Language Selection

English French German Italian Portuguese Spanish

Is there method in M$'s security buys?

Filed under

The software maker said it was making security its top priority when it launched its Trustworthy Computing Initiative three years ago. Since then, it has overhauled its in-house development to bolster security and has put its $38 billion war chest to work. It has been buying antivirus and anti-spyware companies and other security assets--acquisitions that have been closely watched.

"While there is a great deal of hoopla around the acquisitions, what is more important is to see what they make of them," said Michael Cherry, a lead analyst at Directions on Microsoft in Kirkland, Wash. "I don't think that the past acquisitions have shown a tremendous payback yet."

It's about time that Microsoft turned the technologies it has picked up in its scattershot buys into actual products that customers can use, analysts said.

The company announced its takeover of FrontBridge Technologies, a hosted e-mail security provider, on Wednesday, the same day it said it had taken a minority stake in Finjan Software and licensed some of the security appliance maker's patents on behavior-based intrusion detection technologies.

These moves follow the acquisitions of Romanian antivirus software developer GeCad Software two years ago, desktop anti-spyware maker Giant Software in late 2004, and corporate security software vendor Sybari earlier this year. Sybari software can use multiple engines to scan e-mail and instant messages for viruses and spam.

The takeovers seem random, said Pete Lindstrom, a research director at Spire Security. "I think it is a reactive approach. They are picking up security products that they think are important to customers," he said. "It doesn't strike me that there is an obvious strategy to this."

Every product group is involved in Microsoft's companywide commitment to providing users with a secure computing experience, Amy Roberts, a director in Microsoft's security business and technology unit, said in an e-mailed statement. "Microsoft's recent acquisitions in the area of security represent continued investments in innovation, customer guidance and industry partnerships," she said.

Microsoft first took on the safety of its own products with its Trustworthy Computing push. With the acquisitions, the software maker attempted to move itself into a position to become a player in the security market and offer additional products to protect both consumers and business users. The ultimate goal is to counteract the perception of Microsoft as provider of insecure software, Cherry suggested, "to make it such that customers have no doubt that they are purchasing a secure system when they choose Windows," he said.

It is evident from the purchasing campaign that security continues to be important to the Redmond, Wash., company, analysts said.

But the series of takeovers may also signal that Microsoft's own development efforts are falling short, suggested David Schatsky, a senior vice president at Jupiter Research.

Full Story.

More in Tux Machines

diff -u: What's New in Kernel Development

Over time, memory can become more and more fragmented on a system, making it difficult to find contiguous blocks of RAM to satisfy ongoing allocation requests. At certain times the running system may compact regions of memory together to free up larger blocks, but Vlastimil Babka recently pointed out that this wasn't done regularly enough to avoid latency problems for code that made larger memory requests. Read more

Canonical's Ubuntu Internet Browser Silently Becomes Awesome - Video

The Ubuntu Internet browser is a little-known application that's been getting a lot of updates lately. It's developed internally by Canonical, and it seems to get better with each new edition. Read more

7 open-source password managers to try now that LogMeIn owns LastPass

Some LastPass users were clearly not pleased to find out last week that the password management app had been acquired by LogMeIn. Fortunately, there are several alternatives to choose from. Sure, there are premium options like Dashlane, Keeper, Passpack, 1Password, and RoboForm, but there are also free password management systems that anyone can inspect and even contribute to. No matter what you use, the idea is to be more secure than you would be if you were to just use “password” as the password for every app you sign up for. Read more

Open Document Format: Using Officeshots and ODFAutoTesting for Sustainable Documents

One of the many benefits of open source software is that it offers some protection from having programs disappear or stop working. If part of a platform changes in a non-compatible way, users are free to modify the program so that it continues to work in the new environment. At a level above the software, open standards protect the information itself. Everybody expects to be able to open a JPEG image they took with their digital camera 5 years ago. And, it is not unreasonable to expect to be able to open that same image decades from now. For example, an ASCII text file written 40 years ago can be easily viewed today. Read more