Akonix L7 Enterprise brings IM under control

What you will learn from this tip: How Akonix L7 Enterprise 4.0 secures instant messaging applications.

Whether your organization is deploying IM for business use or, like most companies,

    Requires Free Membership to View

trying to bring it under control, Akonix L7 Enterprise reins in this runaway app with real-time monitoring, spim and malware mitigation, flexible central management and access control.

IM security is a growing concern, surfacing just as many organizations feel they're finally gaining the upper hand against e-mail-borne malware, spam and intellectual property theft. In March, IM users were hit with three new worms -- FATSO.A, Kelvir-C and Bropia -- and regulatory controls like HIPAA and Visa CISP require organizations to know exactly what type of information is being passed on their network.

L7 Enterprise gives organizations tight control over IM use through a wealth of configuration, containment and compliance options that can, for example, block file transfers, games and video conferencing. The Enterprise Manager console is easy to use and will let you get as specific or as general as you wish.

Want to block all IM file transfers to the Internet? L7 will let you create a policy. Want to be alerted if a certain user establishes an IM session with a specific internal user? No problem; security managers can monitor and log conversations for regulatory and internal policy compliance.

Malware is controlled through dynamically updated signatures to detect worm patterns, and by scanning all file transfers with Symantec or McAfee AV.

Spim is controlled through a combination of policies and blacklists, and real-time content filtering enforces acceptable-use policies.

The mechanisms for internal audit and compliance reporting are flexible and robust. The Enterprise Manager logs and archives activity, and allows for periodic reports to be e-mailed to admin-defined accounts; reports on workflow, policy violations and user activity are among the options.

A management solution is worth nothing if users can simply install an IM client on their workstation and go about their messaging business without adhering to corporate policy. L7 Enterprise brings IM users under control by interfacing with directories for authentication. Import entire Windows Active Directory or NT 4.0 domains, interface with Novell's eDirectory, or insert a line into the global login script. If there's no enterprise directory, L7 allows security managers to create local users and groups. Policies can then be assigned by user, group and domain.

L7 gives security mangers a live look at the enterprise IM environment and enough flexibility to manage that environment to meet security and acceptable-use policies. From malware control to group policy enforcement, L7 is a full-featured, enterprise-ready solution to both the current threats and those that loom on the peer-to-peer messaging horizon.

This was first published in May 2005

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.