GFI EndPointSecurity | Control Portable Storage

GFI EndPointSecurity®

Protect your network from the threats posed by portable devices

The proliferation of consumer devices such as iPod®s, USB devices and smartphones has dramatically increased the risk of deliberate and unintentional data leaks and other malicious activity: It is very simple for an employee to copy large amounts of sensitive data onto an iPod or USB stick, or to introduce malicious and illegal software onto your network through these devices. GFI EndPointSecurity™ quickly and easily helps you combat these critical threats without needing to lock down all ports.

Assess endpoint data leakage risk

GFI EndPointSecurity enables data leakage risk assessment by monitoring the removable devices used at endpoint level.

Protect your network

GFI EndPointSecurity helps prevent the introduction of viruses, malware and other unauthorized software to your network by blocking access to a wide variety of devices such as USB sticks, iPods and smartphones.

Encrypt removable devices

GFI EndPointSecurity can be set up to enforce encryption on removable USB storage devices.

Take control of your network

You can block devices by class, file extensions, physical port or device ID from a single location, while granting temporary device or port access for a stipulated timeframe.

Automatic protection

Automatically protects newly detected computers by deploying an agent and a default blocking policy.

Data-aware file monitoring

GFI EndPointSecurity provides enhanced file monitoring capabilities for files transiting the endpoints via removable devices based on file type and content. The content checking module takes regular expressions or dictionary files as input and can search within most popular document formats. The product ships by default with intelligence to detect security sensitive information such as account numbers, ID card numbers, etc

Control access

Prevent data leaks by comprehensively controlling access to portable storage devices with minimal administrative effort. Temporary access can be granted to users for a device (or group of devices) on a particular computer for a particular timeframe.

Prevent data theft

Most data theft happens by employees manually transferring it onto devices. Controlling access to computers helps you prevent this.

Centralize monitoring

View all computers on your network from a single location, and benefit from GFI EndPointSecurity’s detection of connected devices and its ability to perform tasks.

Generates detailed reports

Logs detailed statistics about all activity and can send automatic daily or weekly digests.

Free trial

"Now, with surgical precision, I can control and monitor what is happening on the network - who is doing what, when, how and where."

Tony Malvarez, Aerotecnica S.A.

Three out of four starts

Watch this video to learn about GFI EndPointSecurity, a tool which lets you control the use of portable storage devices (such as USB drives, iPods and more) on your network! Visit

Best practices:

Strategies for boosting your practice’s information immunity

Physicians know how to treat human-borne viruses but are often unprepared to deal with the ones disseminated by computers. These threats, which carry legal, financial and public relations consequences, must be managed effectively to protect your practice and its patients.

Pod slurping - an easy technique for stealing data:

Uncontrolled use of iPod®s, USB sticks and flash drives on your network poses a problem

A common misconception is that perimeter security measures such as firewalls and anti-virus software are enough to secure corporate data residing on the corporate network. In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.

The threats posed by portable storage devices:

Uncontrolled use of iPods, USB sticks, PDAs and other devices leave you at risk

In a society where the use of portable storage devices is commonplace, there is a real risk to business. The threat that these devices pose to corporations and organizations is often ignored. This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.

Managing security in a device driven windows environment:

Device driven security

GFI Software understands the needs of our customers to evolve their faxing to improve efficiency and cost effectiveness. GFI FaxMaker® is a world-trusted fax solution that helps you accomplish just that by combining faxing with virtual environments.

GFI EndPointSecurity™ - System requirements

System requirements: Hardware

  • Processor: 2GHz processor clock speed
  • RAM: 512 MB (minimum); 1 GB (recommended)
  • Hard Disk: 100 MB of available space

System requirements: Software

Operating system (x64 or x86):

  • Microsoft Windows XP Professional
  • Microsoft Windows Vista (Enterprise, Business or Ultimate edition)
  • Microsoft Windows 7
  • Microsoft Windows 8 Professional (x86)
  • Microsoft Windows 8 Enterprise (x64)
  • Microsoft Windows 2003 Server
  • Microsoft Small Business Server 2003
  • Microsoft Windows 2008 Server (Standard or Enterprise edition)(SR1 - SR2)
  • Microsoft Windows 2008 Server R2
  • Microsoft Small Business Server 2008
  • Microsoft Windows 2012 Server (Standard or Enterprise edition)
  • Microsoft Windows Small Business Server 2012

Other components

  • Internet Explorer 5.5 or later
  • NET Framework version 4.0
  • Database Backend: SQL Server 2000, 2005, 2008
  • Port: TCP port 1116 (default)

NOTE 1: The firewall has to be configured to allow connections between the GFI EndPointSecurity machine and computers running the GFI EndPointSecurity Agent.

NOTE 2: GFI EndPointSecurity can only be installed and launched when using administrative privileges.

Agent - Hardware requirements

  • Processor: 1GHz processor clock speed
  • RAM: 256 MB (minimum); 512 MB (recommended)
  • Hard Disk: 50 MB of available space

Agent - System requirements

Operating system (x64 or x86):

  • Microsoft Windows Server 2008 R2 x64 (Standard or Enterprise edition)
  • Microsoft Windows Server 2008 (Standard or Enterprise edition)
  • Microsoft Windows Server 2003 (Standard, Enterprise or Web edition)
  • Microsoft Windows 8 Professional (x86)
  • Microsoft Windows 8 Enterprise (x64)
  • Microsoft Windows 7 (Enterprise, Business or Ultimate editions)
  • Microsoft Windows Vista (Enterprise, Business or Ultimate editions)
  • Microsoft Windows XP (Professional edition)
  • Microsoft Windows Small Business Server 2008 (Standard or Enterprise editions)
  • Microsoft Windows Small Business Server 2003
  • Microsoft Windows 2012 Server (Standard or Enterprise edition)
  • Microsoft Windows Small Business Server 2012