, ! .


»  »  » GFI EndPointSecurity v4.1.20090528


GFI EndPointSecurity v4.1.20090528

1 2 2

1

GFI EndPointSecurity - iPod, USB- .
2005 44% . Gartner , , USB- FireWire- . Gartner , , . GFI EndPointSecurity , iPod, Creative Zen , USB-, CompactFlash, , -, - , PDA, BlackBerry, , , .

The proliferation of consumer devices such as iPods, USB devices, Smart Phones and more, has dramatically increased the risk of intentional and unintentional data leaks and other malicious activity. While most companies have anti-virus software, firewalls, email and web content security to protect against external threats, few realize how easy it is for an employee to simply walk in and copy large amounts of sensitive data onto an iPod or USB stick. There is also an increased risk of malicious and other illegal software introduction to your network through these devices. Of course your administrator could lock down all ports, an ill-advised, difficult and unsustainable solution.

Many businesses are unaware of, or choose to ignore, the threat presented by portable devices in their network environment until some event, ranging from unfortunate to catastrophic, happens. According to eMedia research, few small to medium sized businesses consider portable storage devices to be a major threat; with fewer than 20% having implemented software to mitigate the risk. The key to managing portable devices in your business environment is to give your administrators direct control over what devices are in use on your network. With GFI EndPointSecurity you not only gain control over what is in use but you also know what has been used and by who, and most importantly you gain in-depth knowledge of what data has been copied.

GFI EndPointSecurity allows administrators to actively manage user access and log the activity of:
Media players, including iPods, Creative Zen and others
USB drives, CompactFlash, memory cards, CDs, floppies & other portable storage devices
PDAs, BlackBerry handhelds, mobile phones, smart phones and similar communication devices
Network cards, laptops and other network connections.

Why Choose GFI EndPointSecurity?
Prevent data leaks and theft by comprehensively controlling access to portable storage devices with minimal administrative effort
Prevent introduction of malicious and other unauthorized software to the network
Gives administrators greater control - you can block devices by class, file extensions, physical port or device ID
Allows administrators to grant temporary device or port access for a stipulated timeframe
Support for 32 & 64-bit platforms: Including Windows Vista and latest RC of Windows Server 2008.

Features:
Control user access and protect your network against the threats posed by portable storage media
Log the activity of portable storage media like USB memory sticks, SD cards and more
Easily configure group-based protection control via Active Directory
Advanced granular access control, whitelists and blacklists
Real-time status monitoring and real-time alerts
Get full reports on device usage with the GFI ReportPackTM add-on
Tamper-proof agent
Easy unattended agent deployment
Permit temporary device access
Scan and detect a list of devices that have been used or are currently in use
Password protected agents to avoid tampering
Set up custom popup messages for users when they are blocked from using a device
Browse user activity and device usage logs through a backend database
Maintenance function that allows you to delete information that is older than a certain number of days
Support for operating systems in any Unicode compliant language

, , - . , USB- / 80 . : , , . , . , ! , USB .

GFI EndPointSecurity . 1,2 , . GFI EndPointSecurity , GFI LANguard, . Active Directory . , , .

GFI EndPointSecurity, , , , , , . , CD-ROM , BIOS, : . , BIOS. GFI EndPointSecurity .

GFI EndPointSecurity:
, , -, USB- .
, , PDA, .
,
,
: ,

:
,
, USB, SD- ..
Active Directory

GFI ReportPack


,

0

2


»  »  » GFI EndPointSecurity v4.1.20090528