Secure Instant Messengers
#1

Abstract

Securing instant messaging in your corporationInstant messaging may soon become an indispensable business tool; however, the risks of using an unsecured IM platform in corporations are high. This section explores the security issues introduced with the use of corporate instant messaging and offers best practices that can help in deploying a secure IM platform.

Understanding Instant Messaging And Corporate Firewalls
Many corporate customers may wish to use their network firewall to block users from communicating over insecure instant messaging systems. Unfortunately, out-of-the-box firewall configurations are often not sufficient enough to block access to the latest generation of popular IM systems. These IM systems were designed with firewalls in mind and employ a number of techniques to sneak past corporate firewalls to reach their servers.

All IM clients are preconfigured with one or more TCP/IP network addresses that allow them to connect to their IM server(s). Once connected, the clients can exchange messages with other IM clients. Because many companies configure perimeter firewalls to block all Internet services except for a small critical set (e.g., SMTP email, HTTP Web surfing, and DNS), IM providers have designed their clients to tunnel over these commonly allowed Internet services, if required, and slip past the corporate firewall.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar on wireless instant messaging, instant english book in app download, instant message conversion, instant messaging language, instant inphase detectorrty some jokes, netflix instant, wireless instant messaging wim**e,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SECURE ATM BY IMAGE PROCESSING seminar class 6 9,917 06-04-2014, 05:49 PM
Last Post: Guest
  Secure Mobile Based Voting System full report seminar topics 4 8,041 03-10-2012, 03:39 PM
Last Post: seminar details
  Secure and Policy-Compliant Source Routing electronics seminars 9 7,007 16-03-2012, 11:40 AM
Last Post: it.crusaderz
  TEST PLATFORM FOR SECURE WIRELESS COMMUNICATION USING XTEA computer science crazy 3 3,409 05-03-2012, 10:36 AM
Last Post: seminar paper
  Two Practical Man-In-The-Middle Attacks on Bluetooth Secure Simple Pairing seminar class 1 2,331 02-02-2012, 10:23 AM
Last Post: seminar addict
  SECURE WIRELESS SENSOR NETWORKS - ROBUST OF WSN ATTACKS AND SECURE LOCALIZATION smart paper boy 1 2,144 28-01-2012, 10:55 AM
Last Post: seminar addict
  SECURE WIRELESS DATA COMMUNICATION seminar class 1 2,912 26-01-2012, 10:47 AM
Last Post: seminar addict
  Automated and Secure IPv6 Configuration in Enterprise Networks smart paper boy 0 939 29-08-2011, 03:42 PM
Last Post: smart paper boy
  Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes smart paper boy 0 1,190 24-08-2011, 11:44 AM
Last Post: smart paper boy
  A Scalable Robust Authentication Protocol For Secure Vehicular Communications smart paper boy 0 817 28-07-2011, 03:36 PM
Last Post: smart paper boy

Forum Jump: