General Information

Internet Monitoring Software


Over 15% of new users switched from Websense. Over 20% used to run Surf Control. Ask about our competitive pricing program and find out why it literally pays to switch to Pearl Software.
View short videos about Pearl Echo's cybersecurity features and ease of installation.
Contact the Pearl Software sales team to learn about Pearl Echo.Suite pricing options.
See how Pearl product specifications meet your requirements.


When you need to allow and block chat and instant messaging activities on your network or off it, IM.Echo is the right tool. Used by itself or in conjunction with the broad Pearl Echo.Suite, IM.Echo lets you easily customize your cybersecurity policies for comprehensive instant messenger traffic control.

Want to see what's being written in instant messenger and chat communications? IM.Echo's Quick Link function allows you to do this by restoring both outgoing and incoming text. It also creates an activity history for you to review.

IM Echo Chat Monitor Diagram

We were thinking "enterprise" when we created IM.Echo. It includes a report manager that generates customizable analytics for groups and users. To prevent leaks that are confidential or personal, the product includes a text pattern analyzer. The need to control instant messaging activity is clear: while it's a handy tool for communications across the network, it can be a cybersecurity hole for insider threats as well as cause the loss of productivity when not used in in accordance with policy.

When chat and instant messaging are engaged in for personal use, a security hazard can result if users believe no record is being kept of their conversations. But when employees know that their usage is being tracked and archived, misuse immediately is reduced. Additionally, tracking and archiving protects a company against false-termination and discrimination lawsuits and maintains employee compliance with use policies.

IM.Echo Chat Control Software Requirements


  • Agent Workstation Hardware Requirements
    • Processor and Memory as specified by minimum Operating System requirements.
    • At least 100 MB of available disk space.
  • Agent Workstation Operating System Compatibility (32 or 64 bit, Host or Virtualized)
    • Windows 10, Windows 8, Windows 7
    • Windows Server 2016
    • Windows Server 2012, 2012 R2
    • Windows Server 2008 R2
    • Citrix Server, Microsoft Terminal Server (RDS)

Server Hardware Recommendations (Administration Machine)

  • A Windows server or workstation with a fixed IP address or Fully Qualified Domain Name (FQDN).
  • Example hardware specifications for a mid-size implementation (250 users) include:
    • Processor and Memory as specified by minimum Operating System requirements.
    • 1 GB RAM
    • At least 10 GB of free disk space
  • Operating Systems Compatibility (32 or 64 bit, Host or Virtualized)
    • Windows Server 2016
    • Windows Server 2012, 2012 R2
    • Windows Server 2008, 2008 R2
    • Windows Server 2003, including SP1 or later
    • Windows 10
    • Windows 8
    • Windows 7


Windows 10 Compatible  Server 2016 Compatible


IM.Echo Chat Monitoring Benefits

IM.Echo controls and archives all IM and Chat content and provides basic reporting so that administrators can maintain a log of IM activity including attempts to circumvent the module.

IM.Echo Benefits

Capture IM text for real time content review

Tailor IM access for specific Directory users, groups of users, or computers

Control users, groups of users or computer that are permitted to use IM to communicate outside the enterprise

Block or audit content based on IM address or keyword to stop inappropriate IM content from the user’s desktop or terminal session

Add controls on individuals, groups or computers at anytime using an intuitive administrative interface

Define IM-access time controls that lock-down machines or provide greater flexibility during lunch or after hours for day-extenders

Increase management's awareness by providing informative reports that are automatically generated and distributed to management, users and auditors

Take control of your network