{"id":5647,"date":"2014-05-21T17:05:48","date_gmt":"2014-05-22T00:05:48","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5647"},"modified":"2016-12-09T11:27:13","modified_gmt":"2016-12-09T19:27:13","slug":"time-clear-air-forbes-track-microsoft-licensing-claim","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/05\/time-clear-air-forbes-track-microsoft-licensing-claim\/","title":{"rendered":"Response To Recent Richard Stiennon (Forbes) Article On Microsoft Licensing Within Embedded Systems Like Sandboxes"},"content":{"rendered":"<p>Richard Stiennon recently wrote an informative article in Forbes titled \u201c<a href=\"http:\/\/www.forbes.com\/sites\/richardstiennon\/2014\/05\/20\/sandbox-vendors-ignore-microsoft-license-agreements\/\" rel=\"nofollow,noopener\" >Sandbox Vendors Ignore Microsoft License Agreements<\/a>.\u201d The focus of this article is on licensing challenges related to Microsoft\u2019s Customer License Agreement for embedded systems and sandboxing technologies like our <a href=\"https:\/\/www.paloaltonetworks.com\/products\/platforms\/wildfire\/wf-500\/overview.html\">WildFire WF-500<\/a>. Stiennon writes that \u201cthere is no provision for a vendor to ship appliances with multiple virtual instances of Windows\u201d or the Microsoft \u201cOffice productivity suite.\" This presented a real challenge for sandboxing technologies like the WildFire WF-500 that emulate environments such as Microsoft Windows in order to detect and prevent new advanced cyber threats.<\/p>\n<p><!--more--><\/p>\n<p>Our solution was simple. Palo Alto Networks licenses every instance of Microsoft software on each WildFire WF-500. There were no shortcuts taken. In fact, long before the initial release of the WF-500, we engaged directly with Microsoft to explore how to properly license their software on the WF-500. Unfortunately at the time no simple option existed for this type of technology. To ensure our customers had full access to the Microsoft Windows operating system and Office applications within the WildFire virtual environment, we made the decision to include a full OEM Windows license and consumer Office license with the purchase of every WF-500.<\/p>\n<p>Recently, Microsoft notified us of a new licensing model designed for embedded security devices that use virtual instances of Windows. From our perspective, this decision will not impact our existing customers. We are actively engaged with Microsoft to take advantage of this new licensing model that we\u2019ll transition to as soon as agreements are set.\u00a0 Until then, we will continue to license every instance of Microsoft software running on our WildFire appliances, included with every purchase of the WildFire WF-500.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Richard Stiennon recently wrote an informative article in Forbes titled \u201cSandbox Vendors Ignore Microsoft License Agreements.\u201d The focus of this article is on licensing challenges related to Microsoft\u2019s Customer License Agreement for &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,5],"tags":[472,46,69,471],"coauthors":[716],"class_list":["post-5647","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-firewall","tag-forbes","tag-microsoft","tag-wildfire","tag-wildfire-wf-500"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5647"}],"version-history":[{"count":10,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5647\/revisions"}],"predecessor-version":[{"id":5650,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5647\/revisions\/5650"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5647"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}