Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:38 PM
Dark Reading
Dark Reading
Products and Releases

FaceTime Releases Enterprise Solution To Monitor And Archive Social Media

Unified Security Gateway 4 lets you preapprove social media posts to Facebook, Twitter, and LinkedIn to prevent data leaks and violations of company policy

BELMONT, Calif – May 19, 2010 - FaceTime Communications (www.facetime.com ) announced today that it has added social network compliance and feature controls for Facebook, LinkedIn and Twitter. Designed to help organizations meet regulatory compliance, such as FINRA’s Regulatory Notice 10-06 and to aid in the prevention of accidental data leakage, the controls allow posts to be pre-approved, logged and archived or blocked if they do not meet company policy.

Social media within the workplace now accounts for a significant portion of new business opportunities for many organizations; however, its rapid uptake, often against written policies, has also left many enterprises inadequately prepared from both a data leakage and a compliance perspective. These latest features, available in FaceTime’s Unified Security Gateway (USG) build upon the content filtering controls that FaceTime introduced six months ago.

“Most companies have more to fear from accidental data leakage on social media sites than malicious theft,” says Kailash Ambwani, CEO of FaceTime Communications. “Individuals and teams within all sizes of organizations are turning to social media to collaborate, often without considering the consequences of collaborating in what is in effect a public place. Even the most diligent of employees can make the occasional error in judgment, which can have serious consequences if not prevented.”

FaceTime’s USG enables organizations to monitor and control how employees use specific features within social media sites; for example, allowing users to only view Twitter messages but not post, update a Facebook status but not play Farmville or post to LinkedIn but not be able to recommend.

“Moderator” controls, allow organizations to hold status updates and comments for review prior to posting, thus complying with rules from regulatory bodies such as FINRA, OTS and the FSA, all of which have made clear that social media constitutes electronic messaging and that applicable rules and guidelines must be adhered.

As a moderated user posts a message to Facebook, LinkedIn or Twitter, USG intercepts the message and notifies the user that their content will be posted only upon approval by the moderator. Moderators then approve, comment upon or reject and block posts from the USG Review Console. Approved posts are immediately visible on the social media site.

“Social networking tools are extraordinarily useful and can generate new marketing, revenue and other opportunities”, said Michael Osterman, principal of Osterman Research. “However, social networking is a two-edged sword – as useful as these tools are, they can create enormous risks for any organization. The ability to monitor and manage social networking communications allows organizations to realize the benefits of these tools while at the same time minimizing the risk from their inappropriate use.”

All traffic, both inbound and outbound, can be scanned for confidential or restricted content ensuring that the use of social media in the workplace is not creating a backdoor for confidential and business critical data to leak out.

All the enterprise grade capabilities of USG are inherited by the new social network compliance controls. These capabilities include: Integration with corporate directory services for authentication; Identity management for mapping social network user names to corporate identities; And export of logged content to WORM storage or email archiving systems for compliance retention and eDiscovery.

USG is the first Secure Web Gateway to provide social networking feature controls, and the recording and moderation of content. In addition, USG provides security, management and compliance for more than 4,000 Web 2.0 applications, such as instant messaging and Unified Communications, and protects the enterprise at the gateway with URL filtering, anti-malware and Web anti-virus protection.

Social Networking Compliance control is available as a USG module from $4800 for 100 users on a virtual appliance with the first year maintenance and support.


About FaceTime Communications

FaceTime Communications enables the safe and productive use of Unified Communications and Web 2.0, including social networks, blogs, and instant messaging. Ranked number one by IDC for five consecutive years, FaceTime's award-winning solutions are used by more than 1,500 customers for the security, management and compliance of real-time communications. FaceTime supports or has strategic partnerships with all leading public IM network and Unified Communications providers, including AOL, Google, Microsoft, Yahoo!, Skype, IBM and Cisco.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-23
Vulnerability in OpenGrok (component: Web App). Versions that are affected are 1.6.7 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. Successful attacks of this vulnerability can result in takeover of OpenGrok. CVSS 3.1 ...
PUBLISHED: 2021-06-23
A vulnerability in SonicOS where the HTTP server response leaks partial memory by sending a crafted HTTP request, this can potentially lead to an internal sensitive data disclosure vulnerability.
PUBLISHED: 2021-06-23
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
PUBLISHED: 2021-06-23
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.
PUBLISHED: 2021-06-23
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.