Security Management of IM/P2P

Security management of IM/P2P is a great challenge to both telecom and enterprise networks. Although there are much similiarity between these two kinds of networks, security management of IM/P2P for telecom networks has many special requirements, comparing against those for enterprise networks. I hope the below diagram help depict the difference. There are more and more commercial products to address such kind of demands, such as Fortinet, Allot, Facetime, IMLogic, Bluecoat, etc.

At the same time, those telecom vendors, such as Cisco, Juniper, and Huawei, have been launching more corresponding functions to their existing products. Currently, the NBAR (Network Based Application Recognition) of Cisco has the capability to recognize hundreds of applications at the network layer. While the DPI (Deep Packet Inspection) technology has been adopted by many of vendors to enhance with more fine-grained policy the security management capability to applications.

Security Management of IP and P2P

About these ads

2 Responses to Security Management of IM/P2P

  1. [...] Following the analysis on the comparison of IM/P2P security management between telecom nework and enterprise network, this post further investigates the security threats to telecom networks coming from IM/P2P applications and recommends some countermeasures to those telecom operators. This post was published in Chinese at Comm-weekly named Finding IM/P2P Security Policy. [...]

  2. [...] the analysis on the comparison of IM/P2P security management between telecom nework and enterprise network, this post further investigates the security threats to telecom networks coming from IM/P2P [...]

Follow

Get every new post delivered to your Inbox.

%d bloggers like this: