ServerFiles.com is a server software & hardware directory for Network administrators & IT professionals, listing networking & server software for Windows 2003, Windows 2000, NT and Linux; and now also listing networking hardware solutions focused on server based computing.
This product enables you to restrict access to USB, CD and floppy drives from a central console and therefore protect your company from external threats such as viruses as well as protecting your existing data. The software also enables you to remotely shut-down or boot computers through a power management utility. This can be individual workstations or groups of computers, which is a particularly important fuction with there being such a focus on energy consumption recently in the media and society generally.
Most mobile email solutions focus on protecting the data stored on the mobile device through encryption strategies and containerization. Rather than focusing on device data protection,ActiveSync Shieldoffers a new approach that completely eliminates the need to store data on the device.
ActiveSync Shield interacts directly with the ActiveSync protocol on the server side. This solution effectively controls who can synchronize data from the network and what data can be synchronized when users connect to an Exchange server with their mobile phones. Since there is no client installation, ActiveSync Shield is ideal for BYOD implementations since it supports any mobile device including iOS (iPhone, iPad), Android, Windows Phone or Symbian device.
The data you are striving to protect behind firewalls and passwords is likely still slipping through your fingers. Data leaks can be initiated by either unwitting employees or users with malicious intent copying proprietary or sensitive information from their PCs to flash memory sticks, smartphones, cameras, PDA’s, DVD/CDROMs, or other convenient forms of portable storage. Or, leaks may spring from user emails, instant messages, web forms, social network exchanges or telnet sessions. Wireless endpoint interfaces like Wi-Fi, Bluetooth, and Infrared as well as device synchronization channels provide additional avenues for data loss. Likewise, endpoint PCs can be infected with vicious malware that harvest user keystrokes and send the stolen data over SMTP or FTP channels into criminal hands. While these vulnerabilities can evade both network security solutions and native Windows controls, the DeviceLock® Endpoint Data Leak Prevention (DLP) Suite addresses them. It enforces data protection policies with awareness of both the context and content of data flows across endpoint channels.
DeviceWall minimizes the threat of data leakage by enabling the organization to create a white list of ‘approved’ devices assigned to specified groups and individual users. By default, DeviceWall can be configured to automatically block any device not explicitly permitted in the security policy.
Designed to help organizations manage desktop endpoints and the usage of portable storage devices (iPods, USB sticks, PDAs, etc.) on the corporate network, DeviceWall also automatically encrypts information leaving a desktop to ensure the security and integrity of data in transit. Furthermore, the company has integrated new anti-tamper technology, expanded device class support, and added new management and customization features.
The Check Point Endpoint Policy Management Software Blade simplifies endpoint security management by unifying all endpoint security capabilities in a single console. Monitor, manage and enforce policy, from an at-a-glance dashboard down to user and machine details, all with a few clicks.
Manage security for entire organizations, groups, users and their devices.
GFI EndPointSecurity lets you control entry and exit of data via portable storage devices, allowing you to prevent users from taking confidential data or introducing viruses and trojans to your network. GFI EndPointSecurity allows you to actively manage user access to media players (including iPod and Creative Zen), USB sticks, memory cards and more.
GFI EndPointSecurity allows administrators to actively manage user access to Media players, USB sticks, memory cards, CDs, floppies & other storage devices. The solution also allows you to manage access to the following devices: PDAs, Blackberries, mobile phones (and similar communication devices), network cards and laptops.
Define which users can use removable media centrally from Active Directory - simply by making them a member of pre-defined groups.
Regain control of your network with GFI EndPointSecurity! A free, fully functional, 30-day trial is available for download on our website.
The NetWrix USB blocker integrates seamlessly into all existing Active Directory environments to enable fully centralized device management and harden endpoint security. The device lockdown feature which protects networks from malware and prevents theft of sensitive corporate data, offers simple point-and-click deployment and commands no monster tools or long learning curves. Features and benefits include; Ability to blocks many types of removable devices (e.g. PDAs, iPhones, imaging devices, printers), allows for granular access control of device usage (device whitelist/blacklist, allowed/disallowed users, access by passcode) and enjoys centralized user activity auditing.
Panda Cloud Office Protection is an SaaS service for PCs, laptops and file servers.
Panda Cloud Office Protection provides SaaS security for your endpoints, proactive antimalware protection connected to Collective Intelligence in real time, personal firewall (centrally or locally managed), device control, web-based management, and more.
With Safend Auditor, administrators can differentiate between secure productivity enhancers, such as authentication tokens, and potential security threats, such as mass-storage MP3 players. Safend Auditor also tracks which WiFi networks employees are connecting to - secure encrypted networks or exposed public networks. Using data gathered by Safend Auditor, administrators can map out granular security policies that exactly meet their business needs.
Safend Protector monitors real-time traffic and applies customized, highly-granular security policies over all physical, wireless and storage interfaces.
Safend Protector detects and allows restriction of devices by device type, model or even specific device serial number. For storage devices, Safend Protector allows security administrators to either block all storage devices completely, permit read-only or encrypt all data. It also monitors, blocks and logs files that are downloaded to or read from these devices. WiFi controls are based on MAC address, SSID, or network security level.