Antivirus, firewall protection and security solution provider GRISOFT announced a new free tool for rootkit removal this morning. As the press release says:
“Rootkits are computer code that attempt to hide their actions and processes, making the job of detecting the code and the harmful processes very difficult,” explains Larry Bridwell, VP of Global Security Strategies of GRISOFT. “AVG Anti-Rootkit is developed to detect and destroy rootkits effectively, without bothering users with false alarms.”
The product’s web page boasts the following highlights:
- Powerful cleaning due to advanced cleaning driver
- Easy to use interface
- Fast and efficient detection (even for NTFS-ADS objects)
- Special interface for visually impaired people
GRISOFT’s solution, available for download on the site, promises to remove stubborn rootkits at a price any CFO will love. Leave Lady Macbeth in the dust. After all, what’s done is not always done. You have the power to rid your customer’s networks of tricky hidden malware without tugging on the purse strings.
Be sure to look at our open source security tools topic center for more no-cost hints and tips. And if you have an issue involving security threats and countermeasures that needs Macduff‘s touch, ask Russell Dean Vines your hardest questions.
AMD restructuring after 1q revenue miss With its sales shriveling even more than analysts feared, Advanced Micro Devices Inc. is imposing a partial hiring freeze and clamping down on other major expenses as the slumping chip maker tries to weather a fierce battle with Intel Corp. [AP]
Citrix to corporate IT: Application delivery is strategic The network vendor is pushing its first desktop virtualization offering and calling on application providers and system vendors to educate the market on the value of application acceleration. [eWEEK]
Longhorn April CTP precedes Beta 3 Longhorn Beta 3 still on track, according to Microsoft, as it releases new code this week.
Open source software seeks SOA interoperability Getting open source components to work together in a service-oriented architecture (SOA) is not easy, but the newly formed Open Solutions Alliance (OSA) promises to bring some order to the interoperability chaos.[SearchWebServices.com] Continued »
LiveOffice Corp., like many small managed-messaging-service providers, wants to build its channel program while it expands its product offerings. The new product is a Web-based administration console designed to give customers an easy-access view of the volume of mail and number of threats filtered through the secure messaging gateway LiveOffice maintains for them.LiveOffice uses IronMail, a messaging security gateway system from Secure Computing for spam and malware filtering, remote access to performance indicators, encryption for outgoing messages and detailed searches for archived messages required as evidence for court casesLiveOffice executives said they hope Sentinel will give them enough exposure to sign channel partners outside their existing financial-services customer base. It has expanded its channel program to include three tiers, guarantee resellers a minimum of 15% of a registered deal, and promises to double by the end of 2008 the 15% of its revenue that comes in through the channel. Last year LiveOffice generated approximately $15 million in revenues.
Looking for a new channel angle to help business growth? Robert Malone wrote an interesting article for Forbes.com talking about structured and unstructured data and how channel companies can play a role. Malone talks about the fact that as the data streams that are constantly being fed into companies increase, data gets lost, improperly filed away or becomes too difficult to track down.
He mentions two companies — Teradata and Attensity — that are taking on the task of providing the service of sorting, organizing and maintaining these data streams. Sounds like a professional service to me. Will more VARs think about getting on this bandwagon?
Personally, I think they should. How far removed is data management from storage management? Part of the value add could a program or three that will help sort and maintain information before moving it off to be archived and stored. Seems like something that could be bundled into the service.
Experts tout the ability to send voice over an IP network as a plus because telephony and data can be sent on one network, thereby streamlining management of data and voice traffic as well as the network.
That works until users get too enthusiastic about bandwidth-hogging technologies — video and software-as-a-service, for example — and swamp the network, degrading performance and increasing security risks. In many ways, VoIP’s success is putting normal use of networks at risk.
Some VoIP customers have gone from thinking they’d cut corners by converging their networks to finding themselves waiting to complete even simple tasks across an overworked network.
Juniper Networks’ Sanjay Beri, director, product management, says there are three macro trends developing on this front:
The first is the need to appropriately assign bandwidth to specific applications via application-intelligent firewalls and intrusion-prevention systems. Businesses need to determine which applications are business critical and therefore have priority on the network.
The second trend, according to Beri, is a shift in network design; rather than using big pipes to overcome bottlenecks, packet collisions and awkward routing paths, VoIP- and video-enabled networks should be designed for performance, using varying quality-of-service levels to support critical high-performance applications like voice as well as asynchronous applications such as email that tolerate traffic delays.
And finally, data-center consolidation is forcing network managers to accommodate users who need to access high performance, low latency applications over the WAN, says Beri. This is where WAN optimization and application acceleration products come into play.
The demand for VoIP is keeping VoIP specialists busy and pulling in non-specialists as well — VARs who can tune a network to accommodate the voice gear. If the trend continues — and gets even worse as more end users demand video, video chat and telepresence applications — there may very well be a market for the VAR version of the two barber shops joke: A sign in the window of one barbershop said, “Haircuts: $6.” A sign in the other said, “We fix $6 hair cuts.”
— Crystal Ferraro
Companies propose Ethernet/SAN love-in A gaggle of top networking and storage vendors have submitted a new standards proposal that will allow Fibre Channel protocol over Ethernet networks. [TheReg]
NAC attack: today’s products will fail, report says Vendors say modern NAC products will fall by the wayside in favor of software-based technologies that manage risk by integrating endpoint security, access control, identity and risk management. [eWEEK]
Sun’s complaint on chip maker is dismissed Hynix Semiconductor has won a dismissal of claims by Sun Microsystems that it conspired to drive up memory chip prices, overcharging chip buyers. [NYT]
One of the key announcements at Cisco’s Partner Summit 2007 this week was the Cisco Smart Service — a support-and-monitoring service that Cisco described as halfway between its SmartNet break/fix support service and high-end network management and monitoring services many of its channel partners offer.
The service is a pure resale opportunity for partners; Cisco built the software and maintains the network. Partners can add whatever additional services they want, and charge anything they want, because Cisco keeps the price secret from everyone except partners.
Fortunately we were able to glean a few details about the price list (actually, the price list) and the reaction of some partners to the potential downsides of the service.
Microsoft roping more into Longhorn Server release Software maker says it has added to Longhorn Server since the last major test version and that the OS is on track for release later this year. [CNET]
Vista SP1: To be or not to be? This week in Security Blog Log: The owner of The Hotfix.net blog sparks controversy by posting what he claims are 100 fixes slated for Windows Vista Service Pack 1 (SP1).
More Windows patches coming next week In a preview of next week’s monthly patch release, Microsoft said it plans to issue four more Windows updates on top of the ANI fix it rushed out this week.[SearchSecurity.com]
As hackers are developing business models and customer service departments, it should probably come as no surprise that network security is doing well.
According to a recently released Infonetics Research study, the network security sector has continued to grow through 2006 and is expected keep going.
The big winners were the secure router sector, which continued to dominate worldwide sales, claiming a 25% increase through 2005 and 2006 and passing the $1 billion mark. Cisco retained its position as market leader (unsurprisingly), with Juniper and Check Point tying for second.
Before channel pros pop the corks on their champagne bottles over their network security appliance and software accounts, they should know that appliance revenues are expected to slow significantly in the face of rising content security gateway demands.
Between now and 2010, content security appliance revenues are projected to grow 168% worldwide, reaching $2.3 billion in 2010. Content security software is also expected grow steadily, though the lack of interest from small and midsized businesses will keep those numbers from jumping off the charts.
You only have to go to Hell once.
The world is divided into two kinds of people: those who love Las Vegas, and those who go there for conferences; again and again and again. Snippets from Cisco’s Partner Summit 2007 at the Venetian hotel and Sands convention center: