HP shelves virus-throttling product
An executive cited conflicts with the Windows operating system for the decision
IDG News Service - Six months after unveiling cutting-edge technology designed to choke off the spread of viruses, Hewlett-Packard Co. is quietly shelving the project, citing conflicts with Microsoft Corp.'s Windows operating system, a company executive said.
The company won't be releasing a security service called Virus Throttler, which was announced in February. The technology does a good job of stopping viruses and worms from spreading, but it isn't practical for use in mixed networking environments because it requires operating system changes incompatible with Windows, according to Tony Redmond, vice president and chief technology officer at HP.
Virus Throttler slows the spread of virus and worm attacks by limiting the network destinations that a virus-infected computer can attempt to connect to each second, according to HP. The service was designed to alleviate the network congestion that often accompanies virus outbreaks, when one or more infected machines flood the network with traffic while searching for other vulnerable hosts. Such denial-of-service attacks often complicate recovery from virus outbreaks by preventing network administrators from observing network traffic and communicating with hosts on the network, HP said.
The technology notices changes in host-machine behavior, which indicates a virus infection. It then chokes off the attack by limiting the frequency of outbound communications from the host machine to "throttle" communications with other hosts on the network, Redmond said.
HP got Virus Throttler to work well in its labs with products using operating systems such as HP-UX and Linux. However, the technology required changes to the way those operating systems run that HP couldn't duplicate on Windows systems because "we don't own Windows," Redmond said.
Virus Throttler was one of two new security services developed by company researchers that HP debuted at the RSA Security Conference in San Francisco. The other technology, Active Countermeasures, is a network-scanning service that spots vulnerable computers on a network using techniques similar to those employed by worms and viruses.
Last week, HP said it's moving the Active Countermeasures software into beta tests with some European and North American customers and hopes to release the product in 2005. The service allows administrators to find machines even if they are outside of the company's patch management system or "unmapped" or are unknown to administrators, the company said. Network administrators can then "vaccinate" vulnerable machines by pushing out configuration changes or policies that prevent infection, HP said.
But Virus Throttler will stay in the lab while HP looks for a way to use the technology in typical network environments, Redmond said. HP has demonstrated the service to Microsoft and other partner companies and may
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts