
GFI EndPointSecurity 1 Introduction | 11
1 Introduction
The proliferation of consumer devices such as iPods, USB devices and smartphones has increased the
risk of deliberate and/or unintentional data leaks and other malicious activity. It is very simple for an
employee to copy large amounts of sensitive data onto an iPod or USB stick, or to introduce malicious
and illegal software onto your network through these devices. GFI EndPointSecurityquickly and easily
helps you combat these critical threats without needing to lock down all ports and disturbing your
daily operations.
Topics in this chapter
1.1 Portable media device threats 11
1.2 About GFI EndPointSecurity 12
1.3 Components of GFI EndPointSecurity 12
1.4 Key Features 13
1.5 How GFI EndPointSecurity works - Deployment and Monitoring 14
1.6 How GFI EndPointSecurity works - Device Access 16
1.7 How GFI EndPointSecurityworks - Temporary Access 17
1.8 Supported device categories 18
1.9 Supported connectivity ports 19
1.10 Navigating the Management Console 19
1.0.1 Terms and conventions used in this guide
Term Description
Additional information and references essential for the operation of GFI EndPointSecurity.
Important notifications and cautions regarding potential issues that are commonly encountered.
> Step by step navigational instructions to access a specific function.
Boldtext Items to select such as nodes, menu options or command buttons.
Italicstext Parameters and values that you must replace with the applicable value, such as custom paths and fil-
enames.
Code
Indicates text values to key in, such as commands and addresses.
Table 1: Terms and conventions used in this manual
1.1 Portable media device threats
The key advantage of removable media devices (or portable devices) is easy access. In theory, this
may be of great advantage for organizations, but still, it is a well-reported fact that access and
security are at opposite ends of the security continuum.
Developments in removable media technology are escalating. Different versions of portable devices,
such as flash memory, have increased in:
Comentarios a estos manuales