010-68421378
sales@cogitosoft.com
Categories
AddFlow  AmCharts JavaScript Stock Chart AmCharts 4: Charts Aspose.Total for Java Altova SchemaAgent Altova DatabaseSpy Altova MobileTogether Altova UModel  Altova MapForce Altova MapForce Server Altova Authentic Aspose.Total for .NET Altova RaptorXML Server ComponentOne Ultimate Chart FX for SharePoint Chart FX CodeCharge Studio ComponentOne Enterprise combit Report Server Combit List & Label 22 Controls for Visual C++ MFC Chart Pro for Visual C ++ MFC DbVisualizer version 12.1 DemoCharge DXperience Subscription .NET DevExpress Universal Subscription Essential Studio for ASP.NET MVC FusionCharts Suite XT FusionCharts for Flex  FusionExport V2.0 GrapeCity TX Text Control .NET for WPF GrapeCity Spread Studio Highcharts Gantt Highcharts 10.0 版 HelpNDoc Infragistics Ultimate  ImageKit9 ActiveX ImageKit.NET JetBrains--Fleet JetBrains-DataSpell JetBrains--DataGrip jQuery EasyUI jChart FX Plus OPC DA .NET Server Toolkit  OSS ASN.1/C Oxygen XML Author  OSS 4G NAS/C, C++ Encoder Decoder Library OSS ASN.1 Tools for C with 4G S1/X2 OSS ASN.1/C# OSS ASN.1/JAVA OSS ASN.1/C++ OPC HDA .NET Server Toolkit OPC DA .Net Client Development Component PowerBuilder redgate NET Developer Bundle Report Control for Visual C++ MFC  Sencha Test SPC Control Chart Tools for .Net Stimulsoft Reports.PHP Stimulsoft Reports.JS Stimulsoft Reports.Java Stimulsoft Reports. Ultimate Stimulsoft Reports.Wpf Stimulsoft Reports.Silverlight SlickEdit Source Insight Software Verify .Net Coverage Validator Toolkit Pro for VisualC++MFC TeeChart .NET Telerik DevCraft Complete Altova XMLSpy Zend Server

GFI EndPointSecurity

Prevent data leakage to portable devices

Assess the risk and mitigate it by controlling, auditing and securing access to removable devices at endpoint level.

Protect your network from threats posed by portable devices

GFI EndPointSecurity reduces risk of data leaks and other malicious activity

  • Data leakage risk assessment
  • Data awareness
  • Access control

Prevent the risk of data leakage

Bring your own device (BYOD) and portable storage device use in the workplace significantly increase the likelihood of your business facing data leakage issues. GFI EndPointSecurity features risk assessment capabilities that identify assets possibly doubling as sources of data leaks. All functionality is built into a dashboard that provides relevant information, suggestions for boosting protection, and shortcuts to common security tasks. 

Assess and control information that travels across endpoints

The data awareness module provides another layer of endpoint protection by scanning each relevant file and searching for the most common types of information susceptible to a security breach (e.g. SSNs, PANs, etc.). The module supports inputs in the form of regular expressions and dictionary files. It also contributes to your data loss prevention (DLP) and compliance efforts. 

Easily control access to portable storage devices

From a single location, easily grant temporary network or workstation access to portable storage devices for a set period of time as well as block devices by class, file extension, physical port or device ID.

More benefits

File control

Use enhanced file control capabilities to scan archived files and block files based on size.

Detailed reports

Log detailed statistics about all activity and send automatic daily or weekly digest reports.

Automatic protection

Automatically protect newly detected computers by deploying an agent and a default blocking policy.

Centralized monitoring

View all computers on your network from a single location and identify the connected storage devices.

Features

Encryption for portable devices

Encrypt data on USB storage devices to ensure data is not stolen from your organization – even while on the road.

 

Computer auto-discovery

Keep informed about new computers that are connected to the network and apply automatic protection.

 

Portable device usage reporting

Generate detailed reports on device usage – including actual file names transferred to and from devices – with the GFI ReportPack™ add-on.

 

Group-based protection configuration

Easily configure group-based protection control via active directory.

 

Status monitoring and alerts

Receive real-time status monitoring and alerts through GFI EndPointSecurity’s user interface.

 

Activity logs

Log the activity of portable device access to your network.

 

Agent deployment

Automatically schedule agent deployment after a policy or configuration change.

 

Whitelisting and blacklisting

Get advanced granular access control with whitelists and blacklists.

 

Supports Windows® 8

GFI EndPointSecurity offers tamper-proof agent with support for Windows 8.

Quick Navigation;

© Copyright 2000-2023  COGITO SOFTWARE CO.,LTD. All rights reserved