Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

9/29/2009
02:24 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Microsoft Rolls Out Free AV

Microsoft Security Essentials (MSE) changes AV market landscape

The day dreaded by many commercial antivirus vendors is here: Microsoft today made its free antivirus software available.

Microsoft Security Essentials (MSE), which Microsoft had code-named "Morro," basically replaces Microsoft's subscription-based OneCare product, but focuses solely on anti-malware -- detecting and removing viruses, spyware, rootkits, and Trojans. It doesn't come with security "suite" functions, like a firewall, computer maintenance tasks, or backup.

Interestingly, Microsoft is neither pushing the product via Windows updates nor bundling it with the operating system. "You have to proactively go to the Microsoft site to download it," says Alex Eckelberry, CEO of Sunbelt Software, which sells enterprise AV, email, and other security tools for Windows. Eckelberry says Microsoft's freebie software is ultimately "good for the consumer."

What about commercial AV vendors? Eckelberry says he doesn't expect the software to hurt them as much as AV vendors, like AVG, that also offer free anti-malware software. While it's mainly a consumer product, he says it will also attract small mom-and-pop shops. "It won't affect enterprise SMBs because it's not manageable, so they won't touch it," he says.

Overall, Eckelberry says, MSE is good for consumer security.

Siobhan MacDermott, head of public policy, corporate communications, and investor relations for AVG Technologies, says while free AV sounds good at first glance, it could actually hurt consumers in the end.

"On the surface, a free offering from the company with a dominant market share would appear be a good thing. We believe, however, broad adoption could, in fact, put consumers at greater risk," MacDermott says. "The strength of the security community rests in its diversity of products and the innovation delivered by companies like AVG, whose entire focus is keeping our users' personal data and computers safe. It is our core business and one in which we simply cannot fail."

Because Microsoft's OS base is so large, a large community of MSE users will attract more attackers, according to MacDermott. "It is a law of numbers; large communities create large pools of opportunities for thieves," she says. "If Microsoft leverages the power of its OS market to rapidly create a large community of MSE users, we believe those customers will be doubly vulnerable."

Microsoft provided a peek at Security Essentials in June when it released a public beta version of the software.

The company says the software alerts users only when they need to take action due to a threat that's detected, for instance, and it limits CPU and memory usage.

"Consumers have told us that they want the protection of real-time security software, but we know that too many are either unwilling or unable to pay for it, and so end up unprotected," says Amy Barzdukas, general manager for consumer security at Microsoft. "With Microsoft Security Essentials, consumers can get high-quality protection that is easy to get and easy to use -- and it won't get in their way."

MSE doesn't require any registration or renewals, and is available for download here.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/14/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-1448
PUBLISHED: 2020-07-14
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1447.
CVE-2020-1449
PUBLISHED: 2020-07-14
A remote code execution vulnerability exists in Microsoft Project software when the software fails to check the source markup of a file, aka 'Microsoft Project Remote Code Execution Vulnerability'.
CVE-2020-1450
PUBLISHED: 2020-07-14
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1451, CVE-2020-1456.
CVE-2020-1451
PUBLISHED: 2020-07-14
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1450, CVE-2020-1456.
CVE-2020-1454
PUBLISHED: 2020-07-14
This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.An authenticated attacker could exploit this vulnerability by sending a specially crafted request to an affected SharePoint server, aka 'Microsoft SharePoint Re...