Instant Threats
COMPLIANCE
Although specialized instant messaging platforms with built-in security features have been around for years, consumer IM platforms are still being used on the trading floor. The headaches these open platforms inevitably bring are endless.
Mike Persaud, head of strategic architecture at investment bank Dresdner Kleinwort Wasserstein (DrKW), says that the dangers in public IM platforms like those from AOL, Microsoft and Yahoo are akin to threats found in e-mails bearing malicious software or code. "The enterprise space is sensitive to that," he says, highlighting the presence of worms and spam within IM.
Given the relative infancy of IM threats, Persaud says he puts his energies into other aspects of IM compliance. Logging conversations and identity management are two important issues that he emphasizes. "Many hedge funds use public platforms," he says, adding that logging is still necessary for regulatory compliance.
Identity management focuses on how a recipient can ascertain a message's author and origin. "To start, we need identity management," says Persaud. Solutions exist, such as unique PIN numbers to identify users, and third-party systems like those provided by Sxip, which provides online or hosted digital identities.
DrKW's own solution is a persistent chat system branded internally as Grapevine. Closed off from public platforms, external IM threats are eliminated, and identity management is dealt with through a user's standard login to the firm's IT network. "In the past, we were confident that the e-mail client was the first application opened and the last closed," says Persaud. "Now, Grapevine is the first window you see when you log on. It's our preferred internal channel, rather than e-mail."
At the end of each week, conversations conducted over Grapevine are stored in the firm's archives, solving the third problem of conversation logging. There will be pockets of external communication via Grapevine by the third quarter of 2006, says Persaud.
According to reports from IMLogic and FaceTime Communications, threats to IM users have increased dramatically. Data from the IMLogic Threat Center reveals that IM security threats increased by 253 percent from January 2005 to January 2006, and that attackers are using newer technologies to hide the malicious attacks.
In January, IM attacks totaled 174 unique threats. Worms dominated at about 80 percent of IM attacks, while Trojan viruses—which hide in a system, providing access to an outside user—doubled to 18 percent of IM attacks.
FaceTime published a report indicating that IM and peer-to-peer threats increased more than twenty-fold from 2004 to 2005. Quarter-on-quarter increases in security incidents are occurring at a 90 percent growth rate. According to FaceTime, there was a dramatic change in hacker attacks across multiple networks last year, compared to 2004 security incidents, which were primarily spread via one network only. Individual security breaches were 19 times more likely to use two or more public networks in Q4 2005 compared with Q1 2005, according to the report.
Granted, these firms have a vested interest in publicizing bad news for IM users, but an informal survey of European firms conducted by Waters found that while firms are adopting specialized solutions such as Reuters Messenger and Bloomberg Messenger, many establishments rely on popular public platforms from AOL, Microsoft and Yahoo. IMLogic's report highlights the dangers associated with the use of such platforms. In January, 56 percent of new threats targeted the AOL Instant Messenger (AIM), 22 percent focused on MSN Messenger and 22 percent targeted Yahoo Chat.
According to one analyst, most attacks currently focus on AIM because of its popularity. But it seems that every platform will have to prove its security measures before investment firms are willing to allow employees to use them on a large scale.
Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.
To access these options, along with all other subscription benefits, please contact info@waterstechnology.com or view our subscription options here: http://subscriptions.waterstechnology.com/subscribe
You are currently unable to print this content. Please contact info@waterstechnology.com to find out more.
You are currently unable to copy this content. Please contact info@waterstechnology.com to find out more.
Copyright Infopro Digital Limited. All rights reserved.
As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (point 2.4), printing is limited to a single copy.
If you would like to purchase additional rights please email info@waterstechnology.com
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (clause 2.4), an Authorised User may only make one copy of the materials for their own personal use. You must also comply with the restrictions in clause 2.5.
If you would like to purchase additional rights please email info@waterstechnology.com
More on Trading Tech
Removal of Chevron spells t-r-o-u-b-l-e for the C-A-T
Citadel Securities and the American Securities Association are suing the SEC to limit the Consolidated Audit Trail, and their case may be aided by the removal of a key piece of the agency’s legislative power earlier this year.
After acquisitions, Exegy looks to consolidated offering for further gains
With Vela Trading Systems and Enyx now settled under one roof, the vendor’s strategy is to be a provider across the full trade lifecycle and flex its muscles in the world of FPGAs.
Enough with the ‘Bloomberg Killers’ already
Waters Wrap: Anthony interviews LSEG’s Dean Berry about the Workspace platform, and provides his own thoughts on how that platform and the Terminal have been portrayed over the last few months.
BofA deploys equities tech stack for e-FX
The bank is trying to get ahead of the pack with its new algo and e-FX offerings.
Pre- and post-trade TCA—why does it matter?
How CP+ powers TCA to deliver real-time insights and improve trade performance in complex markets.
Driving effective transaction cost analysis
How institutional investors can optimize their execution strategies through TCA, and the key role accurate benchmarks play in driving more effective TCA.
As NYSE moves toward overnight trading, can one ATS keep its lead?
An innovative approach to market data has helped Blue Ocean ATS become a back-end success story. But now it must contend with industry giants angling to take a piece of its pie.
BlackRock, BNY see T+1 success in industry collaboration, old frameworks
Industry testing and lessons from the last settlement change from T+3 to T+2 were some of the components that made the May transition run smoothly.