Stellar Technologies offers its Stellar Internet Monitoring product as a way for companies to monitor employee Internet usage and policy violations.Stellar Technologies offers its Stellar Internet Monitoring product as a way for companies to monitor employee Internet usage and policy violations. Stellar IM monitors instant messaging, but it is only a part of the entire system. The system also monitors Web surfing and other HTTP activity.Although Stellar IM is not designed to manage IM usage or enforce policies, it does log IM sessions conducted on Yahoo, AOL Instant Messenger and MSN, and lets administrators review and search the archives. If an employee breaches a policy, such as sending or receiving a file via IM session, Stellar IM will send an e-mail alert to an administrator.We set up an account with Stellar’s Web-based service. The user portal is attractive and easy to use. The system lets administrators set up an organization account, map users (employees) manually or automatically via IP address. A directory of people is generated based on their logon names used when signing onto their corporate network. The Stellar IM system we tested is optimized for environments where a software application can sit on a server (shared or dedicated) and sniff traffic as it enters and leaves the network. With the Web-based service and Enterprise edition, the sniffing agents can be distributed at several points in a corporate network to capture information about traffic on different network segments. All agents automatically communicate in real time with the Stellar IM management application via a Secure Sockets Layer tunnel.The strength of the system is that the management application can be hosted by Stellar, and is accessible to network account owners via the Internet with a standard Web interface. One feature that might interest the business side of your company is the ability to generate a report that shows the amount of corporate resources spent on a particular task (or Web site visited) based on an average hourly wage entered in the calculator. While it has merits, we would not recommend this for a technologically astute employee base. The architecture can be circumvented easily through a VPN connection. The VPN would then carry Internet traffic using any encryption that is not controlled by central IT, and IM sessions (or any Internet activity) could continue without Stellar technology detection, as it cannot see inside of the encrypted tunnel. Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions Industry news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Network Security Network Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe