A Snapshot of the Endpoint Security Market

Here are some other vendors that might interest you in the endpoint-security space.

Eric B. Rux

January 29, 2008

1 Min Read
ITPro Today logo

While researching products to include in this comparative review, we found five vendors that offer enterprise-level software for securing endpoints such as USB ports, CD/DVD drives, and so on. Although only two vendors chose to participate in the review, we mention the others here for the purposes of completeness.

In addition, Microsoft added functionality in Windows XP SP2, with which you can make USB devices Read Only. My original intention was to provide a detailed comparison of this feature with the features of the two products in the main review. However, the XP SP2 option amounts to a simple registry entry and doesn’t offer any of DeviceLock’s or Endpoint Access Manager’s advanced features. At any rate, you can find more information about the XP SP2 functionality in John Savill’s FAQ article, “How can I mark my USB storage devices as read-only?” (InstantDoc ID 44380).

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like