Gartner Blog Network

Posts from Date:   2010-7

Internet Explorer Should be Virtualizable (Officially)

by Neil MacDonald  |  July 23, 2010

In my previous post, I discussed a free virtualized browser offering from Dell KACE. The virtualized browser is based on Firefox with Dell indicating that it hopes to offer a virtualized version of Internet Explorer in the future. That’s more complicated than it first appears. Technically, can IE be virtualized? Yes. Some of the application […]

Read more »

Sandboxing is a Form of Virtualization – and has its Drawbacks

by Neil MacDonald  |  July 22, 2010

On 20 July 2010, Dell KACE introduced a free “sandboxed” version of Firefox for download by anyone. Using its Kontainer application virtualization technology, Dell KACE isolates attacks on the browser from infecting the rest of the system. The idea of isolating the activities of a potentially harmful application (sandboxing) isn’t new. Isolation via virtualization/sandboxing of […]

Read more »

Save $200,000. Keep Using Windows 2000 Securely.

by Neil MacDonald  |  July 21, 2010

Just because Microsoft stopped providing security patches for Windows 2000 last week, don’t assume that it can’t continue to be used securely in your environment. One option is to pay Microsoft $50,000 per quarter ($200,000 per year) for a Custom Support Agreement (CSA) for continued access to critical Windows 2000 patches. A lower-cost alternative program […]

Read more »

There is no Such Thing as an Absolute Identity

by Neil MacDonald  |  July 19, 2010

Let me clarify what I mean by this. When most people talk about identities they are really talking about identifiers – such as a username. I explored this insight in 2007 with Kim Cameron of Microsoft in this Gartner Fellows interview. So getting past the confusion with identifiers, what is an identity? An identity is […]

Read more »

Security Thought for Thursday: Protection = Prevention + Detection

by Neil MacDonald  |  July 15, 2010

We are waaaaaay too focused on the prevention component and woefully inadequate on the detection component of this equation. We overspend on increasingly ineffective prevention technologies — network and host based firewalls, intrusion prevention systems and antivirus technologies in a futile attempt to prevent all infections. Zero infections is a fallacy. It is simply not […]

Read more »

Blocking USB Ports Isn’t the Right Answer

by Neil MacDonald  |  July 12, 2010

Coming back from vacation, I saw this recent article in the New York Times on the recent theft of classified military data. In this case, the person simply bypassed the restrictions on USB ports and simply copied the data to a writeable CD/DVD drive. According to the report: According to Pentagon officials and one former […]

Read more »