Software // Enterprise Applications
News
2/24/2004
04:10 PM
Connect Directly
RSS
E-Mail
50%
50%

Gates: Everything Starts With Security

The Microsoft chairman told an audience at RSA Security's conference that secure, trustworthy systems make everything in computing possible.

Two years after chairman Bill Gates sent his now-famous memo that called for Microsoft to develop more trustworthy and secure software, security is still at the top of his priority list.

In his keynote speech at the 2004 RSA Security Conference, Gates told a crowd of roughly 10,000 security professionals Tuesday that information security is the "most important topic" because secure and trustworthy systems are what makes possible everything else computing has to offer society.

Gates also previewed several technologies designed to make computing more secure. He showed for the first time publicly a Windows Security Center that will help users understand and manage their Windows security settings. He also showed improvements to the Windows Firewall, as well as pop-up blocking enhancements that will be built into Windows Explorer.

Gates also previewed behavior-blocking software called Active Protection Technology that will be able to distinguish "good" and "bad" software behavior and potentially stop worm and virus attacks. Active Protection Technology is in an early testing stage, and no release date has been set.

He also outlined a Coordinated Spam Reduction Initiative, which will include technical specs for caller-ID-like functionality to be built into E-mail. The system would work by having E-mail senders publish their outbound E-mail IP addresses; the receiving E-mail system could vet each message against the published list to see that it was actually sent by person it was purportedly sent from.

Also Tuesday, Microsoft and RSA Security disclosed a partnership under which office computers running the latest versions of Windows could get a new degree of protection against intruders.

Instead of merely making users type in passwords to log on to a computer, users of the RSA token system would also enter a random number that appears on their SecureID, a key-chain fob or plastic card they'd carry with them. The number changes every minute, generated by an algorithm that also resides on a server inside a company's computing center.

The agreement would protect Windows-based computers with the token scheme, whether they're portable or attached to a business network. The tokens would work only on PCs running Windows 2000 or Windows XP or on servers running Windows Server 2003.

Comment  | 
Print  | 
More Insights
Building A Mobile Business Mindset
Building A Mobile Business Mindset
Among 688 respondents, 46% have deployed mobile apps, with an additional 24% planning to in the next year. Soon all apps will look like mobile apps and it's past time for those with no plans to get cracking.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - August 27, 2014
Who wins in cloud price wars? Short answer: not IT. Enterprises don't want bare-bones IaaS. Providers must focus on support, not undercutting rivals.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Howard Marks talks about steps to take in choosing the right cloud storage solutions for your IT problems
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.