A Targeted Cybersecurity Solution to Employee IM and Chat Usage
IM.Echo provides network administrators with an efficient means to capture, block and allow IM and Chat usage in their network. The module enables administrators to control IM traffic based on an approved list of contacts. IM.Echo allows you to manage the most popular IM software applications and all chat applications that conform to the standard IRC (Internet relay chat) and SIP protocols. IM.Echo's Quick Link™ feature restores the text of incoming and outgoing Chat and IM items, allowing you to maintain a history of all activity for review.
Enterprise-ReadyIM.Echo was designed with the enterprise in mind. The IM.Echo Report Manager consists of informative reports that can be customized for your existing Domain users and groups. The Pearl Echo Report Manager allows users to run reports interactively or to schedule reports to be automatically generated and distributed. For larger data handling needs, IM.Echo easily integrates with MS SQL Server. If your organization includes a server-centric computing environment, keep in mind that IM.Echo is the only chat and IM management software that is certified and fully functional in a Citrix & Microsoft Terminal Services environment.
Grows with your BusinessIM.Echo is packed with features for the large enterprise but remains based upon the core needs of your growing business. Features like automated deployment, an intuitive standards-based administration console, server-optional setup and self-administering workstation agents allow IM.Echo to meet the needs of any size organization.
IM.Echo features a keyword and text pattern blocking option which helps safeguard against the dissemination of personal or confidential information. Pearl Echo acts as the enforcement behind your organization's Acceptable Use Policy. All communications can be archived for rapid retrieval, protecting organizations from laws suits related to false termination, discrimination-based claims and regulation compliance.
IM.Echo provides a secure installation option to protect against unauthorized circumvention. IM.Echo is so efficient that users notice no degradation of access speeds and detect no obvious process or files on their workstations.
ControlsIM.Echo provides administrator-defined Allow and Block lists for instances where user IM access needs to be limited. IM.Echo also allows you to set various IM access profiles based on time of day - perfect when you need to provide some flexibility for your day-extenders.
Provides Complete Flexibility
Managed users can be connected to your local area network, wide area network, or be completely detached from your private network. IM.Echo runs as an independent service eliminating reliance on legacy proxy servers or integration issues with firewalls or multiple subnets. IM.Echo's architecture scales well and allows you to monitor any form of Internet connection - anywhere. IM.Echo manages Internet access by Windows user, group and computer names. Administration is streamlined by optionally integrating into your Windows Domain or Stand-alone server structure. Unlimited access Profiles can be created to provide varying levels of management for your existing Directory users, groups and computers.
Download a Free Trial ...to get a hands-on look at Pearl Echo's features and functions
Start the Pearl Echo.Suite Product Video Tour ...to get a quick look at Pearl Echo's capabilities without installing.
View Pearl Software vs. Competition ...to see how Pearl Software stacks up to the competition.
Request a Quote ...to receive personalized pricing that matches your requirements.