Feeds

IT managers trust Microsoft on security…

Up to a point

  • alert
  • submit to reddit

3 Big data security analytics techniques

OK, so our headline isn't exactly an accurate summation of a Forrester briefing document on security which received widespread coverage this week.

But then again other articles on the report aren't exactly on the money either.

IT managers don't trust MS scream the headlines, repeating Forrester's bullet point summation but not a more detailed summary (contained in a press release) of the report, which states:

Windows security has long been a main concern for IT professionals and users. Forrester surveyed 35 IT security experts at $1 billion-plus firms to better understand these concerns. Seventy-seven percent of respondents cited security as their top concern when deploying Windows applications.

Does that mean 23 per cent of IT managers (in this small sample - eight out of 35) trust the security of Microsoft products? No - because that wasn't the question asked. IT managers were asked to rate security among other issues in deploying Windows, such as return on investment, not to what extent do use trust Microsoft products to be secure? (yes we know even that isn't a very good question, just stick with us here)

Maybe Microsoft deserves this kind of rough handling by the media after bizarrely planning to run ads (alright, only in South Africa) to say that its technology is so secure that it makes "hackers" extinct.

Or maybe not.

Rather than over-spinning an analyst report in to a case against Microsoft, we reserve criticism for when its performance on security falls below reasonable expectations - such as its questionable decision not to patch NT4 against a potential DoS risk because it's "too difficult to fix"; or recent critical risks.

Forrester's release begins by taking about the Windows security dilemma which has "plagued users for years".

"The Klez virus last year cost businesses $9 billion worldwide in lost productivity," Forrester baldly suggests - ignoring the fact that's its notoriously hard to gauge the economic impact of viruses, even when virus writers come to be sentenced in court.

Forrester's analysis picks up from that point and it goes on to give some interesting insights about the problems users face in deploying security patches.

Despite the fact that 89 percent of the survey respondents run sensitive applications, such as financial transaction systems and medical records systems, firms do not deploy security patches. Firms lack the time and resources to apply security patches, and they worry that implementing them will destabilise production systems.

We asked Microsoft UK Chief Security Officer Stuart Okin what he made of the report.

He said it was a "good thing people that worry about security, which is a key focus for Microsoft too".

"The report looked at what pressing concerns people had. Security is one of those but customers are also interested in what return on investment they'll get from deploying technology."

"Customers are generally more interested in the business case, we find, particularly in the current economic environment," Okin told us.

Just because customers raise security as an issue it'd be wrong to conclude people don't trust Microsoft, Okin argue.

Security is also an issue when organisations consider deploying a competitive production environments, he added. ®

Forrester Research Asks, 'Can Microsoft Be Secure?'; Report Recommends A Collaborative Approach To Windows Security

CAMBRIDGE, Mass.--(BUSINESS WIRE)--March 31, 2003--The Microsoft Windows security dilemma has plagued users for years. In 2001, the Nimda worm spread worldwide in 30 minutes. The Klez virus last year cost businesses $9 billion worldwide in lost productivity. "Can Microsoft Be Secure?" is a new report from Forrester Research, Inc. (Nasdaq: FORR) that examines Windows' security issues and makes recommendations to Microsoft, users, and independent software vendors (ISVs) for improving Windows security.

Windows security has long been a main concern for IT professionals and users. Forrester surveyed 35 IT security experts at $1 billion-plus firms to better understand these concerns. Seventy-seven percent of respondents cited security as their top concern when deploying Windows applications. The same percentage had experienced Windows security problems in the past year. Users blame Microsoft for its Windows security incidents, although it has been doing a much better job at security than it has received credit for. Microsoft's patches for the last nine high-profile Windows security incidents predated the attacks by an average of 305 days.

If Microsoft is not solely to blame, where does the problem lie? According to Forrester, the solution to seamless Windows security involves three parties. The answer is to build a partnership that connects Microsoft, ISVs, and users throughout the development, deployment, and operations phases of the platform life cycle. Despite the fact that 89 percent of the survey respondents run sensitive applications, such as financial transaction systems and medical records systems, firms do not deploy security patches. Firms lack the time and resources to apply security patches, and they worry that implementing them will destabilize production systems.

"Microsoft is doing a good job tackling security issues, but it needs to do more. Together, ISVs, Microsoft, and end users must work to establish a process that guarantees that security efforts will pay off," says Forrester Research Analyst Laura Koetzle. "We will not see a change in the Windows security landscape unless these three groups work together to establish standard practices."

In addition to outlining the role that Microsoft, ISVs, and end users should play, the report offers specific detailed suggestions for all three groups. The key to successful platform security involves simple, consistent patch-management tools from Microsoft. ISVs need to validate their applications against patched platforms to ensure that their users will not lose application support. Finally, end users must use server provisioning and virtualization software to test and deploy security patches systematically.

3 Big data security analytics techniques

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Reddit users discover iOS malware threat
'Unflod Baby Panda' looks to snatch Apple IDs
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.