Safend Protector 3.0 Review

By | October 23, 2006

Today’s enterprises characterized by a proliferation of easily accessible computer ports, such as USB and PCMCIA. In addition, a variety of communication adapters such as wireless and Bluetooth and other storage devices such as digital cameras, smart phones and PDAs all enable effortless access to endpoints.

With the amount of corporate data residing on endpoints estimated at over 60%, endpoints may be the most valuable, and vulnerable, part of the enterprise network. These devices enable optimal accessibility and productivity, but they leave endpoints wide open to infiltration.

Safend Protector provides a comprehensive endpoint security solution that enables IT departments to see what ports and devices are being used in their organization and to define granular security policies that control their usage.

Safend Protector comprises of three components: Safend Protector Management Server, Safend Protector Client and Safend Protector Management Console.

Safend Protector Management Server is a self-managed application with an embedded database to store policies and other definitions. The server collects logs from clients, enables client management and communicates with Active Directory for policy distribution purposes. The server uses IIS to communicate with clients and management consoles.

Safend Protector Client protects and monitors the endpoints in your organization, and reports about port activity. The client communicates with Safend Protector Management Server using SSL.

Safend Protector Management Console enables IT staff to manage clients, view logs, define policies and administer the system. Like the client, the console uses SSL when communicating with the server.

Installing the software is not a trivial task since certain preparations must be done both on server and client prior to installation. However, Safend provides a well-document and accurate installation guide that leads you through the key steps for successful installation.

Safend Protector Client monitors real-time traffic on protected ports and applies security policies through three protection components: Port Control, Device and Storage Control and Wi-Fi Connection Control. The Port Control allows IT staff to control the usage of any or all computer ports according to the computer on which they are located, the user who is logged and type of port.

In addition to controlling port access, Safend Protector provides another level of granularity by enabling you to define which devices can access a port. You can restrict devices by their device type, specific models or by their unique serial number. Safend Protector Client has also an option to block storage devices above a certain capacity.

The last component ensures that users only connect to safe networks. Approved networks can be specified using the MAC address of the access point, SSID of the network, or authentication and encryption methods. This component guarantees that users connect to safe networks only, thus eliminating the exposure of sensitive data.

Management is done through Safend Protector’s Management Console. The console allows IT staff to define permissions through granular security policies, manage endpoint clients and monitor devices and network usage in the enterprise network. The management console utilizes the power of Active Director to associate and distribute policies with your network computers and users. Once policies have been distributed, the Safend Protect Client immediately starts protecting endpoint users.


Safend Protector is a comprehensive and easy-to-use endpoint security solution. Thanks to the well-document guides, Safend Protector makes the task of securing endpoints easy to accomplish. With Safend Protector IT departments can ensure that corporate data goes only where it should.

Leave a Reply