Endpoint security threats are constantly evolving and critical data is lost due to non-existent or ineffective security practices. The proliferation of high capacity thumb drives, smart phones and other portable devices has increased the risk of data leakage and the volume of data that could find its way out of an organization.

As part of our WE CARE initiative, we are giving organizations the ability to monitor and identify endpoint weaknesses in their network in real time through our FREEWARE version of GFI EndPointSecurity.
“Data leakage is a reality that most organizations only accept when a serious breach occurs. A lot of small and medium-sized businesses are unaware of what types of devices are connected to their network, what content is being copied or who is using a particular device. This constitutes a series security threat for businesses, especially those that handle confidential information, such as financial institutions, health care organizations and so on. The latest version of GFI EndPointSecurity includes monitoring as Freeware because we believe that once organizations see for themselves the benefits of monitoring endpoints, they will want to take action,” GFI’s CEO Walter Scott explained.
“With our Freeware version, organizations will get a comprehensive picture of what devices are in use, by whom and what type of data is being transferred to these devices within the organization. This is the perfect tool to identify those who may be using unauthorized devices, uploading files that are not permitted or copying data that could be lost through negligence or without permission,” Mr. Scott said.
The commercial version of GFI EndPointSecurity allows organization to not only monitor how endpoints are being used but it allows them to actively manage user access and log the activity of a wide range of portable storage devices. Furthermore, GFI EndPointSecurity helps to prevent data leaks and theft by comprehensively controlling access to these devices with minimal administrative effort; prevent the introduction of malware and other authorized software, and block devices by class, file extensions, physical port or device ID.
The latest release of GFI EndPointSecurity also includes support for Microsoft Windows 7, support for Microsoft Windows 7 BitLocker to Go encrypted devices, detection of these devices and application of different permissions, an activity log that provides a quick way to view user activity and a series of new reports in the ReportPack.
For more information on the freeware version of GFI EndPointSecurity please visit http://www.gfi.com/endpoint-security-freeware-softwareEndpoint security threats are constantly evolving and critical data is lost due to non-existent or ineffective security practices. The proliferation of high capacity thumb drives, smart phones and other portable devices has increased the risk of data leakage and the volume of data that could find its way out of an organizatiAs part of our WE CARE initiative, we are giving organizations the ability to monitor and identify endpoint weaknesses in their network in real time through our FREEWARE version of GFI EndPointSecurity.

“Data leakage is a reality that most organizations only accept when a serious breach occurs. A lot of small and medium-sized businesses are unaware of what types of devices are connected to their network, what content is being copied or who is using a particular device. This constitutes a series security threat for businesses, especially those that handle confidential information, such as financial institutions, health care organizations and so on. The latest version of GFI EndPointSecurity includes monitoring as Freeware because we believe that once organizations see for themselves the benefits of monitoring endpoints, they will want to take action,” GFI’s CEO Walter Scott explained.

“With our Freeware version, organizations will get a comprehensive picture of what devices are in use, by whom and what type of data is being transferred to these devices within the organization. This is the perfect tool to identify those who may be using unauthorized devices, uploading files that are not permitted or copying data that could be lost through negligence or without permission,” Mr. Scott said.

The commercial version of GFI EndPointSecurity allows organization to not only monitor how endpoints are being used but it allows them to actively manage user access and log the activity of a wide range of portable storage devices. Furthermore, GFI EndPointSecurity helps to prevent data leaks and theft by comprehensively controlling access to these devices with minimal administrative effort; prevent the introduction of malware and other authorized software, and block devices by class, file extensions, physical port or device ID.

The latest release of GFI EndPointSecurity also includes support for Microsoft Windows 7, support for Microsoft Windows 7 BitLocker to Go encrypted devices, detection of these devices and application of different permissions, an activity log that provides a quick way to view user activity and a series of new reports in the ReportPack.

For more information on the freeware version of GFI EndPointSecurity please visit http://www.gfi.com/endpoint-security-freeware-software/