Secure Instant Messengers
#1

Abstract

Securing instant messaging in your corporationInstant messaging may soon become an indispensable business tool; however, the risks of using an unsecured IM platform in corporations are high. This section explores the security issues introduced with the use of corporate instant messaging and offers best practices that can help in deploying a secure IM platform.

Understanding Instant Messaging And Corporate Firewalls
Many corporate customers may wish to use their network firewall to block users from communicating over insecure instant messaging systems. Unfortunately, out-of-the-box firewall configurations are often not sufficient enough to block access to the latest generation of popular IM systems. These IM systems were designed with firewalls in mind and employ a number of techniques to sneak past corporate firewalls to reach their servers.

All IM clients are preconfigured with one or more TCP/IP network addresses that allow them to connect to their IM server(s). Once connected, the clients can exchange messages with other IM clients. Because many companies configure perimeter firewalls to block all Internet services except for a small critical set (e.g., SMTP email, HTTP Web surfing, and DNS), IM providers have designed their clients to tunnel over these commonly allowed Internet services, if required, and slip past the corporate firewall.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: instant messaging introduction for technical seminar, instant dog training video, download hotmail instant messenger, netflix instant, instant messaging technical seminar documentation, instant messaging documentation for seminar, ppt for wireless instant messaging,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SECURE ATM BY IMAGE PROCESSING seminar class 6 9,903 06-04-2014, 05:49 PM
Last Post: Guest
  Secure Mobile Based Voting System full report seminar topics 4 8,038 03-10-2012, 03:39 PM
Last Post: seminar details
  Secure and Policy-Compliant Source Routing electronics seminars 9 6,987 16-03-2012, 11:40 AM
Last Post: it.crusaderz
  TEST PLATFORM FOR SECURE WIRELESS COMMUNICATION USING XTEA computer science crazy 3 3,403 05-03-2012, 10:36 AM
Last Post: seminar paper
  Two Practical Man-In-The-Middle Attacks on Bluetooth Secure Simple Pairing seminar class 1 2,326 02-02-2012, 10:23 AM
Last Post: seminar addict
  SECURE WIRELESS SENSOR NETWORKS - ROBUST OF WSN ATTACKS AND SECURE LOCALIZATION smart paper boy 1 2,142 28-01-2012, 10:55 AM
Last Post: seminar addict
  SECURE WIRELESS DATA COMMUNICATION seminar class 1 2,909 26-01-2012, 10:47 AM
Last Post: seminar addict
  Automated and Secure IPv6 Configuration in Enterprise Networks smart paper boy 0 938 29-08-2011, 03:42 PM
Last Post: smart paper boy
  Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes smart paper boy 0 1,190 24-08-2011, 11:44 AM
Last Post: smart paper boy
  A Scalable Robust Authentication Protocol For Secure Vehicular Communications smart paper boy 0 817 28-07-2011, 03:36 PM
Last Post: smart paper boy

Forum Jump: