[Info-vax] VMS Software Partners with Stark Gaming to Create Revolutionary Online Gaming and eSport Server Infrastructure

clairgrant71 at gmail.com clairgrant71 at gmail.com
Fri Aug 7 07:01:18 EDT 2015


On Thursday, August 6, 2015 at 1:59:18 PM UTC-4, RobertsonEricW wrote:
> 
> As was briefly alluded to upthread, OpenVMS on X64 is going to significantly increase the use of the existing body of Run-Time Library analysis (for statically revealing possible points of attack) and malware generation toolkits that are already in use for other platforms running on Intel X64. Currently (and historically) most such tools do not target OpenVMS Platforms. So, comparatively speaking, OpenVMS has not had the same level of scrutiny and exposure that such tools have allowed for other OS's. What strategic approach is VSI planning to take in order to mitigate the risk posed by the extra level of scrutiny and exposure of running OpenVMS on the ubiquitous x64 platform which the equally ubiquitous availability of these toolkits enables?
> 
> Thanks in advance for any information you can provide along these lines.
> 
> Eric

You are right on target with this. Months ago I started a list in the upper right corner of the white board in my office of areas where VMS needs to improve, modernize, etc. The item at the top is 'security' and that is particularly directed at external access, the boot path, installing patches, data-at-rest encryption, use of TPMs, scrutiny of open source use, in addition to the traditional security features of the running operating system. Plus, vendors are getting more serious about the firmware and its role in a secure environment; we will be looking at how the OS interfaces with the services provided.

Details? Too early, but now that we have our feet on the ground and can start moving forward nothing will be more important because of the reasons everyone has pointed out.



More information about the Info-vax mailing list