Calin Ghibu

My feedback

  1. 1 vote
    Sign in Sign in with GFI
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  GFI EndPointSecurity  ·  Flag idea as inappropriate…  ·  Admin →
    Calin Ghibu commented  · 

    [Comment date: 2/21/11 5:08]
    Hi Stephen,

    Thank you for your feedback.
    I believe that if you go to advanced filtering, the options you are looking for are there.

  2. 1 vote
    Sign in Sign in with GFI
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  GFI EndPointSecurity  ·  Flag idea as inappropriate…  ·  Admin →
    Calin Ghibu commented  · 

    [Comment date: 2/21/11 5:45]
    Hi Bjorn,

    I think this is a very good idea.
    I will add it to the list.
    Thanks!

  3. 1 vote
    Sign in Sign in with GFI
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  GFI EndPointSecurity  ·  Flag idea as inappropriate…  ·  Admin →
    Calin Ghibu commented  · 

    [Comment date: 2/21/11 5:27]
    Hi Patrick

    Thank you for your feedback.
    We have analyzed this particular incompatibility and made contact with Citrix in an attempt to fix the problem.
    However we have received a classic reply from them asking us to change our technology in order to be compatible.
    For us, that would mean replacing our file filtering driver (quite an effort) with no benefit other than fixing compatibility issues (this one and maybe others that have not yet been reported)
    We have a plan to do this in 2011 (it’s on the roadmap) but it is not going to be in the first release of the year.

  4. 1 vote
    Sign in Sign in with GFI
    Signed in as (Sign out)

    We’ll send you updates on this idea

    6 comments  ·  GFI EndPointSecurity  ·  Flag idea as inappropriate…  ·  Admin →
    Calin Ghibu commented  · 

    [Comment date: 2/21/11 5:11]
    Currently there is a way to acomplish this; you can find more information here:http://kbase.gfi.com/showarticle.asp?id=KBID004007

    However we plan on improving the auto-discovery functionality in the next release, and there will be a better solution to this especially in AD environments.

    Calin Ghibu commented  · 

    [Comment date: 2/21/11 5:08]
    Hi Jim,

    Thank you for your feedback.

    Your point is very valid.

    Currently there is a workaround to this problem that you can find here: http://kbase.gfi.com/showarticle.asp?id=KBID004007

    I agree that we should have a better solution to this and I have planned for enhancements in this area like better integration with AD, ability to use OUs, etc. We will think about adding a whitelist /blacklist too, to cater for the situations where AD is not used and excluded computers cannot be grouped in an organizational unit for this purpose.

    Regards,

    Calin Ghibu

    Product Manager - GFI EndPointSecurity

  5. 1 vote
    Sign in Sign in with GFI
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  GFI EndPointSecurity  ·  Flag idea as inappropriate…  ·  Admin →
    Calin Ghibu commented  · 

    [Comment date: 2/18/11 5:44]
    Hi Norbert,

    Thank you for your thoughts.
    Indeed, you are right. Unfortunately the files in issue are indeed archives, and because the way the product currently handles files (chunk by chunk) it is (or better said, it was) impossible to open them and see what is inside.

    The good news is we are changing the way we handle the files in general and this will enable us to look into archives too, and consequently fix this issue.

    Expect to have a fix for this in the first release of the year.

    Regards,
    Calin Ghibu
    Product Manager - GFI EndPointSecurity

  6. 3 votes
    Sign in Sign in with GFI
    Signed in as (Sign out)

    We’ll send you updates on this idea

    5 comments  ·  GFI EndPointSecurity  ·  Flag idea as inappropriate…  ·  Admin →
    Calin Ghibu commented  · 

    [Comment date: 2/18/11 5:48]
    Hi Juan,
    I think you are right. It is clear that reporting needs to be way more flexible than now.
    In order to make it more flexible and even fully customizable, we are changing the way we generate the reports.

    There is a feature planned for one of the releases this year, that will enable you to select the columns you want in, as well as the filteirng condition that decides what rows go in.

    Regards,
    Calin Ghibu
    Product Manager - GFI EndPointSecurity

  7. 1 vote
    Sign in Sign in with GFI
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  GFI EndPointSecurity  ·  Flag idea as inappropriate…  ·  Admin →
    Calin Ghibu commented  · 

    [Comment date: 2/18/11 6:08]
    Hi Cheryl,

    Thank you for your feedback!

    I think this is a very good point. Web interface is very important nowadays. We have this on our radar for a while.

    It is planned for one of the 2011 releases.

    Calin Ghibu

    Product Manager - GFI EndPointSecurity

  8. 2 votes
    Sign in Sign in with GFI
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  GFI EndPointSecurity  ·  Flag idea as inappropriate…  ·  Admin →
    Calin Ghibu commented  · 

    [Comment date: 2/21/11 5:08]
    Hi Cecilia,

    Thank you for your feedback!

    The next release of the product will feature content checking as well as out of the box discovery of security-sensitive information like SSNs, CCNs, etc with the posibility to define more types of security-sensitive information.

    Best regards,

    Calin Ghibu

    Product Manager - GFI EndPointSecurity

  9. 1 vote
    Sign in Sign in with GFI
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  GFI EndPointSecurity  ·  Flag idea as inappropriate…  ·  Admin →
    Calin Ghibu commented  · 

    [Comment date: 2/18/11 7:00]
    Hi Ronny,

    Thank you for your feedback.

    I agree that most of the competitors have this feature, and I agree that for small files, this would be useful to have in the product as it is now.

    However, I think doing everything competition does, just coz they do it, is a big pitfall, especially if you have not done it first (or at least second, or third..).
    At the same time I cannot help thinking about the first release of this year and how it is going to change the product for the better.
    So let’s go a bit beyond this feature (although heavily marketed - obviously because a file copy is simple to implement and this looks great on battle sheets) and think of its true usability for the administrator: why would someone need to look into the files of people who are allowed to transfer those files in the first place? (In some European countries it is even illegal)
    The main reason for which I would be interested in seeing what my employees transfer is to look for breaches in the security policy or internal procedure, which are already in place and must be enforced. This means that if people should not take out certain information, I want to make sure they do not so I would check out the contents of the files they transfer rather than cut them off completely by denying them access to certain file types etc.

    But then again... isn't this a bit obsolete and counterproductive?
    The first release of the year will have content checking in place, as well as ability to identify security-sensitive information out of the box. Plus one would be able to configure what info is security-sensitive and what the product should look for.

    Like that, one can rest assured that as long as he/she configures the product not to let out any files containing SSNs, for example, there won't be such files allowed for transfer.
    Together with the above, for a future release, I plan to have a local cache (similar to data shadowing) that would keep a copy of some of the files transferred and which an admin can check out using an internet browser. The files I have in mind are: files that people failed to transfer out (because they infringe a rule), smaller text based files, random files in a certain size range. But without the complexity and the issues that come with having data shadowing the way the competitors are doing it. Like this we can say we have data shadowing too…

    Please take the time to share your feedback on the above.

    Best regards,
    Calin Ghibu
    Product Manager – GFI EndPointSecurity

  10. 4 votes
    Sign in Sign in with GFI
    Signed in as (Sign out)

    We’ll send you updates on this idea

    4 comments  ·  GFI EndPointSecurity  ·  Flag idea as inappropriate…  ·  Admin →
    Calin Ghibu commented  · 

    [Comment date: 2/21/11 4:59]
    Hi Khaled,

    Thank you for your feedback!

    I think this is a very good point. Web interface is very important nowadays. We have this on our radar for a while.

    It is planned for one of the 2011 releases.

    Calin Ghibu

    Product Manager - GFI EndPointSecurity

  11. 1 vote
    Sign in Sign in with GFI
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  GFI EndPointSecurity  ·  Flag idea as inappropriate…  ·  Admin →
    Calin Ghibu commented  · 

    [Comment date: 2/21/11 5:35]
    Hi Monique,

    Thank you very much for your feedback as well as bringing this up.

    I believe this is a great idea, an unique feature that would have helped those 12,000 people who lost a laptop in 2008 (According to Ponemon Institute). What good is to protect data on sticks with encryption if one can lose the entire laptop or smartphone?

    We have given this a lot of thought involving the engineering leaders and of course came to the conclusion this is no simple thing to do.

    There are many situations that can appear and it is very difficult to have the pill explode remotely (the success of it depends on various factors that actually require a big coincidence to synchornize) and do its job. I am open to discussion in this area; if you want me to be more specific, please ask the details that are of interest for you.

    However, we believe we have a feasible solution to this issue and it is planned for a release due to happen in 2011. It is still pending some technical research but I have a high level of confidence that it is doable form a technical point of view.

    @Mary I also believe you are right, not only can it trigger litigations, but also destroy contents of laptops making the scope of false positives (which are very difficult to avoid)

    So we have decided to have a pill that does not explode, but actually disables the data, in a reversible manner - volume encryption.

    We only need a a couple of seconds when the pill was supposed to explode, just boot from a particular disk sector we create for this purpose and start encrypting the drive (start with the file alocation table so info is not usable unless this is decrypted). Reeboot + encrypt FAT takes 2 seconds- people who found the laptop will have no idea what is happening.

    Regards,

    Calin Ghibu

    Product Manager - GFI EndPointSecurity

  12. 1 vote
    Sign in Sign in with GFI
    Signed in as (Sign out)

    We’ll send you updates on this idea

    4 comments  ·  GFI EndPointSecurity  ·  Flag idea as inappropriate…  ·  Admin →
    Calin Ghibu commented  · 

    [Comment date: 2/18/11 5:38]
    Hi Ronny,

    Thank you for your feedbak. Indeed this is a top priority feature for us.
    It will be implemented in the next release.

    Regards,
    Calin Ghibu
    Product Manager - GFI EndPointSecurity

  13. 5 votes
    Sign in Sign in with GFI
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  GFI WebMonitor  ·  Flag idea as inappropriate…  ·  Admin →
    Calin Ghibu supported this idea  · 

Feedback and Knowledge Base