Four simple steps from a Forrester analyst can help your company choose the best instant messaging security product for its needs--from plugging data leaks for compliance and preventing IP theft to virus scanning and preventing SpIM. Instant messaging (IM) has become an increasingly useful business tool for modern corporations. Data from a Forrester Research survey suggests that 71 percent of businesses will invest in real-time messaging this year. For many organizations, however, IM security is still a nascent topic. Given the phenomenal increase in IM adoption and the business difficulty of limiting the usage strictly to internal use, organizations are beginning to explore security capabilities that support instant messaging and other real-time communication applications. To choose an appropriate IM security product, organizations should follow these four steps: SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe 1. Determine the types of IM-related risks and threats that are relevant to your organization. For example, if IM is used strictly inside the corporation, the threat of SpIM (instant messaging spam) may not be relevant, but archiving or data leaks may be. This step helps you narrow down the set of security requirements. In a typical enterprise deployment, you should consider products that support real-time virus scanning, deep content inspection and SpIM prevention. 2. Determine whether traffic logging and content archiving are important to you. Compliance and legal needs drive logging and archiving. Look to products that offer either native support for archiving or integration with third-party storage products. FaceTime Communications provides integration with EMC’s Centera for IM archiving, while IMlogic, a Symantec company, offers its own archiving product. A bonus capability here is archive search and management. 3. Determine what IM usage policy is relevant to your organization. It’s quite common to have a policy that states that IM communications are blocked for certain groups but permitted for others. Some policies may dictate whether to allow public IMs and file transfers and whether to allow external parties to use your corporate IM. These policies will determine whether you need inline filtering or passive monitoring. 4. Determine any fine-grained controls for IM filtering. Examples of such controls include filtering based on user identity, IP address, file attachment type and embedded URLs. One customer of FaceTime is an organization with 180,000 users, of whom 12,000 are deemed “regulated employees.” It’s extremely important for this company to monitor and archive the communications of those regulated personnel and at the same time use a lighter approach for others. The cost of doing otherwise would be prohibitively expensive. For fine-grained filtering, consider products that offer expressive policy definition and configuration and integration with user directories. Instant messaging is a major enabler of real-time business communication that connects workers across multiple locations. As IM becomes increasingly critical to business operations and progressively converges with other communication platforms, you should include it as an integral part of your content security framework. Chenxi Wang is a principal analyst at Forrester Research, where she services security & risk management professionals. Download a complimentary copy of Forrester’s recent report on IM security. Related content news Oracle bolsters distributed cloud, AI strategy with new Mexico cloud region The second cloud region in Monterrey, providing over 100 OCI services, is part of Oracle's plan to compete with AWS, Google and Microsoft, and cash in on enterprise interest in generative AI. By Anirban Ghoshal Sep 26, 2023 3 mins Generative AI Generative AI Generative AI brandpost Zero Trust: Understanding the US government’s requirements for enhanced cybersecurity By Jaye Tillson, Field CTO at HPE Aruba Networking Sep 26, 2023 4 mins Zero Trust feature SAP prepares to add Joule generative AI copilot across its apps Like Salesforce and ServiceNow, SAP is promising to embed an AI copilot throughout its applications, but planning a more gradual roll-out than some competitors. By Peter Sayer Sep 26, 2023 5 mins CIO SAP Generative AI brandpost Mitigating mayhem in a complex hybrid IT world How to build a resilient enterprise in the face of unexpected (and expected) IT mayhem moments. By Greg Lotko, Senior Vice President and General Manager, Mainframe Software Division Sep 26, 2023 7 mins Hybrid Cloud Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe