Home > Network security software > Endpoint Security Wednesday, 4/24/2019
Software
Network Administrator
Network Security
Exchange Server
ISA Server
Terminal Services
Internet Server
Comm. & collaboration
Microsoft server add-on
Other network Software

Other

Links
Submit your product
Advertise here


Featured Product
TechGenix Sites
ISAserver.org
The No.1 Forefront TMG / UAG and ISA Server resource site.
MSExchange.org
The leading Microsoft Exchange Server and Office 365 resource site.
WindowSecurity.com
Network Security & Information Security resource for IT administrators.
WindowsNetworking.com
Windows Server 2012 / 2008 / 2003 & Windows 8 / 7 networking resource site.
WServerNews.com
The largest Windows Server focused newsletter worldwide.
VirtualizationAdmin.com
The essential Virtualization resource site for administrators.
CloudComputingAdmin.com
Cloud Computing Resource Site for IT Pros.
InsideAWS.com
An independent Amazon Web Services resource site.
WServerNews.com
World's largest weekly newsletter on Windows Server and cloud technologies

ServerFiles.com is a server software & hardware directory for Network administrators & IT professionals, listing networking & server software for Windows 2003, Windows 2000, NT and Linux; and now also listing networking hardware solutions focused on server based computing.

Up one level   |   Submit your product
 

~ Endpoint Security

Sort by   Rating Name Date
View by platform   Windows Linux Either Both
  Showing products 1-10 of 13 Next 3 products

NetWrix USB Blocker Rating:  (3 votes) - Vote
Last Updated: May 31, 2012 Reviews: 0 reviews - View / Submit
The NetWrix USB blocker integrates seamlessly into all existing Active Directory environments to enable fully centralized device management and harden endpoint security. The device lockdown feature which protects networks from malware and prevents theft of sensitive corporate data, offers simple point-and-click deployment and commands no monster tools or long learning curves. Features and benefits include; Ability to blocks many types of removable devices (e.g. PDAs, iPhones, imaging devices, printers), allows for granular access control of device usage (device whitelist/blacklist, allowed/disallowed users, access by passcode) and enjoys centralized user activity auditing.

TechGenix Reviews & Awards:

May '12

May '11

:: Platform :: Windows
:: Product URL ::click here
:: Company ::NetWrix Corporation - All Prods
:: Company URL ::www.netwrix.com
:: Contact ::Product Enquiry

Safend Protector Rating:  (25 votes) - Vote
Last Updated: March 30, 2009 Reviews: 0 reviews - View / Submit
Safend Protector monitors real-time traffic and applies customized, highly-granular security policies over all physical, wireless and storage interfaces.

Safend Protector detects and allows restriction of devices by device type, model or even specific device serial number. For storage devices, Safend Protector allows security administrators to either block all storage devices completely, permit read-only or encrypt all data. It also monitors, blocks and logs files that are downloaded to or read from these devices. WiFi controls are based on MAC address, SSID, or network security level.

:: Platform :: Windows
:: Product URL ::click here
:: Company ::Safend - All Prods
:: Company URL ::www.safend.com
:: Email ::info@safend.com

AccessPatrol Rating:  (5 votes) - Vote
Last Updated: May 31, 2012 Reviews: 0 reviews - View / Submit
This product enables you to restrict access to USB, CD and floppy drives from a central console and therefore protect your company from external threats such as viruses as well as protecting your existing data. The software also enables you to remotely shut-down or boot computers through a power management utility. This can be individual workstations or groups of computers, which is a particularly important fuction with there being such a focus on energy consumption recently in the media and society generally.

TechGenix Reviews & Awards:

May '12

May '11

May '10

May '09

May '08

:: Platform :: Windows
:: Product URL ::click here
:: Company ::Codework Limited - All Prods
:: Company URL ::www.codework.com
:: Email ::info@codework.com

VIPRE Antivirus Business Rating:  (5 votes) - Vote
Last Updated: October 3, 2011 Reviews: 0 reviews - View / Submit
The VIPRE Antivirus Business product line provides you seamless, tightly-integrated security solutions that deliver antivirus and antispyware protection, desktop fi­rewall, and malicious website ­filtering technologies that protect against the ever-changing and sophisticated wave of malware in the most comprehensive, highly efficient manner.

VIPRE Business combines high-performance antivirus and antispyware to give you comprehensive endpoint malware protection with low system resource usage. Clean, fast, and powerful: developed 'by admins for admins'. VIPRE has been VB100 and ICSA certified, which means you get world-class protection.
Download a free 30-day trial from our website.

TechGenix Reviews & Awards:

Sep '11

:: Platform :: Windows
:: Product URL ::click here
:: Screenshot ::click here
:: Company ::GFI Software - All Prods
:: Company URL ::www.gfi.com
:: Email ::info@gfi.com

Panda Cloud Office Protection Rating:  (2 votes) - Vote
Last Updated: May 31, 2012 Reviews: 0 reviews - View / Submit
Panda Cloud Office Protection is an SaaS service for PCs, laptops and file servers.

Panda Cloud Office Protection provides SaaS security for your endpoints, proactive antimalware protection connected to Collective Intelligence in real time, personal firewall (centrally or locally managed), device control, web-based management, and more.

TechGenix Reviews & Awards:

May '12

:: Platform :: Windows
:: Product URL ::click here
:: Company ::Panda Security - All Prods
:: Company URL ::www.pandasecurity.com
:: Email ::sales@us.pandasecurity.com

DeviceLock Rating:  (14 votes) - Vote
Last Updated: July 7, 2011 Reviews: 0 reviews - View / Submit
The data you are striving to protect behind firewalls and passwords is likely still slipping through your fingers. Data leaks can be initiated by either unwitting employees or users with malicious intent copying proprietary or sensitive information from their PCs to flash memory sticks, smartphones, cameras, PDA’s, DVD/CDROMs, or other convenient forms of portable storage. Or, leaks may spring from user emails, instant messages, web forms, social network exchanges or telnet sessions. Wireless endpoint interfaces like Wi-Fi, Bluetooth, and Infrared as well as device synchronization channels provide additional avenues for data loss. Likewise, endpoint PCs can be infected with vicious malware that harvest user keystrokes and send the stolen data over SMTP or FTP channels into criminal hands.
While these vulnerabilities can evade both network security solutions and native Windows controls, the DeviceLock® Endpoint Data Leak Prevention (DLP) Suite addresses them. It enforces data protection policies with awareness of both the context and content of data flows across endpoint channels.

:: Platform :: Windows
:: Product URL ::click here
:: Company ::SmartLine Inc. - All Prods
:: Company URL ::www.protect-me.com
:: Email ::ashot@protect-me.com

Safend Auditor Rating:  (59 votes) - Vote
Last Updated: March 27, 2009 Reviews: 1 review - View / Submit
With Safend Auditor, administrators can differentiate between secure productivity enhancers, such as authentication tokens, and potential security threats, such as mass-storage MP3 players. Safend Auditor also tracks which WiFi networks employees are connecting to - secure encrypted networks or exposed public networks. Using data gathered by Safend Auditor, administrators can map out granular security policies that exactly meet their business needs.

:: Platform :: Windows
:: Product URL ::click here
:: Company ::Safend - All Prods
:: Company URL ::www.safend.com
:: Email ::info@safend.com

GFI EndPointSecurity Rating:  (27 votes) - Vote
Last Updated: November 7, 2012 Reviews: 0 reviews - View / Submit
GFI EndPointSecurity lets you control entry and exit of data via portable storage devices, allowing you to prevent users from taking confidential data or introducing viruses and trojans to your network. GFI EndPointSecurity allows you to actively manage user access to media players (including iPod and Creative Zen), USB sticks, memory cards and more.

GFI EndPointSecurity allows administrators to actively manage user access to Media players, USB sticks, memory cards, CDs, floppies & other storage devices. The solution also allows you to manage access to the following devices: PDAs, Blackberries, mobile phones (and similar communication devices), network cards and laptops.

Define which users can use removable media centrally from Active Directory - simply by making them a member of pre-defined groups.

Regain control of your network with GFI EndPointSecurity! A free, fully functional, 30-day trial is available for download on our website.

TechGenix Reviews & Awards:

May '11

May '10

May '09

May '08

Mar '07

Sep '04

:: Platform :: Windows
:: Product URL ::click here
:: Screenshot ::click here
:: Company ::GFI Software - All Prods
:: Company URL ::www.gfi.com
:: Email ::info@gfi.com

USB CopyNotify! Rating:  (3 votes) - Vote
Last Updated: May 27, 2010 Reviews: 0 reviews - View / Submit
USB CopyNotify! is a software utility that notifies you when a USB Stick is being used on one of the PCs on the network. This security utility prevents the unauthorized usage of USB Sticks/Drives on your network.

TechGenix Reviews & Awards:

May '10

May '09

May '08

:: Platform :: Windows
:: Product URL ::click here
:: Company ::CygNET Systems Pvt. Ltd - All Prods
:: Company URL ::www.cyspl.com
:: Email ::contact@cyspl.com

DeviceWall Rating:  (6 votes) - Vote
Last Updated: July 12, 2006 Reviews: 0 reviews - View / Submit
DeviceWall minimizes the threat of data leakage by enabling the organization to create a white list of ‘approved’ devices assigned to specified groups and individual users. By default, DeviceWall can be configured to automatically block any device not explicitly permitted in the security policy.

Designed to help organizations manage desktop endpoints and the usage of portable storage devices (iPods, USB sticks, PDAs, etc.) on the corporate network, DeviceWall also automatically encrypts information leaving a desktop to ensure the security and integrity of data in transit. Furthermore, the company has integrated new anti-tamper technology, expanded device class support, and added new management and customization features.

:: Platform :: Windows
:: Product URL ::click here
:: Price ::$10 per/seat
:: Company ::Centennial Software - All Prods
:: Company URL ::www.centennial-software.com
:: Email ::info@centennial-software.com

  Showing products 1-10 of 13 Next 3 products

Platform viewing legend 
  - Windows: All products that can run on Windows
- Linux: All Products that can run on Linux
- Either: All products
- Both: Products that can run on both Windows and Linux
 



Featured Links*