Control network access and use of devices such as USB drives, iPods and PDAs
The proliferation of consumer devices such as iPods, USB drivers, smart phones and other portable devices has increased the risk of data leakage and malicious activity on networks. While most companies have anti-virus software, firewalls, email and web content security to protect against external threats, few realize how easy it is for an employee to copy huge amounts of sensitive data onto an iPod or USB stick. There is also a risk of viruses or malware and illegal software being introduced on the network. One way to prevent this from happening is to lock down all ports but this is neither sustainable nor advised.
Prevent data theft and virus infection from within with endpoint security software
Unfortunately, many businesses are unaware of or ignore the threat until something actually happens. According to research conducted by eMedia on behalf of GFI in the US, few medium-sized businesses consider portable storage devices to be a major threat while fewer than 20% had implemented software to address this risk. The key to managing portable device use is to install an endpoint security solution that gives administrators control over what devices are in use, have been used and by whom and in-depth knowledge of what data has been copied.
Control portable device use on your network with GFI EndPointSecurity
GFI EndPointSecurity allows administrators to actively manage user access and log the activity of:
- Media players, including iPods, Creative Zen and others
- USB drives, CompactFlash, memory cards, CDs, floppies & other portable storage devices
- PDAs, BlackBerry handhelds, mobile phones, smart phones and similar communication devices
- Network cards, laptops and other network connections.
Why use GFI EndPointSecurity?
- Prevents data leakage/theft by comprehensively controlling access to portable storage devices with minimal administrative effort
- Prevents introduction of malware and unauthorized software on the network
- Gives administrators greater control by being able to block devices by class, file extensions, physical port or device ID
- Allows administrators to grant temporary device or port access for a stipulated time-frame
- Support for 32 & 64-bit platforms: Including Windows Vista and latest RC of Windows Server 2008.
|