Since the announcement of the Heartbleed bug, a number of the top security firms – including Symantec, Intel Security’s McAfee division, and Kaspersky Lab – have not only been busy investigating it’s impact on their customers but have also had the frustration of “debugging” their own products, according to an article published by Network World. Each company needed to search – and continue to search – it’s list of products to make the needed changes insuring that they can all be looked at as safe moving into the future, as the report outlines.
The article indicates that Symantec has been dealing with a long list of “vulnerable” products – including NetBackup Appliance, Symantec Risk Automation Suite, Norton Security and Norton Identity Safe – which required patching. The firm indicated, as the report states, that they haven’t yet “determined for certain the status of Norton Mobile Security and Symantec Endpoint Protection Small Business Edition 2013, Symantec Security Information Manager, and Application High Availability.” They have confirmed, as read in the report, that the determination of “Heartbleed vulnerability” is still “under investigation.” McAfee has also launched “considerable effort” to evaluate which of their products and services were “Heartbleed vulnerable” as well, according to the report.
McAfee has confirmed, according to the Network World report, that their vulnerable product line includes “ePolicy Orchestrator, Next Generation Firewall (Stonesoft), McAfee Firewall Enterprise, McAfee Security Information and Event Management (Nitro), McAfee email Gateway, McAfee Web Gateway, McAfee Security for Microsoft Exchange, McAfee Security for Microsoft Sharepoint, McAfee Security for Lotus Domino on Windows” – a long and frustrating list to cover. A McAfee corporate statement was quoted in the article saying, “The safety of our customers is always our first priority. McAfee is following a set methodology that evaluates vulnerabilities and potential vulnerabilities, and then helps impacted customers fix those vulnerabilities before making the details public. Going public with details without protecting our customers would make them vulnerable to attacks.”
Learn more about what additional security companies – such as Kaspersky – are dealing with as the Heartbleed bug crisis unfolds quickly. Go to the full article at Network World to read more as safety concerns continue to rise for businesses and consumers.