GFI EndPointSecurity, 4000 users ESEC4000 Benutzerhandbuch

Produktcode
ESEC4000
Seite von 3
Network-wide control of iPods, USB drives and other portable devices
GFI EndPointSecurity allows administrators to actively manage user access and log the activity of:
· Media players, including iPods, Creative Zen and others
· USB drives, CompactFlash, memory cards, CDs, floppies & other portable storage devices
· PDAs, BlackBerry handhelds, mobile phone and similar communication devices
· Network cards, laptops and other network connections.
Control user access and protect your network against
the threats posed by portable storage media
How it works
To control access, GFI EndPointSecurity installs a small
footprint agent on the machine. This agent is only 1.2 MB in
Using GFI EndPointSecurity you can centrally disable users
from accessing portable storage media preventing users from
size – the user will never know it is there. GFI EndPointSecurity
stealing data or bringing in data that could be harmful to your
includes a remote deployment tool based on GFI LANguard
network, such as viruses, trojans and other malware. Although
technology, allowing you to deploy the agent to hundreds of
you can switch off portable storage devices such as CD and/or
machines with just a few clicks. After installation, the agent
floppy access from the BIOS, in reality this solution is
queries Active Directory when the user logs on and sets
impractical: You would have to physically visit the machine to
permissions to the different nodes accordingly. If the user is
temporarily switch off protection and install software. In
not a member of a group that allows him/her access, then
access to the device is blocked.
addition, advanced users can hack the BIOS. GFI
EndPointSecurity allows you to take control over a wide variety
of devices including:
Benefits
· Floppy disks
· CDs and DVD ROMs
· iPods
· Storage devices
· Printers
· PDAs
· Network adapters
· Modems
· Imaging devices
· And more!
Why choose GFI EndPointSecurity?
· Blocks insider data theft by fully controlling access
to portable storage devices like memory cards, CDs,
USB drives and more
· Prevents the introduction of viruses and unauthorized
software by controlling all endpoint connectable
devices such as PDAs, laptops and more
· Allows administrators to exercise group-based
control over a wide array of portable devices without
affecting authorized users
Log the activity of portable storage media like USB
memory sticks, SD cards and more
USB sticks are one of the main threats as they are small, easily
hidden and can store up to 4 GB of data. For example, plugging
· Prevents productivity loss by blocking unauthorized
uploads of games and other personal files from
portable storage devices
· Ships with three protection policies: for laptops,
workstations and servers.
a digital camera into a USB port gives users access to storage
on an SD card; SD cards are available in several sizes
including 2 GB and over. In addition to blocking access to
portable storage media, GFI EndPointSecurity logs
device-related user activity to both the event log and a central
SQL Server. A list of files that have been accessed and
transferred to/from the device is recorded whenever a user
plugs in a device to the network.