epidemic; BitLocker, a hard drive encryption tool; and new technologies for network access protection and smart card deployments.

      Microsoft also introduced Ben Fathi as its new security czar and expanded its evangelism of the SDL (Security Development Lifecycle), a collection of high-level security principles and procedures covering every stage of software creation.

      And the software company is even making friends with the hacker community, announcing that it will showcase Vista at the annual Black Hat conference in Las Vegas August 2-3, 2006.

      Customers have noticed. “Im very impressed with everything Ive seen and heard, and Im convinced its not just lip service,” said Colin Johnson, a microcomputer network administrator at Northeastern University.

      While Johnson, who manages the universitys College of Computer and Information Science network in Boston, acknowledges Microsofts strides, he said he has concerns that security will always be a lose-lose scenario for the worlds largest software maker.

      “Theyre fighting against a moving target, and, all the while, they are becoming a bigger sitting target [for attackers]. Two years from now, we could well be back at TechEd hearing the same message that Microsoft is prioritizing around security. Thats just the way the industry works these days,” Johnson said.

      Johnson wasnt alone with his qualified praise. Most TechEd attendees interviewed by eWeek acknowledged Microsofts progress to beef up Windows security since the release of Windows XP SP 2 (Service Pack 2). “At first, I thought they were just working on their image, but XP SP2 turned out to be a big deal. Yes, theres still a malware problem. But, compared to 2003, were in a better place,” said Steve Scerpa, an AJAX (Asynchronous JavaScript and XML) developer for a small IT shop in Minnesota.

      Scerpa, who spent at least 2 hours at the TechEd hands-on labs examining Vistas security upgrades, said UAC will significantly move the goal posts in the fight against virus, spyware and rootkit infections: “When the concept of a standard user becomes universal, it will blunt the attacks were seeing today. Yes, the attackers will eventually shift course, but, for whats out there today, UAC is a game-changer.”

      Another unresolved issue is how Microsofts new security efforts will impact day-to-day work, said Roy Zamora, a software engineer with New York-based digital image specialist WireImage. Zamora said hes been “very impressed” with Microsofts work in Vista and SharePoint Server. “It should be very interesting to see what they can do with Web 2.0, Atlas and AJAX,” he said. “I think theres a real technology evolution going on with SDL, and were doing the same things with our own products.” However, Zamora said he remains somewhat “skeptical” about features like UAC and how that change might affect his ability to get work done. He expects there will be an extended period of time needed to familiarize workers with the additions.

      Phil Nash, an applications analyst with Federal Home Loan Bank of Boston, said his company is only now upgrading to Windows XP-based systems because of some of the security concerns around Microsofts products. Nash remains unconvinced that Microsoft truly will be able to improve the security of its products or deliver on its promise of providing malware-fighting technology on par with products made by third-party applications makers.

      Based on the early feedback, Nash said he believes that users will be forced to disable some of Vistas new security features, when possible, to continue to work in the ways they are already accustomed.

      “Microsoft is making things more secure, but there will always be backdoors left open, and people will find a way around the security features as they always do,” said Nash in Boston. “They claim that they will have better malware-fighting tools than what is out there today, but all they have done is buy some other technologies and integrate them; well still need third-party applications to fill the gaps.”

      The security sales pitch

      Microsofts evangelism around security and Vista includes meet-ups with the worlds smartest hackers, advance notice on security updates and an aggressive push to make high-quality software patches:

      AUG. 2-3, 2006

      • Black Hat Windows Vista has a date with external security researchers OCT. 17, 2005
      • Blue Hat Microsoft invites hackers to Redmond MARCH 2005
      • Security Advisories Pre-patch notice on publicly reported vulnerabilities
      • Security Update Validation Program Third-party patch testers help with QA
      • Security Development Lifecycle Principles and procedures covering every stage of software creation at MicrosoftSource: eWEEK reporting
      Matt Hines
      Matt Hines

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×