contents

business
 
FaceTime Communications Launches www.GreynetsGuide.com

FaceTime Communications has launched www.GreynetsGuide.com. Greynets are Internet-enabled, communication applications that are typically installed by end users without the sanction of corporate network managers.

The Web-based guide aims to be a comprehensive reference center to help enterprise network administrators better understand evasive and consumer-oriented applications like public IM clients, P2P file-sharing, anonymizers, IPTV and consumer VoIP that are increasingly being adopted by employees.

GreynetsGuide.com details the source, behavior and effective removal tools for more than 600 greynet applications of concern to IT managers. FaceTime Security Labs' researchers are identifying and adding new greynets to the database daily.

FaceTime is also offering a free tool called RTDiscover that will enable IT managers to gain visibility into the greynet traffic that is traversing their networks.

FaceTime RTDiscover, delivered on DVD, provides a comprehensive report of greynet and Web traffic on the enterprise network at user, group and enterprise levels. RTDiscover presents the user with a real-time view of all malware threats including spyware, adware, keyloggers and rootkits currently resident on PC endpoints throughout the organization.

Greynets are Internet-enabled communication applications that are installed on an end user's system without permission from IT and are highly evasive to existing security infrastructure. While many of these applications deliver collaborative benefits to users, they pose a unique challenge to network administrators by traversing the network through a variety of ports and evasive techniques. If left unmanaged, greynet applications can impact productivity, become vectors for malware attacks, and introduce compliance risks including leakage of confidential information.

While some greynets such as Skype, public instant messaging and Web Conferencing have legitimate business uses, IT requires visibility and control to ensure their safe and productive use. With other greynets, such as P2P file sharing, video streaming, and anonymizers, the risks might outweigh the benefits and organizations need the ability to accurately detect and block them.

According to the 2007 survey Greynets in the Enterprise: Third Annual Survey of Trends, Attitudes and Impact, conducted by NewDiligence Research and commissioned by FaceTime, the number of greynet applications installed at a typical work location has increased significantly in the past year. According to the survey, the number of work locations with eight or more greynet applications in use has almost tripled in the last three years.

The costs of greynet usage can be very high. In the recent survey, IT managers reported spending an average of nearly $289,000 annually to repair or re-image company PCs after malware attacks that occurred over greynets. On average, IT managers experience nearly 39 incidents per month that require some kind of repair or remediation to end user PCs and each repair requires, on average, about nine hours of work.

Visit www.GreynetsGuide.com on the web for the most up to date information about more than 600 greynets, and click here to request the free RTDiscover tool.



write your comments about the article :: © 2007 Computing News :: home page