Prevent data leakage to portable devices
Assess the risk and mitigate it by controlling, auditing and securing access to removable devices at endpoint level.
Protect your network from threats posed by portable devices
GFI EndPointSecurity reduces risk of data leaks and other malicious activity
Prevent the risk of data leakage
Bring your own device (BYOD) and portable storage device use in the workplace significantly increase the likelihood of your business facing data leakage issues. GFI EndPointSecurity features risk assessment capabilities that identify assets possibly doubling as sources of data leaks. All functionality is built into a dashboard that provides relevant information, suggestions for boosting protection, and shortcuts to common security tasks.
Assess and control information that travels across endpoints
The data awareness module provides another layer of endpoint protection by scanning each relevant file and searching for the most common types of information susceptible to a security breach (e.g. SSNs, PANs, etc.). The module supports inputs in the form of regular expressions and dictionary files. It also contributes to your data loss prevention (DLP) and compliance efforts.
Easily control access to portable storage devices
From a single location, easily grant temporary network or workstation access to portable storage devices for a set period of time as well as block devices by class, file extension, physical port or device ID.
More benefits
File control
Use enhanced file control capabilities to scan archived files and block files based on size.
Detailed reports
Log detailed statistics about all activity and send automatic daily or weekly digest reports.
Automatic protection
Automatically protect newly detected computers by deploying an agent and a default blocking policy.
Centralized monitoring
View all computers on your network from a single location and identify the connected storage devices.
Features
Encryption for portable devices
Encrypt data on USB storage devices to ensure data is not stolen from your organization – even while on the road.
Computer auto-discovery
Keep informed about new computers that are connected to the network and apply automatic protection.
Portable device usage reporting
Generate detailed reports on device usage – including actual file names transferred to and from devices – with the GFI ReportPack™ add-on.
Group-based protection configuration
Easily configure group-based protection control via active directory.
Status monitoring and alerts
Receive real-time status monitoring and alerts through GFI EndPointSecurity’s user interface.
Activity logs
Log the activity of portable device access to your network.
Agent deployment
Automatically schedule agent deployment after a policy or configuration change.
Whitelisting and blacklisting
Get advanced granular access control with whitelists and blacklists.
Supports Windows® 8
GFI EndPointSecurity offers tamper-proof agent with support for Windows 8.
© Copyright 2000-2023 COGITO SOFTWARE CO.,LTD. All rights reserved