GFI EndPointSecurity, Add, 100-249u, 1Y, ENG Manuál Strana 12

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 156
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 11
GFI EndPointSecurity 1 Introduction | 12
Better storage capacity
Improved performance
Easier and faster to install
Physically small enough to carry in a pocket.
As a result, internal users may deliberately or accidentally:
Take away sensitive data
Expose confidential information
Introduce malicious code (example: viruses, Trojans) that can bring the entire corporate network
down
Transfer inappropriate or offensive material on to corporate hardware
Make personal copies of company data and intellectual property
Get distracted during work hours.
In an attempt to control these threats, organizations have started to prohibit the use of (personally-
owned) portable devices at work. Best practice dictates that you must never rely on voluntary
compliance and the best way to ensure complete control over portable devices is by putting
technological barriers.
1.2 About GFI EndPointSecurity
GFI EndPointSecurity is the solution that helps you maintain data integrity by preventing
unauthorized access and transfer of content to and from the following devices or connection ports:
USB Ports (example: Flash and Memory card readers, pen drives)
Firewire ports (example: digital cameras, Firewire card readers)
Wireless data connections (example: Bluetooth and Infrared dongles)
Floppy disk drives (internal and external)
Optical drives (example: CD, DVD)
Magneto Optical drives (internal and external)
Removable USB hard-disk drives
Other drives such as Zip drives and tape drives (internal and external).
Through its technology, GFI EndPointSecurity enables you to allow or deny access and to assign ‘full’
or read only privileges to:
Devices (example: CD/DVD drives, PDAs)
Local or Active Directory users/user groups.
With GFI EndPointSecurity you can also record the activity of all devices or connection ports being
used on your target computers (including the date/time of usage and by whom the devices were
used).
1.3 Components of GFI EndPointSecurity
When you install GFI EndPointSecurity, the following components are set up:
Zobrazit stránku 11
1 2 ... 7 8 9 10 11 12 13 14 15 16 17 ... 155 156

Komentáře k této Příručce

Žádné komentáře