19 April 2024, 17:29 mobile  |  forums  |  amdzone.it  |  atizone.it  |  enboard  |  forumzone.it  |  hwsetup.it  |  nvidiazone.it  |  unixzone.it 
 
 
 
About UsAbout Us
Tag SearchTag Search
Share UsShare Us
Contact UsContact Us
Feed RSSFeed RSS
SitemapSitemap
3dfxzone.it
         your source for 3dfxhardware, and gaming
 
HOME    |    NEWS    |    GAMES    |    ARTICLES    |    3DFX    |    VIDEO CARDS    |    COMPONENTS    |    FILES BROWSER
 
 
MAIN
News News
Headlines Headlines
Games Games
Articles Articles
3dfx Hardware & Software 3dfx
Video Cards Video Cards
Components Components
Utilities Tools
Files Browser Files Browser
Communities Communities
Contact Us Contact Us
3DFX
Latest Headlines Latest Headlines
Older Headlines Older Headlines
3dfx Articles 3dfx Articles
Files Browser Files Browser
Communities Communities
Voodoo1 Voodoo1
Voodoo2 Voodoo2
Banshee Banshee
Voodoo3 Voodoo3
Voodoo4 and Voodoo5 Voodoo4/5
VoodooTV VoodooTV
Latest Drivers Latest Drivers
3dfxzone.it Releases Our Releases
Hot Files for 3dfx cards Hot Files
Games Settings GamesSettings
Best Settings BestSettings
Official Patches Official Patches
Patches for Transform and Lightning videogames T&L Patches
MesaFX MesaFX
WickedGL WickedGL
Glide 3X Glide 3x
Technology Demos Tech Demos
Game Demos Game Demos
Official FAQ Official FAQ
Just For Fun Just For Fun
3DFX Channel | Main menu Main menu
COMPONENTS
Processors Processors
Motherboards Motherboards
RAM Memories RAM Memories
Video Cards Video Cards
Audio Cards Audio Cards
SSDs & HDDs SSDs & HDDs
Network Connectivity Connectivity
Drivers Index Drivers Index
Hardware Channel | Main menu Main menu
VIDEO CARDS
AMD - ATI AMD
Intel Intel
NVIDIA NVIDIA
Matrox Matrox
Video Cards Channel | Main menu Main menu
UTILITIES
3D-Analyze 3D-Analyze
Antivirus Antivirus
Benchmarks Benchmarks
Data Recovery Data Recovery
Mastering Mastering
Screensavers Screensavers
Video Video
File Sharing File Sharing
Tweakers Tweakers
Windows Windows
Tools Index Tools Index
Software Download Channel | Main menu Main menu
VIDEOGAMES
Demos Demos
DirectX DirectX
Patches Patches
Screenshots Screenshots
Trailers Trailers
Utilities Utilities
Videogames | Main menu Main menu
 
 16.01.2007   Microsoft parla del Trustworthy Computing
 

Share it on Facebook Share it on Twitter Share it on WhatsApp Share it on reddit

In un intervista Adrienne Hall, senior director delle strategie di Trustworthy Computing in Microsoft, parla degli sforzi compiuti rivolti alla sicurezza di Windows Vista.

Nell'intervista si citano Windows Defender, un tool anti spyware; il filtro anti-phishing di IE7; BitLocker Drive Encryption, un tool per la criptare dischi; User Account Control, per l'amministrazione dei privilegi degli utenti e Group Policy for Devices, per il controllo dei device rimovibili.

Q&A: Trustworthy Computing at Five Years

Adrienne Hall, senior director of Trustworthy Computing strategies at Microsoft, discusses the company’s sustained commitment to delivering secure, private and reliable computing experiences based on sound business practices.


REDMOND, Wash., Jan. 16, 2007 – In 2002, Microsoft Chairman Bill Gates launched a concerted effort to make providing a secure, private and reliable computing experience for everyone a top company priority. Five years later, Microsoft is seeing the benefits of this work. A host of products and services, including Windows Vista, are clearly reflecting the principles of Trustworthy Computing. PressPass recently spoke with Adrienne Hall, senior director of Trustworthy Computing strategies at Microsoft, to discuss the company’s Trustworthy Computing progress and plans as the nature of security and privacy threats continues to evolve.


PressPass: What is the status of Trustworthy Computing as it reaches its five-year mark?


Hall: Trustworthy Computing started five years ago as a vision. We wanted to make personal computing as secure and reliable as common utilities, such as the telephone. At the time, we talked about how almost anyone in the developed world could buy a new telephone and plug it into a phone jack without ever worrying whether or not it would work. People simply assumed they would get a dial tone and had a level of expectation about the quality of the experience they would have. Our goal was to develop that same type of trust in people’s computing experiences. The basic desire to improve the level of trust in computing has remained a constant, and will continue to be part of what we see as the long-term journey of Trustworthy Computing.


PressPass: How has this journey evolved over time?


Hall: Microsoft has transformed Trustworthy Computing from a startup initiative to a company tenet – a core principle that shapes everything we do and influences every aspect of our business. With that in mind, we expanded the concept of Trustworthy Computing into the areas that are integral to a trustworthy computing experience: security, privacy, reliability and business practices.


Over the past five years, we’ve also seen a cultural shift within the company and a heightened commitment to all the elements that comprise Trustworthy Computing. We regularly look at how much we invest in technology to provide the best customer experience possible, as well as how effectively we share knowledge, learn from others and collaborate with industry partners, government and academia to improve the overall computing experience. In addition, we regularly assess whether the guidance, training and tools we provide are timely, accurate and easy-to-understand.


PressPass: How does Windows Vista reflect Microsoft’s Trustworthy Computing efforts?


Hall: Windows Vista contains a number of new features and technologies that, taken together, are designed to make Windows-based PCs much more secure and reliable and online experiences safer. These improvements help individuals and organizations keep their PCs free from viruses, worms and spyware, and maintain the integrity of sensitive personal and corporate information.


In addition, companywide Trustworthy Computing policies and internal guidelines were followed throughout the development of Windows Vista. Our Security Development Lifecycle (SDL) requires mandatory developer training on writing secure software code and rigorous review and testing of code before it’s included in the product or service. This helps ensure that security is an intrinsic part of how Microsoft develops software. Likewise, our software development process follows Microsoft’s internal privacy guidelines, which reflect customer expectations and global privacy laws. In 2006 we released a public version of these privacy guidelines, so our best practices can be shared with other companies to help them develop more privacy-enhancing software and services. Similarly, Microsoft is committed to providing industry partners with fundamental tools and resources to help build more secure products via the SDL, including threat-modeling tools and developer training on writing secure code.


Throughout the development of Windows Vista, we extensively tested the product. For example, in addition to the tens of thousands of people who participated in the beta testing program, we also received more than 130,000 customer-feedback reports, and provided online services for independent software vendors and corporate developers that helped them assess the reliability and quality of their applications against the various builds of the operating system.


PressPass: Can you give us some examples of features in Windows Vista that demonstrate the company’s progress with Trustworthy Computing?


Hall: Many of the security- and privacy-enhancing features in Windows Vista benefit consumers, technology partners, business- and public-sector customers alike. For consumers, there’s Windows Defender, which helps protect computers against security and privacy threats, as well as performance issues related to spyware. The Phishing Filter in Internet Explorer 7 helps people browse more safely by advising them about suspicious or known phishing Web sites. And, Family Safety Settings help monitor and manage Web sites that children might visit and help keep them safe from online threats.


For businesses and organizations, BitLocker Drive Encryption provides enhanced data protection should laptops be lost or stolen. This protection is achieved by encrypting the entire Windows volume. According to a recent study by the Ponemon Institute LLC, 61 percent of survey respondents said that accidental data leaks occur "frequently" or "very frequently" because employees or contractors lack sufficient knowledge about preventative measures or because employees or contractors are careless. User Account Control reduces security risks by limiting the privileges granted to standard users and granting administrative access only when needed (such as when installing new software or changing the system configuration). It gives typical users most of the capabilities they need for day-to-day work, while helping protect systems and networks from unauthorized tampering.


With a USB key or removable storage device, a company’s valuable intellectual property could just walk out the door. A USB key with malware configured with an “autorun” script could also be used by an attacker to install malicious software on an unattended machine. Another feature is Group Policy for Devices, which enables IT administrators to manage or block the installation of unsupported or unauthorized devices. These features will give IT administrators greater control over the security and privacy of information on a company’s network.


PressPass: Microsoft has made some organizational changes in its security and privacy teams. What's the status with those changes?


Hall: The changes announced last Oct. 12 were part of the company’s effort to create a broader Core Operating System Division. We are combining the Security Technology Unit, Trustworthy Computing, and the Engineering Excellence teams under one group, with Scott Charney, vice president, Trustworthy Computing, at the helm.


Our commitment to trustworthy computing experiences means we’ll continue to have individuals around the corporation who are focused on security, privacy, reliability and business practices that are responsive to our customers’ needs. But over the last five years, we've added resources and built up teams in several places around the company. Bringing these teams together will help us more closely align efforts and allow for greater flexibility in the future.


Again, our priorities will remain fundamentally the same, but bringing together these teams will combine our strategic investments into one group.


PressPass: What can we expect as Microsoft continues its work towards Trustworthy Computing in the years to come?


Hall: During the late 1990s, Microsoft’s strategy was to ensure its products allowed customers to take full advantage of the Internet – and that was critical. In the same way, Trustworthy Computing will be critical to our success in the next 10 years and beyond. It will affect every product, every service, every customer and partner interaction, and every employee.


As the technology industry continues to focus more attention on privacy and security, cyber criminals will respond with more sophisticated attacks. Therefore, we must consider security, privacy, reliability and business practices holistically. Microsoft will stay focused on addressing security and privacy concerns; continue to develop systems architected for trust; and partner across industry, government and academia to address the challenge of cybercrime. Take, for example, the security and privacy threats posed by organizational data breaches: while technologies like BitLocker Drive Encryption help mitigate risk, Microsoft also believes a strong, national standard for privacy protection will benefit consumers and set clear standards for legitimate businesses, allowing commerce to flourish. Microsoft is a founding member of the Consumer Privacy Legislative Forum, a group of diverse industry and consumer leaders advocating for this strong standard in the U.S. We're proud of our efforts to date, and yet we recognize that there is much more to do. Our work will never be complete.





Source: Microsoft Press Release
Links

tag: computing  |  microsoft  |  trustworthy computing

 PREVIOUS MORE NEWS GO BACK NEXT 


[ Go Back ]

LATEST NEWS
Hardware Monitoring & Benchmark: AIDA64 Extreme Edition 7.20.6820 betaHardware Monitoring & Benchmark: AIDA64 Extreme Edition 7.20.6820 beta
Windows Audio & Video & Codecs Tools: DivX Software 11.0.1 - AMD hardware fixWindows Audio & Video & Codecs Tools: DivX Software 11.0.1 - AMD hardware fix
Incrementa la sicurezza di Windows 11 con Windows Firewall Control 6.10.0.0Incrementa la sicurezza di Windows 11 con Windows Firewall Control 6.10.0.0
HFS - HTTP File Server 0.52.1 consente di realizzare un server HTTP a costo zeroHFS - HTTP File Server 0.52.1 consente di realizzare un server HTTP a costo zero
Dopo la Arc A750 OC, BIOSTAR annuncia anche la video card Arc A380 STDopo la Arc A750 OC, BIOSTAR annuncia anche la video card Arc A380 ST
Samsung annuncia i primi chip di LPDDR5X con data rate fino a 10.7GbpsSamsung annuncia i primi chip di LPDDR5X con data rate fino a 10.7Gbps
Blender 4.1.1 supporta l'utente nella generazione di contenuti grafici in 3DBlender 4.1.1 supporta l'utente nella generazione di contenuti grafici in 3D
L'app MediaInfo 24.04 visualizza le proprietà dei file multimediali ed è freeL'app MediaInfo 24.04 visualizza le proprietà dei file multimediali ed è free
SSD & HDD Storage Drives - Monitoring & Benchmark Utilities: HD Tune Pro 6.00SSD & HDD Storage Drives - Monitoring & Benchmark Utilities: HD Tune Pro 6.00
Oracle rilascia VirtualBox 7.0.16 per Windows, Linux, macOS e Unix SolarisOracle rilascia VirtualBox 7.0.16 per Windows, Linux, macOS e Unix Solaris
The Linux Kernel Organization rilascia il Linux Kernel 6.8.7: info e downloadThe Linux Kernel Organization rilascia il Linux Kernel 6.8.7: info e download
Incrementa la sicurezza di Windows 11 con Windows Firewall Control 6.9.9.8Incrementa la sicurezza di Windows 11 con Windows Firewall Control 6.9.9.8
more NEWS NEWS INDEX
LATEST DRIVERS FOR AMD, INTEL, AND NVIDIA GPUS
Latest drivers for AMD Radeon cards and Windows Operating Systems Latest drivers for AMD Radeon cards and Windows Operating Systems
Latest drivers for Intel Alchemist cards and Windows Operating Systems Latest drivers for INTEL Alchemist cards and Windows Operating Systems
Latest drivers for NVIDIA GeForce cards and Windows Operating Systems Latest drivers for NVIDIA GeForce cards and Windows Operating Systems
more DRIVERS DRIVERS
LATEST TOOLS
AIDA64 Extreme Edition 7.20.6820 betaAIDA64 Extreme Edition 7.20.6820 beta
DivX Software 11.0.1DivX Software 11.0.1
Windows Firewall Control 6.10.0.0Windows Firewall Control 6.10.0.0
HFS - HTTP File Server 0.52.1HFS - HTTP File Server 0.52.1
Blender 4.1.1Blender 4.1.1
more TOOLS TOOLS
LATEST DRIVERS
AMD Radeon Software Adrenalin Edition 24.3.1AMD Radeon Software Adrenalin Edition 24.3.1
NVIDIA Linux X64 (AMD64/EM64T) Display Driver 550.67NVIDIA Linux X64 (AMD64/EM64T) Display Driver 550.67
AMD Chipset Drivers 6.02.07.2300AMD Chipset Drivers 6.02.07.2300
GeForce Hotfix Driver 551.68GeForce Hotfix Driver 551.68
Intel Arc & Iris Xe Graphics Driver 31.0.101.5333 (WHQL)Intel Arc & Iris Xe Graphics Driver 31.0.101.5333 (WHQL)
more DRIVERS DRIVERS
LATEST GAME TRAILERS
MechWarrior 5: Clans GDC Demo TrailerMechWarrior 5: Clans GDC Demo Trailer
Outpost: Infinity Siege - Official Trailer - Outpost: Infinity Siege - Official Trailer - "From destruction, we shall return"
Battlefield 2042 | Season 7: Turning Point Gameplay TrailerBattlefield 2042 | Season 7: Turning Point Gameplay Trailer
TEKKEN 8 - OFFICIAL LAUNCH TRAILERTEKKEN 8 - OFFICIAL LAUNCH TRAILER
S.T.A.L.K.E.R. 2: Heart of Chornobyl - Final Release Date AnnouncementS.T.A.L.K.E.R. 2: Heart of Chornobyl - Final Release Date Announcement
more GAME TRAILERS GAME TRAILERS
LATEST GAME SCREENSHOTS
Battlefield 2042 | Season 7: Turning Point Gameplay ScreenshotsBattlefield 2042 | Season 7: Turning Point Gameplay Screenshots
TEKKEN 8 Screenshots #2TEKKEN 8 Screenshots #2
TEKKEN 8 ScreenshotsTEKKEN 8 Screenshots
S.T.A.L.K.E.R. 2: Heart of Chornobyl Screenshots #2S.T.A.L.K.E.R. 2: Heart of Chornobyl Screenshots #2
Counter-Strike 2 ScreenshotsCounter-Strike 2 Screenshots
more GAME SCREENSHOTS GAME SCREENSHOTS
LATEST GAME SYSTEM REQUIREMENTS
Diablo IV System RequirementsDiablo IV System Requirements
Far Cry 6 System RequirementsFar Cry 6 System Requirements
Halo Infinite System RequirementsHalo Infinite System Requirements
Resident Evil Village System RequirementsResident Evil Village System Requirements
Mass Effect: Legendary EditionMass Effect: Legendary Edition
more GAME SYSTEM REQUIREMENTS GAME SYSTEM REQUIREMENTS
LATEST GAME PATCHES
The Last of Us Part I Patch v. 1.0.3.0The Last of Us Part I Patch v. 1.0.3.0
God of War Patch 1.0.2God of War Patch 1.0.2
Quake II RTX 1.4.0 PatchQuake II RTX 1.4.0 Patch
Cyberpunk 2077 - Hotfix 1.04Cyberpunk 2077 - Hotfix 1.04
Shadow of the Tomb Raider Patch 18 - FidelityFX ReadyShadow of the Tomb Raider Patch 18 - FidelityFX Ready
more GAME PATCHES GAME PATCHES
LATEST GAME DEMOS
Layers of Fear PC DemoLayers of Fear PC Demo
System Shock PC DemoSystem Shock PC Demo
Play - System Shock Demo - 01/14/20Play - System Shock Demo - 01/14/20
Troll from Goodbye Kansas and Deep Forest Films | GDC 2019 | Unreal EngineTroll from Goodbye Kansas and Deep Forest Films | GDC 2019 | Unreal Engine
AMD Radeon FreeSync 2 HDR Oasis DemoAMD Radeon FreeSync 2 HDR Oasis Demo
more GAME DEMOS GAME DEMOS
3dfxzone.it

ADV
3DFXZONE.IT
About us - English version About us [EN]
About us - Versione in italiano About us [IT]
La nostra storia Our History [EN]
La nostra storia Our History [IT]
SEARCH
Search with tags Search with tags
Search network Search network
Search 3dfxzone Search 3dfxzone
COMMUNITY
WorldWide Web Community WW Community
Italian Community IT Community
OTHER SERVICES
Translate 3dfxzone.it in english Translator
Feed RSS Feed RSS
Share This Share This
Social This Social This
Email This Email This
Print This Print This
Sitemap Sitemap
CONTACT US
User Support User Support
Advertising Advertising
Partnership Partnership
Banners Exchange Banners Xchg
Webmaster Webmaster
Contact Us | Main menu Main menu
OUR NETWORK
3dfxzone.it 3dfxzone.it
amdzone.it amdzone.it
atizone.it atizone.it
hwsetup.it hwsetup.it
forumzone.it forumzone.it
nvidiazone.it nvidiazone.it
unixzone.it unixzone.it
HOSTED SITES
Rosario Art Gallery Rosario Gallery
KoolSmoky Home Page KoolSmoky HSE
 
 
 
Sitemap    |    Translator    |    Old News Archive    |    Links    |    Contact Us    |    Legal Notes    |    Privacy    |    Cookie Policy
 
On line since Q1 2001    |    Web Application and Contents © 3dfxzone.it    |    All Rights Reserved