By
Published: 13 Dec 2006 0:00
Burton Group analyst Diana Kelley discusses messaging security and explains how to lock down instant messaging programs in the final part of a three-day special report on the subject. Based on the results of exclusive readership research, SearchSecurity.com takes a closer look at the top messaging security challenges facing today's businesses. This original, multi-media series explores hot-button security issues like evolving threats, the increasing reliance on mobile devices, remote email access and instant messaging, and the technologies designed to secure it all.
Special Report: Messaging (in)security: |
|
Download MP3 | Subscribe to Security Wire Weekly
(3:52) Let's start by talking about some of the threats IT professionals have to worry about when it comes to messaging programs, particularly IM and email What is at stake for an organization?
(5:12) If you have a situation where the biggest danger is the users themselves, what are some steps IT professionals can do to control that user behavior?
(7:05) Talk about the evolving malware that is out there and can be delivered via email, IM or mobile messaging devices.
(8:38) In the IT department, what are some of the techniques they should be using when it comes time to filter some of this junk at the email gateway or ways to block this from the desktop?
(10:45) In your research have you gotten any feedback from vendors on some of the filtering technology?
(12:04) Have you done a lot of research about email security appliances? What is their value?
(13:27) Are you hearing anything about vendors that are on the cutting edge on the appliance side of things?
(13:56) What are some technologies out there that IT professionals should be looking at to specifically safeguard data that is stored on mobile messaging devices?
Day 1: Messaging insecurity fuels data leakage fears: Special Report: The proliferation of messaging technology means more opportunity for malware to take root and sensitive data to be lifted.
Day 2: IT pros look for ways to lock down IM: Special Report: To control growing IM threats, administrators are trying to limit which programs can be used or ban the technology altogether. But that's not always possible.
Special Report: Inside the numbers: Based on the results of exclusive readership research, SearchSecurity.com takes a closer look at the top messaging security challenges facing today's businesses.
Information Security podcasts: Visit SearchSecurity's podcast archive.
Read more on Hackers and cybercrime prevention