End point security
Monitor removable device
Many people who are out of job admitted to steal confidential company information with them either on DVD or using USB drives. The devices such as iPods, USB devices, Smart Phones and more, has dramatically increased the risk of intentional and unintentional data leaks and other malicious activity.
Although a lot of companies have anti-virus software, email and web content security to protect external threats, few realize that it is so easy for an employee to simply copy large amounts of important data onto an removable disk. There is also an increased risk of malicious and other illegal software introduction to your network through these devices. Of course your administrator could lock down all ports, an ill-advised, difficult and unsustainable solution.
Prevent Data Theft and Virus Infection
An army of companies are unware of the threat presented by removable devices in their network environment until something, ranging from unfortunate to catastrophic, happens.
The key to managing portable devices in your business environment is to give your administrators direct control over what devices are in use on your network. With IMonitor end point security you not only gain control over what is in use but you also know what has been used and by who, and most importantly you gain in-depth knowledge of what data has been copied.
IMonitor end point security allows administrators to actively manage user access and log the activity of:
- Media players devices
- Removable devices
- Network cards, laptops and other network connections
To control access, IMonitor end point security installs a small footprint agent on your user's computer. This agent is only 1.2 MB in size, your user will never know it is there. IMonitor end point security includes a remote deployment tool, allowing you to deploy the agent to hundreds of machines with just a few clicks. After installation, the agent queries Active Directory when the user logs on and sets permissions to the different nodes accordingly. If the user is not a member of a group that allows access to a particular device or set of devices, then access is blocked.