Foot-dragging customers “hitting the wall” three months after Microsoft's TMG end-of-life

Although Microsoft ended development of its widely used Forefront Threat Management Gateway (TMG) 2010 tools in April, many organisations are still grappling with the migration of a core security service that had become so irretrievably interwoven with network security that it has proved extremely difficult to remove.

Despite having more than two years' warning, the end of support for TMG – which, like Microsoft Windows Server 2003, reached end of life this year – created mass “confusion” amongst customers and partners of application-security firm KEMP Technologies, company director Benjamin Hodge told CSO Australia.

“It was a very well understood and implemented solution, and now that it's gone a lot of people don't really know how to design their application solutions,” Hodge explained.

“They have a lot of security policy built around these types of appliances, all of which depends on these capabilities. So, changing that one piece of infrastructure has a huge impact on other parts of the infrastructure. That's why it has been such a slow migration process.”

The degree of reliance on TMG had become a significant issue for organisations seeking to not only update their threat-management environment, but to expand its scope to handle ever-changing IT infrastructure requirements – driven by the extension of corporate networks outside of conventional boundaries thanks to cloud and mobile investments – that are directly challenging established policies and procedures.

Although Microsoft provided an upgrade path and plenty of advance notice about the discontinuation of the platform, Hodge said “quite a few distractions” throughout 2014 – including SSL-related issues due to vulnerabilities such as the Heartbleed bug – had delayed the necessary changes being made.

Although attention had returned to the migration in the leadup to the transition, the magnitude of the task had become clear as IT teams worked to unravel the interdependencies that had evolved during years of TMG usage.

“A lot of people didn't realise what parts of TMG they were using,” Hodge explained, “so when they would say that they wanted to replace TMG it didn't really have any meaning until you found out exactly what they were using for.”

“Many were using it in ways that it wasn't intended to be used,” he added, noting that “it had been coded for internal use, for example, and now they were trying to publish it externally. That's where a lot of people were struggling, and it seems to have hit a crisis point where it is now a major focus for a lot of organisations.”

Many organisations moving away from TMG were finding viable alternatives in cloud-based solutions, which are increasingly being supported with a new breed of applications providing capabilities like single sign-on and reverse-proxy capabilities in different ways.

Organisations needed to be realistic about how long they could continue holding onto their old environments, Hodge advised – particularly as organisations pushed towards cloud applications through executive mandate but found that their underlying security infrastructure could no longer keep up.

“These kinds of business decisions are happening, but they're trying to be done in isolation without upgrading the underlying client system or infrastructure delivering it,” he explained. “That's really becoming a limiting factor in their ability to make decisions because they're creating a lot of maintenance overhead.”

“Mobile devices and client devices are changing rapidly – and if you've got this legacy infrastructure inbetween trying to connect the two, fairly soon you're going to hit the wall. From a stability or functionality perspective, it just won't work. It's really hit that crucial point where people just can't ignore it anymore.”

This article is brought to you by Enex TestLab, content directors for CSO Australia.

Feeling social? Follow us on Twitter and LinkedIn Now!

Join the CSO newsletter!

Error: Please check your email address.

Tags Foot-draggingThreat Management Gateway (TMG)MicrosoftHeartbleed bugKemp TechnologiesMicrosoft's TMGBenjamin HodgeCSO Australiasecurity servicemobile devicesMicrosoft Windows Server 2003

More about CSOEnex TestLabGatewayKEMP TechnologiesMicrosoftTMGTwitter

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by David Braue

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place