Kriterium - Technology Management for Your Business
Home | Demos | What's New | Contact Us
Corporate Solutions Managed Services Products Training
 
GFI EndPointSecurity GFI EndPointSecurity

Network vulnerability scanning, patch management and auditing

 

Control network access and use of devices such as USB drives, iPods and PDAs
The proliferation of consumer devices such as iPods, USB drivers, smart phones and other portable devices has increased the risk of data leakage and malicious activity on networks. While most companies have anti-virus software, firewalls, email and web content security to protect against external threats, few realize how easy it is for an employee to copy huge amounts of sensitive data onto an iPod or USB stick. There is also a risk of viruses or malware and illegal software being introduced on the network. One way to prevent this from happening is to lock down all ports but this is neither sustainable nor advised.

Prevent data theft and virus infection from within with endpoint security software
Unfortunately, many businesses are unaware of or ignore the threat until something actually happens. According to research conducted by eMedia on behalf of GFI in the US, few medium-sized businesses consider portable storage devices to be a major threat while fewer than 20% had implemented software to address this risk. The key to managing portable device use is to install an endpoint security solution that gives administrators control over what devices are in use, have been used and by whom and in-depth knowledge of what data has been copied.

Control portable device use on your network with GFI EndPointSecurity
GFI EndPointSecurity allows administrators to actively manage user access and log the activity of:

  • Media players, including iPods, Creative Zen and others
  • USB drives, CompactFlash, memory cards, CDs, floppies & other portable storage devices
  • PDAs, BlackBerry handhelds, mobile phones, smart phones and similar communication devices
  • Network cards, laptops and other network connections.
Download GFI MailEssentials

Why use GFI EndPointSecurity?

  • Prevents data leakage/theft by comprehensively controlling access to portable storage devices with minimal administrative effort
  • Prevents introduction of malware and unauthorized software on the network
  • Gives administrators greater control by being able to block devices by class, file extensions, physical port or device ID
  • Allows administrators to grant temporary device or port access for a stipulated time-frame
  • Support for 32 & 64-bit platforms: Including Windows Vista and latest RC of Windows Server 2008.


 
 
Live chat Available
 
  GFI MailEssentials
  GFI MailSecurity
  GFI WebMonitor
  GFI MailArchiver
  GFI FAXmaker
  GFI LANguard
  GFI EventsManager
  GFI EndPointSecurity
  GFI Network Security Monitor
  GFI PCI Suite
 
 
Home | Corporate | Solutions | Managed Services | Products | Training | Contact Us
ShoreTel SonicWall APC GFI
 
Terms & Conditions | Privacy Statement
Copyright 2014 Kriterium, LLC. All rights reserved.