GFI EndPointSecurity, 3000 users ESEC3000 Manuale Utente

Codici prodotto
ESEC3000
Pagina di 3
Easily configure group-based protection control via Active Directory
You can configure and categorize computers into different protection groups: For each
group you may specify different levels of protection and devices to allow or disallow
access to. You can also leverage the power of groups and make an entire department
a member of the group and easily change the settings for the entire group. Configuration
of GFI EndPointSecurity is effortless and leverages the power of Active Directory and
does not require the administrator to remember and keep track of which policies were
deployed to which computers. Other storage control software requires cumbersome
per-machine administration, forcing you to make the changes on a per-machine basis
and update the configuration on each machine before the settings can take effect.
Granular access control
GFI EndPointSecurity enables you to allow or deny access to a device as well as to
assign read only or full access privileges (where applicable) over every supported
device (such as PDAs) on a user by user basis.
Get full reports on device usage with the GFI ReportPack add-on
The GFI EndPointSecurity ReportPack is a full-fledged reporting add-on to GFI
EndPointSecurity. This reporting package can be scheduled to automatically generate
graphical IT-level and management reports based on data collected by GFI
EndPointSecurity, giving you the ability to report on devices connected to the network,
device usage trends, files copied to and from devices (including actual names of files
copied!) and much more.
Includes remote deployment tool
The GFI EndPointSecurity remote deployment tool can deploy the agent network-wide
in a few minutes. You can configure to deploy domain-wide, per computer or to a list
of computers.
Centralized control facilitates temporary access
Because you can easily add/remove a user to a group in Active Directory, it is simple
to grant temporary access to a removable media, floppy or CD. Temporary access may
be occasionally required, but should not mean that you cannot control access the rest
of the time.
Other features:
GFI EndPointSecurity
GFI EndPointSecurity configuration
Allow/deny access to Active Directory groups
Easy network-wide deployment of agents
Configure which devices you wish to control
GFI EndPointSecurity ReportPack
Device usage report
· Support for operating systems in any Unicode-compliant language
You're in good company...
Many leading companies have chosen GFI EndPointSecurity. Here are just a few: Best
Western Sterling Inn, Fair Trades Ltd, Central Highlands Water, Aurum Funds and
many more.