August 25, 2005
- Ease of Use:
- Value for Money:
- Overall Rating:
It's free and useful.
It only detects the more common IM services.
A useful tool that could provide early warning of security problems.
Akonix's RogueAware software is a free utility that can be used to monitor Instant Messenger and P2P activity on a network. It can detect activity on AOL, MSN, ICQ and Yahoo! services and provides useful traffic statistics.
Its primary purpose is to help system administrators to evaluate the activity on their systems, with a view to purchasing suitable software to control it.
Obviously, Akonix is hoping that its software would be the product of choice, and the interface does provide a number of hints in this direction.
The software installs itself as a Windows service, and communicates through a web browser. It accumulates counts of logins, messages sent and received, and files sent and received on a daily and cumulative to date basis, categorized by service.
The software can also produce simple reports in html format that can be saved and printed for later reference. It is also possible to create an email message that contains summary information.
There is an online help system, which deals with installing and using the software, with a useful section dealing with known issues that could affect the accuracy of the traffic statistics.
Since RogueAware installs itself as a web server, it can be accessed from anywhere in the network simply by pointing a web browser at the server's IP address.
It will disable any web services that might be running on the system while it is installed, although it is possible to change the default port from port 80 if required.
The software can only function correctly if it can monitor all the network traffic, and so it needs to be installed on a system that connects to either a switch with a monitor port or to a hub. The system's Ethernet card needs to be operating in promiscuous mode.
Obviously, the system has some limitations, it only monitors the most common IM clients, for example, and there is no way to determine where the traffic originates from, but that does not detract from its usefulness.
Simply by detecting and then reporting the existence of IM and P2P traffic it might reveal a previously unsuspected security gap, and that information is invaluable.
It would always be possible to set up packet-sniffing software to discover the sources of the traffic once you are aware of the existence of the problem.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- Scammers target oil companies with sneaky attack
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Study: Employees acknowledge risky security behavior, continue to engage in it
- Hack of airplane systems described in FBI docs raises security questions
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Thousands of Bellevue Hospital Center patients notified of data breach
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- Investigation ongoing in reported multimillion member Adult FriendFinder breach
- Report: $19M breach settlement between MasterCard, Target terminated
- FTC gives thumbs up to companies that cooperate during breach probes