Skip to main content

About Instant Messaging Security

Controlling IM Security Risks

IM usage in business – whether sanctioned or not - is growing rapidly. IM and other real-time communications are network-enabled applications that often operate outside the control of the corporate IT department. While they offer business value, these not-so-secure channels are increasingly becoming the vectors of propagation for malicious applications and code leaving IT to address how to enable business productivity from IM while also controlling risk.

IM security risk falls into three main categories:

* Inbound threats
IM creates new vectors for the distribution of malware (viruses, worms, spyware, rootkits, and more) and SpIM (Spam over IM) which can cause a major drain on productivity and resources. Read about security incidents involving the use of chat, IM and P2P networks and learn more about malware and spyware prevention.
* Outbound threats
IM opens new 'holes' through which information can leak or be leaked, leading to user privacy concerns and the potential loss of intellectual property
* Non-compliance with corporate and regulatory requirements
IM creates invisible communications channels that operate below the radar of conventional information security measures, exposing the organization to regulatory compliance breaches. Read more about IM compliance and e-Discovery.

Technical Challenges of IM Security

Real-time communication and Web 2.0 applications are largely invisible to existing information security infrastructure such as firewalls, intrusion prevention and detection devices, and proxies because they are specifically designed to evade detection and provide ubiquitous access. Existing security measures do not adequately address the protocols and behaviors used by these applications.
Blocking IM is no longer an option:

* IM clients use port crawling - the ability to exploit any open port on the firewall - so blocking the 'usual' port for the particular application doesn't work.
* Every IM network provider has its own unique set of IP addresses to which clients can connect. These IP addresses change frequently or at random without notice, so firewalls and proxies cannot apply blocking policies using the typical black list of IP addresses.
* IM protocols are proprietary and constantly evolving to deliver new and more advanced features to users; firewalls and proxies do not evolve at this pace, nor do IT organizations want to be constantly updating protocol signatures on the firewall.
* The synchronous nature of real-time connections is much different from the asynchronous web browsing and email traffic; firewalls and proxies were not designed to inspect and analyze real-time communication traffic, so network performance suffers.

Beyond the technical considerations, blocking IM will also result in unhappy employees who will attempt to bypass controls, which may cause more problems than it solves.
The Leader in IM Security

Ranked #1 in IM market share by IDC for five consecutive years, FaceTime is the acknowledged leader in IM security and compliance management with more than five million seats under management, and an industry-spanning customer list that includes ten of the top ten US banks. FaceTime provides the de facto IM, UC and Web application security solutions that prevent malware and secure IM use, providing full visibility and granular control for all major real-time and Unified Communications applications:

* Public IM Networks (AIM, Yahoo, MSN, GoogleTalk, Skype, and more than 200 other applications)
* Unified Communications platforms (Microsoft OCS, Microsoft LCS, IBM Lotus Sametime, Antepo, Jabber, Parlano MindAlign)
* Professional Community Networks (Bloomberg, Communicator Inc., Reuters, PivotSolutions, YellowJacket)
* Web Conferencing (WebEx, Live Meeting)

FaceTime offers comprehensive IM security:

* Protection against inbound threats from viruses, worms, spyware, SpIM, and more by monitoring and managing real-time communication, Unified Communications and Web application channels
* Prevention information leakage through content filtering, logging and archiving for all text conversations and file attachment content
* Ensuring compliance through TrueCompliance™ strict policy enforcement and user/group level access controls

By integrating seamlessly with existing IT and information security infrastructure such as Active Directory, storage systems and anti-virus, FaceTime also enables maximum return on your existing technology investments.

Learn more about Vantage, the de facto platform for granular security, policy controls and compliance features for real time and unified communications (UC) – providing management for the widest variety of UC and real time communications platforms; including Microsoft OCS and IBM Lotus Sametime, public instant messaging platforms such as Windows Live and Skype, web conferencing and industry focused networks like Reuters, Bloomberg and YellowJacket.

Learn more about Unified Security Gateway, the only Secure Web Gateway to combine content monitoring, management and security of Web 2.0 applications, such as social networks, instant messaging and Unified Communications, with URL filtering, anti-malware and Web anti-virus protection.

Comments

Popular posts from this blog

Want To Get Answering Machine For Your IM?

Computer's personal often face problems when they have to take a break from their PC for some time and can’t answer to emails and instant messages. Actually, for email you can set up an autoresponder if you use Outlook software, and there’s a way out for gmail, too. But what can you do with your instant messenger? I have a lot of IM accounts for any purposes with different people in each account. So what utility can tell these people that I am out on a vacation or down with fever? Answer.im comes to the rescue by setting up an automated web based answering machine for your instant messenger. It works with MSN, ICQ, AIM, Yahoo and Google Talk as of now. How it Works Setting it up is very simple. First, hop over to http://answer.im/. Then, select your IM network (like GTalk, Yahoo, etc). Fill in your username and password and hit Login. Features Now, you can customize your automated reply and select the status you would like your account to remain at. Since the service is web based, ...

Durov: The phone of the richest man in the world was hacked through WhatsApp.

The founder of "VKontakte" and Telegram Pavel Durov said that back in November 2019 he warned about the vulnerability of the WhatsApp application, through which hackers hacked the smartphone of the richest man on the planet Jeff Bezos. Durov wrote about it in his Telegram-channel. Earlier, the company Facebook, which owns WhatsApp, noted that the businessman's mobile phone was hacked because of vulnerabilities in the operating system from Apple. At the same time, Durov is convinced that the problem is not iOS. " WhatsApp in its marketing campaign uses the words 'end-to-end encryption' as a magic spell, which itself should ensure the security of all communications. But this technology alone cannot guarantee absolute confidentiality," says the founder of Telegram. One of the drawbacks of end-to-end encryption, he says, is that backups of transmitted data are often not encrypted. In addition, says Durov, each application has "ways around...

LAN Messenger Is LAN IM Communication Tool

LAN Messenger, a instant LAN messaging software for home or office users, can be very useful for your work, One LAN instant messenger enables you to communicate with other users connected across the same LAN, allows you to chat with one or more users, or to send an alert message that will show as a small pop-up window on the users desktop. some Land messenger includes many features like auto-reply text, file transfers, multi-user chat, online status, alert messages to all users and more. This article will help you find one land messenger for your business. These freeware or sharewares combine ease-of-use, power and flexibility. Bopup Messenger, it is from blabsoft, this instant messenger enables you to communicate with other users connected across the same LAN. It is compatible with standard messengers like WinPopup and Net Send. It has extended message support, scans users and computers on a local network, and supports 10 languages. It includes an ignore list, file transfer, message l...