Introduction

The proliferation of consumer devices such as iPods, USB devices, and smartphones has dramatically increased the risk of deliberate and unintentional data leaks and other malicious activity: It is very simple for an employee to copy large amounts of sensitive data onto an iPod or USB stick, or to introduce malicious and illegal software onto your network through these devices. GFI EndPointSecurity quickly and easily helps you combat these critical threats without needing to lock down all ports.

To control access, GFI EndPointSecurity automatically installs a tamper-proof, hidden agent on the machines in your network. This agent delivers protection even against users with admin rights, enabling IT admins to remain in control no matter what.

Topics in this chapter