You are here: IT-Observer ? Press Releases RSS | White Papers |

Imlogic Launches First Embedded Solution For Instant Messaging Management And Security





WALTHAM, Mass. Nov. 7, 2005 "IMlogic Inside" Program Enables Rapid Integration of IMlogic Security Engine into E-mail and Network Security Solutions for Comprehensive Protection from IM Threats

IMlogic today announced the launch of the "IMlogic Inside" program and the availability of the IMlogic Security Engine to enable ISVs and service providers to rapidly integrate IM management and security into existing e-mail and network security solutions. The IMlogic Security Engine is the industry's first 100 percent embeddable solution to deliver IM protocol access, extensible integration tools, and IM threat detection and remediation capabilities required to address the growing need for integrated protection against IM viruses, worms, information security leaks, and content compliance violations. "IMlogic Inside" program participants are additionally provided network certification from the leading instant messaging providers, real-time access to IM threat signatures, and complete integration services required to rapidly develop IM security solutions for enterprise, service provider, and SMB environments.

IM worms and viruses pose a significant challenge to IT environments, utilizing real-time communications channels and effective social engineering techniques to spread malware orders of magnitude faster than e-mail. The rapid adoption of IM within enterprise and SMB environments coupled with the meteoric rise in IM threats makes IM security a critical need for existing messaging and network security applications. The complexity of the instant messaging protocols, the lack of widely deployed standards, and the significant challenge of managing "real-time" applications has traditionally posed technology barriers for the industry to widely incorporate IM management into integrated solutions. The "IMlogic Inside" program and the embeddable IMlogic Security Engine solution remove these traditional barriers, offering the advantage of both best-of-breed IM management technology and the fastest available time to market for ISVs and hosted service providers.

"Security threats and compliance regulations are impacting the usage of both e-mail and IM and enterprises need integrated solutions to solve these heterogeneous problems," said Matt Cain, research vice president at Gartner. "As customers rush to bring messaging security under control, they will look for solutions that integrate policy enforcement, anti-virus, anti-spam, and content compliance for multiple communication channels, including e-mail and IM."

The "IMlogic Inside" program is open to qualified independent technology vendors and managed service providers with requirements to extend instant messaging into their existing security and management solutions. Key components of the "IMlogic Inside" program include:

-- Licensed Access to IMlogic Security Engine: Industry's first 100 percent embedded solution for IM security that includes IM protocol management, proven and documented development APIs, as well as integration and support with the IMlogic Threat Center. The IMlogic Threat Center is the global clearinghouse for IM threats and provides the most recent updates on new and emerging IM outbreaks and threat signatures.

-- Certified Access to Leading IM Network Providers: First embedded solution that includes complete turnkey service, support, and licensing for the leading global IM services including those from AOL, IBM, Google, Jabber, Microsoft, and Yahoo.

-- Flexible Deployment and Distribution Options: Supporting Windows and Linux operating systems at carrier-grade scalability and performance, the IMlogic Security Engine may be deployed within any packaged-software, appliance, or hosted service.

-- Integration Services: IMlogic's proven deployment methodology, services, training and support will ensure the rapid launch of integrated partner solutions.

"IMlogic Inside" was developed in partnership with leading messaging security appliance vendors and managed service providers. Charter members include Postini, Proofpoint, Singlefin, and a global telecommunications provider.

"We're excited to join the 'IMlogic Inside' program as part of our effort to enhance the instant messaging protection capabilities of our enterprise messaging security solutions, which already integrate with IMlogic," said Andres Kohn, director of products for Proofpoint. "By embedding the IMlogic Security Engine in future products, Proofpoint will be able to provide industry-leading IM security features out-of-the-box to ensure that IM conversations are free of viruses, malware, regulatory compliance violations, and confidential information."

"IMlogic Inside" charter member Postini recently launched its Perimeter Manager for IM, a multi-network, enterprise class managed security service for IM, leveraging Postini's proxy architecture and Active Policy Management Framework to deliver advanced IM management to enterprises. Utilizing "IMlogic Inside" resources, Postini was able to extend its leading Integrated Messaging Management and security capabilities to include IM without rearchitecting its own solution to accommodate a new set of messaging protocols.

"As an 'IMlogic Inside' member, we were able to get to market rapidly and deliver a complete IM solution without entering into separate contractual agreements with the IM networks," said Larry Goldstein, vice president of Product Management at Postini. "Our partnership with IMlogic allows us to focus on what we do best, while leveraging IMlogic's technology, expertise and industry relationships to ensure our ongoing support of a diverse community of IM providers."

IMlogic's embeddable engine provides the underlying infrastructure for its flagship product, IMlogic IM Manager, and delivers complete protocol support for the AOL, MSN, Yahoo and Google instant messaging services as well as Microsoft's Live Communications Server, Jabber, and IBM Lotus Sametime. Program participants additionally benefit from certified relationships with the leading IM providers, providing network certification and dynamic support for protocol changes and enhanced IM features. "IMlogic Inside" members also benefit from IMlogic's "best-of-breed" threat detection and remediation capabilities which leverage IMlogic's Real-Time Threat Protection Service and the IMlogic Threat Center.

"IMlogic's longstanding leadership and expertise continues to further the adoption of IM security," said Brian Curry, vice president of Premium and Subscription Services for America Online, Inc. "The 'IMlogic Inside' program extends their proven technology to allow independent software vendors to deliver AOL certified instant messaging security solutions to the AIM network."

"The ubiquity of instant messaging in the enterprise combined with a heterogeneous IM protocol environment makes managing IM a significant technology challenge and vital to the integrity of the corporate network and to corporate assets," said Jon Sakoda, chief technology officer at IMlogic. "In working with leading e-mail and network security vendors over the last year, we've delivered the industry's first embeddable solution for IM security, allowing these companies to extend their solutions to rapidly incorporate instant messaging."

The IMlogic Security Engine is available immediately and licensed through perpetual and subscription based licensing models. For more information on "IMlogic Inside" please contact .

About IMlogic Inc.

IMlogic Inc. is the market leader in instant messaging management and security software. Companies across the financial services, energy, healthcare, government, media, telecommunications, technology, and manufacturing industries, including Fortune 100 companies, depend on the award winning IMlogic IM Manager(TM) to manage, control and secure corporate IM usage, while satisfying messaging compliance requirements. For more information on IMlogic call 877-IMlogic or visit www.imlogic.com.

Prevent data theft & viruses through network connected USB sticks, PDAs & media players. Control user access to endpoint connections with GFI EndPointSecurity - Free trial!

Visit GFI Security Software page for more information.

IT-Gear.com - Weblog dedicated to everything concerning IT tools and services.

Latest News

SECUDE appoints Open-Source specialist as Linux Expert
02.11.06??SECUDE IT Security GmbH has confirmed the appointment of Felipe Rodriguez, a Linux Kernel contributor and owner of the Open-Source project MGSTEP, as its Linux Expert.

Increased Spam Fuelled Through Botnet Activities
02.11.06??MessageLabs, a provider of integrated messaging and web security services to businesses worldwide, has announced the results of its Intelligence Report for October 2006.

How to keep your VoIP net safe
30.10.06??One of the major challenges in implementing a converged network is having a coherent security policy for the management and control of a system that is carrying voice, video and data.

User tricks, security treats
30.10.06??Thirteen malevolent spirits may haunt the halls and cubicles of your company, and if you're going to scare them into security compliance you may need to get a little bit spooky yourself.

10 Steps to More Secure Wireless
27.10.06??We have all heard about the stories of spammers using open home wireless networks to fill the net with junk mail.

BT acquires Counterpane Internet Security
25.10.06??BT has announced that it has acquired Counterpane Internet Security, a provider of managed networked security services, as part of its strategy to expand and develop its global professional services capabilities.

Perdemia updates Permission Analyzer
25.10.06??Perdemia has upgraded Permission Analyzer, a powerful Windows administration tool that quickly determines whether the system access permissions are properly set, need to be changed, or have been altered by people who are not authorized to make changes.

Mac OS Bluetooth exploit - Inqtana.d
25.10.06??Inqtanad is a proof-of-concept exploit, which has not yet been seen in the wild, that is installed on a Mac OS X computer via Bluetooth from a computer or PDA running a Linux system.

Copyright ? IT-Observer Online Publication 2000 - 2006 Top | RSS Feeds | About Us
Site Meter