Astaro Endpoint Security–Coming Soon
USB drives are the most popular way to transfer data. Keeping endpoints safe and preventing data loss on PCs and mobile devices is a challenging task.
Astaro Endpoint Security solves this by controlling the usage of USB ports, DVD drives, and other peripheral devices. Managed by a central Astaro Security Gateway, security agents can be easily enrolled to all endpoints on your local network or even at remote locations. Comprehensive reporting tools allow you to analyze device usage and even track their location.
Deploy
Configurationless
Just download and install the security agent to all your endpoints with only one click. Policies are enrolled automatically from your central Astaro Security Gateway.
Everywhere
Deploy the security agent without effort locally, to remote sites or even to travelling users. No directory required
Manage
Central Management
Astaro Security Gateway lets you centrally define policies for all your endpoints. Keep an up-to-date
inventory of all managed devices.
Detailed Logging
Track the location and activity of all your endpoints. Keep a detailed log of all policy events like denied accesses, logins or new devices in use.
Control
Device Usage
Enforce usage policies on your endpoints for all peripheral devices. Control network access to hotspots and ethernet.
Data Leakage
Prevent data leakage by controlling and logging file transfers between endpoints and any peripheral device.
Features:
Deployment
|
Management
|
Control
|
Logging/Reporting
|
Reader Comments