SHARE
Facebook X Pinterest WhatsApp

How to Deploy Vista Security—Piece by Piece

Written By
thumbnail
Lisa Vaas
Lisa Vaas
Jun 6, 2007

WASHINGTON—There’s a bushel of security enhancements in Windows Vista—they comprise the most important aspect of the new operating system and the most compelling reason to upgrade, analysts say—but they’re not all perfect, nor are they silver bullets.

Vista’s BitLocker encryption, for example, is restricted from working alongside virtualization software, doesn’t encrypt multiple disk volumes, and only ships to customers on Microsoft’s Software Assurance plan or with the Ultimate version of the operating system.

Each of Vista’s security functions has similar quibbles associated with it—be they lack of features or license quirks—that enterprises must ponder. Given that, how does an enterprise determine which Vista security features to deploy and how to best deploy them?

Gartner analyst Neil MacDonald gave Gartner’s take here on June 4 at the research company’s IT Security Summit. During his presentation, titled “Planning and Deploying the Security Features of Windows Vista,” MacDonald covered UAC (User Access Control), BitLocker, NAP (Network Access Protection), ASLR (Address Space Layout Randomization) and Windows Defender—the five heavyweights in Vista’s new security lineup—providing pros, cons and advice on implementing each of those security features as well as other features that don’t get as much attention.

But wait, you say. You’re not planning to deploy Vista any time soon, just like the majority of Windows users? After all, Microsoft has pledged security support for some variant of Windows XP until the end of 2013, making the sun’s setting on XP far from imminent. Fair enough, but bear in mind it’s not too early to start thinking of your enterprise’s Vista future, given that application vendors aren’t guaranteed to support XP for as long as Microsoft plans to.

PointerSecurity, above all else, is driving Vista adoption. Click here to read more.

“The bigger risk is not [the end of support and security fixes] from Microsoft but from application vendors,” MacDonald said.

With that in mind, eWEEK has put together five articles, each covering one of the top five Vista security features and Gartner’s take on its pros, cons and how to implement it, based on the company’s presentation at its IT Security Summit.

Read the full story on eWEEK.com: First off: BitLocker.

Recommended for you...

What do Amazon, Microsoft, Meta, and IBM Have in Common? Tape Storage
Drew Robb
Aug 15, 2022
What Does Quantum Computing Mean for IT?
Devin Partida
Aug 11, 2022
Solving the Video Surveillance Retention Challenge 
Drew Robb
Jul 28, 2022
Top 6 IT Challenges in Healthcare
Lauren Hansen
Jun 21, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.