Wednesday, May 23, 2007

Microsoft's Forefront Ad Campaign

The introduction of Microsoft's Forefront security solutions is already backed up by a huge ad campaign that can be seen on the majority of tech-news portals. The campaign is however lacking a consistent vision to communicate the benefits and main differentiation points -- if any -- of the product, and is barely informing that it exists in a not so creative way :

There's nothing in Forefront that really makes it notably better or worse than any other solutions that are already in the marketplace. However, the Microsoft name may be sufficient for it to steal market share, and a better integration with other Microsoft solutions…is likely to be a bit of a differentiator,” said Quin. Faced with increasing competition from Microsoft, Symantec Corp. questioned Microsoft's ability to effectively protect enterprise customers.

Trying to be witty too much while fighting ninjas and aliens often results in your ad campaign "clowning" in the eyes of a prospective customer. Security is indeed a cosmic phenomenon for Microsoft, an unexplained pseudo-randomly generated event that's continuing to be researched and analyzed for generations to come. Can they achieve desirable results? Will penetration pricing help? And will the ad agency that got commisioned with the ad campaign come up with a bit of a more creative psychological imagination the next time?

A pure example of an acquisition-to-solution strategy compared to AOLs licensing of a reputable AV vendor's technology, in order for them to enter the market segment as well.

Jihadists' Anonymous Internet Surfing Preferences

Jihadists are logically not just interested in encryption and steganography but also, in ways to anonymize their web surfing activities as much as possible. A wannabe jihadist whose tips and recommendations have gained him a lot of reputation around the forums I follow, recently came up with an in-depth article on recommended and reviewed IP cloaking services with direct download links in between. It makes stats like these questionable to a certain extend as I've already pointed out. Among the IP cloaking tools reviewed are :
- Steganos Internet Anonym Pro
- Hide IP Platinum 3.1
- Proxy Switcher Pro
- Invisible Browsing v5.0.52

TOR is, of course, mentioned as well but at the bottom of the article citing performance issues compared to commercial solutions. IP decloaking is not even considered as a concept.

Counter Espionage Tips from the Cold War

There's nothing old-fashioned in short films like these representing possible techniques used by intelligence services while recruiting - "Cold War counter-spy instructional film created to convince government officials traveling with top secret info to watch their backs. Watch hapless G-men get seduced and setup for blackmail by treacherous Soviet she-spies"



And despite that today's perception of sexy she-spies has evolved proportionally with the technological advances in espionage, some of the tips are still emphasizing on the basics.