View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
January 16, 2006

Symantec raises the profile of IM

Symantec's recently announced its intention to acquire IMlogic, a leading player in the real-time, secure instant messaging (IM) threat protection and management arena. This provides the first real indication that mainstream security vendors are starting to take the IM threat model seriously.

By CBR Staff Writer

IM communications have the potential to deliver viruses, worms, Trojans, and spyware, malicious and unwanted content, and cause identity intrusion issues. In fact, pretty much any of the unwelcome security threats that are presented by the enterprise use of email communications also reappear in real-time through the establishment and usage of IM delivery protocols.

Furthermore, IM services also share many of the same regulatory compliance issues. These include the need to monitor for legal and regulatory requirements and common archiving and privacy issues.

To date, some mainstream security organizations have claimed to have the ability to deal with real-time IM communications, but few have strategies that have evolved beyond a stop-and-block capability.

IM and peer-to-peer (P2P) usage started out in the home and home/office environment but, for at least a year now, it has been clear that this real-time voice and data communications approach is having a significant impact within the business environment. Its usage is growing rapidly, and has outstripped the protection industry’s ability to deal with it. To date, IM protection and management has been left to specialists such as IMlogic, Akonix, and FaceTime to deal with.

Many current IM problems exist because of the informal way in which IM usage first arrived in the business arena; with staff making use of IM technology before seeking formal management approval. Furthermore, it remains the case that many organizations still unofficially allow IM communications to take place without giving enough thought to putting protection and management systems in place to deal with the potential security fallout.

IM Manager from IMlogic provides IM policy enforcement, centralized security controls, and enhanced real-time communications for extending IM usage across organizations regardless of their IM client of choice. Its role involves managing, securing, and archiving IM traffic with certified support for public and enterprise IM networks, including AOL, MSN, Yahoo!, ICQ, IBM Lotus Instant Messaging, Microsoft Office Live Communications Server, Jabber, and others.

The point is that, as far as IM and P2P usage in the business environment is concerned, stop-and-block is no longer an option. Business organizations need to realize that mainstream IM usage has already arrived; it has a role in business communities as far ranging as equity traders and shipping companies, and almost every other area of business.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

Going forward, the requirement will be to provide secure management solutions that deal with IM on a business level. They need to start with an understanding of existing usage, address the issues of future access and usage policy, deal with the blocking of unauthorized usage, and then manage IM services in a way that meets corporate information protection policies and deals with regulatory compliance issues. Symantec has taken the first step down this road by recognizing that the acquisition of IMlogic fills a hole in its existing systems protection portfolio and, as a result, now has a clear opportunity to drive the real-time IM protection and communications market forward.

Source: OpinionWire for Butler Group (www.butlergroup.com)

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU