FaceTime’s products may deliver the same basic functionality as other IM offerings, but the vendor differentiates itself from other IM security and management software vendors in server ways. Perhaps most interesting of these is that the Foster City, Calif company doesn’t see itself as an IM company at all.
In the sea of products that facilitate real-time communication, the company’s key differentiator may be that it’s not an IM management company after all.
“Our mission — and the reason we are different from say Akonix or IMlogic — is that we are not just looking at IM, we look more broadly at real-time applications, including WebEx, collaboration software, peer-to-peer applications, and SSL VPNs,” says Srini Gurrapu, FaceTime’s vice president of product management.
He believes real-time applications for conferencing, collaboration, VoIP, and IM will all begin to merge together in more integrated applications. Therefore, the challenge for IM security companies, he believes, is to understand that IM is just a subset of real-time applications, and customers are after protection and management tools that apply to all real time applications, not just IM applications. “If, for example, we don’t have the technology to secure P2P channels, then we are not addressing the problems of our customers. So we need to have a more comprehensive offering than just IM tools,” says Gurrapu.
The problem with managing and protecting against many P2P based applications – which can include IM – is that they can port crawl and their protocols change frequently, so they can be difficult to detect. To get around this FaceTime does not rely in signature recognition exclusively, but also uses behavior analysis – which includes detecting the presence “heartbeat” of many real time applications – deep flow analysis and statistical techniques to recognize unwanted applications for what they are as packets enter or leave the network.
For the moment, Gurrapu says Skype is causing the most headaches, although many of these will be overcome in the coming months. “Skype is the largest IM network and it gets anywhere,” he says. “It does port hopping and tunneling, and carries payloads encrypted with AES. At the moment we can’t manage Skype traffic because it is encrypted so we block it. In a forthcoming release we will be able to allow Skype VoIP but not FTP or messaging.”
The company has a slightly bewildering array of products, but the most important of these is FaceTime Enterprise Edition. This is actually nothing more than a combination of two other products: IM Auditor, a security and management module available as a software package or as an appliance, and the RTGuardian perimeter security appliance.
IM Auditor is priced partly on a per user basis, while RTGuardian’s pricing is based on the number of perimeter egress locations. As a guide, costs are as follows:
IM Auditor
IM Auditor is FaceTime’s IM core management, control and compliance product. Using a web-based interface, IM Auditor enables enterprises to:
RTGuardian
RTGuardian (RTG) is FaceTime’s perimeter security solution for blocking the spread of spyware and adware in the enterprise and securing unauthorized IM and P2P usage. With RTG, enterprises can:
RTG Features:
This article originally appeared on EnterpriseNetworkingPlanet.com.
Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.