20091126161754276385 - Instant Messaging An Instant Threat...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Instant Messaging: An Instant Threat Abstract Instant messaging (IM) applications allow employees to easily communicate and share files with other IM users in a real-time session similar to a private chat room. Employees use public IM applications such as AOL, MSN, Yahoo!, and ICQ to communicate with both fellow employees and company outsiders. In addition to being a potential drain on productivity, public IM tools used in a corporate environment can be used to relay company- confidential information over the Internet, undetected by IT administrators. When used to send file attachments, the tools themselves are also inherently vulnerable to viruses, worms, and Trojan horses, making them a serious security threat to an organization. In an organization where IM is used for personal use only, the solution seems simple: disallow IM use completely. But in environments where IM communication is part of the corporate culture and presents significant business advantages, organizations need a more flexible solution. Websense Enterprise® allows organizations to set policies for IM use: which IM tools can be used, which specific users or groups of users should be given access to IM, and whether and when IM attachments should be allowed. Websense, Inc. World Headquarters 10240 Sorrento Valley Road San Diego, California 92121 USA Tel: 800.723.1166 or 858.320.8000 Fax: 858.458.2950 www.websense.com
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Contents Executive Summary . .......................................................................................................... 1 I ntrod u cti o n . ................................................................................................................... 2 Challenges With IM Use in Organizations . .......................................................................... 3 Security threats . .......................................................................................................... 3 IM vulnerable to hackers . ..................................................................................... 3 Viruses, Trojan horses, and worms . ..................................................................... 4 Loss of intellectual property, confidential data . ...................................................... 4 Legal liability concerns . ............................................................................................... 4 Employee productivity loss . ......................................................................................... 5 IT resource abuse . ...................................................................................................... 5 What organizations need . ................................................................................................... 5 How Websense Enterprise Addresses IM Vulnerabilities . ................................................... 6 Detect threats and analyze IM use at the organization level . ........................................ 6 Set granular policies across multiple points in the network . .......................................... 6
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 14

20091126161754276385 - Instant Messaging An Instant Threat...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online