Comprehensive control on use of USB storage and other portable devices. The proliferation of consumer devices such as smartphones, media players, portable storage devices, network connected devices and easily concealable USB sticks has increased the risk of data leakage, virus infection, introduction of un-licenced software and games and other malicious activity on networks.
While most companies have antivirus, firewalls, and email and web content security to protect against external threats, few realize how easy it is for an employee to copy huge amounts of confidential and commercially-sensitive data onto a portable storage device without anybody knowing.
Physically locking down all USB ports, is neither sustainable nor feasible. The key to managing portable device use is to install an endpoint security solution that gives administrators control over what devices are in use, have been used and by whom, as well as an in-depth knowledge of what data has been copied.
How it works
To control access, GFI EndPointSecurity automatically installs a tamper-proof, hidden agent on the machines in your network. This agent can be deployed to machines network-wide with just a few clicks. This agent delivers unparalleled tamper protection even against users with admin rights, enabling IT admins to remain in control no matter what.
Manage user access and protect your network against portable storage media threats
Using GFI EndPointSecurity you can centrally disable users from accessing portable storage media, preventing users from stealing data or bringing in data that could be harmful to your network. Although you can switch off some physical connection ports from the BIOS, in reality this solution is impractical and advanced users can hack the BIOS with ease. GFI EndPointSecurity allows you to take control over a wide variety of devices.
Log the activity of portable device access to your network
In addition to blocking access to portable storage media, GFI EndPointSecurity logs device-related user activity to both the event log and to a central SQL Server. A list of files that have been accessed on a given device is recorded every time an authorized device is plugged-in.
Encrypt portable devices
Users can be given permission to store data on USB devices as long as it is encrypted. Access to this data outside the company network can be strictly controlled by a purposebuilt traveler application, which is included with GFI EndPointSecurity.