Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:30 AM

Symantec Locks Horns With Microsoft

Users uneasy over Symantec's attempts to derail the launch of Microsoft's Vista OS

Users are watching intently from the sidelines and predicting some security hiccups with the upcoming Vista OS if Symantec's newly filed lawsuit against Microsoft moves forward.

Yesterday Symantec charged that Microsoft has "misappropriated" Symantec's storage technology, centering on the vendor's VolumeManager offering, which Symantec claims has been incorporated into Vista.

According to the lawsuit, Symantec is seeking an injunction to prevent development, sale, and distribution of Vista, and is also seeking damages from Microsoft, which licensed a "simplified version" of VolumeManager from Veritas back in 1996.

Symantec obtained the VolumeManager technology, which can be used to copy, move, and delete data, when it acquired storage vendor Veritas for $13.5 billion last year. (See Shareholders OK Veritas/Symantec Merger, Symantec, Veritas Complete Merger, and M&A Worries Stall Symantec Shares.)

Vista, which has already been delayed, is slated for release to businesses in November and consumers in January 2007. The operating system, which is the firm's largest upgrade since the launch of Windows XP in 2001, will improve desktop security and boost users' ability to share information across mobile devices and remote locations, according to Microsoft.

The vendor is already touting Vista as the most secure Windows operating system yet, and is developing a series of enhancements based around authentication, malware protection, and users' ability to lock down files. A feature called Encrypting File System, for example, which provides user-based file and directory encryption, has been enhanced to allow storage of encryption keys on smart cards.

An IT manager at a Nevada-based Internet firm, who asked not to be named, agreed that the dispute, if it affects the Vista rollout, could mean trouble for many users. "For companies that are counting on the Vista features, that could be a big deal. Businesses that are 100 percent Microsoft on back-office systems and workstations will be most concerned," he says, although he expects minimal impact in his own firm, which is not solely reliant on Microsoft.

Shlomi Harif, director of network systems and support at Austin Independent School District, says that, although the education sector is not traditionally at the bleeding edge of new technology deployments, any further Vista delays would be bad news for users -- but a hidden opportunity for some security vendors.

"It would give a second bite of the apple to security companies that are looking to tout solutions that Vista might otherwise have overshadowed," he explains, adding that mobile security specialists and vendors of network access products, in particular, could seize on the opening.

Microsoft, however, hit back at Symantec in a statement, saying that the legal action "stems from a very narrow disagreement" over the terms of the 1996 contract with Veritas. Symantec's claims, it added, "are unfounded because Microsoft actually purchased intellectual property rights for all relevant technologies from Veritas in 2004."

When contacted, Redmond had this email response for Byte and Switch: "Microsoft is on track to make Windows Vista available direct to our business customers in November via our Volume Licensing program. The company is targeting broad consumer availability and new PCs in January of 2007."

The software behemoth continues to make a concerted push into the security space. Earlier this week, for example, Microsoft snapped up SSL VPN hardware vendor Whale Communications for an undisclosed fee, as it looks to boost its Network Access Protection (NAP) strategy. (See Microsoft in Whale of a Deal.)

— James Rogers, Senior Editor, Byte and Switch. Special to Dark Reading

Organizations mentioned in this article:

  • Microsoft Corp. (Nasdaq: MSFT)
  • Symantec Corp. (Nasdaq: SYMC)
  • Whale Communications Ltd.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 10/1/2020
    9 Tips to Prepare for the Future of Cloud & Network Security
    Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
    Attacker Dwell Time: Ransomware's Most Important Metric
    Ricardo Villadiego, Founder and CEO of Lumu,  9/30/2020
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    Special Report: Computing's New Normal
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    How IT Security Organizations are Attacking the Cybersecurity Problem
    How IT Security Organizations are Attacking the Cybersecurity Problem
    The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2020-10-01
    By holding a reference to the eval() function from an about:blank window, a malicious webpage could have gained access to the InstallTrigger object which would allow them to prompt the user to install an extension. Combined with user confusion, this could result in an unintended or malicious extensi...
    PUBLISHED: 2020-10-01
    Firefox did not reset the address bar after the beforeunload dialog was shown if the user chose to remain on the page. This could have resulted in an incorrect URL being shown when used in conjunction with other unexpected browser behaviors. This vulnerability affects Firefox < 80.
    PUBLISHED: 2020-10-01
    When trying to load a non-video in an audio/video context the exact status code (200, 302, 404, 500, 412, 403, etc.) was disclosed via the MediaError Message. This level of information leakage is inconsistent with the standardized onerror/onsuccess disclosure and can lead to inferring login status t...
    PUBLISHED: 2020-10-01
    When processing a MAR update file, after the signature has been validated, an invalid name length could result in a heap overflow, leading to memory corruption and potentially arbitrary code execution. Within Firefox as released by Mozilla, this issue is only exploitable with the Mozilla-controlled ...
    PUBLISHED: 2020-10-01
    A lock was missing when accessing a data structure and importing certificate information into the trust database. This vulnerability affects Firefox < 80 and Firefox for Android < 80.