Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/19/2006
08:30 AM
50%
50%

Symantec Locks Horns With Microsoft

Users uneasy over Symantec's attempts to derail the launch of Microsoft's Vista OS

Users are watching intently from the sidelines and predicting some security hiccups with the upcoming Vista OS if Symantec's newly filed lawsuit against Microsoft moves forward.

Yesterday Symantec charged that Microsoft has "misappropriated" Symantec's storage technology, centering on the vendor's VolumeManager offering, which Symantec claims has been incorporated into Vista.

According to the lawsuit, Symantec is seeking an injunction to prevent development, sale, and distribution of Vista, and is also seeking damages from Microsoft, which licensed a "simplified version" of VolumeManager from Veritas back in 1996.

Symantec obtained the VolumeManager technology, which can be used to copy, move, and delete data, when it acquired storage vendor Veritas for $13.5 billion last year. (See Shareholders OK Veritas/Symantec Merger, Symantec, Veritas Complete Merger, and M&A Worries Stall Symantec Shares.)

Vista, which has already been delayed, is slated for release to businesses in November and consumers in January 2007. The operating system, which is the firm's largest upgrade since the launch of Windows XP in 2001, will improve desktop security and boost users' ability to share information across mobile devices and remote locations, according to Microsoft.

The vendor is already touting Vista as the most secure Windows operating system yet, and is developing a series of enhancements based around authentication, malware protection, and users' ability to lock down files. A feature called Encrypting File System, for example, which provides user-based file and directory encryption, has been enhanced to allow storage of encryption keys on smart cards.

An IT manager at a Nevada-based Internet firm, who asked not to be named, agreed that the dispute, if it affects the Vista rollout, could mean trouble for many users. "For companies that are counting on the Vista features, that could be a big deal. Businesses that are 100 percent Microsoft on back-office systems and workstations will be most concerned," he says, although he expects minimal impact in his own firm, which is not solely reliant on Microsoft.

Shlomi Harif, director of network systems and support at Austin Independent School District, says that, although the education sector is not traditionally at the bleeding edge of new technology deployments, any further Vista delays would be bad news for users -- but a hidden opportunity for some security vendors.

"It would give a second bite of the apple to security companies that are looking to tout solutions that Vista might otherwise have overshadowed," he explains, adding that mobile security specialists and vendors of network access products, in particular, could seize on the opening.

Microsoft, however, hit back at Symantec in a statement, saying that the legal action "stems from a very narrow disagreement" over the terms of the 1996 contract with Veritas. Symantec's claims, it added, "are unfounded because Microsoft actually purchased intellectual property rights for all relevant technologies from Veritas in 2004."

When contacted, Redmond had this email response for Byte and Switch: "Microsoft is on track to make Windows Vista available direct to our business customers in November via our Volume Licensing program. The company is targeting broad consumer availability and new PCs in January of 2007."

The software behemoth continues to make a concerted push into the security space. Earlier this week, for example, Microsoft snapped up SSL VPN hardware vendor Whale Communications for an undisclosed fee, as it looks to boost its Network Access Protection (NAP) strategy. (See Microsoft in Whale of a Deal.)

— James Rogers, Senior Editor, Byte and Switch. Special to Dark Reading

Organizations mentioned in this article:

  • Microsoft Corp. (Nasdaq: MSFT)
  • Symantec Corp. (Nasdaq: SYMC)
  • Whale Communications Ltd.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 10/13/2020
    Where are the 'Great Exits' in the Data Security Market?
    Dave Cole, Cofounder and CEO, Open Raven,  10/13/2020
    Overcoming the Challenge of Shorter Certificate Lifespans
    Mike Cooper, Founder & CEO of Revocent,  10/15/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    Special Report: Computing's New Normal
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    How IT Security Organizations are Attacking the Cybersecurity Problem
    How IT Security Organizations are Attacking the Cybersecurity Problem
    The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-11496
    PUBLISHED: 2020-10-19
    Sprecher SPRECON-E firmware prior to 8.64b might allow local attackers with access to engineering data to insert arbitrary code. This firmware lacks the validation of the input values on the device side, which is provided by the engineering software during parameterization. Attackers with access to ...
    CVE-2020-15822
    PUBLISHED: 2020-10-19
    In JetBrains YouTrack before 2020.2.10514, SSRF is possible because URL filtering can be escaped.
    CVE-2020-24375
    PUBLISHED: 2020-10-19
    A DNS rebinding vulnerability in the UPnP MediaServer implementation in Freebox Server before 4.2.3.
    CVE-2020-7193
    PUBLISHED: 2020-10-19
    A ictexpertcsvdownload expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
    CVE-2020-7194
    PUBLISHED: 2020-10-19
    A perfaddormoddevicemonitor expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).