Patch management: Fix vulnerabilities before an attack
Patch management is vital to your business. Network security breaches are most commonly caused by missing network patches. GFI LanGuard scans and detects network vulnerabilities before they are exposed and reduces the time required to patch machines on your network. GFI LanGuard patches Microsoft ®, Mac® OS X® and other third-party operating systems and applications; and deploys both security and non-security patches.
Vulnerability assessment: Discover security threats early
GFI LanGuard provides a detailed analysis of what is happening on your network – which applications or default configurations, that are posing a security risk. GFI LanGuard gives you a complete picture of installed applications, hardware on your network, the state of security applications (antivirus, anti-spam, firewalls, etc.), open ports, and any existing shares and services running on your machines.
Network auditing: Analyze your network centrally
More than 50,000 vulnerability assessments are carried out across your networks, including virtual environments. GFI LanGuard scans your operating systems, virtual environments and installed applications through vulnerability check databases such as OVAL and SANS Top 20. GFI LanGuard enables you to analyze the state of your network security, identify risks to the network, determine its degree of exposure, and address how to take action before it is compromised.
Patch management for operating systems
GFI LanGuard’s patch management feature scans your network automatically or on demand. It gives you all the functionality and tools needed to effectively install and manage patches on all machines across different Microsoft and Mac OS X operating systems as well as applications in all supported languages.
Patch management for third-party applications
GFI LanGuard offers patch management support for third-party software (over and above for both Microsoft and Apple®), enabling administrators to detect, download and deploy missing patches for supported applications in the same way as it is done for Microsoft or Mac OS X updates.
During security audits, more than 50,000 vulnerability assessments are conducted, scanning the network IP by IP. With GFI LanGuard, you can perform multi-platform scans (Windows, Mac OS®, Linux) across all environments, including virtual machines, and analyze your network’s security setup and status.
Track latest vulnerabilities and missing updates
GFI LanGuard ships with a complete and thorough vulnerability assessment database, including standards such as OVAL (5,000+ checks) and SANS Top 20. This database is regularly updated with information from BugTraq, SANS Corporation, OVAL, CVE and others.
Integration with security applications
GFI LanGuard integrates with more than 2,500 critical security applications in the following categories: antivirus, anti-spyware, firewall, anti-phishing, backup client, VPN client, URL filtering, patch management, web browser, instant messaging, peer-to-peer, disk encryption, data loss prevention, and device access control.
Network device vulnerability checks
Not only does GFI LanGuard, runs vulnerability checks on computers on your network, it also supports a number of network devices such as printers, routers and switches from manufacturers like HP and Cisco.
Network and software auditing
GFI LanGuard’s network auditing gives you a comprehensive view of your network such as – what USB devices are connected, what software is installed, any open shares, open ports and weak passwords in use, and hardware information.
Powerful interactive dashboard
It provides a summary of the current network security status and a history of all relevant changes in the network over time. It also drills down through information, from network-wide security sensors to individual security scan results.
Support for virtual environments
Organizations that use or plan on using virtualization on their network can install and use a range of GFI products with confidence.
Helps you comply with PCI DSS and other regulations
All businesses handling cardholder data with the regardless of size, have to be fully compliant with strict security standards drawn up by the world’s major credit card companies.
Multiply the value of GFI LanGuard with powerful reporting – its reports are designed to satisfy the requirements of both management and technical staff.
The agent technology enables automated network security audits and distributes the scanning load across the client machines. The administrator simply needs to define the network perimeter and provide credentials to enable automatic network discovery, agent deployment and auditing of the client machines. Manual intervention is only necessary when a fine-tuning is required.
Log data analysis for SIEM
Good security strategies include real-time event log monitoring for critical security incidents and periodic analysis of security-relevant logs. This enables you to detect suspicious activity and respond quickly. Monitor security-relevant policies, mechanisms (e.g., authentication, authorization, etc.), activity (e.g., privileged user activity) and applications (e.g., IDS, IPS, firewall, etc.) in real time.
Complete IT infrastructure monitoring and management
Unplanned system downtime ranges from a minor nuisance to a major catastrophe. Monitor the availability, functionality, performance and use of your IT assets – everything from network devices, workstations and servers to applications, business, infrastructure services and network protocols.
Log data consolidation for compliance
Most data security standards and regulations require that all relevant log data is managed, collected, consolidated and safely stored so that companies can prove accountability for the actions occurring in their workplace. GFI EventsManager provides three-layer log data consolidation accessible through two-factor authentication, forensic investigations capabilities and compliance reporting.
Wide support for log sources
As a network administrator, you have experienced the cryptic and voluminous log data that makes log analysis a daunting process. GFI EventsManager handles this task by decoding it and presenting it in a simple, easy-to-read format.
There is often confusion among users as to which event log reports are needed to meet the requirements of different compliance acts. GFI EventsManager contains specific reports for many of the major compliance acts, as well as a suite of other reports focused on account usage and management, policy changes, object access, application management, print server usage, and many others. The reports are flexible and highly customizable; the layout, columns and row filter can all be changed.
Your network can be the source of considerable log data. Unless you can make sense of the information, however, it won’t provide you with the knowledge needed to effectively maintain your network. GFI EventsManager has an integrated dashboard that offers filtering-enabled charts; they provide a single point of contact with all the data you need to work efficiently.
Granular control of log data
GFI EventsManager offers rule-based, deep and granular control of log data, with out-of-the-box support for operating systems, applications and network devices, and classification of security information.
Safe storage of log data
Most of the industry standards, security best practices, or regulations covering network data management require that logs are kept in a secure manner that guarantees their accuracy and integrity. At the same time, access to the log data needs to be controlled to avoid disclosure of sensitive information or tampering attempts.
Reactivity and remediation capabilities
An important phase of IT management is incident remediation. GFI EventsManager reacts to security or IT issues by running code or scripts on the remote machines. You can stop services or processes, uninstall applications, reboot machines, disable user accounts, close network connections, flush caches, notify others, trigger third-party tools or custom code automatically and in real time.
Log processing rules and scanning profiles
GFI EventsManager ships with a pre-configured set of log processing rules that enables you to quickly and easily filter and classify log records that satisfy particular conditions. These templates make it simple to choose columns for reporting, as well as to perform column mappings. The supplied templates are also fully customizable.
Works in highly distributed environments
Sometimes your workstations and servers are not neatly located in one central location. Your organization might be spread across the country, or even across the globe. So how can you collect data and monitor scattered workstations? GFI EventsManager has the answer.
Unique combination of active checks and debug logs collection
Incident investigation is an important part of the IT management process. It usually involves analyzing various data to identify the cause of problems detected during the incident detection phase so they can be addressed as part of the incident remediation phase.
Prevent the risk of data leakage
Bring your own device (BYOD) and portable storage device use in the workplace significantly increase the likelihood of your business facing data leakage issues. GFI EndPointSecurity features risk assessment capabilities that identify assets possibly doubling as sources of data leaks. All functionality is built into a dashboard that provides relevant information, suggestions for boosting protection, and shortcuts to common security tasks.
Assess and control information that travels across endpoints
The data awareness module provides another layer of endpoint protection by scanning each relevant file and searching for the most common types of information susceptible to a security breach (e.g. SSNs, PANs, etc.). The module supports inputs in the form of regular expressions and dictionary files. It also contributes to your data loss prevention (DLP) and compliance efforts.
Easily control access to portable storage devices
From a single location, easily grant temporary network or workstation access to portable storage devices for a set period of time as well as block devices by class, file extension, physical port or device ID.
Encryption for portable devices
When users connect to your network with a USB device containing unencrypted data, they are prompted to enter a password; GFI EndPointSecurity then encrypts all the contents on the device. After that, data can be accessed normally, with the added benefit of being encrypted using a strong AES 128-bit algorithm.
GFI EndPointSecurity monitors the network, detects new computers that are connected to the network, notifies the administrator, and performs various tasks as configured by the administrator.
Portable device usage reporting
The GFI EndPointSecurity ReportPack is a free powerful reporting package that adds on to GFI EndPointSecurity. It can be scheduled to automatically generate graphical IT level or higher level management reports based on data collected by GFI EndPointSecurity, enabling you to report on portable storage devices connected to the network, user activity, endpoint files copied to and from devices, and much more.
Group-based protection configuration
Categorize computers into protection groups. For each group, you can specify the level of protection and permitted portable device access.
Status monitoring and alerts
GFI EndPointSecurity provides real-time status monitoring through its user interface. It displays statistical data through graphical charts, the live status of the agent, and more.
USB sticks pose a significant threat to your business environment. They are small, easily hidden and can store up to 128 GB of data.
GFI EndPointSecurity provides administrators with the ability to automatically schedule agent deployment after a policy or configuration change.
Whitelisting and blacklisting
GFI EndPointSecurity enables you to grant or deny access to a range of portable device classes, as well as block files transferred by file extension, physical port and the factory ID that identifies each device.
Supports Windows® 8
The agent used to control machines features a number of security elements to render it tamper-proof.
Print Activity Monitor
Printer Activity Monitor is an advanced printers usage monitoring product allowing you to control the efficiency of your company’s printer usage. With Printer Activity Monitor you can easily monitor and audit your printers and find out which documents are printed on each of the selected printers, which employees use printers most often, the number of pages printed, the computer ordering the printing, etc.
Printer Activity Monitor benefits:
- accurate print jobs tracking;
- integration with Active Directory;
- advanced printers audit features;
- remote printers usage monitoring;
- compatibility with Microsoft Cluster Server;
- managing all application modules remotely;
- compatibility with Citrix MetaFrame/Terminal Services;
- working with an unlimited number of printers;
- installing all application modules separately;
- intercepting the images of printed documents;
- independent of printer types and their manufacturers;
- has task scheduler for automating the creation and delivery of reports.
- possibility to use SQLite, MS Access, MS SQL, MySQL, PostgreSQL or Oracle as data storage;
- detecting exact print job properties: the number of copies, the number of printed pages and so on
- allows generating a great number of reports and diagrams reflecting the efficiency of your printer usage;
- reduces your printing expenses;
- monitoring printers in an organization in a centralized way;
- helps prevent attempts to use the office printers for employees’ personal use;
How the program works
No office can function without a printer. The bigger the office, the more printers it has, and the larger are the related costs on paper, ink and additional equipment. Printer Activity Monitor is a “do-gooder” kind of program that actually makes you money, instead of wasting it, by lowering your printing costs (up to fifty dollars a year per laser printer, according to our customer survey). How? It tracks each document printed and keeps a database of all printing activity.
Printer Activity Monitor immediately identifies any employees who overuse or abuse company printers. Second, it allows you to plan you printing budget properly, so you don’t have to buy extra ink, cartridges and paper “just in case”. Finally, it shows real use of each printer, so you can re-rout network document flow instead of purchasing new printers.
The program is presented in three modules. The first one(Agent) is works as system service and tracks every document printed. The second module(Data Center) calculates this data and third module(Console) generates reports and diagrams.
For example, you can build a report that shows how many documents were printed on a specified printer within the past two months. Also, you can have a breakdown of printer use (in pages printed) by each employee or workstation. Finally, you can have a printing budget for each department (number of pages allowed to be printed in a period of time) and put weekly statistics on the wall.
Our customers’ experiences clearly demonstrate that printer usage significantly decreases (by 15-40%) within the first month after the program installed and stays just as low. Some of our bigger clients save more than $10,000 a year with Printer Activity Monitor.
- Windows 2003/2008/XP/Vista/Seven
- 1024Mb RAM
- 10000 Kb free disk space
Patching your systems can be tricky and time-consuming. There is an easier way to keep software up-to-date and secure. With automated scans and regular updates, ControlPatch reduces your company’s risk of attack from cybercriminals and prevents productivity losses related to system performance issues.
How many different update mechanisms do you need to track so that you’re fairly certain all your third-party programs are up-to-date? The sheer volume of updates each software vendor releases can be quite overwhelming. ControlPatch simplifies the job by automating the full deployment process as soon as vendors release updates.
- Centralize control from a single online console
- Ensure software is up-to-date, secure and running efficiently
Policy management in ControlPatch takes simplicity a step further. Every server, workstation, laptop and mobile device in your company’s IT environment is unlikely to be managed the same way. Our solution enables you to quickly and easily configure settings. You can apply patches at group level while retaining the flexibility to override specific devices for a greater degree of control.
- Automate detection, downloading and installation of missing patches
- Rely on group policy deployment or more personalized fine-grain control
Distance doesn’t matter
You can’t physically be in multiple places at once. Or can you? ControlPatch protects all your servers, workstations and laptops remotely with a comprehensive set of security and performance patches. With remote patch management, all critical Microsoft® updates and service packs are handled, including Office 365™, Exchange, SQL Server®, Internet Explorer® and Windows® operating systems. Fifty-plus third party applications are supported.
- Major vendors supported include Java™, Firefox®, Chrome™, iTunes®, Quicktime® and more
- Manage and control from the ControlNow console
Reinvest your savings
The management console provides one place to track and schedule patch updates when the time suits you. This is a big advantage. The ability to detect, download and install patches from the dashboard saves time and money. Those savings can be reinvested into your company. Rather than handle time-consuming tasks, you can focus on critical jobs like growing your business.
Practice proactive monitoring
Ensure all workstations, servers and laptops operate at peak performance. Automated checks and customizable alerts enable you to address issues before they burn your business. It’s always better to foresee a possible problem than scramble to address one after it strikes. This requires quick and clear visibility of your IT environment. ControlMonitoring ensures you have it – at all times. Knowing which servers and workstations are reaching their limits gives you time to create and execute a plan before system performance and workforce productivity suffer.
- Manage your systems from a single online console
- Configure alerts to ensure you’re in control of your network
Disappearance of downtime
Downtime is your enemy, which means quickly resolving the issue is critical. To do this, you need tools that are accessible from anywhere, at any time. ControlMonitoring enables you to remotely work on servers, laptops and PCs. As a result, your colleagues will really appreciate that addressing system performance problems no longer interrupts business operations.
- Fix issues without disrupting end users via remote administration
- Manage and control Windows® processes and services
- Utilize remote commandline and scripts
- Automate corrective actions
- Receive overdue and recovery alerts when servers are not responding
- Critical events checks for any significant issues that require investigation
- Physical disk health analyzes “SMART” disks for any errors
- Backup checks to ensure there is no disruption in scheduled sessions
- Antivirus checks to ensure definitions are current on all systems
- Disk space checks available capacity
- Windows service monitors for specific software disruptions
- Event log monitors event logs with queries, which you configure
- Drive space change monitors unexpected changes in disk space
Save significant time
How do you prefer to be notified when your help is needed? ControlMonitoring features automated alerting, which informs you via email and text messaging of any issue that needs your attention the moment the problem is detected. You’ll save additional time with the ability to automate corrective actions such as restarting a Windows service, or multiple services, upon a failure.
ControlMonitoring includes several pre-configured checks that make it easier and faster for you to monitor your workstations and servers
Connect with one click
Deliver support that quickly fixes remote company computers – even if those machines are unattended. It doesn’t matter whether the machine you need to access is within reach or beyond the walls of the office. From your own workspace, you can quickly and easily take control remotely to fix issues. Just one click opens a fast, secure connection. With ControlRemote, you don’t need to first contact the user or enter additional login credentials.
- Establish a connection at any time, from virtually anywhere
- Conduct secure sessions via fully encrypted data channels: 2048-bit RSA key exchange and 256-bit AES session encoding
Combine and conquer
Fixing issues after an employee alerts you to the problem is disruptive; it’s the nature of reactive problem-solving. However, by combining ControlRemote with ControlMonitoring, you become proactive: You can spot and address issues before your co-workers are even aware a problem existed. Better yet, you can schedule preventative maintenance at a time convenient for you and the colleague you’re helping.
- Manage multiple IT management services from a single web-based console
Fully stocked toolbox
Businesses use many services and software to effectively manage their IT environment. You need multiple tools at your disposal, too. ControlRemote enables you to record sessions, including conversion to the AVI video format, and instant message with remote users. It’s like you are sitting in front of the machine!
- Locally print files from the remote computer
- Synchronize clipboards to share files, images and text between machines
Stretched thin? The number of machines you need to manage isn’t all that’s increased. The demand on your time has grown too. Meeting this challenge requires the ability to multi-task, which ControlRemote enables you to do. Rather than handle issues one by one, you can manage multiple connections in different tabs and look at separate monitors via the multi-monitor view
- Establish multiple connections in separate windows
- Integrate screenshots within the remote control session
Stay up-to-date with a detailed inventory of installed software, configured hardware and authorized users – critical information available to you via the cloud-based console. The first step in gaining complete control of your network is having a firm understanding of the hardware and software that exists in your IT environment. Armed with this information, you can more efficiently plan and execute hardware refreshes and software upgrades, as well as ensure the change management process runs smoothly.
- Centralize control and management efforts with the online console
- Quickly complete detailed hardware configurations and software upgrades
Adiós, manual audits
With the ability to track assets in real time, you routinely have clear visibility into your IT estate. It’s an advantage that saves you time and cuts down on costs, particularly when it comes to conducting manual audits. You also reduce the hassles that come with coordinating audits across multiple locations.
- Automatically scan servers, workstation and laptops
- Centralize your IT inventory
Good IT inventory management enables you to make smarter spending decisions. How many times have you realized after the fact that you wasted money buying unnecessary hardware, or you spent too much in a rush to place an order? ControlAssets takes the guess-work out of building and maintaining your IT environment, and it’s free. There are no limits on the number of servers, workstations or laptops you can track, and no time limits, either. Gain full control by combining with our monitoring service.
Remote Control Software
Radmin is one of the safest, fastest and most popular remote access software solutions designed for Windows.
A remote computer screen can be viewed on a local monitor in either a window or a full-screen display. All mouse movements and keystrokes are transferred directly to the remote computer.
Files can be transferred to and from the remote computer, and communication with the remote computer’s user is possible by either Text Chat or Voice Chat.
Highest Speed of Work
Radmin is the fastest remote control software available. Its new DirectScreenTransfer™ technology uses a video hook kernel mode driver to boost the capture rate to hundreds of screen updates per second. Its special low-bandwidth optimizations lets you control remote computer comfortably even on dial-up modem and GPRS connections.
Remote Access Software – Challenge-response Password Authentication.
Highest Security Level
Radmin works in encrypted mode where all data, screen images, mouse movements and keyboard signals are encrypted using 256-Bit AES strong encryption with randomly generated keys for each connection to remote computer. For user authentication Radmin can use either Windows security with Active Directory and Kerberos support, or its own security with individual user permissions and secure login/password authentications. Radmin security uses Diffie-Hellman based key exchange with 2048-bit key size. Additional IP filters restrict access to specific hosts and networks.
Hardware remote control with Intel® AMT support
The new version of Radmin 3.5 supports Intel® AMT (Active Management Technology) and allows to control remote computer even if it’s turned off or you cannot start its operating system. Using Radmin Viewer you can turn on, restart and shut down the remote computer. It also enables the user to view and change the BIOS settings of the remote computer and to boot it from a local CD or disk image file.
Full compatibility with Windows 10
Radmin 3.5 fully supports Windows 10 32-bit and 64-bit, including User Account Control and Fast User Switching. Radmin Server 3.5 supports Windows 10/8/7/Vista/XP/ 2012/2008/2003/2000 (32-bit) and Windows 10/8/7/Vista/XP/ 2012/2008/2003 (64-bit) operating systems. Radmin Viewer 3.5 supports Windows 10/8/7/Vista/XP/ 2012/2008/2003/2000/ME/98/95/NT4.0 (32-bit) and Windows 10/8/7/Vista/XP/ 2012/2008/2003 (64-bit) operating systems.
Text and Voice Chat
Text Chat, Voice Chat and Send Message modes, which are new for Radmin version 3, all were developed to help you communicate with a person who operates a remote computer that you are connecting to.
Easy to use
Radmin is very user-friendly. Most of our users agree that the major advantage of Radmin is its simplicity. All report that the interface is intuitive and the program is very easy to use. Unlike bloatware, Radmin has no useless ‘value added’ features that makes it difficult to work with, complex to learn, or that crushes its performance. Control remote computer easily with Radmin!
Secure “Drag and Drop” file Transfer with “Delta Copy” feature
With Radmin you can securely drag and drop any files via its Explorer-like interface to or from a remote computer in encrypted mode. Radmin has a feature it uses when copying files that allows updating of only that part of a file which is different on both machines. This feature is called “Delta Copy” since only the difference between files (‘delta’) is copied. It lets you continue copying after a network fault from the place where the fault occurred rather than from the beginning. This feature is used automatically when any file is being copied to or from the remote machine.
Multiple Connections Support
Radmin supports simultaneous multiple connections to the same remote screen. This means that you can invite your friends or colleagues to view your screen remotely (very handy for conferencing) or you can view or control several remote computers from your own computer’s screen (very handy for remote helpdesk or teaching).
Free Technical Support
Famatech supplies FREE technical support to our registered customers. You can send us your technical questions using our Free Online Support Service. We usually solve technical problems within 48 hours. Please, use the English language when contacting Famatech technical support.
Other Features for Remote Computer Control
- Transfers remote screens in 2, 4, 16, 256, 65 thousand or 16 million colors.
- Compatibility with Windows 10, Windows 8, Windows 7, Windows Vista and Windows XP multiple user sessions.
- Radmin Viewer is compatible with Wine (software to run Windows applications on Linux). You can control remote computer from Linux machines.
- Fully supports the display of animated and alpha-blended remote computer cursors.
- Mouse wheel support.
- Special keystroke handling and optional Full keyboard control.
- Supports high resolution modes (there is no limit to the maximum display resolution).
- Remote screens can be displayed inside a window or full screen with smooth scaling and the original aspect ratio.
- Multiple monitors support.
- Two-way clipboard transfer with Unicode support.
- Unlimited phonebook for Radmin connections with an explorer-like interface, folders and drag-and-drop support.
- Shortcuts from phonebook records to the desktops listed in those phonebook records.
- Scan to find running Radmin Servers.
- Multilanguage user interface and built-in help.
- Telnet connection mode.
- Shutdown Connection Mode.
- Radmin Server runs only as a service.
- Compatibility with Radmin Server 2.x.
- Five incorrect passwords sequence security delay.
- DNS name and user name info added to the log file.