Welcome!

Cloud Security Authors: Zakia Bouachraoui, Elizabeth White, Liz McMillan, Pat Romanski, Yeshim Deniz

Related Topics: Cloud Security

News Feed Item

Steve Ballmer Details Microsoft's Security Strategy

Microsoft Announces New Product to Help Protect Business Customers, Collaborates With Governments and Industry on Evolving Threa

REDMOND, Wash., Oct. 6 /PRNewswire-FirstCall/ -- Today in Munich, Germany, Steve Ballmer, Microsoft Corp.'s chief executive officer, and Mike Nash, corporate vice president of the Security Technology Unit, outlined Microsoft's companywide strategy and product road map for helping secure the breadth of its customers from home PC users to businesses of all sizes. As part of its comprehensive security strategy, which focuses on a defense-in-depth approach, Ballmer announced Microsoft's plans to release Microsoft(R) Client Protection, a solution to help protect business desktops, laptops and file servers from current and emerging malware threats. In addition, the company announced the creation of the SecureIT Alliance, which will further enable participating security partners to efficiently integrate their solutions with the Microsoft platform to build new security features and products for the benefit of their common customers.

(Logo: http://www.newscom.com/cgi-bin/prnh/20000822/MSFTLOGO )

"At Microsoft, we're investing heavily in security because we want customers to be able to trust their computing experiences, so they can realize the full benefits of the interconnected world we live in," Ballmer said. "With the continuing onslaught of malware, viruses, phishing attacks and other kinds of Internet fraud, creating a more secure computing environment requires a concerted, long-term effort on the part of all technology companies, as well as customers and governments."

Microsoft's Security Strategy

Recognizing there is no single solution to resolve all security and safety issues, Microsoft has taken a multipronged approach to security, with efforts to better secure its platform in three key areas: making the right technology investments, providing customers with clear prescriptive guidance, and partnering closely with the security industry, governments and law enforcement.

"Customers are telling us what our research shows: the nature and complexity of online threats and attacks are continuing to evolve, and hackers, thieves and pirates are getting more sophisticated," Nash said. "At Microsoft, we believe customers have the right to know what software is running on their machine, how it got there, its purpose and how to remove it if necessary. To help our customers combat the evolving threats and to have those rights protected, we are taking a holistic approach to security that includes developing new technology, partnering with the industry, and keeping customers as educated as possible about how to stay ahead of the latest threats facing them."

Microsoft will continue to make significant investments in technology to help customers mitigate their security risk. These efforts will include ensuring the highest degree of quality in Microsoft software, delivering new security technology innovations in the Windows(R) platform, and developing security products and services that will evolve to meet future security needs. Microsoft is taking a defense-in-depth approach to protection and is aligning its technology investments around three core pillars:

-- Fundamentals. Microsoft seeks to provide a built-in level of safety and security in computers and software. This includes improvements to the security of software code through the Engineering Excellence initiative and investments in technologies that help keep software updated and more secure throughout its life cycle. -- Threat and vulnerability mitigation. Microsoft's goal is to offer industry-leading integrated security technologies that provide defense-in-depth protection against threats and vulnerabilities, giving customers more central visibility and better control of the security environment. -- Identity and access control. Microsoft's objective is to provide technologies that allow legitimate users to retrieve information while making it more difficult for unauthorized users to gain access to resources. These include technologies that verify user identity, control what resources users are allowed to access based on policy, allow management of such users over time, and better protect access to data throughout its life cycle. Microsoft Client Protection

Microsoft Client Protection will help protect business desktops, laptops and file servers by providing unified protection against emerging threats such as spyware and rootkits, as well as viruses and other traditional attacks.

"We have heard from business customers that they want protection from viruses, spyware and other malware threats with a single solution. Backed by a global research system, Microsoft Client Protection will address this need with one solution that combines proven protection technology with integrated management and reporting capabilities," Nash said.

An integrated management console puts IT professionals in control of their environment, and prioritized reports and alerts help focus resources on critical issues. Microsoft Client Protection will integrate with existing IT infrastructure, such as Active Directory(R) and existing software distribution systems, helping to reduce deployment time and maximize value.

The product is currently in development and Microsoft plans to make an early beta of the product available to select customers later this year. Pricing and licensing will be announced at a later date.

Microsoft Antigen

Today Microsoft also announced plans to release Microsoft Antigen anti-virus and anti-spam security software for messaging and collaboration servers based on the technology from recently acquired Sybari Software Inc. Adding to the defense-in-depth strategy inherent in Microsoft Antigen, Microsoft will add its own anti-virus scan engine. When it is available, customers of the Microsoft Sybari product line will benefit from the addition of the Microsoft anti-virus scan engine at no additional charge throughout the length of their contracts. In addition, Microsoft Antigen for Exchange recently completed Microsoft's Security Development Lifecycle review process, which has been shown to achieve measurably improved levels of security for numerous Microsoft software solutions. Microsoft Antigen for Exchange is scheduled to be available in beta to customers in the first half of 2006.

Today Microsoft also released a white paper detailing its security technology investments and road maps. The paper is available at http://www.microsoft.com/athome/security/spyware/software/enterprise/def... .

Industry Partnerships

Technology is but one way that Microsoft is working to address the security challenge. The company is also working collaboratively with security partners, law enforcement and policymakers in the industry. Today Microsoft also announced the SecureIT Alliance, a group of security partners that are working together to develop security solutions for the Microsoft platform. The SecureIT Alliance expands the security and Internet safety partnerships Microsoft has with other industry leaders and governments, including the Virus Information Alliance and the Global Infrastructure Alliance for Internet Safety. More information on the SecureIT Alliance can be found at http://www.secureitalliance.org/.

As part of its ongoing collaboration with governments worldwide, Microsoft worked recently with the United States Federal Trade Commission (FTC) on the FTC's creation of OnGuardOnline.gov, a new Web site designed to help consumers guard against Internet fraud, better secure their computers and protect their personal information. The new Web site includes tips, articles, videos and quizzes for safer computing. OnGuardOnline.gov complements and leverages Microsoft's own consumer education and awareness efforts through its Protect Your PC campaign and security guidance Web site for consumers. More information can be found at http://www.microsoft.com/athome/security.

More information about Microsoft's efforts regarding security can be found at http://www.microsoft.com/security.

Founded in 1975, Microsoft is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.

NOTE: Microsoft, Windows and Active Directory are either registered trademarks or trademarks of Microsoft Corp. in the United States and/or other countries.

The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

Microsoft Corp.

CONTACT: press only, Rapid Response Team of Waggener Edstrom,
+1-503-443-7070, or [email protected]

Web site: http://www.microsoft.com/

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...