AGAT

Categories
Uncategorized Skype for Business SkypeShield

SphereShield enables internal use of Ethical Wall for Skype for Business

Following SkypeShield’s successful launch of the Federation Ethical Wall solution, customers have been requesting the ability to use the same functionality internally, applying specific rules between different users or groups. SkypeShield has therefore extended the Ethical Wall to support controlling internal traffic as well as external.

SkypeShield’s Ethical Wall offers granular control over federation to address security and data protection when federating with external companies. Now, SkypeShield offers the ability to use the same functionality internally, applying specific rules between different users or groups in the same company.

The new user interface of the Ethical Wall has a clean and simple interface allowing control of each activity and the ability to control communication direction. For example, it is possible to allow one side only to start a chat with the other side.

These new capabilities support blocking a specific group in the company to communicate with another group in the same company. For example, a certain employee group may be prevented from calling management level group, or communication may be blocked between the procurement group and the tender writing groups.

The new feature therefore helps in implementing compliance regulation in companies.

SkypeShield’s Ethical Wall offers the following features:

  • Defines granular policy rule based on a user/group communicating with a specific company (SIP domain) or another group in the same company
  • Provides independent control of each activity : IM, audio, video, conference (meeting), desktop sharing, file transfer
  • Blocks presence information from external users depending on policy
  • Supports one way initiation of communication. For example, it blocks external users from initiating an IM conversation while still allowing internal users to initiate and communicate with external users.
  • Changes policy for users that are added to contact list. Allows user some local policy management by applying different policies based on inclusion in a user’s contact list. This way, by adding the federated user to the internal user’s contact list, the policy will allow more federation such as presence information.
  • Enforces policy in the DMZ and blocks non-approved traffic from entering the network
Categories
Mobile Security Skype for Business Uncategorized

Ethical wall solution offers granular control over Skype for Business federation

SkypeShield launched a new Federation Ethical Wall solution, which offers granular control over federation to address security and data protection when federating with external companies.

Enabling federation raises serious business and security issues that need to be addressed by applying granular policy rules defining permitted operations between communicating parties.

Companies wanting to extend communication outside the company boundaries require protection and control over the different flows of data offered by Skype for Business.

Federation raises also privacy issues related to reviling personal and executive users details including availability (online/away), mobile phone number and location.

In order to meet security threats, while using Skype for Business, organizations need to be able to allow federation from a specific company only to specific internal users or groups.

The federation Ethical Wall offers the following features:

  • Defines granular policy rule based on a user/group communicating with a specific company (SIP domain)
  • Specific modality policy control: IM, audio, video, conference (meeting), desktop sharing, file transfer
  • Blocks presence information from external users depending on policy
  • Blocks external user from initiating an IM conversation while still allowing internal user to initiate and communicate with external user
  • Allows user some local policy management by applying different policies based on inclusion in a user’s contact list. This way, by adding the federated user to the internal user’s contact list, the policy will allow more federation such as presence information
  • Enforces policy in the DMZ and blocks non-approved traffic from entering the network