Founded in 1993, SoftControl has been providing IT services to local and international customers. With a long list of satisfied clients and a top notch international management team, SoftControl has proven again and again to be a reliable source of Network Support and Software Development. Read more
Built from the ground up after years of research and development, GFI VIPRE® Antivirus Business delivers fast and efficient online security with low impact on system resources. It’s cost-effective, reliable, easy to use and easy to maintain – the perfect antivirus solution for your business.
Selecting an antivirus solution for your organization is an important decision. You need to protect your systems but you also need to ensure that the software you choose is cost-effective and easy to maintain. VIPRE Antivirus Business is a high-performance solution that delivers fast, memory-efficient endpoint security with all the necessary functionality you need and nothing you don’t — ensuring an optimal end user performance experience. But you don’t have to take our word for it. The satisfaction of our thousands of enterprise customers speaks for itself.
GFI VIPRE® Antivirus Business utilizes an advanced technology stack to scan large volumes of information quickly with minimal impact on system performance. The solution detects and blocks viruses, worms, spyware, Trojans, bots and rootkits via a single, powerful anti-malware engine.
OPSWAT-certified VIPRE Antivirus Business provides integrated control and seamless visibility with OESIS-enabled devices, including NACs and SSL VPN gateways from Cisco, F5, Juniper, Microsoft, SonicWALL, HP, Dell and Tipping Point.
VIPRE Antivirus Business is compatible with Windows 2000, XP, Server 2003, Vista, Server 2008, Server R2 and Windows 7, 32- and 64-bit. The solution also supports Mac computers running Mac OS X versions 10.5 (Leopard), 10.6 (Snow Leopard) and 10.7 (Lion).
VIPRE Antivirus Business protects against email viruses, with direct support for Microsoft Outlook, Outlook Express, Windows Mail and any email program that uses POP3 or SMTP. Additionally, the solution strips emails of phishing links – blocking access to phishing websites.
GFI EndPointSecurity™ allows administrators to actively control use of portable storage devices such as USB drives, iPods and PDAs on the network allowing organizations to prevent users from taking confidential data or introducing viruses and trojans to your network.
According to the Ponemon Institute, 59% of people who lost their job admitted to taking confidential company information with them either on DVD or using USB drives. The proliferation of consumer devices such as iPods, USB devices, smartphones and more, has dramatically increased the risk of intentional and unintentional data leaks and other malicious activity.
While most companies have antivirus software, firewalls, email and web content security to protect against external threats, few realize how easy it is for an employee to simply walk in and copy large amounts of sensitive data onto an iPod or USB stick. There is also an increased risk of malicious and other illegal software introduction to your network through these devices. Of course your administrator could lock down all ports - an ill-advised, difficult and unsustainable solution.
To control access, GFI EndPointSecurity™ installs a small footprint agent on your user's machine. This agent is only 1.2 MB in size, meaning your user will never know it is there.
GFI EndPointSecurity includes a remote deployment tool based on GFI LANguard™ technology, allowing you to deploy the agent to hundreds of machines with just a few clicks. After installation, the agent queries Active Directory when the user logs on and sets permissions to the different nodes accordingly. If the user is not a member of a group that allows access to a particular device or set of devices, then access is blocked.
Using GFI EndPointSecurity you can centrally disable access to any portable device, preventing both data theft and the introduction of data or software that could be harmful to your network.
GFI EndPointSecurity incorporates a dedicated node making it possible for administrators to view all computers on a network from a single location. Here, administrators can assign a secondary name to computers, to make it easier to identify them.
GFI EndPointSecurity can monitor the network, detect new computers that are connected onto the network, notify the administrator, and perform various tasks as configured by the administrator
GFI EndPointSecurity enables you to allow or deny access to a range of device classes, as well as to block files transferred by file extension, by physical port and by device ID (the factory ID that identifies each device).
The GFI EndPointSecurity ReportPack is a powerful reporting package that adds on for free to GFI EndPointSecurity.
This reporting package can be scheduled to automatically generate graphical IT-level or higher level management reports, based on data collected by GFI EndPointSecurity. This gives you the ability to report on devices connected to the network, user activity, endpoint files copied to and from devices (including actual names of files copied), and much more. The latest ReportPack includes enhanced reports that highlight users trying to bypass security policies by renaming file extensions etc.
USB sticks present a significant threat to your business environment. They are small, easily hidden and can store up to 16 GB of data.
Even plugging a digital camera into a USB port gives users access to storage on an SD card. SD cards are available in 32 GB capacity and more; that's a lot of potential for carrying off your data or for exporting infected software onto your network. In addition to blocking access to portable storage media, GFI EndPointSecurity logs device related user activity to both the event log and to a central SQL Server. A list of files that have been accessed on a given device is recorded every time an allowed user plugs in.
You can categorize computers into protection groups. For each group you may specify the level of protection and portable device access to allow.
The ability to group your networked computers is a powerful feature; making, for example, an entire department into one group and then managing the department's setting by managing the group as a single entity. Configuration of GFI EndPointSecurity is effortless and leverages the power of Active Directory. It does not require the administrator to remember and track which policies were deployed to which computers. Many other storage control software requires cumbersome machine by machine administration, forcing you to make the changes on a per-machine basis and then to update the configuration on each machine before the settings take effect. GFI EndPointSecurity does away with all of that.
GFI EndPointSecurity provides real-time status monitoring through its user interface. It displays statistical data through graphical charts, the live status of the agent and more. GFI EndPointSecurity also allows you to send alerts when specific devices are connected to the network. Alerts can be sent to one or more recipients by email, network messages, and SMS notifications sent through an email-to-SMS gateway or service.
GFI EventsManager™ is an events monitoring, management and archiving solution. Used by thousands of customers, GFI EventsManager is able to monitor, manage and archive thousands of events that are generated by an extended range of devices across the entire network.
The enormous volume of system event logs generated daily is of growing importance to organizations that are required to record information for forensic purposes and due to the ever-growing reach of regulatory compliance. Increased threats to business continuity call for an approach that includes real-time event log monitoring of the network; and you also need the ability to analyze and report event logs to address any incidents or security concerns.
This is an overwhelming task. However, GFI EventsManager™ assists with monitoring and managing event logs, maintaining network health and security. Providing support for devices from the top manufacturers as well as for custom devices, GFI EventsManager monitors an extended range of hardware products and reports on the health and operational status of each one.
Often there is some confusion among users as to which event reports are needed for meeting the requirements of different compliance acts.
Event logs are constantly and automatically generated by a user or by an automatic or background process. Logs are often stored in disparate locations.
GFI EventsManager stores all captured event logs into one SQL database that may even reside remotely. Through GFI EventsManager you can configure scheduled backups of your event logs. Archived data can reside on a SQL Server database or in secured and compressed files.
As a network administrator, you have experienced the cryptic and voluminous logs that make log analysis a daunting process.
GFI EventsManager is a log processing solution that provides network-wide control and management of Windows event logs, W3C logs, SQL Server and Oracle audit logs and Syslog events generated by your network sources. GFI EventsManager supports Simple Network Management Protocol, the language spoken by low-level devices such as routers, sensors, firewalls, etc. Through SNMP users can monitor a whole range of hardware devices on their infrastructure and gain the ability to report on the health and operational status of each device.
Due to the relatively large number of events that must be kept for investigation and compliance purposes, it is more efficient to use SQL Server databases for storing only the most important events (needed for review and reporting) while archiving in parallel all the events into special storage files. The log information stored in these files can be imported into SQL Server databases when needed.
The GFI EventsManager dashboard includes a number of filtering-enabled charts to provide administrators with fast and easy access to the data they need as they go about their day.
These include the top critical and high importance rules triggered within a certain period of time, the top 10 users who fail to log on or who log on during and outside working hours, service status across network, how many events are stored in the database per log type and a comprehensive graph based on Windows events that shows network connections at application and user level (available for Vista and newer Windows OSs only). The dashboard is highly customizable and can be zoomed individually in separate windows that can be automatically arranged on the desktop to show real time data about the most important events.
You can create processing rules and filters for Windows events by simply right-clicking on event details in the Events Browser Tool.
New rules are automatically saved into a new rule set called User Rules and will have the least priority by default.
GFI EventsManager™ has improved alert level for key events or intrusions that are detected on the network.
GFI EventsManager allows you to trigger actions such as scripts or to send an alert to one or more people by email, network messages, SMS notifications sent through an email-to-SMS gateway or service and includes SNMPv2 traps. The generation of SNMP alerts will also allow administrators to integrate GFI EventsManager with pre-existing or generic monitoring mechanisms.
GFI EventsManager can detect if a Windows event refers a user who is an administrator user, a feature that is required by certain regulations.
GFI EventsManager checks the details of events and probes whether the usernames or SIDs in question correspond to administrator users. The product can also track changes in rights assignment (through Windows events) so that if a user becomes or stops being an administrator by the time an event has been generated, GFI EventsManager will report accordingly. To use this feature in domains, one must scan the domain controller before scanning other machine members.
GFI EventsManager can help companies achieve compliance with specific regulations through the anonymization of personal data (i.e., user names and computer information that point to specific users) found in logs.
Anonymization consists of encrypting the right data inside events when they are collected, through a key that is set by authorized person(s). The authorized person(s) can decrypt the anonymized data at any time.
Anonymization completely covers Windows Security, SQL and Oracle audit events.
GFI EventsManager incorporates a totally redesigned event scanning engine that is fine-tuned for maximum scanning performance.
Tests demonstrate that our engine is able to scan and collect up to six million events per hour. Its plug-in based methodology allows additional features and modules to be integrated without interfering with existing code.
GFI LANguard™ is an award-winning network vulnerability management solution which is available at an excellent price and is ideal for SMEs. It scans your network and performs over 15,000 vulnerability assessments and provides you with the tools to patch and secure your network from security breaches.
GFI LanGuard™ is an award-winning network security and vulnerability scanner used by leading companies all over the world. GFI LanGuard provides a complete network security overview with minimal administrative effort, while also providing remedial action through its patch management features. Easy to set up and use, GFI LanGuard acts as a virtual consultant to give you a complete picture of your network set-up, provide risk analysis and help you to maintain a secure and compliant network state faster and more effectively. GFI LanGuard assists you in patch management, vulnerability assessment, network and software auditing, asset inventory, change management, risk analysis and compliance.
GFI LanGuard’s patch management feature scans automatically, or on demand, your network and gives you all the functionality and tools you need to effectively install and manage patches on all machines across different Microsoft operating systems and products in all languages supported by the vendor.
GFI LanGuard allows auto-downloads of missing patches as well as patch roll-back, resulting in a consistently configured environment that is secure against vulnerabilities.
GFI LanGuard offers patch management support for other (non-Microsoft) software, enabling administrators to detect, download and deploy missing patches for supported applications in the same way as is done for Microsoft updates.
GFI LanGuard offers patch management support for many popular applications like Apple QuickTime, Adobe Acrobat, Adobe Flash Player, Adobe Reader, Adobe Shockwave Player, Mozilla Firefox, Mozilla Thunderbird, Java Runtime and others.
With GFI LanGuard, not only is it possible to patch third party applications, but also to upgrade to their latest versions (i.e., if an old version of Adobe Flash is detected, GFI LanGuard will provide an option to either upgrade to the latest version or to apply all patches for that version).
GFI LanGuard is the first solution that automates patching for all major web browsers running on Windows systems: Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Apple Safari and Opera Browser.
Besides deploying patches and service packs, GFI LanGuard also enables you to easily deploy third party software or patches network-wide. You can use this feature to deploy client software, and update software, virus updates and more; practically any application that can run silently can be pushed in the network using GFI LanGuard.
Remediation operations can be triggered automatically at the end of scheduled scans. Apart from reporting on all installed applications, GFI LanGuard allows the user to define which applications are authorized or not authorized to be installed on the network. This list of applications can be easily defined for each scanning profile using the Applications Inventory Tool. During a scan, any unauthorized applications are identified and (optionally) uninstalled automatically by GFI LanGuard. An integrated Auto-Uninstall Validation tool is provided to help identify which of the detected applications support silent uninstall and can thus be safely and automatically uninstalled.
GFI LanGuard can be configured to run either in agent-less or agent-based mode.
GFI Network Server Monitor™ checks your network and servers for failures and fixes them automatically. Alerts can be sent by email, pager or SMS. You can reboot a machine, restart a service or run a script, batch job or executable. It is an ideal solution for SMEs, available at an affordable price.
GFI Network Server Monitor™ scans your network for failures or irregularities. It does so automatically so that you can identify issues and fix unexpected problems before your users (or your managers) even know they've happened. It provides instant notification of any problems by email, pager or SMS and can take a number of remedial actions automatically, such as rebooting a machine, restarting a service or running a script. Used by thousands of customers, GFI Network Server Monitor is an ideal solution for small and medium-size businesses (SMBs).
GFI Network Server Monitor™ consists of a network monitoring service and a separate management interface.
No agent software needs to be installed on machines you wish to monitor. The Network Monitor Engine is multi-threaded and can run up to 40 checks at a time. Our software architecture allows for high reliability and scalability to monitor both large and small networks.
Via the Quickstart wizard, you can create a series of checks which monitor all the important services on your network, including Exchange Server, IIS and others.
Critical Exchange services and performance counters (Information Store, mailboxes, SMTP service, etc.) are all monitored.
GFI Network Server Monitor will check the status of a terminal server by actually performing a complete login and checking to see that the session is established correctly. This monitoring method is superior to relying on the events that the terminal server generates (as Microsoft MOM does).
GFI Network Server Monitor can check the availability of all leading database applications. Out of the box, it will monitor Microsoft SQL Server via ADO. It supports other databases such as Access, FoxPro, Paradox, SyBase, Informix, IBM DB2 and many more via ODBC.
GFI has developed specialized checks which mimic administrator operations to verify that the services offered by various applications are running.
For example, we will log on to a service, perform a task and log off the service, without need for any administrative intervention. The monitoring functions that make use of such methodologies include: IMAP, POP3, SMTP Server and the email route check. Through the active use of such services one can guarantee that all aspects of these services are not only running but also are actually functioning.
After an unexpected condition has occurred, GFI Network Server Monitor can automatically move to correct the problem by restarting a service (or multiple services) upon failure; rebooting a server upon failure; or launching an executable, batch job or VBScript.
GFI Network Server Monitor can scan Windows event logs on local or remote computers and look for specific event sources, categories, event IDs and patterns in the description of the event. In addition, it can look for multiple events occurring in a specific time interval, for example, a McAfee or Norton virus alert posted in the last 30 minutes.
When we detect a failure, GFI Network Server Monitor will send alerts via SMS, pager, email or a network message.
SMS (text) messages are sent either through an SMS service provider (SMSC) or directly through a connected GSM phone/modem. It is also possible to use the GFI FAXmaker email-to-SMS gateway service, Clickatell’s web email-to-SMS online gateway service or any third party email-to-SMS gateway. All notifications can be customized using variables. Recipients can be configured globally for all rules.
You can check rule status from any location using GFI Network Server Monitor's remote web monitor.
The remote web monitor includes two types of web page views: One for a normal web browser and one optimized for viewing from a mobile phone or handheld device such as a BlackBerry or a Palm. A small footprint web server is included, although the feature can also be operated in conjunction with IIS.
Use GFI Network Server Monitor to monitor directory information.
For example, monitor group membership of the domain admins group. You can also check user accounts, for example ones that are locked out or disabled, and more; computer accounts, groups, group membership, organizational units, and so on.
Award-winning IT Managed Services software which makes it easy to stay on top of your customers' servers.
GFI MAX RemoteManagement™ offers award-winning hosted remote management and monitoring (RMM) and antivirus software - built specifically for IT Support Companies and MSPs. We help our partners grow their monthly revenues and attract new customers by enabling them to deliver high value, cost-efficient and proactive services - all branded as their own. RemoteManagement allows companies to manage and monitor servers and workstations, deliver remote support, offer asset/inventory tracking, patch management and client reporting with an integrated managed antivirus solution. Our Building Blocks to Managed ServicesTM Program helps our partners identify a clear, straightforward path to developing, pricing and delivering profitable, best-of-breed Managed Services.
Easily and effectively monitor and manage the health of one of the most critical business systems – the server.
GFI MAX RemoteManagement Server Monitoring helps you avoid the risks of expensive remedial action and reputational damage through proactive monitoring of server security, hardware and disk, performance, applications and bespoke software.
GFI MAX RemoteManagement provides a comprehensive range of Network Monitoring and Performance Management solutions.
These help you manage network performance more effectively with SNMP monitoring, network device connectivity checks, TCP service monitoring and network security.
GFI MAX RemoteManagement Website Monitoring tools provide an easy-to-use and effective way of delivering maximum uptime.
It is an invaluable low-cost solution for any business.
With GFI MAX RemoteManagement’s Workstation Monitoring you can spot periodic workstation problems.
Once spotted you can fix them quickly, ensuring optimum availability for all users and keeping business ticking along smoothly.
GFI MAX RemoteManagment’s Security Patch Management is for Microsoft Windows and Office applications and other applications.
Adobe Reader, Adobe Flash Player, Mozilla Firefox, Mozilla Thunderbird, Java are all supported.
GFI MAX RemoteManagement Reporting tools produce professional, graphical reports that you can use to spot trends in system performance.
Use these reports to demonstrate the need for upgrades or replacements.
GFI MAX Managed Antivirus lets you deploy, monitor, manage, report and automatically fix virus threats by quickly and easily configuring an antivirus agent on servers and workstations.
Receive alerts in the Dashboard and reduce your workload with automatic remedial action.
GFI MAX RemoteManagement Integration allows you to quickly and easily integrate your Professional Services Automation (PSA) tools, help desk, ticketing and other systems with GFI MAX RemoteManagement.
Integration can really help you run your operation more efficiently.
GFI MAX RemoteManagement’s ‘Take Control’ feature allows one-click remote support for servers and workstations.
Accessed through the dashboard, you can perform both attended and un-attended work on servers and workstations without leaving your desk.
GFI MAX RemoteManagement Alerting and Viewing options help you stay on top of the networks you manage round the clock, in a way that suits you best.
Get alerted to issues with Instant Email and SMS Alerts the moment GFI MAX RemoteManagement detects a problem, and view the status of all your clients on the online Dashboard on your PC, your iPhone/iPad/iPod touch, a cell phone with the MiniDashTM view or on a large screen in your office with the WallChart.
Extending Visibility to the Endpoint - Safend Auditor is a lightweight, intuitive, clientless software utility that illuminates enterprise endpoint blind spots – providing organizations with the visibility they need to identify and effectively manage endpoint vulnerabilities.
With Safend Auditor, administrators can differentiate between secure productivity enhancers, such as authentication tokens, and potential security threats, such as mass-storage MP3 players. Safend Auditor also tracks which WiFi networks employees are connecting to - secure encrypted networks or exposed public networks. Using data gathered by Safend Auditor, administrators can map out granular security policies that exactly meet their business needs.
With no endpoint client installation required, Safend Auditor transparently and rapidly queries all organizational network endpoints, locating and documenting all devices that are or have been locally connected. Safend Auditor checks all USB, PCMCIA, Firewire, and WiFi ports – granularly identifying endpoint devices connected for each user, both currently and historically.
The results of the Safend Auditor audit are viewable in HTML formal, or as an XML table that is easily exported to Excel or other applications for additional analysis and review. The report identifies devices by type, manufacturer, model, and serial number, and users according to their Active Directory definitions.
Safend Protector is the industry's most comprehensive, secure and easy-to-use endpoint data leakage prevention solution - controlling every endpoint and every device, over every interface.
Safend Protector monitors real-time traffic and applies customized, highly-granular security policies over all physical, wireless and storage interfaces, including:
Safend Protector detects and allows restriction of devices by device type, model or even specific device serial number. For storage devices, Safend Protector allows security administrators to either block all storage devices completely, permit read-only or encrypt all data. It also monitors, blocks and logs files that are downloaded to or read from these devices. WiFi controls are based on MAC address, SSID, or network security level.
Safend Protector creates forensic logs of all data moving in and out of the organization, allowing administrators to create policies that don’t necessarily restrict device usage, but allow full visibility device activity and content traffic.
Through a flexible management console, Safend Protector allows administrators to create comprehensive and granular endpoint security policies.
With built-in alerting capability, administrators can get immediate notifications of any activity that needs immediate response. Alerts are available via email, SNMP, Syslog, Windows Event Viewer, popup messages and even custom scripts.
Safend Protector’s lightweight and tamper-proof agents are easily deployed, installed silently at the endpoint. The Protector agent operates at the kernel level, and includes redundant, multi-tiered anti-tampering features to guarantee permanent control over endpoints. Even local administrators can’t circumvent security policy. In addition, agents are invisible to end-users until a non-approved device is connected, at which time a custom-defined notification appears.
Safend Inspector enforces a data-centric security policy across multiple channels, including email, web (HTTP, HTTPS), FTP, external storage devices, CD/DVD burners, PDA devices, local printers, and network printers, without disrupting legitimate business processes or harming end user productivity.
Proactively configure, manage, secure and support all of your desktops with Desktop Authority.
Join our product experts as they quickly show you how to configure, manage, secure and support your desktops.
Desktop Authority, the leading desktop management platform for Windows-based networks, significantly reduces the total cost of desktop ownership, accelerates Windows migrations, and helps enterprises meet compliance and security requirements by giving them proactive, centralized management of all Windows desktops and applications.
Every administrator has a broad range of users to support, across multiple locations and each with different needs. From a Point, Click, Done GUI, make sure your users have the printers, drives, registry settings, folders, shortcuts, and everything else they need to do their jobs. No more writing and debugging of custom scripts.
We have everything you've come to expect out of a desktop management solution: Deploy software, manage updates, reduce power usage, inventory and report on hardware and software. Schedule and run maintenance tasks during or after business hours, even when users are not logged in.
You have a lot of desktops to secure and we make it easy from one central console. Lock all I/O ports to prevent the introduction of malware and prevent access to confidential files. Consistently deploy Microsoft and third-party patches in a timely manner. Use an industry-leading anti-malware engine to defend your desktops from malicious code. Use built-in turnkey and custom reporting to easily manage and report on the security of endpoint devices.
Increase first call close rates and eliminate trips to the desktop with our unique "behind the screen" technology that allows you to deliver world-class support without interrupting the user.
Desktop Authority's Validation Logic gives you the ability to target each management function as narrowly or broadly as you need. Configure, Manage, Secure and Support desktops using a patented targeting engine that applies settings and policies dynamically, so you can concentrate on more important tasks. Like lunch.