Mon - Fri 9:00 AM – 5:00 PMClosed on weekends

We can help with installation, configuration, customization and training

Prevent the risk of data leakage

Bring your own device (BYOD) and portable storage device use in the workplace significantly increase the likelihood of your business facing data leakage issues. GFI EndPointSecurity features risk assessment capabilities that identify assets possibly doubling as sources of data leaks. All functionality is built into a dashboard that provides relevant information, suggestions for boosting protection, and shortcuts to common security tasks.

Assess and control information that travels across endpoints

The data awareness module provides another layer of endpoint protection by scanning each relevant file and searching for the most common types of information susceptible to a security breach (e.g. SSNs, PANs, etc.). The module supports inputs in the form of regular expressions and dictionary files. It also contributes to your data loss prevention (DLP) and compliance efforts.

Easily control access to portable storage devices

From a single location, easily grant temporary network or workstation access to portable storage devices for a set period of time as well as block devices by class, file extension, physical port or device ID.

Assess endpoint data leakage risk

GFI EndPointSecurity enables data leakage risk assessment by monitoring the removable devices used at endpoint level.

Protect your network

GFI EndPointSecurity helps prevent the introduction of viruses, malware and other unauthorized software to your network by blocking access to a wide variety of devices such as USB sticks, iPods and smartphones.

Encrypt removable devices

GFI EndPointSecurity can be set up to enforce encryption on removable USB storage devices.

Take control of your network

You can block devices by class, file extensions, physical port or device ID from a single location, while granting temporary device or port access for a stipulated timeframe.

Automatic protection

Automatically protects newly detected computers by deploying an agent and a default blocking policy.

Data-aware file monitoring

GFI EndPointSecurity provides enhanced file monitoring capabilities for files transiting the endpoints via removable devices based on file type and content. The content checking module takes regular expressions or dictionary files as input and can search within most popular document formats. The product ships by default with intelligence to detect security sensitive information such as account numbers, ID card numbers, etc

Control access

Prevent data leaks by comprehensively controlling access to portable storage devices with minimal administrative effort. Temporary access can be granted to users for a device (or group of devices) on a particular computer for a particular timeframe.

Prevent data theft

Most data theft happens by employees manually transferring it onto devices. Controlling access to computers helps you prevent this.

Centralize monitoring

View all computers on your network from a single location, and benefit from GFI EndPointSecurity’s detection of connected devices and its ability to perform tasks.

Generates detailed reports

Logs detailed statistics about all activity and can send automatic daily or weekly digests.

Hardware

  • Processor: 2GHz processor clock speed
  • RAM: 512 MB (minimum); 1 GB (recommended)
  • Hard Disk: 100 MB of available space

Software

Operating system (x64 or x86)

  • Microsoft Windows XP Professional
  • Microsoft Windows Vista (Enterprise, Business or Ultimate edition)
  • Microsoft Windows 7
  • Microsoft Windows 8 Professional (x86)
  • Microsoft Windows 8 Enterprise (x64)
  • Microsoft Windows 10 (Pro and Enterprise)(x86 and x64)
  • Microsoft Windows 2003 Server
  • Microsoft Small Business Server 2003
  • Microsoft Windows 2008 Server (Standard or Enterprise edition)(SR1 – SR2)
  • Microsoft Windows 2008 Server R2
  • Microsoft Small Business Server 2008
  • Microsoft Windows 2012 Server (Standard or Enterprise edition)
  • Microsoft Small Business Server 2011

Other components

  • Internet Explorer 5.5 or later
  • NET Framework version 4.0
  • Database Backend: SQL Server (Full and Express versions) 2000, 2005, 2008, 2008 R2, 2012
  • Port: TCP port 1116 (default)

NOTE 1: The firewall has to be configured to allow connections between the GFI EndPointSecurity machine and computers running the GFI EndPointSecurity Agent.

NOTE 2: GFI EndPointSecurity can only be installed and launched when using administrative privileges.

Agent - Hardware requirements

  • Processor: 1GHz processor clock speed
  • RAM: 256 MB (minimum); 512 MB (recommended)
  • Hard Disk: 50 MB of available space

Agent - Software requirements

Operating system (x64 or x86)

  • Microsoft Windows Server 2008 R2 x64 (Standard or Enterprise edition)
  • Microsoft Windows Server 2008 (Standard or Enterprise edition)
  • Microsoft Windows Server 2003 (Standard, Enterprise or Web edition)
  • Microsoft Windows 10 (Pro and Enterprise)
  • Microsoft Windows 8 Professional (x86)
  • Microsoft Windows 8 Enterprise (x64)
  • Microsoft Windows 7 (Enterprise, Professional or Ultimate editions)
  • Microsoft Windows Vista (Enterprise, Business or Ultimate editions)
  • Microsoft Windows XP (Professional edition)
  • Microsoft Small Business Server 2008 (Standard or Enterprise editions)
  • Microsoft Small Business Server 2003
  • Microsoft Windows 2012 Server (Standard or Enterprise edition)
  • Microsoft Small Business Server 2011

Knowledge base

Browse the GFI EndPointSecurity knowledge base.

Administrator guide

Learn how to use GFI EndPointSecurity

Getting started guide

Learn how to get started with GFI EndPointSecurity.

Report Pack

Learn to use the reporting feature in GFI EndPointSecurity.

Best practices: Strategies for boosting your practice’s information immunity

Physicians know how to treat human-borne viruses but are often unprepared to deal with the ones disseminated by computers. These threats, which carry legal, financial and public relations consequences, must be managed effectively to protect your practice and its patients.

The threats posed by portable storage devices: Uncontrolled use of iPods, USB sticks, PDAs and other devices leave you at risk

In a society where the use of portable storage devices is commonplace, there is a real risk to business. The threat that these devices pose to corporations and organizations is often ignored. This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.

Pod slurping - an easy technique for stealing data: Uncontrolled use of iPod®s, USB sticks and flash drives on your network poses a problem

A common misconception is that perimeter security measures such as firewalls and anti-virus software are enough to secure corporate data residing on the corporate network. In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as ‘pod slurping’, can lead to major security breaches.

Managing security in a device driven windows environment: Device driven security

GFI Software understands the needs of our customers to evolve their faxing to improve efficiency and cost effectiveness. GFI FaxMaker® is a world-trusted fax solution that helps you accomplish just that by combining faxing with virtual environments.

GFI and FB Security Group does not do any form of refund. We encourage and highly recommend that you take advantage of their “Try before you buy” policy: Use the 30-day free trial period to thouroughly test and evaluate the product before purchasing.