Security Management of IM/P2P

September 23, 2005

Security management of IM/P2P is a great challenge to both telecom and enterprise networks. Although there are much similiarity between these two kinds of networks, security management of IM/P2P for telecom networks has many special requirements, comparing against those for enterprise networks. I hope the below diagram help depict the difference. There are more and more commercial products to address such kind of demands, such as Fortinet, Allot, Facetime, IMLogic, Bluecoat, etc.

At the same time, those telecom vendors, such as Cisco, Juniper, and Huawei, have been launching more corresponding functions to their existing products. Currently, the NBAR (Network Based Application Recognition) of Cisco has the capability to recognize hundreds of applications at the network layer. While the DPI (Deep Packet Inspection) technology has been adopted by many of vendors to enhance with more fine-grained policy the security management capability to applications.

Security Management of IP and P2P

Advertisements

IM/P2Ps not only applications, but platforms

September 23, 2005

Stuart Henshall wrote a good post at skypejournal. I agree. IM/P2P applications are becoming so popular that almost every internet users make use of one or more at their everyday life and biz. Their biz value are exceeding common applications. Let’s look them as platforms, just like those operating systems, networking systems. in other words, dorminators at IM/P2P will capture benefit just like MSFT and telco’s.

MSFT acquired Groove at April this year and re-orged itself into 3 BU from 7, where windows and MSN merged into one. further reactions are expected against the competing from Skype, Dianji(China), Google, and etc.

However, there are not reactions rolled out from those telco companies. In China, China Telecom was developing its own IM last year to provide chat/soft phone and other services, however, no marketing program yet.