News

Gartner: Consider Dumping IIS

In the wake of Code Red and Nimda, analyst firm Gartner urges enterprises running Microsoft Corp.'s IIS Web server to take a hard look at switching to the open-source Apache or Sun-Netscape's iPlanet.

"Gartner recommends that enterprises hit by both Code Red and Nimda immediately investigate alternatives to IIS, including moving Web applications to Web server software from other vendors, such as iPlanet and Apache," a recent Gartner bulletin from analyst John Pescatore says.

Pescatore acknowledges that those competitive Web servers have had their security breaches and patches, but he notes that IIS patches arrive "almost weekly."

The need to patch IIS servers regularly, and their high profile as a hacker target give IIS a higher total cost of ownership in Pescatore's opinion.

"Gartner remains concerned that viruses and worms will continue to attack IIS until Microsoft has released a completely rewritten, thoroughly and publicly tested, new release of IIS," Pescatore writes. Gartner predicts that such a rewrite won't occur before the end of next year.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Microsoft Bolsters Windows IoT with NXP and SQL Server Support

    Microsoft's Internet of Things (IoT) product line is continuing to grow, with a few new developments highlighted this week.

  • Tamper Protection Now Available to Microsoft Defender ATP Subscribers

    The Microsoft Defender Advanced Threat Protection (ATP) E5 subscription plan now has an optional "tamper protection" security feature, Microsoft announced on Monday.

  • Exploring OCR, a New Way To Get Data into Excel

    Microsoft recently added a new optical character recognition feature to Excel that lets users import data from a photograph taken from a smartphone. Here's how to use it.

  • Microsoft Authenticator App To Get Real-Time Phishing Protections

    Microsoft is working on adding capabilities to its Microsoft Authenticator app to help defeat security breaches enabled by advanced attack techniques, including phishing and man-in-the-middle methods.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.