Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Partner Summit 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom IBM Newsroom Ingram Micro ONE 2019 News Juniper NXTWORK 2019 News Lenovo Newsroom Lexmark Newsroom NetApp Insight 2019 News Cisco Live Newsroom HPE Zone Intel Tech Provider Zone

Here's How 17 Security Vendors Are Handling The Meltdown And Spectre Vulnerabilities

The Microsoft patch for the Meltdown and Spectre microprocessor exploits wasn't compatible with several anti-virus products. This is how endpoint security vendors are confronting the issue and helping their customers get patched.

1   2   3   ... 18 Next


The Pathway To Getting Patched

The Meltdown and Spectre exploits uncovered late Wednesday are some of the broadest security vulnerabilities the channel community has ever faced, affecting a broad swath of mobile devices, desktops, laptops and servers running in cloud environments.

But many anti-virus providers are having to grapple with an additional complication centered around this week's Windows security update that patches the vulnerability. Specifically, Microsoft said some anti-virus applications make unsupported calls into Windows kernel memory, which may cause Blue Screen of Death errors and make a device unable to boot.

As a result, Microsoft said it is only offering the Windows security update addressing the Meltdown and Spectre bugs to devices running anti-virus products from vendors that have confirmed the compatibility of their software.

Here's a look at how 17 of the IT industry's leading endpoint security vendors are going about obtaining compatibility with the Microsoft patch, as well as what additional actions they're taking to keep customers safe in the wake of this unprecedented microprocessor vulnerability.

1   2   3   ... 18 Next

sponsored resources