Language Selection

English French German Italian Portuguese Spanish

Is there method in M$'s security buys?

Filed under

The software maker said it was making security its top priority when it launched its Trustworthy Computing Initiative three years ago. Since then, it has overhauled its in-house development to bolster security and has put its $38 billion war chest to work. It has been buying antivirus and anti-spyware companies and other security assets--acquisitions that have been closely watched.

"While there is a great deal of hoopla around the acquisitions, what is more important is to see what they make of them," said Michael Cherry, a lead analyst at Directions on Microsoft in Kirkland, Wash. "I don't think that the past acquisitions have shown a tremendous payback yet."

It's about time that Microsoft turned the technologies it has picked up in its scattershot buys into actual products that customers can use, analysts said.

The company announced its takeover of FrontBridge Technologies, a hosted e-mail security provider, on Wednesday, the same day it said it had taken a minority stake in Finjan Software and licensed some of the security appliance maker's patents on behavior-based intrusion detection technologies.

These moves follow the acquisitions of Romanian antivirus software developer GeCad Software two years ago, desktop anti-spyware maker Giant Software in late 2004, and corporate security software vendor Sybari earlier this year. Sybari software can use multiple engines to scan e-mail and instant messages for viruses and spam.

The takeovers seem random, said Pete Lindstrom, a research director at Spire Security. "I think it is a reactive approach. They are picking up security products that they think are important to customers," he said. "It doesn't strike me that there is an obvious strategy to this."

Every product group is involved in Microsoft's companywide commitment to providing users with a secure computing experience, Amy Roberts, a director in Microsoft's security business and technology unit, said in an e-mailed statement. "Microsoft's recent acquisitions in the area of security represent continued investments in innovation, customer guidance and industry partnerships," she said.

Microsoft first took on the safety of its own products with its Trustworthy Computing push. With the acquisitions, the software maker attempted to move itself into a position to become a player in the security market and offer additional products to protect both consumers and business users. The ultimate goal is to counteract the perception of Microsoft as provider of insecure software, Cherry suggested, "to make it such that customers have no doubt that they are purchasing a secure system when they choose Windows," he said.

It is evident from the purchasing campaign that security continues to be important to the Redmond, Wash., company, analysts said.

But the series of takeovers may also signal that Microsoft's own development efforts are falling short, suggested David Schatsky, a senior vice president at Jupiter Research.

Full Story.

More in Tux Machines

ARTIK is the Tizen’s Trojan Horse to dominate the IoT ecosystem

As part of the Forum “Tizen for the Internet of Things” held on September 22 in Moscow, Samsung Electronics has presented a new family of maker boards and modules named ARTIK, in addition to the infrastructure of the operating system Tizen 3.0. Samsung ARTIK’s value proposition, as declared by Samsung, is to reinvent the prototyping process by leveraging world-class data security granted by the company as well as a wide array of tools, both hardware and software, such as the ARTIK Modules and Cloud, formerly known as SmartThings Open Cloud. Read more

today's leftovers

today's howtos

Android Leftovers

  • Google Pixel review: The best Android phone, even if it is a little pricey
    Welcome to the age of Google Hardware. Apparently tired of letting third-party Android OEMs serve as the stewards of Android handsets, Google has become a hardware company. (Again). Earlier this year Google, launched a hardware division with former Motorola President Rick Osterloh at the helm. With the high-ranking title of "Senior Vice President," Osterloh doesn't oversee a side project—his group is on even footing with Android, Search, YouTube, and Ads. The hardware group is so powerful inside Google that it was able to merge Nexus, Pixel, Chromecast, OnHub, ATAP, and Glass into a single business unit. The group's coming out party was October 4, 2016, where it announced Google Home, Google Wifi, a 4K Chromecast, the Daydream VR headset, and the pair of phones we're looking at today: the Google Pixel and Google Pixel XL. The arrival of the Pixel phones marks the apparent death of the Nexus line; Google says that it has "no plans" for future Nexus devices. With the new branding comes a change in strategy, too. The Pixel brand is about making devices that are 100 percent Google, so despite Google's position as the developer of Android, get ready for Google-designed hardware combined with exclusive Google software.
  • Hands-on with the LeEco Le Pro3: services first, Android second
    LeEco’s flagship Le Pro3 smartphone isn’t trying to compete with the Google Pixel, which puts modern Google services in front of a stock Android backdrop. After playing with the Le Pro3 at the company’s U.S. launch event in San Francisco today, I’m left feeling that it’s an easy, low-cost way to get the full experience of LeEco’s applications. There are proprietary LeEco utility tools like the browser, email, calendar, messages, notes, and phone apps, along with bloatware like Yahoo Weather, but mostly the Pro3 is a means of distribution for the LeEco apps, like Live, LeVidi, and Le. There is also a standard-issue My LeEco app for managing services like EcoPass membership. Under it all is the EUI custom user interface. If you swipe left from the home screen, you see videos that LeEco recommends you watch — not Google Now.
  • Report: Google reaches agreement with CBS for 'Unplugged' web TV service - Fox and Disney may follow