Панель управления

  1. Регистрация на сайте

Популярное

Софт → GFI EndPointSecurity 4.2.20091109

Скачать бесплатно GFI EndPointSecurity 4.2.20091109
GFI EndPointSecurity 4.2.20091109


GFI EndPointSecurity реализует функции контроля доступа, устанавливая на клиентские машины крошечную программу-агента, которая «весит» всего 1,2 мегабайта и работает в скрытом от пользователя режиме. GFI EndPointSecurity содержит встроенный инструментарий удаленного развертывания, построенный на основе технологий GFI LANguard и позволяющий установить программные агенты на сотни клиентских машин парой-тройкой щелчков мышью. Агент EndPointSecurity связывается с каталогом Active Directory, когда пользователь выполняет вход в систему, и разрешает или запрещает доступ согласно заданным администратором правилам.


Protect Your Network from Portable Devices such USB drives, iPods, and PDAs. According to the Ponemon Institute, 59% of people who lost their job admitted to taking confidential company information with them either on DVD or using USB drives. The proliferation of consumer devices such as iPods, USB devices, Smart Phones and more, has dramatically increased the risk of intentional and unintentional data leaks and other malicious activity. While most companies have anti-virus software, firewalls, email and web content security to protect against external threats, few realize how easy it is for an employee to simply walk in and copy large amounts of sensitive data onto an iPod or USB stick. There is also an increased risk of malicious and other illegal software introduction to your network through these devices.

Prevent Data Theft and Virus Infection from within with Endpoint Security Software

Many businesses are unaware of, or choose to ignore, the threat presented by portable devices in their network environment until some event, ranging from unfortunate to catastrophic, happens. In hard economic times, cybercrime and data leakage increase and endpoints are an easy target. The key to managing portable devices in your business environment is to give your administrators direct control over what devices are in use on your network. With GFI EndPointSecurity™ you not only gain control over what is in use but you also know what has been used and by who, and most importantly you gain in-depth knowledge of what data has been copied.

Control Portable Device Access to Your Network with GFI EndPointSecurity

GFI EndPointSecurity allows administrators to actively manage user access and log the activity of:
• Media players, including iPods, Creative Zen and others
• USB drives, CompactFlash, memory cards, CDs, floppies & other portable storage devices
• PDAs, BlackBerry handhelds, mobile phones, smart phones and similar communication devices
• Network cards, laptops and other network connections.

Why Choose GFI EndPointSecurity?
• Prevent data leaks and theft by comprehensively controlling access to portable storage devices with minimal administrative effort
• Prevent introduction of malicious and other unauthorized software to the network
• Gives administrators greater control - you can block devices by class, file extensions, physical port or device ID
• Allows administrators to grant temporary device or port access for a stipulated timeframe
• Support for 32 & 64-bit platforms: Including Windows Vista and latest RC of Windows Server 2008.

Top Features
• Control user access and protect your network against the threats posed by portable storage media
• Log the activity of portable storage media like USB memory sticks, SD cards and more
• Easily configure group-based protection control via Active Directory
• Advanced granular access control, whitelists and blacklists
• Real-time status monitoring and real-time аlеrts

Other Features
• Get full reports on device usage with the GFI ReportPackTM add-on
• Tamper-proof agent
• Easy unattended agent deployment
• Permit temporary device access
• Scan and detect a list of devices that have been used or are currently in use
• Password protected agents to avoid tampering
• Set up custom popup messages for users when they are blocked from using a device
• Browse user activity and device usage logs through a backend database
• Maintenance function that allows you to delete information that is older than a certain number of days
• Support for operating systems in any Unicode compliant language
• and more...



Уважаемый посетитель вы вошли на сайт как незарегистрированный пользователь. Мы рекомендуем вам зарегистрироваться либо войти на сайт под своим именем.

26 ноября 2009    Добавил: Hengmen   Просмотров: 513  Комментарии: 0  

Похожие новости

  • GFI EndPointSecurity 4.1.20090217
  • USB Over Network v4.0
  • USB Virus Scan 2.3 Build 1022
  • USB Virus Scan 2.3 Build 0702
  • EVEREST Ultimate 2006 v2.80.568
  • SYMANTEC NETWORK ACCESS CONTROL v11.0.2000 MR2
  • Portable Everest Ultimate Edition 4.50.1380
  • MediaRescue Professional 5.1.490 Portable
  • USB Over Network v4.3 (Server + Client)
  • USB Over Network 4.1.1

  • Информация

    Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.

    Календарь ↓

    «    Ноябрь 2024    »
    ПнВтСрЧтПтСбВс
     123
    45678910
    11121314151617
    18192021222324
    252627282930 

    Архив сайта ↓

    Февраль 2024 (4)
    Сентябрь 2023 (1)
    Сентябрь 2021 (9)
    Май 2021 (3)
    Апрель 2021 (1)
    Март 2021 (3)

    Друзья ↓

    » Порно видео онлайн
    » Ведьмак смотреть онлайн
    » Сокол и Зимний Солдат смотреть
    » Фильмы и сериалы онлайн
    » Скачать XXX Порно
    » Win32Soft.Org
    » Скачать Warcraft 3
    » LuxSait.Ru

    Обмен ссылками закрыт!

    Статистика ↓

    RSS