'Scanner' eyes Y2K problems in e-mail attachments
(IDG) -- Trend Micro and Centennial this week announced a joint offering that will help organizations detect Y2K problems inside e-mail attachments before the attachments enter or leave corporate networks, the companies claim.
Called Y2K Scanner, this plug-in server module from Centennial works with Trend Micro's InterScan VirusWall to discover Y2K flaws in files created by spreadsheets, such as Lotus' 1-2-3 and Microsoft's Excel, as well as files from databases, such as Microsoft's Access and Inprise's dBase. Once the module identifies a problem, InterScan automatically notifies the network manager, the message sender and the recipient. Defects can be fixed using another Centennial product, Centennial 2000 Pro Enterprise edition.
One Y2K expert believes the Trend-Centennial offering will be a useful addition to the corporate Y2K toolbox because it addresses a risk that many have ignored.
"The products in this market have focused either on individual objects or very specific processes between industries," says Norbert Kriebel, an analyst with Giga Information Group in Cambridge, Mass. "There hasn't really been anything done to look at the unwashed masses of information that flow in and out of an enterprise" via e-mail attachments.
However, not every organization will require this level of protection, Kriebel says.
"If you're an enterprise that is doing just basic text e-mail back and forth, chances are you're not going to run into any problems here," he says. "But if you're an enterprise that depends heavily on e-mail for file transfers, then it's an issue" in need of a remedy such as Y2K Scanner.
The Y2K Scanner module is scheduled to ship early in the third quarter and will be available through Trend distributors for a per-seat price that starts at $3.50 per user for up to 50 users.
PC vendors launch Y2K aid
RELATED IDG.net STORIES:
Microsoft rolls out Y2K tools, workshops
Trend Micro, Inc.
|Back to the top||
© 2001 Cable News Network. All Rights Reserved.|
Terms under which this service is provided to you.
Read our privacy guidelines.