gfi logo

HOSTED Services

ControlNow

trynow

 

 

EndPointSecurity

Protect your network from the threats posed by portable devices

The proliferation of consumer devices such as iPod®s, USB devices and smartphones has dramatically increased the risk of deliberate and unintentional data leaks and other malicious activity: It is very simple for an employee to copy large amounts of sensitive data onto an iPod or USB stick, or to introduce malicious and illegal software onto your network through these devices. GFI EndPointSecurity™ quickly and easily helps you combat these critical threats without needing to lock down all ports.

Assess endpoint data leakage risk

GFI EndPointSecurity enables data leakage risk assessment by monitoring the removable devices used at endpoint level,t heir type, their activity and what protective measures are in place.

Data-aware file monitoring

GFI EndPointSecurity provides enhanced file monitoring capabilities for files transiting the endpoints via removable devices based on file type and content. The content checking module takes regular expressions or dictionary files as input and can search within most popular document formats. The product ships by default with intelligence to detect security sensitive information such as account numbers, ID card numbers, etc

Protect your network

GFI EndPointSecurity helps prevent the introduction of viruses, malware and other unauthorized software to your network by blocking access to a wide variety of devices such as USB sticks, iPods and smartphones.

Control access

Prevent data leaks by comprehensively controlling access to portable storage devices with minimal administrative effort. Temporary access can be granted to users for a device (or group of devices) on a particular computer for a particular timeframe.

Encrypt removable devices

GFI EndPointSecurity can be set up to enforce encryption on removable USB storage devices.

Prevent data theft

Most data theft happens by employees manually transferring it onto devices. Controlling access to computers helps you prevent this.

Take control of your network

You can block devices by class, file extensions, physical port or device ID from a single location, while granting temporary device or port access for a stipulated timeframe.

Centralize monitoring

View all computers on your network from a single location, and benefit from GFI EndPointSecurity’s detection of connected devices and its ability to perform tasks.

Automatic protection

Automatically protects newly detected computers by deploying an agent and a default blocking policy.

Generates detailed reports

Logs detailed statistics about all activity and can send automatic daily or weekly digests.

Control portable device access to your network with GFI EndPointSecurity

GFI EndPointSecurity enables administrators to actively manage user access and log the activity of:

  • Media players, including iPods, Creative Zen and others
  • USB drives, CompactFlash, memory cards, CDs, floppies andother portable storage devices
  • iPhone, BlackBerry and Android handhelds, mobile phones, smartphones and similar communication devices
  • Network cards, laptops and other network connections.