Credibility at the Forefront

By Larry Seltzer  |  Posted 2007-02-06 Email Print this article Print
 
 
 
 
 
 
 

Opinion: Microsoft enters the anti-malware market with a home field disadvantage and plenty to prove.

There's something different about the security market, and especially the anti-malware market. Most software markets tend to move towards consolidation, but competition is alive and well in anti-malware.

Clearly the major players are concerned about Microsoft's entry into the market with their consumer-oriented OneCare service and the corporate Forefront products. Big players in the corporate market have called me to talk about the disadvantages of Forefront and everyone in the consumer space takes time to disparage OneCare.

It's actually unbecoming and suspicious to me the way everyone gangs up on OneCare, but it's also true that it hasn't been well-reviewed. PCMag.com's latest suite comparison said that it didn't exactly suck, but it wasn't all that good. And Microsoft's scanning engine hasn't been top notch in any tests I've seen, including some presented to me by Microsoft.

It's in the business world where Microsoft will have a very hard time, even though their first effort looks better by comparison to OneCare's. But fair or not, it's reasonable for a customer to be suspicious of having Microsoft provide security for a Microsoft platform. This is a disadvantage they face no matter how well they execute their products.

A wide range of security vendors will re-launch or introduce products at the upcoming RSA Conference 2007 in San Francisco, including well-recognized names such as McAfee, Oracle and Novell. Click here to read more.

Some people put it in terms of asking Microsoft to protect against flaws in Windows, but this is unfair; security software and operating systems have different perspectives on things, except to the degree that you bundle the former with the latter. And it's really not a flaw in Windows that malware is written for it, at least for malware that doesn't exploit vulnerabilities.

At least from some perspectives it may be more of a prejudice than actual good practice. But I think it's better, all things considered, to have your security performed by a different company than the one providing the products being secured. There's certainly no clear advantage to using Microsoft products to protect Microsoft platforms.

The server and gateway-based Microsoft products mitigate this disadvantage somewhat with an aggressive multiple engine approach. Building on the Antigen products they bought years ago, you are allowed to select several from a menu including the Microsoft engine and others (CA InoculateIT, CA Vet, Norman, Sophos, Authentium, Kaspersky, VirusBuster and AhnLab).

The multiple engine approach is not only a good way to disarm Microsoft's home field disadvantage, it's an attractive way to do things in general. The test results Microsoft showed me, performed by outside people I trust, showed very respectable protection.

Microsoft is not the only company running multiple engines and getting good results out of it. F-Secure also takes this approach. At home, I run Sunbelt Software's Ninja server for anti-spam and anti-virus and it uses two engines for each. Expect this to be a trend, at least for smaller players; the big three (Trend Micro, McAfee and Symantec) will have to live or die based on the quality of their own engines.

Credibility is a tough thing in the security market. I expect Microsoft to have a better time of it in with smaller businesses competing against the likes of Sunbelt. Customers in this space are more apt to trust their VARs and consultants and opt for a "simpler" installation. But they still have competition.

When dealing with larger businesses that have real IT staffs I think it will be a long time, if ever, before Microsoft has success with security software. They have a tough sell to make.

Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983.

Check out eWEEK.com's for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer's Weblog.

More from Larry Seltzer

 
 
 
 
Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement—,he graduated from the University of Pennsylvania in 1983.

He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.

For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.

In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.

Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.
 
 
 
 
 
























 
 
 
 
 
 

Submit a Comment

Loading Comments...
























 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date