Avatar of Marius Gunnerud
Marius GunnerudFlag for Norway

asked on 

Scanning Links in Instant Messangers

I was wondering if products such as Cisco IronPort or McAfee Secure Messaging Gateway (or any other similar product) have the ability to scan links within an Instant Messanger.

My research so far has turned up nothing so I am assuming it is not possible, but am posting here as a last resort.

Thanks in advance.
Anti-Virus AppsChat / IMSecurity

Avatar of undefined
Last Comment
daveTechSearch
Avatar of daveTechSearch
daveTechSearch
Flag of Canada image

Are you asking if these appliances actually scan the contents of the IM itself?

These appliances will definately take action if a user clicks on the link to navigate to it (as long as the traffic flows through it).

Or are you asking if the link will be scanned on an IM conversation that was established through one of these (internal user chatting with a 3rd party)?
Avatar of Marius Gunnerud

ASKER

Thanks for the reply, I know that both of these will kick into action if a link is clicked on, I was thinking more along the lines if there was an app or technology that can actively scan the IM.
Avatar of Marius Gunnerud
Marius Gunnerud
Flag of Norway image

ASKER

Just to add, it will be to scan messages sent to and from the likes of MSN, Yahoo messanger...etc. is this possible?
ASKER CERTIFIED SOLUTION
Avatar of daveTechSearch
daveTechSearch
Flag of Canada image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Security
Security

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.

32K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo