FaceTime Enterprise Edition
November 01, 2006
FaceTime Communications Inc.Product:
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Very comprehensive, with good policies and a clearly laid-out console
- Weaknesses: Poor documentation included with test appliance
- Verdict: An extremely configurable instant messaging security appliance
Another rebadged Dell PowerEdge 850 rack-mountable 1U server, FaceTime RTG500 is aimed at the medium to large enterprise market.
To access the initial set-up screen we had to connect a monitor and keyboard, and we noticed that it's running a Fedora Core Linux. We were unsure whether or not this had been security-hardened. Unlike some of the software suites, the FaceTime server is aimed purely at instant messaging.
We were a little disappointed to find that the printed documentation extended to just one sheet of paper - a quick-start guide. A more comprehensive manual would have been helpful.
Access to the management interface is via a browser, which we had some problems accessing. Much of this initial set-up was troublesome due to the lack of documentation and, in the end, we only got into the management interface through trial and error. Once we did manage to access the web-based administration console, the first task was to change the administration password.
The console is clearly laid out and quite Web 2.0 in appearance. It has a dashboard look and feel about it and provides a real-time view of traffic such as spyware, instant messaging, peer-to-peer, HTTP and UDP. All other TCP traffic is grouped under one heading. Helpfully, it also tells you how many IM messages have travelled through the machine.
On first use of the appliance the default global policy for instant messaging is not to allow file-transfers, peer-to-peer, client connections or IM networks. We also found that the machine defaults to discovery mode. Once configured, this can be set to enforcement mode.
The main configuration window provided a clear and concise view of the device. We could establish custom policies via individual IP addresses or a range of addresses. Spyware policies can also be established here, being as they are the most critical threats over instant messaging.
The device allows the administrator to control access to whichever IM networks they choose, including AOL, Yahoo, Microsoft and Google. It can also be used to allow peer-to-peer applications, such as BitTorrent.
In the RTG 500, FaceTime has produced a good all rounder that adequately covers the networks most likely to be used in today's corporate environments. However, it was let down slightly by minimal documentation and some aspects of utility.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry