FaceTime Ups Archiving
FaceTime announced new capabilities for the safe and productive use of enterprise IM across distributed organizations
FOSTER CITY, Calif. -- FaceTime Communications, the leading provider of solutions for securing and managing greynets such as instant messaging (IM), peer-to-peer (P2P), VoIP, and web conferencing, today announced new capabilities for the safe and productive use of enterprise IM across distributed organizations.
IMAuditor 8.0 provides extended support for the latest versions of Enterprise Instant Messaging (EIM) and PIM applications such as Jabber XCP 5.1, IBM® Lotus® Sametime® 7.5, and Microsoft’s Live Communications Server, AIM Triton, MSN 8.0 and Yahoo 8.0. This update enables comprehensive management of mobile workers and scalability of the security infrastructure across multi-site deployments, and captures and archives file transfers. The new capabilities allow organizations to prevent inbound threats, minimize information leakage, and maintain corporate and regulatory compliance while embracing the benefits of real-time communications.
According to Osterman Research, two-thirds of enterprises will adopt enterprise instant messaging by the end of the first half of 2007. EIM provides a unified approach to real-time communications – providing the efficiencies and productivity advantages that users require along with the manageability and security demanded by IT. EIM offers advantages such as federation, which is the unified use of public IM networks under one convenient login, adding voice and web conferencing capabilities.
“Instant messaging is part of an evolving unified communications platform that will include unified messaging, web, audio and video conferencing, and voice over IP calls,” said Chris Christiansen, program vice president for IDC. “FaceTime is well-positioned to address this trend with its own evolving comprehensive security and compliance solution design to ensure the safe and productive use of IP-based communications in the enterprise."
About the Author(s)
You May Also Like
Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024Preventing Attackers From Wandering Through Your Enterprise Infrastructure
June 19, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024