The proliferation of portable devices such as iPods, pen drives and smartphones dramatically increases the risk of intentional information leakage incidents or accidental. It is very easy to extract information or introduce malicious or illegal software.
Control access to portable devices on the network, allowing administrators to actively manage user access and record the activity of:
- Multimedia players
- USB drives, CompactFlash, memory cards, CDs, floppy drives and other portable storage devices
- iPhone, BlackBerry and Android devices, mobile phones, smartphones and similar communication devices
- Network cards, laptops and other network connections
Technical Sheet:
http://www.gfihispana.com/esec/GFIEndPointSecurityBrochure_es.pdf information or introduce malicious or illegal software.
Control access to portable devices on the network, allowing administrators to actively manage user access and record the activity of:
- Multimedia players
- USB drives, CompactFlash, memory cards, CDs, floppy drives and other portable storage devices
- iPhone, BlackBerry and Android devices, mobile phones, smartphones and similar communication devices
- Network cards, laptops and other network connections
Technical Sheet:
http://www.gfihispana.com/esec/GFIEndPointSecurityBrochure_es.pdf