If three years ago, information security specialists were concerned with solving the problem of monitoring communications in Skype, today, along with this channel (still relevant and creating an objective threat of data leaks), specialists take into account the risks of losing information through other popular messengers - WhatsApp, Viber, Telegram. In this area, DeviceLock DLP traditionally acts as a technological leader among other DLP systems. In the case of WhatsApp, a distinctive feature of which is the high-quality proprietary encryption of transmitted data, DeviceLock DLP today allows you to set individual (or user group) access policies to WhatsApp Web, as well as log the facts of its use. For the Viber messenger, the ability to selectively control and log chats and transferred files, including shadow copying, as well as logging connections and voice communications via Viber, has been implemented. Selectivity of control in this case means the ability not only to restrict access to the messenger for individual users and groups, but also, for example, to prohibit file transfer when allowing a chat.
DeviceLock's control capabilities for the Telegram messenger are much broader than those for WhatsApp and Viber. First of all, it detects and controls the use of both the web version of Telegram and the Telegram Desktop application. For the web version, DeviceLock DLP currently provides a unique opportunity among DLP solutions to set access control policies and connection logging. For the Telegram Desktop version, in addition to selective access control, it is possible to set detailed event logging and create shadow copies for all chats, regardless of whether it is a channel, a multi-chat, or a chat israel mobile database two interlocutors. Another unique opportunity is asynchronous content analysis of messages and files sent via Telegram Desktop, which allows for a prompt response to the specific content of the data sent. Finally, DeviceLock DLP is able to extract from Telegram correspondence and save in the log the real names of senders and recipients for logging and displaying in a dynamic graph of connections.
Using Digital Fingerprints in Content Filtering
The method of using digital fingerprints in DLP systems, which is based on comparing documents or files with so-called digital fingerprints - sets of alphanumeric strings (hashes), is one of the most accurate methods of identifying and protecting information. This method is especially effective for identifying slightly modified standard documents. For example, it allows you to easily identify completed contracts that differ only in the data of one of the parties; or to identify financial data stored in MS Office documents, business information stored in PDF files; or source code stored in text files. In addition, digital fingerprints can be used to identify and protect non-text files (such as images, drawings and multimedia files), as well as to identify data that is being copied from one file to another. Using digital fingerprints, you can detect both completely copied documents and individual fragments of documents, even if changes or distortions have been made to the document by adding "garbage" text.
Features of Telegram control in DeviceLock DLP
-
- Posts: 643
- Joined: Sun Jan 19, 2025 7:57 am