Protect your network from the threats posed by portable devices
The proliferation of consumer devices such as iPods, USB devices and smartphones has dramatically increased the risk of deliberate and unintentional data leaks and other malicious activity: It is very simple for an employee to copy large amounts of sensitive data onto an iPod or USB stick, or to introduce malicious and illegal software onto your network through these devices. GFI EndPointSecurity™ quickly and easily helps you combat these critical threats without needing to lock down all ports.
Protect your network
GFI EndPointSecurity helps prevent the introduction of viruses, malware and other unauthorized software to your
Control access
Prevent data leaks by comprehensively controlling access to portable storage devices with minimal
Encrypt removable devices
GFI EndPointSecurity can be set up to enforce encryption on removable USB storage devices.
Prevent data theft
Most data theft happens by employees manually transferring it onto devices. Controlling access to
Take control of your network
You can block devices by class, file extensions, physical port or device ID from a single location, while granting
Centralize monitoring
View all computers on your network from a single location, and benefit from GFI EndPointSecurity’s detection of
Automatic protection
Automatically protects newly detected computers by deploying an agent and a default blocking policy.
Generates detailed reports
Logs detailed statistics about all activity and can send automatic daily or weekly digests.
Control portable device access to your network with GFI EndPointSecurity
GFI EndPointSecurity enables administrators to actively manage user access and log the activity of:
- Media players, including iPods, Creative Zen and others
- USB drives, CompactFlash, memory cards, CDs, floppies andother portable storage devices
- iPhone, BlackBerry and Android handhelds, mobile phones, smartphones and similar communication devices
- Network cards, laptops and other network connections.
|