Connect with us

Hi, what are you looking for?

How to

GFI EndPoint Security review for 2021 & the Best Alternatives

GFI EndPoint Security review including alternatives

GFI Software creates packages for small and middle-sized enterprises that probably don’t have an IT department and might not have any computer experts on their payroll. This market demands systems that are easy to install and don’t need much maintenance. In many cases, the business owner might be performing the duties of the IT manager, or the business might rely on the services of a freelance consultant or engineer. In either case, the company probably doesn’t want to spend too much time or money on software systems.

GFI EndPoint Security provides a data leak prevention (DLP) service that focuses on protecting files containing sensitive data and patrolling the system’s points where data can be transferred out.

Data theft strategies

There are two ways to steal data from a company: electronically and physically. Big corporations are primarily under threat from remote hackers in places such as Russia and North Korea. While insider threats – the term for data theft or employee sabotage – is an issue to be aware of, the most significant source of threats to a large business comes over the internet.

Small businesses need to be aware of the dangers of malware and install appropriate protection. However, in the realm of data theft, they are more susceptible to physical strategies. Kim Jong-Un of North Korea is not interested in your local bakery; however, the bakery down the street might. The idea that international hackers are going to jimmy open a window at the back of your strip mall law practice, get in, and transfer data off your PC onto a USB stick is not very realistic. However, the ex-partner of one of your divorce clients might.

The relatively small amounts of data that your business has means that your biggest threats come from rival companies of similar size or individuals who bear a grudge against you. Small amounts of data can more reasonably be carried away. It is unimaginable that someone would ever try to print off the entire client list of American Airlines and walk out with it. Still, the secretary of a landscaping firm might if enticed by higher wages at a rival business. Thus, the threat of a physical data theft strategy is much higher for small companies than large organizations.

GFI EndPoint Security features

GFI EndPoint Security offers two strategies for data theft protection. The first relates to the devices that connect to the network, either directly or as a peripheral to a connected computer. The second protection service assesses data stores and identifies sensitive data.

Hardware protection

The hardware assessment module includes a risk analysis of each device. This extends to BYOD devices and peripherals, such as USB memory sticks. The service can be set to block new devices connecting to the network automatically. Alternatively, a device can be permitted. On enrollment onto the system, the device gets a GFI EndPoint Security agent downloaded onto it. This includes that device in security monitoring and enables the systems administrator to control the peripherals connecting to it.

The service enables the system manager to block all peripheral devices unless expressly permitted. Furthermore, the granting of permission can be time-limited. Thus, this simple step rules out the possibility of an employee or a physical intruder into the office copying data onto a memory stick without the business owner’s knowledge.

Newly connected devices can have added activity logging applied to them, which tells the system manager what files are being transferred.

Data controls

The data movement can be controlled according to its contents defined in the sensitive data discovery service. The issue of data discovery is different for small businesses when compared to the activities of large organizations. Large companies have many endpoints, and each can be running many software packages and services. Each software system will create its preferred storage directory locally and possibly also in a central store.

System managers in large businesses might not realize that even if they set up applications to store data centrally, there may also be local copies, such as the shadow copies of documents created as restore points by productivity packages, such as Microsoft Word.

The file location issue is less critical for small businesses with only a few devices to check. Thus, the search routines in GFI Endpoint Security don’t need to be as complicated as those built for extensive operations. The data protection system in the GFI package just searches through all folders on a computer, looking for data files and scanning through their contents. The searcher uses a library of regular expressions that look for data formats commonly used for sensitive data, such as Social Security Numbers or payment card numbers.

Once sensitive data has been identified, different activity tracking processes can be activated to monitor the use of those files. There is also the option to control the size of files that can be moved.

One shortfall of the GFI system is that it doesn’t impose file integrity monitoring (FIM). A typical FIM will encrypt files and only allow access to specific users with specially flagged credentials. This means that only permitted user accounts will get those files automatically decrypted when they open them. Any other person that tries to open the file will not get it decrypted.

There is one area of the system where it is possible to impose encryption. That is in the use of a USB drive. As well as allowing a specific memory stick to connect to a computer on the network, the service can be set up to implement encryption for all data transferred onto that stick. This is a helpful feature for valid copies so that loss of the USB drive won’t result in data disclosure.

GFI EndPoint Security system requirements

GFI EndPoint Security is implemented in two types of installation – a central server and endpoint agents for each protected computer. The system requirements for each module are shown here below.

GFI EndPoint Security server


  • Processor: 2GHz processor clock speed
  • RAM: 512 MB (minimum); 1 GB (recommended)
  • Hard Disk: 100 MB of available space

Operating System (x64 or x86)

  • Microsoft Windows XP Professional
  • Microsoft Windows Vista (Enterprise, Business or Ultimate edition)
  • Microsoft Windows 7
  • Microsoft Windows 8 Professional (x86)
  • Microsoft Windows 8 Enterprise (x64)
  • Microsoft Windows 10 (Pro and Enterprise) (x86 and x64)
  • Microsoft Windows Server 2003
  • Microsoft Small Business Server 2003
  • Microsoft Windows Server 2008 (Standard or Enterprise edition)(SR1 – SR2)
  • Microsoft Windows Server 2008 R2
  • Microsoft Small Business Server 2008
  • Microsoft Windows Server 2012 (Standard or Enterprise edition)
  • Microsoft Small Business Server 2011


  • Internet Explorer 5.5 or later
  • NET Framework version 4.0
  • SQL Server (Full and Express versions) 2000, 2005, 2008, 2008 R2, 2012

GFI EndPoint Security server


  • Processor: 1GHz processor clock speed
  • RAM: 256 MB (minimum); 512 MB (recommended)
  • Hard Disk: 50 MB of available space

Operating System (x64 or x86)

  • Microsoft Windows Server 2008 R2 x64 (Standard or Enterprise edition)
  • Microsoft Windows Server 2008 (Standard or Enterprise edition)
  • Microsoft Windows Server 2003 (Standard, Enterprise or Web edition)
  • Microsoft Windows 10 (Pro and Enterprise) 1709 and older only
  • Microsoft Windows 8 Professional (x86)
  • Microsoft Windows 8 Enterprise (x64)
  • Microsoft Windows 7 (Enterprise, Professional or Ultimate editions)
  • Microsoft Windows Vista (Enterprise, Business or Ultimate editions)
  • Microsoft Windows XP (Professional edition)
  • Microsoft Small Business Server 2008 (Standard or Enterprise editions)
  • Microsoft Small Business Server 2003
  • Microsoft Windows 2012 Server (Standard or Enterprise edition)
  • Microsoft Small Business Server 2011

GFI EndPoint Security deployment and price

GFI EndPoint Security is at the end of its service life, and GFI no longer sells the product individually. However, it does sell the system as part of a package of its products. This bundle is called GFI Unlimited. It includes:

  • GFI MailEssentials – Anti-spam and email security applied to mail servers
  • GFI Archiver – An archive manager for emails, calendar entries, files, and folders
  • GFI FaxMaker – A secure fax solution
  • GFI HelpDesk – An IT support management solution
  • Kerio Connect – A security service for email and messaging systems
  • Kerio Control – A firewall and unified threat management system
  • GFI EndpointSecurity – A data protection service
  • GFI EventsManager – An event log collector and analyzer
  • Kerio Operator – A VoIP network creator and manager

GFI EventsManager and Kerio Operator are also at the end of their service lives and are no longer sold individually.

The price for this package is levied per unit per year, and the exact amount depends on the number of endpoints covered by the license. That price per device is:

  • 10 – 59 units: $39.90
  • 50 – 249 units: $37.90
  • 250 + units: $35.90

It is possible to get a 30-day free trial of GFI EndPoint Security. There are also free trials available for the other products contained in the GFI Unlimited bundle.

GFI EndPoint Security strengths and weaknesses

GFI EndPoint Security protects small businesses from data theft. However, it is not a fully comprehensive data loss prevention system. GFI created this package as a low-cost solution for small businesses that don’t need all of the features of a fully-blown DLP. Without cheaper solutions like this, hard-pressed small companies with tight budgets would either end up overpaying for an extensive system that provided more services than they actually need or just skip data theft protection entirely.

Here are the good points and bad points that we have discovered about GFI EndPoint Security.


  • A distributed system with a central controller and agents for each endpoint
  • The option to block all new devices from connecting to the network
  • The ability to intercept all peripheral devices from connecting to endpoints
  • A data scanner that identifies instances of sensitive data
  • The option to encrypt data on USB memory sticks


  • Only available for Windows and Windows Server
  • Going out of circulation and only currently available as part of a bundle

Alternatives to GFI EndPoint Security

GFI EndPoint Security has an appeal to a specific market sector – small businesses. This is because there aren’t many data loss prevention systems that compete in that sector. However, as GFI EndPoint Security is no longer available, you must look for an alternative DLP solution.

What should you look for in a GFI EndPoint Security alternative? 

We reviewed the market for data loss prevention systems and analyzed the options based on the following criteria:

  • An automated scanner to locate and log sensitive data
  • File activity tracking
  • File encryption and data store protection
  • Controls over peripheral devices
  • Controls over data transfer methods
  • A free trial or a demo system for a no-cost assessment period
  • Value for money in a product that provides complete data protection

With this set of criteria in mind, we have identified some data loss prevention options that will protect your business from data leaks.

Here is our list of the five best alternatives to GFI EndPoint Security:

  1. ManageEngine DataSecurity Plus A DLP service, vulnerability scanner,  and compliance package include data discovery and classification, file integrity monitoring, access rights assessment, and exit point controls, such as monitoring USB ports and printers. DataSecurity Plus runs on Windows Server, and it is available for a 30-day free trial.
  2. Endpoint Protector A DLP system to protect PII, credit card data, PHI, and IP. This package includes file activity tracking and data movement control. There are endpoint agents on Windows, macOS, and Linux while the server is offered as a SaaS platform, as a service on AWS, GCP, or Azure, or as a virtual appliance on site. Endpoint Protector can be assessed through a demo system.
  3. Digital Guardian DLP A SaaS platform with endpoint agents on Windows, macOS, and Linux. This package includes data discovery and classification service for PII and intellectual property and controls peripheral devices, printers, faxes, file transfer systems, messaging services, and emails. There is a demo account available.
  4. Teramind DLP A SaaS package that operates across sites and cloud platforms. Features include OCR scanning on digital documents and images, user behavior tracking to detect insider threats and account takeover, plus controls on data exfiltration points. Teramind DLP is offered a 14-day free trial.
  5. Rapid7 InsightIDR A cloud-based SIEM with endpoint agents that includes user and entity behavior analytics (UEBA), sensitive data discovery, file integrity monitoring, and a vulnerability scanner. This system is available for a 30-day free trial.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Premium Account

Zee5 Premium Account ID and Password Free 2022:Are you searching Zee5 Premium Account Free WORKING Account? Zee5 is a popular and on-demand Indian Video Streaming...


[ad_1] AP CM Jagan led YSRCP government has hiked the value added tax (VAT) on cooking gas by ten percent. Earlier the tax was...

Life Style

[ad_1] Ahilya Bai Holkar Biography, Jayanti, Information, Action, History, Speech, Place of Birth, Descendants, Serial, Story, Samadhi, Airport (Ahilyabai Holkar Biography in Hindi) (Husban...


Antenna & Wave Propagation By KD Prasad ***CONTENTS****Chapter 6: Antenna TerminologyAnd Hertzian Dipole, Half Wave DipoleMore Chapters Coming Soon …DOWNLOAD Chapter:6(15MB)