Control network access and use of devices such as USB drives, iPods and PDAs
The proliferation of consumer devices such as iPods, USB drivers, smart phones and other portable devices has increased the risk of data leakage and malicious activity on networks. While most companies have anti-virus software, firewalls, email and web content security to protect against external threats, few realize how easy it is for an employee to copy huge amounts of sensitive data onto an iPod or USB stick. There is also a risk of viruses or malware and illegal software being introduced on the network. One way to prevent this from happening is to lock down all ports but this is neither sustainable nor advised.
Prevent data theft and virus infection from within with endpoint security software
Unfortunately, many businesses are unaware of or ignore the threat until something actually happens. According to research conducted by eMedia on behalf of GFI in the US, few medium-sized businesses consider portable storage devices to be a major threat while fewer than 20% had implemented software to address this risk. The key to managing portable device use is to install an endpoint security solution that gives administrators control over what devices are in use, have been used and by whom and in-depth knowledge of what data has been copied.
Windows 2000 (SP4), XP, 2003, Vista and 2008
Download
The proliferation of consumer devices such as iPods, USB drivers, smart phones and other portable devices has increased the risk of data leakage and malicious activity on networks. While most companies have anti-virus software, firewalls, email and web content security to protect against external threats, few realize how easy it is for an employee to copy huge amounts of sensitive data onto an iPod or USB stick. There is also a risk of viruses or malware and illegal software being introduced on the network. One way to prevent this from happening is to lock down all ports but this is neither sustainable nor advised.
Prevent data theft and virus infection from within with endpoint security software
Unfortunately, many businesses are unaware of or ignore the threat until something actually happens. According to research conducted by eMedia on behalf of GFI in the US, few medium-sized businesses consider portable storage devices to be a major threat while fewer than 20% had implemented software to address this risk. The key to managing portable device use is to install an endpoint security solution that gives administrators control over what devices are in use, have been used and by whom and in-depth knowledge of what data has been copied.
Windows 2000 (SP4), XP, 2003, Vista and 2008
Download
Tiada ulasan:
Catat Ulasan