Symantec Instant Messaging Security. cloud Addresses Security and Compliance Issues for Corporate Instant Messaging Platforms

Survey finds Instant Messaging is the weakest link when it comes to corporate security and compliance

MOUNTAIN VIEW, Calif. – Nov. 14, 2011 – Symantec Corp. (Nasdaq: SYMC) today announced the worldwide availability of Symantec Instant Messaging Security. cloud (IMS.cloud) with support for Microsoft Lync. Symantec is one of the first SaaS vendor to support Microsoft Lync users, helping organizations that communicate using instant messaging platforms address their security and compliance issues. IMS.cloud scans messages and attachments for malware, blocks malicious URLs, protects organizations from data loss and logs messages for compliance purposes without the need for additional hardware and software.

A recent Symantec survey on corporate Instant Messaging use found that IM poses significant risk to organizations. Approximately 60 percent of respondents use IM to communicate with contacts outside the organization and 43 percent use it to share content not related to work. A further 29 percent reported using IM to send information they would not want their boss to know about.

Instant Messaging is becoming a popular tool for internal and external communications in organizations of every size,” said Tom Powledge, vice president of Product Delivery, Symantec.cloud. “ According to Symantec Intelligence, 1 in 11.3 links sent over IM link to malicious Web sites while our Symantec Instant Messaging survey revealed that fewer than half of the organizations surveyed have suitable controls for monitoring IM. The casual nature of IM paired with a tendency to de-prioritize IM security leaves organizations susceptible to compliance breaches, data loss and malware infection. IMS.cloud takes the risk out of IM so that companies can meet user demand for the latest technology while allowing a flexible and collaborative working environment anytime from anywhere.”

IMS.cloud is designed to scan every IM sent to or coming from an organization. Incoming messages, including attachments are scanned for viruses, worms and URLs which may lead to malicious Web sites. All incoming and outgoing messages are also matched against the organization’s acceptable use policies. Any message that is malicious or suspicious or violates corporate policy is automatically blocked and the user is notified.

IM tools help companies improve productivity, be more responsive, support mobile and remote workers and gain operational efficiencies. However, opening these channels of communication to external contacts without proper security and control can expose organizations to security and legal risks.

Instant Messaging in the workplace is becoming ubiquitous for both internal and external communications in organizations of every size,” said Chris Christiansen, vice president of Security Products and Services, IDC. “But this popularity is one reason why organizations are vulnerable to the risks that come with using desktop IM clients. Corporate IM needs the same high levels of malware protection and regulatory compliance required of email and Web services. Cloud-based security services can provide such protection.”

Key Features and Benefits of Instant Messaging Security. cloud

  • Comprehensive Solution: Includes an effective content control engine, malware protection, malicious URL detection, automatic message logging and configurable disclaimers.
  • Message Logging and Archiving: Meets regulatory compliance by logging message transcripts. Cloud-based archiving is available for organizations with more stringent compliance needs.
  • Skeptic™ Malware Protection: Using Symantec’s proven technology, protects organizations from threats by scanning messages and file attachments.
  • Cloud-based Service: No on-premise hardware and minimal software allows rapid deployment and low ongoing maintenance.

Symantec Instant Messaging Security. cloud is available now worldwide. The service can be purchased on its own or in combination with other Symantec.cloud services across email and Web and includes 24/7 support and service updates.

To sign up for a free trial, visit symanteccloud.com/freetrial

About Symantec

Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

Source: Symantec

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…