Technology Briefing: Instant Messaging

Instant Messaging (IM) entered the corporate infrastructure by the back door. Popularized by AOL, IM allows users to locate and establish an independent sessions with another user. Once connected, the users can exchange comments in real-time and share files. The growth of IM led other ISPs to implement proprietary messaging functions for their customers. The vendors mostly designed IM for home users, but several users migrated the application to their office systems.

IM Product Briefing

Click

here for a new Crossnodes Product Briefing covering Corporate Instant Messaging.

IM in the corporate workplace remains controversial. Users claim that the software provides a boost to productivity. They say they can quickly get answers from suppliers and co-workers without the delays of voice mail and e-mail. They also argue that it is less expensive. IT managers argue that IM software breeches security. Also, the managers claim that unauthorized IM applications create support problems. In addition, corporate managers worry that IM conversations can serve as a distraction rather than a productivity tool.

Additional Resources on CIN

Each CrossNodes Technology Briefing acts as a reference on individual technologies and products, providing a knowledge base and guide to IT decision-makers in purchasing and deployment.

Click

here to reach a collection of previous Technology Briefings. Topics include: Firewalls, WLANs, network

storage and others.

You can also go to the Great Docs section

to find these Technology Briefings and other informative resources and documents on training and

staffing, e-mail and

Internet usage policies, a guide to project

management and other topics.

Less Than Secure
The security concerns are legitimate. For an IM system to work, a user’s workstation must broadcast that it is on the network. Once two workstations connect, the conversation takes place across a virtual connection. Most IM systems currently do not support such security staples as authentication and encryption. This means that a hacker can intercept any exchange of information. An unauthorized person also can use an IM connection to access the corporate network and possibly introduce viruses. Further, IM exchanges typically are not logged, and this makes it impossible for corporate management to monitor and control the links.

IT managers can complain, but IM usage continues to grow. Most IM systems operate as a proprietary application, but this is changing quickly. AOL is under a government mandate to communicate with other IM applications, and several vendors support the emerging Session initiation protocol for Instant Messaging and Presence Leveraging Extensions (SIMPLE) standard. This proposed format allows users to use the Internet for voice exchanges and establish conferences. The momentum toward a more open IM standard will increase with Microsoft’s instant messaging support under its Windows XP operating system.

An Evolution Towards Collaboration
The next generation of IM applications also will include important extensions to support corporate practices. IM implementations will lead to collaborative systems, and IT managers need to take control of this emerging application. Some of the extensions that IT managers can anticipate include:

  • Administrative Control: Offers policy management, logging, and configuration utilities that allow the IT manager to establish standard parameters and to monitor activities. IT managers can control IM functions from a central console or remotely.
  • Application Sharing: Opens applications on a workstation so that multiple users also can run that application at the same time. Application sharing represents an important function as IM systems extend into collaborative applications.