TechArts

Home | Products | Price List | Downloads | Support | Feedback | Reseller Area | Contact Us | View Cart   

Search:   
Check out
our line of

Serial ATA Drive Drawers (Mobile Racks)
Caddyless
Drive Drawers!
PRODUCT GROUPS
2X ApplicationServer XG
Dialogic Brooktrout SR140 Fax Technology
Dialogic Brooktrout TR1034 Fax Boards
Dialogic Brooktrout TruFAX Fax Boards
GFI Cloud - Antivirus
GFI Cloud - Monitoring
GFI Cloud - Patch Management
GFI Cloud - Remote Control
GFI Cloud - Web Protection
GFI EndPointSecurity
GFI EventsManager
GFI FAXmaker
GFI LANguard NSS
GFI MailArchiver
GFI MailEssentials
GFI MailEssentials Online
GFI WebMonitor
ThreatTrack VIPRE


The need to control entry and exit of data via USB sticks, iPods, PDAs and other devices

You have invested in network anti-virus software, firewalls, email and web content security to protect against external threats. Yet any user can come into the office, plug in a USB stick the size of the average keychain and take in/out over 2 GB of data. This poses a tremendous threat: Users can take confidential data or they can unknowingly introduce viruses, trojans, illegal software and more – actions that can affect your network and company severely. Yet, as an administrator you have no way to control this! Group policy offers no control.

According to a 2005 FBI Computer Crime Survey, 44% of organizations have reported network intrusions from within their own organizations. Technology analyst Gartner warns that portable devices containing a USB or FireWire connection are a serious new threat to businesses. In their report, Gartner named removable media devices as a significant security risk in the workplace and advised that these can be used both to download confidential data, and also to introduce a virus into the company network.

Regain control with GFI EndPointSecurity

GFI EndPointSecurity allows administrators to actively manage user access to:

  • Media players, including iPod, Creative Zen and others
  • USB sticks, CompactFlash, memory cards, CDs, floppies & other storage devices
  • PDAs, BlackBerry handhelds, mobile phone and similar communication devices
  • Network cards, laptops and other network connections.
 Why choose GFI EndPointSecurity?
> Secure your network by ensuring users don’t introduce viruses and other malware
> Stop the alarming rate of insider data theft
> Increase employee productivity by preventing them from bringing other work, games or personal projects to their workplace
> Prevent users from introducing illegal or unauthorized software on their machines
> Easy–group based management.
 

How it works

To control access, GFI EndPointSecurity installs a small footprint agent on the machine. This agent is only 1.2 MB in size – the user will never know it is there. GFI EndPointSecurity includes a remote deployment tool based on GFI LANguard technology, allowing you to deploy the agent to hundreds of machines with just a few clicks. After installation, the agent queries Active Directory when the user logs on and sets permissions to the different nodes accordingly. If the user is not a member of a group that allows him/her access, then access to the device is blocked.

Controls access to portable storage media like USB memory sticks, SD cards (used by digital cameras) and more

USB sticks are one of the main threats as they are small, easily hidden and can store up to 4 GB of data. GFI EndPointSecurity recognizes USB storage sticks in addition to any device that can be mounted as a hard disk (whether accessed via USB, FireWire, etc.). For example, plugging a digital camera into a USB port gives users access to storage on an SD card; SD cards are available in several sizes including 2 GB and over.

Controls access to CDs and floppies

You can centrally disable users from reading or writing data to/from a CD or floppy. This way, you can block normal users from bringing in data that could be harmful to your network, such as viruses, trojans and other malware. Although you can switch off CD and/or floppy access from the BIOS, in reality this solution is impractical: You would have to physically visit the machine to temporarily switch off protection and install software. In addition, advanced users can hack the BIOS.

NEW! – Protect your network against the threats posed by non-removable media devices

GFI EndPointSecurity protects your network against non-removable media devices by allowing you to lock down a machine to a specific hardware level, guaranteeing protection against Bluetooth devices, network cards and more.

Easily configure group-based protection control via Active Directory

You can configure and categorize computers into different protection groups: For each group you may specify different levels of protection and devices to allow or disallow access to. You can also leverage the power of groups and make an entire department a member of the group and easily change the settings for the entire group. Configuration of GFI EndPointSecurity is effortless and leverages the power of Active Directory and does not require the administrator to remember and keep track of which policies were deployed to which computers. Other storage control software requires cumbersome per-machine administration, forcing you to make the changes on a per-machine basis and update the configuration on each machine before the settings can take effect.

NEW! – Granular access control

Configure whether a user should be granted read/write access or both access capabilities for the following types of devices: Removable media, CD, DVD, floppies and other devices running a file system.

NEW! – Log device-related user activity

With GFI EndPointSecurity you can log device-related user activity to both the event log and a central SQL Server. A list of files accessed to/from the device is recorded whenever users plug in devices both successfully and unsuccessfully.

Includes remote deployment tool

The GFI EndPointSecurity remote deployment tool can deploy the agent network-wide in a few minutes. You can configure to deploy domain-wide, per computer or to a list of computers.

Centralized control facilitates temporary access

Because you can easily add/remove a user to a group in Active Directory, it is simple to grant temporary access to a removable media, floppy or CD. Temporary access may be occasionally required, but should not mean that you cannot control access the rest of the time.

Other features:
  • Support for operating systems in any Unicode-compliant language
 
System requirements:
  • Windows 2000/2003 or Windows XP Pro.
 
Global Distributor of Technology Solutions

TechArts
5701 E Circle Dr # 390
Cicero, NY  13039-8638  USA

sales@techarts.com
Phone: 315-350-3755
Fax: 315-362-9501

To report problems with this page or website, please email sales@techarts.com.
COPYRIGHT XYMITH, LLC dba TECHARTS 1992-2014 - ALL RIGHTS RESERVED. Legal Notices