SHARE
Facebook X Pinterest WhatsApp

Resellers May Carve Niche in IM Security Wares

Security software vendors are rolling out instant messaging solutions, and they believe resellers can help move their new wares. Enterprise-class deals involving IM security appear to be few and far between at this point. But the market is young, and vendor wares are just starting to gain traction. Zone Labs six months ago began shipping […]

Written By
thumbnail John Moore
John Moore
Jun 4, 2004
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Security software vendors are rolling out instant messaging solutions, and they believe resellers can help move their new wares.

Enterprise-class deals involving IM security appear to be few and far between at this point. But the market is young, and vendor wares are just starting to gain traction.

Zone Labs six months ago began shipping an optional IM security module for its Integrity endpoint security solution. “It is in the implementation phase in a number of accounts,” said Fred Felman, vice president of marketing at Zone Labs.

The module supports AOL IM, ICQ, Yahoo Messenger and Microsoft’s MSN Messenger.

More sales could be on the horizon. Zone Labs has about 1,600 Integrity accounts, many of which “have expressed desire to integrate [IM] security,” Felman said.

For more collaboration coverage, check out Steve Gillmor’s Blogosphere.

Although Zone Labs could not immediately point to a reseller with an IM security contract in hand, the company believes the channel will play an increasing role in the field.

That may well come to pass when Check Point Software Technologies’ 2,000-plus resellers get up to speed on Zone Labs’ IM technology. Check Point completed its acquisition of Zone Labs in March.

Check Point has also just revamped its channel program. “Check Point is further enabling us to build expertise in selling their solutions to our targeted enterprise and high-end customers,” Brad Reed, director of Internet security at Miami-based reseller Compuquip Technologies, said in a statement.

“We strongly believe in the quality of Check Point’s Perimeter, Internal and Web security solutions,” Reed said.

Click here for a column by Steve Gillmor on the future of workplace communications.

That proliferation has been unregulated for the most part, Yee said. “Most organizations are still playing catch-up with regard to having strong security policies for IM,” he said.

IM’s security vulnerabilities include the potential for buffer overflow attacks and the harvesting of user names and passwords, security executives said.

For insights on security coverage around the Web, check out eWEEK.com Security Center Editor Larry Seltzer’s Weblog.

The market is set for resellers to step up to the plate and help customers plug their IM security gaps.

“I think of [IM security] as a great business opportunity,” Yee said. “When there is this level of pain and attention, there’s an opportunity for the reseller to step in.”

For example, resellers can help customers update their security policies to “accommodate IM and peer-to-peer technologies like Kazaa,” Yee said. Another reseller role, he added, will be to evaluate security tools.

In that respect, vendors such as Zone Labs and NFR willingly supply the goods. It’s up the resellers to educate themselves on the emerging offerings and decide how they fit into their security practices.

Recommended for you...

Lyra Technology Group CEO on Scaling Local MSP Model, AI & More
What MSPs Should Keep in Mind as They Deploy Agentic AI
Why Customers & Partners See Added Value With Coralogix
Caylent Research on Database Migrations: What to Know
Victoria Durgin
Aug 28, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.