According to the Ponemon Institute, 59% of people who lost their job admitted to taking confidential company information with them either on DVD or using USB drives. The proliferation of consumer devices such as iPods, USB devices, smartphones and more, has dramatically increased the risk of intentional and unintentional data leaks and other malicious activity.
While most companies have antivirus software, firewalls, email and web content security to protect against external threats, few realize how easy it is for an employee to simply walk in and copy large amounts of sensitive data onto an iPod or USB stick. There is also an increased risk of malicious and other illegal software introduction to your network through these devices. Of course your administrator could lock down all ports – an ill-advised, difficult and unsustainable solution.
|Protect your network: GFI EndPointSecurity™ helps prevent the introduction of viruses, malware and other unauthorized software to your network by blocking access to a wide variety of devices such as USB sticks, iPods and smartphones.|
|Control access: Prevent data leaks by comprehensively controlling access to portable storage devices with minimal administrative effort. Temporary access can be granted to users for a device (or group of devices) on a particular computer for a particular timeframe.
|Prevent data theft: Most data theft happens by employees manually transferring it onto devices. Controlling access to computers helps you prevent this.|
|Take control of your network: You can block devices by class, file extensions, physical port or device ID from a single location, while granting temporary device or port access for a stipulated timeframe.|
|Centralize monitoring: View all computers on your network from a single location, and benefit from GFI EndPointSecurity’s detection of connected devices and its ability to perform tasks.
|Automatic protection: Automatically protects newly detected computers by deploying an agent and a default blocking policy.|
PCI DSS compliance: The payment card industry data security standard and GFI Software products
This document outlines what GFI can do to assist in your achieving PCI DSS compliance. The intent of this document is to provide you with GFI’s understanding of the requirements, and how the GFI Software product line (including three of our flagship products: GFI LanGuard™, GFI EventsManager™ and GFI EndPointSecurity™) can assist you to meet PCI compliance as outlined in the PCI DSS Requirements.
Pod slurping – an easy technique for stealing Uncontrolled use of iPods, USB sticks and flash drives on your network poses a problem.
A common misconception is that perimeter security measures such as firewalls and anti-virus software are enough to secure corporate data residing on the corporate network. In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as ‘pod slurping’, can lead to major security breaches.
The threats posed by portable storage devices: Uncontrolled use of iPods, USB sticks, PDAs and other devices leave you at risk.
In a society where the use of portable storage devices is commonplace, there is a real risk to business. The threat that these devices pose to corporations and organizations is often ignored. This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
System requirements: Software
Operating system (x64 or x86):
NOTE 1: The firewall has to be configured to allow connections between the GFI EndPointSecurity machine and computers running the GFI EndPointSecurity Agent.
NOTE 2: GFI EndPointSecurity can only be installed and launched when using administrative privileges.