NETWORK WORLD NEWSLETTER: MICHAEL OSTERMAN ON MESSAGING
06/09/05
Today's focus: Allowing your users to use IM while you protect
the corporate net, Part 2
Dear networking.world@gmail.com,
In this issue:
* Best practices for instant messaging
* Links related to Messaging
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Avaya
Evaluating VoIP in the Enterprise
Got VoIP? More and more companies are answering yes...the
reasons vary from cost savings, network flexibility, and ease of
administration. Yet others are drawn to the promise of advanced
VoIP applications such as unified messaging and collaboration.
Register now and get a free copy of Network World's Got VoIP?
Executive Guide, which outlines the keys to successful VoIP
deployments.
http://www.fattail.com/redir/redirect.asp?CID=106316
_______________________________________________________________
Exclusive new event eliminates analysis-paralysis in the world
of anytime-anywhere broadband
Working in any of these key wireless spaces?--LAN * WAN * Mobile
Services * Subscriber Units * Remote Applications. ÊWireless &
Mobility: Commanding Broadband Everywhere is the breakthrough
event and expo youÕve been waiting for. ÊTools, tech, and
solutions. ÊClick for cities and dates, reg details and
qualifications that get you in free
http://www.fattail.com/redir/redirect.asp?CID=105721
_______________________________________________________________
Today's focus: Allowing your users to use IM while you protect
the corporate net, Part 2
By Michael Osterman
As mentioned last time, IM is an extremely useful communications
tool that many users have come to rely on for daily work.
Instead of just cutting off IM use to protect the network from
threats, there are several things that an organization can do,
from deploying relatively inexpensive solutions to more
expensive ones:
* There are tools on the market, such as IMlogic's IM Manager or
Akonix' L7 Enterprise, that can detect IM use by user and
prevent certain network-unfriendly IM functions from occurring,
such as file transfers. Eliminating this function can preserve
the utility of IM for most users while at the same time
eliminate one key avenue for malware to enter a network.
* There are tools, such as IMbrella Software's IMbrella Blocker
Plus, that can allow only the use of certain consumer IM clients
and permit such clients to operate on a network only during work
hours, for example. While this does not entirely eliminate the
threats that can enter a network, it gives IT more control over
which clients are used and when they are used on the corporate
network.
* A system, such as FaceTime's IMAuditor, can be deployed that
will provide enterprise-grade functions on top of a consumer IM
infrastructure, such as content scanning and mapping screen
names to corporate identities. These systems will also provide
auditing and logging capabilities and typically allow IM
conversations to be archived along with e-mail for compliance or
knowledge management purposes.
* The most expensive alternative, but one that many
organizations are pursuing, is simply to rip out consumer IM and
replace it with an enterprise-grade system, such as Lotus
Instant Messaging, Microsoft Live Communication Server or Novell
GroupWise Messenger, among many others. For example, in our
July 2001 tracking survey, only one-third of enterprises had
deployed an enterprise IM system but this figure jumped to 64%
in our most recent survey in March of this year. While this
alternative is the most expensive, it also gives an organization
more control over its IM infrastructure, since there are fewer
vendors involved and because these systems typically integrate
with other systems on vendors' roadmaps, although most of these
advantages also are provided by vendors of systems that provide
enterprise level functions for consumer IM systems.
In short, best practices for IM use in the workplace focus on a)
understanding how much consumer IM there is, b) evaluating IM's
business impact for your organization and c) deploying
technology that will limit the impact of threats to your
network.
RELATED EDITORIAL LINKS
IMlogic IM Manager
http://www.imlogic.com/products/im_manager.asp
Akonix L7 Enterprise
http://www.akonix.com/products/l7enterprise.asp
IMbrella Software IM Blocker
http://www.imbrellasoftware.com/product_blocker.asp
FaceTime IM Auditor
http://www.facetime.com/productservices/imauditor.aspx
_______________________________________________________________
To contact: Michael Osterman
Michael D. Osterman is the principal of Osterman Research
<http://www.ostermanresearch.com/>, a market research firm that
helps organizations understand the markets for messaging,
directory and related products and services. He can be reached
by clicking here <mailto:michael@ostermanresearch.com>
_______________________________________________________________
This newsletter is sponsored by Avaya
Evaluating VoIP in the Enterprise
Got VoIP? More and more companies are answering yes...the
reasons vary from cost savings, network flexibility, and ease of
administration. Yet others are drawn to the promise of advanced
VoIP applications such as unified messaging and collaboration.
Register now and get a free copy of Network World's Got VoIP?
Executive Guide, which outlines the keys to successful VoIP
deployments.
http://www.fattail.com/redir/redirect.asp?CID=106315
_______________________________________________________________
ARCHIVE LINKS
Archive of the Messaging newsletter:
http://www.networkworld.com/newsletters/gwm/index.html
_______________________________________________________________
How well do you know your customers?
Accurate customer data directly impacts loyalty and business
planning, yet few companies update data regularly. Experts
address the challenges of ensuring a consistent, coherent
customer view across the enterprise.
http://www.fattail.com/redir/redirect.asp?CID=105722
_______________________________________________________________
FEATURED READER RESOURCE
VoIP SECURITY
For the latest in VoIP security, check out NW's Research Center
on this very topic. Here you will find a collection of the
latest news, reviews, product testing results and more all
related to keeping VoIP networks secure. Click here for more:
<http://www.networkworld.com/topics/voip-security.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2
International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>
To unsubscribe from promotional e-mail go to:
<http://www.nwwsubscribe.com/Preferences.aspx>
To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>
Subscription questions? Contact Customer Service by replying to
this message.
This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________
Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>
Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772
For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>
Copyright Network World, Inc., 2005
No comments:
Post a Comment