In-Depth

The Security Paradox

Though many experts credit Microsoft with making great strides on security, many customers still aren't satisfied. But how much of the problem is really Microsoft's fault?

Consider these facts:

  • Microsoft data shows half as many critical security vulnerabilities occurring in Windows XP Service Pack 2 (SP2) as in the previous version of Windows XP. In addition, Microsoft says it now issues online guidance and alerts within two hours of discovering a new vulnerability, versus 24 hours in 2003.
  • Stamford, Conn.-based analyst firm Gartner Inc., says that security shouldn't be a deciding factor for businesses choosing between Windows Server 2003 and Unix or Linux.
  • Forrester Research Inc. reports that Microsoft was the only one of five vendors surveyed that corrected 100 percent of reported operating system flaws over a 12-month period.
  • A Redmond Channel Partner survey (see "Taking the Partner Pulse," September 2005) cites "security is lacking" as one of the top three complaints about Microsoft that partners hear from customers.

If you're puzzled by the apparent disconnect between that final item and its predecessors, you're not alone. Yet a variety of partners and security experts confirm that while Microsoft is making serious headway on security, customer unhappiness persists.

What appears paradoxical at first, however, turns out to be less so upon closer inspection. Though Microsoft now ships dramatically more secure products, analysts say many customers still run older, less hardened releases. Patching those systems is easier than it used to be, but partners say their customers still find the task onerous. Small wonder that their frustration endures.

Still, many partners believe that customers are misdirecting some of their ire. They say that while Microsoft bears much of the blame for the ongoing security woes, oftentimes the party most at fault is staring back at customers from their own mirrors.

A Big Leap Forward
It's been four years since Microsoft Chairman Bill Gates, responding to a devastating series of viruses that left customers furious about their vulnerability to attack, wrote his famous "Trustworthy Computing" memo, ordering that security become the company's top priority. Since then, the software giant has been a blur of security-related activity. Microsoft says it has trained 15,000 employees on the new Security Development Lifecycle, a rigorous methodology for producing more secure code. To provide defense-in-depth from malware, the company has introduced a slew of new protection technologies, including its Windows Defender anti- spyware tool and products from acquired security firms Sybari Software and FrontBridge Technologies, among others.

In addition, Microsoft has adopted a new monthly threat reporting and patching schedule, rolled out tools, webcasts and events offering prescriptive security guidance, collaborated with industry bodies on issues such as phishing and spam, and worked with law enforcement agencies to bring cyber-criminals to justice.

"Microsoft's approach to security has markedly improved in recent years," says Yankee Group research fellow Laura DiDio: "It's like the fat kid who goes to Marine boot camp. They've gotten very fit and very responsive."

Those efforts have been making converts out of some critics, including David Maynor, a widely respected research engineer at Atlanta-based solution provider and Microsoft Gold Certified Partner Internet Security Systems Inc. (ISS). "To be honest, until recently, I wasn't a big fan of the improvements they've made," says Maynor, who was among an elite group of security experts invited to meet with Microsoft executives and developers in October 2005. What he learned about Microsoft's scrupulous new development practices convinced him that the company has come far in addressing the problem.

Many analysts too now sing Microsoft's praises. Until recently, the company was "getting a lot of black eyes" on security -- and deservedly so, says Laura DiDio, a research fellow with Boston-based consulting firm Yankee Group Research Inc. Since then, however Microsoft's security strategy has markedly improved, she says: "It's like the fat kid who goes to Marine boot camp. They've gotten very fit and very responsive." Gartner analyst John Pescatore predicts that just as Windows Server 2003 leveled the security playing field for Microsoft in the back office, Windows Vista will do the same for the company on the desktop. "Based on the betas, we're pretty positive," he says. "It will remove security as a differentiator."

Maynor goes even further. "I think coming up, with the processes they have in place, security will be a plus for Microsoft," he says. "People will realize Microsoft has much better security than some of its competitors."

Microsoft's security turnaround has earned high marks from many partners as well. "If you look at what Microsoft has done in the last two years in terms of security, it's turned like 180 degrees," says Charlie Haney, a regional vice president at Englewood, Colo.-based Interlink Group Inc., a technology services company and Microsoft Gold Certified Partner. Among other things, Haney lauds Microsoft for disabling features in its new releases by default if they pose a safety risk. Greg Pearson, vice president for sales and marketing at KiZAN Technologies LLC of Cincinnati, a Microsoft Gold Certified Partner specializing in advanced enterprise solutions, commends Microsoft for adding controls against executable attachments to its messaging platform. "Our customers who are implementing new products from Microsoft are on balance better off than they were before," says Pearson. "There's no doubt about it."

Mark Shavlik is less impressed. The president and CEO of Roseville, Minn.-based security ISV Shavlik Technologies LLC, a Microsoft Gold Certified Partner whose products face potential competition from some of Microsoft's latest security offerings, applauds Microsoft's intentions, but says the company doesn't seem to have fixed much. In even the newest releases, he contends, "the basic architecture is not there from a security perspective."

At least some evidence suggests many businesses agree. In a survey of 1,354 subscribers conducted by Network Computing magazine in April 2005, 53 percent of respondents said that while Microsoft is taking proper steps to secure its applications and operating systems, those products "aren't there yet."

So why the disparity between how customers rate Microsoft on security and how experts and partners do? One theory is that all the bad press Microsoft receives on security distorts customer perceptions. "Very few of our clients have actually had an issue, but they do read the trade magazines and hear about viruses and worms going around," says Chris McGinness, director of engineering at Genex, a Los Angeles, Calif.-based provider of Internet solutions and a Microsoft Gold Certified Partner. Security flaws in Windows always make a bigger splash in the media than issues affecting other platforms because they impact so many people, says ISS's Maynor. As a result, people hear more about vulnerabilities in Windows than in other products.

More significantly, Microsoft has only recently begun bringing more secure versions of its products to market. "The development cycles are actually kind of long, so we're really just starting to see the effects of things that happened two years ago," Maynor says. Meanwhile, while Microsoft's latest releases require less patching, many organizations haven't deployed them yet. Indeed, in a May 2005 study, Forrester Research found that 42 percent of the servers at the 512 North American enterprises surveyed were running Windows Server 2000 -- and that an additional 10 percent were still on Windows NT.

For companies running older products, Microsoft's seemingly endless series of updates is a potent source of dissatisfaction. DiDio says that businesses are spending 50 percent to 80 percent less time applying patches now that Microsoft ships them in regular monthly batches. Yet even so, patching remains a burdensome chore. For example, according to a Microsoft case study, Microsoft's monthly updates have enabled Garanti Technology, a Turkish IT services company, to slash the time needed for updating its 13,000 systems by 65 percent -- but it still takes six people 15 to 20 hours every month to complete the process.

Swallowing the Bitter Pill
Many partners find that simply bringing customers up to speed on Microsoft's latest security efforts goes a long way toward quelling their discontent. "There are a lot of features in [Windows XP] SP2 that people donÕt know about," says Maynor, and educating people about them helps change opinions. For example, the Windows Security Center provides at-a-glance information on the status of firewalls, antivirus protection and automatic updating. Haney says many of Interlink Group's customers aren't even aware that Microsoft has a security home page (located at Microsoft.com/security). Once they explore the site a little, he says, customers start asking "Why aren't we doing some of this stuff? Maybe it's not the vendor -- it's the organization."

Guiding clients to that epiphany is the real key to overcoming security complaints, partners say. The ugly truth is that some of the headaches customers blame on Microsoft stem from their own flawed security practices. "Even if Microsoft products were still wide open, a well-managed infrastructure is unlikely to get attacked," observes Pearson. "That's a bitter pill for an IT team to swallow, because they all think they're doing a damn good job."

Evidence suggests that many are not. For instance, a study by Forrester analyst Laura Koetzle reports that relevant Microsoft patches were available an average of 305 days in advance of the nine biggest Windows virus outbreaks before March 2003. Most companies simply never installed them, Koetzle says. Pearson still gets calls from people contending with Slammer, a virus that first struck in January 2003.

Partners can play an important role in encouraging clients to forego the finger-pointing and instead answer some cold, hard questions about their security processes. Among them, says Haney: "What are your policies and procedures? How are you defending at the edge of your enterprise? How are you defending your wireless network?" Organizations without a comprehensive security strategy are vulnerable to attack no matter how Microsoft designs its operating systems. Likewise, Maynor's colleague Scott Paisley, director of technologies for the Americas at ISS, encourages clients to take a more holistic approach to their security needs. "It's very easy for a customer to come to the conclusion it's the operating system's fault," he says. "What we tend to do is [ask customers] 'How can we wrap our arms around the whole security piece?'" Wrestling with that question often leads people to the realization that some of the anger they've been directing at Microsoft may be misplaced.

More Information

Microsoft-Related Security Resources
  • A white paper detailing Microsoft’s security strategy and investments can be found here.
  • Studies from Yankee Group and Forrester discussing Microsoft’s progress on security are available here.
  • Security resources on the Microsoft Partner Portal are located here.

Featured