Instant Messaging: Security,
Control And Compliance
by Melanie Turek
Published June 2006; Posted December 2006
Abstract:
IM vendors are refining their
solutions for protecting networks and meeting regulatory requirements.
There’s no doubt about it: Instant messaging (IM) is a fact of life in the
enterprise. More than three-quarters of IT executives report that employees in
their companies use IM on the job, and countless vendors - from small start-ups to
large enterprise stalwarts - are making it easier for companies to deploy a single
IM client or service across the organization.
Instant messaging has the potential to change the way people work, especially in
this increasingly virtual workplace. With more than 90 percent of employees
working away from headquarters, and up to two-thirds working in a location
separate from their managers’, employees need a way to get in touch quickly and
easily - right when they need to. The presence capability that powers instant
messaging assures users that they can contact their co-workers or partners
whenever those people are available, speeding information delivery and
ultimately boosting productivity (no more phone tag, no more endless email
threads).
What’s more, vendors are branching out with their IM clients, enabling industry-
and job-specific capabilities (such as trade orders or contact center support),
as well as productivity enhancements (for instance, Microsoft embedding its
Communicator IM client into the rest of its Office applications, for one-click
messaging capabilities within a Word or Excel document).
But IM is also a potentially risky technology, opening up enterprises to threats
from viruses, spam and other malware, much the way email does today. It also
requires that rules and policies be set and maintained to ensure compliance with
regulations.
|
|||||
Return to Business Communications Review Gold Sponsor Archives |
About the author:
Melanie Turek, Nemertes senior vice president and founding partner, covers collaboration and virtual workplace tools for Nemertes.
This article is reproduced by special arrangement with our partner, Business Communications Review. |
Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information. Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site. Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/.