However, we asked our experts to also consider "promising" channels, which today may look, in the words of Sergey Bespalov, exotic - they are more typical for deliberate actions of intruders. The share of leaks through these channels in the total volume is small, but they are often used in targeted attacks and cause the greatest damage.
it is easier to prohibit the use of "exotic" channels or control them with other means of protection than to select a DLP system that has the functionality to prevent leaks through them. He sees control of mobile devices, instant messengers, and virtual infrastructure as important areas for the development of the functionality of Russian DLP systems.
Vladimir Ulyanov believes that the current task ukraine whatsapp data the active penetration of cloud technologies into the corporate environment is control of information in cloud storage. He believes that the solution to this problem will also contribute to the acceleration of the development of cloud services themselves: until cloud technology providers implement adequate information protection technologies in their products and confirm their responsibility for a possible leak, corporate clients will be cautious in using their offers.
According to Sergey Vakhonin, the most actively developing channels are "consumer goods" aimed at creating convenience for users and not interacting with corporate information security tools. But the question is whether users need these "modern channels" to perform business tasks.