Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Affordable IT: Securing Your IM Systems: Page 4 of 6

On a private IM network, administrators can control all user accounts, access and traffic. Some systems will integrate with and authenticate against directory services. By limiting access to only internal users, you eliminate most, if not all, IM spam and outsider threats. A private IM system isn't airtight, however, as any viruses and worms that make it into your network from another source can still spread over IM. Although the products we reviewed last year (see "Enterprise IM: Instant Gratification," ) were commercial, many open-source or free Jabber protocol-compliant (also known XMPP) servers are available. Because you must maintain and upgrade the server hardware, operating system and IM server software, running your own IM network will cost more than using a public one, but the added security features are worth it. In addition, some IM vendors have gateways that allow connectivity for end users with public network needs.

Consider how you control access. Viruses, worms and Trojans can spread through file transfers. If your IM suite doesn't offer include free filtering or centralized antivirus scanning, instead of paying for more features, you can disable IM file transfers and tell users to send e-mail attachments instead.

Do you need to set up walls between users, so that certain departments can't communicate? We were sorely disappointed that many of the products we tested last year don't allow walls. As a workaround, you can set up multiple internal networks, sharing the same directory service for authentication, and not let them talk to each other.

Finally, strong auditing and reporting features are a must, especially in industries that require transaction and conversation logs. Most private IM suites offer this capability or partner with a vendor that does.

No IM Allowed