Product Group Tests
Instant messaging security (2005)September 01, 2005
Our Best buy for this test is the FaceTime Enterprise Edition Product Suite. It offers a comprehensive solution to the problem of managing IM applications at this level, with excellent auditing and reporting facilities. We felt that two products should receive our Recommended awards. The Gordano Messaging Suite provides excellent security and integration using its own IM server, while the Blue Coat ProxySG 200 would be very suitable for the smaller enterprise that needs access to the public IM servers.
More organisations are considering adding IM to their internal communication options, but are put off by the problem of security. Ian Parsons looks at what's on the market to put administrators' minds at ease
When it comes down to selecting a communication system for your organization, instant messaging might not be high on your list.
And it might not be on the list at all if you need secure communications between users at different locations. After all, email can be made secure. It can be encrypted and if you have your own servers, complete copies of all messages can be kept for an essential audit trail – particularly important when dealing with external sources such as customers and suppliers.
But some characteristics of email can cause problems. Messages are only sent to listed individuals, either directly or as copies, and this restricts information to just those recipients. While this is generally desirable, it precludes any chance of establishing the kinds of open discussions that used to occur with the bulletin board systems in use before the internet became today's global network.
Under these earlier systems you could set up discussion groups focused on particular interests, and any member who happened to be online could join in. This was particularly useful in technical forums, where a problem could be discussed by experts in rapid time.
Although the internet provides similar facilities with news groups, these are often subject to misuse, and do not fit business needs, being particularly unsuitable for discussing confidential matters.
Of course, it is possible to set up internal news servers to provide these capabilities, but this is an unappealing option to most people. There have been other ingenious solutions to the problem of providing informal discussion facilities within an organization's network, including specialized web server applications, but these can often lack the simplicity and familiarity of an IM system.
However, an IM system could have many uses within an organization, allowing meetings to take place even when the participants are in different places, replacing conference calls, or as a way of providing technical assistance.
Such a system will need to be able to operate securely if it is to be used outside the safety of the local network, particularly if public servers are used. The standard anti-spam measures used for email systems generally do not work with IM systems, and antivirus software can be blissfully ignorant of the things that can lurk in an IM attachment.
Assuming that these concerns can be addressed, an IM system could be an invaluable addition to networked communications.
The ideal system would provide content filtering, antivirus, anti-spam and blocking options, and would allow access to both private IM systems and to the public services provided by the likes of Yahoo!, Microsoft and AOL.
Some organizations are happy to allow employees to have access to these, but they still need to be able to block offensive or illegal activities from their systems. Under these circumstances, they also need to be able to apply these security features to outgoing transmissions, if only to avoid finding themselves appearing on anti-spam blacklists or even being disconnected by their service provider.
A further headache for system admins can be users installing their own IM software to access public servers. There can be many reasons why users might do this, but these unauthorized clients represent a potential gap in network security.
There are tools available that help to detect and control such software, and a complete IM security solution will need them as well. The secure IM set up allows controlled and secure access to selected services using selected client software while preventing unauthorized access and detecting unauthorized software.
So how did we set about testing these products? Apart from simple function testing, we looked for a number of features that we felt was necessary for good instant messaging security management.
We looked for integration with existing email clients such as Outlook.
We looked for standalone IM clients. Management links to other systems, such as SMS, email and pagers, would be useful for administrators.
Security options would include user authentication and access control, with options to restrict usage to set times and functions.
Integration with antivirus scanners would help to counteract the possibility of infection through file attachments, while anti-spam options would also be desirable.
Content filtering of message text would be a priority in some cases, both for legal and commercial reasons, while the ability to archive and audit all instant messaging conversations would certainly be a requirement in many situations.
All products in this group test
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry