Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:30 AM

Symantec Locks Horns With Microsoft

Users uneasy over Symantec's attempts to derail the launch of Microsoft's Vista OS

Users are watching intently from the sidelines and predicting some security hiccups with the upcoming Vista OS if Symantec's newly filed lawsuit against Microsoft moves forward.

Yesterday Symantec charged that Microsoft has "misappropriated" Symantec's storage technology, centering on the vendor's VolumeManager offering, which Symantec claims has been incorporated into Vista.

According to the lawsuit, Symantec is seeking an injunction to prevent development, sale, and distribution of Vista, and is also seeking damages from Microsoft, which licensed a "simplified version" of VolumeManager from Veritas back in 1996.

Symantec obtained the VolumeManager technology, which can be used to copy, move, and delete data, when it acquired storage vendor Veritas for $13.5 billion last year. (See Shareholders OK Veritas/Symantec Merger, Symantec, Veritas Complete Merger, and M&A Worries Stall Symantec Shares.)

Vista, which has already been delayed, is slated for release to businesses in November and consumers in January 2007. The operating system, which is the firm's largest upgrade since the launch of Windows XP in 2001, will improve desktop security and boost users' ability to share information across mobile devices and remote locations, according to Microsoft.

The vendor is already touting Vista as the most secure Windows operating system yet, and is developing a series of enhancements based around authentication, malware protection, and users' ability to lock down files. A feature called Encrypting File System, for example, which provides user-based file and directory encryption, has been enhanced to allow storage of encryption keys on smart cards.

An IT manager at a Nevada-based Internet firm, who asked not to be named, agreed that the dispute, if it affects the Vista rollout, could mean trouble for many users. "For companies that are counting on the Vista features, that could be a big deal. Businesses that are 100 percent Microsoft on back-office systems and workstations will be most concerned," he says, although he expects minimal impact in his own firm, which is not solely reliant on Microsoft.

Shlomi Harif, director of network systems and support at Austin Independent School District, says that, although the education sector is not traditionally at the bleeding edge of new technology deployments, any further Vista delays would be bad news for users -- but a hidden opportunity for some security vendors.

"It would give a second bite of the apple to security companies that are looking to tout solutions that Vista might otherwise have overshadowed," he explains, adding that mobile security specialists and vendors of network access products, in particular, could seize on the opening.

Microsoft, however, hit back at Symantec in a statement, saying that the legal action "stems from a very narrow disagreement" over the terms of the 1996 contract with Veritas. Symantec's claims, it added, "are unfounded because Microsoft actually purchased intellectual property rights for all relevant technologies from Veritas in 2004."

When contacted, Redmond had this email response for Byte and Switch: "Microsoft is on track to make Windows Vista available direct to our business customers in November via our Volume Licensing program. The company is targeting broad consumer availability and new PCs in January of 2007."

The software behemoth continues to make a concerted push into the security space. Earlier this week, for example, Microsoft snapped up SSL VPN hardware vendor Whale Communications for an undisclosed fee, as it looks to boost its Network Access Protection (NAP) strategy. (See Microsoft in Whale of a Deal.)

— James Rogers, Senior Editor, Byte and Switch. Special to Dark Reading

Organizations mentioned in this article:

  • Microsoft Corp. (Nasdaq: MSFT)
  • Symantec Corp. (Nasdaq: SYMC)
  • Whale Communications Ltd.


    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 7/2/2020
    Ripple20 Threatens Increasingly Connected Medical Devices
    Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
    DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
    Dark Reading Staff 6/30/2020
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    How Cybersecurity Incident Response Programs Work (and Why Some Don't)
    This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
    Flash Poll
    The Threat from the Internetand What Your Organization Can Do About It
    The Threat from the Internetand What Your Organization Can Do About It
    This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2020-07-02
    Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
    PUBLISHED: 2020-07-02
    A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
    PUBLISHED: 2020-07-02
    In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
    PUBLISHED: 2020-07-02
    In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
    PUBLISHED: 2020-07-02
    In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.