GFI EndPointSecurity v.4.3.20110125

Advertisement
Advertisement

Protect your network from portable devices such as USB drives, iPods and smartphonesAccording to the Ponemon Institute, 59% of people who lost their job admitted to taking confidential company information with them either on DVD or using USB drives. The proliferation of consumer devices such as iPods, USB devices, smartphones and more, has dramatically increased the risk of intentional and unintentional data leaks and other malicious activity.While most companies have antivirus software, firewalls, email and web content security to protect against external threats, few realize how easy it is for an employee to simply walk in and copy large amounts of sensitive data onto an iPod or USB stick. There is also an increased risk of malicious and other illegal software introduction to your network through these devices. Of course your administrator could lock down all ports - an ill-advised, difficult and unsustainable solution.Top FeaturesFREEWARE version available - See how vulnerable your organization is to such breaches:In freeware mode, functionality is limited to monitoring only but there is no limit on the number of agents that can be deployed, so administrators can immediately see what is happening on monitored machines.Manage user access and protect your network from portable devices Using GFI EndPointSecurity you can centrally disable access to any portable device, preventing both data theft and the introduction of data or software that could be harmful to your network.Computer auto-discovery and automatic protectionGFI EndPointSecurity can monitor the network, detect new computers that are connected onto the network, notify the administrator, and perform various tasks as configured by the administrator.Get detailed reports on device usage with GFI EndPointSecurity ReportPackd-OC?D? add-onThe GFI EndPointSecurity ReportPack is a powerful reporting package that adds on for free to GFI EndPointSecurity.Log the activity of portable device access to your networkUSB sticks present a significant threat to your business environment. They are small, easily hidden and can store up to 16 GB of data.Advanced granular access control via whitelists and blacklistsGFI EndPointSecurity enables you to allow or deny access to a range of device classes, as well as to block files transferred by file extension, by physical port and by device ID (the factory ID that identifies each device).Easy unattended agent deploymentGFI EndPointSecurity provides administrators with the ability to automatically schedule agent deployment after a policy or configuration change.Policy creation wizardTo facilitate the creation of security policies, GFI EndPointSecurity includes a wizard to create security policies. Administrators can also create new policies based on existing ones.Other features:- Ability to group computers, e.g., by department, by domain, etc.- Scan and detect a list of devices that have been used or are currently in use- Password protected agents to avoid tampering- Set up custom popup messages for users when they are blocked from using a device- Browse user activity and device usage logs through a backend database- Maintenance function that allows you to delete information that is older than a certain number of days- Support for operating systems in any Unicode compliant language

Protect your network from portable devices ... Network-wide control of portable devices such as USB drives.

blacklists, enables, range, control, easily, hidden, store

 
  • GFI EndPointSecurity
  • 4.3.20110125
  • GFI
  • WinXP, Win Vista, Windows 7
  • Shareware
  • 12.56 Mb
  • 207
  • $297.50
 
 

Review GFI EndPointSecurity

  • captcha
 
 
New Security software
  • Elcomsoft Phone Breaker  v.9.70Perform logical and cloud extraction of Apple iOS devices with of the most advanced mobile forensic tools on the market. Retrieve information remotely via iCloud with or without Apple ID and password, decrypt iOS backups and FileVault 2 volumes ...
  • Omega Core Audit  v.3.3.1Access Control, Continuous Audit Monitoring and Real-Time Protection for Oracle databases. Security applied at the core - from within the database, Duty Separation, control for Privileged Accounts, Splunk SIEM built-in integration.
  • PWMinder Desktop  v.3.2.0.3PWMinder is a Password Manager that is used to store passwords and other sensitive data in a secure encrypted file. Includes a configurable Password Generator, Encryption Tool and ability to automatically log in to web sites.
  • Active@ ZDelete  v.9.0.7Active@ ZDelete is a secure delete utility. It helps you to permanently delete files, drives and folders. Active@ ZDelete conforms to the US Department of Defense clearing and sanitizing standard DoD 5220.22-M.
  • CAD Services  v.1.0This tool calculates CHMOD, a number that determines web file permissions ...
  • Password Generator 2010  v.2.0.1000Generate millions of unique strong random passwords, numbers, masked codes, pronounceable passwords, usernames, and more.